Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 18:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe
-
Size
75KB
-
MD5
4d875390deb805bf8a78fb2b175276b7
-
SHA1
068f83f88dcd66400d7ae1e58c8006f9329f0d38
-
SHA256
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287
-
SHA512
2b07cf130888b433d6c63121e7f3fe666abc7d1c507d04acae8234d77a707d885c66c3782ce2262053656c8360c892450f72c6b29f6e651fc214fcce71d02ece
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDWiekja1br3GGBxfot0i3vyNXPz:ymb3NkkiQ3mdBjFWXkj7afoUL
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral1/memory/2336-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1252-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/548-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/956-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1804-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1812-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1372-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1432-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 25 IoCs
Processes:
resource yara_rule behavioral1/memory/2336-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1684-14-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2368-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1252-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1960-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2244-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2244-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2000-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/592-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/592-73-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/548-86-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/956-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2472-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2872-127-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2600-136-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2624-145-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2524-163-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1804-172-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2964-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1812-199-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2992-208-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1372-217-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2428-244-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1432-253-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2196-262-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
xvhhtld.exextxjx.exejlfldl.exelllhf.exenpxvhjd.exebvjnd.exejpxtlfn.exehrxtlp.exexjbnf.exefhnjlt.exebnnrpr.exedhdxdxl.exehvfrvx.exejptlj.exehfhnf.exerldffdr.exehbdjxx.exefbbfn.exehrjxb.exeppdpfl.exerrhpftv.exephlhbh.exehfdlthd.exebjfnlfd.exedbpbp.exeprnbn.exehvxbj.exeptdplv.exedtdrnh.exejrrbh.exefldfn.exejfblv.exebdplt.exebtxvhhp.exebffjxtt.exevjdnb.exetnjljhd.exevjlrdjh.exejtppbvv.exexflvt.exepnfrrb.exevlnhh.exevftlvr.exedjnhv.exerrhfr.exetfxnltb.exedtvlpfn.exebbvlh.exepnphxn.exexflxr.exehbnfhx.exenvxrff.exettpjd.exejrtpj.exedhnvbxv.exehxxxhjt.exehbrjhvj.exexxtvjt.exejbnrtr.exeddblj.exeblxfdpd.exebtlrrvp.exehdtdjtv.exebpvxjf.exepid process 1684 xvhhtld.exe 2368 xtxjx.exe 1252 jlfldl.exe 1960 lllhf.exe 2244 npxvhjd.exe 2000 bvjnd.exe 592 jpxtlfn.exe 548 hrxtlp.exe 956 xjbnf.exe 2772 fhnjlt.exe 2472 bnnrpr.exe 2872 dhdxdxl.exe 2600 hvfrvx.exe 2624 jptlj.exe 2700 hfhnf.exe 2524 rldffdr.exe 1804 hbdjxx.exe 2944 fbbfn.exe 2964 hrjxb.exe 1812 ppdpfl.exe 2992 rrhpftv.exe 1372 phlhbh.exe 1688 hfdlthd.exe 2960 bjfnlfd.exe 2428 dbpbp.exe 1432 prnbn.exe 2196 hvxbj.exe 1728 ptdplv.exe 888 dtdrnh.exe 2288 jrrbh.exe 1344 fldfn.exe 2076 jfblv.exe 2220 bdplt.exe 944 btxvhhp.exe 2348 bffjxtt.exe 2372 vjdnb.exe 1584 tnjljhd.exe 1252 vjlrdjh.exe 1272 jtppbvv.exe 1980 xflvt.exe 2032 pnfrrb.exe 580 vlnhh.exe 268 vftlvr.exe 1596 djnhv.exe 656 rrhfr.exe 2612 tfxnltb.exe 2488 dtvlpfn.exe 680 bbvlh.exe 2452 pnphxn.exe 2664 xflxr.exe 2836 hbnfhx.exe 2656 nvxrff.exe 2852 ttpjd.exe 2692 jrtpj.exe 1600 dhnvbxv.exe 2920 hxxxhjt.exe 2968 hbrjhvj.exe 1384 xxtvjt.exe 3068 jbnrtr.exe 2100 ddblj.exe 1604 blxfdpd.exe 908 btlrrvp.exe 2816 hdtdjtv.exe 1556 bpvxjf.exe -
Processes:
resource yara_rule behavioral1/memory/2336-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2000-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/548-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/956-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1804-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1812-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1372-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1432-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-262-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exexvhhtld.exextxjx.exejlfldl.exelllhf.exenpxvhjd.exebvjnd.exejpxtlfn.exehrxtlp.exexjbnf.exefhnjlt.exebnnrpr.exedhdxdxl.exehvfrvx.exejptlj.exehfhnf.exedescription pid process target process PID 2336 wrote to memory of 1684 2336 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe xvhhtld.exe PID 2336 wrote to memory of 1684 2336 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe xvhhtld.exe PID 2336 wrote to memory of 1684 2336 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe xvhhtld.exe PID 2336 wrote to memory of 1684 2336 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe xvhhtld.exe PID 1684 wrote to memory of 2368 1684 xvhhtld.exe xtxjx.exe PID 1684 wrote to memory of 2368 1684 xvhhtld.exe xtxjx.exe PID 1684 wrote to memory of 2368 1684 xvhhtld.exe xtxjx.exe PID 1684 wrote to memory of 2368 1684 xvhhtld.exe xtxjx.exe PID 2368 wrote to memory of 1252 2368 xtxjx.exe jlfldl.exe PID 2368 wrote to memory of 1252 2368 xtxjx.exe jlfldl.exe PID 2368 wrote to memory of 1252 2368 xtxjx.exe jlfldl.exe PID 2368 wrote to memory of 1252 2368 xtxjx.exe jlfldl.exe PID 1252 wrote to memory of 1960 1252 jlfldl.exe lllhf.exe PID 1252 wrote to memory of 1960 1252 jlfldl.exe lllhf.exe PID 1252 wrote to memory of 1960 1252 jlfldl.exe lllhf.exe PID 1252 wrote to memory of 1960 1252 jlfldl.exe lllhf.exe PID 1960 wrote to memory of 2244 1960 lllhf.exe npxvhjd.exe PID 1960 wrote to memory of 2244 1960 lllhf.exe npxvhjd.exe PID 1960 wrote to memory of 2244 1960 lllhf.exe npxvhjd.exe PID 1960 wrote to memory of 2244 1960 lllhf.exe npxvhjd.exe PID 2244 wrote to memory of 2000 2244 npxvhjd.exe bvjnd.exe PID 2244 wrote to memory of 2000 2244 npxvhjd.exe bvjnd.exe PID 2244 wrote to memory of 2000 2244 npxvhjd.exe bvjnd.exe PID 2244 wrote to memory of 2000 2244 npxvhjd.exe bvjnd.exe PID 2000 wrote to memory of 592 2000 bvjnd.exe jpxtlfn.exe PID 2000 wrote to memory of 592 2000 bvjnd.exe jpxtlfn.exe PID 2000 wrote to memory of 592 2000 bvjnd.exe jpxtlfn.exe PID 2000 wrote to memory of 592 2000 bvjnd.exe jpxtlfn.exe PID 592 wrote to memory of 548 592 jpxtlfn.exe hrxtlp.exe PID 592 wrote to memory of 548 592 jpxtlfn.exe hrxtlp.exe PID 592 wrote to memory of 548 592 jpxtlfn.exe hrxtlp.exe PID 592 wrote to memory of 548 592 jpxtlfn.exe hrxtlp.exe PID 548 wrote to memory of 956 548 hrxtlp.exe xjbnf.exe PID 548 wrote to memory of 956 548 hrxtlp.exe xjbnf.exe PID 548 wrote to memory of 956 548 hrxtlp.exe xjbnf.exe PID 548 wrote to memory of 956 548 hrxtlp.exe xjbnf.exe PID 956 wrote to memory of 2772 956 xjbnf.exe fhnjlt.exe PID 956 wrote to memory of 2772 956 xjbnf.exe fhnjlt.exe PID 956 wrote to memory of 2772 956 xjbnf.exe fhnjlt.exe PID 956 wrote to memory of 2772 956 xjbnf.exe fhnjlt.exe PID 2772 wrote to memory of 2472 2772 fhnjlt.exe bnnrpr.exe PID 2772 wrote to memory of 2472 2772 fhnjlt.exe bnnrpr.exe PID 2772 wrote to memory of 2472 2772 fhnjlt.exe bnnrpr.exe PID 2772 wrote to memory of 2472 2772 fhnjlt.exe bnnrpr.exe PID 2472 wrote to memory of 2872 2472 bnnrpr.exe dhdxdxl.exe PID 2472 wrote to memory of 2872 2472 bnnrpr.exe dhdxdxl.exe PID 2472 wrote to memory of 2872 2472 bnnrpr.exe dhdxdxl.exe PID 2472 wrote to memory of 2872 2472 bnnrpr.exe dhdxdxl.exe PID 2872 wrote to memory of 2600 2872 dhdxdxl.exe hvfrvx.exe PID 2872 wrote to memory of 2600 2872 dhdxdxl.exe hvfrvx.exe PID 2872 wrote to memory of 2600 2872 dhdxdxl.exe hvfrvx.exe PID 2872 wrote to memory of 2600 2872 dhdxdxl.exe hvfrvx.exe PID 2600 wrote to memory of 2624 2600 hvfrvx.exe jptlj.exe PID 2600 wrote to memory of 2624 2600 hvfrvx.exe jptlj.exe PID 2600 wrote to memory of 2624 2600 hvfrvx.exe jptlj.exe PID 2600 wrote to memory of 2624 2600 hvfrvx.exe jptlj.exe PID 2624 wrote to memory of 2700 2624 jptlj.exe hfhnf.exe PID 2624 wrote to memory of 2700 2624 jptlj.exe hfhnf.exe PID 2624 wrote to memory of 2700 2624 jptlj.exe hfhnf.exe PID 2624 wrote to memory of 2700 2624 jptlj.exe hfhnf.exe PID 2700 wrote to memory of 2524 2700 hfhnf.exe rldffdr.exe PID 2700 wrote to memory of 2524 2700 hfhnf.exe rldffdr.exe PID 2700 wrote to memory of 2524 2700 hfhnf.exe rldffdr.exe PID 2700 wrote to memory of 2524 2700 hfhnf.exe rldffdr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe"C:\Users\Admin\AppData\Local\Temp\04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\xvhhtld.exec:\xvhhtld.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xtxjx.exec:\xtxjx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jlfldl.exec:\jlfldl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lllhf.exec:\lllhf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\npxvhjd.exec:\npxvhjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bvjnd.exec:\bvjnd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpxtlfn.exec:\jpxtlfn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hrxtlp.exec:\hrxtlp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xjbnf.exec:\xjbnf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fhnjlt.exec:\fhnjlt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnrpr.exec:\bnnrpr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dhdxdxl.exec:\dhdxdxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hvfrvx.exec:\hvfrvx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jptlj.exec:\jptlj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hfhnf.exec:\hfhnf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rldffdr.exec:\rldffdr.exe17⤵
- Executes dropped EXE
-
\??\c:\hbdjxx.exec:\hbdjxx.exe18⤵
- Executes dropped EXE
-
\??\c:\fbbfn.exec:\fbbfn.exe19⤵
- Executes dropped EXE
-
\??\c:\hrjxb.exec:\hrjxb.exe20⤵
- Executes dropped EXE
-
\??\c:\ppdpfl.exec:\ppdpfl.exe21⤵
- Executes dropped EXE
-
\??\c:\rrhpftv.exec:\rrhpftv.exe22⤵
- Executes dropped EXE
-
\??\c:\phlhbh.exec:\phlhbh.exe23⤵
- Executes dropped EXE
-
\??\c:\hfdlthd.exec:\hfdlthd.exe24⤵
- Executes dropped EXE
-
\??\c:\bjfnlfd.exec:\bjfnlfd.exe25⤵
- Executes dropped EXE
-
\??\c:\dbpbp.exec:\dbpbp.exe26⤵
- Executes dropped EXE
-
\??\c:\prnbn.exec:\prnbn.exe27⤵
- Executes dropped EXE
-
\??\c:\hvxbj.exec:\hvxbj.exe28⤵
- Executes dropped EXE
-
\??\c:\ptdplv.exec:\ptdplv.exe29⤵
- Executes dropped EXE
-
\??\c:\dtdrnh.exec:\dtdrnh.exe30⤵
- Executes dropped EXE
-
\??\c:\jrrbh.exec:\jrrbh.exe31⤵
- Executes dropped EXE
-
\??\c:\fldfn.exec:\fldfn.exe32⤵
- Executes dropped EXE
-
\??\c:\jfblv.exec:\jfblv.exe33⤵
- Executes dropped EXE
-
\??\c:\bdplt.exec:\bdplt.exe34⤵
- Executes dropped EXE
-
\??\c:\btxvhhp.exec:\btxvhhp.exe35⤵
- Executes dropped EXE
-
\??\c:\bffjxtt.exec:\bffjxtt.exe36⤵
- Executes dropped EXE
-
\??\c:\vjdnb.exec:\vjdnb.exe37⤵
- Executes dropped EXE
-
\??\c:\tnjljhd.exec:\tnjljhd.exe38⤵
- Executes dropped EXE
-
\??\c:\vjlrdjh.exec:\vjlrdjh.exe39⤵
- Executes dropped EXE
-
\??\c:\jtppbvv.exec:\jtppbvv.exe40⤵
- Executes dropped EXE
-
\??\c:\xflvt.exec:\xflvt.exe41⤵
- Executes dropped EXE
-
\??\c:\pnfrrb.exec:\pnfrrb.exe42⤵
- Executes dropped EXE
-
\??\c:\vlnhh.exec:\vlnhh.exe43⤵
- Executes dropped EXE
-
\??\c:\vftlvr.exec:\vftlvr.exe44⤵
- Executes dropped EXE
-
\??\c:\djnhv.exec:\djnhv.exe45⤵
- Executes dropped EXE
-
\??\c:\rrhfr.exec:\rrhfr.exe46⤵
- Executes dropped EXE
-
\??\c:\tfxnltb.exec:\tfxnltb.exe47⤵
- Executes dropped EXE
-
\??\c:\dtvlpfn.exec:\dtvlpfn.exe48⤵
- Executes dropped EXE
-
\??\c:\bbvlh.exec:\bbvlh.exe49⤵
- Executes dropped EXE
-
\??\c:\pnphxn.exec:\pnphxn.exe50⤵
- Executes dropped EXE
-
\??\c:\xflxr.exec:\xflxr.exe51⤵
- Executes dropped EXE
-
\??\c:\hbnfhx.exec:\hbnfhx.exe52⤵
- Executes dropped EXE
-
\??\c:\nvxrff.exec:\nvxrff.exe53⤵
- Executes dropped EXE
-
\??\c:\ttpjd.exec:\ttpjd.exe54⤵
- Executes dropped EXE
-
\??\c:\jrtpj.exec:\jrtpj.exe55⤵
- Executes dropped EXE
-
\??\c:\dhnvbxv.exec:\dhnvbxv.exe56⤵
- Executes dropped EXE
-
\??\c:\hxxxhjt.exec:\hxxxhjt.exe57⤵
- Executes dropped EXE
-
\??\c:\hbrjhvj.exec:\hbrjhvj.exe58⤵
- Executes dropped EXE
-
\??\c:\xxtvjt.exec:\xxtvjt.exe59⤵
- Executes dropped EXE
-
\??\c:\jbnrtr.exec:\jbnrtr.exe60⤵
- Executes dropped EXE
-
\??\c:\ddblj.exec:\ddblj.exe61⤵
- Executes dropped EXE
-
\??\c:\blxfdpd.exec:\blxfdpd.exe62⤵
- Executes dropped EXE
-
\??\c:\btlrrvp.exec:\btlrrvp.exe63⤵
- Executes dropped EXE
-
\??\c:\hdtdjtv.exec:\hdtdjtv.exe64⤵
- Executes dropped EXE
-
\??\c:\bpvxjf.exec:\bpvxjf.exe65⤵
- Executes dropped EXE
-
\??\c:\djhhr.exec:\djhhr.exe66⤵
-
\??\c:\hpfhrjr.exec:\hpfhrjr.exe67⤵
-
\??\c:\hvltjh.exec:\hvltjh.exe68⤵
-
\??\c:\dpdbp.exec:\dpdbp.exe69⤵
-
\??\c:\fpdjpbx.exec:\fpdjpbx.exe70⤵
-
\??\c:\rhfhnjd.exec:\rhfhnjd.exe71⤵
-
\??\c:\rvllt.exec:\rvllt.exe72⤵
-
\??\c:\xxbdpxh.exec:\xxbdpxh.exe73⤵
-
\??\c:\jtdrnv.exec:\jtdrnv.exe74⤵
-
\??\c:\bptxxh.exec:\bptxxh.exe75⤵
-
\??\c:\tvhfpj.exec:\tvhfpj.exe76⤵
-
\??\c:\jbfdpr.exec:\jbfdpr.exe77⤵
-
\??\c:\xvrbfv.exec:\xvrbfv.exe78⤵
-
\??\c:\xjrtnx.exec:\xjrtnx.exe79⤵
-
\??\c:\lvxnb.exec:\lvxnb.exe80⤵
-
\??\c:\pdndxj.exec:\pdndxj.exe81⤵
-
\??\c:\hhpnhv.exec:\hhpnhv.exe82⤵
-
\??\c:\vhvjjp.exec:\vhvjjp.exe83⤵
-
\??\c:\blxjdp.exec:\blxjdp.exe84⤵
-
\??\c:\drbrhdn.exec:\drbrhdn.exe85⤵
-
\??\c:\tpndhn.exec:\tpndhn.exe86⤵
-
\??\c:\nxfph.exec:\nxfph.exe87⤵
-
\??\c:\dhftpjr.exec:\dhftpjr.exe88⤵
-
\??\c:\xtnftv.exec:\xtnftv.exe89⤵
-
\??\c:\hrpfrrl.exec:\hrpfrrl.exe90⤵
-
\??\c:\hblpfx.exec:\hblpfx.exe91⤵
-
\??\c:\hrljrx.exec:\hrljrx.exe92⤵
-
\??\c:\vvlhbp.exec:\vvlhbp.exe93⤵
-
\??\c:\xlhnltd.exec:\xlhnltd.exe94⤵
-
\??\c:\xrltx.exec:\xrltx.exe95⤵
-
\??\c:\rvhpdvn.exec:\rvhpdvn.exe96⤵
-
\??\c:\fttjdf.exec:\fttjdf.exe97⤵
-
\??\c:\htxxd.exec:\htxxd.exe98⤵
-
\??\c:\lvjddd.exec:\lvjddd.exe99⤵
-
\??\c:\pnttfb.exec:\pnttfb.exe100⤵
-
\??\c:\dptjdhn.exec:\dptjdhn.exe101⤵
-
\??\c:\lhhhld.exec:\lhhhld.exe102⤵
-
\??\c:\pdphj.exec:\pdphj.exe103⤵
-
\??\c:\fxltf.exec:\fxltf.exe104⤵
-
\??\c:\brvbvv.exec:\brvbvv.exe105⤵
-
\??\c:\rnrll.exec:\rnrll.exe106⤵
-
\??\c:\fxtjlt.exec:\fxtjlt.exe107⤵
-
\??\c:\dhrdllh.exec:\dhrdllh.exe108⤵
-
\??\c:\pjpxpx.exec:\pjpxpx.exe109⤵
-
\??\c:\xdtvpnb.exec:\xdtvpnb.exe110⤵
-
\??\c:\ddbxhpf.exec:\ddbxhpf.exe111⤵
-
\??\c:\lvfbh.exec:\lvfbh.exe112⤵
-
\??\c:\thdhx.exec:\thdhx.exe113⤵
-
\??\c:\lhptr.exec:\lhptr.exe114⤵
-
\??\c:\nhftr.exec:\nhftr.exe115⤵
-
\??\c:\jbxjrb.exec:\jbxjrb.exe116⤵
-
\??\c:\pxnxxp.exec:\pxnxxp.exe117⤵
-
\??\c:\dpdrhd.exec:\dpdrhd.exe118⤵
-
\??\c:\xhjdhp.exec:\xhjdhp.exe119⤵
-
\??\c:\lhdvlf.exec:\lhdvlf.exe120⤵
-
\??\c:\lvvvtt.exec:\lvvvtt.exe121⤵
-
\??\c:\jrhjvr.exec:\jrhjvr.exe122⤵
-
\??\c:\tfbnjjt.exec:\tfbnjjt.exe123⤵
-
\??\c:\vvxhpdj.exec:\vvxhpdj.exe124⤵
-
\??\c:\vvfppv.exec:\vvfppv.exe125⤵
-
\??\c:\jblpbpr.exec:\jblpbpr.exe126⤵
-
\??\c:\ltvbfj.exec:\ltvbfj.exe127⤵
-
\??\c:\pjjhnrd.exec:\pjjhnrd.exe128⤵
-
\??\c:\tlndtp.exec:\tlndtp.exe129⤵
-
\??\c:\vlxrpt.exec:\vlxrpt.exe130⤵
-
\??\c:\prpvhv.exec:\prpvhv.exe131⤵
-
\??\c:\lptlrbb.exec:\lptlrbb.exe132⤵
-
\??\c:\tlxpnr.exec:\tlxpnr.exe133⤵
-
\??\c:\dfjptr.exec:\dfjptr.exe134⤵
-
\??\c:\pllvb.exec:\pllvb.exe135⤵
-
\??\c:\vltntt.exec:\vltntt.exe136⤵
-
\??\c:\xxnpvh.exec:\xxnpvh.exe137⤵
-
\??\c:\ljhxjlb.exec:\ljhxjlb.exe138⤵
-
\??\c:\nltrn.exec:\nltrn.exe139⤵
-
\??\c:\dbhdxfb.exec:\dbhdxfb.exe140⤵
-
\??\c:\vrjbj.exec:\vrjbj.exe141⤵
-
\??\c:\ndpvv.exec:\ndpvv.exe142⤵
-
\??\c:\lxfnr.exec:\lxfnr.exe143⤵
-
\??\c:\dxblxvb.exec:\dxblxvb.exe144⤵
-
\??\c:\dfnxh.exec:\dfnxh.exe145⤵
-
\??\c:\bpdhnt.exec:\bpdhnt.exe146⤵
-
\??\c:\hrddr.exec:\hrddr.exe147⤵
-
\??\c:\nxlnf.exec:\nxlnf.exe148⤵
-
\??\c:\rlrrtnh.exec:\rlrrtnh.exe149⤵
-
\??\c:\jbnnnxl.exec:\jbnnnxl.exe150⤵
-
\??\c:\bdjlb.exec:\bdjlb.exe151⤵
-
\??\c:\nxdhv.exec:\nxdhv.exe152⤵
-
\??\c:\thvxtvx.exec:\thvxtvx.exe153⤵
-
\??\c:\dnfxvv.exec:\dnfxvv.exe154⤵
-
\??\c:\lnvjnrf.exec:\lnvjnrf.exe155⤵
-
\??\c:\vthnvf.exec:\vthnvf.exe156⤵
-
\??\c:\rhprvr.exec:\rhprvr.exe157⤵
-
\??\c:\xphdbf.exec:\xphdbf.exe158⤵
-
\??\c:\pthvnnx.exec:\pthvnnx.exe159⤵
-
\??\c:\nhdxx.exec:\nhdxx.exe160⤵
-
\??\c:\hjfjh.exec:\hjfjh.exe161⤵
-
\??\c:\lppjjbr.exec:\lppjjbr.exe162⤵
-
\??\c:\hhdxpb.exec:\hhdxpb.exe163⤵
-
\??\c:\tffrnx.exec:\tffrnx.exe164⤵
-
\??\c:\vrjvt.exec:\vrjvt.exe165⤵
-
\??\c:\jfpvxbb.exec:\jfpvxbb.exe166⤵
-
\??\c:\jbhhhbp.exec:\jbhhhbp.exe167⤵
-
\??\c:\pbhxr.exec:\pbhxr.exe168⤵
-
\??\c:\rrrlnhn.exec:\rrrlnhn.exe169⤵
-
\??\c:\vvfddtp.exec:\vvfddtp.exe170⤵
-
\??\c:\vhrhx.exec:\vhrhx.exe171⤵
-
\??\c:\fxfplvb.exec:\fxfplvb.exe172⤵
-
\??\c:\lblhdxn.exec:\lblhdxn.exe173⤵
-
\??\c:\vnhpjpx.exec:\vnhpjpx.exe174⤵
-
\??\c:\txftd.exec:\txftd.exe175⤵
-
\??\c:\xrfjp.exec:\xrfjp.exe176⤵
-
\??\c:\hblrtv.exec:\hblrtv.exe177⤵
-
\??\c:\nljfx.exec:\nljfx.exe178⤵
-
\??\c:\fftvl.exec:\fftvl.exe179⤵
-
\??\c:\rpjdtb.exec:\rpjdtb.exe180⤵
-
\??\c:\plhdp.exec:\plhdp.exe181⤵
-
\??\c:\bvfxvtr.exec:\bvfxvtr.exe182⤵
-
\??\c:\prrph.exec:\prrph.exe183⤵
-
\??\c:\vfdhvtv.exec:\vfdhvtv.exe184⤵
-
\??\c:\htlhdp.exec:\htlhdp.exe185⤵
-
\??\c:\vdfrtn.exec:\vdfrtn.exe186⤵
-
\??\c:\rbhtpjt.exec:\rbhtpjt.exe187⤵
-
\??\c:\plnhtn.exec:\plnhtn.exe188⤵
-
\??\c:\hhdnhv.exec:\hhdnhv.exe189⤵
-
\??\c:\hlxpl.exec:\hlxpl.exe190⤵
-
\??\c:\fndtxr.exec:\fndtxr.exe191⤵
-
\??\c:\jxjjx.exec:\jxjjx.exe192⤵
-
\??\c:\llxbnbh.exec:\llxbnbh.exe193⤵
-
\??\c:\plfjjn.exec:\plfjjn.exe194⤵
-
\??\c:\pnvht.exec:\pnvht.exe195⤵
-
\??\c:\lrflvnl.exec:\lrflvnl.exe196⤵
-
\??\c:\tnhhrh.exec:\tnhhrh.exe197⤵
-
\??\c:\jtplnrl.exec:\jtplnrl.exe198⤵
-
\??\c:\txjhh.exec:\txjhh.exe199⤵
-
\??\c:\rxdfxbr.exec:\rxdfxbr.exe200⤵
-
\??\c:\tlnbpvf.exec:\tlnbpvf.exe201⤵
-
\??\c:\rhfpf.exec:\rhfpf.exe202⤵
-
\??\c:\nxfnb.exec:\nxfnb.exe203⤵
-
\??\c:\jbrvh.exec:\jbrvh.exe204⤵
-
\??\c:\djpxlxb.exec:\djpxlxb.exe205⤵
-
\??\c:\hjfhtb.exec:\hjfhtb.exe206⤵
-
\??\c:\hfprdn.exec:\hfprdn.exe207⤵
-
\??\c:\ddhbvx.exec:\ddhbvx.exe208⤵
-
\??\c:\vxfjtx.exec:\vxfjtx.exe209⤵
-
\??\c:\vdvlnvd.exec:\vdvlnvd.exe210⤵
-
\??\c:\xbdfxr.exec:\xbdfxr.exe211⤵
-
\??\c:\llhlxfv.exec:\llhlxfv.exe212⤵
-
\??\c:\pjfjbjr.exec:\pjfjbjr.exe213⤵
-
\??\c:\hdftvbj.exec:\hdftvbj.exe214⤵
-
\??\c:\vjddjpx.exec:\vjddjpx.exe215⤵
-
\??\c:\xdhhbvx.exec:\xdhhbvx.exe216⤵
-
\??\c:\rlnljlt.exec:\rlnljlt.exe217⤵
-
\??\c:\jvbtfh.exec:\jvbtfh.exe218⤵
-
\??\c:\vhhdhfp.exec:\vhhdhfp.exe219⤵
-
\??\c:\xlphf.exec:\xlphf.exe220⤵
-
\??\c:\hxfjh.exec:\hxfjh.exe221⤵
-
\??\c:\dxdvph.exec:\dxdvph.exe222⤵
-
\??\c:\xdjpjnj.exec:\xdjpjnj.exe223⤵
-
\??\c:\thhhnxf.exec:\thhhnxf.exe224⤵
-
\??\c:\hhpntp.exec:\hhpntp.exe225⤵
-
\??\c:\ldvpr.exec:\ldvpr.exe226⤵
-
\??\c:\btxjbh.exec:\btxjbh.exe227⤵
-
\??\c:\txxnvvd.exec:\txxnvvd.exe228⤵
-
\??\c:\jljdnlx.exec:\jljdnlx.exe229⤵
-
\??\c:\vrhjl.exec:\vrhjl.exe230⤵
-
\??\c:\hhdbnp.exec:\hhdbnp.exe231⤵
-
\??\c:\rlhjdr.exec:\rlhjdr.exe232⤵
-
\??\c:\xjtxp.exec:\xjtxp.exe233⤵
-
\??\c:\dpfbrj.exec:\dpfbrj.exe234⤵
-
\??\c:\vdtbxf.exec:\vdtbxf.exe235⤵
-
\??\c:\dlpnbnt.exec:\dlpnbnt.exe236⤵
-
\??\c:\xvndft.exec:\xvndft.exe237⤵
-
\??\c:\dldxl.exec:\dldxl.exe238⤵
-
\??\c:\hhbpjxh.exec:\hhbpjxh.exe239⤵
-
\??\c:\pdpfhlt.exec:\pdpfhlt.exe240⤵
-
\??\c:\vdhplx.exec:\vdhplx.exe241⤵