Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe
-
Size
75KB
-
MD5
4d875390deb805bf8a78fb2b175276b7
-
SHA1
068f83f88dcd66400d7ae1e58c8006f9329f0d38
-
SHA256
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287
-
SHA512
2b07cf130888b433d6c63121e7f3fe666abc7d1c507d04acae8234d77a707d885c66c3782ce2262053656c8360c892450f72c6b29f6e651fc214fcce71d02ece
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDWiekja1br3GGBxfot0i3vyNXPz:ymb3NkkiQ3mdBjFWXkj7afoUL
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4092-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4360-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1048-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5048-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3320-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4020-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4008-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2356-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2164-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4208-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4528-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4780-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3696-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2264-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1204-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/392-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4092-12-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/696-20-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4360-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3416-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3416-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3416-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1048-8-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3416-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5048-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1336-50-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2300-57-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3320-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3320-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3320-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4020-73-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4008-81-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4008-80-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4008-79-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5020-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2356-97-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2164-103-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4928-109-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2720-115-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4208-121-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4528-133-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4780-145-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3696-150-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2264-168-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1204-174-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/392-181-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4836-199-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4764-210-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
5lxrlll.exelffxrrx.exenhtnhb.exe1tnttn.exelllfrxr.exettnnnn.exevjpjd.exexlxrffl.exe9rlfxxr.exebhthtt.exejdvpj.exexllrxxr.exefrxrllf.exe3thnhh.exedpppp.exerllxrrl.exefxrrllf.exe9hbtnt.exettbtnn.exevvvjp.exe9pppd.exelfllfff.exebthbhh.exebbtnht.exepvvpd.exe7pvvv.exexxflrrx.exenhbbtb.exetnttnt.exevpjdv.exefffffll.exehhhbbh.exepjvvp.exe3lrlfxr.exeflrrrxf.exethtbnn.exepvjdp.exelllfxxr.exelrfxxlx.exettbbnn.exennnbtt.exepjpjd.exejjvdv.exeddjdv.exefffxlll.exenbthhb.exethnnnn.exevvdpp.exexxffrfr.exenntthn.exejvpjd.exe7pppd.exexxfxrlx.exe3nntbh.exedvdpd.exepjdvp.exe1xrrxll.exebtnhbb.exenhntbt.exevjdjp.exe9ffrfxl.exexxrxxff.exettthbt.exedvdpp.exepid process 4092 5lxrlll.exe 696 lffxrrx.exe 4360 nhtnhb.exe 3416 1tnttn.exe 5048 lllfrxr.exe 1336 ttnnnn.exe 2300 vjpjd.exe 3320 xlxrffl.exe 4020 9rlfxxr.exe 4008 bhthtt.exe 5020 jdvpj.exe 2356 xllrxxr.exe 2164 frxrllf.exe 4928 3thnhh.exe 2720 dpppp.exe 4208 rllxrrl.exe 2796 fxrrllf.exe 4528 9hbtnt.exe 3144 ttbtnn.exe 4780 vvvjp.exe 3696 9pppd.exe 3112 lfllfff.exe 4768 bthbhh.exe 2264 bbtnht.exe 1204 pvvpd.exe 392 7pvvv.exe 3364 xxflrrx.exe 1760 nhbbtb.exe 4836 tnttnt.exe 4288 vpjdv.exe 4764 fffffll.exe 2204 hhhbbh.exe 864 pjvvp.exe 4736 3lrlfxr.exe 2548 flrrrxf.exe 4284 thtbnn.exe 1972 pvjdp.exe 2448 lllfxxr.exe 3124 lrfxxlx.exe 4140 ttbbnn.exe 4360 nnnbtt.exe 2708 pjpjd.exe 2280 jjvdv.exe 4492 ddjdv.exe 1336 fffxlll.exe 312 nbthhb.exe 544 thnnnn.exe 3320 vvdpp.exe 448 xxffrfr.exe 5080 nntthn.exe 2308 jvpjd.exe 3360 7pppd.exe 1268 xxfxrlx.exe 5028 3nntbh.exe 4328 dvdpd.exe 3000 pjdvp.exe 772 1xrrxll.exe 2064 btnhbb.exe 1464 nhntbt.exe 2884 vjdjp.exe 4060 9ffrfxl.exe 4400 xxrxxff.exe 4532 ttthbt.exe 3420 dvdpp.exe -
Processes:
resource yara_rule behavioral2/memory/1048-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4092-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1048-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5048-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2300-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4020-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4008-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4008-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4008-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5020-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2356-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2164-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4208-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4528-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4780-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3696-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1204-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/392-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe5lxrlll.exelffxrrx.exenhtnhb.exe1tnttn.exelllfrxr.exettnnnn.exevjpjd.exexlxrffl.exe9rlfxxr.exebhthtt.exejdvpj.exexllrxxr.exefrxrllf.exe3thnhh.exedpppp.exerllxrrl.exefxrrllf.exe9hbtnt.exettbtnn.exevvvjp.exe9pppd.exedescription pid process target process PID 1048 wrote to memory of 4092 1048 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe 5lxrlll.exe PID 1048 wrote to memory of 4092 1048 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe 5lxrlll.exe PID 1048 wrote to memory of 4092 1048 04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe 5lxrlll.exe PID 4092 wrote to memory of 696 4092 5lxrlll.exe lffxrrx.exe PID 4092 wrote to memory of 696 4092 5lxrlll.exe lffxrrx.exe PID 4092 wrote to memory of 696 4092 5lxrlll.exe lffxrrx.exe PID 696 wrote to memory of 4360 696 lffxrrx.exe nhtnhb.exe PID 696 wrote to memory of 4360 696 lffxrrx.exe nhtnhb.exe PID 696 wrote to memory of 4360 696 lffxrrx.exe nhtnhb.exe PID 4360 wrote to memory of 3416 4360 nhtnhb.exe 1tnttn.exe PID 4360 wrote to memory of 3416 4360 nhtnhb.exe 1tnttn.exe PID 4360 wrote to memory of 3416 4360 nhtnhb.exe 1tnttn.exe PID 3416 wrote to memory of 5048 3416 1tnttn.exe lllfrxr.exe PID 3416 wrote to memory of 5048 3416 1tnttn.exe lllfrxr.exe PID 3416 wrote to memory of 5048 3416 1tnttn.exe lllfrxr.exe PID 5048 wrote to memory of 1336 5048 lllfrxr.exe ttnnnn.exe PID 5048 wrote to memory of 1336 5048 lllfrxr.exe ttnnnn.exe PID 5048 wrote to memory of 1336 5048 lllfrxr.exe ttnnnn.exe PID 1336 wrote to memory of 2300 1336 ttnnnn.exe vjpjd.exe PID 1336 wrote to memory of 2300 1336 ttnnnn.exe vjpjd.exe PID 1336 wrote to memory of 2300 1336 ttnnnn.exe vjpjd.exe PID 2300 wrote to memory of 3320 2300 vjpjd.exe xlxrffl.exe PID 2300 wrote to memory of 3320 2300 vjpjd.exe xlxrffl.exe PID 2300 wrote to memory of 3320 2300 vjpjd.exe xlxrffl.exe PID 3320 wrote to memory of 4020 3320 xlxrffl.exe 9rlfxxr.exe PID 3320 wrote to memory of 4020 3320 xlxrffl.exe 9rlfxxr.exe PID 3320 wrote to memory of 4020 3320 xlxrffl.exe 9rlfxxr.exe PID 4020 wrote to memory of 4008 4020 9rlfxxr.exe bhthtt.exe PID 4020 wrote to memory of 4008 4020 9rlfxxr.exe bhthtt.exe PID 4020 wrote to memory of 4008 4020 9rlfxxr.exe bhthtt.exe PID 4008 wrote to memory of 5020 4008 bhthtt.exe jdvpj.exe PID 4008 wrote to memory of 5020 4008 bhthtt.exe jdvpj.exe PID 4008 wrote to memory of 5020 4008 bhthtt.exe jdvpj.exe PID 5020 wrote to memory of 2356 5020 jdvpj.exe xllrxxr.exe PID 5020 wrote to memory of 2356 5020 jdvpj.exe xllrxxr.exe PID 5020 wrote to memory of 2356 5020 jdvpj.exe xllrxxr.exe PID 2356 wrote to memory of 2164 2356 xllrxxr.exe frxrllf.exe PID 2356 wrote to memory of 2164 2356 xllrxxr.exe frxrllf.exe PID 2356 wrote to memory of 2164 2356 xllrxxr.exe frxrllf.exe PID 2164 wrote to memory of 4928 2164 frxrllf.exe 3thnhh.exe PID 2164 wrote to memory of 4928 2164 frxrllf.exe 3thnhh.exe PID 2164 wrote to memory of 4928 2164 frxrllf.exe 3thnhh.exe PID 4928 wrote to memory of 2720 4928 3thnhh.exe dpppp.exe PID 4928 wrote to memory of 2720 4928 3thnhh.exe dpppp.exe PID 4928 wrote to memory of 2720 4928 3thnhh.exe dpppp.exe PID 2720 wrote to memory of 4208 2720 dpppp.exe rllxrrl.exe PID 2720 wrote to memory of 4208 2720 dpppp.exe rllxrrl.exe PID 2720 wrote to memory of 4208 2720 dpppp.exe rllxrrl.exe PID 4208 wrote to memory of 2796 4208 rllxrrl.exe fxrrllf.exe PID 4208 wrote to memory of 2796 4208 rllxrrl.exe fxrrllf.exe PID 4208 wrote to memory of 2796 4208 rllxrrl.exe fxrrllf.exe PID 2796 wrote to memory of 4528 2796 fxrrllf.exe 9hbtnt.exe PID 2796 wrote to memory of 4528 2796 fxrrllf.exe 9hbtnt.exe PID 2796 wrote to memory of 4528 2796 fxrrllf.exe 9hbtnt.exe PID 4528 wrote to memory of 3144 4528 9hbtnt.exe ttbtnn.exe PID 4528 wrote to memory of 3144 4528 9hbtnt.exe ttbtnn.exe PID 4528 wrote to memory of 3144 4528 9hbtnt.exe ttbtnn.exe PID 3144 wrote to memory of 4780 3144 ttbtnn.exe vvvjp.exe PID 3144 wrote to memory of 4780 3144 ttbtnn.exe vvvjp.exe PID 3144 wrote to memory of 4780 3144 ttbtnn.exe vvvjp.exe PID 4780 wrote to memory of 3696 4780 vvvjp.exe 9pppd.exe PID 4780 wrote to memory of 3696 4780 vvvjp.exe 9pppd.exe PID 4780 wrote to memory of 3696 4780 vvvjp.exe 9pppd.exe PID 3696 wrote to memory of 3112 3696 9pppd.exe lfllfff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe"C:\Users\Admin\AppData\Local\Temp\04f85cea719343cbf789dc3ba42092afcd6f269b3b7b6eb592511eba044e2287.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\5lxrlll.exec:\5lxrlll.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxrrx.exec:\lffxrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtnhb.exec:\nhtnhb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1tnttn.exec:\1tnttn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lllfrxr.exec:\lllfrxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttnnnn.exec:\ttnnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjd.exec:\vjpjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxrffl.exec:\xlxrffl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9rlfxxr.exec:\9rlfxxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhthtt.exec:\bhthtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvpj.exec:\jdvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xllrxxr.exec:\xllrxxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frxrllf.exec:\frxrllf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3thnhh.exec:\3thnhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpppp.exec:\dpppp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rllxrrl.exec:\rllxrrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxrrllf.exec:\fxrrllf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9hbtnt.exec:\9hbtnt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbtnn.exec:\ttbtnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvvjp.exec:\vvvjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9pppd.exec:\9pppd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfllfff.exec:\lfllfff.exe23⤵
- Executes dropped EXE
-
\??\c:\bthbhh.exec:\bthbhh.exe24⤵
- Executes dropped EXE
-
\??\c:\bbtnht.exec:\bbtnht.exe25⤵
- Executes dropped EXE
-
\??\c:\pvvpd.exec:\pvvpd.exe26⤵
- Executes dropped EXE
-
\??\c:\7pvvv.exec:\7pvvv.exe27⤵
- Executes dropped EXE
-
\??\c:\xxflrrx.exec:\xxflrrx.exe28⤵
- Executes dropped EXE
-
\??\c:\nhbbtb.exec:\nhbbtb.exe29⤵
- Executes dropped EXE
-
\??\c:\tnttnt.exec:\tnttnt.exe30⤵
- Executes dropped EXE
-
\??\c:\vpjdv.exec:\vpjdv.exe31⤵
- Executes dropped EXE
-
\??\c:\fffffll.exec:\fffffll.exe32⤵
- Executes dropped EXE
-
\??\c:\hhhbbh.exec:\hhhbbh.exe33⤵
- Executes dropped EXE
-
\??\c:\pjvvp.exec:\pjvvp.exe34⤵
- Executes dropped EXE
-
\??\c:\3lrlfxr.exec:\3lrlfxr.exe35⤵
- Executes dropped EXE
-
\??\c:\flrrrxf.exec:\flrrrxf.exe36⤵
- Executes dropped EXE
-
\??\c:\thtbnn.exec:\thtbnn.exe37⤵
- Executes dropped EXE
-
\??\c:\pvjdp.exec:\pvjdp.exe38⤵
- Executes dropped EXE
-
\??\c:\lllfxxr.exec:\lllfxxr.exe39⤵
- Executes dropped EXE
-
\??\c:\lrfxxlx.exec:\lrfxxlx.exe40⤵
- Executes dropped EXE
-
\??\c:\ttbbnn.exec:\ttbbnn.exe41⤵
- Executes dropped EXE
-
\??\c:\nnnbtt.exec:\nnnbtt.exe42⤵
- Executes dropped EXE
-
\??\c:\pjpjd.exec:\pjpjd.exe43⤵
- Executes dropped EXE
-
\??\c:\jjvdv.exec:\jjvdv.exe44⤵
- Executes dropped EXE
-
\??\c:\ddjdv.exec:\ddjdv.exe45⤵
- Executes dropped EXE
-
\??\c:\fffxlll.exec:\fffxlll.exe46⤵
- Executes dropped EXE
-
\??\c:\nbthhb.exec:\nbthhb.exe47⤵
- Executes dropped EXE
-
\??\c:\thnnnn.exec:\thnnnn.exe48⤵
- Executes dropped EXE
-
\??\c:\vvdpp.exec:\vvdpp.exe49⤵
- Executes dropped EXE
-
\??\c:\xxffrfr.exec:\xxffrfr.exe50⤵
- Executes dropped EXE
-
\??\c:\nntthn.exec:\nntthn.exe51⤵
- Executes dropped EXE
-
\??\c:\jvpjd.exec:\jvpjd.exe52⤵
- Executes dropped EXE
-
\??\c:\7pppd.exec:\7pppd.exe53⤵
- Executes dropped EXE
-
\??\c:\xxfxrlx.exec:\xxfxrlx.exe54⤵
- Executes dropped EXE
-
\??\c:\3nntbh.exec:\3nntbh.exe55⤵
- Executes dropped EXE
-
\??\c:\dvdpd.exec:\dvdpd.exe56⤵
- Executes dropped EXE
-
\??\c:\pjdvp.exec:\pjdvp.exe57⤵
- Executes dropped EXE
-
\??\c:\1xrrxll.exec:\1xrrxll.exe58⤵
- Executes dropped EXE
-
\??\c:\btnhbb.exec:\btnhbb.exe59⤵
- Executes dropped EXE
-
\??\c:\nhntbt.exec:\nhntbt.exe60⤵
- Executes dropped EXE
-
\??\c:\vjdjp.exec:\vjdjp.exe61⤵
- Executes dropped EXE
-
\??\c:\9ffrfxl.exec:\9ffrfxl.exe62⤵
- Executes dropped EXE
-
\??\c:\xxrxxff.exec:\xxrxxff.exe63⤵
- Executes dropped EXE
-
\??\c:\ttthbt.exec:\ttthbt.exe64⤵
- Executes dropped EXE
-
\??\c:\dvdpp.exec:\dvdpp.exe65⤵
- Executes dropped EXE
-
\??\c:\pdvdd.exec:\pdvdd.exe66⤵
-
\??\c:\lxffxfl.exec:\lxffxfl.exe67⤵
-
\??\c:\tnhbtt.exec:\tnhbtt.exe68⤵
-
\??\c:\bbbtnh.exec:\bbbtnh.exe69⤵
-
\??\c:\dppjd.exec:\dppjd.exe70⤵
-
\??\c:\dppjp.exec:\dppjp.exe71⤵
-
\??\c:\rlfxfrl.exec:\rlfxfrl.exe72⤵
-
\??\c:\bntntn.exec:\bntntn.exe73⤵
-
\??\c:\ttnhbt.exec:\ttnhbt.exe74⤵
-
\??\c:\bnbbnh.exec:\bnbbnh.exe75⤵
-
\??\c:\pppjd.exec:\pppjd.exe76⤵
-
\??\c:\9jpdp.exec:\9jpdp.exe77⤵
-
\??\c:\rrlrfrl.exec:\rrlrfrl.exe78⤵
-
\??\c:\hhhbht.exec:\hhhbht.exe79⤵
-
\??\c:\bbtnth.exec:\bbtnth.exe80⤵
-
\??\c:\fffxrfx.exec:\fffxrfx.exe81⤵
-
\??\c:\xxlxlff.exec:\xxlxlff.exe82⤵
-
\??\c:\7nhbnn.exec:\7nhbnn.exe83⤵
-
\??\c:\pvdvj.exec:\pvdvj.exe84⤵
-
\??\c:\pvpjv.exec:\pvpjv.exe85⤵
-
\??\c:\rfrlxrl.exec:\rfrlxrl.exe86⤵
-
\??\c:\3nhtnh.exec:\3nhtnh.exe87⤵
-
\??\c:\3hnhhh.exec:\3hnhhh.exe88⤵
-
\??\c:\pjvdp.exec:\pjvdp.exe89⤵
-
\??\c:\1ppjd.exec:\1ppjd.exe90⤵
-
\??\c:\rflllfr.exec:\rflllfr.exe91⤵
-
\??\c:\lllrlll.exec:\lllrlll.exe92⤵
-
\??\c:\1tnnnn.exec:\1tnnnn.exe93⤵
-
\??\c:\9jppj.exec:\9jppj.exe94⤵
-
\??\c:\dpvvp.exec:\dpvvp.exe95⤵
-
\??\c:\xrllrff.exec:\xrllrff.exe96⤵
-
\??\c:\fffxrff.exec:\fffxrff.exe97⤵
-
\??\c:\3nnnnt.exec:\3nnnnt.exe98⤵
-
\??\c:\nbbtnn.exec:\nbbtnn.exe99⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe100⤵
-
\??\c:\jdjvp.exec:\jdjvp.exe101⤵
-
\??\c:\lxxllrr.exec:\lxxllrr.exe102⤵
-
\??\c:\xllfffx.exec:\xllfffx.exe103⤵
-
\??\c:\5hbhht.exec:\5hbhht.exe104⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe105⤵
-
\??\c:\frrxrxx.exec:\frrxrxx.exe106⤵
-
\??\c:\flxffrl.exec:\flxffrl.exe107⤵
-
\??\c:\bhhhhh.exec:\bhhhhh.exe108⤵
-
\??\c:\hbhbnt.exec:\hbhbnt.exe109⤵
-
\??\c:\jvpdj.exec:\jvpdj.exe110⤵
-
\??\c:\fxrxrrl.exec:\fxrxrrl.exe111⤵
-
\??\c:\rffxfxl.exec:\rffxfxl.exe112⤵
-
\??\c:\9nnnhn.exec:\9nnnhn.exe113⤵
-
\??\c:\htthtb.exec:\htthtb.exe114⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe115⤵
-
\??\c:\rlffffx.exec:\rlffffx.exe116⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe117⤵
-
\??\c:\bbbttn.exec:\bbbttn.exe118⤵
-
\??\c:\dpjjv.exec:\dpjjv.exe119⤵
-
\??\c:\lrxrxxf.exec:\lrxrxxf.exe120⤵
-
\??\c:\lfffrrx.exec:\lfffrrx.exe121⤵
-
\??\c:\htbtnn.exec:\htbtnn.exe122⤵
-
\??\c:\tnhnbt.exec:\tnhnbt.exe123⤵
-
\??\c:\jjvpp.exec:\jjvpp.exe124⤵
-
\??\c:\jvppp.exec:\jvppp.exe125⤵
-
\??\c:\lllrfff.exec:\lllrfff.exe126⤵
-
\??\c:\lfrrfxf.exec:\lfrrfxf.exe127⤵
-
\??\c:\hbtnnh.exec:\hbtnnh.exe128⤵
-
\??\c:\tbnhhh.exec:\tbnhhh.exe129⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe130⤵
-
\??\c:\ntnbnh.exec:\ntnbnh.exe131⤵
-
\??\c:\vdddd.exec:\vdddd.exe132⤵
-
\??\c:\jvjdp.exec:\jvjdp.exe133⤵
-
\??\c:\lfrxlrx.exec:\lfrxlrx.exe134⤵
-
\??\c:\frxfflf.exec:\frxfflf.exe135⤵
-
\??\c:\tbnnnt.exec:\tbnnnt.exe136⤵
-
\??\c:\htbttb.exec:\htbttb.exe137⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe138⤵
-
\??\c:\9ddpp.exec:\9ddpp.exe139⤵
-
\??\c:\ffxrfrl.exec:\ffxrfrl.exe140⤵
-
\??\c:\lrxflxr.exec:\lrxflxr.exe141⤵
-
\??\c:\3btbhn.exec:\3btbhn.exe142⤵
-
\??\c:\1ttnbb.exec:\1ttnbb.exe143⤵
-
\??\c:\ddddv.exec:\ddddv.exe144⤵
-
\??\c:\9llllrl.exec:\9llllrl.exe145⤵
-
\??\c:\xrfxxxr.exec:\xrfxxxr.exe146⤵
-
\??\c:\fxlxllx.exec:\fxlxllx.exe147⤵
-
\??\c:\bbtnbb.exec:\bbtnbb.exe148⤵
-
\??\c:\7djjv.exec:\7djjv.exe149⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe150⤵
-
\??\c:\9xxrffr.exec:\9xxrffr.exe151⤵
-
\??\c:\5xxrlll.exec:\5xxrlll.exe152⤵
-
\??\c:\xxrrrfr.exec:\xxrrrfr.exe153⤵
-
\??\c:\7hnnnn.exec:\7hnnnn.exe154⤵
-
\??\c:\3nhbtb.exec:\3nhbtb.exe155⤵
-
\??\c:\jvjjp.exec:\jvjjp.exe156⤵
-
\??\c:\1pdvp.exec:\1pdvp.exe157⤵
-
\??\c:\lflfrrr.exec:\lflfrrr.exe158⤵
-
\??\c:\xxllxll.exec:\xxllxll.exe159⤵
-
\??\c:\htnnbb.exec:\htnnbb.exe160⤵
-
\??\c:\ttbbbh.exec:\ttbbbh.exe161⤵
-
\??\c:\9jjdd.exec:\9jjdd.exe162⤵
-
\??\c:\jvddd.exec:\jvddd.exe163⤵
-
\??\c:\5xxffll.exec:\5xxffll.exe164⤵
-
\??\c:\llllrrl.exec:\llllrrl.exe165⤵
-
\??\c:\fllllrr.exec:\fllllrr.exe166⤵
-
\??\c:\ttttnn.exec:\ttttnn.exe167⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe168⤵
-
\??\c:\ddjvv.exec:\ddjvv.exe169⤵
-
\??\c:\vppjd.exec:\vppjd.exe170⤵
-
\??\c:\xxxrrxr.exec:\xxxrrxr.exe171⤵
-
\??\c:\fxrlxxl.exec:\fxrlxxl.exe172⤵
-
\??\c:\xxxxllf.exec:\xxxxllf.exe173⤵
-
\??\c:\3htnhh.exec:\3htnhh.exe174⤵
-
\??\c:\vvvjp.exec:\vvvjp.exe175⤵
-
\??\c:\vpvvp.exec:\vpvvp.exe176⤵
-
\??\c:\1lrlrrf.exec:\1lrlrrf.exe177⤵
-
\??\c:\rlxlxxl.exec:\rlxlxxl.exe178⤵
-
\??\c:\hhnnnn.exec:\hhnnnn.exe179⤵
-
\??\c:\nttnht.exec:\nttnht.exe180⤵
-
\??\c:\vpddp.exec:\vpddp.exe181⤵
-
\??\c:\jdddv.exec:\jdddv.exe182⤵
-
\??\c:\nbbbhn.exec:\nbbbhn.exe183⤵
-
\??\c:\7nbhhh.exec:\7nbhhh.exe184⤵
-
\??\c:\vvjjv.exec:\vvjjv.exe185⤵
-
\??\c:\xxlfflf.exec:\xxlfflf.exe186⤵
-
\??\c:\lxlllrr.exec:\lxlllrr.exe187⤵
-
\??\c:\nnbntb.exec:\nnbntb.exe188⤵
-
\??\c:\nnntnn.exec:\nnntnn.exe189⤵
-
\??\c:\dvdvv.exec:\dvdvv.exe190⤵
-
\??\c:\frrflfx.exec:\frrflfx.exe191⤵
-
\??\c:\lrxrlll.exec:\lrxrlll.exe192⤵
-
\??\c:\5nnnhn.exec:\5nnnhn.exe193⤵
-
\??\c:\nhbttt.exec:\nhbttt.exe194⤵
-
\??\c:\3dpjj.exec:\3dpjj.exe195⤵
-
\??\c:\ddjdj.exec:\ddjdj.exe196⤵
-
\??\c:\xrxflfr.exec:\xrxflfr.exe197⤵
-
\??\c:\nthnhh.exec:\nthnhh.exe198⤵
-
\??\c:\htbtbb.exec:\htbtbb.exe199⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe200⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe201⤵
-
\??\c:\9xrrfff.exec:\9xrrfff.exe202⤵
-
\??\c:\hhnntt.exec:\hhnntt.exe203⤵
-
\??\c:\bnhhbb.exec:\bnhhbb.exe204⤵
-
\??\c:\5jpjd.exec:\5jpjd.exe205⤵
-
\??\c:\pvddd.exec:\pvddd.exe206⤵
-
\??\c:\fxfxffl.exec:\fxfxffl.exe207⤵
-
\??\c:\frxrllf.exec:\frxrllf.exe208⤵
-
\??\c:\nnbhbb.exec:\nnbhbb.exe209⤵
-
\??\c:\tnttht.exec:\tnttht.exe210⤵
-
\??\c:\1jjdp.exec:\1jjdp.exe211⤵
-
\??\c:\ddjdd.exec:\ddjdd.exe212⤵
-
\??\c:\rlrlfxx.exec:\rlrlfxx.exe213⤵
-
\??\c:\ttbttt.exec:\ttbttt.exe214⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe215⤵
-
\??\c:\djppj.exec:\djppj.exe216⤵
-
\??\c:\7rxrlll.exec:\7rxrlll.exe217⤵
-
\??\c:\llllflf.exec:\llllflf.exe218⤵
-
\??\c:\5ntnhb.exec:\5ntnhb.exe219⤵
-
\??\c:\hbnnnn.exec:\hbnnnn.exe220⤵
-
\??\c:\djpjd.exec:\djpjd.exe221⤵
-
\??\c:\fflfxxx.exec:\fflfxxx.exe222⤵
-
\??\c:\rrffxff.exec:\rrffxff.exe223⤵
-
\??\c:\nntttt.exec:\nntttt.exe224⤵
-
\??\c:\dvppd.exec:\dvppd.exe225⤵
-
\??\c:\vjppj.exec:\vjppj.exe226⤵
-
\??\c:\vjpvp.exec:\vjpvp.exe227⤵
-
\??\c:\1fffxxr.exec:\1fffxxr.exe228⤵
-
\??\c:\nbbnbt.exec:\nbbnbt.exe229⤵
-
\??\c:\7hbhbh.exec:\7hbhbh.exe230⤵
-
\??\c:\ppvdp.exec:\ppvdp.exe231⤵
-
\??\c:\pvvdd.exec:\pvvdd.exe232⤵
-
\??\c:\xllfxfx.exec:\xllfxfx.exe233⤵
-
\??\c:\9lxrffl.exec:\9lxrffl.exe234⤵
-
\??\c:\btbbbt.exec:\btbbbt.exe235⤵
-
\??\c:\tbnnht.exec:\tbnnht.exe236⤵
-
\??\c:\7vjjd.exec:\7vjjd.exe237⤵
-
\??\c:\7pvpj.exec:\7pvpj.exe238⤵
-
\??\c:\rrfxllx.exec:\rrfxllx.exe239⤵
-
\??\c:\xrrxxxr.exec:\xrrxxxr.exe240⤵
-
\??\c:\9nthhh.exec:\9nthhh.exe241⤵