Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe
-
Size
75KB
-
MD5
392a8c3bf6092ff0b35a0e27137aff4c
-
SHA1
7bfd5581d89b05cc2e4f5c23df516fbd37169b7e
-
SHA256
0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b
-
SHA512
da5d5387059172b6e4b9916c65d35d2f1432cbbc6ef79aaf2dbc05367a3cfba0d6a023b2cafcf3f6a902c57a083d3364f300054962d8c4f4e3d667c6e8a1b388
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIoAh2QpUnX1A4:ymb3NkkiQ3mdBjFIsIVbpUx
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2964-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4780-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4564-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1440-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3092-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3208-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1372-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2856-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1632-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1056-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4960-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1404-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1984-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3192-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3680-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral2/memory/1124-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2912-12-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2912-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2912-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2964-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2648-28-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4120-35-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3096-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4780-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3348-56-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4564-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1440-69-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1440-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3092-78-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3092-77-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3208-88-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5052-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1372-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2856-112-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/232-119-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4400-124-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1972-130-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4676-136-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1632-148-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4764-154-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1056-159-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4960-166-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2340-172-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1404-177-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1984-191-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3192-201-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3680-207-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
bntnnn.exeddvpv.exefrxrrff.exeflxfrrl.exelxrrfxf.exettbnnn.exedpvvd.exevdpdj.exenbhbnh.exedpvpj.exelrxxxff.exetthtth.exevpjjd.exerfllfxr.exehthhbh.exepvvvj.exexrllfll.exexfxrrrr.exenntttt.exevpvvv.exexxfffff.exejjppp.exedvddv.exenbbbnn.exetthbnn.exeddpjp.exelrlxrxf.exe3nnnhn.exebtbbtt.exefrrrfff.exe9tnhbb.exebhhhnh.exejdpjp.exerrfxrlf.exerxfflff.exenhnttt.exenhhbhn.exevjpvj.exexflfxxr.exefrxrxrr.exethbbth.exennnnhn.exejvvvp.exerfxxxll.exerfrxxxx.exennnhhn.exe3jdpv.exenhtnnt.exeppppj.exevpppj.exellxxflx.exexlrxflf.exedvddv.exelflfxrr.exejvddv.exe1vjdd.exerfxxffx.exebbbthb.exejjvvv.exedvjpd.exelxxrlll.exebbbbtt.exejdjdv.exejdddv.exepid process 2912 bntnnn.exe 2964 ddvpv.exe 2648 frxrrff.exe 4120 flxfrrl.exe 3096 lxrrfxf.exe 4780 ttbnnn.exe 3348 dpvvd.exe 4564 vdpdj.exe 1440 nbhbnh.exe 3092 dpvpj.exe 3208 lrxxxff.exe 5052 tthtth.exe 1372 vpjjd.exe 4104 rfllfxr.exe 2856 hthhbh.exe 232 pvvvj.exe 4400 xrllfll.exe 1972 xfxrrrr.exe 4676 nntttt.exe 4416 vpvvv.exe 1632 xxfffff.exe 4764 jjppp.exe 1056 dvddv.exe 4960 nbbbnn.exe 2340 tthbnn.exe 1404 ddpjp.exe 4696 lrlxrxf.exe 1984 3nnnhn.exe 4920 btbbtt.exe 3192 frrrfff.exe 3680 9tnhbb.exe 4072 bhhhnh.exe 4284 jdpjp.exe 3508 rrfxrlf.exe 3084 rxfflff.exe 3388 nhnttt.exe 1580 nhhbhn.exe 3980 vjpvj.exe 2816 xflfxxr.exe 1856 frxrxrr.exe 3708 thbbth.exe 4576 nnnnhn.exe 1608 jvvvp.exe 4368 rfxxxll.exe 1576 rfrxxxx.exe 1496 nnnhhn.exe 2940 3jdpv.exe 1172 nhtnnt.exe 3452 ppppj.exe 4884 vpppj.exe 1248 llxxflx.exe 4300 xlrxflf.exe 2416 dvddv.exe 2428 lflfxrr.exe 4496 jvddv.exe 2936 1vjdd.exe 5004 rfxxffx.exe 4964 bbbthb.exe 4776 jjvvv.exe 4488 dvjpd.exe 3040 lxxrlll.exe 3060 bbbbtt.exe 3092 jdjdv.exe 1036 jdddv.exe -
Processes:
resource yara_rule behavioral2/memory/1124-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2964-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2648-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4780-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4564-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3092-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3092-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3208-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1372-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2856-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1972-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1632-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1056-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4960-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1404-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1984-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3192-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3680-207-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exebntnnn.exeddvpv.exefrxrrff.exeflxfrrl.exelxrrfxf.exettbnnn.exedpvvd.exevdpdj.exenbhbnh.exedpvpj.exelrxxxff.exetthtth.exevpjjd.exerfllfxr.exehthhbh.exepvvvj.exexrllfll.exexfxrrrr.exenntttt.exevpvvv.exexxfffff.exedescription pid process target process PID 1124 wrote to memory of 2912 1124 0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe bntnnn.exe PID 1124 wrote to memory of 2912 1124 0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe bntnnn.exe PID 1124 wrote to memory of 2912 1124 0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe bntnnn.exe PID 2912 wrote to memory of 2964 2912 bntnnn.exe ddvpv.exe PID 2912 wrote to memory of 2964 2912 bntnnn.exe ddvpv.exe PID 2912 wrote to memory of 2964 2912 bntnnn.exe ddvpv.exe PID 2964 wrote to memory of 2648 2964 ddvpv.exe frxrrff.exe PID 2964 wrote to memory of 2648 2964 ddvpv.exe frxrrff.exe PID 2964 wrote to memory of 2648 2964 ddvpv.exe frxrrff.exe PID 2648 wrote to memory of 4120 2648 frxrrff.exe flxfrrl.exe PID 2648 wrote to memory of 4120 2648 frxrrff.exe flxfrrl.exe PID 2648 wrote to memory of 4120 2648 frxrrff.exe flxfrrl.exe PID 4120 wrote to memory of 3096 4120 flxfrrl.exe lxrrfxf.exe PID 4120 wrote to memory of 3096 4120 flxfrrl.exe lxrrfxf.exe PID 4120 wrote to memory of 3096 4120 flxfrrl.exe lxrrfxf.exe PID 3096 wrote to memory of 4780 3096 lxrrfxf.exe ttbnnn.exe PID 3096 wrote to memory of 4780 3096 lxrrfxf.exe ttbnnn.exe PID 3096 wrote to memory of 4780 3096 lxrrfxf.exe ttbnnn.exe PID 4780 wrote to memory of 3348 4780 ttbnnn.exe dpvvd.exe PID 4780 wrote to memory of 3348 4780 ttbnnn.exe dpvvd.exe PID 4780 wrote to memory of 3348 4780 ttbnnn.exe dpvvd.exe PID 3348 wrote to memory of 4564 3348 dpvvd.exe vdpdj.exe PID 3348 wrote to memory of 4564 3348 dpvvd.exe vdpdj.exe PID 3348 wrote to memory of 4564 3348 dpvvd.exe vdpdj.exe PID 4564 wrote to memory of 1440 4564 vdpdj.exe nbhbnh.exe PID 4564 wrote to memory of 1440 4564 vdpdj.exe nbhbnh.exe PID 4564 wrote to memory of 1440 4564 vdpdj.exe nbhbnh.exe PID 1440 wrote to memory of 3092 1440 nbhbnh.exe dpvpj.exe PID 1440 wrote to memory of 3092 1440 nbhbnh.exe dpvpj.exe PID 1440 wrote to memory of 3092 1440 nbhbnh.exe dpvpj.exe PID 3092 wrote to memory of 3208 3092 dpvpj.exe lrxxxff.exe PID 3092 wrote to memory of 3208 3092 dpvpj.exe lrxxxff.exe PID 3092 wrote to memory of 3208 3092 dpvpj.exe lrxxxff.exe PID 3208 wrote to memory of 5052 3208 lrxxxff.exe tthtth.exe PID 3208 wrote to memory of 5052 3208 lrxxxff.exe tthtth.exe PID 3208 wrote to memory of 5052 3208 lrxxxff.exe tthtth.exe PID 5052 wrote to memory of 1372 5052 tthtth.exe vpjjd.exe PID 5052 wrote to memory of 1372 5052 tthtth.exe vpjjd.exe PID 5052 wrote to memory of 1372 5052 tthtth.exe vpjjd.exe PID 1372 wrote to memory of 4104 1372 vpjjd.exe rfllfxr.exe PID 1372 wrote to memory of 4104 1372 vpjjd.exe rfllfxr.exe PID 1372 wrote to memory of 4104 1372 vpjjd.exe rfllfxr.exe PID 4104 wrote to memory of 2856 4104 rfllfxr.exe hthhbh.exe PID 4104 wrote to memory of 2856 4104 rfllfxr.exe hthhbh.exe PID 4104 wrote to memory of 2856 4104 rfllfxr.exe hthhbh.exe PID 2856 wrote to memory of 232 2856 hthhbh.exe pvvvj.exe PID 2856 wrote to memory of 232 2856 hthhbh.exe pvvvj.exe PID 2856 wrote to memory of 232 2856 hthhbh.exe pvvvj.exe PID 232 wrote to memory of 4400 232 pvvvj.exe xrllfll.exe PID 232 wrote to memory of 4400 232 pvvvj.exe xrllfll.exe PID 232 wrote to memory of 4400 232 pvvvj.exe xrllfll.exe PID 4400 wrote to memory of 1972 4400 xrllfll.exe xfxrrrr.exe PID 4400 wrote to memory of 1972 4400 xrllfll.exe xfxrrrr.exe PID 4400 wrote to memory of 1972 4400 xrllfll.exe xfxrrrr.exe PID 1972 wrote to memory of 4676 1972 xfxrrrr.exe nntttt.exe PID 1972 wrote to memory of 4676 1972 xfxrrrr.exe nntttt.exe PID 1972 wrote to memory of 4676 1972 xfxrrrr.exe nntttt.exe PID 4676 wrote to memory of 4416 4676 nntttt.exe vpvvv.exe PID 4676 wrote to memory of 4416 4676 nntttt.exe vpvvv.exe PID 4676 wrote to memory of 4416 4676 nntttt.exe vpvvv.exe PID 4416 wrote to memory of 1632 4416 vpvvv.exe xxfffff.exe PID 4416 wrote to memory of 1632 4416 vpvvv.exe xxfffff.exe PID 4416 wrote to memory of 1632 4416 vpvvv.exe xxfffff.exe PID 1632 wrote to memory of 4764 1632 xxfffff.exe jjppp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe"C:\Users\Admin\AppData\Local\Temp\0cb0d337f859cc78cee7bd6180942547aac1009066293be7e1acbfcce62fb83b.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\bntnnn.exec:\bntnnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddvpv.exec:\ddvpv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frxrrff.exec:\frxrrff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flxfrrl.exec:\flxfrrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxrrfxf.exec:\lxrrfxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbnnn.exec:\ttbnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpvvd.exec:\dpvvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdpdj.exec:\vdpdj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbhbnh.exec:\nbhbnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpvpj.exec:\dpvpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrxxxff.exec:\lrxxxff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tthtth.exec:\tthtth.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpjjd.exec:\vpjjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rfllfxr.exec:\rfllfxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hthhbh.exec:\hthhbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvvvj.exec:\pvvvj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrllfll.exec:\xrllfll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxrrrr.exec:\xfxrrrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nntttt.exec:\nntttt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpvvv.exec:\vpvvv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxfffff.exec:\xxfffff.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjppp.exec:\jjppp.exe23⤵
- Executes dropped EXE
-
\??\c:\dvddv.exec:\dvddv.exe24⤵
- Executes dropped EXE
-
\??\c:\nbbbnn.exec:\nbbbnn.exe25⤵
- Executes dropped EXE
-
\??\c:\tthbnn.exec:\tthbnn.exe26⤵
- Executes dropped EXE
-
\??\c:\ddpjp.exec:\ddpjp.exe27⤵
- Executes dropped EXE
-
\??\c:\lrlxrxf.exec:\lrlxrxf.exe28⤵
- Executes dropped EXE
-
\??\c:\3nnnhn.exec:\3nnnhn.exe29⤵
- Executes dropped EXE
-
\??\c:\btbbtt.exec:\btbbtt.exe30⤵
- Executes dropped EXE
-
\??\c:\frrrfff.exec:\frrrfff.exe31⤵
- Executes dropped EXE
-
\??\c:\9tnhbb.exec:\9tnhbb.exe32⤵
- Executes dropped EXE
-
\??\c:\bhhhnh.exec:\bhhhnh.exe33⤵
- Executes dropped EXE
-
\??\c:\jdpjp.exec:\jdpjp.exe34⤵
- Executes dropped EXE
-
\??\c:\rrfxrlf.exec:\rrfxrlf.exe35⤵
- Executes dropped EXE
-
\??\c:\rxfflff.exec:\rxfflff.exe36⤵
- Executes dropped EXE
-
\??\c:\nhnttt.exec:\nhnttt.exe37⤵
- Executes dropped EXE
-
\??\c:\nhhbhn.exec:\nhhbhn.exe38⤵
- Executes dropped EXE
-
\??\c:\vjpvj.exec:\vjpvj.exe39⤵
- Executes dropped EXE
-
\??\c:\xflfxxr.exec:\xflfxxr.exe40⤵
- Executes dropped EXE
-
\??\c:\frxrxrr.exec:\frxrxrr.exe41⤵
- Executes dropped EXE
-
\??\c:\thbbth.exec:\thbbth.exe42⤵
- Executes dropped EXE
-
\??\c:\nnnnhn.exec:\nnnnhn.exe43⤵
- Executes dropped EXE
-
\??\c:\jvvvp.exec:\jvvvp.exe44⤵
- Executes dropped EXE
-
\??\c:\rfxxxll.exec:\rfxxxll.exe45⤵
- Executes dropped EXE
-
\??\c:\rfrxxxx.exec:\rfrxxxx.exe46⤵
- Executes dropped EXE
-
\??\c:\nnnhhn.exec:\nnnhhn.exe47⤵
- Executes dropped EXE
-
\??\c:\3jdpv.exec:\3jdpv.exe48⤵
- Executes dropped EXE
-
\??\c:\nhtnnt.exec:\nhtnnt.exe49⤵
- Executes dropped EXE
-
\??\c:\ppppj.exec:\ppppj.exe50⤵
- Executes dropped EXE
-
\??\c:\vpppj.exec:\vpppj.exe51⤵
- Executes dropped EXE
-
\??\c:\llxxflx.exec:\llxxflx.exe52⤵
- Executes dropped EXE
-
\??\c:\xlrxflf.exec:\xlrxflf.exe53⤵
- Executes dropped EXE
-
\??\c:\dvddv.exec:\dvddv.exe54⤵
- Executes dropped EXE
-
\??\c:\lflfxrr.exec:\lflfxrr.exe55⤵
- Executes dropped EXE
-
\??\c:\jvddv.exec:\jvddv.exe56⤵
- Executes dropped EXE
-
\??\c:\1vjdd.exec:\1vjdd.exe57⤵
- Executes dropped EXE
-
\??\c:\rfxxffx.exec:\rfxxffx.exe58⤵
- Executes dropped EXE
-
\??\c:\bbbthb.exec:\bbbthb.exe59⤵
- Executes dropped EXE
-
\??\c:\jjvvv.exec:\jjvvv.exe60⤵
- Executes dropped EXE
-
\??\c:\dvjpd.exec:\dvjpd.exe61⤵
- Executes dropped EXE
-
\??\c:\lxxrlll.exec:\lxxrlll.exe62⤵
- Executes dropped EXE
-
\??\c:\bbbbtt.exec:\bbbbtt.exe63⤵
- Executes dropped EXE
-
\??\c:\jdjdv.exec:\jdjdv.exe64⤵
- Executes dropped EXE
-
\??\c:\jdddv.exec:\jdddv.exe65⤵
- Executes dropped EXE
-
\??\c:\flxxrrr.exec:\flxxrrr.exe66⤵
-
\??\c:\lfxflrr.exec:\lfxflrr.exe67⤵
-
\??\c:\hbtnhh.exec:\hbtnhh.exe68⤵
-
\??\c:\pjdjj.exec:\pjdjj.exe69⤵
-
\??\c:\lxxrlll.exec:\lxxrlll.exe70⤵
-
\??\c:\rfxfrfr.exec:\rfxfrfr.exe71⤵
-
\??\c:\thnnhn.exec:\thnnhn.exe72⤵
-
\??\c:\ppppv.exec:\ppppv.exe73⤵
-
\??\c:\vdppd.exec:\vdppd.exe74⤵
-
\??\c:\xfffflx.exec:\xfffflx.exe75⤵
-
\??\c:\rlrfffx.exec:\rlrfffx.exe76⤵
-
\??\c:\nnttnn.exec:\nnttnn.exe77⤵
-
\??\c:\9bhhhh.exec:\9bhhhh.exe78⤵
-
\??\c:\rlfflrf.exec:\rlfflrf.exe79⤵
-
\??\c:\rlrrrfx.exec:\rlrrrfx.exe80⤵
-
\??\c:\hnbttb.exec:\hnbttb.exe81⤵
-
\??\c:\vppjd.exec:\vppjd.exe82⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe83⤵
-
\??\c:\rlxflrx.exec:\rlxflrx.exe84⤵
-
\??\c:\htbtnn.exec:\htbtnn.exe85⤵
-
\??\c:\3dpjd.exec:\3dpjd.exe86⤵
-
\??\c:\fllfxxr.exec:\fllfxxr.exe87⤵
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe88⤵
-
\??\c:\hbtbnh.exec:\hbtbnh.exe89⤵
-
\??\c:\dpvvv.exec:\dpvvv.exe90⤵
-
\??\c:\ffrrxxl.exec:\ffrrxxl.exe91⤵
-
\??\c:\frfllll.exec:\frfllll.exe92⤵
-
\??\c:\vdddd.exec:\vdddd.exe93⤵
-
\??\c:\vvjdv.exec:\vvjdv.exe94⤵
-
\??\c:\rlxlxrf.exec:\rlxlxrf.exe95⤵
-
\??\c:\hnnnhh.exec:\hnnnhh.exe96⤵
-
\??\c:\ppvpv.exec:\ppvpv.exe97⤵
-
\??\c:\dppvd.exec:\dppvd.exe98⤵
-
\??\c:\7fffxxf.exec:\7fffxxf.exe99⤵
-
\??\c:\7fflxxl.exec:\7fflxxl.exe100⤵
-
\??\c:\ttbbtt.exec:\ttbbtt.exe101⤵
-
\??\c:\nbnhbt.exec:\nbnhbt.exe102⤵
-
\??\c:\vddvd.exec:\vddvd.exe103⤵
-
\??\c:\lfxrflr.exec:\lfxrflr.exe104⤵
-
\??\c:\5ffffll.exec:\5ffffll.exe105⤵
-
\??\c:\1htnhh.exec:\1htnhh.exe106⤵
-
\??\c:\vpvdd.exec:\vpvdd.exe107⤵
-
\??\c:\pjvvd.exec:\pjvvd.exe108⤵
-
\??\c:\flfxffr.exec:\flfxffr.exe109⤵
-
\??\c:\hhhthb.exec:\hhhthb.exe110⤵
-
\??\c:\hhnhhh.exec:\hhnhhh.exe111⤵
-
\??\c:\9djdv.exec:\9djdv.exe112⤵
-
\??\c:\frrfxxr.exec:\frrfxxr.exe113⤵
-
\??\c:\nbtttt.exec:\nbtttt.exe114⤵
-
\??\c:\bnnhnt.exec:\bnnhnt.exe115⤵
-
\??\c:\vvvjj.exec:\vvvjj.exe116⤵
-
\??\c:\vpdvd.exec:\vpdvd.exe117⤵
-
\??\c:\fxfrrrl.exec:\fxfrrrl.exe118⤵
-
\??\c:\pppdj.exec:\pppdj.exe119⤵
-
\??\c:\lxrfxlf.exec:\lxrfxlf.exe120⤵
-
\??\c:\hhbthb.exec:\hhbthb.exe121⤵
-
\??\c:\bbnntt.exec:\bbnntt.exe122⤵
-
\??\c:\nntthn.exec:\nntthn.exe123⤵
-
\??\c:\pjppj.exec:\pjppj.exe124⤵
-
\??\c:\ntnnhb.exec:\ntnnhb.exe125⤵
-
\??\c:\thhbtt.exec:\thhbtt.exe126⤵
-
\??\c:\ddjjv.exec:\ddjjv.exe127⤵
-
\??\c:\lxlfrrr.exec:\lxlfrrr.exe128⤵
-
\??\c:\xrfxfff.exec:\xrfxfff.exe129⤵
-
\??\c:\thhhhh.exec:\thhhhh.exe130⤵
-
\??\c:\vvjvv.exec:\vvjvv.exe131⤵
-
\??\c:\djjjj.exec:\djjjj.exe132⤵
-
\??\c:\bthbhn.exec:\bthbhn.exe133⤵
-
\??\c:\9bhthh.exec:\9bhthh.exe134⤵
-
\??\c:\3djdv.exec:\3djdv.exe135⤵
-
\??\c:\lrxxxrr.exec:\lrxxxrr.exe136⤵
-
\??\c:\nhhntb.exec:\nhhntb.exe137⤵
-
\??\c:\tthnnt.exec:\tthnnt.exe138⤵
-
\??\c:\vjvjd.exec:\vjvjd.exe139⤵
-
\??\c:\ppvjd.exec:\ppvjd.exe140⤵
-
\??\c:\rlllllf.exec:\rlllllf.exe141⤵
-
\??\c:\tnnhbb.exec:\tnnhbb.exe142⤵
-
\??\c:\hnnnhh.exec:\hnnnhh.exe143⤵
-
\??\c:\vdddv.exec:\vdddv.exe144⤵
-
\??\c:\jdddv.exec:\jdddv.exe145⤵
-
\??\c:\xxxrllf.exec:\xxxrllf.exe146⤵
-
\??\c:\nhnhbt.exec:\nhnhbt.exe147⤵
-
\??\c:\3nnnnt.exec:\3nnnnt.exe148⤵
-
\??\c:\ddpjd.exec:\ddpjd.exe149⤵
-
\??\c:\9pvpj.exec:\9pvpj.exe150⤵
-
\??\c:\rxfflfx.exec:\rxfflfx.exe151⤵
-
\??\c:\nthhtb.exec:\nthhtb.exe152⤵
-
\??\c:\tnnnnh.exec:\tnnnnh.exe153⤵
-
\??\c:\dpvpj.exec:\dpvpj.exe154⤵
-
\??\c:\djvdd.exec:\djvdd.exe155⤵
-
\??\c:\xxrrrlf.exec:\xxrrrlf.exe156⤵
-
\??\c:\lfxxxrr.exec:\lfxxxrr.exe157⤵
-
\??\c:\tnnnnb.exec:\tnnnnb.exe158⤵
-
\??\c:\nhnhhh.exec:\nhnhhh.exe159⤵
-
\??\c:\1vjvj.exec:\1vjvj.exe160⤵
-
\??\c:\tnhbtt.exec:\tnhbtt.exe161⤵
-
\??\c:\htnhhh.exec:\htnhhh.exe162⤵
-
\??\c:\dvddj.exec:\dvddj.exe163⤵
-
\??\c:\dpddp.exec:\dpddp.exe164⤵
-
\??\c:\xxxrrrr.exec:\xxxrrrr.exe165⤵
-
\??\c:\flrfrrl.exec:\flrfrrl.exe166⤵
-
\??\c:\hbbbbt.exec:\hbbbbt.exe167⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe168⤵
-
\??\c:\xlfxrxx.exec:\xlfxrxx.exe169⤵
-
\??\c:\hnhtbh.exec:\hnhtbh.exe170⤵
-
\??\c:\nntbtn.exec:\nntbtn.exe171⤵
-
\??\c:\xxxrfxr.exec:\xxxrfxr.exe172⤵
-
\??\c:\xfllfll.exec:\xfllfll.exe173⤵
-
\??\c:\bntnnn.exec:\bntnnn.exe174⤵
-
\??\c:\jvpvv.exec:\jvpvv.exe175⤵
-
\??\c:\fxrllrx.exec:\fxrllrx.exe176⤵
-
\??\c:\flllffx.exec:\flllffx.exe177⤵
-
\??\c:\bbhhhh.exec:\bbhhhh.exe178⤵
-
\??\c:\ppdjj.exec:\ppdjj.exe179⤵
-
\??\c:\frxrlrl.exec:\frxrlrl.exe180⤵
-
\??\c:\7bhbtt.exec:\7bhbtt.exe181⤵
-
\??\c:\xxrrrxx.exec:\xxrrrxx.exe182⤵
-
\??\c:\lxfxrrr.exec:\lxfxrrr.exe183⤵
-
\??\c:\hhbhtn.exec:\hhbhtn.exe184⤵
-
\??\c:\btnttn.exec:\btnttn.exe185⤵
-
\??\c:\xxlffll.exec:\xxlffll.exe186⤵
-
\??\c:\3rfflrf.exec:\3rfflrf.exe187⤵
-
\??\c:\bhnhtb.exec:\bhnhtb.exe188⤵
-
\??\c:\vvpvd.exec:\vvpvd.exe189⤵
-
\??\c:\frrlfff.exec:\frrlfff.exe190⤵
-
\??\c:\nhbbtb.exec:\nhbbtb.exe191⤵
-
\??\c:\tnttnt.exec:\tnttnt.exe192⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe193⤵
-
\??\c:\vpdvp.exec:\vpdvp.exe194⤵
-
\??\c:\xlrrfrf.exec:\xlrrfrf.exe195⤵
-
\??\c:\fxllxll.exec:\fxllxll.exe196⤵
-
\??\c:\hnnttt.exec:\hnnttt.exe197⤵
-
\??\c:\1pppj.exec:\1pppj.exe198⤵
-
\??\c:\7lrlfxx.exec:\7lrlfxx.exe199⤵
-
\??\c:\xllllll.exec:\xllllll.exe200⤵
-
\??\c:\nbhhhh.exec:\nbhhhh.exe201⤵
-
\??\c:\djjjj.exec:\djjjj.exe202⤵
-
\??\c:\jjppj.exec:\jjppj.exe203⤵
-
\??\c:\vvvvp.exec:\vvvvp.exe204⤵
-
\??\c:\rrfxffl.exec:\rrfxffl.exe205⤵
-
\??\c:\thnhhh.exec:\thnhhh.exe206⤵
-
\??\c:\jpvpp.exec:\jpvpp.exe207⤵
-
\??\c:\pdjjp.exec:\pdjjp.exe208⤵
-
\??\c:\rllfxxr.exec:\rllfxxr.exe209⤵
-
\??\c:\hbhhhn.exec:\hbhhhn.exe210⤵
-
\??\c:\ppjdv.exec:\ppjdv.exe211⤵
-
\??\c:\dpppp.exec:\dpppp.exe212⤵
-
\??\c:\rlllfff.exec:\rlllfff.exe213⤵
-
\??\c:\hnnhbb.exec:\hnnhbb.exe214⤵
-
\??\c:\nnhbbh.exec:\nnhbbh.exe215⤵
-
\??\c:\jdppv.exec:\jdppv.exe216⤵
-
\??\c:\xrrrxxl.exec:\xrrrxxl.exe217⤵
-
\??\c:\xrlrlxx.exec:\xrlrlxx.exe218⤵
-
\??\c:\bnhnnn.exec:\bnhnnn.exe219⤵
-
\??\c:\ddppp.exec:\ddppp.exe220⤵
-
\??\c:\bnnnhh.exec:\bnnnhh.exe221⤵
-
\??\c:\btbtnn.exec:\btbtnn.exe222⤵
-
\??\c:\jvddv.exec:\jvddv.exe223⤵
-
\??\c:\fxfxlll.exec:\fxfxlll.exe224⤵
-
\??\c:\llfflxl.exec:\llfflxl.exe225⤵
-
\??\c:\btnnhh.exec:\btnnhh.exe226⤵
-
\??\c:\tttbhn.exec:\tttbhn.exe227⤵
-
\??\c:\pdpdv.exec:\pdpdv.exe228⤵
-
\??\c:\xrfffff.exec:\xrfffff.exe229⤵
-
\??\c:\tnntnh.exec:\tnntnh.exe230⤵
-
\??\c:\nntdjp.exec:\nntdjp.exe231⤵
-
\??\c:\5jjdv.exec:\5jjdv.exe232⤵
-
\??\c:\7rxxxxl.exec:\7rxxxxl.exe233⤵
-
\??\c:\btnntt.exec:\btnntt.exe234⤵
-
\??\c:\5bnhbh.exec:\5bnhbh.exe235⤵
-
\??\c:\dvddj.exec:\dvddj.exe236⤵
-
\??\c:\pjjdd.exec:\pjjdd.exe237⤵
-
\??\c:\xrfxrrr.exec:\xrfxrrr.exe238⤵
-
\??\c:\5nbbbb.exec:\5nbbbb.exe239⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe240⤵
-
\??\c:\ppjjj.exec:\ppjjj.exe241⤵