Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 10:07
Behavioral task
behavioral1
Sample
32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe
-
Size
441KB
-
MD5
15a3a1e3d0537ff0a2fa18e54f2c2640
-
SHA1
2a9f6b339a9820e2d8067160419ad5157b7f1dce
-
SHA256
32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717
-
SHA512
c3bb391d66015a4ce997df167c9403497bb162063adf68f61d074b1f50b7d3e8343872224a04d46038d3dd70db99c07b2c5b2d445493e750bf2316c021403257
-
SSDEEP
12288:w4wFHoS9KxbNnidEhjEJd1kNpeUgI95yRoZHVaoJMOxFXnRV4PiGO0hUmHZ:kKxbNndhjEJd1kNpeUgI95yRoZHgoJMj
Malware Config
Signatures
-
Detect Blackmoon payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2188-0-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1580-18-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2616-31-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2524-29-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2548-48-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2708-50-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2552-67-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2408-70-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1784-85-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2980-94-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2740-104-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2724-139-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1244-170-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1664-190-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2072-188-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2512-206-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/328-224-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1684-247-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2224-256-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1012-298-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2568-329-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2440-336-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2976-373-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2832-380-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/3004-388-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2992-395-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2292-420-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/640-447-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1964-454-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1036-474-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2648-657-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2068-723-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2400-984-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2088-1007-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1924-1137-0x00000000001B0000-0x00000000001E4000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 34 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\jvvdd.exe family_berbew C:\bnbttt.exe family_berbew C:\jdppp.exe family_berbew C:\xrxxxfl.exe family_berbew C:\vpppv.exe family_berbew C:\rllrrrf.exe family_berbew C:\nhtntt.exe family_berbew C:\vpddj.exe family_berbew C:\lxffrrf.exe family_berbew C:\bhtntt.exe family_berbew C:\9ffffff.exe family_berbew C:\nbtthh.exe family_berbew C:\9pjjp.exe family_berbew C:\7xfllll.exe family_berbew C:\tntttt.exe family_berbew C:\dpvjp.exe family_berbew C:\ffllflr.exe family_berbew C:\nbnttn.exe family_berbew C:\pdvdj.exe family_berbew C:\7fxxrrr.exe family_berbew C:\pdjvp.exe family_berbew C:\vvjjj.exe family_berbew C:\htbhhh.exe family_berbew C:\vvvjv.exe family_berbew C:\7rfxxrr.exe family_berbew C:\hbnhnn.exe family_berbew C:\vjvdj.exe family_berbew C:\nhttbb.exe family_berbew C:\pvdjv.exe family_berbew C:\9fxrxxf.exe family_berbew C:\pjddd.exe family_berbew C:\rlxrfxf.exe family_berbew behavioral1/memory/268-2416-0x0000000000220000-0x0000000000254000-memory.dmp family_berbew behavioral1/memory/3000-2598-0x0000000000220000-0x0000000000254000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
jvvdd.exebnbttt.exejdppp.exexrxxxfl.exevpppv.exerllrrrf.exenhtntt.exevpddj.exelxffrrf.exebhtntt.exe9ffffff.exenbtthh.exe9pjjp.exe7xfllll.exetntttt.exedpvjp.exeffllflr.exenbnttn.exepdvdj.exe7fxxrrr.exepdjvp.exevvjjj.exehtbhhh.exevvvjv.exe7rfxxrr.exehbnhnn.exevjvdj.exenhttbb.exepvdjv.exe9fxrxxf.exepjddd.exerlxrfxf.exe7hnbhh.exepjddd.exerlrxrff.exexrlxllx.exenbtttt.exe1vjdd.exefrfflff.exerlrllxl.exe3bbnhh.exedpjjj.exe7lxrrll.exe5fflrrr.exenbhhnt.exeddvpp.exefrlxfll.exebthhtb.exevvjjv.exexrllxrf.exentbtnn.exenhbhtt.exepdppp.exerfxxllx.exeffrflfl.exenhbhtt.exe9jvpp.exe3xrrxxf.exe3nbbhh.exejjvvd.exejdvjj.exe7fllflf.exehtbbbh.exejvjdj.exepid process 1580 jvvdd.exe 2524 bnbttt.exe 2616 jdppp.exe 2548 xrxxxfl.exe 2708 vpppv.exe 2552 rllrrrf.exe 2408 nhtntt.exe 1784 vpddj.exe 2980 lxffrrf.exe 2740 bhtntt.exe 2992 9ffffff.exe 2672 nbtthh.exe 2296 9pjjp.exe 2388 7xfllll.exe 2724 tntttt.exe 2800 dpvjp.exe 1856 ffllflr.exe 1244 nbnttn.exe 1224 pdvdj.exe 2072 7fxxrrr.exe 1664 pdjvp.exe 2512 vvjjj.exe 988 htbhhh.exe 2880 vvvjv.exe 328 7rfxxrr.exe 1716 hbnhnn.exe 1684 vjvdj.exe 2224 nhttbb.exe 2140 pvdjv.exe 1144 9fxrxxf.exe 1584 pjddd.exe 1560 rlxrfxf.exe 1012 7hnbhh.exe 108 pjddd.exe 1580 rlrxrff.exe 1612 xrlxllx.exe 2040 nbtttt.exe 2864 1vjdd.exe 2568 frfflff.exe 2440 rlrllxl.exe 2708 3bbnhh.exe 1800 dpjjj.exe 2432 7lxrrll.exe 2968 5fflrrr.exe 2976 nbhhnt.exe 2832 ddvpp.exe 2960 frlxfll.exe 3004 bthhtb.exe 2992 vvjjv.exe 1464 xrllxrf.exe 1808 ntbtnn.exe 2292 nhbhtt.exe 2748 pdppp.exe 2776 rfxxllx.exe 860 ffrflfl.exe 1328 nhbhtt.exe 640 9jvpp.exe 1964 3xrrxxf.exe 1668 3nbbhh.exe 2268 jjvvd.exe 1036 jdvjj.exe 1984 7fllflf.exe 932 htbbbh.exe 840 jvjdj.exe -
Processes:
resource yara_rule behavioral1/memory/2188-0-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\jvvdd.exe upx behavioral1/memory/1580-10-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\bnbttt.exe upx behavioral1/memory/1580-18-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2524-20-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\jdppp.exe upx behavioral1/memory/2616-31-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2524-29-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\xrxxxfl.exe upx behavioral1/memory/2548-39-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\vpppv.exe upx behavioral1/memory/2548-48-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2708-50-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\rllrrrf.exe upx behavioral1/memory/2552-58-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\nhtntt.exe upx behavioral1/memory/2552-67-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2408-70-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\vpddj.exe upx C:\lxffrrf.exe upx behavioral1/memory/1784-85-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\bhtntt.exe upx behavioral1/memory/2980-94-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2740-95-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2740-104-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\9ffffff.exe upx C:\nbtthh.exe upx C:\9pjjp.exe upx C:\7xfllll.exe upx C:\tntttt.exe upx behavioral1/memory/2724-139-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\dpvjp.exe upx C:\ffllflr.exe upx C:\nbnttn.exe upx behavioral1/memory/1244-170-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\pdvdj.exe upx behavioral1/memory/1224-172-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\7fxxrrr.exe upx C:\pdjvp.exe upx behavioral1/memory/1664-190-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2072-188-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\vvjjj.exe upx C:\htbhhh.exe upx behavioral1/memory/2512-206-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\vvvjv.exe upx C:\7rfxxrr.exe upx behavioral1/memory/328-224-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\hbnhnn.exe upx C:\vjvdj.exe upx behavioral1/memory/1684-247-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\nhttbb.exe upx behavioral1/memory/2224-256-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\pvdjv.exe upx C:\9fxrxxf.exe upx C:\pjddd.exe upx C:\rlxrfxf.exe upx behavioral1/memory/1012-298-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2568-329-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2440-336-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2976-373-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2832-380-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2960-381-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/3004-388-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exejvvdd.exebnbttt.exejdppp.exexrxxxfl.exevpppv.exerllrrrf.exenhtntt.exevpddj.exelxffrrf.exebhtntt.exe9ffffff.exenbtthh.exe9pjjp.exe7xfllll.exetntttt.exedescription pid process target process PID 2188 wrote to memory of 1580 2188 32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe jvvdd.exe PID 2188 wrote to memory of 1580 2188 32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe jvvdd.exe PID 2188 wrote to memory of 1580 2188 32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe jvvdd.exe PID 2188 wrote to memory of 1580 2188 32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe jvvdd.exe PID 1580 wrote to memory of 2524 1580 jvvdd.exe bnbttt.exe PID 1580 wrote to memory of 2524 1580 jvvdd.exe bnbttt.exe PID 1580 wrote to memory of 2524 1580 jvvdd.exe bnbttt.exe PID 1580 wrote to memory of 2524 1580 jvvdd.exe bnbttt.exe PID 2524 wrote to memory of 2616 2524 bnbttt.exe jdppp.exe PID 2524 wrote to memory of 2616 2524 bnbttt.exe jdppp.exe PID 2524 wrote to memory of 2616 2524 bnbttt.exe jdppp.exe PID 2524 wrote to memory of 2616 2524 bnbttt.exe jdppp.exe PID 2616 wrote to memory of 2548 2616 jdppp.exe xrxxxfl.exe PID 2616 wrote to memory of 2548 2616 jdppp.exe xrxxxfl.exe PID 2616 wrote to memory of 2548 2616 jdppp.exe xrxxxfl.exe PID 2616 wrote to memory of 2548 2616 jdppp.exe xrxxxfl.exe PID 2548 wrote to memory of 2708 2548 xrxxxfl.exe vpppv.exe PID 2548 wrote to memory of 2708 2548 xrxxxfl.exe vpppv.exe PID 2548 wrote to memory of 2708 2548 xrxxxfl.exe vpppv.exe PID 2548 wrote to memory of 2708 2548 xrxxxfl.exe vpppv.exe PID 2708 wrote to memory of 2552 2708 vpppv.exe rllrrrf.exe PID 2708 wrote to memory of 2552 2708 vpppv.exe rllrrrf.exe PID 2708 wrote to memory of 2552 2708 vpppv.exe rllrrrf.exe PID 2708 wrote to memory of 2552 2708 vpppv.exe rllrrrf.exe PID 2552 wrote to memory of 2408 2552 rllrrrf.exe nhtntt.exe PID 2552 wrote to memory of 2408 2552 rllrrrf.exe nhtntt.exe PID 2552 wrote to memory of 2408 2552 rllrrrf.exe nhtntt.exe PID 2552 wrote to memory of 2408 2552 rllrrrf.exe nhtntt.exe PID 2408 wrote to memory of 1784 2408 nhtntt.exe vpddj.exe PID 2408 wrote to memory of 1784 2408 nhtntt.exe vpddj.exe PID 2408 wrote to memory of 1784 2408 nhtntt.exe vpddj.exe PID 2408 wrote to memory of 1784 2408 nhtntt.exe vpddj.exe PID 1784 wrote to memory of 2980 1784 vpddj.exe lxffrrf.exe PID 1784 wrote to memory of 2980 1784 vpddj.exe lxffrrf.exe PID 1784 wrote to memory of 2980 1784 vpddj.exe lxffrrf.exe PID 1784 wrote to memory of 2980 1784 vpddj.exe lxffrrf.exe PID 2980 wrote to memory of 2740 2980 lxffrrf.exe bhtntt.exe PID 2980 wrote to memory of 2740 2980 lxffrrf.exe bhtntt.exe PID 2980 wrote to memory of 2740 2980 lxffrrf.exe bhtntt.exe PID 2980 wrote to memory of 2740 2980 lxffrrf.exe bhtntt.exe PID 2740 wrote to memory of 2992 2740 bhtntt.exe 9ffffff.exe PID 2740 wrote to memory of 2992 2740 bhtntt.exe 9ffffff.exe PID 2740 wrote to memory of 2992 2740 bhtntt.exe 9ffffff.exe PID 2740 wrote to memory of 2992 2740 bhtntt.exe 9ffffff.exe PID 2992 wrote to memory of 2672 2992 9ffffff.exe nbtthh.exe PID 2992 wrote to memory of 2672 2992 9ffffff.exe nbtthh.exe PID 2992 wrote to memory of 2672 2992 9ffffff.exe nbtthh.exe PID 2992 wrote to memory of 2672 2992 9ffffff.exe nbtthh.exe PID 2672 wrote to memory of 2296 2672 nbtthh.exe 9pjjp.exe PID 2672 wrote to memory of 2296 2672 nbtthh.exe 9pjjp.exe PID 2672 wrote to memory of 2296 2672 nbtthh.exe 9pjjp.exe PID 2672 wrote to memory of 2296 2672 nbtthh.exe 9pjjp.exe PID 2296 wrote to memory of 2388 2296 9pjjp.exe 7xfllll.exe PID 2296 wrote to memory of 2388 2296 9pjjp.exe 7xfllll.exe PID 2296 wrote to memory of 2388 2296 9pjjp.exe 7xfllll.exe PID 2296 wrote to memory of 2388 2296 9pjjp.exe 7xfllll.exe PID 2388 wrote to memory of 2724 2388 7xfllll.exe tntttt.exe PID 2388 wrote to memory of 2724 2388 7xfllll.exe tntttt.exe PID 2388 wrote to memory of 2724 2388 7xfllll.exe tntttt.exe PID 2388 wrote to memory of 2724 2388 7xfllll.exe tntttt.exe PID 2724 wrote to memory of 2800 2724 tntttt.exe dpvjp.exe PID 2724 wrote to memory of 2800 2724 tntttt.exe dpvjp.exe PID 2724 wrote to memory of 2800 2724 tntttt.exe dpvjp.exe PID 2724 wrote to memory of 2800 2724 tntttt.exe dpvjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\32e4aaa8afe3d607a87bb3ebfccb79a64df788b14de7082c989d2ca908f60717_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\jvvdd.exec:\jvvdd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnbttt.exec:\bnbttt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdppp.exec:\jdppp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrxxxfl.exec:\xrxxxfl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpppv.exec:\vpppv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rllrrrf.exec:\rllrrrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtntt.exec:\nhtntt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpddj.exec:\vpddj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxffrrf.exec:\lxffrrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhtntt.exec:\bhtntt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9ffffff.exec:\9ffffff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbtthh.exec:\nbtthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9pjjp.exec:\9pjjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7xfllll.exec:\7xfllll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tntttt.exec:\tntttt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpvjp.exec:\dpvjp.exe17⤵
- Executes dropped EXE
-
\??\c:\ffllflr.exec:\ffllflr.exe18⤵
- Executes dropped EXE
-
\??\c:\nbnttn.exec:\nbnttn.exe19⤵
- Executes dropped EXE
-
\??\c:\pdvdj.exec:\pdvdj.exe20⤵
- Executes dropped EXE
-
\??\c:\7fxxrrr.exec:\7fxxrrr.exe21⤵
- Executes dropped EXE
-
\??\c:\pdjvp.exec:\pdjvp.exe22⤵
- Executes dropped EXE
-
\??\c:\vvjjj.exec:\vvjjj.exe23⤵
- Executes dropped EXE
-
\??\c:\htbhhh.exec:\htbhhh.exe24⤵
- Executes dropped EXE
-
\??\c:\vvvjv.exec:\vvvjv.exe25⤵
- Executes dropped EXE
-
\??\c:\7rfxxrr.exec:\7rfxxrr.exe26⤵
- Executes dropped EXE
-
\??\c:\hbnhnn.exec:\hbnhnn.exe27⤵
- Executes dropped EXE
-
\??\c:\vjvdj.exec:\vjvdj.exe28⤵
- Executes dropped EXE
-
\??\c:\nhttbb.exec:\nhttbb.exe29⤵
- Executes dropped EXE
-
\??\c:\pvdjv.exec:\pvdjv.exe30⤵
- Executes dropped EXE
-
\??\c:\9fxrxxf.exec:\9fxrxxf.exe31⤵
- Executes dropped EXE
-
\??\c:\pjddd.exec:\pjddd.exe32⤵
- Executes dropped EXE
-
\??\c:\rlxrfxf.exec:\rlxrfxf.exe33⤵
- Executes dropped EXE
-
\??\c:\7hnbhh.exec:\7hnbhh.exe34⤵
- Executes dropped EXE
-
\??\c:\pjddd.exec:\pjddd.exe35⤵
- Executes dropped EXE
-
\??\c:\rlrxrff.exec:\rlrxrff.exe36⤵
- Executes dropped EXE
-
\??\c:\xrlxllx.exec:\xrlxllx.exe37⤵
- Executes dropped EXE
-
\??\c:\nbtttt.exec:\nbtttt.exe38⤵
- Executes dropped EXE
-
\??\c:\1vjdd.exec:\1vjdd.exe39⤵
- Executes dropped EXE
-
\??\c:\frfflff.exec:\frfflff.exe40⤵
- Executes dropped EXE
-
\??\c:\rlrllxl.exec:\rlrllxl.exe41⤵
- Executes dropped EXE
-
\??\c:\3bbnhh.exec:\3bbnhh.exe42⤵
- Executes dropped EXE
-
\??\c:\dpjjj.exec:\dpjjj.exe43⤵
- Executes dropped EXE
-
\??\c:\7lxrrll.exec:\7lxrrll.exe44⤵
- Executes dropped EXE
-
\??\c:\5fflrrr.exec:\5fflrrr.exe45⤵
- Executes dropped EXE
-
\??\c:\nbhhnt.exec:\nbhhnt.exe46⤵
- Executes dropped EXE
-
\??\c:\ddvpp.exec:\ddvpp.exe47⤵
- Executes dropped EXE
-
\??\c:\frlxfll.exec:\frlxfll.exe48⤵
- Executes dropped EXE
-
\??\c:\bthhtb.exec:\bthhtb.exe49⤵
- Executes dropped EXE
-
\??\c:\vvjjv.exec:\vvjjv.exe50⤵
- Executes dropped EXE
-
\??\c:\xrllxrf.exec:\xrllxrf.exe51⤵
- Executes dropped EXE
-
\??\c:\ntbtnn.exec:\ntbtnn.exe52⤵
- Executes dropped EXE
-
\??\c:\nhbhtt.exec:\nhbhtt.exe53⤵
- Executes dropped EXE
-
\??\c:\pdppp.exec:\pdppp.exe54⤵
- Executes dropped EXE
-
\??\c:\rfxxllx.exec:\rfxxllx.exe55⤵
- Executes dropped EXE
-
\??\c:\ffrflfl.exec:\ffrflfl.exe56⤵
- Executes dropped EXE
-
\??\c:\nhbhtt.exec:\nhbhtt.exe57⤵
- Executes dropped EXE
-
\??\c:\9jvpp.exec:\9jvpp.exe58⤵
- Executes dropped EXE
-
\??\c:\3xrrxxf.exec:\3xrrxxf.exe59⤵
- Executes dropped EXE
-
\??\c:\3nbbhh.exec:\3nbbhh.exe60⤵
- Executes dropped EXE
-
\??\c:\jjvvd.exec:\jjvvd.exe61⤵
- Executes dropped EXE
-
\??\c:\jdvjj.exec:\jdvjj.exe62⤵
- Executes dropped EXE
-
\??\c:\7fllflf.exec:\7fllflf.exe63⤵
- Executes dropped EXE
-
\??\c:\htbbbh.exec:\htbbbh.exe64⤵
- Executes dropped EXE
-
\??\c:\jvjdj.exec:\jvjdj.exe65⤵
- Executes dropped EXE
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe66⤵
-
\??\c:\bnbnht.exec:\bnbnht.exe67⤵
-
\??\c:\9nhnnb.exec:\9nhnnb.exe68⤵
-
\??\c:\dpjjv.exec:\dpjjv.exe69⤵
-
\??\c:\5xrfxxf.exec:\5xrfxxf.exe70⤵
-
\??\c:\hbnnnn.exec:\hbnnnn.exe71⤵
-
\??\c:\jvdjd.exec:\jvdjd.exe72⤵
-
\??\c:\3jdjp.exec:\3jdjp.exe73⤵
-
\??\c:\xlrlrfl.exec:\xlrlrfl.exe74⤵
-
\??\c:\3ttnhh.exec:\3ttnhh.exe75⤵
-
\??\c:\dvjpp.exec:\dvjpp.exe76⤵
-
\??\c:\xrllxxl.exec:\xrllxxl.exe77⤵
-
\??\c:\frfxxrl.exec:\frfxxrl.exe78⤵
-
\??\c:\thhhbb.exec:\thhhbb.exe79⤵
-
\??\c:\jvvdj.exec:\jvvdj.exe80⤵
-
\??\c:\1lrxrrl.exec:\1lrxrrl.exe81⤵
-
\??\c:\3nhbbn.exec:\3nhbbn.exe82⤵
-
\??\c:\tttbhh.exec:\tttbhh.exe83⤵
-
\??\c:\jpjdd.exec:\jpjdd.exe84⤵
-
\??\c:\fxffffl.exec:\fxffffl.exe85⤵
-
\??\c:\bntntn.exec:\bntntn.exe86⤵
-
\??\c:\vpjpd.exec:\vpjpd.exe87⤵
-
\??\c:\jvppv.exec:\jvppv.exe88⤵
-
\??\c:\frxfrfx.exec:\frxfrfx.exe89⤵
-
\??\c:\hbtbbb.exec:\hbtbbb.exe90⤵
-
\??\c:\dpddv.exec:\dpddv.exe91⤵
-
\??\c:\xrlfrrr.exec:\xrlfrrr.exe92⤵
-
\??\c:\3htbhn.exec:\3htbhn.exe93⤵
-
\??\c:\thbttt.exec:\thbttt.exe94⤵
-
\??\c:\9vjjp.exec:\9vjjp.exe95⤵
-
\??\c:\lfrllll.exec:\lfrllll.exe96⤵
-
\??\c:\tthntb.exec:\tthntb.exe97⤵
-
\??\c:\djvvv.exec:\djvvv.exe98⤵
-
\??\c:\fxlrlll.exec:\fxlrlll.exe99⤵
-
\??\c:\1frfxrr.exec:\1frfxrr.exe100⤵
-
\??\c:\9ttntb.exec:\9ttntb.exe101⤵
-
\??\c:\jpddj.exec:\jpddj.exe102⤵
-
\??\c:\xxlfxrl.exec:\xxlfxrl.exe103⤵
-
\??\c:\bnhhhh.exec:\bnhhhh.exe104⤵
-
\??\c:\jvpvj.exec:\jvpvj.exe105⤵
-
\??\c:\dvpjp.exec:\dvpjp.exe106⤵
-
\??\c:\rflfxrx.exec:\rflfxrx.exe107⤵
-
\??\c:\nbhbhb.exec:\nbhbhb.exe108⤵
-
\??\c:\7jpjj.exec:\7jpjj.exe109⤵
-
\??\c:\fxllrxf.exec:\fxllrxf.exe110⤵
-
\??\c:\xfflrxf.exec:\xfflrxf.exe111⤵
-
\??\c:\7bbtbt.exec:\7bbtbt.exe112⤵
-
\??\c:\9vjpv.exec:\9vjpv.exe113⤵
-
\??\c:\dppdd.exec:\dppdd.exe114⤵
-
\??\c:\fxrxrrl.exec:\fxrxrrl.exe115⤵
-
\??\c:\btnnnn.exec:\btnnnn.exe116⤵
-
\??\c:\vpdjj.exec:\vpdjj.exe117⤵
-
\??\c:\vvjjv.exec:\vvjjv.exe118⤵
-
\??\c:\rlfflfr.exec:\rlfflfr.exe119⤵
-
\??\c:\hbtthh.exec:\hbtthh.exe120⤵
-
\??\c:\vvvpv.exec:\vvvpv.exe121⤵
-
\??\c:\3rfxflr.exec:\3rfxflr.exe122⤵
-
\??\c:\htttnt.exec:\htttnt.exe123⤵
-
\??\c:\9dpjj.exec:\9dpjj.exe124⤵
-
\??\c:\lxrrxfl.exec:\lxrrxfl.exe125⤵
-
\??\c:\bbttbh.exec:\bbttbh.exe126⤵
-
\??\c:\lfxrxrf.exec:\lfxrxrf.exe127⤵
-
\??\c:\flxfffl.exec:\flxfffl.exe128⤵
-
\??\c:\hbntbh.exec:\hbntbh.exe129⤵
-
\??\c:\vjvdd.exec:\vjvdd.exe130⤵
-
\??\c:\pjvpv.exec:\pjvpv.exe131⤵
-
\??\c:\xlffxff.exec:\xlffxff.exe132⤵
-
\??\c:\hbtthb.exec:\hbtthb.exe133⤵
-
\??\c:\nbbbhh.exec:\nbbbhh.exe134⤵
-
\??\c:\3dvdv.exec:\3dvdv.exe135⤵
-
\??\c:\9xllrll.exec:\9xllrll.exe136⤵
-
\??\c:\nbtntt.exec:\nbtntt.exe137⤵
-
\??\c:\bbnntn.exec:\bbnntn.exe138⤵
-
\??\c:\pdvvd.exec:\pdvvd.exe139⤵
-
\??\c:\rlfllll.exec:\rlfllll.exe140⤵
-
\??\c:\lfrxxxf.exec:\lfrxxxf.exe141⤵
-
\??\c:\tbnnnn.exec:\tbnnnn.exe142⤵
-
\??\c:\5jddp.exec:\5jddp.exe143⤵
-
\??\c:\rrxllxx.exec:\rrxllxx.exe144⤵
-
\??\c:\7lxxfff.exec:\7lxxfff.exe145⤵
-
\??\c:\9hhhnt.exec:\9hhhnt.exe146⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe147⤵
-
\??\c:\xlflllr.exec:\xlflllr.exe148⤵
-
\??\c:\lfxxflr.exec:\lfxxflr.exe149⤵
-
\??\c:\9tnhnn.exec:\9tnhnn.exe150⤵
-
\??\c:\hbntbb.exec:\hbntbb.exe151⤵
-
\??\c:\vpvjp.exec:\vpvjp.exe152⤵
-
\??\c:\fxrrxrx.exec:\fxrrxrx.exe153⤵
-
\??\c:\ffxflrx.exec:\ffxflrx.exe154⤵
-
\??\c:\nhhhnt.exec:\nhhhnt.exe155⤵
-
\??\c:\1dpvj.exec:\1dpvj.exe156⤵
-
\??\c:\dpjpv.exec:\dpjpv.exe157⤵
-
\??\c:\3lxllll.exec:\3lxllll.exe158⤵
-
\??\c:\tnhhnn.exec:\tnhhnn.exe159⤵
-
\??\c:\thtttt.exec:\thtttt.exe160⤵
-
\??\c:\vpjjp.exec:\vpjjp.exe161⤵
-
\??\c:\frfffff.exec:\frfffff.exe162⤵
-
\??\c:\xrlrxrx.exec:\xrlrxrx.exe163⤵
-
\??\c:\tbbntt.exec:\tbbntt.exe164⤵
-
\??\c:\1jvjp.exec:\1jvjp.exe165⤵
-
\??\c:\pdvjv.exec:\pdvjv.exe166⤵
-
\??\c:\xxlllrr.exec:\xxlllrr.exe167⤵
-
\??\c:\thbhnh.exec:\thbhnh.exe168⤵
-
\??\c:\7ppjv.exec:\7ppjv.exe169⤵
-
\??\c:\1vvvv.exec:\1vvvv.exe170⤵
-
\??\c:\fxlflfl.exec:\fxlflfl.exe171⤵
-
\??\c:\nbnhhn.exec:\nbnhhn.exe172⤵
-
\??\c:\9bbttt.exec:\9bbttt.exe173⤵
-
\??\c:\vpdjp.exec:\vpdjp.exe174⤵
-
\??\c:\dvjpp.exec:\dvjpp.exe175⤵
-
\??\c:\rrlfrlr.exec:\rrlfrlr.exe176⤵
-
\??\c:\1nbbbh.exec:\1nbbbh.exe177⤵
-
\??\c:\bthbhh.exec:\bthbhh.exe178⤵
-
\??\c:\vjvvv.exec:\vjvvv.exe179⤵
-
\??\c:\lrfxfxx.exec:\lrfxfxx.exe180⤵
-
\??\c:\frfflrx.exec:\frfflrx.exe181⤵
-
\??\c:\7bnnnn.exec:\7bnnnn.exe182⤵
-
\??\c:\vjvdj.exec:\vjvdj.exe183⤵
-
\??\c:\pdvvv.exec:\pdvvv.exe184⤵
-
\??\c:\1rflrrx.exec:\1rflrrx.exe185⤵
-
\??\c:\hthhnn.exec:\hthhnn.exe186⤵
-
\??\c:\dvdvd.exec:\dvdvd.exe187⤵
-
\??\c:\djvpp.exec:\djvpp.exe188⤵
-
\??\c:\1flfllr.exec:\1flfllr.exe189⤵
-
\??\c:\hthntt.exec:\hthntt.exe190⤵
-
\??\c:\htnntb.exec:\htnntb.exe191⤵
-
\??\c:\9dppj.exec:\9dppj.exe192⤵
-
\??\c:\frfxxxf.exec:\frfxxxf.exe193⤵
-
\??\c:\xfrrlfl.exec:\xfrrlfl.exe194⤵
-
\??\c:\nntbtn.exec:\nntbtn.exe195⤵
-
\??\c:\5dppj.exec:\5dppj.exe196⤵
-
\??\c:\pjddd.exec:\pjddd.exe197⤵
-
\??\c:\xflxlff.exec:\xflxlff.exe198⤵
-
\??\c:\btbhhh.exec:\btbhhh.exe199⤵
-
\??\c:\ppjdj.exec:\ppjdj.exe200⤵
-
\??\c:\7ddpv.exec:\7ddpv.exe201⤵
-
\??\c:\1rrrxfl.exec:\1rrrxfl.exe202⤵
-
\??\c:\nbhhnn.exec:\nbhhnn.exe203⤵
-
\??\c:\7ddvp.exec:\7ddvp.exe204⤵
-
\??\c:\vjvvj.exec:\vjvvj.exe205⤵
-
\??\c:\lxllfll.exec:\lxllfll.exe206⤵
-
\??\c:\nnnthh.exec:\nnnthh.exe207⤵
-
\??\c:\bnhntn.exec:\bnhntn.exe208⤵
-
\??\c:\9dvdj.exec:\9dvdj.exe209⤵
-
\??\c:\rfxxrrl.exec:\rfxxrrl.exe210⤵
-
\??\c:\1rflrxx.exec:\1rflrxx.exe211⤵
-
\??\c:\tbnhhb.exec:\tbnhhb.exe212⤵
-
\??\c:\thnnbt.exec:\thnnbt.exe213⤵
-
\??\c:\3jppj.exec:\3jppj.exe214⤵
-
\??\c:\9xrrrxf.exec:\9xrrrxf.exe215⤵
-
\??\c:\9xlrxxr.exec:\9xlrxxr.exe216⤵
-
\??\c:\nbnthn.exec:\nbnthn.exe217⤵
-
\??\c:\dvdjj.exec:\dvdjj.exe218⤵
-
\??\c:\pjvvv.exec:\pjvvv.exe219⤵
-
\??\c:\frlrfxf.exec:\frlrfxf.exe220⤵
-
\??\c:\lfllrfl.exec:\lfllrfl.exe221⤵
-
\??\c:\bhhhbh.exec:\bhhhbh.exe222⤵
-
\??\c:\djvpp.exec:\djvpp.exe223⤵
-
\??\c:\rfxrrrx.exec:\rfxrrrx.exe224⤵
-
\??\c:\fxlrlfl.exec:\fxlrlfl.exe225⤵
-
\??\c:\hhtbhh.exec:\hhtbhh.exe226⤵
-
\??\c:\9tbbbb.exec:\9tbbbb.exe227⤵
-
\??\c:\7dvdj.exec:\7dvdj.exe228⤵
-
\??\c:\lfffllr.exec:\lfffllr.exe229⤵
-
\??\c:\htbttn.exec:\htbttn.exe230⤵
-
\??\c:\1thbbb.exec:\1thbbb.exe231⤵
-
\??\c:\3jdvp.exec:\3jdvp.exe232⤵
-
\??\c:\lxflffl.exec:\lxflffl.exe233⤵
-
\??\c:\xlrllll.exec:\xlrllll.exe234⤵
-
\??\c:\btnthn.exec:\btnthn.exe235⤵
-
\??\c:\vddvv.exec:\vddvv.exe236⤵
-
\??\c:\9vjpd.exec:\9vjpd.exe237⤵
-
\??\c:\rlfflrf.exec:\rlfflrf.exe238⤵
-
\??\c:\bhhhbb.exec:\bhhhbb.exe239⤵
-
\??\c:\9btttb.exec:\9btttb.exe240⤵
-
\??\c:\jvjpj.exec:\jvjpj.exe241⤵