Analysis
-
max time kernel
150s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 06:35
Behavioral task
behavioral1
Sample
36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe
-
Size
190KB
-
MD5
36d9c312f9edbdd59a47bd7a1b67f640
-
SHA1
a95b9e2175fe54dd771210f0d097814d0ee54b7b
-
SHA256
2ee6533c375fea97dd67c29283d2146613d8fafe3762dd012b65500eaf29b170
-
SHA512
e64625b25fa539b7335794bc66fc436fa2d4e123893cd692ea77933db980735b8b572b6e985d25b9946a6d9ea082ce33eb475440900d677866a3a5442717745a
-
SSDEEP
3072:YhOmTsF93UYfwC6GIoutLmxHxae5yLpcgDE4JBuItR8pTsgnKbQFe3+m:Ycm4FmowdHoSLEaTBftapTsyFeOm
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2280-11-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/456-18-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1284-13-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1952-6-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3192-33-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2996-37-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2876-46-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4716-67-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2132-73-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3944-62-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2464-58-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2732-52-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2492-88-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4488-93-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4628-96-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2524-105-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4092-108-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2644-113-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2912-123-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2652-128-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4480-137-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3524-143-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4912-148-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1092-164-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3556-172-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3832-170-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4960-183-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2320-189-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3100-198-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4120-200-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4496-206-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/116-213-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2344-215-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4396-219-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2280-228-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4864-239-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1368-252-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2180-264-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1600-274-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4492-285-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2980-294-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5092-302-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1480-320-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4904-330-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1824-343-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5052-353-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1676-366-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1288-370-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5084-377-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2172-393-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4224-415-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3064-420-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3580-497-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3172-515-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3364-521-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4396-537-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1548-544-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2424-560-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2900-567-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2100-583-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3776-692-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3032-809-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4712-861-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3312-884-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\9xfxlrx.exe family_berbew C:\nhntbh.exe family_berbew C:\jdvvv.exe family_berbew C:\djdvv.exe family_berbew C:\3xxrllf.exe family_berbew \??\c:\ddjdp.exe family_berbew C:\hntnhh.exe family_berbew C:\xrrxrlf.exe family_berbew C:\fxfxllx.exe family_berbew C:\hhhbtt.exe family_berbew \??\c:\pjvvv.exe family_berbew C:\dvvvp.exe family_berbew C:\flxxrfx.exe family_berbew C:\vvdvp.exe family_berbew C:\xxxrlfx.exe family_berbew C:\nnhhbt.exe family_berbew C:\dddvj.exe family_berbew C:\xrlffff.exe family_berbew C:\tnhhbh.exe family_berbew \??\c:\dvdvd.exe family_berbew C:\flxxxxf.exe family_berbew C:\3jvpj.exe family_berbew C:\xrrlxxx.exe family_berbew \??\c:\9fffrrl.exe family_berbew C:\1hhbhh.exe family_berbew \??\c:\ddjdd.exe family_berbew C:\rrffrxl.exe family_berbew \??\c:\xrlfffx.exe family_berbew C:\tnthhb.exe family_berbew \??\c:\pdpjj.exe family_berbew \??\c:\9rfxrrr.exe family_berbew \??\c:\rxxrflf.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
9xfxlrx.exenhntbh.exejdvvv.exedjdvv.exeddjdp.exe3xxrllf.exehntnhh.exexrrxrlf.exefxfxllx.exehhhbtt.exepjvvv.exedvvvp.exeflxxrfx.exevvdvp.exexxxrlfx.exennhhbt.exedddvj.exexrlffff.exetnhhbh.exedvdvd.exeflxxxxf.exe3jvpj.exexrrlxxx.exe9fffrrl.exe1hhbhh.exeddjdd.exerrffrxl.exexrlfffx.exetnthhb.exepdpjj.exe9rfxrrr.exerxxrflf.exe9ppvd.exepjvpp.exexlxrlff.exe3nbtnt.exedvvpj.exefxffrlr.exelfflfll.exethhbhb.exe3jvpp.exefrxxrxx.exebththt.exe5djdd.exerxxxrrl.exehtbbbb.exehntbnb.exedpvvv.exelflfxxr.exenbbbbn.exehbhbtt.exedvvpd.exe1fxrxxf.exenbbttt.exedvpjv.exedjppj.exexfrlxrl.exennbbhb.exetthtnh.exe3pvvp.exevvdjd.exe7fxrffx.exetthnhh.exedvvjv.exepid process 2280 9xfxlrx.exe 1284 nhntbh.exe 456 jdvvv.exe 1096 djdvv.exe 3192 ddjdp.exe 2996 3xxrllf.exe 2876 hntnhh.exe 2732 xrrxrlf.exe 2464 fxfxllx.exe 3944 hhhbtt.exe 4716 pjvvv.exe 2132 dvvvp.exe 1600 flxxrfx.exe 2492 vvdvp.exe 4488 xxxrlfx.exe 4628 nnhhbt.exe 2524 dddvj.exe 4092 xrlffff.exe 2644 tnhhbh.exe 2912 dvdvd.exe 2652 flxxxxf.exe 440 3jvpj.exe 4480 xrrlxxx.exe 3524 9fffrrl.exe 4912 1hhbhh.exe 4364 ddjdd.exe 1092 rrffrxl.exe 3832 xrlfffx.exe 3556 tnthhb.exe 2444 pdpjj.exe 4960 9rfxrrr.exe 2320 rxxrflf.exe 1396 9ppvd.exe 3100 pjvpp.exe 4120 xlxrlff.exe 4496 3nbtnt.exe 1080 dvvpj.exe 116 fxffrlr.exe 2344 lfflfll.exe 4396 thhbhb.exe 1868 3jvpp.exe 2280 frxxrxx.exe 752 bththt.exe 1020 5djdd.exe 1548 rxxxrrl.exe 4864 htbbbb.exe 1928 hntbnb.exe 2996 dpvvv.exe 1380 lflfxxr.exe 1368 nbbbbn.exe 1972 hbhbtt.exe 4848 dvvpd.exe 2180 1fxrxxf.exe 5068 nbbttt.exe 2132 dvpjv.exe 60 djppj.exe 1600 xfrlxrl.exe 964 nnbbhb.exe 4188 tthtnh.exe 4492 3pvvp.exe 4612 vvdjd.exe 2980 7fxrffx.exe 4576 tthnhh.exe 1960 dvvjv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe9xfxlrx.exenhntbh.exejdvvv.exedjdvv.exeddjdp.exe3xxrllf.exehntnhh.exexrrxrlf.exefxfxllx.exehhhbtt.exepjvvv.exedvvvp.exeflxxrfx.exevvdvp.exexxxrlfx.exennhhbt.exedddvj.exexrlffff.exetnhhbh.exedvdvd.exeflxxxxf.exedescription pid process target process PID 1952 wrote to memory of 2280 1952 36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe 9xfxlrx.exe PID 1952 wrote to memory of 2280 1952 36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe 9xfxlrx.exe PID 1952 wrote to memory of 2280 1952 36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe 9xfxlrx.exe PID 2280 wrote to memory of 1284 2280 9xfxlrx.exe nhntbh.exe PID 2280 wrote to memory of 1284 2280 9xfxlrx.exe nhntbh.exe PID 2280 wrote to memory of 1284 2280 9xfxlrx.exe nhntbh.exe PID 1284 wrote to memory of 456 1284 nhntbh.exe jdvvv.exe PID 1284 wrote to memory of 456 1284 nhntbh.exe jdvvv.exe PID 1284 wrote to memory of 456 1284 nhntbh.exe jdvvv.exe PID 456 wrote to memory of 1096 456 jdvvv.exe djdvv.exe PID 456 wrote to memory of 1096 456 jdvvv.exe djdvv.exe PID 456 wrote to memory of 1096 456 jdvvv.exe djdvv.exe PID 1096 wrote to memory of 3192 1096 djdvv.exe ddjdp.exe PID 1096 wrote to memory of 3192 1096 djdvv.exe ddjdp.exe PID 1096 wrote to memory of 3192 1096 djdvv.exe ddjdp.exe PID 3192 wrote to memory of 2996 3192 ddjdp.exe 3xxrllf.exe PID 3192 wrote to memory of 2996 3192 ddjdp.exe 3xxrllf.exe PID 3192 wrote to memory of 2996 3192 ddjdp.exe 3xxrllf.exe PID 2996 wrote to memory of 2876 2996 3xxrllf.exe hntnhh.exe PID 2996 wrote to memory of 2876 2996 3xxrllf.exe hntnhh.exe PID 2996 wrote to memory of 2876 2996 3xxrllf.exe hntnhh.exe PID 2876 wrote to memory of 2732 2876 hntnhh.exe xrrxrlf.exe PID 2876 wrote to memory of 2732 2876 hntnhh.exe xrrxrlf.exe PID 2876 wrote to memory of 2732 2876 hntnhh.exe xrrxrlf.exe PID 2732 wrote to memory of 2464 2732 xrrxrlf.exe fxfxllx.exe PID 2732 wrote to memory of 2464 2732 xrrxrlf.exe fxfxllx.exe PID 2732 wrote to memory of 2464 2732 xrrxrlf.exe fxfxllx.exe PID 2464 wrote to memory of 3944 2464 fxfxllx.exe hhhbtt.exe PID 2464 wrote to memory of 3944 2464 fxfxllx.exe hhhbtt.exe PID 2464 wrote to memory of 3944 2464 fxfxllx.exe hhhbtt.exe PID 3944 wrote to memory of 4716 3944 hhhbtt.exe pjvvv.exe PID 3944 wrote to memory of 4716 3944 hhhbtt.exe pjvvv.exe PID 3944 wrote to memory of 4716 3944 hhhbtt.exe pjvvv.exe PID 4716 wrote to memory of 2132 4716 pjvvv.exe dvvvp.exe PID 4716 wrote to memory of 2132 4716 pjvvv.exe dvvvp.exe PID 4716 wrote to memory of 2132 4716 pjvvv.exe dvvvp.exe PID 2132 wrote to memory of 1600 2132 dvvvp.exe flxxrfx.exe PID 2132 wrote to memory of 1600 2132 dvvvp.exe flxxrfx.exe PID 2132 wrote to memory of 1600 2132 dvvvp.exe flxxrfx.exe PID 1600 wrote to memory of 2492 1600 flxxrfx.exe vvdvp.exe PID 1600 wrote to memory of 2492 1600 flxxrfx.exe vvdvp.exe PID 1600 wrote to memory of 2492 1600 flxxrfx.exe vvdvp.exe PID 2492 wrote to memory of 4488 2492 vvdvp.exe xxxrlfx.exe PID 2492 wrote to memory of 4488 2492 vvdvp.exe xxxrlfx.exe PID 2492 wrote to memory of 4488 2492 vvdvp.exe xxxrlfx.exe PID 4488 wrote to memory of 4628 4488 xxxrlfx.exe nnhhbt.exe PID 4488 wrote to memory of 4628 4488 xxxrlfx.exe nnhhbt.exe PID 4488 wrote to memory of 4628 4488 xxxrlfx.exe nnhhbt.exe PID 4628 wrote to memory of 2524 4628 nnhhbt.exe dddvj.exe PID 4628 wrote to memory of 2524 4628 nnhhbt.exe dddvj.exe PID 4628 wrote to memory of 2524 4628 nnhhbt.exe dddvj.exe PID 2524 wrote to memory of 4092 2524 dddvj.exe xrlffff.exe PID 2524 wrote to memory of 4092 2524 dddvj.exe xrlffff.exe PID 2524 wrote to memory of 4092 2524 dddvj.exe xrlffff.exe PID 4092 wrote to memory of 2644 4092 xrlffff.exe tnhhbh.exe PID 4092 wrote to memory of 2644 4092 xrlffff.exe tnhhbh.exe PID 4092 wrote to memory of 2644 4092 xrlffff.exe tnhhbh.exe PID 2644 wrote to memory of 2912 2644 tnhhbh.exe dvdvd.exe PID 2644 wrote to memory of 2912 2644 tnhhbh.exe dvdvd.exe PID 2644 wrote to memory of 2912 2644 tnhhbh.exe dvdvd.exe PID 2912 wrote to memory of 2652 2912 dvdvd.exe flxxxxf.exe PID 2912 wrote to memory of 2652 2912 dvdvd.exe flxxxxf.exe PID 2912 wrote to memory of 2652 2912 dvdvd.exe flxxxxf.exe PID 2652 wrote to memory of 440 2652 flxxxxf.exe 3jvpj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\36d9c312f9edbdd59a47bd7a1b67f640_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\9xfxlrx.exec:\9xfxlrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhntbh.exec:\nhntbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvvv.exec:\jdvvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djdvv.exec:\djdvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddjdp.exec:\ddjdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3xxrllf.exec:\3xxrllf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hntnhh.exec:\hntnhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrxrlf.exec:\xrrxrlf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxfxllx.exec:\fxfxllx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhhbtt.exec:\hhhbtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvvv.exec:\pjvvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvvp.exec:\dvvvp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flxxrfx.exec:\flxxrfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvdvp.exec:\vvdvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxxrlfx.exec:\xxxrlfx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnhhbt.exec:\nnhhbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddvj.exec:\dddvj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrlffff.exec:\xrlffff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnhhbh.exec:\tnhhbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvdvd.exec:\dvdvd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flxxxxf.exec:\flxxxxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3jvpj.exec:\3jvpj.exe23⤵
- Executes dropped EXE
-
\??\c:\xrrlxxx.exec:\xrrlxxx.exe24⤵
- Executes dropped EXE
-
\??\c:\9fffrrl.exec:\9fffrrl.exe25⤵
- Executes dropped EXE
-
\??\c:\1hhbhh.exec:\1hhbhh.exe26⤵
- Executes dropped EXE
-
\??\c:\ddjdd.exec:\ddjdd.exe27⤵
- Executes dropped EXE
-
\??\c:\rrffrxl.exec:\rrffrxl.exe28⤵
- Executes dropped EXE
-
\??\c:\xrlfffx.exec:\xrlfffx.exe29⤵
- Executes dropped EXE
-
\??\c:\tnthhb.exec:\tnthhb.exe30⤵
- Executes dropped EXE
-
\??\c:\pdpjj.exec:\pdpjj.exe31⤵
- Executes dropped EXE
-
\??\c:\9rfxrrr.exec:\9rfxrrr.exe32⤵
- Executes dropped EXE
-
\??\c:\rxxrflf.exec:\rxxrflf.exe33⤵
- Executes dropped EXE
-
\??\c:\9ppvd.exec:\9ppvd.exe34⤵
- Executes dropped EXE
-
\??\c:\pjvpp.exec:\pjvpp.exe35⤵
- Executes dropped EXE
-
\??\c:\xlxrlff.exec:\xlxrlff.exe36⤵
- Executes dropped EXE
-
\??\c:\3nbtnt.exec:\3nbtnt.exe37⤵
- Executes dropped EXE
-
\??\c:\dvvpj.exec:\dvvpj.exe38⤵
- Executes dropped EXE
-
\??\c:\fxffrlr.exec:\fxffrlr.exe39⤵
- Executes dropped EXE
-
\??\c:\lfflfll.exec:\lfflfll.exe40⤵
- Executes dropped EXE
-
\??\c:\thhbhb.exec:\thhbhb.exe41⤵
- Executes dropped EXE
-
\??\c:\3jvpp.exec:\3jvpp.exe42⤵
- Executes dropped EXE
-
\??\c:\frxxrxx.exec:\frxxrxx.exe43⤵
- Executes dropped EXE
-
\??\c:\bththt.exec:\bththt.exe44⤵
- Executes dropped EXE
-
\??\c:\5djdd.exec:\5djdd.exe45⤵
- Executes dropped EXE
-
\??\c:\rxxxrrl.exec:\rxxxrrl.exe46⤵
- Executes dropped EXE
-
\??\c:\htbbbb.exec:\htbbbb.exe47⤵
- Executes dropped EXE
-
\??\c:\hntbnb.exec:\hntbnb.exe48⤵
- Executes dropped EXE
-
\??\c:\dpvvv.exec:\dpvvv.exe49⤵
- Executes dropped EXE
-
\??\c:\lflfxxr.exec:\lflfxxr.exe50⤵
- Executes dropped EXE
-
\??\c:\nbbbbn.exec:\nbbbbn.exe51⤵
- Executes dropped EXE
-
\??\c:\hbhbtt.exec:\hbhbtt.exe52⤵
- Executes dropped EXE
-
\??\c:\dvvpd.exec:\dvvpd.exe53⤵
- Executes dropped EXE
-
\??\c:\1fxrxxf.exec:\1fxrxxf.exe54⤵
- Executes dropped EXE
-
\??\c:\nbbttt.exec:\nbbttt.exe55⤵
- Executes dropped EXE
-
\??\c:\dvpjv.exec:\dvpjv.exe56⤵
- Executes dropped EXE
-
\??\c:\djppj.exec:\djppj.exe57⤵
- Executes dropped EXE
-
\??\c:\xfrlxrl.exec:\xfrlxrl.exe58⤵
- Executes dropped EXE
-
\??\c:\nnbbhb.exec:\nnbbhb.exe59⤵
- Executes dropped EXE
-
\??\c:\tthtnh.exec:\tthtnh.exe60⤵
- Executes dropped EXE
-
\??\c:\3pvvp.exec:\3pvvp.exe61⤵
- Executes dropped EXE
-
\??\c:\vvdjd.exec:\vvdjd.exe62⤵
- Executes dropped EXE
-
\??\c:\7fxrffx.exec:\7fxrffx.exe63⤵
- Executes dropped EXE
-
\??\c:\tthnhh.exec:\tthnhh.exe64⤵
- Executes dropped EXE
-
\??\c:\dvvjv.exec:\dvvjv.exe65⤵
- Executes dropped EXE
-
\??\c:\vvdpj.exec:\vvdpj.exe66⤵
-
\??\c:\xrrlxxx.exec:\xrrlxxx.exe67⤵
-
\??\c:\9ttnhh.exec:\9ttnhh.exe68⤵
-
\??\c:\bthbnt.exec:\bthbnt.exe69⤵
-
\??\c:\vpvvp.exec:\vpvvp.exe70⤵
-
\??\c:\xrxlllr.exec:\xrxlllr.exe71⤵
-
\??\c:\rlxlfff.exec:\rlxlfff.exe72⤵
-
\??\c:\hnbbtt.exec:\hnbbtt.exe73⤵
-
\??\c:\pjdvv.exec:\pjdvv.exe74⤵
-
\??\c:\vvddp.exec:\vvddp.exe75⤵
-
\??\c:\xfffxxx.exec:\xfffxxx.exe76⤵
-
\??\c:\hhnnbb.exec:\hhnnbb.exe77⤵
-
\??\c:\bbnhbb.exec:\bbnhbb.exe78⤵
-
\??\c:\pjpjp.exec:\pjpjp.exe79⤵
-
\??\c:\lxrrlrr.exec:\lxrrlrr.exe80⤵
-
\??\c:\frxflrx.exec:\frxflrx.exe81⤵
-
\??\c:\bbhnnn.exec:\bbhnnn.exe82⤵
-
\??\c:\hbbbhb.exec:\hbbbhb.exe83⤵
-
\??\c:\dvjjv.exec:\dvjjv.exe84⤵
-
\??\c:\7rfxlfx.exec:\7rfxlfx.exe85⤵
-
\??\c:\nhhhbh.exec:\nhhhbh.exe86⤵
-
\??\c:\tthhhn.exec:\tthhhn.exe87⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe88⤵
-
\??\c:\1frlxxr.exec:\1frlxxr.exe89⤵
-
\??\c:\hnhhhh.exec:\hnhhhh.exe90⤵
-
\??\c:\vjvpd.exec:\vjvpd.exe91⤵
-
\??\c:\dpvvd.exec:\dpvvd.exe92⤵
-
\??\c:\nnthht.exec:\nnthht.exe93⤵
-
\??\c:\pvppv.exec:\pvppv.exe94⤵
-
\??\c:\ppvvv.exec:\ppvvv.exe95⤵
-
\??\c:\xrfflll.exec:\xrfflll.exe96⤵
-
\??\c:\rrxflrf.exec:\rrxflrf.exe97⤵
-
\??\c:\hhtbbb.exec:\hhtbbb.exe98⤵
-
\??\c:\3hhnhh.exec:\3hhnhh.exe99⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe100⤵
-
\??\c:\rrrlfrr.exec:\rrrlfrr.exe101⤵
-
\??\c:\lrxrlrr.exec:\lrxrlrr.exe102⤵
-
\??\c:\hbhnnn.exec:\hbhnnn.exe103⤵
-
\??\c:\vpddv.exec:\vpddv.exe104⤵
-
\??\c:\llffxfr.exec:\llffxfr.exe105⤵
-
\??\c:\lxlllll.exec:\lxlllll.exe106⤵
-
\??\c:\hbhhhh.exec:\hbhhhh.exe107⤵
-
\??\c:\bhbhnn.exec:\bhbhnn.exe108⤵
-
\??\c:\3vvjv.exec:\3vvjv.exe109⤵
-
\??\c:\5rxrllf.exec:\5rxrllf.exe110⤵
-
\??\c:\lrrfxfx.exec:\lrrfxfx.exe111⤵
-
\??\c:\hbttnt.exec:\hbttnt.exe112⤵
-
\??\c:\5bbbnh.exec:\5bbbnh.exe113⤵
-
\??\c:\vvjjp.exec:\vvjjp.exe114⤵
-
\??\c:\pdpvv.exec:\pdpvv.exe115⤵
-
\??\c:\rxlrrxx.exec:\rxlrrxx.exe116⤵
-
\??\c:\9hhhbb.exec:\9hhhbb.exe117⤵
-
\??\c:\btttbh.exec:\btttbh.exe118⤵
-
\??\c:\jjjdp.exec:\jjjdp.exe119⤵
-
\??\c:\lfllrrl.exec:\lfllrrl.exe120⤵
-
\??\c:\rrxflfr.exec:\rrxflfr.exe121⤵
-
\??\c:\httbth.exec:\httbth.exe122⤵
-
\??\c:\jdpdp.exec:\jdpdp.exe123⤵
-
\??\c:\5djpv.exec:\5djpv.exe124⤵
-
\??\c:\xrlfflf.exec:\xrlfflf.exe125⤵
-
\??\c:\hnhbnh.exec:\hnhbnh.exe126⤵
-
\??\c:\hbnbtt.exec:\hbnbtt.exe127⤵
-
\??\c:\ddpjp.exec:\ddpjp.exe128⤵
-
\??\c:\pppvj.exec:\pppvj.exe129⤵
-
\??\c:\fxfxrrx.exec:\fxfxrrx.exe130⤵
-
\??\c:\nhttbb.exec:\nhttbb.exe131⤵
-
\??\c:\9hnhbb.exec:\9hnhbb.exe132⤵
-
\??\c:\dpjvp.exec:\dpjvp.exe133⤵
-
\??\c:\rlrrxxr.exec:\rlrrxxr.exe134⤵
-
\??\c:\7bhtbt.exec:\7bhtbt.exe135⤵
-
\??\c:\ntnhhh.exec:\ntnhhh.exe136⤵
-
\??\c:\pvddd.exec:\pvddd.exe137⤵
-
\??\c:\lffrlrr.exec:\lffrlrr.exe138⤵
-
\??\c:\7xrrlll.exec:\7xrrlll.exe139⤵
-
\??\c:\5bbbtt.exec:\5bbbtt.exe140⤵
-
\??\c:\pjjjd.exec:\pjjjd.exe141⤵
-
\??\c:\1pppj.exec:\1pppj.exe142⤵
-
\??\c:\rfllfff.exec:\rfllfff.exe143⤵
-
\??\c:\rrxrxxf.exec:\rrxrxxf.exe144⤵
-
\??\c:\hbbbtn.exec:\hbbbtn.exe145⤵
-
\??\c:\bhhhtt.exec:\bhhhtt.exe146⤵
-
\??\c:\lflffff.exec:\lflffff.exe147⤵
-
\??\c:\flrllll.exec:\flrllll.exe148⤵
-
\??\c:\tnhhbb.exec:\tnhhbb.exe149⤵
-
\??\c:\vjppd.exec:\vjppd.exe150⤵
-
\??\c:\xflllll.exec:\xflllll.exe151⤵
-
\??\c:\lflfffx.exec:\lflfffx.exe152⤵
-
\??\c:\1nhhtt.exec:\1nhhtt.exe153⤵
-
\??\c:\djjdv.exec:\djjdv.exe154⤵
-
\??\c:\7jjvj.exec:\7jjvj.exe155⤵
-
\??\c:\lffxrrr.exec:\lffxrrr.exe156⤵
-
\??\c:\hnbbtt.exec:\hnbbtt.exe157⤵
-
\??\c:\tnbtnb.exec:\tnbtnb.exe158⤵
-
\??\c:\vdvvj.exec:\vdvvj.exe159⤵
-
\??\c:\7xfxllf.exec:\7xfxllf.exe160⤵
-
\??\c:\xfrrllr.exec:\xfrrllr.exe161⤵
-
\??\c:\tnnnhh.exec:\tnnnhh.exe162⤵
-
\??\c:\pjvdd.exec:\pjvdd.exe163⤵
-
\??\c:\ppjdd.exec:\ppjdd.exe164⤵
-
\??\c:\llrlfff.exec:\llrlfff.exe165⤵
-
\??\c:\xrrffff.exec:\xrrffff.exe166⤵
-
\??\c:\tntnnh.exec:\tntnnh.exe167⤵
-
\??\c:\5dvvj.exec:\5dvvj.exe168⤵
-
\??\c:\ddjjj.exec:\ddjjj.exe169⤵
-
\??\c:\xxxxffl.exec:\xxxxffl.exe170⤵
-
\??\c:\lrfrrrx.exec:\lrfrrrx.exe171⤵
-
\??\c:\tbnhhn.exec:\tbnhhn.exe172⤵
-
\??\c:\pjjdj.exec:\pjjdj.exe173⤵
-
\??\c:\rfrrrlr.exec:\rfrrrlr.exe174⤵
-
\??\c:\3lflfrl.exec:\3lflfrl.exe175⤵
-
\??\c:\dpvvp.exec:\dpvvp.exe176⤵
-
\??\c:\lrlxrlx.exec:\lrlxrlx.exe177⤵
-
\??\c:\lffffrr.exec:\lffffrr.exe178⤵
-
\??\c:\flxxrxr.exec:\flxxrxr.exe179⤵
-
\??\c:\thnttt.exec:\thnttt.exe180⤵
-
\??\c:\jvddv.exec:\jvddv.exe181⤵
-
\??\c:\fxflffx.exec:\fxflffx.exe182⤵
-
\??\c:\flxffff.exec:\flxffff.exe183⤵
-
\??\c:\bthbtt.exec:\bthbtt.exe184⤵
-
\??\c:\vvdvp.exec:\vvdvp.exe185⤵
-
\??\c:\rffxrff.exec:\rffxrff.exe186⤵
-
\??\c:\3xfxxxr.exec:\3xfxxxr.exe187⤵
-
\??\c:\1bbttb.exec:\1bbttb.exe188⤵
-
\??\c:\3tbnhh.exec:\3tbnhh.exe189⤵
-
\??\c:\vdjdd.exec:\vdjdd.exe190⤵
-
\??\c:\lfxrrll.exec:\lfxrrll.exe191⤵
-
\??\c:\xllllll.exec:\xllllll.exe192⤵
-
\??\c:\9nhttn.exec:\9nhttn.exe193⤵
-
\??\c:\nthbnn.exec:\nthbnn.exe194⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe195⤵
-
\??\c:\5lrrxfr.exec:\5lrrxfr.exe196⤵
-
\??\c:\1xxxxxr.exec:\1xxxxxr.exe197⤵
-
\??\c:\ttttnn.exec:\ttttnn.exe198⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe199⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe200⤵
-
\??\c:\1xfrlfx.exec:\1xfrlfx.exe201⤵
-
\??\c:\flllfff.exec:\flllfff.exe202⤵
-
\??\c:\hthhbb.exec:\hthhbb.exe203⤵
-
\??\c:\thtbbh.exec:\thtbbh.exe204⤵
-
\??\c:\jjvvd.exec:\jjvvd.exe205⤵
-
\??\c:\jjppj.exec:\jjppj.exe206⤵
-
\??\c:\3xxxrxx.exec:\3xxxrxx.exe207⤵
-
\??\c:\hhnttt.exec:\hhnttt.exe208⤵
-
\??\c:\vjpvv.exec:\vjpvv.exe209⤵
-
\??\c:\flrllll.exec:\flrllll.exe210⤵
-
\??\c:\rrlffff.exec:\rrlffff.exe211⤵
-
\??\c:\lffxxxr.exec:\lffxxxr.exe212⤵
-
\??\c:\xrxxxxx.exec:\xrxxxxx.exe213⤵
-
\??\c:\7bnttt.exec:\7bnttt.exe214⤵
-
\??\c:\vjdvv.exec:\vjdvv.exe215⤵
-
\??\c:\djjjd.exec:\djjjd.exe216⤵
-
\??\c:\xlfxrxr.exec:\xlfxrxr.exe217⤵
-
\??\c:\nbnhhn.exec:\nbnhhn.exe218⤵
-
\??\c:\nnbbbb.exec:\nnbbbb.exe219⤵
-
\??\c:\jpjdv.exec:\jpjdv.exe220⤵
-
\??\c:\3jpjp.exec:\3jpjp.exe221⤵
-
\??\c:\rlffxxf.exec:\rlffxxf.exe222⤵
-
\??\c:\rxxxxxx.exec:\rxxxxxx.exe223⤵
-
\??\c:\7bbnhb.exec:\7bbnhb.exe224⤵
-
\??\c:\bbbttt.exec:\bbbttt.exe225⤵
-
\??\c:\dpvvv.exec:\dpvvv.exe226⤵
-
\??\c:\3dvvj.exec:\3dvvj.exe227⤵
-
\??\c:\xxxlflf.exec:\xxxlflf.exe228⤵
-
\??\c:\hthnnn.exec:\hthnnn.exe229⤵
-
\??\c:\jjvvj.exec:\jjvvj.exe230⤵
-
\??\c:\lflfrrx.exec:\lflfrrx.exe231⤵
-
\??\c:\lrfxxxx.exec:\lrfxxxx.exe232⤵
-
\??\c:\5hnhbh.exec:\5hnhbh.exe233⤵
-
\??\c:\bbnnhh.exec:\bbnnhh.exe234⤵
-
\??\c:\jpjvd.exec:\jpjvd.exe235⤵
-
\??\c:\jjpjj.exec:\jjpjj.exe236⤵
-
\??\c:\flrllfx.exec:\flrllfx.exe237⤵
-
\??\c:\7xrrflf.exec:\7xrrflf.exe238⤵
-
\??\c:\hhbhnn.exec:\hhbhnn.exe239⤵
-
\??\c:\vpppj.exec:\vpppj.exe240⤵
-
\??\c:\ppddv.exec:\ppddv.exe241⤵