Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 01:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe
Resource
win7-20240419-en
windows7-x64
6 signatures
150 seconds
General
-
Target
aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe
-
Size
246KB
-
MD5
cd5910a64bbe0b81552342b6ecb4ee03
-
SHA1
9a1deece9e18f7cd2929d00f196fb82f6d8aa248
-
SHA256
aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4
-
SHA512
4558c76b0e077c49217e4eeb4f9b6d4607efb65b03478861a1f866c18175b18291c89db5511668c0ba41c50218eec439b04e0ac5c2eaac044eced43d088fb8df
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4MAWvGjR1Y:n3C9BRo7MlrWKo+lxtvGt1Y
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2492-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1572-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1764-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/996-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1356-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1996-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/320-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1500-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1820-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2180-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 27 IoCs
Processes:
resource yara_rule behavioral1/memory/2256-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2028-14-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2256-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2608-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2608-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2760-37-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2760-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2472-47-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2492-57-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2408-67-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2516-78-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3056-87-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3056-89-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3056-86-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3056-97-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2724-105-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1572-123-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1764-141-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/996-151-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1356-160-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1996-195-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/320-213-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2816-231-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1500-249-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1820-258-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2180-276-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2252-294-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
7rfrxll.exe3hbbtn.exebhhbnh.exejdjpd.exefxrxlfx.exevvjdp.exellffrxl.exexrllrrl.exejdddj.exe9tnntb.exe5pddj.exe1djdd.exebtnnbb.exebtnnbt.exe9pdjd.exe7xlrffl.exedddpp.exejpvvp.exefxrrffl.exe9bbhnt.exe3pvdd.exe7lxrxrx.exe1nbbnn.exebbntbh.exedvvpj.exelllrrxl.exehnnbtb.exe3pppv.exetnbhbh.exe1dpjp.exelfllrxl.exexffllxx.exebbtthn.exe5ddvp.exeffrlxxf.exelfxlxxl.exethnnbb.exe3pddp.exepdppv.exe5lffllx.exe1tttbh.exentbnth.exejdppd.exexrffrll.exelfxxlrx.exebnbtbb.exe1nhnbh.exedvpvj.exeffxlrrf.exellfxfrx.exetnbnbb.exedpjdj.exevvpdd.exerrrfrxl.exe3tnnth.exe5bttbb.exevvpjv.exeffflxff.exe5xllxxf.exe3htbhh.exepjdpp.exejjddp.exexrrxffx.exerxrlxfx.exepid process 2028 7rfrxll.exe 2608 3hbbtn.exe 2760 bhhbnh.exe 2472 jdjpd.exe 2492 fxrxlfx.exe 2408 vvjdp.exe 2516 llffrxl.exe 3056 xrllrrl.exe 2724 jdddj.exe 2780 9tnntb.exe 1572 5pddj.exe 1784 1djdd.exe 1764 btnnbb.exe 996 btnnbt.exe 1356 9pdjd.exe 2044 7xlrffl.exe 2016 dddpp.exe 2984 jpvvp.exe 1996 fxrrffl.exe 1952 9bbhnt.exe 320 3pvdd.exe 1408 7lxrxrx.exe 2816 1nbbnn.exe 780 bbntbh.exe 1500 dvvpj.exe 1820 lllrrxl.exe 1672 hnnbtb.exe 2180 3pppv.exe 2136 tnbhbh.exe 2252 1dpjp.exe 1468 lfllrxl.exe 1548 xffllxx.exe 2256 bbtthn.exe 2644 5ddvp.exe 3000 ffrlxxf.exe 2700 lfxlxxl.exe 2596 thnnbb.exe 2076 3pddp.exe 2628 pdppv.exe 2504 5lffllx.exe 2512 1tttbh.exe 2496 ntbnth.exe 2980 jdppd.exe 2508 xrffrll.exe 2732 lfxxlrx.exe 2800 bnbtbb.exe 2552 1nhnbh.exe 1412 dvpvj.exe 1628 ffxlrrf.exe 2116 llfxfrx.exe 1760 tnbnbb.exe 2364 dpjdj.exe 856 vvpdd.exe 1180 rrrfrxl.exe 2836 3tnnth.exe 2316 5bttbb.exe 1908 vvpjv.exe 1528 ffflxff.exe 1928 5xllxxf.exe 1960 3htbhh.exe 320 pjdpp.exe 1396 jjddp.exe 1724 xrrxffx.exe 1440 rxrlxfx.exe -
Processes:
resource yara_rule behavioral1/memory/2256-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1572-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1764-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/996-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1356-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/320-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1500-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1820-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2180-276-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-294-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe7rfrxll.exe3hbbtn.exebhhbnh.exejdjpd.exefxrxlfx.exevvjdp.exellffrxl.exexrllrrl.exejdddj.exe9tnntb.exe5pddj.exe1djdd.exebtnnbb.exebtnnbt.exe9pdjd.exedescription pid process target process PID 2256 wrote to memory of 2028 2256 aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe 7rfrxll.exe PID 2256 wrote to memory of 2028 2256 aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe 7rfrxll.exe PID 2256 wrote to memory of 2028 2256 aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe 7rfrxll.exe PID 2256 wrote to memory of 2028 2256 aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe 7rfrxll.exe PID 2028 wrote to memory of 2608 2028 7rfrxll.exe 3hbbtn.exe PID 2028 wrote to memory of 2608 2028 7rfrxll.exe 3hbbtn.exe PID 2028 wrote to memory of 2608 2028 7rfrxll.exe 3hbbtn.exe PID 2028 wrote to memory of 2608 2028 7rfrxll.exe 3hbbtn.exe PID 2608 wrote to memory of 2760 2608 3hbbtn.exe bhhbnh.exe PID 2608 wrote to memory of 2760 2608 3hbbtn.exe bhhbnh.exe PID 2608 wrote to memory of 2760 2608 3hbbtn.exe bhhbnh.exe PID 2608 wrote to memory of 2760 2608 3hbbtn.exe bhhbnh.exe PID 2760 wrote to memory of 2472 2760 bhhbnh.exe jdjpd.exe PID 2760 wrote to memory of 2472 2760 bhhbnh.exe jdjpd.exe PID 2760 wrote to memory of 2472 2760 bhhbnh.exe jdjpd.exe PID 2760 wrote to memory of 2472 2760 bhhbnh.exe jdjpd.exe PID 2472 wrote to memory of 2492 2472 jdjpd.exe fxrxlfx.exe PID 2472 wrote to memory of 2492 2472 jdjpd.exe fxrxlfx.exe PID 2472 wrote to memory of 2492 2472 jdjpd.exe fxrxlfx.exe PID 2472 wrote to memory of 2492 2472 jdjpd.exe fxrxlfx.exe PID 2492 wrote to memory of 2408 2492 fxrxlfx.exe vvjdp.exe PID 2492 wrote to memory of 2408 2492 fxrxlfx.exe vvjdp.exe PID 2492 wrote to memory of 2408 2492 fxrxlfx.exe vvjdp.exe PID 2492 wrote to memory of 2408 2492 fxrxlfx.exe vvjdp.exe PID 2408 wrote to memory of 2516 2408 vvjdp.exe llffrxl.exe PID 2408 wrote to memory of 2516 2408 vvjdp.exe llffrxl.exe PID 2408 wrote to memory of 2516 2408 vvjdp.exe llffrxl.exe PID 2408 wrote to memory of 2516 2408 vvjdp.exe llffrxl.exe PID 2516 wrote to memory of 3056 2516 llffrxl.exe xrllrrl.exe PID 2516 wrote to memory of 3056 2516 llffrxl.exe xrllrrl.exe PID 2516 wrote to memory of 3056 2516 llffrxl.exe xrllrrl.exe PID 2516 wrote to memory of 3056 2516 llffrxl.exe xrllrrl.exe PID 3056 wrote to memory of 2724 3056 xrllrrl.exe jdddj.exe PID 3056 wrote to memory of 2724 3056 xrllrrl.exe jdddj.exe PID 3056 wrote to memory of 2724 3056 xrllrrl.exe jdddj.exe PID 3056 wrote to memory of 2724 3056 xrllrrl.exe jdddj.exe PID 2724 wrote to memory of 2780 2724 jdddj.exe 9tnntb.exe PID 2724 wrote to memory of 2780 2724 jdddj.exe 9tnntb.exe PID 2724 wrote to memory of 2780 2724 jdddj.exe 9tnntb.exe PID 2724 wrote to memory of 2780 2724 jdddj.exe 9tnntb.exe PID 2780 wrote to memory of 1572 2780 9tnntb.exe 5pddj.exe PID 2780 wrote to memory of 1572 2780 9tnntb.exe 5pddj.exe PID 2780 wrote to memory of 1572 2780 9tnntb.exe 5pddj.exe PID 2780 wrote to memory of 1572 2780 9tnntb.exe 5pddj.exe PID 1572 wrote to memory of 1784 1572 5pddj.exe 1djdd.exe PID 1572 wrote to memory of 1784 1572 5pddj.exe 1djdd.exe PID 1572 wrote to memory of 1784 1572 5pddj.exe 1djdd.exe PID 1572 wrote to memory of 1784 1572 5pddj.exe 1djdd.exe PID 1784 wrote to memory of 1764 1784 1djdd.exe btnnbb.exe PID 1784 wrote to memory of 1764 1784 1djdd.exe btnnbb.exe PID 1784 wrote to memory of 1764 1784 1djdd.exe btnnbb.exe PID 1784 wrote to memory of 1764 1784 1djdd.exe btnnbb.exe PID 1764 wrote to memory of 996 1764 btnnbb.exe btnnbt.exe PID 1764 wrote to memory of 996 1764 btnnbb.exe btnnbt.exe PID 1764 wrote to memory of 996 1764 btnnbb.exe btnnbt.exe PID 1764 wrote to memory of 996 1764 btnnbb.exe btnnbt.exe PID 996 wrote to memory of 1356 996 btnnbt.exe 9pdjd.exe PID 996 wrote to memory of 1356 996 btnnbt.exe 9pdjd.exe PID 996 wrote to memory of 1356 996 btnnbt.exe 9pdjd.exe PID 996 wrote to memory of 1356 996 btnnbt.exe 9pdjd.exe PID 1356 wrote to memory of 2044 1356 9pdjd.exe 7xlrffl.exe PID 1356 wrote to memory of 2044 1356 9pdjd.exe 7xlrffl.exe PID 1356 wrote to memory of 2044 1356 9pdjd.exe 7xlrffl.exe PID 1356 wrote to memory of 2044 1356 9pdjd.exe 7xlrffl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe"C:\Users\Admin\AppData\Local\Temp\aae192dcafc89c1377c2bc70a7d09109746ccbf1af7758e38a8955fad31e1eb4.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\7rfrxll.exec:\7rfrxll.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3hbbtn.exec:\3hbbtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhhbnh.exec:\bhhbnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdjpd.exec:\jdjpd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxrxlfx.exec:\fxrxlfx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvjdp.exec:\vvjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llffrxl.exec:\llffrxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrllrrl.exec:\xrllrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdddj.exec:\jdddj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9tnntb.exec:\9tnntb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5pddj.exec:\5pddj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1djdd.exec:\1djdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnnbb.exec:\btnnbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnnbt.exec:\btnnbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9pdjd.exec:\9pdjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7xlrffl.exec:\7xlrffl.exe17⤵
- Executes dropped EXE
-
\??\c:\dddpp.exec:\dddpp.exe18⤵
- Executes dropped EXE
-
\??\c:\jpvvp.exec:\jpvvp.exe19⤵
- Executes dropped EXE
-
\??\c:\fxrrffl.exec:\fxrrffl.exe20⤵
- Executes dropped EXE
-
\??\c:\9bbhnt.exec:\9bbhnt.exe21⤵
- Executes dropped EXE
-
\??\c:\3pvdd.exec:\3pvdd.exe22⤵
- Executes dropped EXE
-
\??\c:\7lxrxrx.exec:\7lxrxrx.exe23⤵
- Executes dropped EXE
-
\??\c:\1nbbnn.exec:\1nbbnn.exe24⤵
- Executes dropped EXE
-
\??\c:\bbntbh.exec:\bbntbh.exe25⤵
- Executes dropped EXE
-
\??\c:\dvvpj.exec:\dvvpj.exe26⤵
- Executes dropped EXE
-
\??\c:\lllrrxl.exec:\lllrrxl.exe27⤵
- Executes dropped EXE
-
\??\c:\hnnbtb.exec:\hnnbtb.exe28⤵
- Executes dropped EXE
-
\??\c:\3pppv.exec:\3pppv.exe29⤵
- Executes dropped EXE
-
\??\c:\tnbhbh.exec:\tnbhbh.exe30⤵
- Executes dropped EXE
-
\??\c:\1dpjp.exec:\1dpjp.exe31⤵
- Executes dropped EXE
-
\??\c:\lfllrxl.exec:\lfllrxl.exe32⤵
- Executes dropped EXE
-
\??\c:\xffllxx.exec:\xffllxx.exe33⤵
- Executes dropped EXE
-
\??\c:\bbtthn.exec:\bbtthn.exe34⤵
- Executes dropped EXE
-
\??\c:\5ddvp.exec:\5ddvp.exe35⤵
- Executes dropped EXE
-
\??\c:\ffrlxxf.exec:\ffrlxxf.exe36⤵
- Executes dropped EXE
-
\??\c:\lfxlxxl.exec:\lfxlxxl.exe37⤵
- Executes dropped EXE
-
\??\c:\thnnbb.exec:\thnnbb.exe38⤵
- Executes dropped EXE
-
\??\c:\3pddp.exec:\3pddp.exe39⤵
- Executes dropped EXE
-
\??\c:\pdppv.exec:\pdppv.exe40⤵
- Executes dropped EXE
-
\??\c:\5lffllx.exec:\5lffllx.exe41⤵
- Executes dropped EXE
-
\??\c:\1tttbh.exec:\1tttbh.exe42⤵
- Executes dropped EXE
-
\??\c:\ntbnth.exec:\ntbnth.exe43⤵
- Executes dropped EXE
-
\??\c:\jdppd.exec:\jdppd.exe44⤵
- Executes dropped EXE
-
\??\c:\xrffrll.exec:\xrffrll.exe45⤵
- Executes dropped EXE
-
\??\c:\lfxxlrx.exec:\lfxxlrx.exe46⤵
- Executes dropped EXE
-
\??\c:\bnbtbb.exec:\bnbtbb.exe47⤵
- Executes dropped EXE
-
\??\c:\1nhnbh.exec:\1nhnbh.exe48⤵
- Executes dropped EXE
-
\??\c:\dvpvj.exec:\dvpvj.exe49⤵
- Executes dropped EXE
-
\??\c:\ffxlrrf.exec:\ffxlrrf.exe50⤵
- Executes dropped EXE
-
\??\c:\llfxfrx.exec:\llfxfrx.exe51⤵
- Executes dropped EXE
-
\??\c:\tnbnbb.exec:\tnbnbb.exe52⤵
- Executes dropped EXE
-
\??\c:\dpjdj.exec:\dpjdj.exe53⤵
- Executes dropped EXE
-
\??\c:\vvpdd.exec:\vvpdd.exe54⤵
- Executes dropped EXE
-
\??\c:\rrrfrxl.exec:\rrrfrxl.exe55⤵
- Executes dropped EXE
-
\??\c:\3tnnth.exec:\3tnnth.exe56⤵
- Executes dropped EXE
-
\??\c:\5bttbb.exec:\5bttbb.exe57⤵
- Executes dropped EXE
-
\??\c:\vvpjv.exec:\vvpjv.exe58⤵
- Executes dropped EXE
-
\??\c:\ffflxff.exec:\ffflxff.exe59⤵
- Executes dropped EXE
-
\??\c:\5xllxxf.exec:\5xllxxf.exe60⤵
- Executes dropped EXE
-
\??\c:\3htbhh.exec:\3htbhh.exe61⤵
- Executes dropped EXE
-
\??\c:\pjdpp.exec:\pjdpp.exe62⤵
- Executes dropped EXE
-
\??\c:\jjddp.exec:\jjddp.exe63⤵
- Executes dropped EXE
-
\??\c:\xrrxffx.exec:\xrrxffx.exe64⤵
- Executes dropped EXE
-
\??\c:\rxrlxfx.exec:\rxrlxfx.exe65⤵
- Executes dropped EXE
-
\??\c:\hhhbnb.exec:\hhhbnb.exe66⤵
-
\??\c:\jjvjp.exec:\jjvjp.exe67⤵
-
\??\c:\jjjpd.exec:\jjjpd.exe68⤵
-
\??\c:\xxrxxfr.exec:\xxrxxfr.exe69⤵
-
\??\c:\nnntbb.exec:\nnntbb.exe70⤵
-
\??\c:\bbtbht.exec:\bbtbht.exe71⤵
-
\??\c:\jjjpj.exec:\jjjpj.exe72⤵
-
\??\c:\rlflffl.exec:\rlflffl.exe73⤵
-
\??\c:\nhhhbn.exec:\nhhhbn.exe74⤵
-
\??\c:\nhbhbh.exec:\nhbhbh.exe75⤵
-
\??\c:\vvjpv.exec:\vvjpv.exe76⤵
-
\??\c:\djvdp.exec:\djvdp.exe77⤵
-
\??\c:\fffrxll.exec:\fffrxll.exe78⤵
-
\??\c:\tththt.exec:\tththt.exe79⤵
-
\??\c:\nnhntt.exec:\nnhntt.exe80⤵
-
\??\c:\5vdpv.exec:\5vdpv.exe81⤵
-
\??\c:\7jjpj.exec:\7jjpj.exe82⤵
-
\??\c:\fxxfrrr.exec:\fxxfrrr.exe83⤵
-
\??\c:\3hbhtt.exec:\3hbhtt.exe84⤵
-
\??\c:\bthnhh.exec:\bthnhh.exe85⤵
-
\??\c:\9jdvd.exec:\9jdvd.exe86⤵
-
\??\c:\lllffrl.exec:\lllffrl.exe87⤵
-
\??\c:\lfxxrxl.exec:\lfxxrxl.exe88⤵
-
\??\c:\ttnbth.exec:\ttnbth.exe89⤵
-
\??\c:\jpdvv.exec:\jpdvv.exe90⤵
-
\??\c:\vvvjp.exec:\vvvjp.exe91⤵
-
\??\c:\llxfllr.exec:\llxfllr.exe92⤵
-
\??\c:\flrrfxf.exec:\flrrfxf.exe93⤵
-
\??\c:\hbtntn.exec:\hbtntn.exe94⤵
-
\??\c:\jvpdp.exec:\jvpdp.exe95⤵
-
\??\c:\rrlxlrf.exec:\rrlxlrf.exe96⤵
-
\??\c:\rrxfrxr.exec:\rrxfrxr.exe97⤵
-
\??\c:\1hbnbn.exec:\1hbnbn.exe98⤵
-
\??\c:\bbthhh.exec:\bbthhh.exe99⤵
-
\??\c:\jppjv.exec:\jppjv.exe100⤵
-
\??\c:\jdvvd.exec:\jdvvd.exe101⤵
-
\??\c:\lfrxrfr.exec:\lfrxrfr.exe102⤵
-
\??\c:\9bthtt.exec:\9bthtt.exe103⤵
-
\??\c:\nnnbtb.exec:\nnnbtb.exe104⤵
-
\??\c:\3dpjd.exec:\3dpjd.exe105⤵
-
\??\c:\vvpdp.exec:\vvpdp.exe106⤵
-
\??\c:\1xlrxfr.exec:\1xlrxfr.exe107⤵
-
\??\c:\nhbnbn.exec:\nhbnbn.exe108⤵
-
\??\c:\bbnbnn.exec:\bbnbnn.exe109⤵
-
\??\c:\vvjpd.exec:\vvjpd.exe110⤵
-
\??\c:\ddppd.exec:\ddppd.exe111⤵
-
\??\c:\rlrrflr.exec:\rlrrflr.exe112⤵
-
\??\c:\1thnbh.exec:\1thnbh.exe113⤵
-
\??\c:\nhbhbn.exec:\nhbhbn.exe114⤵
-
\??\c:\9jvpd.exec:\9jvpd.exe115⤵
-
\??\c:\vvdvv.exec:\vvdvv.exe116⤵
-
\??\c:\lfrlxfr.exec:\lfrlxfr.exe117⤵
-
\??\c:\7lfxllf.exec:\7lfxllf.exe118⤵
-
\??\c:\1nntbh.exec:\1nntbh.exe119⤵
-
\??\c:\5ddpv.exec:\5ddpv.exe120⤵
-
\??\c:\1jjjv.exec:\1jjjv.exe121⤵
-
\??\c:\llrxfrx.exec:\llrxfrx.exe122⤵
-
\??\c:\thhtnt.exec:\thhtnt.exe123⤵
-
\??\c:\ttnbth.exec:\ttnbth.exe124⤵
-
\??\c:\vjjvj.exec:\vjjvj.exe125⤵
-
\??\c:\vvjpd.exec:\vvjpd.exe126⤵
-
\??\c:\rrlrrfr.exec:\rrlrrfr.exe127⤵
-
\??\c:\xrrfrxl.exec:\xrrfrxl.exe128⤵
-
\??\c:\hhhnbt.exec:\hhhnbt.exe129⤵
-
\??\c:\dvvpv.exec:\dvvpv.exe130⤵
-
\??\c:\vjppp.exec:\vjppp.exe131⤵
-
\??\c:\rlxxllx.exec:\rlxxllx.exe132⤵
-
\??\c:\frflfxl.exec:\frflfxl.exe133⤵
-
\??\c:\hbbnbh.exec:\hbbnbh.exe134⤵
-
\??\c:\tnhnbb.exec:\tnhnbb.exe135⤵
-
\??\c:\jdppd.exec:\jdppd.exe136⤵
-
\??\c:\xrffrxl.exec:\xrffrxl.exe137⤵
-
\??\c:\5htbnb.exec:\5htbnb.exe138⤵
-
\??\c:\7hbbtt.exec:\7hbbtt.exe139⤵
-
\??\c:\ddpvd.exec:\ddpvd.exe140⤵
-
\??\c:\pjddp.exec:\pjddp.exe141⤵
-
\??\c:\lfrrffr.exec:\lfrrffr.exe142⤵
-
\??\c:\lxxxllf.exec:\lxxxllf.exe143⤵
-
\??\c:\5bnntb.exec:\5bnntb.exe144⤵
-
\??\c:\3vpjv.exec:\3vpjv.exe145⤵
-
\??\c:\vpdjp.exec:\vpdjp.exe146⤵
-
\??\c:\rrlfrlx.exec:\rrlfrlx.exe147⤵
-
\??\c:\lfllflx.exec:\lfllflx.exe148⤵
-
\??\c:\hhbbtt.exec:\hhbbtt.exe149⤵
-
\??\c:\hbttnn.exec:\hbttnn.exe150⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe151⤵
-
\??\c:\rrlxfrr.exec:\rrlxfrr.exe152⤵
-
\??\c:\hhbhtb.exec:\hhbhtb.exe153⤵
-
\??\c:\3bbbnn.exec:\3bbbnn.exe154⤵
-
\??\c:\vjvpv.exec:\vjvpv.exe155⤵
-
\??\c:\5xrxrrx.exec:\5xrxrrx.exe156⤵
-
\??\c:\lrxrfrx.exec:\lrxrfrx.exe157⤵
-
\??\c:\hhtntb.exec:\hhtntb.exe158⤵
-
\??\c:\dvddp.exec:\dvddp.exe159⤵
-
\??\c:\9vjjp.exec:\9vjjp.exe160⤵
-
\??\c:\lffrxfr.exec:\lffrxfr.exe161⤵
-
\??\c:\ffxxlfr.exec:\ffxxlfr.exe162⤵
-
\??\c:\tnbhtb.exec:\tnbhtb.exe163⤵
-
\??\c:\1dppv.exec:\1dppv.exe164⤵
-
\??\c:\vpjjv.exec:\vpjjv.exe165⤵
-
\??\c:\lfrxflr.exec:\lfrxflr.exe166⤵
-
\??\c:\tnhhbt.exec:\tnhhbt.exe167⤵
-
\??\c:\5nhnhn.exec:\5nhnhn.exe168⤵
-
\??\c:\pjdpd.exec:\pjdpd.exe169⤵
-
\??\c:\rlffrxr.exec:\rlffrxr.exe170⤵
-
\??\c:\xxrffrl.exec:\xxrffrl.exe171⤵
-
\??\c:\tnbbnn.exec:\tnbbnn.exe172⤵
-
\??\c:\nnhhtn.exec:\nnhhtn.exe173⤵
-
\??\c:\1jpjp.exec:\1jpjp.exe174⤵
-
\??\c:\9rfxxfl.exec:\9rfxxfl.exe175⤵
-
\??\c:\xrlrlfl.exec:\xrlrlfl.exe176⤵
-
\??\c:\tnbthh.exec:\tnbthh.exe177⤵
-
\??\c:\hhnhbn.exec:\hhnhbn.exe178⤵
-
\??\c:\7pdvv.exec:\7pdvv.exe179⤵
-
\??\c:\xrrfrxr.exec:\xrrfrxr.exe180⤵
-
\??\c:\xrrxrxx.exec:\xrrxrxx.exe181⤵
-
\??\c:\hhbbth.exec:\hhbbth.exe182⤵
-
\??\c:\pjdjp.exec:\pjdjp.exe183⤵
-
\??\c:\7jvdj.exec:\7jvdj.exe184⤵
-
\??\c:\1rflffx.exec:\1rflffx.exe185⤵
-
\??\c:\btbnbn.exec:\btbnbn.exe186⤵
-
\??\c:\hhbhbt.exec:\hhbhbt.exe187⤵
-
\??\c:\jpjdp.exec:\jpjdp.exe188⤵
-
\??\c:\lffrfxf.exec:\lffrfxf.exe189⤵
-
\??\c:\bbnthn.exec:\bbnthn.exe190⤵
-
\??\c:\dvddj.exec:\dvddj.exe191⤵
-
\??\c:\ppjjj.exec:\ppjjj.exe192⤵
-
\??\c:\lrxxxrx.exec:\lrxxxrx.exe193⤵
-
\??\c:\hbthhh.exec:\hbthhh.exe194⤵
-
\??\c:\hbhhtb.exec:\hbhhtb.exe195⤵
-
\??\c:\vjvvj.exec:\vjvvj.exe196⤵
-
\??\c:\lflrxfl.exec:\lflrxfl.exe197⤵
-
\??\c:\xrflrrf.exec:\xrflrrf.exe198⤵
-
\??\c:\ntnnnt.exec:\ntnnnt.exe199⤵
-
\??\c:\nnhnhh.exec:\nnhnhh.exe200⤵
-
\??\c:\jddjv.exec:\jddjv.exe201⤵
-
\??\c:\rxrlxxl.exec:\rxrlxxl.exe202⤵
-
\??\c:\9xfrflx.exec:\9xfrflx.exe203⤵
-
\??\c:\5bhbnb.exec:\5bhbnb.exe204⤵
-
\??\c:\3bhnht.exec:\3bhnht.exe205⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe206⤵
-
\??\c:\3rlxflr.exec:\3rlxflr.exe207⤵
-
\??\c:\1rxfflf.exec:\1rxfflf.exe208⤵
-
\??\c:\hbthnn.exec:\hbthnn.exe209⤵
-
\??\c:\pddpv.exec:\pddpv.exe210⤵
-
\??\c:\pjdjv.exec:\pjdjv.exe211⤵
-
\??\c:\dddpj.exec:\dddpj.exe212⤵
-
\??\c:\lxllrrl.exec:\lxllrrl.exe213⤵
-
\??\c:\nhhhtt.exec:\nhhhtt.exe214⤵
-
\??\c:\7hhthh.exec:\7hhthh.exe215⤵
-
\??\c:\vvjpv.exec:\vvjpv.exe216⤵
-
\??\c:\9vjdj.exec:\9vjdj.exe217⤵
-
\??\c:\1lfxlfx.exec:\1lfxlfx.exe218⤵
-
\??\c:\nnhttt.exec:\nnhttt.exe219⤵
-
\??\c:\bbthnb.exec:\bbthnb.exe220⤵
-
\??\c:\jdpvd.exec:\jdpvd.exe221⤵
-
\??\c:\3vpjp.exec:\3vpjp.exe222⤵
-
\??\c:\rrllxfr.exec:\rrllxfr.exe223⤵
-
\??\c:\hbhbnt.exec:\hbhbnt.exe224⤵
-
\??\c:\tbhtbt.exec:\tbhtbt.exe225⤵
-
\??\c:\dvvjd.exec:\dvvjd.exe226⤵
-
\??\c:\llflxxl.exec:\llflxxl.exe227⤵
-
\??\c:\xxrxrrf.exec:\xxrxrrf.exe228⤵
-
\??\c:\1thtbn.exec:\1thtbn.exe229⤵
-
\??\c:\jdvvp.exec:\jdvvp.exe230⤵
-
\??\c:\1dvvp.exec:\1dvvp.exe231⤵
-
\??\c:\5xlxflx.exec:\5xlxflx.exe232⤵
-
\??\c:\1lffrrl.exec:\1lffrrl.exe233⤵
-
\??\c:\btntbh.exec:\btntbh.exe234⤵
-
\??\c:\dvjpd.exec:\dvjpd.exe235⤵
-
\??\c:\pdvdd.exec:\pdvdd.exe236⤵
-
\??\c:\7fxlfrf.exec:\7fxlfrf.exe237⤵
-
\??\c:\rrlxrxf.exec:\rrlxrxf.exe238⤵
-
\??\c:\5nhtbb.exec:\5nhtbb.exe239⤵
-
\??\c:\jjjjd.exec:\jjjjd.exe240⤵
-
\??\c:\pjdpd.exec:\pjdpd.exe241⤵