Analysis
-
max time kernel
149s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 10:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe
-
Size
54KB
-
MD5
149492700fbf4e3143a21e08136b0050
-
SHA1
58fb980f99257a95a934688796049b2b10a4650f
-
SHA256
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe
-
SHA512
d97a07f808358b0b985f8b6b284ebdaece16002724808af379d7434709faf4f8ff870e88b10da7614a8f710aae70e004864d61dd57152aa16b147d3c8aba4705
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFM:ymb3NkkiQ3mdBjFIFM
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/4248-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3316-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1424-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3704-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4012-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1428-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1748-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1212-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2808-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3600-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2184-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2552-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3732-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2420-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3228-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3044-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1248-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3564-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/680-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pjjdv.exexlxrxrr.exexrrlflf.exedddjp.exellrrrfl.exexffllll.exenhttnn.exebtnhbb.exe5jppv.exexrfxxxf.exetntnbb.exejddpj.exeffxffrr.exelllfxxr.exetnbbhh.exe9vppj.exefrxrffx.exexrrrlll.exebthhbh.exe1vdvv.exefxlllrf.exexrrrllf.exebbhbbb.exedddpd.exevppjd.exeffxfxll.exe9rxxrll.exehtthbt.exetbhhhh.exedvddj.exelxfxxrl.exetnnbtn.exe7nbtnn.exejjddv.exedjpdv.exe1rlfrxf.exerxffxxr.exe3tbtbb.exehhttnt.exedddpd.exexrrlllf.exe1llrrrr.exetttttt.exepvvvv.exevppjd.exexrfrfll.exe1llfxrf.exe5bbtnn.exebttttn.exevdjdd.exelffxllx.exe1fxxlll.exethtnhb.exe7bbbbt.exejpjpj.exejpjdd.exeffffflf.exebtnhbb.exe1tnbth.exeppvpj.exeppdvv.exexfllfll.exellllfff.exe3bbtnh.exepid process 1660 pjjdv.exe 3316 xlxrxrr.exe 1424 xrrlflf.exe 3704 dddjp.exe 3652 llrrrfl.exe 4012 xffllll.exe 1428 nhttnn.exe 1748 btnhbb.exe 4576 5jppv.exe 3972 xrfxxxf.exe 1212 tntnbb.exe 2808 jddpj.exe 4672 ffxffrr.exe 3600 lllfxxr.exe 2184 tnbbhh.exe 3020 9vppj.exe 2552 frxrffx.exe 3732 xrrrlll.exe 2520 bthhbh.exe 4556 1vdvv.exe 2420 fxlllrf.exe 3568 xrrrllf.exe 3228 bbhbbb.exe 216 dddpd.exe 3044 vppjd.exe 1248 ffxfxll.exe 3200 9rxxrll.exe 4664 htthbt.exe 5116 tbhhhh.exe 3564 dvddj.exe 680 lxfxxrl.exe 1476 tnnbtn.exe 1580 7nbtnn.exe 4480 jjddv.exe 2400 djpdv.exe 2812 1rlfrxf.exe 3648 rxffxxr.exe 4928 3tbtbb.exe 4208 hhttnt.exe 4404 dddpd.exe 444 xrrlllf.exe 332 1llrrrr.exe 4636 tttttt.exe 3432 pvvvv.exe 4960 vppjd.exe 3928 xrfrfll.exe 972 1llfxrf.exe 1984 5bbtnn.exe 3652 bttttn.exe 4996 vdjdd.exe 4828 lffxllx.exe 1428 1fxxlll.exe 4676 thtnhb.exe 2776 7bbbbt.exe 4576 jpjpj.exe 1416 jpjdd.exe 4620 ffffflf.exe 3608 btnhbb.exe 3232 1tnbth.exe 840 ppvpj.exe 2540 ppdvv.exe 1484 xfllfll.exe 2184 llllfff.exe 3240 3bbtnh.exe -
Processes:
resource yara_rule behavioral2/memory/4248-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3316-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1424-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3704-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4012-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1428-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1748-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1212-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2808-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3600-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3732-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4556-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2420-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3228-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3044-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3564-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/680-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exepjjdv.exexlxrxrr.exexrrlflf.exedddjp.exellrrrfl.exexffllll.exenhttnn.exebtnhbb.exe5jppv.exexrfxxxf.exetntnbb.exejddpj.exeffxffrr.exelllfxxr.exetnbbhh.exe9vppj.exefrxrffx.exexrrrlll.exebthhbh.exe1vdvv.exefxlllrf.exedescription pid process target process PID 4248 wrote to memory of 1660 4248 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjjdv.exe PID 4248 wrote to memory of 1660 4248 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjjdv.exe PID 4248 wrote to memory of 1660 4248 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjjdv.exe PID 1660 wrote to memory of 3316 1660 pjjdv.exe xlxrxrr.exe PID 1660 wrote to memory of 3316 1660 pjjdv.exe xlxrxrr.exe PID 1660 wrote to memory of 3316 1660 pjjdv.exe xlxrxrr.exe PID 3316 wrote to memory of 1424 3316 xlxrxrr.exe xrrlflf.exe PID 3316 wrote to memory of 1424 3316 xlxrxrr.exe xrrlflf.exe PID 3316 wrote to memory of 1424 3316 xlxrxrr.exe xrrlflf.exe PID 1424 wrote to memory of 3704 1424 xrrlflf.exe dddjp.exe PID 1424 wrote to memory of 3704 1424 xrrlflf.exe dddjp.exe PID 1424 wrote to memory of 3704 1424 xrrlflf.exe dddjp.exe PID 3704 wrote to memory of 3652 3704 dddjp.exe llrrrfl.exe PID 3704 wrote to memory of 3652 3704 dddjp.exe llrrrfl.exe PID 3704 wrote to memory of 3652 3704 dddjp.exe llrrrfl.exe PID 3652 wrote to memory of 4012 3652 llrrrfl.exe xffllll.exe PID 3652 wrote to memory of 4012 3652 llrrrfl.exe xffllll.exe PID 3652 wrote to memory of 4012 3652 llrrrfl.exe xffllll.exe PID 4012 wrote to memory of 1428 4012 xffllll.exe nhttnn.exe PID 4012 wrote to memory of 1428 4012 xffllll.exe nhttnn.exe PID 4012 wrote to memory of 1428 4012 xffllll.exe nhttnn.exe PID 1428 wrote to memory of 1748 1428 nhttnn.exe btnhbb.exe PID 1428 wrote to memory of 1748 1428 nhttnn.exe btnhbb.exe PID 1428 wrote to memory of 1748 1428 nhttnn.exe btnhbb.exe PID 1748 wrote to memory of 4576 1748 btnhbb.exe 5jppv.exe PID 1748 wrote to memory of 4576 1748 btnhbb.exe 5jppv.exe PID 1748 wrote to memory of 4576 1748 btnhbb.exe 5jppv.exe PID 4576 wrote to memory of 3972 4576 5jppv.exe xrfxxxf.exe PID 4576 wrote to memory of 3972 4576 5jppv.exe xrfxxxf.exe PID 4576 wrote to memory of 3972 4576 5jppv.exe xrfxxxf.exe PID 3972 wrote to memory of 1212 3972 xrfxxxf.exe tntnbb.exe PID 3972 wrote to memory of 1212 3972 xrfxxxf.exe tntnbb.exe PID 3972 wrote to memory of 1212 3972 xrfxxxf.exe tntnbb.exe PID 1212 wrote to memory of 2808 1212 tntnbb.exe jddpj.exe PID 1212 wrote to memory of 2808 1212 tntnbb.exe jddpj.exe PID 1212 wrote to memory of 2808 1212 tntnbb.exe jddpj.exe PID 2808 wrote to memory of 4672 2808 jddpj.exe ffxffrr.exe PID 2808 wrote to memory of 4672 2808 jddpj.exe ffxffrr.exe PID 2808 wrote to memory of 4672 2808 jddpj.exe ffxffrr.exe PID 4672 wrote to memory of 3600 4672 ffxffrr.exe lllfxxr.exe PID 4672 wrote to memory of 3600 4672 ffxffrr.exe lllfxxr.exe PID 4672 wrote to memory of 3600 4672 ffxffrr.exe lllfxxr.exe PID 3600 wrote to memory of 2184 3600 lllfxxr.exe tnbbhh.exe PID 3600 wrote to memory of 2184 3600 lllfxxr.exe tnbbhh.exe PID 3600 wrote to memory of 2184 3600 lllfxxr.exe tnbbhh.exe PID 2184 wrote to memory of 3020 2184 tnbbhh.exe 9vppj.exe PID 2184 wrote to memory of 3020 2184 tnbbhh.exe 9vppj.exe PID 2184 wrote to memory of 3020 2184 tnbbhh.exe 9vppj.exe PID 3020 wrote to memory of 2552 3020 9vppj.exe frxrffx.exe PID 3020 wrote to memory of 2552 3020 9vppj.exe frxrffx.exe PID 3020 wrote to memory of 2552 3020 9vppj.exe frxrffx.exe PID 2552 wrote to memory of 3732 2552 frxrffx.exe xrrrlll.exe PID 2552 wrote to memory of 3732 2552 frxrffx.exe xrrrlll.exe PID 2552 wrote to memory of 3732 2552 frxrffx.exe xrrrlll.exe PID 3732 wrote to memory of 2520 3732 xrrrlll.exe bthhbh.exe PID 3732 wrote to memory of 2520 3732 xrrrlll.exe bthhbh.exe PID 3732 wrote to memory of 2520 3732 xrrrlll.exe bthhbh.exe PID 2520 wrote to memory of 4556 2520 bthhbh.exe 1vdvv.exe PID 2520 wrote to memory of 4556 2520 bthhbh.exe 1vdvv.exe PID 2520 wrote to memory of 4556 2520 bthhbh.exe 1vdvv.exe PID 4556 wrote to memory of 2420 4556 1vdvv.exe fxlllrf.exe PID 4556 wrote to memory of 2420 4556 1vdvv.exe fxlllrf.exe PID 4556 wrote to memory of 2420 4556 1vdvv.exe fxlllrf.exe PID 2420 wrote to memory of 3568 2420 fxlllrf.exe xrrrllf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjdv.exec:\pjjdv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxrxrr.exec:\xlxrxrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrlflf.exec:\xrrlflf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddjp.exec:\dddjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llrrrfl.exec:\llrrrfl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xffllll.exec:\xffllll.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhttnn.exec:\nhttnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnhbb.exec:\btnhbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5jppv.exec:\5jppv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrfxxxf.exec:\xrfxxxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tntnbb.exec:\tntnbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jddpj.exec:\jddpj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffxffrr.exec:\ffxffrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lllfxxr.exec:\lllfxxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnbbhh.exec:\tnbbhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9vppj.exec:\9vppj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frxrffx.exec:\frxrffx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrrlll.exec:\xrrrlll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bthhbh.exec:\bthhbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1vdvv.exec:\1vdvv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxlllrf.exec:\fxlllrf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrrllf.exec:\xrrrllf.exe23⤵
- Executes dropped EXE
-
\??\c:\bbhbbb.exec:\bbhbbb.exe24⤵
- Executes dropped EXE
-
\??\c:\dddpd.exec:\dddpd.exe25⤵
- Executes dropped EXE
-
\??\c:\vppjd.exec:\vppjd.exe26⤵
- Executes dropped EXE
-
\??\c:\ffxfxll.exec:\ffxfxll.exe27⤵
- Executes dropped EXE
-
\??\c:\9rxxrll.exec:\9rxxrll.exe28⤵
- Executes dropped EXE
-
\??\c:\htthbt.exec:\htthbt.exe29⤵
- Executes dropped EXE
-
\??\c:\tbhhhh.exec:\tbhhhh.exe30⤵
- Executes dropped EXE
-
\??\c:\dvddj.exec:\dvddj.exe31⤵
- Executes dropped EXE
-
\??\c:\lxfxxrl.exec:\lxfxxrl.exe32⤵
- Executes dropped EXE
-
\??\c:\tnnbtn.exec:\tnnbtn.exe33⤵
- Executes dropped EXE
-
\??\c:\7nbtnn.exec:\7nbtnn.exe34⤵
- Executes dropped EXE
-
\??\c:\jjddv.exec:\jjddv.exe35⤵
- Executes dropped EXE
-
\??\c:\djpdv.exec:\djpdv.exe36⤵
- Executes dropped EXE
-
\??\c:\1rlfrxf.exec:\1rlfrxf.exe37⤵
- Executes dropped EXE
-
\??\c:\rxffxxr.exec:\rxffxxr.exe38⤵
- Executes dropped EXE
-
\??\c:\3tbtbb.exec:\3tbtbb.exe39⤵
- Executes dropped EXE
-
\??\c:\hhttnt.exec:\hhttnt.exe40⤵
- Executes dropped EXE
-
\??\c:\dddpd.exec:\dddpd.exe41⤵
- Executes dropped EXE
-
\??\c:\xrrlllf.exec:\xrrlllf.exe42⤵
- Executes dropped EXE
-
\??\c:\1llrrrr.exec:\1llrrrr.exe43⤵
- Executes dropped EXE
-
\??\c:\tttttt.exec:\tttttt.exe44⤵
- Executes dropped EXE
-
\??\c:\pvvvv.exec:\pvvvv.exe45⤵
- Executes dropped EXE
-
\??\c:\vppjd.exec:\vppjd.exe46⤵
- Executes dropped EXE
-
\??\c:\xrfrfll.exec:\xrfrfll.exe47⤵
- Executes dropped EXE
-
\??\c:\1llfxrf.exec:\1llfxrf.exe48⤵
- Executes dropped EXE
-
\??\c:\5bbtnn.exec:\5bbtnn.exe49⤵
- Executes dropped EXE
-
\??\c:\bttttn.exec:\bttttn.exe50⤵
- Executes dropped EXE
-
\??\c:\vdjdd.exec:\vdjdd.exe51⤵
- Executes dropped EXE
-
\??\c:\lffxllx.exec:\lffxllx.exe52⤵
- Executes dropped EXE
-
\??\c:\1fxxlll.exec:\1fxxlll.exe53⤵
- Executes dropped EXE
-
\??\c:\thtnhb.exec:\thtnhb.exe54⤵
- Executes dropped EXE
-
\??\c:\7bbbbt.exec:\7bbbbt.exe55⤵
- Executes dropped EXE
-
\??\c:\jpjpj.exec:\jpjpj.exe56⤵
- Executes dropped EXE
-
\??\c:\jpjdd.exec:\jpjdd.exe57⤵
- Executes dropped EXE
-
\??\c:\ffffflf.exec:\ffffflf.exe58⤵
- Executes dropped EXE
-
\??\c:\btnhbb.exec:\btnhbb.exe59⤵
- Executes dropped EXE
-
\??\c:\1tnbth.exec:\1tnbth.exe60⤵
- Executes dropped EXE
-
\??\c:\ppvpj.exec:\ppvpj.exe61⤵
- Executes dropped EXE
-
\??\c:\ppdvv.exec:\ppdvv.exe62⤵
- Executes dropped EXE
-
\??\c:\xfllfll.exec:\xfllfll.exe63⤵
- Executes dropped EXE
-
\??\c:\llllfff.exec:\llllfff.exe64⤵
- Executes dropped EXE
-
\??\c:\3bbtnh.exec:\3bbtnh.exe65⤵
- Executes dropped EXE
-
\??\c:\htbhbt.exec:\htbhbt.exe66⤵
-
\??\c:\jdppv.exec:\jdppv.exe67⤵
-
\??\c:\llfrlfx.exec:\llfrlfx.exe68⤵
-
\??\c:\rrrlffr.exec:\rrrlffr.exe69⤵
-
\??\c:\1hhbtn.exec:\1hhbtn.exe70⤵
-
\??\c:\nhnbnh.exec:\nhnbnh.exe71⤵
-
\??\c:\1vpdv.exec:\1vpdv.exe72⤵
-
\??\c:\pvpjd.exec:\pvpjd.exe73⤵
-
\??\c:\lfffxrl.exec:\lfffxrl.exe74⤵
-
\??\c:\lfrrlfx.exec:\lfrrlfx.exe75⤵
-
\??\c:\nhnhbb.exec:\nhnhbb.exe76⤵
-
\??\c:\nttnbt.exec:\nttnbt.exe77⤵
-
\??\c:\jjdvj.exec:\jjdvj.exe78⤵
-
\??\c:\dpjpv.exec:\dpjpv.exe79⤵
-
\??\c:\ffrlffr.exec:\ffrlffr.exe80⤵
-
\??\c:\bbbtnh.exec:\bbbtnh.exe81⤵
-
\??\c:\bbhnbt.exec:\bbhnbt.exe82⤵
-
\??\c:\vppjd.exec:\vppjd.exe83⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe84⤵
-
\??\c:\frrlrrf.exec:\frrlrrf.exe85⤵
-
\??\c:\5bhhht.exec:\5bhhht.exe86⤵
-
\??\c:\1jpdd.exec:\1jpdd.exe87⤵
-
\??\c:\xllxrrx.exec:\xllxrrx.exe88⤵
-
\??\c:\hntnhh.exec:\hntnhh.exe89⤵
-
\??\c:\3hnhnn.exec:\3hnhnn.exe90⤵
-
\??\c:\jpvdv.exec:\jpvdv.exe91⤵
-
\??\c:\rrrfxll.exec:\rrrfxll.exe92⤵
-
\??\c:\7bnhht.exec:\7bnhht.exe93⤵
-
\??\c:\1nnhtt.exec:\1nnhtt.exe94⤵
-
\??\c:\9vjdv.exec:\9vjdv.exe95⤵
-
\??\c:\3vpjv.exec:\3vpjv.exe96⤵
-
\??\c:\lfxxfxr.exec:\lfxxfxr.exe97⤵
-
\??\c:\nnnhtt.exec:\nnnhtt.exe98⤵
-
\??\c:\3nthtn.exec:\3nthtn.exe99⤵
-
\??\c:\pjddj.exec:\pjddj.exe100⤵
-
\??\c:\pjdpd.exec:\pjdpd.exe101⤵
-
\??\c:\3ffflfx.exec:\3ffflfx.exe102⤵
-
\??\c:\lffxrlx.exec:\lffxrlx.exe103⤵
-
\??\c:\ttnhhb.exec:\ttnhhb.exe104⤵
-
\??\c:\hbnhbt.exec:\hbnhbt.exe105⤵
-
\??\c:\djjdp.exec:\djjdp.exe106⤵
-
\??\c:\rlxrrrx.exec:\rlxrrrx.exe107⤵
-
\??\c:\xffrlfr.exec:\xffrlfr.exe108⤵
-
\??\c:\rffxrlf.exec:\rffxrlf.exe109⤵
-
\??\c:\hbnbnb.exec:\hbnbnb.exe110⤵
-
\??\c:\5djpv.exec:\5djpv.exe111⤵
-
\??\c:\5dvjv.exec:\5dvjv.exe112⤵
-
\??\c:\vpdvj.exec:\vpdvj.exe113⤵
-
\??\c:\rlrfxlx.exec:\rlrfxlx.exe114⤵
-
\??\c:\frxlfxr.exec:\frxlfxr.exe115⤵
-
\??\c:\hnbbtn.exec:\hnbbtn.exe116⤵
-
\??\c:\hhbbbt.exec:\hhbbbt.exe117⤵
-
\??\c:\djjpj.exec:\djjpj.exe118⤵
-
\??\c:\pvvvp.exec:\pvvvp.exe119⤵
-
\??\c:\xlfrlfx.exec:\xlfrlfx.exe120⤵
-
\??\c:\xfxxxxr.exec:\xfxxxxr.exe121⤵
-
\??\c:\bbtnbb.exec:\bbtnbb.exe122⤵
-
\??\c:\hbnbbt.exec:\hbnbbt.exe123⤵
-
\??\c:\djvpv.exec:\djvpv.exe124⤵
-
\??\c:\9vvpd.exec:\9vvpd.exe125⤵
-
\??\c:\lffxlfx.exec:\lffxlfx.exe126⤵
-
\??\c:\xlfrlll.exec:\xlfrlll.exe127⤵
-
\??\c:\hbhnht.exec:\hbhnht.exe128⤵
-
\??\c:\9tbnhh.exec:\9tbnhh.exe129⤵
-
\??\c:\nnnbnn.exec:\nnnbnn.exe130⤵
-
\??\c:\vppjd.exec:\vppjd.exe131⤵
-
\??\c:\jvvvj.exec:\jvvvj.exe132⤵
-
\??\c:\lffxxrl.exec:\lffxxrl.exe133⤵
-
\??\c:\rxxxrxr.exec:\rxxxrxr.exe134⤵
-
\??\c:\bhnhbb.exec:\bhnhbb.exe135⤵
-
\??\c:\tnnhtt.exec:\tnnhtt.exe136⤵
-
\??\c:\jpdvp.exec:\jpdvp.exe137⤵
-
\??\c:\xlfxllf.exec:\xlfxllf.exe138⤵
-
\??\c:\dvpjd.exec:\dvpjd.exe139⤵
-
\??\c:\lflfxrx.exec:\lflfxrx.exe140⤵
-
\??\c:\frrlxlf.exec:\frrlxlf.exe141⤵
-
\??\c:\bthtnn.exec:\bthtnn.exe142⤵
-
\??\c:\7nhtnh.exec:\7nhtnh.exe143⤵
-
\??\c:\rllxxlx.exec:\rllxxlx.exe144⤵
-
\??\c:\5frxrll.exec:\5frxrll.exe145⤵
-
\??\c:\5tnhbt.exec:\5tnhbt.exe146⤵
-
\??\c:\hbtnnb.exec:\hbtnnb.exe147⤵
-
\??\c:\5btnbt.exec:\5btnbt.exe148⤵
-
\??\c:\jdvpd.exec:\jdvpd.exe149⤵
-
\??\c:\dvpjj.exec:\dvpjj.exe150⤵
-
\??\c:\xxrlrlr.exec:\xxrlrlr.exe151⤵
-
\??\c:\3hhthb.exec:\3hhthb.exe152⤵
-
\??\c:\bhhhhh.exec:\bhhhhh.exe153⤵
-
\??\c:\7pvvp.exec:\7pvvp.exe154⤵
-
\??\c:\xrrlfff.exec:\xrrlfff.exe155⤵
-
\??\c:\hbtnbt.exec:\hbtnbt.exe156⤵
-
\??\c:\3nbtht.exec:\3nbtht.exe157⤵
-
\??\c:\tnbtnt.exec:\tnbtnt.exe158⤵
-
\??\c:\pdpdv.exec:\pdpdv.exe159⤵
-
\??\c:\jddvj.exec:\jddvj.exe160⤵
-
\??\c:\fxlxrlr.exec:\fxlxrlr.exe161⤵
-
\??\c:\lfxfflr.exec:\lfxfflr.exe162⤵
-
\??\c:\tntttn.exec:\tntttn.exe163⤵
-
\??\c:\tbttbh.exec:\tbttbh.exe164⤵
-
\??\c:\vppdp.exec:\vppdp.exe165⤵
-
\??\c:\pjdpd.exec:\pjdpd.exe166⤵
-
\??\c:\lfllxxr.exec:\lfllxxr.exe167⤵
-
\??\c:\lfxlfxl.exec:\lfxlfxl.exe168⤵
-
\??\c:\hnbtnh.exec:\hnbtnh.exe169⤵
-
\??\c:\nbtnbb.exec:\nbtnbb.exe170⤵
-
\??\c:\1djdj.exec:\1djdj.exe171⤵
-
\??\c:\ppdpp.exec:\ppdpp.exe172⤵
-
\??\c:\frlfrlf.exec:\frlfrlf.exe173⤵
-
\??\c:\xllfrrl.exec:\xllfrrl.exe174⤵
-
\??\c:\5rxffrr.exec:\5rxffrr.exe175⤵
-
\??\c:\tbbtnh.exec:\tbbtnh.exe176⤵
-
\??\c:\hbbnhb.exec:\hbbnhb.exe177⤵
-
\??\c:\3vdvj.exec:\3vdvj.exe178⤵
-
\??\c:\vjdpd.exec:\vjdpd.exe179⤵
-
\??\c:\lxlfrrl.exec:\lxlfrrl.exe180⤵
-
\??\c:\xllffrf.exec:\xllffrf.exe181⤵
-
\??\c:\3xrlfxl.exec:\3xrlfxl.exe182⤵
-
\??\c:\nhbthh.exec:\nhbthh.exe183⤵
-
\??\c:\ttthbt.exec:\ttthbt.exe184⤵
-
\??\c:\jddvj.exec:\jddvj.exe185⤵
-
\??\c:\3ddpj.exec:\3ddpj.exe186⤵
-
\??\c:\xxfxrrl.exec:\xxfxrrl.exe187⤵
-
\??\c:\lxfrfxx.exec:\lxfrfxx.exe188⤵
-
\??\c:\fllxrlf.exec:\fllxrlf.exe189⤵
-
\??\c:\vdvvp.exec:\vdvvp.exe190⤵
-
\??\c:\jjjjv.exec:\jjjjv.exe191⤵
-
\??\c:\lxxrffr.exec:\lxxrffr.exe192⤵
-
\??\c:\rflxrlr.exec:\rflxrlr.exe193⤵
-
\??\c:\xrxlrll.exec:\xrxlrll.exe194⤵
-
\??\c:\hbnhtn.exec:\hbnhtn.exe195⤵
-
\??\c:\tnbnnh.exec:\tnbnnh.exe196⤵
-
\??\c:\3dpvj.exec:\3dpvj.exe197⤵
-
\??\c:\dvjvj.exec:\dvjvj.exe198⤵
-
\??\c:\vvpjj.exec:\vvpjj.exe199⤵
-
\??\c:\rrxrlff.exec:\rrxrlff.exe200⤵
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe201⤵
-
\??\c:\tbtnbb.exec:\tbtnbb.exe202⤵
-
\??\c:\thnhhb.exec:\thnhhb.exe203⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe204⤵
-
\??\c:\7dvjv.exec:\7dvjv.exe205⤵
-
\??\c:\pdvpd.exec:\pdvpd.exe206⤵
-
\??\c:\lxlrxlf.exec:\lxlrxlf.exe207⤵
-
\??\c:\rrllxxr.exec:\rrllxxr.exe208⤵
-
\??\c:\ntthtn.exec:\ntthtn.exe209⤵
-
\??\c:\tntnht.exec:\tntnht.exe210⤵
-
\??\c:\bbbtnn.exec:\bbbtnn.exe211⤵
-
\??\c:\7vvpj.exec:\7vvpj.exe212⤵
-
\??\c:\7dvpd.exec:\7dvpd.exe213⤵
-
\??\c:\lxxlfxl.exec:\lxxlfxl.exe214⤵
-
\??\c:\xxllfxr.exec:\xxllfxr.exe215⤵
-
\??\c:\bnntnb.exec:\bnntnb.exe216⤵
-
\??\c:\hbnhtn.exec:\hbnhtn.exe217⤵
-
\??\c:\5ntntn.exec:\5ntntn.exe218⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe219⤵
-
\??\c:\jjjpj.exec:\jjjpj.exe220⤵
-
\??\c:\rlllxrx.exec:\rlllxrx.exe221⤵
-
\??\c:\fxxrffx.exec:\fxxrffx.exe222⤵
-
\??\c:\rffxxxr.exec:\rffxxxr.exe223⤵
-
\??\c:\hnnbbh.exec:\hnnbbh.exe224⤵
-
\??\c:\tnhthb.exec:\tnhthb.exe225⤵
-
\??\c:\pdvvp.exec:\pdvvp.exe226⤵
-
\??\c:\dddvd.exec:\dddvd.exe227⤵
-
\??\c:\rlfxlrl.exec:\rlfxlrl.exe228⤵
-
\??\c:\lrfxrll.exec:\lrfxrll.exe229⤵
-
\??\c:\btbbbb.exec:\btbbbb.exe230⤵
-
\??\c:\nhhbnh.exec:\nhhbnh.exe231⤵
-
\??\c:\nttnbt.exec:\nttnbt.exe232⤵
-
\??\c:\7pvdp.exec:\7pvdp.exe233⤵
-
\??\c:\pppvd.exec:\pppvd.exe234⤵
-
\??\c:\llrfrrl.exec:\llrfrrl.exe235⤵
-
\??\c:\tnttbt.exec:\tnttbt.exe236⤵
-
\??\c:\nbbbht.exec:\nbbbht.exe237⤵
-
\??\c:\vvvpd.exec:\vvvpd.exe238⤵
-
\??\c:\7ppjp.exec:\7ppjp.exe239⤵
-
\??\c:\rfrlffr.exec:\rfrlffr.exe240⤵
-
\??\c:\rrfxrfx.exec:\rrfxrfx.exe241⤵