Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 01:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe
-
Size
82KB
-
MD5
599d2a837d0a2818dbfb4c8864813668
-
SHA1
17643fb49a1b657298f7641e80d483f10e93ea79
-
SHA256
a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6
-
SHA512
9ffc85aefe23c93d05db12eb97ed13d11da0e802e7b019b3d8b31959cf399967e572bcb3ea071765f69d72fc79ee753ed3ca38551bda9c6ce3a482cfbc2c3425
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JkZPsv7x:ymb3NkkiQ3mdBjFIWeFGyA9PE
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/1972-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2012-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4320-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1160-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4276-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4328-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3552-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1764-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4168-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1696-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3008-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4692-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2760-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2568-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5024-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1316-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1412-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 31 IoCs
Processes:
resource yara_rule behavioral2/memory/1972-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2012-12-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4320-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1160-21-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4276-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4328-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3552-49-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3552-46-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3552-47-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1764-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4168-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4168-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1696-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4168-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1696-77-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4912-81-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1780-90-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3468-102-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3008-108-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4692-126-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4236-132-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2760-151-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1576-156-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2568-162-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5024-168-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4796-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4864-180-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1316-186-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2912-191-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1412-198-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4344-211-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
nbnntn.exenhbttb.exehthtnt.exedvpjj.exerrrffxl.exethnhhn.exexxrlfff.exelllfllr.exettbbbh.exedpppd.exejvppj.exerrrlfll.exellrrrrr.exe3vddd.exedjppj.exelffxrrl.exerxfxrrr.exenbbbtt.exejjjdd.exe7rrrrrx.exennthtb.exehhnhbb.exevvdpp.exe9lrllrl.exebthhnt.exennhbtt.exepvjdd.exellllfll.exennhhtn.exepjpjp.exerlxllrr.exeffrrffl.exehbthnh.exebbnnnt.exevvpvd.exerflfxxr.exe9fflxfx.exenntthn.exebtbbbh.exe5vvvp.exepdjdv.exerxflrrx.exefrrxlxx.exe1tthth.exetnhbbt.exevjddp.exeppvpj.exelfrlffr.exerrxrlll.exelrxxffr.exe1hhhhh.exe7hnhtb.exevppjd.exepjjjd.exelllfrrr.exelrfrxff.exennbbbb.exebhbbbb.exevpvpv.exevdpjv.exe1lrrlll.exebbnnnb.exetnhbth.exepppdd.exepid process 2012 nbnntn.exe 1160 nhbttb.exe 4320 hthtnt.exe 4276 dvpjj.exe 4328 rrrffxl.exe 3552 thnhhn.exe 1764 xxrlfff.exe 4168 lllfllr.exe 1696 ttbbbh.exe 4912 dpppd.exe 1780 jvppj.exe 4648 rrrlfll.exe 3468 llrrrrr.exe 3008 3vddd.exe 4848 djppj.exe 2372 lffxrrl.exe 4692 rxfxrrr.exe 4236 nbbbtt.exe 4348 jjjdd.exe 4076 7rrrrrx.exe 2760 nnthtb.exe 1576 hhnhbb.exe 2568 vvdpp.exe 5024 9lrllrl.exe 4796 bthhnt.exe 4864 nnhbtt.exe 1316 pvjdd.exe 2912 llllfll.exe 1412 nnhhtn.exe 4468 pjpjp.exe 4344 rlxllrr.exe 3620 ffrrffl.exe 1816 hbthnh.exe 4284 bbnnnt.exe 3220 vvpvd.exe 3660 rflfxxr.exe 3020 9fflxfx.exe 3356 nntthn.exe 4688 btbbbh.exe 1336 5vvvp.exe 1524 pdjdv.exe 1876 rxflrrx.exe 1108 frrxlxx.exe 2460 1tthth.exe 5080 tnhbbt.exe 1636 vjddp.exe 5036 ppvpj.exe 1652 lfrlffr.exe 4900 rrxrlll.exe 3476 lrxxffr.exe 4500 1hhhhh.exe 1536 7hnhtb.exe 1360 vppjd.exe 1596 pjjjd.exe 1304 lllfrrr.exe 3972 lrfrxff.exe 640 nnbbbb.exe 3092 bhbbbb.exe 4236 vpvpv.exe 2672 vdpjv.exe 4528 1lrrlll.exe 732 bbnnnb.exe 3112 tnhbth.exe 2200 pppdd.exe -
Processes:
resource yara_rule behavioral2/memory/1972-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2012-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1160-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4276-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4328-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3552-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3552-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3552-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1764-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4168-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4168-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4168-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3008-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4692-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4236-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2760-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1576-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2568-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5024-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1316-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1412-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-211-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exenbnntn.exenhbttb.exehthtnt.exedvpjj.exerrrffxl.exethnhhn.exexxrlfff.exelllfllr.exettbbbh.exedpppd.exejvppj.exerrrlfll.exellrrrrr.exe3vddd.exedjppj.exelffxrrl.exerxfxrrr.exenbbbtt.exejjjdd.exe7rrrrrx.exennthtb.exedescription pid process target process PID 1972 wrote to memory of 2012 1972 a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe nbnntn.exe PID 1972 wrote to memory of 2012 1972 a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe nbnntn.exe PID 1972 wrote to memory of 2012 1972 a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe nbnntn.exe PID 2012 wrote to memory of 1160 2012 nbnntn.exe nhbttb.exe PID 2012 wrote to memory of 1160 2012 nbnntn.exe nhbttb.exe PID 2012 wrote to memory of 1160 2012 nbnntn.exe nhbttb.exe PID 1160 wrote to memory of 4320 1160 nhbttb.exe hthtnt.exe PID 1160 wrote to memory of 4320 1160 nhbttb.exe hthtnt.exe PID 1160 wrote to memory of 4320 1160 nhbttb.exe hthtnt.exe PID 4320 wrote to memory of 4276 4320 hthtnt.exe dvpjj.exe PID 4320 wrote to memory of 4276 4320 hthtnt.exe dvpjj.exe PID 4320 wrote to memory of 4276 4320 hthtnt.exe dvpjj.exe PID 4276 wrote to memory of 4328 4276 dvpjj.exe rrrffxl.exe PID 4276 wrote to memory of 4328 4276 dvpjj.exe rrrffxl.exe PID 4276 wrote to memory of 4328 4276 dvpjj.exe rrrffxl.exe PID 4328 wrote to memory of 3552 4328 rrrffxl.exe thnhhn.exe PID 4328 wrote to memory of 3552 4328 rrrffxl.exe thnhhn.exe PID 4328 wrote to memory of 3552 4328 rrrffxl.exe thnhhn.exe PID 3552 wrote to memory of 1764 3552 thnhhn.exe xxrlfff.exe PID 3552 wrote to memory of 1764 3552 thnhhn.exe xxrlfff.exe PID 3552 wrote to memory of 1764 3552 thnhhn.exe xxrlfff.exe PID 1764 wrote to memory of 4168 1764 xxrlfff.exe lllfllr.exe PID 1764 wrote to memory of 4168 1764 xxrlfff.exe lllfllr.exe PID 1764 wrote to memory of 4168 1764 xxrlfff.exe lllfllr.exe PID 4168 wrote to memory of 1696 4168 lllfllr.exe ttbbbh.exe PID 4168 wrote to memory of 1696 4168 lllfllr.exe ttbbbh.exe PID 4168 wrote to memory of 1696 4168 lllfllr.exe ttbbbh.exe PID 1696 wrote to memory of 4912 1696 ttbbbh.exe dpppd.exe PID 1696 wrote to memory of 4912 1696 ttbbbh.exe dpppd.exe PID 1696 wrote to memory of 4912 1696 ttbbbh.exe dpppd.exe PID 4912 wrote to memory of 1780 4912 dpppd.exe jvppj.exe PID 4912 wrote to memory of 1780 4912 dpppd.exe jvppj.exe PID 4912 wrote to memory of 1780 4912 dpppd.exe jvppj.exe PID 1780 wrote to memory of 4648 1780 jvppj.exe rrrlfll.exe PID 1780 wrote to memory of 4648 1780 jvppj.exe rrrlfll.exe PID 1780 wrote to memory of 4648 1780 jvppj.exe rrrlfll.exe PID 4648 wrote to memory of 3468 4648 rrrlfll.exe llrrrrr.exe PID 4648 wrote to memory of 3468 4648 rrrlfll.exe llrrrrr.exe PID 4648 wrote to memory of 3468 4648 rrrlfll.exe llrrrrr.exe PID 3468 wrote to memory of 3008 3468 llrrrrr.exe 3vddd.exe PID 3468 wrote to memory of 3008 3468 llrrrrr.exe 3vddd.exe PID 3468 wrote to memory of 3008 3468 llrrrrr.exe 3vddd.exe PID 3008 wrote to memory of 4848 3008 3vddd.exe djppj.exe PID 3008 wrote to memory of 4848 3008 3vddd.exe djppj.exe PID 3008 wrote to memory of 4848 3008 3vddd.exe djppj.exe PID 4848 wrote to memory of 2372 4848 djppj.exe lffxrrl.exe PID 4848 wrote to memory of 2372 4848 djppj.exe lffxrrl.exe PID 4848 wrote to memory of 2372 4848 djppj.exe lffxrrl.exe PID 2372 wrote to memory of 4692 2372 lffxrrl.exe rxfxrrr.exe PID 2372 wrote to memory of 4692 2372 lffxrrl.exe rxfxrrr.exe PID 2372 wrote to memory of 4692 2372 lffxrrl.exe rxfxrrr.exe PID 4692 wrote to memory of 4236 4692 rxfxrrr.exe nbbbtt.exe PID 4692 wrote to memory of 4236 4692 rxfxrrr.exe nbbbtt.exe PID 4692 wrote to memory of 4236 4692 rxfxrrr.exe nbbbtt.exe PID 4236 wrote to memory of 4348 4236 nbbbtt.exe jjjdd.exe PID 4236 wrote to memory of 4348 4236 nbbbtt.exe jjjdd.exe PID 4236 wrote to memory of 4348 4236 nbbbtt.exe jjjdd.exe PID 4348 wrote to memory of 4076 4348 jjjdd.exe 7rrrrrx.exe PID 4348 wrote to memory of 4076 4348 jjjdd.exe 7rrrrrx.exe PID 4348 wrote to memory of 4076 4348 jjjdd.exe 7rrrrrx.exe PID 4076 wrote to memory of 2760 4076 7rrrrrx.exe nnthtb.exe PID 4076 wrote to memory of 2760 4076 7rrrrrx.exe nnthtb.exe PID 4076 wrote to memory of 2760 4076 7rrrrrx.exe nnthtb.exe PID 2760 wrote to memory of 1576 2760 nnthtb.exe hhnhbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe"C:\Users\Admin\AppData\Local\Temp\a4e5c0f35ab788354610390bb1656f151bff75980a7abc240d8741e55d41d2e6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\nbnntn.exec:\nbnntn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhbttb.exec:\nhbttb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hthtnt.exec:\hthtnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvpjj.exec:\dvpjj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrrffxl.exec:\rrrffxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thnhhn.exec:\thnhhn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxrlfff.exec:\xxrlfff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lllfllr.exec:\lllfllr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbbbh.exec:\ttbbbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpppd.exec:\dpppd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvppj.exec:\jvppj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrrlfll.exec:\rrrlfll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llrrrrr.exec:\llrrrrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3vddd.exec:\3vddd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djppj.exec:\djppj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxrrl.exec:\lffxrrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxfxrrr.exec:\rxfxrrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbbbtt.exec:\nbbbtt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjjdd.exec:\jjjdd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7rrrrrx.exec:\7rrrrrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnthtb.exec:\nnthtb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhnhbb.exec:\hhnhbb.exe23⤵
- Executes dropped EXE
-
\??\c:\vvdpp.exec:\vvdpp.exe24⤵
- Executes dropped EXE
-
\??\c:\9lrllrl.exec:\9lrllrl.exe25⤵
- Executes dropped EXE
-
\??\c:\bthhnt.exec:\bthhnt.exe26⤵
- Executes dropped EXE
-
\??\c:\nnhbtt.exec:\nnhbtt.exe27⤵
- Executes dropped EXE
-
\??\c:\pvjdd.exec:\pvjdd.exe28⤵
- Executes dropped EXE
-
\??\c:\llllfll.exec:\llllfll.exe29⤵
- Executes dropped EXE
-
\??\c:\nnhhtn.exec:\nnhhtn.exe30⤵
- Executes dropped EXE
-
\??\c:\pjpjp.exec:\pjpjp.exe31⤵
- Executes dropped EXE
-
\??\c:\rlxllrr.exec:\rlxllrr.exe32⤵
- Executes dropped EXE
-
\??\c:\ffrrffl.exec:\ffrrffl.exe33⤵
- Executes dropped EXE
-
\??\c:\hbthnh.exec:\hbthnh.exe34⤵
- Executes dropped EXE
-
\??\c:\bbnnnt.exec:\bbnnnt.exe35⤵
- Executes dropped EXE
-
\??\c:\vvpvd.exec:\vvpvd.exe36⤵
- Executes dropped EXE
-
\??\c:\rflfxxr.exec:\rflfxxr.exe37⤵
- Executes dropped EXE
-
\??\c:\9fflxfx.exec:\9fflxfx.exe38⤵
- Executes dropped EXE
-
\??\c:\nntthn.exec:\nntthn.exe39⤵
- Executes dropped EXE
-
\??\c:\btbbbh.exec:\btbbbh.exe40⤵
- Executes dropped EXE
-
\??\c:\5vvvp.exec:\5vvvp.exe41⤵
- Executes dropped EXE
-
\??\c:\pdjdv.exec:\pdjdv.exe42⤵
- Executes dropped EXE
-
\??\c:\rxflrrx.exec:\rxflrrx.exe43⤵
- Executes dropped EXE
-
\??\c:\frrxlxx.exec:\frrxlxx.exe44⤵
- Executes dropped EXE
-
\??\c:\1tthth.exec:\1tthth.exe45⤵
- Executes dropped EXE
-
\??\c:\tnhbbt.exec:\tnhbbt.exe46⤵
- Executes dropped EXE
-
\??\c:\vjddp.exec:\vjddp.exe47⤵
- Executes dropped EXE
-
\??\c:\ppvpj.exec:\ppvpj.exe48⤵
- Executes dropped EXE
-
\??\c:\lfrlffr.exec:\lfrlffr.exe49⤵
- Executes dropped EXE
-
\??\c:\rrxrlll.exec:\rrxrlll.exe50⤵
- Executes dropped EXE
-
\??\c:\lrxxffr.exec:\lrxxffr.exe51⤵
- Executes dropped EXE
-
\??\c:\1hhhhh.exec:\1hhhhh.exe52⤵
- Executes dropped EXE
-
\??\c:\7hnhtb.exec:\7hnhtb.exe53⤵
- Executes dropped EXE
-
\??\c:\vppjd.exec:\vppjd.exe54⤵
- Executes dropped EXE
-
\??\c:\pjjjd.exec:\pjjjd.exe55⤵
- Executes dropped EXE
-
\??\c:\lllfrrr.exec:\lllfrrr.exe56⤵
- Executes dropped EXE
-
\??\c:\lrfrxff.exec:\lrfrxff.exe57⤵
- Executes dropped EXE
-
\??\c:\nnbbbb.exec:\nnbbbb.exe58⤵
- Executes dropped EXE
-
\??\c:\bhbbbb.exec:\bhbbbb.exe59⤵
- Executes dropped EXE
-
\??\c:\vpvpv.exec:\vpvpv.exe60⤵
- Executes dropped EXE
-
\??\c:\vdpjv.exec:\vdpjv.exe61⤵
- Executes dropped EXE
-
\??\c:\1lrrlll.exec:\1lrrlll.exe62⤵
- Executes dropped EXE
-
\??\c:\bbnnnb.exec:\bbnnnb.exe63⤵
- Executes dropped EXE
-
\??\c:\tnhbth.exec:\tnhbth.exe64⤵
- Executes dropped EXE
-
\??\c:\pppdd.exec:\pppdd.exe65⤵
- Executes dropped EXE
-
\??\c:\fffxllx.exec:\fffxllx.exe66⤵
-
\??\c:\llxllrf.exec:\llxllrf.exe67⤵
-
\??\c:\bbnhhn.exec:\bbnhhn.exe68⤵
-
\??\c:\vdpvj.exec:\vdpvj.exe69⤵
-
\??\c:\7djvp.exec:\7djvp.exe70⤵
-
\??\c:\fxlrrlf.exec:\fxlrrlf.exe71⤵
-
\??\c:\ttnhhh.exec:\ttnhhh.exe72⤵
-
\??\c:\htbnhb.exec:\htbnhb.exe73⤵
-
\??\c:\djdpj.exec:\djdpj.exe74⤵
-
\??\c:\jpdjp.exec:\jpdjp.exe75⤵
-
\??\c:\lllffxl.exec:\lllffxl.exe76⤵
-
\??\c:\fxrfxlf.exec:\fxrfxlf.exe77⤵
-
\??\c:\9hnbnb.exec:\9hnbnb.exe78⤵
-
\??\c:\vjvpd.exec:\vjvpd.exe79⤵
-
\??\c:\djjjv.exec:\djjjv.exe80⤵
-
\??\c:\rxrlxrx.exec:\rxrlxrx.exe81⤵
-
\??\c:\7rlxrlf.exec:\7rlxrlf.exe82⤵
-
\??\c:\9tbnbn.exec:\9tbnbn.exe83⤵
-
\??\c:\pjpjp.exec:\pjpjp.exe84⤵
-
\??\c:\ppjpp.exec:\ppjpp.exe85⤵
-
\??\c:\xxrrrxr.exec:\xxrrrxr.exe86⤵
-
\??\c:\ffrfrlf.exec:\ffrfrlf.exe87⤵
-
\??\c:\tnhbnh.exec:\tnhbnh.exe88⤵
-
\??\c:\nhhhtt.exec:\nhhhtt.exe89⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe90⤵
-
\??\c:\5dvvp.exec:\5dvvp.exe91⤵
-
\??\c:\5rlxlxr.exec:\5rlxlxr.exe92⤵
-
\??\c:\3hnbbh.exec:\3hnbbh.exe93⤵
-
\??\c:\nhbthb.exec:\nhbthb.exe94⤵
-
\??\c:\dpddv.exec:\dpddv.exe95⤵
-
\??\c:\jddvp.exec:\jddvp.exe96⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe97⤵
-
\??\c:\3xlffff.exec:\3xlffff.exe98⤵
-
\??\c:\hhtnbt.exec:\hhtnbt.exe99⤵
-
\??\c:\vddvj.exec:\vddvj.exe100⤵
-
\??\c:\vvjjd.exec:\vvjjd.exe101⤵
-
\??\c:\xfxfxxr.exec:\xfxfxxr.exe102⤵
-
\??\c:\7nhhtt.exec:\7nhhtt.exe103⤵
-
\??\c:\bbnhbb.exec:\bbnhbb.exe104⤵
-
\??\c:\5vjdp.exec:\5vjdp.exe105⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe106⤵
-
\??\c:\xllxxll.exec:\xllxxll.exe107⤵
-
\??\c:\bhnhhb.exec:\bhnhhb.exe108⤵
-
\??\c:\pdddp.exec:\pdddp.exe109⤵
-
\??\c:\vddjp.exec:\vddjp.exe110⤵
-
\??\c:\xrllxfl.exec:\xrllxfl.exe111⤵
-
\??\c:\llxrlrl.exec:\llxrlrl.exe112⤵
-
\??\c:\tntnnb.exec:\tntnnb.exe113⤵
-
\??\c:\pjdvd.exec:\pjdvd.exe114⤵
-
\??\c:\vdpdj.exec:\vdpdj.exe115⤵
-
\??\c:\7xfxffx.exec:\7xfxffx.exe116⤵
-
\??\c:\xxfffll.exec:\xxfffll.exe117⤵
-
\??\c:\tbntbh.exec:\tbntbh.exe118⤵
-
\??\c:\bhhntn.exec:\bhhntn.exe119⤵
-
\??\c:\ppdjd.exec:\ppdjd.exe120⤵
-
\??\c:\lrflrlr.exec:\lrflrlr.exe121⤵
-
\??\c:\rflllrf.exec:\rflllrf.exe122⤵
-
\??\c:\nbtbnn.exec:\nbtbnn.exe123⤵
-
\??\c:\thbnbb.exec:\thbnbb.exe124⤵
-
\??\c:\jjpdj.exec:\jjpdj.exe125⤵
-
\??\c:\jvdpj.exec:\jvdpj.exe126⤵
-
\??\c:\xlrlffx.exec:\xlrlffx.exe127⤵
-
\??\c:\xffxrlf.exec:\xffxrlf.exe128⤵
-
\??\c:\bhnhnh.exec:\bhnhnh.exe129⤵
-
\??\c:\vvpdv.exec:\vvpdv.exe130⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe131⤵
-
\??\c:\vvvpd.exec:\vvvpd.exe132⤵
-
\??\c:\fxllxxf.exec:\fxllxxf.exe133⤵
-
\??\c:\xllfxrr.exec:\xllfxrr.exe134⤵
-
\??\c:\1bbnhn.exec:\1bbnhn.exe135⤵
-
\??\c:\ttntnb.exec:\ttntnb.exe136⤵
-
\??\c:\djjpp.exec:\djjpp.exe137⤵
-
\??\c:\frxfxxx.exec:\frxfxxx.exe138⤵
-
\??\c:\llrrlfr.exec:\llrrlfr.exe139⤵
-
\??\c:\9pjvj.exec:\9pjvj.exe140⤵
-
\??\c:\djjpp.exec:\djjpp.exe141⤵
-
\??\c:\vdpdv.exec:\vdpdv.exe142⤵
-
\??\c:\7lfrlfx.exec:\7lfrlfx.exe143⤵
-
\??\c:\bbnnnn.exec:\bbnnnn.exe144⤵
-
\??\c:\vddvd.exec:\vddvd.exe145⤵
-
\??\c:\ddppj.exec:\ddppj.exe146⤵
-
\??\c:\lxxlxxr.exec:\lxxlxxr.exe147⤵
-
\??\c:\5fllfxr.exec:\5fllfxr.exe148⤵
-
\??\c:\bhbbbt.exec:\bhbbbt.exe149⤵
-
\??\c:\ntbnbt.exec:\ntbnbt.exe150⤵
-
\??\c:\jvvpd.exec:\jvvpd.exe151⤵
-
\??\c:\dpdjv.exec:\dpdjv.exe152⤵
-
\??\c:\xxrxfxl.exec:\xxrxfxl.exe153⤵
-
\??\c:\llfxxfl.exec:\llfxxfl.exe154⤵
-
\??\c:\bbttbn.exec:\bbttbn.exe155⤵
-
\??\c:\btbthh.exec:\btbthh.exe156⤵
-
\??\c:\pvvvj.exec:\pvvvj.exe157⤵
-
\??\c:\ddvpd.exec:\ddvpd.exe158⤵
-
\??\c:\7xrlfll.exec:\7xrlfll.exe159⤵
-
\??\c:\rflffff.exec:\rflffff.exe160⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe161⤵
-
\??\c:\bhbthb.exec:\bhbthb.exe162⤵
-
\??\c:\5djdd.exec:\5djdd.exe163⤵
-
\??\c:\vdpjd.exec:\vdpjd.exe164⤵
-
\??\c:\lfrlxrl.exec:\lfrlxrl.exe165⤵
-
\??\c:\5fxrflf.exec:\5fxrflf.exe166⤵
-
\??\c:\nhbtnn.exec:\nhbtnn.exe167⤵
-
\??\c:\bnhbnn.exec:\bnhbnn.exe168⤵
-
\??\c:\3jjvd.exec:\3jjvd.exe169⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe170⤵
-
\??\c:\xfxrfxx.exec:\xfxrfxx.exe171⤵
-
\??\c:\5bbbtt.exec:\5bbbtt.exe172⤵
-
\??\c:\tbhbtn.exec:\tbhbtn.exe173⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe174⤵
-
\??\c:\dddpj.exec:\dddpj.exe175⤵
-
\??\c:\lrxlxfr.exec:\lrxlxfr.exe176⤵
-
\??\c:\bnttnn.exec:\bnttnn.exe177⤵
-
\??\c:\9bbnhb.exec:\9bbnhb.exe178⤵
-
\??\c:\pjvpv.exec:\pjvpv.exe179⤵
-
\??\c:\xlrfrrf.exec:\xlrfrrf.exe180⤵
-
\??\c:\rxlfxxr.exec:\rxlfxxr.exe181⤵
-
\??\c:\nhhhnb.exec:\nhhhnb.exe182⤵
-
\??\c:\jjjdp.exec:\jjjdp.exe183⤵
-
\??\c:\dddvj.exec:\dddvj.exe184⤵
-
\??\c:\fllrxff.exec:\fllrxff.exe185⤵
-
\??\c:\xxffflx.exec:\xxffflx.exe186⤵
-
\??\c:\htnnnn.exec:\htnnnn.exe187⤵
-
\??\c:\9hnhbb.exec:\9hnhbb.exe188⤵
-
\??\c:\pdjdd.exec:\pdjdd.exe189⤵
-
\??\c:\jjjdp.exec:\jjjdp.exe190⤵
-
\??\c:\rrxxxll.exec:\rrxxxll.exe191⤵
-
\??\c:\fflfflx.exec:\fflfflx.exe192⤵
-
\??\c:\nbbbbh.exec:\nbbbbh.exe193⤵
-
\??\c:\hnbtbb.exec:\hnbtbb.exe194⤵
-
\??\c:\pjppp.exec:\pjppp.exe195⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe196⤵
-
\??\c:\xrrrlll.exec:\xrrrlll.exe197⤵
-
\??\c:\rxffxxf.exec:\rxffxxf.exe198⤵
-
\??\c:\thnbtn.exec:\thnbtn.exe199⤵
-
\??\c:\jjjjv.exec:\jjjjv.exe200⤵
-
\??\c:\jpjdj.exec:\jpjdj.exe201⤵
-
\??\c:\rxlrlrr.exec:\rxlrlrr.exe202⤵
-
\??\c:\hhttnn.exec:\hhttnn.exe203⤵
-
\??\c:\tnttnt.exec:\tnttnt.exe204⤵
-
\??\c:\pvjdj.exec:\pvjdj.exe205⤵
-
\??\c:\ddpjd.exec:\ddpjd.exe206⤵
-
\??\c:\lrxfxlr.exec:\lrxfxlr.exe207⤵
-
\??\c:\llrxxxx.exec:\llrxxxx.exe208⤵
-
\??\c:\nbhbnb.exec:\nbhbnb.exe209⤵
-
\??\c:\pdddj.exec:\pdddj.exe210⤵
-
\??\c:\vvppj.exec:\vvppj.exe211⤵
-
\??\c:\5flfxrf.exec:\5flfxrf.exe212⤵
-
\??\c:\hhhnbh.exec:\hhhnbh.exe213⤵
-
\??\c:\9hntnn.exec:\9hntnn.exe214⤵
-
\??\c:\vvvvj.exec:\vvvvj.exe215⤵
-
\??\c:\rrrxflf.exec:\rrrxflf.exe216⤵
-
\??\c:\fxlrrxx.exec:\fxlrrxx.exe217⤵
-
\??\c:\7htbbn.exec:\7htbbn.exe218⤵
-
\??\c:\bnhnhh.exec:\bnhnhh.exe219⤵
-
\??\c:\jvjdd.exec:\jvjdd.exe220⤵
-
\??\c:\pjvpp.exec:\pjvpp.exe221⤵
-
\??\c:\fxfxlll.exec:\fxfxlll.exe222⤵
-
\??\c:\xlxlrrr.exec:\xlxlrrr.exe223⤵
-
\??\c:\thnnhn.exec:\thnnhn.exe224⤵
-
\??\c:\7tnnhn.exec:\7tnnhn.exe225⤵
-
\??\c:\ddddv.exec:\ddddv.exe226⤵
-
\??\c:\rxrlfff.exec:\rxrlfff.exe227⤵
-
\??\c:\hbbbbb.exec:\hbbbbb.exe228⤵
-
\??\c:\btnnnn.exec:\btnnnn.exe229⤵
-
\??\c:\vvjdv.exec:\vvjdv.exe230⤵
-
\??\c:\pvddj.exec:\pvddj.exe231⤵
-
\??\c:\bbtbtb.exec:\bbtbtb.exe232⤵
-
\??\c:\ppppp.exec:\ppppp.exe233⤵
-
\??\c:\fffflll.exec:\fffflll.exe234⤵
-
\??\c:\tnbnbn.exec:\tnbnbn.exe235⤵
-
\??\c:\vpvdj.exec:\vpvdj.exe236⤵
-
\??\c:\xxrrxlr.exec:\xxrrxlr.exe237⤵
-
\??\c:\rxllfll.exec:\rxllfll.exe238⤵
-
\??\c:\nbhnnt.exec:\nbhnnt.exe239⤵
-
\??\c:\vddvd.exec:\vddvd.exe240⤵
-
\??\c:\jddjv.exec:\jddjv.exe241⤵