Analysis
-
max time kernel
99s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 02:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe
Resource
win7-20240508-en
3 signatures
150 seconds
General
-
Target
2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe
-
Size
65KB
-
MD5
d589d9da27e01e6dc89e7fe00f15a7f0
-
SHA1
ff6fdb72cf0aa61ef92eb8d8e25e04d21052658e
-
SHA256
2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549
-
SHA512
dbb1b326347c7073d5c1ebe2872992749a94eba6ae75c78715c267968e21d7108b82b2ab1a34d7eb605e27a8abd868690559a0300df92924a3156ae6c8abbffa
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDISoFGDwDS:ymb3NkkiQ3mdBjFIkQS
Malware Config
Signatures
-
Detect Blackmoon payload 31 IoCs
Processes:
resource yara_rule behavioral2/memory/3752-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4076-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4060-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2924-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2924-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-46-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1340-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1520-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3404-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3788-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/868-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3192-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3204-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1740-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2412-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/112-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3392-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/692-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3772-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3816-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1244-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/416-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-66-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4508-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4844-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3868-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3868-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
frrrrrr.exelxffrxl.exebbbbtn.exevjpjd.exevvjjj.exelffxlxr.exe3xxfxfx.exetbhhbh.exehbtnhh.exejddvp.exefrrrrrr.exerlfffrr.exebnttnn.exejdddv.exevpppd.exepdddp.exelfxrrrx.exerlllffx.exenbtnhb.exehtnthn.exepjvdp.exedvvpj.exerlfxxrr.exe5nhhbb.exethhbtt.exeppvvd.exedddvv.exelfffrrx.exellfrfrf.exebnnhhh.exedddvd.exejvdvj.exelffxrlf.exelrfxxrr.exebhbtbt.exenbhbtt.exevjjpj.exepdvvj.exefllrfll.exelxxrrxr.exe1lrrxll.exehbnhnn.exehttnhb.exepvddp.exepvjjv.exedvpdj.exellfxrrr.exelrrlffx.exebbtnhh.exenbnhbb.exejvddp.exe5vpjd.exejjpdv.exefrxxrrr.exelrlxrxf.exehbhbtt.exevpjjp.exevpppj.exerlrxxff.exefrfxfff.exe1hbbtb.exejdvvd.exejddvp.exe7lxfllr.exepid process 4076 frrrrrr.exe 4060 lxffrxl.exe 3868 bbbbtn.exe 2924 vjpjd.exe 3024 vvjjj.exe 1340 lffxlxr.exe 4844 3xxfxfx.exe 4508 tbhhbh.exe 416 hbtnhh.exe 1244 jddvp.exe 3816 frrrrrr.exe 3772 rlfffrr.exe 692 bnttnn.exe 1832 jdddv.exe 3392 vpppd.exe 3156 pdddp.exe 112 lfxrrrx.exe 4864 rlllffx.exe 2412 nbtnhb.exe 2244 htnthn.exe 1740 pjvdp.exe 2788 dvvpj.exe 3204 rlfxxrr.exe 3192 5nhhbb.exe 868 thhbtt.exe 1520 ppvvd.exe 3788 dddvv.exe 3404 lfffrrx.exe 1600 llfrfrf.exe 4180 bnnhhh.exe 1228 dddvd.exe 2840 jvdvj.exe 1608 lffxrlf.exe 884 lrfxxrr.exe 4680 bhbtbt.exe 4980 nbhbtt.exe 4940 vjjpj.exe 2764 pdvvj.exe 4876 fllrfll.exe 2668 lxxrrxr.exe 3472 1lrrxll.exe 4564 hbnhnn.exe 3212 httnhb.exe 3700 pvddp.exe 4252 pvjjv.exe 4240 dvpdj.exe 4032 llfxrrr.exe 4044 lrrlffx.exe 992 bbtnhh.exe 1552 nbnhbb.exe 4376 jvddp.exe 812 5vpjd.exe 1912 jjpdv.exe 636 frxxrrr.exe 4784 lrlxrxf.exe 2448 hbhbtt.exe 1288 vpjjp.exe 220 vpppj.exe 2428 rlrxxff.exe 4636 frfxfff.exe 4384 1hbbtb.exe 2276 jdvvd.exe 2900 jddvp.exe 2208 7lxfllr.exe -
Processes:
resource yara_rule behavioral2/memory/3752-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4076-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4060-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2924-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2924-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2924-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1520-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3404-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3788-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/868-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3192-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2412-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/112-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3392-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/692-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3772-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3816-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1244-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1244-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1244-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/416-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4508-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4844-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3868-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3868-24-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exefrrrrrr.exelxffrxl.exebbbbtn.exevjpjd.exevvjjj.exelffxlxr.exe3xxfxfx.exetbhhbh.exehbtnhh.exejddvp.exefrrrrrr.exerlfffrr.exebnttnn.exejdddv.exevpppd.exepdddp.exelfxrrrx.exerlllffx.exenbtnhb.exehtnthn.exepjvdp.exedescription pid process target process PID 3752 wrote to memory of 4076 3752 2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe jjdvp.exe PID 3752 wrote to memory of 4076 3752 2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe jjdvp.exe PID 3752 wrote to memory of 4076 3752 2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe jjdvp.exe PID 4076 wrote to memory of 4060 4076 frrrrrr.exe lxffrxl.exe PID 4076 wrote to memory of 4060 4076 frrrrrr.exe lxffrxl.exe PID 4076 wrote to memory of 4060 4076 frrrrrr.exe lxffrxl.exe PID 4060 wrote to memory of 3868 4060 lxffrxl.exe bbbbtn.exe PID 4060 wrote to memory of 3868 4060 lxffrxl.exe bbbbtn.exe PID 4060 wrote to memory of 3868 4060 lxffrxl.exe bbbbtn.exe PID 3868 wrote to memory of 2924 3868 bbbbtn.exe vjpjd.exe PID 3868 wrote to memory of 2924 3868 bbbbtn.exe vjpjd.exe PID 3868 wrote to memory of 2924 3868 bbbbtn.exe vjpjd.exe PID 2924 wrote to memory of 3024 2924 vjpjd.exe vvjjj.exe PID 2924 wrote to memory of 3024 2924 vjpjd.exe vvjjj.exe PID 2924 wrote to memory of 3024 2924 vjpjd.exe vvjjj.exe PID 3024 wrote to memory of 1340 3024 vvjjj.exe lffxlxr.exe PID 3024 wrote to memory of 1340 3024 vvjjj.exe lffxlxr.exe PID 3024 wrote to memory of 1340 3024 vvjjj.exe lffxlxr.exe PID 1340 wrote to memory of 4844 1340 lffxlxr.exe 3xxfxfx.exe PID 1340 wrote to memory of 4844 1340 lffxlxr.exe 3xxfxfx.exe PID 1340 wrote to memory of 4844 1340 lffxlxr.exe 3xxfxfx.exe PID 4844 wrote to memory of 4508 4844 3xxfxfx.exe tbhhbh.exe PID 4844 wrote to memory of 4508 4844 3xxfxfx.exe tbhhbh.exe PID 4844 wrote to memory of 4508 4844 3xxfxfx.exe tbhhbh.exe PID 4508 wrote to memory of 416 4508 tbhhbh.exe hbtnhh.exe PID 4508 wrote to memory of 416 4508 tbhhbh.exe hbtnhh.exe PID 4508 wrote to memory of 416 4508 tbhhbh.exe hbtnhh.exe PID 416 wrote to memory of 1244 416 hbtnhh.exe jddvp.exe PID 416 wrote to memory of 1244 416 hbtnhh.exe jddvp.exe PID 416 wrote to memory of 1244 416 hbtnhh.exe jddvp.exe PID 1244 wrote to memory of 3816 1244 jddvp.exe frrrrrr.exe PID 1244 wrote to memory of 3816 1244 jddvp.exe frrrrrr.exe PID 1244 wrote to memory of 3816 1244 jddvp.exe frrrrrr.exe PID 3816 wrote to memory of 3772 3816 frrrrrr.exe rlfffrr.exe PID 3816 wrote to memory of 3772 3816 frrrrrr.exe rlfffrr.exe PID 3816 wrote to memory of 3772 3816 frrrrrr.exe rlfffrr.exe PID 3772 wrote to memory of 692 3772 rlfffrr.exe fxffffl.exe PID 3772 wrote to memory of 692 3772 rlfffrr.exe fxffffl.exe PID 3772 wrote to memory of 692 3772 rlfffrr.exe fxffffl.exe PID 692 wrote to memory of 1832 692 bnttnn.exe jdddv.exe PID 692 wrote to memory of 1832 692 bnttnn.exe jdddv.exe PID 692 wrote to memory of 1832 692 bnttnn.exe jdddv.exe PID 1832 wrote to memory of 3392 1832 jdddv.exe vpppd.exe PID 1832 wrote to memory of 3392 1832 jdddv.exe vpppd.exe PID 1832 wrote to memory of 3392 1832 jdddv.exe vpppd.exe PID 3392 wrote to memory of 3156 3392 vpppd.exe pdddp.exe PID 3392 wrote to memory of 3156 3392 vpppd.exe pdddp.exe PID 3392 wrote to memory of 3156 3392 vpppd.exe pdddp.exe PID 3156 wrote to memory of 112 3156 pdddp.exe lfxrrrx.exe PID 3156 wrote to memory of 112 3156 pdddp.exe lfxrrrx.exe PID 3156 wrote to memory of 112 3156 pdddp.exe lfxrrrx.exe PID 112 wrote to memory of 4864 112 lfxrrrx.exe rlllffx.exe PID 112 wrote to memory of 4864 112 lfxrrrx.exe rlllffx.exe PID 112 wrote to memory of 4864 112 lfxrrrx.exe rlllffx.exe PID 4864 wrote to memory of 2412 4864 rlllffx.exe nbtnhb.exe PID 4864 wrote to memory of 2412 4864 rlllffx.exe nbtnhb.exe PID 4864 wrote to memory of 2412 4864 rlllffx.exe nbtnhb.exe PID 2412 wrote to memory of 2244 2412 nbtnhb.exe htnthn.exe PID 2412 wrote to memory of 2244 2412 nbtnhb.exe htnthn.exe PID 2412 wrote to memory of 2244 2412 nbtnhb.exe htnthn.exe PID 2244 wrote to memory of 1740 2244 htnthn.exe pjvdp.exe PID 2244 wrote to memory of 1740 2244 htnthn.exe pjvdp.exe PID 2244 wrote to memory of 1740 2244 htnthn.exe pjvdp.exe PID 1740 wrote to memory of 2788 1740 pjvdp.exe dvvpj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2fc48192a9032faf195b9c651460171b3231caae793e53c35a0767ad52b93549_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\frrrrrr.exec:\frrrrrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxffrxl.exec:\lxffrxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbbbtn.exec:\bbbbtn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjd.exec:\vjpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvjjj.exec:\vvjjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxlxr.exec:\lffxlxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3xxfxfx.exec:\3xxfxfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbhhbh.exec:\tbhhbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbtnhh.exec:\hbtnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jddvp.exec:\jddvp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frrrrrr.exec:\frrrrrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfffrr.exec:\rlfffrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnttnn.exec:\bnttnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdddv.exec:\jdddv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpppd.exec:\vpppd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdddp.exec:\pdddp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfxrrrx.exec:\lfxrrrx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlllffx.exec:\rlllffx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbtnhb.exec:\nbtnhb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\htnthn.exec:\htnthn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvdp.exec:\pjvdp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvpj.exec:\dvvpj.exe23⤵
- Executes dropped EXE
-
\??\c:\rlfxxrr.exec:\rlfxxrr.exe24⤵
- Executes dropped EXE
-
\??\c:\5nhhbb.exec:\5nhhbb.exe25⤵
- Executes dropped EXE
-
\??\c:\thhbtt.exec:\thhbtt.exe26⤵
- Executes dropped EXE
-
\??\c:\ppvvd.exec:\ppvvd.exe27⤵
- Executes dropped EXE
-
\??\c:\dddvv.exec:\dddvv.exe28⤵
- Executes dropped EXE
-
\??\c:\lfffrrx.exec:\lfffrrx.exe29⤵
- Executes dropped EXE
-
\??\c:\llfrfrf.exec:\llfrfrf.exe30⤵
- Executes dropped EXE
-
\??\c:\bnnhhh.exec:\bnnhhh.exe31⤵
- Executes dropped EXE
-
\??\c:\dddvd.exec:\dddvd.exe32⤵
- Executes dropped EXE
-
\??\c:\jvdvj.exec:\jvdvj.exe33⤵
- Executes dropped EXE
-
\??\c:\lffxrlf.exec:\lffxrlf.exe34⤵
- Executes dropped EXE
-
\??\c:\lrfxxrr.exec:\lrfxxrr.exe35⤵
- Executes dropped EXE
-
\??\c:\bhbtbt.exec:\bhbtbt.exe36⤵
- Executes dropped EXE
-
\??\c:\nbhbtt.exec:\nbhbtt.exe37⤵
- Executes dropped EXE
-
\??\c:\vjjpj.exec:\vjjpj.exe38⤵
- Executes dropped EXE
-
\??\c:\pdvvj.exec:\pdvvj.exe39⤵
- Executes dropped EXE
-
\??\c:\fllrfll.exec:\fllrfll.exe40⤵
- Executes dropped EXE
-
\??\c:\lxxrrxr.exec:\lxxrrxr.exe41⤵
- Executes dropped EXE
-
\??\c:\1lrrxll.exec:\1lrrxll.exe42⤵
- Executes dropped EXE
-
\??\c:\hbnhnn.exec:\hbnhnn.exe43⤵
- Executes dropped EXE
-
\??\c:\httnhb.exec:\httnhb.exe44⤵
- Executes dropped EXE
-
\??\c:\pvddp.exec:\pvddp.exe45⤵
- Executes dropped EXE
-
\??\c:\pvjjv.exec:\pvjjv.exe46⤵
- Executes dropped EXE
-
\??\c:\dvpdj.exec:\dvpdj.exe47⤵
- Executes dropped EXE
-
\??\c:\llfxrrr.exec:\llfxrrr.exe48⤵
- Executes dropped EXE
-
\??\c:\lrrlffx.exec:\lrrlffx.exe49⤵
- Executes dropped EXE
-
\??\c:\bbtnhh.exec:\bbtnhh.exe50⤵
- Executes dropped EXE
-
\??\c:\nbnhbb.exec:\nbnhbb.exe51⤵
- Executes dropped EXE
-
\??\c:\jvddp.exec:\jvddp.exe52⤵
- Executes dropped EXE
-
\??\c:\5vpjd.exec:\5vpjd.exe53⤵
- Executes dropped EXE
-
\??\c:\jjpdv.exec:\jjpdv.exe54⤵
- Executes dropped EXE
-
\??\c:\frxxrrr.exec:\frxxrrr.exe55⤵
- Executes dropped EXE
-
\??\c:\lrlxrxf.exec:\lrlxrxf.exe56⤵
- Executes dropped EXE
-
\??\c:\hbhbtt.exec:\hbhbtt.exe57⤵
- Executes dropped EXE
-
\??\c:\vpjjp.exec:\vpjjp.exe58⤵
- Executes dropped EXE
-
\??\c:\vpppj.exec:\vpppj.exe59⤵
- Executes dropped EXE
-
\??\c:\rlrxxff.exec:\rlrxxff.exe60⤵
- Executes dropped EXE
-
\??\c:\frfxfff.exec:\frfxfff.exe61⤵
- Executes dropped EXE
-
\??\c:\1hbbtb.exec:\1hbbtb.exe62⤵
- Executes dropped EXE
-
\??\c:\jdvvd.exec:\jdvvd.exe63⤵
- Executes dropped EXE
-
\??\c:\jddvp.exec:\jddvp.exe64⤵
- Executes dropped EXE
-
\??\c:\7lxfllr.exec:\7lxfllr.exe65⤵
- Executes dropped EXE
-
\??\c:\fxxxllr.exec:\fxxxllr.exe66⤵
-
\??\c:\rfxfxrr.exec:\rfxfxrr.exe67⤵
-
\??\c:\nhbbtt.exec:\nhbbtt.exe68⤵
-
\??\c:\htbtnn.exec:\htbtnn.exe69⤵
-
\??\c:\9vvvj.exec:\9vvvj.exe70⤵
-
\??\c:\pjvpd.exec:\pjvpd.exe71⤵
-
\??\c:\vjpjv.exec:\vjpjv.exe72⤵
-
\??\c:\xxxxlll.exec:\xxxxlll.exe73⤵
-
\??\c:\xllrllf.exec:\xllrllf.exe74⤵
-
\??\c:\ttnnhh.exec:\ttnnhh.exe75⤵
-
\??\c:\9ttthh.exec:\9ttthh.exe76⤵
-
\??\c:\nhbntt.exec:\nhbntt.exe77⤵
-
\??\c:\djdpj.exec:\djdpj.exe78⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe79⤵
-
\??\c:\xrrllrx.exec:\xrrllrx.exe80⤵
-
\??\c:\lfxxrxx.exec:\lfxxrxx.exe81⤵
-
\??\c:\xrxrlfr.exec:\xrxrlfr.exe82⤵
-
\??\c:\nhbttt.exec:\nhbttt.exe83⤵
-
\??\c:\httnhh.exec:\httnhh.exe84⤵
-
\??\c:\nbbbtt.exec:\nbbbtt.exe85⤵
-
\??\c:\vdvvj.exec:\vdvvj.exe86⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe87⤵
-
\??\c:\pddvp.exec:\pddvp.exe88⤵
-
\??\c:\flrfrxl.exec:\flrfrxl.exe89⤵
-
\??\c:\lxllfff.exec:\lxllfff.exe90⤵
-
\??\c:\htnhhh.exec:\htnhhh.exe91⤵
-
\??\c:\bnnttt.exec:\bnnttt.exe92⤵
-
\??\c:\nhtbhb.exec:\nhtbhb.exe93⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe94⤵
-
\??\c:\vdjdp.exec:\vdjdp.exe95⤵
-
\??\c:\7fffffx.exec:\7fffffx.exe96⤵
-
\??\c:\llffxxr.exec:\llffxxr.exe97⤵
-
\??\c:\fxxrllf.exec:\fxxrllf.exe98⤵
-
\??\c:\hbbtnn.exec:\hbbtnn.exe99⤵
-
\??\c:\ntbbbh.exec:\ntbbbh.exe100⤵
-
\??\c:\9tttnt.exec:\9tttnt.exe101⤵
-
\??\c:\jjdjd.exec:\jjdjd.exe102⤵
-
\??\c:\jppdp.exec:\jppdp.exe103⤵
-
\??\c:\xrffffr.exec:\xrffffr.exe104⤵
-
\??\c:\frffxrl.exec:\frffxrl.exe105⤵
-
\??\c:\lrfxffl.exec:\lrfxffl.exe106⤵
-
\??\c:\htbttt.exec:\htbttt.exe107⤵
-
\??\c:\nbbttt.exec:\nbbttt.exe108⤵
-
\??\c:\nhbbtt.exec:\nhbbtt.exe109⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe110⤵
-
\??\c:\jddvv.exec:\jddvv.exe111⤵
-
\??\c:\rlxrlxr.exec:\rlxrlxr.exe112⤵
-
\??\c:\rllrrlr.exec:\rllrrlr.exe113⤵
-
\??\c:\llllxxx.exec:\llllxxx.exe114⤵
-
\??\c:\btnbth.exec:\btnbth.exe115⤵
-
\??\c:\nhhbth.exec:\nhhbth.exe116⤵
-
\??\c:\jjdvp.exec:\jjdvp.exe117⤵
-
\??\c:\jjppv.exec:\jjppv.exe118⤵
-
\??\c:\vdvpd.exec:\vdvpd.exe119⤵
-
\??\c:\fllfxxx.exec:\fllfxxx.exe120⤵
-
\??\c:\9lxrxxf.exec:\9lxrxxf.exe121⤵
-
\??\c:\fxrllff.exec:\fxrllff.exe122⤵
-
\??\c:\9bttnn.exec:\9bttnn.exe123⤵
-
\??\c:\nhbbnh.exec:\nhbbnh.exe124⤵
-
\??\c:\vdjvp.exec:\vdjvp.exe125⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe126⤵
-
\??\c:\vjdpd.exec:\vjdpd.exe127⤵
-
\??\c:\xxflrrx.exec:\xxflrrx.exe128⤵
-
\??\c:\xxffffx.exec:\xxffffx.exe129⤵
-
\??\c:\1xlxlxr.exec:\1xlxlxr.exe130⤵
-
\??\c:\bbtnhh.exec:\bbtnhh.exe131⤵
-
\??\c:\hntntb.exec:\hntntb.exe132⤵
-
\??\c:\btnhtn.exec:\btnhtn.exe133⤵
-
\??\c:\jjddd.exec:\jjddd.exe134⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe135⤵
-
\??\c:\xrrlfll.exec:\xrrlfll.exe136⤵
-
\??\c:\rffxrll.exec:\rffxrll.exe137⤵
-
\??\c:\xfllffx.exec:\xfllffx.exe138⤵
-
\??\c:\nnbttt.exec:\nnbttt.exe139⤵
-
\??\c:\tbhbhn.exec:\tbhbhn.exe140⤵
-
\??\c:\bntnht.exec:\bntnht.exe141⤵
-
\??\c:\jjpjd.exec:\jjpjd.exe142⤵
-
\??\c:\pvdvp.exec:\pvdvp.exe143⤵
-
\??\c:\5jpjp.exec:\5jpjp.exe144⤵
-
\??\c:\fllxflf.exec:\fllxflf.exe145⤵
-
\??\c:\rfrxxxx.exec:\rfrxxxx.exe146⤵
-
\??\c:\ffxxrrr.exec:\ffxxrrr.exe147⤵
-
\??\c:\hhhbbn.exec:\hhhbbn.exe148⤵
-
\??\c:\btbtbt.exec:\btbtbt.exe149⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe150⤵
-
\??\c:\vppjv.exec:\vppjv.exe151⤵
-
\??\c:\7vddd.exec:\7vddd.exe152⤵
-
\??\c:\xxxrllf.exec:\xxxrllf.exe153⤵
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe154⤵
-
\??\c:\ttnhhh.exec:\ttnhhh.exe155⤵
-
\??\c:\tttthn.exec:\tttthn.exe156⤵
-
\??\c:\bttnbh.exec:\bttnbh.exe157⤵
-
\??\c:\pdddd.exec:\pdddd.exe158⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe159⤵
-
\??\c:\jdddd.exec:\jdddd.exe160⤵
-
\??\c:\lffxxlf.exec:\lffxxlf.exe161⤵
-
\??\c:\xxlllrl.exec:\xxlllrl.exe162⤵
-
\??\c:\nntnbb.exec:\nntnbb.exe163⤵
-
\??\c:\tnnhbt.exec:\tnnhbt.exe164⤵
-
\??\c:\hbnhhh.exec:\hbnhhh.exe165⤵
-
\??\c:\ddjdd.exec:\ddjdd.exe166⤵
-
\??\c:\7vddp.exec:\7vddp.exe167⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe168⤵
-
\??\c:\7xlxfrf.exec:\7xlxfrf.exe169⤵
-
\??\c:\bhnnnn.exec:\bhnnnn.exe170⤵
-
\??\c:\nntbht.exec:\nntbht.exe171⤵
-
\??\c:\3pvpd.exec:\3pvpd.exe172⤵
-
\??\c:\9jppd.exec:\9jppd.exe173⤵
-
\??\c:\fffxrrl.exec:\fffxrrl.exe174⤵
-
\??\c:\xflllrr.exec:\xflllrr.exe175⤵
-
\??\c:\xfxffrr.exec:\xfxffrr.exe176⤵
-
\??\c:\btbtbb.exec:\btbtbb.exe177⤵
-
\??\c:\tttntt.exec:\tttntt.exe178⤵
-
\??\c:\dvppd.exec:\dvppd.exe179⤵
-
\??\c:\vppjd.exec:\vppjd.exe180⤵
-
\??\c:\lxrlfff.exec:\lxrlfff.exe181⤵
-
\??\c:\lffllrr.exec:\lffllrr.exe182⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe183⤵
-
\??\c:\btnnbb.exec:\btnnbb.exe184⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe185⤵
-
\??\c:\jpppv.exec:\jpppv.exe186⤵
-
\??\c:\pjvjv.exec:\pjvjv.exe187⤵
-
\??\c:\rrxxrlr.exec:\rrxxrlr.exe188⤵
-
\??\c:\xrxxxff.exec:\xrxxxff.exe189⤵
-
\??\c:\rrlxrfl.exec:\rrlxrfl.exe190⤵
-
\??\c:\hnnttb.exec:\hnnttb.exe191⤵
-
\??\c:\thhbnb.exec:\thhbnb.exe192⤵
-
\??\c:\ddjjp.exec:\ddjjp.exe193⤵
-
\??\c:\vvjjv.exec:\vvjjv.exe194⤵
-
\??\c:\fxffffl.exec:\fxffffl.exe195⤵
-
\??\c:\lrllffx.exec:\lrllffx.exe196⤵
-
\??\c:\nhhhhh.exec:\nhhhhh.exe197⤵
-
\??\c:\3bhhhh.exec:\3bhhhh.exe198⤵
-
\??\c:\btnhbt.exec:\btnhbt.exe199⤵
-
\??\c:\ppddj.exec:\ppddj.exe200⤵
-
\??\c:\xfllxll.exec:\xfllxll.exe201⤵
-
\??\c:\rrxrfrr.exec:\rrxrfrr.exe202⤵
-
\??\c:\bhthht.exec:\bhthht.exe203⤵
-
\??\c:\hhbbnn.exec:\hhbbnn.exe204⤵
-
\??\c:\1jvvj.exec:\1jvvj.exe205⤵
-
\??\c:\jjvpp.exec:\jjvpp.exe206⤵
-
\??\c:\vpvvd.exec:\vpvvd.exe207⤵
-
\??\c:\rlrlffx.exec:\rlrlffx.exe208⤵
-
\??\c:\rlrrlrr.exec:\rlrrlrr.exe209⤵
-
\??\c:\rllllll.exec:\rllllll.exe210⤵
-
\??\c:\3tthnh.exec:\3tthnh.exe211⤵
-
\??\c:\9bbbhn.exec:\9bbbhn.exe212⤵
-
\??\c:\ppddv.exec:\ppddv.exe213⤵
-
\??\c:\jpvdj.exec:\jpvdj.exe214⤵
-
\??\c:\ffflrff.exec:\ffflrff.exe215⤵
-
\??\c:\xxlxxfr.exec:\xxlxxfr.exe216⤵
-
\??\c:\bbhttb.exec:\bbhttb.exe217⤵
-
\??\c:\hhhbtt.exec:\hhhbtt.exe218⤵
-
\??\c:\vvjpv.exec:\vvjpv.exe219⤵
-
\??\c:\rxffxxx.exec:\rxffxxx.exe220⤵
-
\??\c:\flxxxxx.exec:\flxxxxx.exe221⤵
-
\??\c:\httbhn.exec:\httbhn.exe222⤵
-
\??\c:\1dvpj.exec:\1dvpj.exe223⤵
-
\??\c:\rrrlfff.exec:\rrrlfff.exe224⤵
-
\??\c:\llfxxxr.exec:\llfxxxr.exe225⤵
-
\??\c:\nbtttt.exec:\nbtttt.exe226⤵
-
\??\c:\nbbnnn.exec:\nbbnnn.exe227⤵
-
\??\c:\vpddj.exec:\vpddj.exe228⤵
-
\??\c:\ffxxrxx.exec:\ffxxrxx.exe229⤵
-
\??\c:\7ffrxfr.exec:\7ffrxfr.exe230⤵
-
\??\c:\hbtnhh.exec:\hbtnhh.exe231⤵
-
\??\c:\lfxrllf.exec:\lfxrllf.exe232⤵
-
\??\c:\rrlrrfl.exec:\rrlrrfl.exe233⤵
-
\??\c:\rlrllll.exec:\rlrllll.exe234⤵
-
\??\c:\nnnnhh.exec:\nnnnhh.exe235⤵
-
\??\c:\jvddp.exec:\jvddp.exe236⤵
-
\??\c:\btnhhh.exec:\btnhhh.exe237⤵
-
\??\c:\ddppj.exec:\ddppj.exe238⤵
-
\??\c:\tnhbhh.exec:\tnhbhh.exe239⤵
-
\??\c:\7djdj.exec:\7djdj.exe240⤵
-
\??\c:\rllxxfr.exec:\rllxxfr.exe241⤵