Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 18:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe
-
Size
382KB
-
MD5
8e841499ab16f5a328227712355e31af
-
SHA1
843b0b7bb9a7f680f9569fdeff1986f16fcd0f9e
-
SHA256
0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f
-
SHA512
da00c51e9519fca2743ef5897ed612ef005eb6f583a2e8b5b56c26d145cfee1d13faf1dcb2c34a9ecdd54e87fa4593ef0bd6a39279c9ba00176b36137a5a3086
-
SSDEEP
6144:n3C9BRIG0asYFm71mPfkVB8dKwaO5CVwg:n3C9uYA7okVqdKwaO5CVF
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/1752-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4788-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4200-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1752-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2612-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2060-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4824-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4088-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2876-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1592-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/208-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4904-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/712-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2508-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1464-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3588-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2280-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1424-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 30 IoCs
Processes:
resource yara_rule behavioral2/memory/1752-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4788-12-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4200-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1752-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4764-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2612-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1448-47-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1448-46-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1448-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1448-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/216-55-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5100-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5100-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2060-69-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4824-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2268-87-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4088-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2876-98-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1592-110-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/208-116-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4904-122-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/712-129-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2508-140-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3348-147-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4140-152-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1464-159-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3588-163-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5032-182-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2280-189-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1424-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
5hhhhh.exe5jpdd.exerxxrffx.exetnthhb.exelrfffff.exennhbbb.exe5lrlxfx.exepjjdd.exehnthbb.exe1vppj.exe7bnhhb.exeddjdp.exexfxxxxf.exetbhthh.exe3fxrlfx.exe1tnhbt.exepdvdj.exetnhbhh.exe7djdp.exefxfxxfx.exeddpdd.exefrlfxlf.exepvpjv.exerlfrfxr.exennnttt.exeddvjp.exexxlrxlr.exepvpvj.exe3rxrxxx.exejjjpv.exeflrfxlx.exehtnhbt.exepjpdp.exexxrrlxf.exenntnnn.exevpdvp.exefrxfxxr.exehnhbnn.exeddjvv.exelxlrlfr.exetthbnt.exevpdpd.exe3tnbtt.exe7djdd.exexffrllf.exexflfxrx.exennhntt.exexrfxrll.exentbbhn.exehbnhht.exejjddj.exerxffxlr.exetbnnnt.exedvpvv.exelfrlxlf.exebhttnn.exehntthh.exepjdvd.exerrlxflx.exethnhbt.exe3vvjd.exelffxrrl.exetntttt.exedvddd.exepid process 4788 5hhhhh.exe 4200 5jpdd.exe 4764 rxxrffx.exe 2608 tnthhb.exe 2612 lrfffff.exe 1448 nnhbbb.exe 216 5lrlxfx.exe 5100 pjjdd.exe 2060 hnthbb.exe 4824 1vppj.exe 2268 7bnhhb.exe 4088 ddjdp.exe 2876 xfxxxxf.exe 4068 tbhthh.exe 1592 3fxrlfx.exe 208 1tnhbt.exe 4904 pdvdj.exe 712 tnhbhh.exe 3420 7djdp.exe 2508 fxfxxfx.exe 3348 ddpdd.exe 4140 frlfxlf.exe 1464 pvpjv.exe 3588 rlfrfxr.exe 2260 nnnttt.exe 980 ddvjp.exe 5032 xxlrxlr.exe 636 pvpvj.exe 3240 3rxrxxx.exe 1424 jjjpv.exe 4684 flrfxlx.exe 2068 htnhbt.exe 2608 pjpdp.exe 2800 xxrrlxf.exe 1452 nntnnn.exe 1192 vpdvp.exe 740 frxfxxr.exe 3904 hnhbnn.exe 1648 ddjvv.exe 32 lxlrlfr.exe 4936 tthbnt.exe 1152 vpdpd.exe 4260 3tnbtt.exe 3708 7djdd.exe 4500 xffrllf.exe 1364 xflfxrx.exe 3972 nnhntt.exe 2484 xrfxrll.exe 2212 ntbbhn.exe 4812 hbnhht.exe 4984 jjddj.exe 3812 rxffxlr.exe 1344 tbnnnt.exe 2684 dvpvv.exe 4884 lfrlxlf.exe 3600 bhttnn.exe 3512 hntthh.exe 3516 pjdvd.exe 3120 rrlxflx.exe 2440 thnhbt.exe 5000 3vvjd.exe 1496 lffxrrl.exe 752 tntttt.exe 3140 dvddd.exe -
Processes:
resource yara_rule behavioral2/memory/1752-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4788-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4200-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1752-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2612-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2060-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4824-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4088-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2876-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/208-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4140-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1464-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3588-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2280-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1424-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe5hhhhh.exe5jpdd.exerxxrffx.exetnthhb.exelrfffff.exennhbbb.exe5lrlxfx.exepjjdd.exehnthbb.exe1vppj.exe7bnhhb.exeddjdp.exexfxxxxf.exetbhthh.exe3fxrlfx.exe1tnhbt.exepdvdj.exetnhbhh.exe7djdp.exefxfxxfx.exeddpdd.exedescription pid process target process PID 1752 wrote to memory of 4788 1752 0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe 5hhhhh.exe PID 1752 wrote to memory of 4788 1752 0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe 5hhhhh.exe PID 1752 wrote to memory of 4788 1752 0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe 5hhhhh.exe PID 4788 wrote to memory of 4200 4788 5hhhhh.exe 5jpdd.exe PID 4788 wrote to memory of 4200 4788 5hhhhh.exe 5jpdd.exe PID 4788 wrote to memory of 4200 4788 5hhhhh.exe 5jpdd.exe PID 4200 wrote to memory of 4764 4200 5jpdd.exe rxxrffx.exe PID 4200 wrote to memory of 4764 4200 5jpdd.exe rxxrffx.exe PID 4200 wrote to memory of 4764 4200 5jpdd.exe rxxrffx.exe PID 4764 wrote to memory of 2608 4764 rxxrffx.exe tnthhb.exe PID 4764 wrote to memory of 2608 4764 rxxrffx.exe tnthhb.exe PID 4764 wrote to memory of 2608 4764 rxxrffx.exe tnthhb.exe PID 2608 wrote to memory of 2612 2608 tnthhb.exe lrfffff.exe PID 2608 wrote to memory of 2612 2608 tnthhb.exe lrfffff.exe PID 2608 wrote to memory of 2612 2608 tnthhb.exe lrfffff.exe PID 2612 wrote to memory of 1448 2612 lrfffff.exe nnhbbb.exe PID 2612 wrote to memory of 1448 2612 lrfffff.exe nnhbbb.exe PID 2612 wrote to memory of 1448 2612 lrfffff.exe nnhbbb.exe PID 1448 wrote to memory of 216 1448 nnhbbb.exe 5lrlxfx.exe PID 1448 wrote to memory of 216 1448 nnhbbb.exe 5lrlxfx.exe PID 1448 wrote to memory of 216 1448 nnhbbb.exe 5lrlxfx.exe PID 216 wrote to memory of 5100 216 5lrlxfx.exe pjjdd.exe PID 216 wrote to memory of 5100 216 5lrlxfx.exe pjjdd.exe PID 216 wrote to memory of 5100 216 5lrlxfx.exe pjjdd.exe PID 5100 wrote to memory of 2060 5100 pjjdd.exe hnthbb.exe PID 5100 wrote to memory of 2060 5100 pjjdd.exe hnthbb.exe PID 5100 wrote to memory of 2060 5100 pjjdd.exe hnthbb.exe PID 2060 wrote to memory of 4824 2060 hnthbb.exe 1vppj.exe PID 2060 wrote to memory of 4824 2060 hnthbb.exe 1vppj.exe PID 2060 wrote to memory of 4824 2060 hnthbb.exe 1vppj.exe PID 4824 wrote to memory of 2268 4824 1vppj.exe 7bnhhb.exe PID 4824 wrote to memory of 2268 4824 1vppj.exe 7bnhhb.exe PID 4824 wrote to memory of 2268 4824 1vppj.exe 7bnhhb.exe PID 2268 wrote to memory of 4088 2268 7bnhhb.exe ddjdp.exe PID 2268 wrote to memory of 4088 2268 7bnhhb.exe ddjdp.exe PID 2268 wrote to memory of 4088 2268 7bnhhb.exe ddjdp.exe PID 4088 wrote to memory of 2876 4088 ddjdp.exe xfxxxxf.exe PID 4088 wrote to memory of 2876 4088 ddjdp.exe xfxxxxf.exe PID 4088 wrote to memory of 2876 4088 ddjdp.exe xfxxxxf.exe PID 2876 wrote to memory of 4068 2876 xfxxxxf.exe tbhthh.exe PID 2876 wrote to memory of 4068 2876 xfxxxxf.exe tbhthh.exe PID 2876 wrote to memory of 4068 2876 xfxxxxf.exe tbhthh.exe PID 4068 wrote to memory of 1592 4068 tbhthh.exe 3fxrlfx.exe PID 4068 wrote to memory of 1592 4068 tbhthh.exe 3fxrlfx.exe PID 4068 wrote to memory of 1592 4068 tbhthh.exe 3fxrlfx.exe PID 1592 wrote to memory of 208 1592 3fxrlfx.exe 1tnhbt.exe PID 1592 wrote to memory of 208 1592 3fxrlfx.exe 1tnhbt.exe PID 1592 wrote to memory of 208 1592 3fxrlfx.exe 1tnhbt.exe PID 208 wrote to memory of 4904 208 1tnhbt.exe pdvdj.exe PID 208 wrote to memory of 4904 208 1tnhbt.exe pdvdj.exe PID 208 wrote to memory of 4904 208 1tnhbt.exe pdvdj.exe PID 4904 wrote to memory of 712 4904 pdvdj.exe tnhbhh.exe PID 4904 wrote to memory of 712 4904 pdvdj.exe tnhbhh.exe PID 4904 wrote to memory of 712 4904 pdvdj.exe tnhbhh.exe PID 712 wrote to memory of 3420 712 tnhbhh.exe 7djdp.exe PID 712 wrote to memory of 3420 712 tnhbhh.exe 7djdp.exe PID 712 wrote to memory of 3420 712 tnhbhh.exe 7djdp.exe PID 3420 wrote to memory of 2508 3420 7djdp.exe fxfxxfx.exe PID 3420 wrote to memory of 2508 3420 7djdp.exe fxfxxfx.exe PID 3420 wrote to memory of 2508 3420 7djdp.exe fxfxxfx.exe PID 2508 wrote to memory of 3348 2508 fxfxxfx.exe ddpdd.exe PID 2508 wrote to memory of 3348 2508 fxfxxfx.exe ddpdd.exe PID 2508 wrote to memory of 3348 2508 fxfxxfx.exe ddpdd.exe PID 3348 wrote to memory of 4140 3348 ddpdd.exe frlfxlf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe"C:\Users\Admin\AppData\Local\Temp\0d1b94afcca445412f4f12eb7fa4635fe674aab7b5080dc43e96835923760b1f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\5hhhhh.exec:\5hhhhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5jpdd.exec:\5jpdd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxrffx.exec:\rxxrffx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnthhb.exec:\tnthhb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrfffff.exec:\lrfffff.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnhbbb.exec:\nnhbbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5lrlxfx.exec:\5lrlxfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjdd.exec:\pjjdd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnthbb.exec:\hnthbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1vppj.exec:\1vppj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7bnhhb.exec:\7bnhhb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddjdp.exec:\ddjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxxxxf.exec:\xfxxxxf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbhthh.exec:\tbhthh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3fxrlfx.exec:\3fxrlfx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1tnhbt.exec:\1tnhbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdvdj.exec:\pdvdj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnhbhh.exec:\tnhbhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7djdp.exec:\7djdp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxfxxfx.exec:\fxfxxfx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddpdd.exec:\ddpdd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frlfxlf.exec:\frlfxlf.exe23⤵
- Executes dropped EXE
-
\??\c:\pvpjv.exec:\pvpjv.exe24⤵
- Executes dropped EXE
-
\??\c:\rlfrfxr.exec:\rlfrfxr.exe25⤵
- Executes dropped EXE
-
\??\c:\nnnttt.exec:\nnnttt.exe26⤵
- Executes dropped EXE
-
\??\c:\ddvjp.exec:\ddvjp.exe27⤵
- Executes dropped EXE
-
\??\c:\xxlrxlr.exec:\xxlrxlr.exe28⤵
- Executes dropped EXE
-
\??\c:\pvpvj.exec:\pvpvj.exe29⤵
- Executes dropped EXE
-
\??\c:\pjpvv.exec:\pjpvv.exe30⤵
-
\??\c:\3rxrxxx.exec:\3rxrxxx.exe31⤵
- Executes dropped EXE
-
\??\c:\jjjpv.exec:\jjjpv.exe32⤵
- Executes dropped EXE
-
\??\c:\flrfxlx.exec:\flrfxlx.exe33⤵
- Executes dropped EXE
-
\??\c:\htnhbt.exec:\htnhbt.exe34⤵
- Executes dropped EXE
-
\??\c:\pjpdp.exec:\pjpdp.exe35⤵
- Executes dropped EXE
-
\??\c:\xxrrlxf.exec:\xxrrlxf.exe36⤵
- Executes dropped EXE
-
\??\c:\nntnnn.exec:\nntnnn.exe37⤵
- Executes dropped EXE
-
\??\c:\vpdvp.exec:\vpdvp.exe38⤵
- Executes dropped EXE
-
\??\c:\frxfxxr.exec:\frxfxxr.exe39⤵
- Executes dropped EXE
-
\??\c:\hnhbnn.exec:\hnhbnn.exe40⤵
- Executes dropped EXE
-
\??\c:\ddjvv.exec:\ddjvv.exe41⤵
- Executes dropped EXE
-
\??\c:\lxlrlfr.exec:\lxlrlfr.exe42⤵
- Executes dropped EXE
-
\??\c:\tthbnt.exec:\tthbnt.exe43⤵
- Executes dropped EXE
-
\??\c:\vpdpd.exec:\vpdpd.exe44⤵
- Executes dropped EXE
-
\??\c:\3tnbtt.exec:\3tnbtt.exe45⤵
- Executes dropped EXE
-
\??\c:\7djdd.exec:\7djdd.exe46⤵
- Executes dropped EXE
-
\??\c:\xffrllf.exec:\xffrllf.exe47⤵
- Executes dropped EXE
-
\??\c:\xflfxrx.exec:\xflfxrx.exe48⤵
- Executes dropped EXE
-
\??\c:\nnhntt.exec:\nnhntt.exe49⤵
- Executes dropped EXE
-
\??\c:\xrfxrll.exec:\xrfxrll.exe50⤵
- Executes dropped EXE
-
\??\c:\ntbbhn.exec:\ntbbhn.exe51⤵
- Executes dropped EXE
-
\??\c:\hbnhht.exec:\hbnhht.exe52⤵
- Executes dropped EXE
-
\??\c:\jjddj.exec:\jjddj.exe53⤵
- Executes dropped EXE
-
\??\c:\rxffxlr.exec:\rxffxlr.exe54⤵
- Executes dropped EXE
-
\??\c:\tbnnnt.exec:\tbnnnt.exe55⤵
- Executes dropped EXE
-
\??\c:\dvpvv.exec:\dvpvv.exe56⤵
- Executes dropped EXE
-
\??\c:\lfrlxlf.exec:\lfrlxlf.exe57⤵
- Executes dropped EXE
-
\??\c:\bhttnn.exec:\bhttnn.exe58⤵
- Executes dropped EXE
-
\??\c:\hntthh.exec:\hntthh.exe59⤵
- Executes dropped EXE
-
\??\c:\pjdvd.exec:\pjdvd.exe60⤵
- Executes dropped EXE
-
\??\c:\rrlxflx.exec:\rrlxflx.exe61⤵
- Executes dropped EXE
-
\??\c:\thnhbt.exec:\thnhbt.exe62⤵
- Executes dropped EXE
-
\??\c:\3vvjd.exec:\3vvjd.exe63⤵
- Executes dropped EXE
-
\??\c:\lffxrrl.exec:\lffxrrl.exe64⤵
- Executes dropped EXE
-
\??\c:\tntttt.exec:\tntttt.exe65⤵
- Executes dropped EXE
-
\??\c:\dvddd.exec:\dvddd.exe66⤵
- Executes dropped EXE
-
\??\c:\vvvpd.exec:\vvvpd.exe67⤵
-
\??\c:\fflfxxx.exec:\fflfxxx.exe68⤵
-
\??\c:\hbtnhb.exec:\hbtnhb.exe69⤵
-
\??\c:\9ppdd.exec:\9ppdd.exe70⤵
-
\??\c:\xxlfxrl.exec:\xxlfxrl.exe71⤵
-
\??\c:\1btnhh.exec:\1btnhh.exe72⤵
-
\??\c:\vdvpd.exec:\vdvpd.exe73⤵
-
\??\c:\xfrlffx.exec:\xfrlffx.exe74⤵
-
\??\c:\3nbtnn.exec:\3nbtnn.exe75⤵
-
\??\c:\7hbbbb.exec:\7hbbbb.exe76⤵
-
\??\c:\jddvp.exec:\jddvp.exe77⤵
-
\??\c:\btnhhh.exec:\btnhhh.exe78⤵
-
\??\c:\pjddp.exec:\pjddp.exe79⤵
-
\??\c:\xlxffrl.exec:\xlxffrl.exe80⤵
-
\??\c:\thtnnn.exec:\thtnnn.exe81⤵
-
\??\c:\lffrfxl.exec:\lffrfxl.exe82⤵
-
\??\c:\thbttt.exec:\thbttt.exe83⤵
-
\??\c:\ppjdv.exec:\ppjdv.exe84⤵
-
\??\c:\5vjdv.exec:\5vjdv.exe85⤵
-
\??\c:\xxllffl.exec:\xxllffl.exe86⤵
-
\??\c:\1bnnbb.exec:\1bnnbb.exe87⤵
-
\??\c:\tbbtht.exec:\tbbtht.exe88⤵
-
\??\c:\ddjjv.exec:\ddjjv.exe89⤵
-
\??\c:\lxfxxxx.exec:\lxfxxxx.exe90⤵
-
\??\c:\3hhbtt.exec:\3hhbtt.exe91⤵
-
\??\c:\jjdvd.exec:\jjdvd.exe92⤵
-
\??\c:\dvppp.exec:\dvppp.exe93⤵
-
\??\c:\lxfflrr.exec:\lxfflrr.exe94⤵
-
\??\c:\nbttbn.exec:\nbttbn.exe95⤵
-
\??\c:\7jdvv.exec:\7jdvv.exe96⤵
-
\??\c:\fflfffl.exec:\fflfffl.exe97⤵
-
\??\c:\xrxxrrr.exec:\xrxxrrr.exe98⤵
-
\??\c:\bhhnnt.exec:\bhhnnt.exe99⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe100⤵
-
\??\c:\lrxrllf.exec:\lrxrllf.exe101⤵
-
\??\c:\xllfxxr.exec:\xllfxxr.exe102⤵
-
\??\c:\nnntbn.exec:\nnntbn.exe103⤵
-
\??\c:\dpdpd.exec:\dpdpd.exe104⤵
-
\??\c:\llfxfxr.exec:\llfxfxr.exe105⤵
-
\??\c:\lxffrrr.exec:\lxffrrr.exe106⤵
-
\??\c:\ppdvv.exec:\ppdvv.exe107⤵
-
\??\c:\frrlrlr.exec:\frrlrlr.exe108⤵
-
\??\c:\bhbtnh.exec:\bhbtnh.exe109⤵
-
\??\c:\jpppp.exec:\jpppp.exe110⤵
-
\??\c:\lrfxlll.exec:\lrfxlll.exe111⤵
-
\??\c:\9xfllxf.exec:\9xfllxf.exe112⤵
-
\??\c:\nttnnn.exec:\nttnnn.exe113⤵
-
\??\c:\ppdpj.exec:\ppdpj.exe114⤵
-
\??\c:\5rfxxrl.exec:\5rfxxrl.exe115⤵
-
\??\c:\thbtnn.exec:\thbtnn.exe116⤵
-
\??\c:\jdpjj.exec:\jdpjj.exe117⤵
-
\??\c:\rlxrllf.exec:\rlxrllf.exe118⤵
-
\??\c:\5tbtnn.exec:\5tbtnn.exe119⤵
-
\??\c:\9vjjp.exec:\9vjjp.exe120⤵
-
\??\c:\dpdvd.exec:\dpdvd.exe121⤵
-
\??\c:\lxflxxr.exec:\lxflxxr.exe122⤵
-
\??\c:\tthhnn.exec:\tthhnn.exe123⤵
-
\??\c:\vpjjj.exec:\vpjjj.exe124⤵
-
\??\c:\3djdv.exec:\3djdv.exe125⤵
-
\??\c:\lllllll.exec:\lllllll.exe126⤵
-
\??\c:\nbttnn.exec:\nbttnn.exe127⤵
-
\??\c:\thnnnb.exec:\thnnnb.exe128⤵
-
\??\c:\5ffxxrx.exec:\5ffxxrx.exe129⤵
-
\??\c:\1rfxrrr.exec:\1rfxrrr.exe130⤵
-
\??\c:\7nhthb.exec:\7nhthb.exe131⤵
-
\??\c:\jpjdd.exec:\jpjdd.exe132⤵
-
\??\c:\lrlxxrr.exec:\lrlxxrr.exe133⤵
-
\??\c:\3xxrlrl.exec:\3xxrlrl.exe134⤵
-
\??\c:\bbnntt.exec:\bbnntt.exe135⤵
-
\??\c:\pvppj.exec:\pvppj.exe136⤵
-
\??\c:\fxxrlrl.exec:\fxxrlrl.exe137⤵
-
\??\c:\nhtttt.exec:\nhtttt.exe138⤵
-
\??\c:\djdpd.exec:\djdpd.exe139⤵
-
\??\c:\fxlfflx.exec:\fxlfflx.exe140⤵
-
\??\c:\bbnnbb.exec:\bbnnbb.exe141⤵
-
\??\c:\tbhhtb.exec:\tbhhtb.exe142⤵
-
\??\c:\vjvpv.exec:\vjvpv.exe143⤵
-
\??\c:\rlxrlrr.exec:\rlxrlrr.exe144⤵
-
\??\c:\hhttbb.exec:\hhttbb.exe145⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe146⤵
-
\??\c:\rfffxxx.exec:\rfffxxx.exe147⤵
-
\??\c:\9rrlflf.exec:\9rrlflf.exe148⤵
-
\??\c:\bhtttn.exec:\bhtttn.exe149⤵
-
\??\c:\ddvdj.exec:\ddvdj.exe150⤵
-
\??\c:\vddjp.exec:\vddjp.exe151⤵
-
\??\c:\5rfrlxx.exec:\5rfrlxx.exe152⤵
-
\??\c:\nhhbbb.exec:\nhhbbb.exe153⤵
-
\??\c:\ttttbb.exec:\ttttbb.exe154⤵
-
\??\c:\vdpjv.exec:\vdpjv.exe155⤵
-
\??\c:\rrxrxxr.exec:\rrxrxxr.exe156⤵
-
\??\c:\hhnnnt.exec:\hhnnnt.exe157⤵
-
\??\c:\tbnnnn.exec:\tbnnnn.exe158⤵
-
\??\c:\dddvd.exec:\dddvd.exe159⤵
-
\??\c:\lrfxxfl.exec:\lrfxxfl.exe160⤵
-
\??\c:\bnbhhb.exec:\bnbhhb.exe161⤵
-
\??\c:\hhtttb.exec:\hhtttb.exe162⤵
-
\??\c:\jdjdd.exec:\jdjdd.exe163⤵
-
\??\c:\lrfflll.exec:\lrfflll.exe164⤵
-
\??\c:\rxlrlrl.exec:\rxlrlrl.exe165⤵
-
\??\c:\bthhbb.exec:\bthhbb.exe166⤵
-
\??\c:\vvppj.exec:\vvppj.exe167⤵
-
\??\c:\fflfxfl.exec:\fflfxfl.exe168⤵
-
\??\c:\rrxxxxl.exec:\rrxxxxl.exe169⤵
-
\??\c:\9hbhhb.exec:\9hbhhb.exe170⤵
-
\??\c:\vvddj.exec:\vvddj.exe171⤵
-
\??\c:\vjjpp.exec:\vjjpp.exe172⤵
-
\??\c:\xffffrr.exec:\xffffrr.exe173⤵
-
\??\c:\bhhhtt.exec:\bhhhtt.exe174⤵
-
\??\c:\hbnhhn.exec:\hbnhhn.exe175⤵
-
\??\c:\ppvpp.exec:\ppvpp.exe176⤵
-
\??\c:\5xffrrr.exec:\5xffrrr.exe177⤵
-
\??\c:\llffrfl.exec:\llffrfl.exe178⤵
-
\??\c:\nnnhhh.exec:\nnnhhh.exe179⤵
-
\??\c:\dvddv.exec:\dvddv.exe180⤵
-
\??\c:\dppjd.exec:\dppjd.exe181⤵
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe182⤵
-
\??\c:\bbnnnh.exec:\bbnnnh.exe183⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe184⤵
-
\??\c:\jpdvp.exec:\jpdvp.exe185⤵
-
\??\c:\rxlxffr.exec:\rxlxffr.exe186⤵
-
\??\c:\hnnttt.exec:\hnnttt.exe187⤵
-
\??\c:\tntnbn.exec:\tntnbn.exe188⤵
-
\??\c:\3ddvp.exec:\3ddvp.exe189⤵
-
\??\c:\9lxrllf.exec:\9lxrllf.exe190⤵
-
\??\c:\9fflffx.exec:\9fflffx.exe191⤵
-
\??\c:\7hhbbt.exec:\7hhbbt.exe192⤵
-
\??\c:\dvjjj.exec:\dvjjj.exe193⤵
-
\??\c:\rrrrlrl.exec:\rrrrlrl.exe194⤵
-
\??\c:\1xlfllr.exec:\1xlfllr.exe195⤵
-
\??\c:\nnnhbb.exec:\nnnhbb.exe196⤵
-
\??\c:\vpvpd.exec:\vpvpd.exe197⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe198⤵
-
\??\c:\xxlffxl.exec:\xxlffxl.exe199⤵
-
\??\c:\nthbbt.exec:\nthbbt.exe200⤵
-
\??\c:\pppjv.exec:\pppjv.exe201⤵
-
\??\c:\jdjjd.exec:\jdjjd.exe202⤵
-
\??\c:\5lffxxr.exec:\5lffxxr.exe203⤵
-
\??\c:\nhhbbb.exec:\nhhbbb.exe204⤵
-
\??\c:\pjjjj.exec:\pjjjj.exe205⤵
-
\??\c:\pdddd.exec:\pdddd.exe206⤵
-
\??\c:\fflfrrf.exec:\fflfrrf.exe207⤵
-
\??\c:\1nnntt.exec:\1nnntt.exe208⤵
-
\??\c:\tttnhh.exec:\tttnhh.exe209⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe210⤵
-
\??\c:\7fllllf.exec:\7fllllf.exe211⤵
-
\??\c:\xfrffll.exec:\xfrffll.exe212⤵
-
\??\c:\7bhbbb.exec:\7bhbbb.exe213⤵
-
\??\c:\vjvjd.exec:\vjvjd.exe214⤵
-
\??\c:\lxrfrlx.exec:\lxrfrlx.exe215⤵
-
\??\c:\7bbttt.exec:\7bbttt.exe216⤵
-
\??\c:\jjdvv.exec:\jjdvv.exe217⤵
-
\??\c:\jppjd.exec:\jppjd.exe218⤵
-
\??\c:\xlfrrrx.exec:\xlfrrrx.exe219⤵
-
\??\c:\nhthnh.exec:\nhthnh.exe220⤵
-
\??\c:\ppdvj.exec:\ppdvj.exe221⤵
-
\??\c:\lfrlrxl.exec:\lfrlrxl.exe222⤵
-
\??\c:\btbttt.exec:\btbttt.exe223⤵
-
\??\c:\1nnhhh.exec:\1nnhhh.exe224⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe225⤵
-
\??\c:\lrrlllx.exec:\lrrlllx.exe226⤵
-
\??\c:\thtnhh.exec:\thtnhh.exe227⤵
-
\??\c:\dppvp.exec:\dppvp.exe228⤵
-
\??\c:\dpjvj.exec:\dpjvj.exe229⤵
-
\??\c:\rflfxff.exec:\rflfxff.exe230⤵
-
\??\c:\5nnnnn.exec:\5nnnnn.exe231⤵
-
\??\c:\ddvvp.exec:\ddvvp.exe232⤵
-
\??\c:\xxrfxxf.exec:\xxrfxxf.exe233⤵
-
\??\c:\ffrrfrf.exec:\ffrrfrf.exe234⤵
-
\??\c:\nnhhhn.exec:\nnhhhn.exe235⤵
-
\??\c:\vddvv.exec:\vddvv.exe236⤵
-
\??\c:\xlrlxff.exec:\xlrlxff.exe237⤵
-
\??\c:\rfxrlfx.exec:\rfxrlfx.exe238⤵
-
\??\c:\tnhttt.exec:\tnhttt.exe239⤵
-
\??\c:\vjppp.exec:\vjppp.exe240⤵
-
\??\c:\jpvjd.exec:\jpvjd.exe241⤵