Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 08:15
Behavioral task
behavioral1
Sample
4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe
-
Size
190KB
-
MD5
4af8c1d0f2b8f768e83295104e18bd30
-
SHA1
a68a3c55f49efa66834e67da5b57ca2b08890d24
-
SHA256
19269998dc620b5d4b7e33c3be75464240bbb8f8db4fd652d79e4d3d4f4c9861
-
SHA512
43a5c4afec54e61c7ec42876cff0aed3f26dc5fc5759d3caf40050efa24e0a61fe68eb4cefba1a824f89145b244a2d3fb70c52709d8aff52533c295601a1ec7c
-
SSDEEP
3072:YhOmTsF93UYfwC6GIoutLmxHxae5yLpcgDE4JBuItR8pTsgnKbQFe3+Ly:Ycm4FmowdHoSLEaTBftapTsyFeOu
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/5092-7-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3236-6-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2992-19-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1776-20-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2372-26-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4356-42-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1072-43-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/440-53-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3880-55-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5048-65-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3800-81-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2396-88-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4868-94-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1460-106-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1888-116-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1020-122-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3212-125-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2140-133-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1304-140-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4152-148-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2580-154-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1968-170-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3744-187-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2740-183-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3128-191-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5056-194-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5056-198-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4048-202-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4504-206-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1492-214-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2560-218-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3288-223-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1820-233-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3160-243-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2160-247-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5048-260-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4436-264-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/760-272-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2116-285-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2712-299-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3464-307-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3212-313-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1192-317-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3088-321-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/332-324-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/208-333-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3668-343-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1416-350-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5060-354-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4284-372-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2776-382-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5108-398-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3488-447-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4540-456-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4040-481-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1424-492-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1672-497-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3212-614-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4476-623-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4232-628-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1820-682-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4464-774-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3520-876-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4964-1015-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 32 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \??\c:\nbtnhb.exe family_berbew C:\1vjvp.exe family_berbew C:\hnnbnt.exe family_berbew \??\c:\dpjvj.exe family_berbew \??\c:\pjdpp.exe family_berbew C:\lflrlxl.exe family_berbew C:\jvpvv.exe family_berbew C:\vvvpj.exe family_berbew C:\9bbbnh.exe family_berbew C:\ppddv.exe family_berbew C:\rrxlflf.exe family_berbew C:\nbtbnb.exe family_berbew C:\jjpjd.exe family_berbew C:\5xffrxr.exe family_berbew C:\dvvvv.exe family_berbew C:\rlrflfr.exe family_berbew \??\c:\dpdpj.exe family_berbew C:\dvpjj.exe family_berbew \??\c:\ffrxflr.exe family_berbew C:\tbtnnt.exe family_berbew C:\pvvdv.exe family_berbew C:\xlxrllf.exe family_berbew C:\tttttt.exe family_berbew C:\1vdvp.exe family_berbew C:\xfrxfll.exe family_berbew C:\nbnnhh.exe family_berbew \??\c:\vjpvv.exe family_berbew C:\fflllrf.exe family_berbew C:\bbnnhh.exe family_berbew C:\dvvpv.exe family_berbew \??\c:\lxfxxxr.exe family_berbew C:\tbhhbb.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
nbtnhb.exe1vjvp.exehnnbnt.exedpjvj.exepjdpp.exelflrlxl.exejvpvv.exevvvpj.exe9bbbnh.exeppddv.exerrxlflf.exenbtbnb.exejjpjd.exe5xffrxr.exedvvvv.exerlrflfr.exedpdpj.exedvpjj.exeffrxflr.exetbtnnt.exepvvdv.exexlxrllf.exetttttt.exe1vdvp.exexfrxfll.exenbnnhh.exevjpvv.exefflllrf.exebbnnhh.exedvvpv.exelxfxxxr.exetbhhbb.exefxxxrfx.exevjppj.exefflllfx.exentttbh.exedjppv.exellllllr.exerrlxxxx.exebnhhtt.exedpddv.exexlrrlrr.exerrxrfll.exenhhhbb.exejpdjv.exerlllxxr.exe5tbtnn.exe3tnnbb.exepjdpv.exerrrllll.exelflfxxr.exehnhhbb.exeppvpj.exelfrfllf.exehhbnht.exenntbtb.exejjpjd.exellxrllx.exeffrlfll.exennhnnn.exehhnhht.exejdjdv.exe7ffrxfx.exe3bnhhh.exepid process 5092 nbtnhb.exe 2992 1vjvp.exe 1776 hnnbnt.exe 2372 dpjvj.exe 5100 pjdpp.exe 4356 lflrlxl.exe 1072 jvpvv.exe 440 vvvpj.exe 3880 9bbbnh.exe 5048 ppddv.exe 2496 rrxlflf.exe 3148 nbtbnb.exe 3800 jjpjd.exe 2396 5xffrxr.exe 4868 dvvvv.exe 5028 rlrflfr.exe 1460 dpdpj.exe 1620 dvpjj.exe 1888 ffrxflr.exe 1020 tbtnnt.exe 3212 pvvdv.exe 2140 xlxrllf.exe 1304 tttttt.exe 3520 1vdvp.exe 4152 xfrxfll.exe 2580 nbnnhh.exe 1696 vjpvv.exe 4948 fflllrf.exe 1968 bbnnhh.exe 3172 dvvpv.exe 2740 lxfxxxr.exe 3744 tbhhbb.exe 3128 fxxxrfx.exe 5056 vjppj.exe 4048 fflllfx.exe 4504 ntttbh.exe 532 djppv.exe 4488 llllllr.exe 1492 rrlxxxx.exe 2560 bnhhtt.exe 3288 dpddv.exe 3876 xlrrlrr.exe 4460 rrxrfll.exe 1820 nhhhbb.exe 1908 jpdjv.exe 1768 rlllxxr.exe 972 5tbtnn.exe 3160 3tnnbb.exe 2160 pjdpv.exe 5064 rrrllll.exe 4072 lflfxxr.exe 5048 hnhhbb.exe 4436 ppvpj.exe 3692 lfrfllf.exe 760 hhbnht.exe 1284 nntbtb.exe 4648 jjpjd.exe 1656 llxrllx.exe 2116 ffrlfll.exe 5096 nnhnnn.exe 1612 hhnhht.exe 4880 jdjdv.exe 4684 7ffrxfx.exe 2712 3bnhhh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exenbtnhb.exe1vjvp.exehnnbnt.exedpjvj.exepjdpp.exelflrlxl.exejvpvv.exevvvpj.exe9bbbnh.exeppddv.exerrxlflf.exenbtbnb.exejjpjd.exe5xffrxr.exedvvvv.exerlrflfr.exedpdpj.exedvpjj.exeffrxflr.exetbtnnt.exepvvdv.exedescription pid process target process PID 3236 wrote to memory of 5092 3236 4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe nbtnhb.exe PID 3236 wrote to memory of 5092 3236 4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe nbtnhb.exe PID 3236 wrote to memory of 5092 3236 4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe nbtnhb.exe PID 5092 wrote to memory of 2992 5092 nbtnhb.exe 1vjvp.exe PID 5092 wrote to memory of 2992 5092 nbtnhb.exe 1vjvp.exe PID 5092 wrote to memory of 2992 5092 nbtnhb.exe 1vjvp.exe PID 2992 wrote to memory of 1776 2992 1vjvp.exe hnnbnt.exe PID 2992 wrote to memory of 1776 2992 1vjvp.exe hnnbnt.exe PID 2992 wrote to memory of 1776 2992 1vjvp.exe hnnbnt.exe PID 1776 wrote to memory of 2372 1776 hnnbnt.exe dpjvj.exe PID 1776 wrote to memory of 2372 1776 hnnbnt.exe dpjvj.exe PID 1776 wrote to memory of 2372 1776 hnnbnt.exe dpjvj.exe PID 2372 wrote to memory of 5100 2372 dpjvj.exe pjdpp.exe PID 2372 wrote to memory of 5100 2372 dpjvj.exe pjdpp.exe PID 2372 wrote to memory of 5100 2372 dpjvj.exe pjdpp.exe PID 5100 wrote to memory of 4356 5100 pjdpp.exe lflrlxl.exe PID 5100 wrote to memory of 4356 5100 pjdpp.exe lflrlxl.exe PID 5100 wrote to memory of 4356 5100 pjdpp.exe lflrlxl.exe PID 4356 wrote to memory of 1072 4356 lflrlxl.exe jvpvv.exe PID 4356 wrote to memory of 1072 4356 lflrlxl.exe jvpvv.exe PID 4356 wrote to memory of 1072 4356 lflrlxl.exe jvpvv.exe PID 1072 wrote to memory of 440 1072 jvpvv.exe vvvpj.exe PID 1072 wrote to memory of 440 1072 jvpvv.exe vvvpj.exe PID 1072 wrote to memory of 440 1072 jvpvv.exe vvvpj.exe PID 440 wrote to memory of 3880 440 vvvpj.exe 9bbbnh.exe PID 440 wrote to memory of 3880 440 vvvpj.exe 9bbbnh.exe PID 440 wrote to memory of 3880 440 vvvpj.exe 9bbbnh.exe PID 3880 wrote to memory of 5048 3880 9bbbnh.exe ppddv.exe PID 3880 wrote to memory of 5048 3880 9bbbnh.exe ppddv.exe PID 3880 wrote to memory of 5048 3880 9bbbnh.exe ppddv.exe PID 5048 wrote to memory of 2496 5048 ppddv.exe rrxlflf.exe PID 5048 wrote to memory of 2496 5048 ppddv.exe rrxlflf.exe PID 5048 wrote to memory of 2496 5048 ppddv.exe rrxlflf.exe PID 2496 wrote to memory of 3148 2496 rrxlflf.exe nbtbnb.exe PID 2496 wrote to memory of 3148 2496 rrxlflf.exe nbtbnb.exe PID 2496 wrote to memory of 3148 2496 rrxlflf.exe nbtbnb.exe PID 3148 wrote to memory of 3800 3148 nbtbnb.exe jjpjd.exe PID 3148 wrote to memory of 3800 3148 nbtbnb.exe jjpjd.exe PID 3148 wrote to memory of 3800 3148 nbtbnb.exe jjpjd.exe PID 3800 wrote to memory of 2396 3800 jjpjd.exe 5xffrxr.exe PID 3800 wrote to memory of 2396 3800 jjpjd.exe 5xffrxr.exe PID 3800 wrote to memory of 2396 3800 jjpjd.exe 5xffrxr.exe PID 2396 wrote to memory of 4868 2396 5xffrxr.exe dvvvv.exe PID 2396 wrote to memory of 4868 2396 5xffrxr.exe dvvvv.exe PID 2396 wrote to memory of 4868 2396 5xffrxr.exe dvvvv.exe PID 4868 wrote to memory of 5028 4868 dvvvv.exe rlrflfr.exe PID 4868 wrote to memory of 5028 4868 dvvvv.exe rlrflfr.exe PID 4868 wrote to memory of 5028 4868 dvvvv.exe rlrflfr.exe PID 5028 wrote to memory of 1460 5028 rlrflfr.exe dpdpj.exe PID 5028 wrote to memory of 1460 5028 rlrflfr.exe dpdpj.exe PID 5028 wrote to memory of 1460 5028 rlrflfr.exe dpdpj.exe PID 1460 wrote to memory of 1620 1460 dpdpj.exe dvpjj.exe PID 1460 wrote to memory of 1620 1460 dpdpj.exe dvpjj.exe PID 1460 wrote to memory of 1620 1460 dpdpj.exe dvpjj.exe PID 1620 wrote to memory of 1888 1620 dvpjj.exe ffrxflr.exe PID 1620 wrote to memory of 1888 1620 dvpjj.exe ffrxflr.exe PID 1620 wrote to memory of 1888 1620 dvpjj.exe ffrxflr.exe PID 1888 wrote to memory of 1020 1888 ffrxflr.exe tbtnnt.exe PID 1888 wrote to memory of 1020 1888 ffrxflr.exe tbtnnt.exe PID 1888 wrote to memory of 1020 1888 ffrxflr.exe tbtnnt.exe PID 1020 wrote to memory of 3212 1020 tbtnnt.exe pvvdv.exe PID 1020 wrote to memory of 3212 1020 tbtnnt.exe pvvdv.exe PID 1020 wrote to memory of 3212 1020 tbtnnt.exe pvvdv.exe PID 3212 wrote to memory of 2140 3212 pvvdv.exe xlxrllf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4af8c1d0f2b8f768e83295104e18bd30_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\nbtnhb.exec:\nbtnhb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1vjvp.exec:\1vjvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnnbnt.exec:\hnnbnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpjvj.exec:\dpjvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjdpp.exec:\pjdpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lflrlxl.exec:\lflrlxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvpvv.exec:\jvpvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvvpj.exec:\vvvpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9bbbnh.exec:\9bbbnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppddv.exec:\ppddv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrxlflf.exec:\rrxlflf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbtbnb.exec:\nbtbnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjpjd.exec:\jjpjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5xffrxr.exec:\5xffrxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvvv.exec:\dvvvv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlrflfr.exec:\rlrflfr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpdpj.exec:\dpdpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvpjj.exec:\dvpjj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffrxflr.exec:\ffrxflr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbtnnt.exec:\tbtnnt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvvdv.exec:\pvvdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxrllf.exec:\xlxrllf.exe23⤵
- Executes dropped EXE
-
\??\c:\tttttt.exec:\tttttt.exe24⤵
- Executes dropped EXE
-
\??\c:\1vdvp.exec:\1vdvp.exe25⤵
- Executes dropped EXE
-
\??\c:\xfrxfll.exec:\xfrxfll.exe26⤵
- Executes dropped EXE
-
\??\c:\nbnnhh.exec:\nbnnhh.exe27⤵
- Executes dropped EXE
-
\??\c:\vjpvv.exec:\vjpvv.exe28⤵
- Executes dropped EXE
-
\??\c:\fflllrf.exec:\fflllrf.exe29⤵
- Executes dropped EXE
-
\??\c:\bbnnhh.exec:\bbnnhh.exe30⤵
- Executes dropped EXE
-
\??\c:\dvvpv.exec:\dvvpv.exe31⤵
- Executes dropped EXE
-
\??\c:\lxfxxxr.exec:\lxfxxxr.exe32⤵
- Executes dropped EXE
-
\??\c:\tbhhbb.exec:\tbhhbb.exe33⤵
- Executes dropped EXE
-
\??\c:\fxxxrfx.exec:\fxxxrfx.exe34⤵
- Executes dropped EXE
-
\??\c:\vjppj.exec:\vjppj.exe35⤵
- Executes dropped EXE
-
\??\c:\fflllfx.exec:\fflllfx.exe36⤵
- Executes dropped EXE
-
\??\c:\ntttbh.exec:\ntttbh.exe37⤵
- Executes dropped EXE
-
\??\c:\djppv.exec:\djppv.exe38⤵
- Executes dropped EXE
-
\??\c:\llllllr.exec:\llllllr.exe39⤵
- Executes dropped EXE
-
\??\c:\rrlxxxx.exec:\rrlxxxx.exe40⤵
- Executes dropped EXE
-
\??\c:\bnhhtt.exec:\bnhhtt.exe41⤵
- Executes dropped EXE
-
\??\c:\dpddv.exec:\dpddv.exe42⤵
- Executes dropped EXE
-
\??\c:\xlrrlrr.exec:\xlrrlrr.exe43⤵
- Executes dropped EXE
-
\??\c:\rrxrfll.exec:\rrxrfll.exe44⤵
- Executes dropped EXE
-
\??\c:\nhhhbb.exec:\nhhhbb.exe45⤵
- Executes dropped EXE
-
\??\c:\jpdjv.exec:\jpdjv.exe46⤵
- Executes dropped EXE
-
\??\c:\rlllxxr.exec:\rlllxxr.exe47⤵
- Executes dropped EXE
-
\??\c:\5tbtnn.exec:\5tbtnn.exe48⤵
- Executes dropped EXE
-
\??\c:\3tnnbb.exec:\3tnnbb.exe49⤵
- Executes dropped EXE
-
\??\c:\pjdpv.exec:\pjdpv.exe50⤵
- Executes dropped EXE
-
\??\c:\rrrllll.exec:\rrrllll.exe51⤵
- Executes dropped EXE
-
\??\c:\lflfxxr.exec:\lflfxxr.exe52⤵
- Executes dropped EXE
-
\??\c:\hnhhbb.exec:\hnhhbb.exe53⤵
- Executes dropped EXE
-
\??\c:\ppvpj.exec:\ppvpj.exe54⤵
- Executes dropped EXE
-
\??\c:\lfrfllf.exec:\lfrfllf.exe55⤵
- Executes dropped EXE
-
\??\c:\hhbnht.exec:\hhbnht.exe56⤵
- Executes dropped EXE
-
\??\c:\nntbtb.exec:\nntbtb.exe57⤵
- Executes dropped EXE
-
\??\c:\jjpjd.exec:\jjpjd.exe58⤵
- Executes dropped EXE
-
\??\c:\llxrllx.exec:\llxrllx.exe59⤵
- Executes dropped EXE
-
\??\c:\ffrlfll.exec:\ffrlfll.exe60⤵
- Executes dropped EXE
-
\??\c:\nnhnnn.exec:\nnhnnn.exe61⤵
- Executes dropped EXE
-
\??\c:\hhnhht.exec:\hhnhht.exe62⤵
- Executes dropped EXE
-
\??\c:\jdjdv.exec:\jdjdv.exe63⤵
- Executes dropped EXE
-
\??\c:\7ffrxfx.exec:\7ffrxfx.exe64⤵
- Executes dropped EXE
-
\??\c:\3bnhhh.exec:\3bnhhh.exe65⤵
- Executes dropped EXE
-
\??\c:\pjpjd.exec:\pjpjd.exe66⤵
-
\??\c:\pjdpp.exec:\pjdpp.exe67⤵
-
\??\c:\7xfffff.exec:\7xfffff.exe68⤵
-
\??\c:\3tbnnt.exec:\3tbnnt.exe69⤵
-
\??\c:\pdppp.exec:\pdppp.exe70⤵
-
\??\c:\5pppd.exec:\5pppd.exe71⤵
-
\??\c:\rlffrrx.exec:\rlffrrx.exe72⤵
-
\??\c:\hhnhbb.exec:\hhnhbb.exe73⤵
-
\??\c:\ttbhtb.exec:\ttbhtb.exe74⤵
-
\??\c:\jvdjv.exec:\jvdjv.exe75⤵
-
\??\c:\jjjvj.exec:\jjjvj.exe76⤵
-
\??\c:\nhhbtn.exec:\nhhbtn.exe77⤵
-
\??\c:\nthhbt.exec:\nthhbt.exe78⤵
-
\??\c:\dpdpj.exec:\dpdpj.exe79⤵
-
\??\c:\pvpjj.exec:\pvpjj.exe80⤵
-
\??\c:\xlrxxxx.exec:\xlrxxxx.exe81⤵
-
\??\c:\bbbbtt.exec:\bbbbtt.exe82⤵
-
\??\c:\vddpp.exec:\vddpp.exe83⤵
-
\??\c:\vpvjd.exec:\vpvjd.exe84⤵
-
\??\c:\xlrlfff.exec:\xlrlfff.exe85⤵
-
\??\c:\btbbnn.exec:\btbbnn.exe86⤵
-
\??\c:\1hhnhn.exec:\1hhnhn.exe87⤵
-
\??\c:\jpvdv.exec:\jpvdv.exe88⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe89⤵
-
\??\c:\lrxfrxx.exec:\lrxfrxx.exe90⤵
-
\??\c:\xfflllf.exec:\xfflllf.exe91⤵
-
\??\c:\tnhbbb.exec:\tnhbbb.exe92⤵
-
\??\c:\nhbhhn.exec:\nhbhhn.exe93⤵
-
\??\c:\jpvvd.exec:\jpvvd.exe94⤵
-
\??\c:\7fllflx.exec:\7fllflx.exe95⤵
-
\??\c:\3xllfxx.exec:\3xllfxx.exe96⤵
-
\??\c:\bbtntt.exec:\bbtntt.exe97⤵
-
\??\c:\tttnhh.exec:\tttnhh.exe98⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe99⤵
-
\??\c:\rlxrlxl.exec:\rlxrlxl.exe100⤵
-
\??\c:\hbhbtt.exec:\hbhbtt.exe101⤵
-
\??\c:\dvdjj.exec:\dvdjj.exe102⤵
-
\??\c:\rlxrlll.exec:\rlxrlll.exe103⤵
-
\??\c:\rlllfff.exec:\rlllfff.exe104⤵
-
\??\c:\bthhnn.exec:\bthhnn.exe105⤵
-
\??\c:\tnbhbt.exec:\tnbhbt.exe106⤵
-
\??\c:\9jdvv.exec:\9jdvv.exe107⤵
-
\??\c:\pdppd.exec:\pdppd.exe108⤵
-
\??\c:\rfllflf.exec:\rfllflf.exe109⤵
-
\??\c:\fllrllf.exec:\fllrllf.exe110⤵
-
\??\c:\tnhhnn.exec:\tnhhnn.exe111⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe112⤵
-
\??\c:\7pvpp.exec:\7pvpp.exe113⤵
-
\??\c:\rllfffx.exec:\rllfffx.exe114⤵
-
\??\c:\xrllflf.exec:\xrllflf.exe115⤵
-
\??\c:\bthbbb.exec:\bthbbb.exe116⤵
-
\??\c:\hbttbb.exec:\hbttbb.exe117⤵
-
\??\c:\pjpjv.exec:\pjpjv.exe118⤵
-
\??\c:\lxlfxxx.exec:\lxlfxxx.exe119⤵
-
\??\c:\llllxxx.exec:\llllxxx.exe120⤵
-
\??\c:\btttnn.exec:\btttnn.exe121⤵
-
\??\c:\pvdpj.exec:\pvdpj.exe122⤵
-
\??\c:\9lrrlll.exec:\9lrrlll.exe123⤵
-
\??\c:\fxxffrr.exec:\fxxffrr.exe124⤵
-
\??\c:\hhnhbt.exec:\hhnhbt.exe125⤵
-
\??\c:\bbnntt.exec:\bbnntt.exe126⤵
-
\??\c:\pdjjj.exec:\pdjjj.exe127⤵
-
\??\c:\vjvdd.exec:\vjvdd.exe128⤵
-
\??\c:\xxrrlxx.exec:\xxrrlxx.exe129⤵
-
\??\c:\3nhhbh.exec:\3nhhbh.exe130⤵
-
\??\c:\hhttnb.exec:\hhttnb.exe131⤵
-
\??\c:\bhhhbb.exec:\bhhhbb.exe132⤵
-
\??\c:\jjvvd.exec:\jjvvd.exe133⤵
-
\??\c:\xlrlllf.exec:\xlrlllf.exe134⤵
-
\??\c:\llrrxfl.exec:\llrrxfl.exe135⤵
-
\??\c:\bnnnhh.exec:\bnnnhh.exe136⤵
-
\??\c:\3hnnnn.exec:\3hnnnn.exe137⤵
-
\??\c:\3vdvv.exec:\3vdvv.exe138⤵
-
\??\c:\jdddj.exec:\jdddj.exe139⤵
-
\??\c:\lflxrrr.exec:\lflxrrr.exe140⤵
-
\??\c:\ttnnnt.exec:\ttnnnt.exe141⤵
-
\??\c:\1jppp.exec:\1jppp.exe142⤵
-
\??\c:\fxxrlll.exec:\fxxrlll.exe143⤵
-
\??\c:\5rrfrlf.exec:\5rrfrlf.exe144⤵
-
\??\c:\bnbbhh.exec:\bnbbhh.exe145⤵
-
\??\c:\djddp.exec:\djddp.exe146⤵
-
\??\c:\pjvpp.exec:\pjvpp.exe147⤵
-
\??\c:\fllxlfx.exec:\fllxlfx.exe148⤵
-
\??\c:\xrxxfll.exec:\xrxxfll.exe149⤵
-
\??\c:\bbntbb.exec:\bbntbb.exe150⤵
-
\??\c:\jpjpd.exec:\jpjpd.exe151⤵
-
\??\c:\pdpdv.exec:\pdpdv.exe152⤵
-
\??\c:\fxlrrxr.exec:\fxlrrxr.exe153⤵
-
\??\c:\bnhhnt.exec:\bnhhnt.exe154⤵
-
\??\c:\xrrrxxx.exec:\xrrrxxx.exe155⤵
-
\??\c:\thntth.exec:\thntth.exe156⤵
-
\??\c:\rlflxlf.exec:\rlflxlf.exe157⤵
-
\??\c:\llllrrr.exec:\llllrrr.exe158⤵
-
\??\c:\ntnnhn.exec:\ntnnhn.exe159⤵
-
\??\c:\vjddd.exec:\vjddd.exe160⤵
-
\??\c:\1jppp.exec:\1jppp.exe161⤵
-
\??\c:\nnhbnt.exec:\nnhbnt.exe162⤵
-
\??\c:\5ppvv.exec:\5ppvv.exe163⤵
-
\??\c:\dvppj.exec:\dvppj.exe164⤵
-
\??\c:\rxrrfxl.exec:\rxrrfxl.exe165⤵
-
\??\c:\hntnnh.exec:\hntnnh.exe166⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe167⤵
-
\??\c:\xrxxrrl.exec:\xrxxrrl.exe168⤵
-
\??\c:\hbbhtn.exec:\hbbhtn.exe169⤵
-
\??\c:\nnbbtt.exec:\nnbbtt.exe170⤵
-
\??\c:\jvpjj.exec:\jvpjj.exe171⤵
-
\??\c:\ffxfrrl.exec:\ffxfrrl.exe172⤵
-
\??\c:\7rxfxxx.exec:\7rxfxxx.exe173⤵
-
\??\c:\hbtnbb.exec:\hbtnbb.exe174⤵
-
\??\c:\3tbbtb.exec:\3tbbtb.exe175⤵
-
\??\c:\vpvpv.exec:\vpvpv.exe176⤵
-
\??\c:\jdvpv.exec:\jdvpv.exe177⤵
-
\??\c:\xrrlxfl.exec:\xrrlxfl.exe178⤵
-
\??\c:\bntbbt.exec:\bntbbt.exe179⤵
-
\??\c:\3bbtnn.exec:\3bbtnn.exe180⤵
-
\??\c:\jjppp.exec:\jjppp.exe181⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe182⤵
-
\??\c:\flrlrrf.exec:\flrlrrf.exe183⤵
-
\??\c:\lxllfff.exec:\lxllfff.exe184⤵
-
\??\c:\hhbthh.exec:\hhbthh.exe185⤵
-
\??\c:\dvppd.exec:\dvppd.exe186⤵
-
\??\c:\3dvpd.exec:\3dvpd.exe187⤵
-
\??\c:\frxxfff.exec:\frxxfff.exe188⤵
-
\??\c:\frxrlll.exec:\frxrlll.exe189⤵
-
\??\c:\bttnnn.exec:\bttnnn.exe190⤵
-
\??\c:\pdppj.exec:\pdppj.exe191⤵
-
\??\c:\vdddd.exec:\vdddd.exe192⤵
-
\??\c:\3rrrfff.exec:\3rrrfff.exe193⤵
-
\??\c:\3fffflf.exec:\3fffflf.exe194⤵
-
\??\c:\hthhnn.exec:\hthhnn.exe195⤵
-
\??\c:\pddvv.exec:\pddvv.exe196⤵
-
\??\c:\dpjdj.exec:\dpjdj.exe197⤵
-
\??\c:\xrrlfxr.exec:\xrrlfxr.exe198⤵
-
\??\c:\9xlfxxr.exec:\9xlfxxr.exe199⤵
-
\??\c:\bbttnb.exec:\bbttnb.exe200⤵
-
\??\c:\djjpj.exec:\djjpj.exe201⤵
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe202⤵
-
\??\c:\5fllffx.exec:\5fllffx.exe203⤵
-
\??\c:\hbbbnb.exec:\hbbbnb.exe204⤵
-
\??\c:\jjddd.exec:\jjddd.exe205⤵
-
\??\c:\lrxrrrr.exec:\lrxrrrr.exe206⤵
-
\??\c:\rlfffxx.exec:\rlfffxx.exe207⤵
-
\??\c:\hnbnnh.exec:\hnbnnh.exe208⤵
-
\??\c:\tbhnnn.exec:\tbhnnn.exe209⤵
-
\??\c:\ppjdp.exec:\ppjdp.exe210⤵
-
\??\c:\rxxxxxr.exec:\rxxxxxr.exe211⤵
-
\??\c:\5xxrrrr.exec:\5xxrrrr.exe212⤵
-
\??\c:\hhtnnn.exec:\hhtnnn.exe213⤵
-
\??\c:\btbbth.exec:\btbbth.exe214⤵
-
\??\c:\ddjjd.exec:\ddjjd.exe215⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe216⤵
-
\??\c:\rlrrlxx.exec:\rlrrlxx.exe217⤵
-
\??\c:\lllffff.exec:\lllffff.exe218⤵
-
\??\c:\5bhhnt.exec:\5bhhnt.exe219⤵
-
\??\c:\bhhhbb.exec:\bhhhbb.exe220⤵
-
\??\c:\vpjjp.exec:\vpjjp.exe221⤵
-
\??\c:\9xxlflx.exec:\9xxlflx.exe222⤵
-
\??\c:\lfxrxxr.exec:\lfxrxxr.exe223⤵
-
\??\c:\tnbtbh.exec:\tnbtbh.exe224⤵
-
\??\c:\hthhbt.exec:\hthhbt.exe225⤵
-
\??\c:\pdppj.exec:\pdppj.exe226⤵
-
\??\c:\dvpjp.exec:\dvpjp.exe227⤵
-
\??\c:\xflrfff.exec:\xflrfff.exe228⤵
-
\??\c:\xxflllr.exec:\xxflllr.exe229⤵
-
\??\c:\tbhtnt.exec:\tbhtnt.exe230⤵
-
\??\c:\bhhbtn.exec:\bhhbtn.exe231⤵
-
\??\c:\vpvpv.exec:\vpvpv.exe232⤵
-
\??\c:\7lrxllr.exec:\7lrxllr.exe233⤵
-
\??\c:\ttnntt.exec:\ttnntt.exe234⤵
-
\??\c:\bnntnh.exec:\bnntnh.exe235⤵
-
\??\c:\vjdpj.exec:\vjdpj.exe236⤵
-
\??\c:\xxfflfx.exec:\xxfflfx.exe237⤵
-
\??\c:\xlxrlff.exec:\xlxrlff.exe238⤵
-
\??\c:\tbnbth.exec:\tbnbth.exe239⤵
-
\??\c:\btbthn.exec:\btbthn.exe240⤵
-
\??\c:\pjdvd.exec:\pjdvd.exe241⤵