Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:27
Behavioral task
behavioral1
Sample
071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe
-
Size
190KB
-
MD5
071a998972f802cc838aa2ef9c6b8870
-
SHA1
55c25028dbdf877176b56208be72aeec79dede4d
-
SHA256
d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f
-
SHA512
8b72859259eb1d0074ef5989c8553cb2e4853d8415e81dc46f5c82c895fe973d02cba176a2af34a94a39f47ca92f2f7a87faca2f868d7911545e77eb40830bec
-
SSDEEP
3072:YhOmTsF93UYfwC6GIoutLmxHxae5yLpcgDE4JBuItR8pTsgnKbQFe3+9:Ycm4FmowdHoSLEaTBftapTsyFeO9
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1488-5-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4484-12-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/432-14-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4572-19-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3352-31-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3524-25-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1468-53-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1604-54-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3600-45-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2964-37-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1776-66-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1168-68-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4952-79-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2868-94-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5024-101-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4472-106-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4012-109-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2468-118-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/400-126-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3508-131-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3356-123-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4720-152-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1816-154-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4860-173-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4256-188-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4444-196-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3444-214-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5044-218-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4412-225-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3544-232-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2292-236-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3252-243-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1440-247-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4696-251-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4656-273-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3364-277-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2772-281-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/540-298-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4012-302-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3116-317-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2216-322-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1520-326-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2668-333-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1048-337-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4204-341-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3076-358-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3756-365-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4844-369-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/948-385-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2456-392-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3492-421-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5080-441-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1000-475-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4720-497-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3756-517-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4660-533-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2284-604-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1996-629-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4972-634-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1488-682-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2316-698-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4704-944-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4792-957-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3948-994-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\nnbnhb.exe family_berbew \??\c:\fxlflrl.exe family_berbew \??\c:\lfffxrl.exe family_berbew \??\c:\tnttbt.exe family_berbew \??\c:\tbhhhh.exe family_berbew \??\c:\ddppj.exe family_berbew \??\c:\xxffxfx.exe family_berbew \??\c:\5xlfxfx.exe family_berbew \??\c:\ddvpj.exe family_berbew C:\tbnhnn.exe family_berbew C:\pdvpp.exe family_berbew \??\c:\bnnhbt.exe family_berbew \??\c:\jddpj.exe family_berbew C:\btnhtt.exe family_berbew C:\nhhbbt.exe family_berbew C:\5frlflf.exe family_berbew C:\xlrlffx.exe family_berbew C:\pjvvv.exe family_berbew C:\vjdvj.exe family_berbew C:\nthhbh.exe family_berbew C:\nhtbtb.exe family_berbew \??\c:\dvddv.exe family_berbew \??\c:\1frrffl.exe family_berbew C:\tbbnbh.exe family_berbew C:\7pddd.exe family_berbew C:\frrlfxr.exe family_berbew C:\bthtnn.exe family_berbew C:\dpvpj.exe family_berbew C:\rlxxlrf.exe family_berbew C:\tnnhnt.exe family_berbew C:\7djdd.exe family_berbew \??\c:\5pppp.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
nnbnhb.exeddvpj.exefxlflrl.exelfffxrl.exetnttbt.exetbhhhh.exeddppj.exexxffxfx.exe5xlfxfx.exetbnhnn.exebnnhbt.exepdvpp.exejddpj.exebtnhtt.exenhhbbt.exe5frlflf.exexlrlffx.exepjvvv.exevjdvj.exenthhbh.exenhtbtb.exedvddv.exe1frrffl.exetbbnbh.exe7pddd.exefrrlfxr.exebthtnn.exedpvpj.exerlxxlrf.exetnnhnt.exe7djdd.exe5pppp.exe5rxrllf.exebnttbb.exenhnhbb.exe5vdjd.exexlrlffx.exe9nnntb.exepjppj.exevjddv.exelxxrrrl.exerllfllr.exehnhbtn.exevvjjd.exerlrrlrl.exelxlllll.exeppvpj.exerrlfxxr.exexxfxlfl.exebhbbhn.exehbbtnn.exeppdvp.exerrrrlrr.exettnhbb.exenbnnnn.exejdddv.exevpjdv.exexxxxxff.exellrrffx.exe9ntnhn.exepjdvp.exevdvpp.exe5lrlfff.exe1ntnbb.exepid process 4484 nnbnhb.exe 432 ddvpj.exe 4572 fxlflrl.exe 3524 lfffxrl.exe 3352 tnttbt.exe 2964 tbhhhh.exe 3600 ddppj.exe 1604 xxffxfx.exe 1468 5xlfxfx.exe 1776 tbnhnn.exe 1168 bnnhbt.exe 2972 pdvpp.exe 4952 jddpj.exe 2988 btnhtt.exe 2868 nhhbbt.exe 5024 5frlflf.exe 4472 xlrlffx.exe 4012 pjvvv.exe 2468 vjdvj.exe 3356 nthhbh.exe 400 nhtbtb.exe 3508 dvddv.exe 116 1frrffl.exe 1348 tbbnbh.exe 4720 7pddd.exe 1816 frrlfxr.exe 3064 bthtnn.exe 2848 dpvpj.exe 4860 rlxxlrf.exe 1128 tnnhnt.exe 468 7djdd.exe 4256 5pppp.exe 4216 5rxrllf.exe 4444 bnttbb.exe 2788 nhnhbb.exe 1364 5vdjd.exe 3152 xlrlffx.exe 4252 9nnntb.exe 4876 pjppj.exe 3444 vjddv.exe 5044 lxxrrrl.exe 2068 rllfllr.exe 4412 hnhbtn.exe 1488 vvjjd.exe 3544 rlrrlrl.exe 2292 lxlllll.exe 4364 ppvpj.exe 3252 rrlfxxr.exe 1440 xxfxlfl.exe 4696 bhbbhn.exe 2928 hbbtnn.exe 1604 ppdvp.exe 3020 rrrrlrr.exe 4064 ttnhbb.exe 2656 nbnnnn.exe 1168 jdddv.exe 4656 vpjdv.exe 1892 xxxxxff.exe 3364 llrrffx.exe 2772 9ntnhn.exe 2184 pjdvp.exe 5024 vdvpp.exe 3096 5lrlfff.exe 540 1ntnbb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exennbnhb.exeddvpj.exefxlflrl.exelfffxrl.exetnttbt.exetbhhhh.exeddppj.exexxffxfx.exe5xlfxfx.exetbnhnn.exebnnhbt.exepdvpp.exejddpj.exebtnhtt.exenhhbbt.exe5frlflf.exexlrlffx.exepjvvv.exevjdvj.exenthhbh.exenhtbtb.exedescription pid process target process PID 1488 wrote to memory of 4484 1488 071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe nnbnhb.exe PID 1488 wrote to memory of 4484 1488 071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe nnbnhb.exe PID 1488 wrote to memory of 4484 1488 071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe nnbnhb.exe PID 4484 wrote to memory of 432 4484 nnbnhb.exe ddvpj.exe PID 4484 wrote to memory of 432 4484 nnbnhb.exe ddvpj.exe PID 4484 wrote to memory of 432 4484 nnbnhb.exe ddvpj.exe PID 432 wrote to memory of 4572 432 ddvpj.exe fxlflrl.exe PID 432 wrote to memory of 4572 432 ddvpj.exe fxlflrl.exe PID 432 wrote to memory of 4572 432 ddvpj.exe fxlflrl.exe PID 4572 wrote to memory of 3524 4572 fxlflrl.exe lfffxrl.exe PID 4572 wrote to memory of 3524 4572 fxlflrl.exe lfffxrl.exe PID 4572 wrote to memory of 3524 4572 fxlflrl.exe lfffxrl.exe PID 3524 wrote to memory of 3352 3524 lfffxrl.exe tnttbt.exe PID 3524 wrote to memory of 3352 3524 lfffxrl.exe tnttbt.exe PID 3524 wrote to memory of 3352 3524 lfffxrl.exe tnttbt.exe PID 3352 wrote to memory of 2964 3352 tnttbt.exe tbhhhh.exe PID 3352 wrote to memory of 2964 3352 tnttbt.exe tbhhhh.exe PID 3352 wrote to memory of 2964 3352 tnttbt.exe tbhhhh.exe PID 2964 wrote to memory of 3600 2964 tbhhhh.exe ddppj.exe PID 2964 wrote to memory of 3600 2964 tbhhhh.exe ddppj.exe PID 2964 wrote to memory of 3600 2964 tbhhhh.exe ddppj.exe PID 3600 wrote to memory of 1604 3600 ddppj.exe xxffxfx.exe PID 3600 wrote to memory of 1604 3600 ddppj.exe xxffxfx.exe PID 3600 wrote to memory of 1604 3600 ddppj.exe xxffxfx.exe PID 1604 wrote to memory of 1468 1604 xxffxfx.exe 5xlfxfx.exe PID 1604 wrote to memory of 1468 1604 xxffxfx.exe 5xlfxfx.exe PID 1604 wrote to memory of 1468 1604 xxffxfx.exe 5xlfxfx.exe PID 1468 wrote to memory of 1776 1468 5xlfxfx.exe tbnhnn.exe PID 1468 wrote to memory of 1776 1468 5xlfxfx.exe tbnhnn.exe PID 1468 wrote to memory of 1776 1468 5xlfxfx.exe tbnhnn.exe PID 1776 wrote to memory of 1168 1776 tbnhnn.exe bnnhbt.exe PID 1776 wrote to memory of 1168 1776 tbnhnn.exe bnnhbt.exe PID 1776 wrote to memory of 1168 1776 tbnhnn.exe bnnhbt.exe PID 1168 wrote to memory of 2972 1168 bnnhbt.exe pdvpp.exe PID 1168 wrote to memory of 2972 1168 bnnhbt.exe pdvpp.exe PID 1168 wrote to memory of 2972 1168 bnnhbt.exe pdvpp.exe PID 2972 wrote to memory of 4952 2972 pdvpp.exe jddpj.exe PID 2972 wrote to memory of 4952 2972 pdvpp.exe jddpj.exe PID 2972 wrote to memory of 4952 2972 pdvpp.exe jddpj.exe PID 4952 wrote to memory of 2988 4952 jddpj.exe btnhtt.exe PID 4952 wrote to memory of 2988 4952 jddpj.exe btnhtt.exe PID 4952 wrote to memory of 2988 4952 jddpj.exe btnhtt.exe PID 2988 wrote to memory of 2868 2988 btnhtt.exe nhhbbt.exe PID 2988 wrote to memory of 2868 2988 btnhtt.exe nhhbbt.exe PID 2988 wrote to memory of 2868 2988 btnhtt.exe nhhbbt.exe PID 2868 wrote to memory of 5024 2868 nhhbbt.exe 5frlflf.exe PID 2868 wrote to memory of 5024 2868 nhhbbt.exe 5frlflf.exe PID 2868 wrote to memory of 5024 2868 nhhbbt.exe 5frlflf.exe PID 5024 wrote to memory of 4472 5024 5frlflf.exe xlrlffx.exe PID 5024 wrote to memory of 4472 5024 5frlflf.exe xlrlffx.exe PID 5024 wrote to memory of 4472 5024 5frlflf.exe xlrlffx.exe PID 4472 wrote to memory of 4012 4472 xlrlffx.exe pjvvv.exe PID 4472 wrote to memory of 4012 4472 xlrlffx.exe pjvvv.exe PID 4472 wrote to memory of 4012 4472 xlrlffx.exe pjvvv.exe PID 4012 wrote to memory of 2468 4012 pjvvv.exe vjdvj.exe PID 4012 wrote to memory of 2468 4012 pjvvv.exe vjdvj.exe PID 4012 wrote to memory of 2468 4012 pjvvv.exe vjdvj.exe PID 2468 wrote to memory of 3356 2468 vjdvj.exe nthhbh.exe PID 2468 wrote to memory of 3356 2468 vjdvj.exe nthhbh.exe PID 2468 wrote to memory of 3356 2468 vjdvj.exe nthhbh.exe PID 3356 wrote to memory of 400 3356 nthhbh.exe nhtbtb.exe PID 3356 wrote to memory of 400 3356 nthhbh.exe nhtbtb.exe PID 3356 wrote to memory of 400 3356 nthhbh.exe nhtbtb.exe PID 400 wrote to memory of 3508 400 nhtbtb.exe dvddv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\071a998972f802cc838aa2ef9c6b8870_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\nnbnhb.exec:\nnbnhb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddvpj.exec:\ddvpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxlflrl.exec:\fxlflrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfffxrl.exec:\lfffxrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnttbt.exec:\tnttbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbhhhh.exec:\tbhhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddppj.exec:\ddppj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxffxfx.exec:\xxffxfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5xlfxfx.exec:\5xlfxfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbnhnn.exec:\tbnhnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnhbt.exec:\bnnhbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdvpp.exec:\pdvpp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jddpj.exec:\jddpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnhtt.exec:\btnhtt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhhbbt.exec:\nhhbbt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5frlflf.exec:\5frlflf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlrlffx.exec:\xlrlffx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvvv.exec:\pjvvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjdvj.exec:\vjdvj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nthhbh.exec:\nthhbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtbtb.exec:\nhtbtb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvddv.exec:\dvddv.exe23⤵
- Executes dropped EXE
-
\??\c:\1frrffl.exec:\1frrffl.exe24⤵
- Executes dropped EXE
-
\??\c:\tbbnbh.exec:\tbbnbh.exe25⤵
- Executes dropped EXE
-
\??\c:\7pddd.exec:\7pddd.exe26⤵
- Executes dropped EXE
-
\??\c:\frrlfxr.exec:\frrlfxr.exe27⤵
- Executes dropped EXE
-
\??\c:\bthtnn.exec:\bthtnn.exe28⤵
- Executes dropped EXE
-
\??\c:\dpvpj.exec:\dpvpj.exe29⤵
- Executes dropped EXE
-
\??\c:\rlxxlrf.exec:\rlxxlrf.exe30⤵
- Executes dropped EXE
-
\??\c:\tnnhnt.exec:\tnnhnt.exe31⤵
- Executes dropped EXE
-
\??\c:\7djdd.exec:\7djdd.exe32⤵
- Executes dropped EXE
-
\??\c:\5pppp.exec:\5pppp.exe33⤵
- Executes dropped EXE
-
\??\c:\5rxrllf.exec:\5rxrllf.exe34⤵
- Executes dropped EXE
-
\??\c:\bnttbb.exec:\bnttbb.exe35⤵
- Executes dropped EXE
-
\??\c:\nhnhbb.exec:\nhnhbb.exe36⤵
- Executes dropped EXE
-
\??\c:\5vdjd.exec:\5vdjd.exe37⤵
- Executes dropped EXE
-
\??\c:\xlrlffx.exec:\xlrlffx.exe38⤵
- Executes dropped EXE
-
\??\c:\9nnntb.exec:\9nnntb.exe39⤵
- Executes dropped EXE
-
\??\c:\pjppj.exec:\pjppj.exe40⤵
- Executes dropped EXE
-
\??\c:\vjddv.exec:\vjddv.exe41⤵
- Executes dropped EXE
-
\??\c:\lxxrrrl.exec:\lxxrrrl.exe42⤵
- Executes dropped EXE
-
\??\c:\rllfllr.exec:\rllfllr.exe43⤵
- Executes dropped EXE
-
\??\c:\hnhbtn.exec:\hnhbtn.exe44⤵
- Executes dropped EXE
-
\??\c:\vvjjd.exec:\vvjjd.exe45⤵
- Executes dropped EXE
-
\??\c:\rlrrlrl.exec:\rlrrlrl.exe46⤵
- Executes dropped EXE
-
\??\c:\lxlllll.exec:\lxlllll.exe47⤵
- Executes dropped EXE
-
\??\c:\ppvpj.exec:\ppvpj.exe48⤵
- Executes dropped EXE
-
\??\c:\rrlfxxr.exec:\rrlfxxr.exe49⤵
- Executes dropped EXE
-
\??\c:\xxfxlfl.exec:\xxfxlfl.exe50⤵
- Executes dropped EXE
-
\??\c:\bhbbhn.exec:\bhbbhn.exe51⤵
- Executes dropped EXE
-
\??\c:\hbbtnn.exec:\hbbtnn.exe52⤵
- Executes dropped EXE
-
\??\c:\ppdvp.exec:\ppdvp.exe53⤵
- Executes dropped EXE
-
\??\c:\rrrrlrr.exec:\rrrrlrr.exe54⤵
- Executes dropped EXE
-
\??\c:\ttnhbb.exec:\ttnhbb.exe55⤵
- Executes dropped EXE
-
\??\c:\nbnnnn.exec:\nbnnnn.exe56⤵
- Executes dropped EXE
-
\??\c:\jdddv.exec:\jdddv.exe57⤵
- Executes dropped EXE
-
\??\c:\vpjdv.exec:\vpjdv.exe58⤵
- Executes dropped EXE
-
\??\c:\xxxxxff.exec:\xxxxxff.exe59⤵
- Executes dropped EXE
-
\??\c:\llrrffx.exec:\llrrffx.exe60⤵
- Executes dropped EXE
-
\??\c:\9ntnhn.exec:\9ntnhn.exe61⤵
- Executes dropped EXE
-
\??\c:\pjdvp.exec:\pjdvp.exe62⤵
- Executes dropped EXE
-
\??\c:\vdvpp.exec:\vdvpp.exe63⤵
- Executes dropped EXE
-
\??\c:\5lrlfff.exec:\5lrlfff.exe64⤵
- Executes dropped EXE
-
\??\c:\1ntnbb.exec:\1ntnbb.exe65⤵
- Executes dropped EXE
-
\??\c:\3bbnhh.exec:\3bbnhh.exe66⤵
-
\??\c:\vvvvd.exec:\vvvvd.exe67⤵
-
\??\c:\jdpjp.exec:\jdpjp.exe68⤵
-
\??\c:\rrfxxrr.exec:\rrfxxrr.exe69⤵
-
\??\c:\7bttnt.exec:\7bttnt.exe70⤵
-
\??\c:\1hnbtt.exec:\1hnbtt.exe71⤵
-
\??\c:\pjpjv.exec:\pjpjv.exe72⤵
-
\??\c:\9jdvp.exec:\9jdvp.exe73⤵
-
\??\c:\llfxxrr.exec:\llfxxrr.exe74⤵
-
\??\c:\nnbnhb.exec:\nnbnhb.exe75⤵
-
\??\c:\bhhttn.exec:\bhhttn.exe76⤵
-
\??\c:\5vvjp.exec:\5vvjp.exe77⤵
-
\??\c:\nnnhbt.exec:\nnnhbt.exe78⤵
-
\??\c:\5vdpj.exec:\5vdpj.exe79⤵
-
\??\c:\dpvpp.exec:\dpvpp.exe80⤵
-
\??\c:\1rxrffx.exec:\1rxrffx.exe81⤵
-
\??\c:\3ttnhh.exec:\3ttnhh.exe82⤵
-
\??\c:\ttttnh.exec:\ttttnh.exe83⤵
-
\??\c:\pppjd.exec:\pppjd.exe84⤵
-
\??\c:\lfxrlrr.exec:\lfxrlrr.exe85⤵
-
\??\c:\xrllllf.exec:\xrllllf.exe86⤵
-
\??\c:\tttnhh.exec:\tttnhh.exe87⤵
-
\??\c:\bntttn.exec:\bntttn.exe88⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe89⤵
-
\??\c:\frxxlrl.exec:\frxxlrl.exe90⤵
-
\??\c:\fllfxrl.exec:\fllfxrl.exe91⤵
-
\??\c:\tbhbtt.exec:\tbhbtt.exe92⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe93⤵
-
\??\c:\jdppv.exec:\jdppv.exe94⤵
-
\??\c:\lxxffff.exec:\lxxffff.exe95⤵
-
\??\c:\lxlffxx.exec:\lxlffxx.exe96⤵
-
\??\c:\3tbtbb.exec:\3tbtbb.exe97⤵
-
\??\c:\vpvvv.exec:\vpvvv.exe98⤵
-
\??\c:\5ppjj.exec:\5ppjj.exe99⤵
-
\??\c:\9rllfll.exec:\9rllfll.exe100⤵
-
\??\c:\hhhhtb.exec:\hhhhtb.exe101⤵
-
\??\c:\ntttnn.exec:\ntttnn.exe102⤵
-
\??\c:\9dddv.exec:\9dddv.exe103⤵
-
\??\c:\xxxrrrr.exec:\xxxrrrr.exe104⤵
-
\??\c:\hhtnbb.exec:\hhtnbb.exe105⤵
-
\??\c:\bthbhb.exec:\bthbhb.exe106⤵
-
\??\c:\pjvpd.exec:\pjvpd.exe107⤵
-
\??\c:\hhhbht.exec:\hhhbht.exe108⤵
-
\??\c:\9bttnn.exec:\9bttnn.exe109⤵
-
\??\c:\5jddv.exec:\5jddv.exe110⤵
-
\??\c:\fflfxxr.exec:\fflfxxr.exe111⤵
-
\??\c:\3flfffl.exec:\3flfffl.exe112⤵
-
\??\c:\3tnthh.exec:\3tnthh.exe113⤵
-
\??\c:\btbbbb.exec:\btbbbb.exe114⤵
-
\??\c:\pjvvp.exec:\pjvvp.exe115⤵
-
\??\c:\llrrfff.exec:\llrrfff.exe116⤵
-
\??\c:\rxfflff.exec:\rxfflff.exe117⤵
-
\??\c:\tbtttt.exec:\tbtttt.exe118⤵
-
\??\c:\nbhbtt.exec:\nbhbtt.exe119⤵
-
\??\c:\vvvvv.exec:\vvvvv.exe120⤵
-
\??\c:\jjjdj.exec:\jjjdj.exe121⤵
-
\??\c:\xrrxllr.exec:\xrrxllr.exe122⤵
-
\??\c:\fffffll.exec:\fffffll.exe123⤵
-
\??\c:\bhtnnb.exec:\bhtnnb.exe124⤵
-
\??\c:\bnnhbh.exec:\bnnhbh.exe125⤵
-
\??\c:\vpvjp.exec:\vpvjp.exe126⤵
-
\??\c:\vdjpv.exec:\vdjpv.exe127⤵
-
\??\c:\lrxrllr.exec:\lrxrllr.exe128⤵
-
\??\c:\frxxrrr.exec:\frxxrrr.exe129⤵
-
\??\c:\3nbhtb.exec:\3nbhtb.exe130⤵
-
\??\c:\vjvpj.exec:\vjvpj.exe131⤵
-
\??\c:\vpjvp.exec:\vpjvp.exe132⤵
-
\??\c:\rlxrlrr.exec:\rlxrlrr.exe133⤵
-
\??\c:\xrlllll.exec:\xrlllll.exe134⤵
-
\??\c:\bntntt.exec:\bntntt.exe135⤵
-
\??\c:\1djdv.exec:\1djdv.exe136⤵
-
\??\c:\djpjj.exec:\djpjj.exe137⤵
-
\??\c:\xllllrr.exec:\xllllrr.exe138⤵
-
\??\c:\3nnhbb.exec:\3nnhbb.exe139⤵
-
\??\c:\btnnhb.exec:\btnnhb.exe140⤵
-
\??\c:\ddvvp.exec:\ddvvp.exe141⤵
-
\??\c:\3pdvv.exec:\3pdvv.exe142⤵
-
\??\c:\xllfllf.exec:\xllfllf.exe143⤵
-
\??\c:\bnbbhn.exec:\bnbbhn.exe144⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe145⤵
-
\??\c:\frfxrrl.exec:\frfxrrl.exe146⤵
-
\??\c:\1tnnnh.exec:\1tnnnh.exe147⤵
-
\??\c:\pdjdp.exec:\pdjdp.exe148⤵
-
\??\c:\3rxrrxx.exec:\3rxrrxx.exe149⤵
-
\??\c:\1bbthh.exec:\1bbthh.exe150⤵
-
\??\c:\jpvpv.exec:\jpvpv.exe151⤵
-
\??\c:\1lrlfff.exec:\1lrlfff.exe152⤵
-
\??\c:\rfxxrxx.exec:\rfxxrxx.exe153⤵
-
\??\c:\xxlfllr.exec:\xxlfllr.exe154⤵
-
\??\c:\djddv.exec:\djddv.exe155⤵
-
\??\c:\rrrxffr.exec:\rrrxffr.exe156⤵
-
\??\c:\hhhhhh.exec:\hhhhhh.exe157⤵
-
\??\c:\vpppv.exec:\vpppv.exe158⤵
-
\??\c:\1rllflf.exec:\1rllflf.exe159⤵
-
\??\c:\thnhbb.exec:\thnhbb.exe160⤵
-
\??\c:\jvppp.exec:\jvppp.exe161⤵
-
\??\c:\3vddd.exec:\3vddd.exe162⤵
-
\??\c:\nbbbth.exec:\nbbbth.exe163⤵
-
\??\c:\fllxxxx.exec:\fllxxxx.exe164⤵
-
\??\c:\3fffxxx.exec:\3fffxxx.exe165⤵
-
\??\c:\bhthbh.exec:\bhthbh.exe166⤵
-
\??\c:\dpddv.exec:\dpddv.exe167⤵
-
\??\c:\3nbtnn.exec:\3nbtnn.exe168⤵
-
\??\c:\pddjv.exec:\pddjv.exe169⤵
-
\??\c:\5djvp.exec:\5djvp.exe170⤵
-
\??\c:\ffrrrrl.exec:\ffrrrrl.exe171⤵
-
\??\c:\hbhhtt.exec:\hbhhtt.exe172⤵
-
\??\c:\djjvj.exec:\djjvj.exe173⤵
-
\??\c:\pjjjj.exec:\pjjjj.exe174⤵
-
\??\c:\flrlffx.exec:\flrlffx.exe175⤵
-
\??\c:\xxxxxxr.exec:\xxxxxxr.exe176⤵
-
\??\c:\jjvpp.exec:\jjvpp.exe177⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe178⤵
-
\??\c:\hthbtb.exec:\hthbtb.exe179⤵
-
\??\c:\jjpjd.exec:\jjpjd.exe180⤵
-
\??\c:\5lxrllx.exec:\5lxrllx.exe181⤵
-
\??\c:\lfxxxxr.exec:\lfxxxxr.exe182⤵
-
\??\c:\btttbt.exec:\btttbt.exe183⤵
-
\??\c:\frlffxx.exec:\frlffxx.exe184⤵
-
\??\c:\xfffxff.exec:\xfffxff.exe185⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe186⤵
-
\??\c:\xrrlrlr.exec:\xrrlrlr.exe187⤵
-
\??\c:\xlrxrlx.exec:\xlrxrlx.exe188⤵
-
\??\c:\nhnhhn.exec:\nhnhhn.exe189⤵
-
\??\c:\nnhhbh.exec:\nnhhbh.exe190⤵
-
\??\c:\dvppv.exec:\dvppv.exe191⤵
-
\??\c:\rxxrlrl.exec:\rxxrlrl.exe192⤵
-
\??\c:\lfffxxx.exec:\lfffxxx.exe193⤵
-
\??\c:\hhnhbb.exec:\hhnhbb.exe194⤵
-
\??\c:\7hnhnn.exec:\7hnhnn.exe195⤵
-
\??\c:\vjdjd.exec:\vjdjd.exe196⤵
-
\??\c:\pjddv.exec:\pjddv.exe197⤵
-
\??\c:\lrxlfrf.exec:\lrxlfrf.exe198⤵
-
\??\c:\rxfrxfx.exec:\rxfrxfx.exe199⤵
-
\??\c:\1bhbtn.exec:\1bhbtn.exe200⤵
-
\??\c:\hbttnn.exec:\hbttnn.exe201⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe202⤵
-
\??\c:\rxxxrrr.exec:\rxxxrrr.exe203⤵
-
\??\c:\llxxffr.exec:\llxxffr.exe204⤵
-
\??\c:\tbbnnt.exec:\tbbnnt.exe205⤵
-
\??\c:\htnhtt.exec:\htnhtt.exe206⤵
-
\??\c:\9jjdd.exec:\9jjdd.exe207⤵
-
\??\c:\djvpp.exec:\djvpp.exe208⤵
-
\??\c:\rlfxxxr.exec:\rlfxxxr.exe209⤵
-
\??\c:\lflfrxx.exec:\lflfrxx.exe210⤵
-
\??\c:\bbnnnh.exec:\bbnnnh.exe211⤵
-
\??\c:\3bnnhh.exec:\3bnnhh.exe212⤵
-
\??\c:\7pjdv.exec:\7pjdv.exe213⤵
-
\??\c:\lflxxrr.exec:\lflxxrr.exe214⤵
-
\??\c:\frfxrrl.exec:\frfxrrl.exe215⤵
-
\??\c:\hnhhnn.exec:\hnhhnn.exe216⤵
-
\??\c:\tttnhb.exec:\tttnhb.exe217⤵
-
\??\c:\jjjdv.exec:\jjjdv.exe218⤵
-
\??\c:\xrxrlff.exec:\xrxrlff.exe219⤵
-
\??\c:\fllxrfr.exec:\fllxrfr.exe220⤵
-
\??\c:\hhnnhn.exec:\hhnnhn.exe221⤵
-
\??\c:\3vjpj.exec:\3vjpj.exe222⤵
-
\??\c:\jdddv.exec:\jdddv.exe223⤵
-
\??\c:\1rfrlxf.exec:\1rfrlxf.exe224⤵
-
\??\c:\lflflfl.exec:\lflflfl.exe225⤵
-
\??\c:\tbnhhn.exec:\tbnhhn.exe226⤵
-
\??\c:\9dvvj.exec:\9dvvj.exe227⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe228⤵
-
\??\c:\nnbbtb.exec:\nnbbtb.exe229⤵
-
\??\c:\pvvvp.exec:\pvvvp.exe230⤵
-
\??\c:\ppvpd.exec:\ppvpd.exe231⤵
-
\??\c:\lffxxfl.exec:\lffxxfl.exe232⤵
-
\??\c:\hhnttn.exec:\hhnttn.exe233⤵
-
\??\c:\9jdvv.exec:\9jdvv.exe234⤵
-
\??\c:\pvddv.exec:\pvddv.exe235⤵
-
\??\c:\5xxffrr.exec:\5xxffrr.exe236⤵
-
\??\c:\nnnnht.exec:\nnnnht.exe237⤵
-
\??\c:\bthhhb.exec:\bthhhb.exe238⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe239⤵
-
\??\c:\ppvvv.exec:\ppvvv.exe240⤵
-
\??\c:\rxxrlrl.exec:\rxxrlrl.exe241⤵