Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 22:20
Behavioral task
behavioral1
Sample
976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe
-
Size
226KB
-
MD5
976fb1e86e259b0266c23e7d3732e670
-
SHA1
bccda371d7c0a5ca069cfe4fdffe0d3bd933194a
-
SHA256
4b1c7d29497e7ab2e2a881366847946511aede2c828046e18d84b1cc5f2b0ffc
-
SHA512
b600023e4211b85951587a9e6d8d2c7d4527ee720cb4fcfcbabe7cd185b69bf3152e715c7425828e6b02ac24aa175af5fcdda0616bdefd4e3299952e83d10176
-
SSDEEP
6144:Dcm4FmowdHoSkHcJkkcm4FmowdHoS2qOv7r+MubPtylm:p4wFHoSk0ky4wFHoS2nDr9ubQlm
Malware Config
Signatures
-
Detect Blackmoon payload 52 IoCs
Processes:
resource yara_rule behavioral1/memory/2768-9-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2692-18-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/3052-29-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2564-58-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2564-57-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2488-48-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2452-39-0x0000000000260000-0x00000000002AB000-memory.dmp family_blackmoon behavioral1/memory/2452-38-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2640-69-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2472-80-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2472-90-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2420-99-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2972-110-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1704-124-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2676-143-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1964-165-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1688-184-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1492-214-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2136-225-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1872-267-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/792-277-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1140-288-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2200-318-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2768-328-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2868-348-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2868-347-0x0000000000220000-0x000000000026B000-memory.dmp family_blackmoon behavioral1/memory/2716-362-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2588-378-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2648-385-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2784-370-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2968-337-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2600-435-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2552-459-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1552-547-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2188-410-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2496-401-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2424-393-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/708-308-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2156-298-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1296-256-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1564-245-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2916-235-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1492-205-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/288-204-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1216-193-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1400-174-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1400-169-0x0000000000220000-0x000000000026B000-memory.dmp family_blackmoon behavioral1/memory/932-154-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1704-133-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1704-131-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/1860-122-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon behavioral1/memory/2388-79-0x0000000000400000-0x000000000044B000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
rvvpr.exejxdffxf.exefhlfp.exevnrbh.exejvblb.exejdvblx.exedlxtlh.exexrjtn.exedrprtj.exelvnjt.exejbdhj.exevddjbxb.exetvdrv.exevlpdpp.exevttvxd.exerjdbp.exednfxhjd.exefhvpd.exehdphxr.exedfplr.exethxbhn.exeldxdv.exervhhx.exeblphhfn.exelfjbh.exettvvxhp.exejfxbx.exebptjdvb.exehhnfhrf.exefpxjbvx.exevjrdxj.exevjphvr.exedxfhjd.exevlvnxjv.exebtfnf.exexlbff.exenjrxnl.exexfxhd.exefpnnvv.exetrblx.exenvpjn.exelbxrn.exeplxdx.exejxnjh.exehxldv.exedtthd.exedxhvjnt.exepdhvhrh.exertffd.exetvdxtfj.exefxphbxj.exebfrhjb.exedvvjh.exejffhxt.exebfppft.exevhxfdx.exexlpbv.exedpnfhv.exelppxfx.exexdlnvjx.exebpldnf.exefbppt.exehlnxdth.exedpfnbr.exepid process 2692 rvvpr.exe 3052 jxdffxf.exe 2452 fhlfp.exe 2488 vnrbh.exe 2564 jvblb.exe 2640 jdvblx.exe 2388 dlxtlh.exe 2472 xrjtn.exe 2420 drprtj.exe 2972 lvnjt.exe 1860 jbdhj.exe 1704 vddjbxb.exe 2676 tvdrv.exe 932 vlpdpp.exe 1964 vttvxd.exe 1400 rjdbp.exe 1688 dnfxhjd.exe 1216 fhvpd.exe 288 hdphxr.exe 1492 dfplr.exe 2136 thxbhn.exe 2916 ldxdv.exe 1564 rvhhx.exe 1296 blphhfn.exe 1872 lfjbh.exe 792 ttvvxhp.exe 1140 jfxbx.exe 2156 bptjdvb.exe 708 hhnfhrf.exe 2200 fpxjbvx.exe 2768 vjrdxj.exe 2968 vjphvr.exe 2868 dxfhjd.exe 2056 vlvnxjv.exe 2716 btfnf.exe 2784 xlbff.exe 2588 njrxnl.exe 2648 xfxhd.exe 2424 fpnnvv.exe 2496 trblx.exe 2188 nvpjn.exe 2404 lbxrn.exe 2060 plxdx.exe 2600 jxnjh.exe 1704 hxldv.exe 2428 dtthd.exe 2552 dxhvjnt.exe 2680 pdhvhrh.exe 2092 rtffd.exe 1628 tvdxtfj.exe 1780 fxphbxj.exe 1016 bfrhjb.exe 2036 dvvjh.exe 1816 jffhxt.exe 1916 bfppft.exe 532 vhxfdx.exe 400 xlpbv.exe 1552 dpnfhv.exe 1800 lppxfx.exe 1788 xdlnvjx.exe 1200 bpldnf.exe 1052 fbppt.exe 1356 hlnxdth.exe 2068 dpfnbr.exe -
Processes:
resource yara_rule behavioral1/memory/2768-0-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\rvvpr.exe upx behavioral1/memory/2692-12-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2768-9-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2768-6-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\jxdffxf.exe upx behavioral1/memory/2692-19-0x00000000002D0000-0x000000000031B000-memory.dmp upx behavioral1/memory/2692-18-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\fhlfp.exe upx behavioral1/memory/3052-29-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\vnrbh.exe upx \??\c:\jvblb.exe upx behavioral1/memory/2640-59-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2564-58-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\jdvblx.exe upx behavioral1/memory/2488-48-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2452-39-0x0000000000260000-0x00000000002AB000-memory.dmp upx behavioral1/memory/2452-38-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2640-67-0x0000000000220000-0x000000000026B000-memory.dmp upx \??\c:\dlxtlh.exe upx behavioral1/memory/2640-69-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2388-71-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2472-80-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\xrjtn.exe upx behavioral1/memory/2420-92-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\drprtj.exe upx behavioral1/memory/2472-90-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\lvnjt.exe upx behavioral1/memory/2420-100-0x0000000000450000-0x000000000049B000-memory.dmp upx behavioral1/memory/2420-99-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2972-110-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1860-116-0x0000000000220000-0x000000000026B000-memory.dmp upx \??\c:\jbdhj.exe upx C:\vddjbxb.exe upx behavioral1/memory/1704-124-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\tvdrv.exe upx behavioral1/memory/2676-137-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\vlpdpp.exe upx behavioral1/memory/2676-143-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\vttvxd.exe upx behavioral1/memory/1964-165-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\rjdbp.exe upx C:\dnfxhjd.exe upx behavioral1/memory/1216-185-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1688-184-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/288-195-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\hdphxr.exe upx \??\c:\dfplr.exe upx behavioral1/memory/2136-216-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\thxbhn.exe upx behavioral1/memory/1492-214-0x0000000000400000-0x000000000044B000-memory.dmp upx C:\ldxdv.exe upx behavioral1/memory/2136-225-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2916-230-0x0000000000220000-0x000000000026B000-memory.dmp upx behavioral1/memory/1296-248-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\blphhfn.exe upx behavioral1/memory/1564-246-0x0000000000220000-0x000000000026B000-memory.dmp upx behavioral1/memory/1872-258-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\ttvvxhp.exe upx behavioral1/memory/1872-267-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/1872-262-0x00000000002E0000-0x000000000032B000-memory.dmp upx behavioral1/memory/1872-266-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/792-277-0x0000000000400000-0x000000000044B000-memory.dmp upx \??\c:\jfxbx.exe upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exervvpr.exejxdffxf.exefhlfp.exevnrbh.exejvblb.exejdvblx.exedlxtlh.exexrjtn.exedrprtj.exelvnjt.exejbdhj.exevddjbxb.exetvdrv.exevlpdpp.exevttvxd.exedescription pid process target process PID 2768 wrote to memory of 2692 2768 976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe rvvpr.exe PID 2768 wrote to memory of 2692 2768 976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe rvvpr.exe PID 2768 wrote to memory of 2692 2768 976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe rvvpr.exe PID 2768 wrote to memory of 2692 2768 976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe rvvpr.exe PID 2692 wrote to memory of 3052 2692 rvvpr.exe rllfdx.exe PID 2692 wrote to memory of 3052 2692 rvvpr.exe rllfdx.exe PID 2692 wrote to memory of 3052 2692 rvvpr.exe rllfdx.exe PID 2692 wrote to memory of 3052 2692 rvvpr.exe rllfdx.exe PID 3052 wrote to memory of 2452 3052 jxdffxf.exe fhlfp.exe PID 3052 wrote to memory of 2452 3052 jxdffxf.exe fhlfp.exe PID 3052 wrote to memory of 2452 3052 jxdffxf.exe fhlfp.exe PID 3052 wrote to memory of 2452 3052 jxdffxf.exe fhlfp.exe PID 2452 wrote to memory of 2488 2452 fhlfp.exe vnrbh.exe PID 2452 wrote to memory of 2488 2452 fhlfp.exe vnrbh.exe PID 2452 wrote to memory of 2488 2452 fhlfp.exe vnrbh.exe PID 2452 wrote to memory of 2488 2452 fhlfp.exe vnrbh.exe PID 2488 wrote to memory of 2564 2488 vnrbh.exe hnhnxfb.exe PID 2488 wrote to memory of 2564 2488 vnrbh.exe hnhnxfb.exe PID 2488 wrote to memory of 2564 2488 vnrbh.exe hnhnxfb.exe PID 2488 wrote to memory of 2564 2488 vnrbh.exe hnhnxfb.exe PID 2564 wrote to memory of 2640 2564 jvblb.exe jdvblx.exe PID 2564 wrote to memory of 2640 2564 jvblb.exe jdvblx.exe PID 2564 wrote to memory of 2640 2564 jvblb.exe jdvblx.exe PID 2564 wrote to memory of 2640 2564 jvblb.exe jdvblx.exe PID 2640 wrote to memory of 2388 2640 jdvblx.exe dlxtlh.exe PID 2640 wrote to memory of 2388 2640 jdvblx.exe dlxtlh.exe PID 2640 wrote to memory of 2388 2640 jdvblx.exe dlxtlh.exe PID 2640 wrote to memory of 2388 2640 jdvblx.exe dlxtlh.exe PID 2388 wrote to memory of 2472 2388 dlxtlh.exe xrjtn.exe PID 2388 wrote to memory of 2472 2388 dlxtlh.exe xrjtn.exe PID 2388 wrote to memory of 2472 2388 dlxtlh.exe xrjtn.exe PID 2388 wrote to memory of 2472 2388 dlxtlh.exe xrjtn.exe PID 2472 wrote to memory of 2420 2472 xrjtn.exe drprtj.exe PID 2472 wrote to memory of 2420 2472 xrjtn.exe drprtj.exe PID 2472 wrote to memory of 2420 2472 xrjtn.exe drprtj.exe PID 2472 wrote to memory of 2420 2472 xrjtn.exe drprtj.exe PID 2420 wrote to memory of 2972 2420 drprtj.exe lvnjt.exe PID 2420 wrote to memory of 2972 2420 drprtj.exe lvnjt.exe PID 2420 wrote to memory of 2972 2420 drprtj.exe lvnjt.exe PID 2420 wrote to memory of 2972 2420 drprtj.exe lvnjt.exe PID 2972 wrote to memory of 1860 2972 lvnjt.exe jbdhj.exe PID 2972 wrote to memory of 1860 2972 lvnjt.exe jbdhj.exe PID 2972 wrote to memory of 1860 2972 lvnjt.exe jbdhj.exe PID 2972 wrote to memory of 1860 2972 lvnjt.exe jbdhj.exe PID 1860 wrote to memory of 1704 1860 jbdhj.exe hxldv.exe PID 1860 wrote to memory of 1704 1860 jbdhj.exe hxldv.exe PID 1860 wrote to memory of 1704 1860 jbdhj.exe hxldv.exe PID 1860 wrote to memory of 1704 1860 jbdhj.exe hxldv.exe PID 1704 wrote to memory of 2676 1704 vddjbxb.exe tvdrv.exe PID 1704 wrote to memory of 2676 1704 vddjbxb.exe tvdrv.exe PID 1704 wrote to memory of 2676 1704 vddjbxb.exe tvdrv.exe PID 1704 wrote to memory of 2676 1704 vddjbxb.exe tvdrv.exe PID 2676 wrote to memory of 932 2676 tvdrv.exe vlpdpp.exe PID 2676 wrote to memory of 932 2676 tvdrv.exe vlpdpp.exe PID 2676 wrote to memory of 932 2676 tvdrv.exe vlpdpp.exe PID 2676 wrote to memory of 932 2676 tvdrv.exe vlpdpp.exe PID 932 wrote to memory of 1964 932 vlpdpp.exe vttvxd.exe PID 932 wrote to memory of 1964 932 vlpdpp.exe vttvxd.exe PID 932 wrote to memory of 1964 932 vlpdpp.exe vttvxd.exe PID 932 wrote to memory of 1964 932 vlpdpp.exe vttvxd.exe PID 1964 wrote to memory of 1400 1964 vttvxd.exe rjdbp.exe PID 1964 wrote to memory of 1400 1964 vttvxd.exe rjdbp.exe PID 1964 wrote to memory of 1400 1964 vttvxd.exe rjdbp.exe PID 1964 wrote to memory of 1400 1964 vttvxd.exe rjdbp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\976fb1e86e259b0266c23e7d3732e670_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\rvvpr.exec:\rvvpr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\jxdffxf.exec:\jxdffxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\fhlfp.exec:\fhlfp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\vnrbh.exec:\vnrbh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\jvblb.exec:\jvblb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\jdvblx.exec:\jdvblx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\dlxtlh.exec:\dlxtlh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\xrjtn.exec:\xrjtn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\drprtj.exec:\drprtj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\lvnjt.exec:\lvnjt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\jbdhj.exec:\jbdhj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\vddjbxb.exec:\vddjbxb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\tvdrv.exec:\tvdrv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\vlpdpp.exec:\vlpdpp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\vttvxd.exec:\vttvxd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
\??\c:\rjdbp.exec:\rjdbp.exe17⤵
- Executes dropped EXE
PID:1400 -
\??\c:\dnfxhjd.exec:\dnfxhjd.exe18⤵
- Executes dropped EXE
PID:1688 -
\??\c:\fhvpd.exec:\fhvpd.exe19⤵
- Executes dropped EXE
PID:1216 -
\??\c:\hdphxr.exec:\hdphxr.exe20⤵
- Executes dropped EXE
PID:288 -
\??\c:\dfplr.exec:\dfplr.exe21⤵
- Executes dropped EXE
PID:1492 -
\??\c:\thxbhn.exec:\thxbhn.exe22⤵
- Executes dropped EXE
PID:2136 -
\??\c:\ldxdv.exec:\ldxdv.exe23⤵
- Executes dropped EXE
PID:2916 -
\??\c:\rvhhx.exec:\rvhhx.exe24⤵
- Executes dropped EXE
PID:1564 -
\??\c:\blphhfn.exec:\blphhfn.exe25⤵
- Executes dropped EXE
PID:1296 -
\??\c:\lfjbh.exec:\lfjbh.exe26⤵
- Executes dropped EXE
PID:1872 -
\??\c:\ttvvxhp.exec:\ttvvxhp.exe27⤵
- Executes dropped EXE
PID:792 -
\??\c:\jfxbx.exec:\jfxbx.exe28⤵
- Executes dropped EXE
PID:1140 -
\??\c:\bptjdvb.exec:\bptjdvb.exe29⤵
- Executes dropped EXE
PID:2156 -
\??\c:\hhnfhrf.exec:\hhnfhrf.exe30⤵
- Executes dropped EXE
PID:708 -
\??\c:\fpxjbvx.exec:\fpxjbvx.exe31⤵
- Executes dropped EXE
PID:2200 -
\??\c:\vjrdxj.exec:\vjrdxj.exe32⤵
- Executes dropped EXE
PID:2768 -
\??\c:\vjphvr.exec:\vjphvr.exe33⤵
- Executes dropped EXE
PID:2968 -
\??\c:\dxfhjd.exec:\dxfhjd.exe34⤵
- Executes dropped EXE
PID:2868 -
\??\c:\vlvnxjv.exec:\vlvnxjv.exe35⤵
- Executes dropped EXE
PID:2056 -
\??\c:\btfnf.exec:\btfnf.exe36⤵
- Executes dropped EXE
PID:2716 -
\??\c:\xlbff.exec:\xlbff.exe37⤵
- Executes dropped EXE
PID:2784 -
\??\c:\njrxnl.exec:\njrxnl.exe38⤵
- Executes dropped EXE
PID:2588 -
\??\c:\xfxhd.exec:\xfxhd.exe39⤵
- Executes dropped EXE
PID:2648 -
\??\c:\fpnnvv.exec:\fpnnvv.exe40⤵
- Executes dropped EXE
PID:2424 -
\??\c:\trblx.exec:\trblx.exe41⤵
- Executes dropped EXE
PID:2496 -
\??\c:\nvpjn.exec:\nvpjn.exe42⤵
- Executes dropped EXE
PID:2188 -
\??\c:\lbxrn.exec:\lbxrn.exe43⤵
- Executes dropped EXE
PID:2404 -
\??\c:\plxdx.exec:\plxdx.exe44⤵
- Executes dropped EXE
PID:2060 -
\??\c:\jxnjh.exec:\jxnjh.exe45⤵
- Executes dropped EXE
PID:2600 -
\??\c:\hxldv.exec:\hxldv.exe46⤵
- Executes dropped EXE
PID:1704 -
\??\c:\dtthd.exec:\dtthd.exe47⤵
- Executes dropped EXE
PID:2428 -
\??\c:\dxhvjnt.exec:\dxhvjnt.exe48⤵
- Executes dropped EXE
PID:2552 -
\??\c:\pdhvhrh.exec:\pdhvhrh.exe49⤵
- Executes dropped EXE
PID:2680 -
\??\c:\rtffd.exec:\rtffd.exe50⤵
- Executes dropped EXE
PID:2092 -
\??\c:\tvdxtfj.exec:\tvdxtfj.exe51⤵
- Executes dropped EXE
PID:1628 -
\??\c:\fxphbxj.exec:\fxphbxj.exe52⤵
- Executes dropped EXE
PID:1780 -
\??\c:\bfrhjb.exec:\bfrhjb.exe53⤵
- Executes dropped EXE
PID:1016 -
\??\c:\dvvjh.exec:\dvvjh.exe54⤵
- Executes dropped EXE
PID:2036 -
\??\c:\jffhxt.exec:\jffhxt.exe55⤵
- Executes dropped EXE
PID:1816 -
\??\c:\bfppft.exec:\bfppft.exe56⤵
- Executes dropped EXE
PID:1916 -
\??\c:\vhxfdx.exec:\vhxfdx.exe57⤵
- Executes dropped EXE
PID:532 -
\??\c:\xlpbv.exec:\xlpbv.exe58⤵
- Executes dropped EXE
PID:400 -
\??\c:\dpnfhv.exec:\dpnfhv.exe59⤵
- Executes dropped EXE
PID:1552 -
\??\c:\lppxfx.exec:\lppxfx.exe60⤵
- Executes dropped EXE
PID:1800 -
\??\c:\xdlnvjx.exec:\xdlnvjx.exe61⤵
- Executes dropped EXE
PID:1788 -
\??\c:\bpldnf.exec:\bpldnf.exe62⤵
- Executes dropped EXE
PID:1200 -
\??\c:\fbppt.exec:\fbppt.exe63⤵
- Executes dropped EXE
PID:1052 -
\??\c:\hlnxdth.exec:\hlnxdth.exe64⤵
- Executes dropped EXE
PID:1356 -
\??\c:\dpfnbr.exec:\dpfnbr.exe65⤵
- Executes dropped EXE
PID:2068 -
\??\c:\bvbfhjx.exec:\bvbfhjx.exe66⤵PID:2308
-
\??\c:\xnpttv.exec:\xnpttv.exe67⤵PID:1508
-
\??\c:\nhfvh.exec:\nhfvh.exe68⤵PID:2740
-
\??\c:\nfbpxx.exec:\nfbpxx.exe69⤵PID:2816
-
\??\c:\rbjhhl.exec:\rbjhhl.exe70⤵PID:2104
-
\??\c:\rllfdx.exec:\rllfdx.exe71⤵PID:3052
-
\??\c:\pbdtl.exec:\pbdtl.exe72⤵PID:2560
-
\??\c:\hnhnxfb.exec:\hnhnxfb.exe73⤵PID:2564
-
\??\c:\bnxdb.exec:\bnxdb.exe74⤵PID:2556
-
\??\c:\fhxbfnf.exec:\fhxbfnf.exe75⤵PID:2500
-
\??\c:\rbfxr.exec:\rbfxr.exe76⤵PID:2608
-
\??\c:\fxrdtvr.exec:\fxrdtvr.exe77⤵PID:2660
-
\??\c:\lprpp.exec:\lprpp.exe78⤵PID:2524
-
\??\c:\lhprt.exec:\lhprt.exe79⤵PID:2432
-
\??\c:\rnrnt.exec:\rnrnt.exe80⤵PID:2356
-
\??\c:\thdhb.exec:\thdhb.exe81⤵PID:2404
-
\??\c:\xvxbh.exec:\xvxbh.exe82⤵PID:1860
-
\??\c:\lbdfn.exec:\lbdfn.exe83⤵PID:1040
-
\??\c:\vpfljfp.exec:\vpfljfp.exe84⤵PID:1704
-
\??\c:\hbxhn.exec:\hbxhn.exe85⤵PID:932
-
\??\c:\rtftd.exec:\rtftd.exe86⤵PID:2152
-
\??\c:\jjdfrbr.exec:\jjdfrbr.exe87⤵PID:1636
-
\??\c:\dxlbxn.exec:\dxlbxn.exe88⤵PID:2824
-
\??\c:\nlvlljv.exec:\nlvlljv.exe89⤵PID:936
-
\??\c:\lftdjld.exec:\lftdjld.exe90⤵PID:2052
-
\??\c:\ttlbh.exec:\ttlbh.exe91⤵PID:2456
-
\??\c:\bbvpf.exec:\bbvpf.exe92⤵PID:636
-
\??\c:\hxdhtpf.exec:\hxdhtpf.exe93⤵PID:476
-
\??\c:\fhlfjp.exec:\fhlfjp.exe94⤵PID:2724
-
\??\c:\lplll.exec:\lplll.exe95⤵PID:1088
-
\??\c:\tdpbnn.exec:\tdpbnn.exe96⤵PID:1692
-
\??\c:\hjpnf.exec:\hjpnf.exe97⤵PID:1564
-
\??\c:\nnvjj.exec:\nnvjj.exe98⤵PID:1820
-
\??\c:\ptrhdd.exec:\ptrhdd.exe99⤵PID:1676
-
\??\c:\xnnffn.exec:\xnnffn.exe100⤵PID:792
-
\??\c:\hbvjdx.exec:\hbvjdx.exe101⤵PID:1052
-
\??\c:\thbjff.exec:\thbjff.exe102⤵PID:912
-
\??\c:\jpfjpr.exec:\jpfjpr.exe103⤵PID:1140
-
\??\c:\pbxrntx.exec:\pbxrntx.exe104⤵PID:2204
-
\??\c:\pnhnp.exec:\pnhnp.exe105⤵PID:2196
-
\??\c:\rdjvn.exec:\rdjvn.exe106⤵PID:884
-
\??\c:\lrjftj.exec:\lrjftj.exe107⤵PID:3056
-
\??\c:\pdddn.exec:\pdddn.exe108⤵PID:3060
-
\??\c:\dnnlxdt.exec:\dnnlxdt.exe109⤵PID:2572
-
\??\c:\jplvtll.exec:\jplvtll.exe110⤵PID:2560
-
\??\c:\bprfx.exec:\bprfx.exe111⤵PID:2564
-
\??\c:\tjxhv.exec:\tjxhv.exe112⤵PID:2628
-
\??\c:\jrvnhd.exec:\jrvnhd.exe113⤵PID:2640
-
\??\c:\dxxfnf.exec:\dxxfnf.exe114⤵PID:2388
-
\??\c:\jnprrj.exec:\jnprrj.exe115⤵PID:2192
-
\??\c:\fdndvhd.exec:\fdndvhd.exe116⤵PID:588
-
\??\c:\jnldrv.exec:\jnldrv.exe117⤵PID:2188
-
\??\c:\nvdxxfn.exec:\nvdxxfn.exe118⤵PID:2180
-
\??\c:\vfvxhjj.exec:\vfvxhjj.exe119⤵PID:2644
-
\??\c:\bnjpbh.exec:\bnjpbh.exe120⤵PID:2528
-
\??\c:\lxjxdd.exec:\lxjxdd.exe121⤵PID:1860
-
\??\c:\xlrnljv.exec:\xlrnljv.exe122⤵PID:1668
-
\??\c:\vjtfx.exec:\vjtfx.exe123⤵PID:1468
-
\??\c:\lnpjfd.exec:\lnpjfd.exe124⤵PID:2944
-
\??\c:\tjvjvp.exec:\tjvjvp.exe125⤵PID:1312
-
\??\c:\nfhbb.exec:\nfhbb.exe126⤵PID:3008
-
\??\c:\bdhptpj.exec:\bdhptpj.exe127⤵PID:528
-
\??\c:\xvphld.exec:\xvphld.exe128⤵PID:2984
-
\??\c:\jhdbprh.exec:\jhdbprh.exe129⤵PID:1628
-
\??\c:\hxppbj.exec:\hxppbj.exe130⤵PID:596
-
\??\c:\hbldd.exec:\hbldd.exe131⤵PID:1544
-
\??\c:\dppllj.exec:\dppllj.exe132⤵PID:908
-
\??\c:\lhlxhd.exec:\lhlxhd.exe133⤵PID:1344
-
\??\c:\dlrlnjp.exec:\dlrlnjp.exe134⤵PID:2224
-
\??\c:\rlfjn.exec:\rlfjn.exe135⤵PID:2208
-
\??\c:\vbnpxpr.exec:\vbnpxpr.exe136⤵PID:2712
-
\??\c:\rvvhvt.exec:\rvvhvt.exe137⤵PID:2992
-
\??\c:\tdbbjh.exec:\tdbbjh.exe138⤵PID:864
-
\??\c:\pfptphf.exec:\pfptphf.exe139⤵PID:1692
-
\??\c:\hprbf.exec:\hprbf.exe140⤵PID:1744
-
\??\c:\nnhdrvd.exec:\nnhdrvd.exe141⤵PID:1924
-
\??\c:\jbpdhnt.exec:\jbpdhnt.exe142⤵PID:2908
-
\??\c:\ttxplpp.exec:\ttxplpp.exe143⤵PID:1256
-
\??\c:\vxjlrl.exec:\vxjlrl.exe144⤵PID:968
-
\??\c:\bvhhl.exec:\bvhhl.exe145⤵PID:1792
-
\??\c:\bnxjb.exec:\bnxjb.exe146⤵PID:2284
-
\??\c:\hjndxh.exec:\hjndxh.exe147⤵PID:912
-
\??\c:\jlvtdjt.exec:\jlvtdjt.exe148⤵PID:948
-
\??\c:\dxvbt.exec:\dxvbt.exe149⤵PID:776
-
\??\c:\jpbpxnt.exec:\jpbpxnt.exe150⤵PID:2200
-
\??\c:\pxhhbnx.exec:\pxhhbnx.exe151⤵PID:2804
-
\??\c:\rdhpbbn.exec:\rdhpbbn.exe152⤵PID:1612
-
\??\c:\jtdrv.exec:\jtdrv.exe153⤵PID:2692
-
\??\c:\tbxjdvt.exec:\tbxjdvt.exe154⤵PID:880
-
\??\c:\fjvhnvr.exec:\fjvhnvr.exe155⤵PID:2808
-
\??\c:\dxfjrnt.exec:\dxfjrnt.exe156⤵PID:2516
-
\??\c:\rhphffd.exec:\rhphffd.exe157⤵PID:2880
-
\??\c:\hxnlt.exec:\hxnlt.exe158⤵PID:2484
-
\??\c:\lxntbpl.exec:\lxntbpl.exe159⤵PID:2784
-
\??\c:\fdjldd.exec:\fdjldd.exe160⤵PID:2584
-
\??\c:\xlbtpv.exec:\xlbtpv.exe161⤵PID:2448
-
\??\c:\xlthd.exec:\xlthd.exe162⤵PID:2468
-
\??\c:\rlxfddv.exec:\rlxfddv.exe163⤵PID:2364
-
\??\c:\nfphdxj.exec:\nfphdxj.exe164⤵PID:2800
-
\??\c:\phttp.exec:\phttp.exe165⤵PID:1884
-
\??\c:\hhppv.exec:\hhppv.exe166⤵PID:2420
-
\??\c:\vrxbh.exec:\vrxbh.exe167⤵PID:2060
-
\??\c:\tpttf.exec:\tpttf.exe168⤵PID:1696
-
\??\c:\bvxpv.exec:\bvxpv.exe169⤵PID:2656
-
\??\c:\ldpxd.exec:\ldpxd.exe170⤵PID:1328
-
\??\c:\pvtxl.exec:\pvtxl.exe171⤵PID:2780
-
\??\c:\dvtnlx.exec:\dvtnlx.exe172⤵PID:1336
-
\??\c:\nnvrbll.exec:\nnvrbll.exe173⤵PID:3008
-
\??\c:\tntllnr.exec:\tntllnr.exe174⤵PID:528
-
\??\c:\dlfnnv.exec:\dlfnnv.exe175⤵PID:936
-
\??\c:\nrbrxvf.exec:\nrbrxvf.exe176⤵PID:1628
-
\??\c:\bfrldn.exec:\bfrldn.exe177⤵PID:1016
-
\??\c:\rrjdvb.exec:\rrjdvb.exe178⤵PID:2052
-
\??\c:\hhlbjdh.exec:\hhlbjdh.exe179⤵PID:1492
-
\??\c:\xhbfpl.exec:\xhbfpl.exe180⤵PID:2036
-
\??\c:\fxrdn.exec:\fxrdn.exe181⤵PID:1364
-
\??\c:\thlvjth.exec:\thlvjth.exe182⤵PID:980
-
\??\c:\fdhjhfv.exec:\fdhjhfv.exe183⤵PID:2996
-
\??\c:\dtvph.exec:\dtvph.exe184⤵PID:2144
-
\??\c:\blxrffx.exec:\blxrffx.exe185⤵PID:2904
-
\??\c:\vvbxx.exec:\vvbxx.exe186⤵PID:1656
-
\??\c:\tvdrf.exec:\tvdrf.exe187⤵PID:1984
-
\??\c:\vjrnpn.exec:\vjrnpn.exe188⤵PID:992
-
\??\c:\dpvdv.exec:\dpvdv.exe189⤵PID:1676
-
\??\c:\hllxnnp.exec:\hllxnnp.exe190⤵PID:320
-
\??\c:\jdrjvx.exec:\jdrjvx.exe191⤵PID:1376
-
\??\c:\fjlhnxx.exec:\fjlhnxx.exe192⤵PID:756
-
\??\c:\hnplp.exec:\hnplp.exe193⤵PID:2332
-
\??\c:\xhdhv.exec:\xhdhv.exe194⤵PID:2108
-
\??\c:\vbrrb.exec:\vbrrb.exe195⤵PID:948
-
\??\c:\vtvhrf.exec:\vtvhrf.exe196⤵PID:708
-
\??\c:\rtvbl.exec:\rtvbl.exe197⤵PID:1508
-
\??\c:\nvpddhd.exec:\nvpddhd.exe198⤵PID:2196
-
\??\c:\ffnhxlj.exec:\ffnhxlj.exe199⤵PID:1612
-
\??\c:\xtnftv.exec:\xtnftv.exe200⤵PID:2852
-
\??\c:\drrdpdt.exec:\drrdpdt.exe201⤵PID:3064
-
\??\c:\bdjxfd.exec:\bdjxfd.exe202⤵PID:2568
-
\??\c:\jnxjhh.exec:\jnxjhh.exe203⤵PID:2616
-
\??\c:\jjprjhx.exec:\jjprjhx.exe204⤵PID:2704
-
\??\c:\rtpfj.exec:\rtpfj.exe205⤵PID:3068
-
\??\c:\jfjhb.exec:\jfjhb.exe206⤵PID:2556
-
\??\c:\xfrjd.exec:\xfrjd.exe207⤵PID:2608
-
\??\c:\jdxvrrx.exec:\jdxvrrx.exe208⤵PID:2412
-
\??\c:\ptffr.exec:\ptffr.exe209⤵PID:2660
-
\??\c:\dlxnrb.exec:\dlxnrb.exe210⤵PID:1252
-
\??\c:\hvftvrl.exec:\hvftvrl.exe211⤵PID:2480
-
\??\c:\trxvttj.exec:\trxvttj.exe212⤵PID:2344
-
\??\c:\xxfldtl.exec:\xxfldtl.exe213⤵PID:1168
-
\??\c:\hrbfxj.exec:\hrbfxj.exe214⤵PID:2972
-
\??\c:\rxftp.exec:\rxftp.exe215⤵PID:1032
-
\??\c:\rlffxj.exec:\rlffxj.exe216⤵PID:1668
-
\??\c:\ntfdvhd.exec:\ntfdvhd.exe217⤵PID:240
-
\??\c:\tjnxfpb.exec:\tjnxfpb.exe218⤵PID:2792
-
\??\c:\pjvxrxb.exec:\pjvxrxb.exe219⤵PID:1336
-
\??\c:\pxnbx.exec:\pxnbx.exe220⤵PID:2016
-
\??\c:\tndxrbr.exec:\tndxrbr.exe221⤵PID:1624
-
\??\c:\vvnhnd.exec:\vvnhnd.exe222⤵PID:944
-
\??\c:\fthblp.exec:\fthblp.exe223⤵PID:1628
-
\??\c:\pfxnfll.exec:\pfxnfll.exe224⤵PID:288
-
\??\c:\lrnrpn.exec:\lrnrpn.exe225⤵PID:2052
-
\??\c:\hfrrnph.exec:\hfrrnph.exe226⤵PID:1816
-
\??\c:\rdjnjtb.exec:\rdjnjtb.exe227⤵PID:1344
-
\??\c:\jjvfxhd.exec:\jjvfxhd.exe228⤵PID:1832
-
\??\c:\rxhdx.exec:\rxhdx.exe229⤵PID:1480
-
\??\c:\vdhxnb.exec:\vdhxnb.exe230⤵PID:1536
-
\??\c:\rvttf.exec:\rvttf.exe231⤵PID:2992
-
\??\c:\bxrlx.exec:\bxrlx.exe232⤵PID:864
-
\??\c:\frpjbb.exec:\frpjbb.exe233⤵PID:1552
-
\??\c:\tbpdl.exec:\tbpdl.exe234⤵PID:1548
-
\??\c:\jnvpbv.exec:\jnvpbv.exe235⤵PID:1560
-
\??\c:\nldrh.exec:\nldrh.exe236⤵PID:1256
-
\??\c:\xrxlfpf.exec:\xrxlfpf.exe237⤵PID:968
-
\??\c:\nflrpfd.exec:\nflrpfd.exe238⤵PID:1488
-
\??\c:\lhnpx.exec:\lhnpx.exe239⤵PID:1660
-
\??\c:\hflfh.exec:\hflfh.exe240⤵PID:2308
-
\??\c:\ppbhd.exec:\ppbhd.exe241⤵PID:2108
-
\??\c:\vfjrbr.exec:\vfjrbr.exe242⤵PID:1968