Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 02:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe
-
Size
446KB
-
MD5
1543451993d4064bb1d36de353d64680
-
SHA1
b418b2d89f4284675e4c14d26fd310db4cdc86b5
-
SHA256
b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef
-
SHA512
ad815f30b13d5e47143cd053433832d13b1e1033a4b423eda461dda434a1b83ef260f450e1c91ee3bb5b4c8363845140f19cb055d3a52ffef92a8d7523d9a909
-
SSDEEP
6144:n3C9BRo7tvnJ9Fywhk/T4i37K3BoKg0p5WI09JV:n3C9ytvn8whkb4i3e3GFO6JV
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2892-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2100-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1588-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/700-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1384-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1452-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/804-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/944-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/840-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2452-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1772-298-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 23 IoCs
Processes:
resource yara_rule behavioral1/memory/2892-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2100-14-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3020-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2624-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2796-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2636-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1588-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2484-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2484-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2484-74-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/700-86-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1384-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1928-109-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2540-127-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2756-136-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1452-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/804-181-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1768-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3008-208-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/944-235-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/840-244-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2452-253-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1772-298-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
ddfdbh.exeplffpvn.exetxjjh.exehvhxdf.exexnlxtxf.exedxpth.exetvllhr.exetpvfn.exedpfbd.exethdftdp.exenxvxljh.exedjbvvv.exetlptrvf.exexplrpd.exebdvxbpv.exevplpbd.exeftppvtr.exejlffllx.exenbdhldh.exetdnxrpp.exelbfpld.exexdbhp.exebnlhlb.exebbphrjl.exexfftrb.exehbnhnfp.exetxhxf.exeptbxn.exejpvpnf.exepbvxlj.exephhtjn.exeprlrd.exelpjpprx.exexrtvjft.exepxbpp.exehtlrxt.exevdtvx.exejfnld.exetdxrv.exenxhbjll.exefbbdvv.exejtbbb.exedfjlt.exedxbxjtb.exetjjhn.exenxprpv.exexjtph.exeppfjld.exefrdnf.exexxvtxfl.exevnptn.exehbxnp.exebpbdb.exebnbvp.exerfttd.exehlphvnv.exephnvd.exelfxhn.exedhrnn.exerbhlppb.exehrlvr.exebfjfhxj.exejvnvnxn.exefjdttn.exepid process 2100 ddfdbh.exe 3020 plffpvn.exe 2624 txjjh.exe 2796 hvhxdf.exe 2636 xnlxtxf.exe 1588 dxpth.exe 2484 tvllhr.exe 700 tpvfn.exe 1384 dpfbd.exe 1928 thdftdp.exe 2564 nxvxljh.exe 2540 djbvvv.exe 2756 tlptrvf.exe 1912 xplrpd.exe 1156 bdvxbpv.exe 2036 vplpbd.exe 1452 ftppvtr.exe 804 jlffllx.exe 1768 nbdhldh.exe 2136 tdnxrpp.exe 3008 lbfpld.exe 2300 xdbhp.exe 2152 bnlhlb.exe 944 bbphrjl.exe 840 xfftrb.exe 2452 hbnhnfp.exe 2804 txhxf.exe 3044 ptbxn.exe 784 jpvpnf.exe 2220 pbvxlj.exe 1772 phhtjn.exe 3000 prlrd.exe 892 lpjpprx.exe 1728 xrtvjft.exe 2552 pxbpp.exe 1604 htlrxt.exe 2508 vdtvx.exe 2664 jfnld.exe 2372 tdxrv.exe 2480 nxhbjll.exe 2636 fbbdvv.exe 2632 jtbbb.exe 2500 dfjlt.exe 1592 dxbxjtb.exe 1696 tjjhn.exe 1380 nxprpv.exe 1372 xjtph.exe 1072 ppfjld.exe 1928 frdnf.exe 2700 xxvtxfl.exe 2760 vnptn.exe 2764 hbxnp.exe 1092 bpbdb.exe 1904 bnbvp.exe 1920 rfttd.exe 2692 hlphvnv.exe 2240 phnvd.exe 948 lfxhn.exe 1760 dhrnn.exe 2276 rbhlppb.exe 596 hrlvr.exe 3048 bfjfhxj.exe 2172 jvnvnxn.exe 1064 fjdttn.exe -
Processes:
resource yara_rule behavioral1/memory/2892-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2100-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1588-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/700-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1384-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1452-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/804-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3008-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/944-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/840-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2452-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1772-298-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exeddfdbh.exeplffpvn.exetxjjh.exehvhxdf.exexnlxtxf.exedxpth.exetvllhr.exetpvfn.exedpfbd.exethdftdp.exenxvxljh.exedjbvvv.exetlptrvf.exexplrpd.exebdvxbpv.exedescription pid process target process PID 2892 wrote to memory of 2100 2892 b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe ddfdbh.exe PID 2892 wrote to memory of 2100 2892 b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe ddfdbh.exe PID 2892 wrote to memory of 2100 2892 b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe ddfdbh.exe PID 2892 wrote to memory of 2100 2892 b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe ddfdbh.exe PID 2100 wrote to memory of 3020 2100 ddfdbh.exe plffpvn.exe PID 2100 wrote to memory of 3020 2100 ddfdbh.exe plffpvn.exe PID 2100 wrote to memory of 3020 2100 ddfdbh.exe plffpvn.exe PID 2100 wrote to memory of 3020 2100 ddfdbh.exe plffpvn.exe PID 3020 wrote to memory of 2624 3020 plffpvn.exe txjjh.exe PID 3020 wrote to memory of 2624 3020 plffpvn.exe txjjh.exe PID 3020 wrote to memory of 2624 3020 plffpvn.exe txjjh.exe PID 3020 wrote to memory of 2624 3020 plffpvn.exe txjjh.exe PID 2624 wrote to memory of 2796 2624 txjjh.exe hvhxdf.exe PID 2624 wrote to memory of 2796 2624 txjjh.exe hvhxdf.exe PID 2624 wrote to memory of 2796 2624 txjjh.exe hvhxdf.exe PID 2624 wrote to memory of 2796 2624 txjjh.exe hvhxdf.exe PID 2796 wrote to memory of 2636 2796 hvhxdf.exe xnlxtxf.exe PID 2796 wrote to memory of 2636 2796 hvhxdf.exe xnlxtxf.exe PID 2796 wrote to memory of 2636 2796 hvhxdf.exe xnlxtxf.exe PID 2796 wrote to memory of 2636 2796 hvhxdf.exe xnlxtxf.exe PID 2636 wrote to memory of 1588 2636 xnlxtxf.exe dxpth.exe PID 2636 wrote to memory of 1588 2636 xnlxtxf.exe dxpth.exe PID 2636 wrote to memory of 1588 2636 xnlxtxf.exe dxpth.exe PID 2636 wrote to memory of 1588 2636 xnlxtxf.exe dxpth.exe PID 1588 wrote to memory of 2484 1588 dxpth.exe tvllhr.exe PID 1588 wrote to memory of 2484 1588 dxpth.exe tvllhr.exe PID 1588 wrote to memory of 2484 1588 dxpth.exe tvllhr.exe PID 1588 wrote to memory of 2484 1588 dxpth.exe tvllhr.exe PID 2484 wrote to memory of 700 2484 tvllhr.exe tpvfn.exe PID 2484 wrote to memory of 700 2484 tvllhr.exe tpvfn.exe PID 2484 wrote to memory of 700 2484 tvllhr.exe tpvfn.exe PID 2484 wrote to memory of 700 2484 tvllhr.exe tpvfn.exe PID 700 wrote to memory of 1384 700 tpvfn.exe dpfbd.exe PID 700 wrote to memory of 1384 700 tpvfn.exe dpfbd.exe PID 700 wrote to memory of 1384 700 tpvfn.exe dpfbd.exe PID 700 wrote to memory of 1384 700 tpvfn.exe dpfbd.exe PID 1384 wrote to memory of 1928 1384 dpfbd.exe thdftdp.exe PID 1384 wrote to memory of 1928 1384 dpfbd.exe thdftdp.exe PID 1384 wrote to memory of 1928 1384 dpfbd.exe thdftdp.exe PID 1384 wrote to memory of 1928 1384 dpfbd.exe thdftdp.exe PID 1928 wrote to memory of 2564 1928 thdftdp.exe nxvxljh.exe PID 1928 wrote to memory of 2564 1928 thdftdp.exe nxvxljh.exe PID 1928 wrote to memory of 2564 1928 thdftdp.exe nxvxljh.exe PID 1928 wrote to memory of 2564 1928 thdftdp.exe nxvxljh.exe PID 2564 wrote to memory of 2540 2564 nxvxljh.exe djbvvv.exe PID 2564 wrote to memory of 2540 2564 nxvxljh.exe djbvvv.exe PID 2564 wrote to memory of 2540 2564 nxvxljh.exe djbvvv.exe PID 2564 wrote to memory of 2540 2564 nxvxljh.exe djbvvv.exe PID 2540 wrote to memory of 2756 2540 djbvvv.exe tlptrvf.exe PID 2540 wrote to memory of 2756 2540 djbvvv.exe tlptrvf.exe PID 2540 wrote to memory of 2756 2540 djbvvv.exe tlptrvf.exe PID 2540 wrote to memory of 2756 2540 djbvvv.exe tlptrvf.exe PID 2756 wrote to memory of 1912 2756 tlptrvf.exe xplrpd.exe PID 2756 wrote to memory of 1912 2756 tlptrvf.exe xplrpd.exe PID 2756 wrote to memory of 1912 2756 tlptrvf.exe xplrpd.exe PID 2756 wrote to memory of 1912 2756 tlptrvf.exe xplrpd.exe PID 1912 wrote to memory of 1156 1912 xplrpd.exe bdvxbpv.exe PID 1912 wrote to memory of 1156 1912 xplrpd.exe bdvxbpv.exe PID 1912 wrote to memory of 1156 1912 xplrpd.exe bdvxbpv.exe PID 1912 wrote to memory of 1156 1912 xplrpd.exe bdvxbpv.exe PID 1156 wrote to memory of 2036 1156 bdvxbpv.exe vplpbd.exe PID 1156 wrote to memory of 2036 1156 bdvxbpv.exe vplpbd.exe PID 1156 wrote to memory of 2036 1156 bdvxbpv.exe vplpbd.exe PID 1156 wrote to memory of 2036 1156 bdvxbpv.exe vplpbd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe"C:\Users\Admin\AppData\Local\Temp\b90b62d9b81ae7a868a70b4a1f7c383f05e6c7fb73ed814eabe18d8a729e83ef.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\ddfdbh.exec:\ddfdbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\plffpvn.exec:\plffpvn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\txjjh.exec:\txjjh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hvhxdf.exec:\hvhxdf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xnlxtxf.exec:\xnlxtxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dxpth.exec:\dxpth.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tvllhr.exec:\tvllhr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tpvfn.exec:\tpvfn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpfbd.exec:\dpfbd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thdftdp.exec:\thdftdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nxvxljh.exec:\nxvxljh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djbvvv.exec:\djbvvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tlptrvf.exec:\tlptrvf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xplrpd.exec:\xplrpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bdvxbpv.exec:\bdvxbpv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vplpbd.exec:\vplpbd.exe17⤵
- Executes dropped EXE
-
\??\c:\ftppvtr.exec:\ftppvtr.exe18⤵
- Executes dropped EXE
-
\??\c:\jlffllx.exec:\jlffllx.exe19⤵
- Executes dropped EXE
-
\??\c:\nbdhldh.exec:\nbdhldh.exe20⤵
- Executes dropped EXE
-
\??\c:\tdnxrpp.exec:\tdnxrpp.exe21⤵
- Executes dropped EXE
-
\??\c:\lbfpld.exec:\lbfpld.exe22⤵
- Executes dropped EXE
-
\??\c:\xdbhp.exec:\xdbhp.exe23⤵
- Executes dropped EXE
-
\??\c:\bnlhlb.exec:\bnlhlb.exe24⤵
- Executes dropped EXE
-
\??\c:\bbphrjl.exec:\bbphrjl.exe25⤵
- Executes dropped EXE
-
\??\c:\xfftrb.exec:\xfftrb.exe26⤵
- Executes dropped EXE
-
\??\c:\hbnhnfp.exec:\hbnhnfp.exe27⤵
- Executes dropped EXE
-
\??\c:\txhxf.exec:\txhxf.exe28⤵
- Executes dropped EXE
-
\??\c:\ptbxn.exec:\ptbxn.exe29⤵
- Executes dropped EXE
-
\??\c:\jpvpnf.exec:\jpvpnf.exe30⤵
- Executes dropped EXE
-
\??\c:\pbvxlj.exec:\pbvxlj.exe31⤵
- Executes dropped EXE
-
\??\c:\phhtjn.exec:\phhtjn.exe32⤵
- Executes dropped EXE
-
\??\c:\prlrd.exec:\prlrd.exe33⤵
- Executes dropped EXE
-
\??\c:\lpjpprx.exec:\lpjpprx.exe34⤵
- Executes dropped EXE
-
\??\c:\xrtvjft.exec:\xrtvjft.exe35⤵
- Executes dropped EXE
-
\??\c:\pxbpp.exec:\pxbpp.exe36⤵
- Executes dropped EXE
-
\??\c:\htlrxt.exec:\htlrxt.exe37⤵
- Executes dropped EXE
-
\??\c:\vdtvx.exec:\vdtvx.exe38⤵
- Executes dropped EXE
-
\??\c:\jfnld.exec:\jfnld.exe39⤵
- Executes dropped EXE
-
\??\c:\tdxrv.exec:\tdxrv.exe40⤵
- Executes dropped EXE
-
\??\c:\nxhbjll.exec:\nxhbjll.exe41⤵
- Executes dropped EXE
-
\??\c:\fbbdvv.exec:\fbbdvv.exe42⤵
- Executes dropped EXE
-
\??\c:\jtbbb.exec:\jtbbb.exe43⤵
- Executes dropped EXE
-
\??\c:\dfjlt.exec:\dfjlt.exe44⤵
- Executes dropped EXE
-
\??\c:\dxbxjtb.exec:\dxbxjtb.exe45⤵
- Executes dropped EXE
-
\??\c:\tjjhn.exec:\tjjhn.exe46⤵
- Executes dropped EXE
-
\??\c:\nxprpv.exec:\nxprpv.exe47⤵
- Executes dropped EXE
-
\??\c:\xjtph.exec:\xjtph.exe48⤵
- Executes dropped EXE
-
\??\c:\ppfjld.exec:\ppfjld.exe49⤵
- Executes dropped EXE
-
\??\c:\frdnf.exec:\frdnf.exe50⤵
- Executes dropped EXE
-
\??\c:\xxvtxfl.exec:\xxvtxfl.exe51⤵
- Executes dropped EXE
-
\??\c:\vnptn.exec:\vnptn.exe52⤵
- Executes dropped EXE
-
\??\c:\hbxnp.exec:\hbxnp.exe53⤵
- Executes dropped EXE
-
\??\c:\bpbdb.exec:\bpbdb.exe54⤵
- Executes dropped EXE
-
\??\c:\bnbvp.exec:\bnbvp.exe55⤵
- Executes dropped EXE
-
\??\c:\rfttd.exec:\rfttd.exe56⤵
- Executes dropped EXE
-
\??\c:\hlphvnv.exec:\hlphvnv.exe57⤵
- Executes dropped EXE
-
\??\c:\phnvd.exec:\phnvd.exe58⤵
- Executes dropped EXE
-
\??\c:\lfxhn.exec:\lfxhn.exe59⤵
- Executes dropped EXE
-
\??\c:\dhrnn.exec:\dhrnn.exe60⤵
- Executes dropped EXE
-
\??\c:\rbhlppb.exec:\rbhlppb.exe61⤵
- Executes dropped EXE
-
\??\c:\hrlvr.exec:\hrlvr.exe62⤵
- Executes dropped EXE
-
\??\c:\bfjfhxj.exec:\bfjfhxj.exe63⤵
- Executes dropped EXE
-
\??\c:\jvnvnxn.exec:\jvnvnxn.exe64⤵
- Executes dropped EXE
-
\??\c:\fjdttn.exec:\fjdttn.exe65⤵
- Executes dropped EXE
-
\??\c:\lxdjx.exec:\lxdjx.exe66⤵
-
\??\c:\thjjhd.exec:\thjjhd.exe67⤵
-
\??\c:\hvrlx.exec:\hvrlx.exe68⤵
-
\??\c:\rppph.exec:\rppph.exe69⤵
-
\??\c:\jfvrh.exec:\jfvrh.exe70⤵
-
\??\c:\jhpvtr.exec:\jhpvtr.exe71⤵
-
\??\c:\vvlfl.exec:\vvlfl.exe72⤵
-
\??\c:\jfvjn.exec:\jfvjn.exe73⤵
-
\??\c:\jpfxlx.exec:\jpfxlx.exe74⤵
-
\??\c:\rnvrtdp.exec:\rnvrtdp.exe75⤵
-
\??\c:\xhbbpdl.exec:\xhbbpdl.exe76⤵
-
\??\c:\hvtthr.exec:\hvtthr.exe77⤵
-
\??\c:\rtxtt.exec:\rtxtt.exe78⤵
-
\??\c:\vtftn.exec:\vtftn.exe79⤵
-
\??\c:\hdxpfp.exec:\hdxpfp.exe80⤵
-
\??\c:\jbtrd.exec:\jbtrd.exe81⤵
-
\??\c:\fpvhv.exec:\fpvhv.exe82⤵
-
\??\c:\tbjnp.exec:\tbjnp.exe83⤵
-
\??\c:\blffh.exec:\blffh.exe84⤵
-
\??\c:\thrtxd.exec:\thrtxd.exe85⤵
-
\??\c:\xfhlld.exec:\xfhlld.exe86⤵
-
\??\c:\npdhtbl.exec:\npdhtbl.exe87⤵
-
\??\c:\fvtdf.exec:\fvtdf.exe88⤵
-
\??\c:\thbfhn.exec:\thbfhn.exe89⤵
-
\??\c:\xfbnlf.exec:\xfbnlf.exe90⤵
-
\??\c:\hhxbft.exec:\hhxbft.exe91⤵
-
\??\c:\tlnbp.exec:\tlnbp.exe92⤵
-
\??\c:\rhtlv.exec:\rhtlv.exe93⤵
-
\??\c:\vbxbdpf.exec:\vbxbdpf.exe94⤵
-
\??\c:\fjhppp.exec:\fjhppp.exe95⤵
-
\??\c:\njhhfvv.exec:\njhhfvv.exe96⤵
-
\??\c:\jtpbpx.exec:\jtpbpx.exe97⤵
-
\??\c:\nvhbrb.exec:\nvhbrb.exe98⤵
-
\??\c:\hxhpvtr.exec:\hxhpvtr.exe99⤵
-
\??\c:\rrffxp.exec:\rrffxp.exe100⤵
-
\??\c:\vhdfh.exec:\vhdfh.exe101⤵
-
\??\c:\djplfv.exec:\djplfv.exe102⤵
-
\??\c:\bphpn.exec:\bphpn.exe103⤵
-
\??\c:\xhnllh.exec:\xhnllh.exe104⤵
-
\??\c:\hbhvb.exec:\hbhvb.exe105⤵
-
\??\c:\njnlf.exec:\njnlf.exe106⤵
-
\??\c:\xpxnhh.exec:\xpxnhh.exe107⤵
-
\??\c:\pldftn.exec:\pldftn.exe108⤵
-
\??\c:\dpprb.exec:\dpprb.exe109⤵
-
\??\c:\xjvfndr.exec:\xjvfndr.exe110⤵
-
\??\c:\xntldt.exec:\xntldt.exe111⤵
-
\??\c:\pnrvvnh.exec:\pnrvvnh.exe112⤵
-
\??\c:\dphpdb.exec:\dphpdb.exe113⤵
-
\??\c:\hdvrjj.exec:\hdvrjj.exe114⤵
-
\??\c:\nrxxpxr.exec:\nrxxpxr.exe115⤵
-
\??\c:\jbvdh.exec:\jbvdh.exe116⤵
-
\??\c:\jbxdbx.exec:\jbxdbx.exe117⤵
-
\??\c:\ljxdrfn.exec:\ljxdrfn.exe118⤵
-
\??\c:\pvrbpff.exec:\pvrbpff.exe119⤵
-
\??\c:\vlnhd.exec:\vlnhd.exe120⤵
-
\??\c:\xlbbpn.exec:\xlbbpn.exe121⤵
-
\??\c:\jltvd.exec:\jltvd.exe122⤵
-
\??\c:\drfvvb.exec:\drfvvb.exe123⤵
-
\??\c:\xxpdjf.exec:\xxpdjf.exe124⤵
-
\??\c:\pnvhtp.exec:\pnvhtp.exe125⤵
-
\??\c:\ftpbh.exec:\ftpbh.exe126⤵
-
\??\c:\hxjvdx.exec:\hxjvdx.exe127⤵
-
\??\c:\pxbptn.exec:\pxbptn.exe128⤵
-
\??\c:\ntljd.exec:\ntljd.exe129⤵
-
\??\c:\ffbddd.exec:\ffbddd.exe130⤵
-
\??\c:\fxlpl.exec:\fxlpl.exe131⤵
-
\??\c:\hntjnr.exec:\hntjnr.exe132⤵
-
\??\c:\dlnhj.exec:\dlnhj.exe133⤵
-
\??\c:\dvbjx.exec:\dvbjx.exe134⤵
-
\??\c:\lrrjnbx.exec:\lrrjnbx.exe135⤵
-
\??\c:\tdhnh.exec:\tdhnh.exe136⤵
-
\??\c:\vnpxlf.exec:\vnpxlf.exe137⤵
-
\??\c:\lfrtpf.exec:\lfrtpf.exe138⤵
-
\??\c:\rnnpd.exec:\rnnpd.exe139⤵
-
\??\c:\lpbrhln.exec:\lpbrhln.exe140⤵
-
\??\c:\tfdvdlh.exec:\tfdvdlh.exe141⤵
-
\??\c:\hhxtt.exec:\hhxtt.exe142⤵
-
\??\c:\tlbthhl.exec:\tlbthhl.exe143⤵
-
\??\c:\pndhnt.exec:\pndhnt.exe144⤵
-
\??\c:\njjdlx.exec:\njjdlx.exe145⤵
-
\??\c:\pltrr.exec:\pltrr.exe146⤵
-
\??\c:\vjdllh.exec:\vjdllh.exe147⤵
-
\??\c:\jdxpjr.exec:\jdxpjr.exe148⤵
-
\??\c:\rbtdb.exec:\rbtdb.exe149⤵
-
\??\c:\jpvptnb.exec:\jpvptnb.exe150⤵
-
\??\c:\hxjljfv.exec:\hxjljfv.exe151⤵
-
\??\c:\nlnbr.exec:\nlnbr.exe152⤵
-
\??\c:\pttrjnv.exec:\pttrjnv.exe153⤵
-
\??\c:\pjthvj.exec:\pjthvj.exe154⤵
-
\??\c:\rdjftnh.exec:\rdjftnh.exe155⤵
-
\??\c:\thvbd.exec:\thvbd.exe156⤵
-
\??\c:\dxjvhnl.exec:\dxjvhnl.exe157⤵
-
\??\c:\thlxfl.exec:\thlxfl.exe158⤵
-
\??\c:\dphvjr.exec:\dphvjr.exe159⤵
-
\??\c:\hpnvn.exec:\hpnvn.exe160⤵
-
\??\c:\jnrbtfx.exec:\jnrbtfx.exe161⤵
-
\??\c:\vthptp.exec:\vthptp.exe162⤵
-
\??\c:\brrdbr.exec:\brrdbr.exe163⤵
-
\??\c:\vlrvvx.exec:\vlrvvx.exe164⤵
-
\??\c:\fbhpj.exec:\fbhpj.exe165⤵
-
\??\c:\tjddh.exec:\tjddh.exe166⤵
-
\??\c:\hlppvn.exec:\hlppvn.exe167⤵
-
\??\c:\jrrbvd.exec:\jrrbvd.exe168⤵
-
\??\c:\trhxprx.exec:\trhxprx.exe169⤵
-
\??\c:\xfvjh.exec:\xfvjh.exe170⤵
-
\??\c:\lrjfx.exec:\lrjfx.exe171⤵
-
\??\c:\dhrlhb.exec:\dhrlhb.exe172⤵
-
\??\c:\vjdrvhd.exec:\vjdrvhd.exe173⤵
-
\??\c:\npnfppx.exec:\npnfppx.exe174⤵
-
\??\c:\xxdtp.exec:\xxdtp.exe175⤵
-
\??\c:\dddhrv.exec:\dddhrv.exe176⤵
-
\??\c:\frlbbdn.exec:\frlbbdn.exe177⤵
-
\??\c:\ldlhprb.exec:\ldlhprb.exe178⤵
-
\??\c:\btpffjl.exec:\btpffjl.exe179⤵
-
\??\c:\tnhdpx.exec:\tnhdpx.exe180⤵
-
\??\c:\lbndtx.exec:\lbndtx.exe181⤵
-
\??\c:\xflxll.exec:\xflxll.exe182⤵
-
\??\c:\btthl.exec:\btthl.exe183⤵
-
\??\c:\vjltnb.exec:\vjltnb.exe184⤵
-
\??\c:\hnntjb.exec:\hnntjb.exe185⤵
-
\??\c:\xhjnnd.exec:\xhjnnd.exe186⤵
-
\??\c:\trbtr.exec:\trbtr.exe187⤵
-
\??\c:\fbtfbxl.exec:\fbtfbxl.exe188⤵
-
\??\c:\nfvtnf.exec:\nfvtnf.exe189⤵
-
\??\c:\rxnvvd.exec:\rxnvvd.exe190⤵
-
\??\c:\fthrv.exec:\fthrv.exe191⤵
-
\??\c:\jlvldtd.exec:\jlvldtd.exe192⤵
-
\??\c:\pvjpp.exec:\pvjpp.exe193⤵
-
\??\c:\vdhhrr.exec:\vdhhrr.exe194⤵
-
\??\c:\rnhnbf.exec:\rnhnbf.exe195⤵
-
\??\c:\rnhbdp.exec:\rnhbdp.exe196⤵
-
\??\c:\ppjldd.exec:\ppjldd.exe197⤵
-
\??\c:\bbphhp.exec:\bbphhp.exe198⤵
-
\??\c:\lvlhhbh.exec:\lvlhhbh.exe199⤵
-
\??\c:\rdrfpxp.exec:\rdrfpxp.exe200⤵
-
\??\c:\jdndp.exec:\jdndp.exe201⤵
-
\??\c:\lvpbfhd.exec:\lvpbfhd.exe202⤵
-
\??\c:\fhprl.exec:\fhprl.exe203⤵
-
\??\c:\hldpvv.exec:\hldpvv.exe204⤵
-
\??\c:\bnlnjb.exec:\bnlnjb.exe205⤵
-
\??\c:\prpjt.exec:\prpjt.exe206⤵
-
\??\c:\lfjhd.exec:\lfjhd.exe207⤵
-
\??\c:\pxtxdpx.exec:\pxtxdpx.exe208⤵
-
\??\c:\xtvxnn.exec:\xtvxnn.exe209⤵
-
\??\c:\bjpdx.exec:\bjpdx.exe210⤵
-
\??\c:\tbpvj.exec:\tbpvj.exe211⤵
-
\??\c:\ttnfxxl.exec:\ttnfxxl.exe212⤵
-
\??\c:\vnjvr.exec:\vnjvr.exe213⤵
-
\??\c:\fpjnhx.exec:\fpjnhx.exe214⤵
-
\??\c:\bvttbbr.exec:\bvttbbr.exe215⤵
-
\??\c:\vnljx.exec:\vnljx.exe216⤵
-
\??\c:\vfrdllh.exec:\vfrdllh.exe217⤵
-
\??\c:\vrjlrp.exec:\vrjlrp.exe218⤵
-
\??\c:\hllvl.exec:\hllvl.exe219⤵
-
\??\c:\rtdnhnd.exec:\rtdnhnd.exe220⤵
-
\??\c:\pnjlx.exec:\pnjlx.exe221⤵
-
\??\c:\ndxfdbr.exec:\ndxfdbr.exe222⤵
-
\??\c:\rxlnr.exec:\rxlnr.exe223⤵
-
\??\c:\hjltb.exec:\hjltb.exe224⤵
-
\??\c:\hnhpnhx.exec:\hnhpnhx.exe225⤵
-
\??\c:\ddpftl.exec:\ddpftl.exe226⤵
-
\??\c:\frbppv.exec:\frbppv.exe227⤵
-
\??\c:\ttpvddf.exec:\ttpvddf.exe228⤵
-
\??\c:\hpllhfp.exec:\hpllhfp.exe229⤵
-
\??\c:\tpvbvd.exec:\tpvbvd.exe230⤵
-
\??\c:\frpvpxp.exec:\frpvpxp.exe231⤵
-
\??\c:\xtvjlvx.exec:\xtvjlvx.exe232⤵
-
\??\c:\thpbdp.exec:\thpbdp.exe233⤵
-
\??\c:\dfntv.exec:\dfntv.exe234⤵
-
\??\c:\jpfxb.exec:\jpfxb.exe235⤵
-
\??\c:\pfdfnr.exec:\pfdfnr.exe236⤵
-
\??\c:\ftvpfb.exec:\ftvpfb.exe237⤵
-
\??\c:\fxlbhx.exec:\fxlbhx.exe238⤵
-
\??\c:\xnnprlp.exec:\xnnprlp.exe239⤵
-
\??\c:\nfpvn.exec:\nfpvn.exe240⤵
-
\??\c:\ddvrvr.exec:\ddvrvr.exe241⤵