Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 04:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe
Resource
win7-20240611-en
6 signatures
150 seconds
General
-
Target
fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe
-
Size
57KB
-
MD5
7d0742237fd2ee01e419148d017132ea
-
SHA1
a0759a31e3821db48333118fa833b849fe8d629a
-
SHA256
fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c
-
SHA512
2a52a55b9479f9809dc115e402ae604d43b9cf17453ba3c8cc66a1211b779d98d012c5fc5dcc048b419307c802dd6e775a7319739d3565940148b06891e93383
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfEKd:ymb3NkkiQ3mdBjFIX
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/1344-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1356-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/944-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2032-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1104-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/692-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2080-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1140-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/632-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1428-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1260-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1800-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1344-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1344-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2060-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2788-15-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2752-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2752-35-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2752-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2716-47-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2804-57-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2804-56-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2804-55-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2804-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2608-69-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2608-71-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2616-79-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1356-89-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1356-92-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1356-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1624-107-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2596-116-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2952-125-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/944-134-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2032-143-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2464-161-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1736-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1104-179-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/692-188-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2080-197-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1140-224-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/632-233-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1428-242-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1260-260-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1800-269-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
nhhfh.exefvdvn.exejhtdtd.exevrlnj.exedlhlbjd.exeffltn.exelphfrv.exeprhxx.exeplfvhn.exejthrd.exejpxbdtf.exevnbbt.exexntthhp.exetlfrvhn.exedfpjdrt.exedvbhvfp.exejpfxhtp.exebbfjx.exentjtbtp.exevrntb.exelrhdhtp.exelfbhlvh.exerbhldt.exebxfdt.exendhjn.exelfnxfdp.exevvvxd.exelfrbjr.exexbphrd.exeflvjfr.exedhbnvnr.exertvxtjb.exelxfvdf.exebdbntn.exelbvnvh.exelxhfxff.exeppxjdr.exepvjlbbf.exebxbrbf.exefpjdthl.exetlfpf.exefjbfr.exenhfxl.exeldbpf.exefvddnnd.exexxxxx.exepprnx.exerdphdl.exerffbjdp.exehlvvnvn.exedfnrv.exerrnbtr.exevjjjr.exelpnbh.exelrrdp.exervnfdvb.exeffflv.exerhhvpth.exejfdftlb.exertjlh.exehdljff.exerthvnxn.exebpxfn.exevvrbd.exepid process 2788 nhhfh.exe 2060 fvdvn.exe 2752 jhtdtd.exe 2716 vrlnj.exe 2804 dlhlbjd.exe 2608 ffltn.exe 2616 lphfrv.exe 1356 prhxx.exe 1624 plfvhn.exe 2596 jthrd.exe 2952 jpxbdtf.exe 944 vnbbt.exe 2032 xntthhp.exe 1508 tlfrvhn.exe 2464 dfpjdrt.exe 1736 dvbhvfp.exe 1104 jpfxhtp.exe 692 bbfjx.exe 2080 ntjtbtp.exe 1760 vrntb.exe 2404 lrhdhtp.exe 1140 lfbhlvh.exe 632 rbhldt.exe 1428 bxfdt.exe 704 ndhjn.exe 1260 lfnxfdp.exe 1800 vvvxd.exe 1948 lfrbjr.exe 2428 xbphrd.exe 3024 flvjfr.exe 1348 dhbnvnr.exe 2028 rtvxtjb.exe 1916 lxfvdf.exe 2680 bdbntn.exe 1108 lbvnvh.exe 2224 lxhfxff.exe 1592 ppxjdr.exe 2648 pvjlbbf.exe 2620 bxbrbf.exe 2768 fpjdthl.exe 2964 tlfpf.exe 2756 fjbfr.exe 2492 nhfxl.exe 2548 ldbpf.exe 520 fvddnnd.exe 1000 xxxxx.exe 1664 pprnx.exe 2480 rdphdl.exe 2852 rffbjdp.exe 2980 hlvvnvn.exe 1824 dfnrv.exe 1912 rrnbtr.exe 1728 vjjjr.exe 764 lpnbh.exe 1732 lrrdp.exe 2740 rvnfdvb.exe 1904 ffflv.exe 1708 rhhvpth.exe 1176 jfdftlb.exe 2348 rtjlh.exe 2184 hdljff.exe 1760 rthvnxn.exe 2412 bpxfn.exe 2200 vvrbd.exe -
Processes:
resource yara_rule behavioral1/memory/1344-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1344-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1356-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1356-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1356-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/944-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1104-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/692-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2080-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1140-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/632-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1428-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1260-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1800-269-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exenhhfh.exefvdvn.exejhtdtd.exevrlnj.exedlhlbjd.exeffltn.exelphfrv.exeprhxx.exeplfvhn.exejthrd.exejpxbdtf.exevnbbt.exexntthhp.exetlfrvhn.exedfpjdrt.exedescription pid process target process PID 1344 wrote to memory of 2788 1344 fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe nhhfh.exe PID 1344 wrote to memory of 2788 1344 fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe nhhfh.exe PID 1344 wrote to memory of 2788 1344 fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe nhhfh.exe PID 1344 wrote to memory of 2788 1344 fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe nhhfh.exe PID 2788 wrote to memory of 2060 2788 nhhfh.exe fvdvn.exe PID 2788 wrote to memory of 2060 2788 nhhfh.exe fvdvn.exe PID 2788 wrote to memory of 2060 2788 nhhfh.exe fvdvn.exe PID 2788 wrote to memory of 2060 2788 nhhfh.exe fvdvn.exe PID 2060 wrote to memory of 2752 2060 fvdvn.exe jhtdtd.exe PID 2060 wrote to memory of 2752 2060 fvdvn.exe jhtdtd.exe PID 2060 wrote to memory of 2752 2060 fvdvn.exe jhtdtd.exe PID 2060 wrote to memory of 2752 2060 fvdvn.exe jhtdtd.exe PID 2752 wrote to memory of 2716 2752 jhtdtd.exe vrlnj.exe PID 2752 wrote to memory of 2716 2752 jhtdtd.exe vrlnj.exe PID 2752 wrote to memory of 2716 2752 jhtdtd.exe vrlnj.exe PID 2752 wrote to memory of 2716 2752 jhtdtd.exe vrlnj.exe PID 2716 wrote to memory of 2804 2716 vrlnj.exe dlhlbjd.exe PID 2716 wrote to memory of 2804 2716 vrlnj.exe dlhlbjd.exe PID 2716 wrote to memory of 2804 2716 vrlnj.exe dlhlbjd.exe PID 2716 wrote to memory of 2804 2716 vrlnj.exe dlhlbjd.exe PID 2804 wrote to memory of 2608 2804 dlhlbjd.exe ffltn.exe PID 2804 wrote to memory of 2608 2804 dlhlbjd.exe ffltn.exe PID 2804 wrote to memory of 2608 2804 dlhlbjd.exe ffltn.exe PID 2804 wrote to memory of 2608 2804 dlhlbjd.exe ffltn.exe PID 2608 wrote to memory of 2616 2608 ffltn.exe lphfrv.exe PID 2608 wrote to memory of 2616 2608 ffltn.exe lphfrv.exe PID 2608 wrote to memory of 2616 2608 ffltn.exe lphfrv.exe PID 2608 wrote to memory of 2616 2608 ffltn.exe lphfrv.exe PID 2616 wrote to memory of 1356 2616 lphfrv.exe prhxx.exe PID 2616 wrote to memory of 1356 2616 lphfrv.exe prhxx.exe PID 2616 wrote to memory of 1356 2616 lphfrv.exe prhxx.exe PID 2616 wrote to memory of 1356 2616 lphfrv.exe prhxx.exe PID 1356 wrote to memory of 1624 1356 prhxx.exe plfvhn.exe PID 1356 wrote to memory of 1624 1356 prhxx.exe plfvhn.exe PID 1356 wrote to memory of 1624 1356 prhxx.exe plfvhn.exe PID 1356 wrote to memory of 1624 1356 prhxx.exe plfvhn.exe PID 1624 wrote to memory of 2596 1624 plfvhn.exe jthrd.exe PID 1624 wrote to memory of 2596 1624 plfvhn.exe jthrd.exe PID 1624 wrote to memory of 2596 1624 plfvhn.exe jthrd.exe PID 1624 wrote to memory of 2596 1624 plfvhn.exe jthrd.exe PID 2596 wrote to memory of 2952 2596 jthrd.exe jpxbdtf.exe PID 2596 wrote to memory of 2952 2596 jthrd.exe jpxbdtf.exe PID 2596 wrote to memory of 2952 2596 jthrd.exe jpxbdtf.exe PID 2596 wrote to memory of 2952 2596 jthrd.exe jpxbdtf.exe PID 2952 wrote to memory of 944 2952 jpxbdtf.exe vnbbt.exe PID 2952 wrote to memory of 944 2952 jpxbdtf.exe vnbbt.exe PID 2952 wrote to memory of 944 2952 jpxbdtf.exe vnbbt.exe PID 2952 wrote to memory of 944 2952 jpxbdtf.exe vnbbt.exe PID 944 wrote to memory of 2032 944 vnbbt.exe xntthhp.exe PID 944 wrote to memory of 2032 944 vnbbt.exe xntthhp.exe PID 944 wrote to memory of 2032 944 vnbbt.exe xntthhp.exe PID 944 wrote to memory of 2032 944 vnbbt.exe xntthhp.exe PID 2032 wrote to memory of 1508 2032 xntthhp.exe tlfrvhn.exe PID 2032 wrote to memory of 1508 2032 xntthhp.exe tlfrvhn.exe PID 2032 wrote to memory of 1508 2032 xntthhp.exe tlfrvhn.exe PID 2032 wrote to memory of 1508 2032 xntthhp.exe tlfrvhn.exe PID 1508 wrote to memory of 2464 1508 tlfrvhn.exe dfpjdrt.exe PID 1508 wrote to memory of 2464 1508 tlfrvhn.exe dfpjdrt.exe PID 1508 wrote to memory of 2464 1508 tlfrvhn.exe dfpjdrt.exe PID 1508 wrote to memory of 2464 1508 tlfrvhn.exe dfpjdrt.exe PID 2464 wrote to memory of 1736 2464 dfpjdrt.exe dvbhvfp.exe PID 2464 wrote to memory of 1736 2464 dfpjdrt.exe dvbhvfp.exe PID 2464 wrote to memory of 1736 2464 dfpjdrt.exe dvbhvfp.exe PID 2464 wrote to memory of 1736 2464 dfpjdrt.exe dvbhvfp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe"C:\Users\Admin\AppData\Local\Temp\fbf894b285f0539ecb3a3b11ebf082d991517e6aee89173bb36066f913f1149c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\nhhfh.exec:\nhhfh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fvdvn.exec:\fvdvn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jhtdtd.exec:\jhtdtd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vrlnj.exec:\vrlnj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dlhlbjd.exec:\dlhlbjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffltn.exec:\ffltn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lphfrv.exec:\lphfrv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\prhxx.exec:\prhxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\plfvhn.exec:\plfvhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jthrd.exec:\jthrd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpxbdtf.exec:\jpxbdtf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vnbbt.exec:\vnbbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xntthhp.exec:\xntthhp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tlfrvhn.exec:\tlfrvhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dfpjdrt.exec:\dfpjdrt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvbhvfp.exec:\dvbhvfp.exe17⤵
- Executes dropped EXE
-
\??\c:\jpfxhtp.exec:\jpfxhtp.exe18⤵
- Executes dropped EXE
-
\??\c:\bbfjx.exec:\bbfjx.exe19⤵
- Executes dropped EXE
-
\??\c:\ntjtbtp.exec:\ntjtbtp.exe20⤵
- Executes dropped EXE
-
\??\c:\vrntb.exec:\vrntb.exe21⤵
- Executes dropped EXE
-
\??\c:\lrhdhtp.exec:\lrhdhtp.exe22⤵
- Executes dropped EXE
-
\??\c:\lfbhlvh.exec:\lfbhlvh.exe23⤵
- Executes dropped EXE
-
\??\c:\rbhldt.exec:\rbhldt.exe24⤵
- Executes dropped EXE
-
\??\c:\bxfdt.exec:\bxfdt.exe25⤵
- Executes dropped EXE
-
\??\c:\ndhjn.exec:\ndhjn.exe26⤵
- Executes dropped EXE
-
\??\c:\lfnxfdp.exec:\lfnxfdp.exe27⤵
- Executes dropped EXE
-
\??\c:\vvvxd.exec:\vvvxd.exe28⤵
- Executes dropped EXE
-
\??\c:\lfrbjr.exec:\lfrbjr.exe29⤵
- Executes dropped EXE
-
\??\c:\xbphrd.exec:\xbphrd.exe30⤵
- Executes dropped EXE
-
\??\c:\flvjfr.exec:\flvjfr.exe31⤵
- Executes dropped EXE
-
\??\c:\dhbnvnr.exec:\dhbnvnr.exe32⤵
- Executes dropped EXE
-
\??\c:\rtvxtjb.exec:\rtvxtjb.exe33⤵
- Executes dropped EXE
-
\??\c:\lxfvdf.exec:\lxfvdf.exe34⤵
- Executes dropped EXE
-
\??\c:\bdbntn.exec:\bdbntn.exe35⤵
- Executes dropped EXE
-
\??\c:\lbvnvh.exec:\lbvnvh.exe36⤵
- Executes dropped EXE
-
\??\c:\lxhfxff.exec:\lxhfxff.exe37⤵
- Executes dropped EXE
-
\??\c:\ppxjdr.exec:\ppxjdr.exe38⤵
- Executes dropped EXE
-
\??\c:\pvjlbbf.exec:\pvjlbbf.exe39⤵
- Executes dropped EXE
-
\??\c:\bxbrbf.exec:\bxbrbf.exe40⤵
- Executes dropped EXE
-
\??\c:\fpjdthl.exec:\fpjdthl.exe41⤵
- Executes dropped EXE
-
\??\c:\tlfpf.exec:\tlfpf.exe42⤵
- Executes dropped EXE
-
\??\c:\fjbfr.exec:\fjbfr.exe43⤵
- Executes dropped EXE
-
\??\c:\nhfxl.exec:\nhfxl.exe44⤵
- Executes dropped EXE
-
\??\c:\ldbpf.exec:\ldbpf.exe45⤵
- Executes dropped EXE
-
\??\c:\fvddnnd.exec:\fvddnnd.exe46⤵
- Executes dropped EXE
-
\??\c:\xxxxx.exec:\xxxxx.exe47⤵
- Executes dropped EXE
-
\??\c:\pprnx.exec:\pprnx.exe48⤵
- Executes dropped EXE
-
\??\c:\rdphdl.exec:\rdphdl.exe49⤵
- Executes dropped EXE
-
\??\c:\rffbjdp.exec:\rffbjdp.exe50⤵
- Executes dropped EXE
-
\??\c:\hlvvnvn.exec:\hlvvnvn.exe51⤵
- Executes dropped EXE
-
\??\c:\dfnrv.exec:\dfnrv.exe52⤵
- Executes dropped EXE
-
\??\c:\rrnbtr.exec:\rrnbtr.exe53⤵
- Executes dropped EXE
-
\??\c:\vjjjr.exec:\vjjjr.exe54⤵
- Executes dropped EXE
-
\??\c:\lpnbh.exec:\lpnbh.exe55⤵
- Executes dropped EXE
-
\??\c:\lrrdp.exec:\lrrdp.exe56⤵
- Executes dropped EXE
-
\??\c:\rvnfdvb.exec:\rvnfdvb.exe57⤵
- Executes dropped EXE
-
\??\c:\ffflv.exec:\ffflv.exe58⤵
- Executes dropped EXE
-
\??\c:\rhhvpth.exec:\rhhvpth.exe59⤵
- Executes dropped EXE
-
\??\c:\jfdftlb.exec:\jfdftlb.exe60⤵
- Executes dropped EXE
-
\??\c:\rtjlh.exec:\rtjlh.exe61⤵
- Executes dropped EXE
-
\??\c:\hdljff.exec:\hdljff.exe62⤵
- Executes dropped EXE
-
\??\c:\rthvnxn.exec:\rthvnxn.exe63⤵
- Executes dropped EXE
-
\??\c:\bpxfn.exec:\bpxfn.exe64⤵
- Executes dropped EXE
-
\??\c:\vvrbd.exec:\vvrbd.exe65⤵
- Executes dropped EXE
-
\??\c:\blxvrt.exec:\blxvrt.exe66⤵
-
\??\c:\jptfb.exec:\jptfb.exe67⤵
-
\??\c:\njtxf.exec:\njtxf.exe68⤵
-
\??\c:\hdfnxl.exec:\hdfnxl.exe69⤵
-
\??\c:\thfnvj.exec:\thfnvj.exe70⤵
-
\??\c:\bprdpdb.exec:\bprdpdb.exe71⤵
-
\??\c:\hjnpv.exec:\hjnpv.exe72⤵
-
\??\c:\lfrjrjx.exec:\lfrjrjx.exe73⤵
-
\??\c:\hvxlp.exec:\hvxlp.exe74⤵
-
\??\c:\bthvvf.exec:\bthvvf.exe75⤵
-
\??\c:\jfxrrd.exec:\jfxrrd.exe76⤵
-
\??\c:\fhxvd.exec:\fhxvd.exe77⤵
-
\??\c:\bffvfdp.exec:\bffvfdp.exe78⤵
-
\??\c:\thhjn.exec:\thhjn.exe79⤵
-
\??\c:\lbljftn.exec:\lbljftn.exe80⤵
-
\??\c:\hpvdr.exec:\hpvdr.exe81⤵
-
\??\c:\hhptrrj.exec:\hhptrrj.exe82⤵
-
\??\c:\vbdhd.exec:\vbdhd.exe83⤵
-
\??\c:\pbbnff.exec:\pbbnff.exe84⤵
-
\??\c:\tdrbvrl.exec:\tdrbvrl.exe85⤵
-
\??\c:\rtvvtf.exec:\rtvvtf.exe86⤵
-
\??\c:\nffpnxf.exec:\nffpnxf.exe87⤵
-
\??\c:\ntbdlf.exec:\ntbdlf.exe88⤵
-
\??\c:\pdtdnt.exec:\pdtdnt.exe89⤵
-
\??\c:\brpvpdh.exec:\brpvpdh.exe90⤵
-
\??\c:\ftrldph.exec:\ftrldph.exe91⤵
-
\??\c:\drlntp.exec:\drlntp.exe92⤵
-
\??\c:\npfxlr.exec:\npfxlr.exe93⤵
-
\??\c:\hnrxbl.exec:\hnrxbl.exe94⤵
-
\??\c:\pjdbh.exec:\pjdbh.exe95⤵
-
\??\c:\jvpbf.exec:\jvpbf.exe96⤵
-
\??\c:\ldlfvh.exec:\ldlfvh.exe97⤵
-
\??\c:\dtvfv.exec:\dtvfv.exe98⤵
-
\??\c:\vhvlr.exec:\vhvlr.exe99⤵
-
\??\c:\nhfht.exec:\nhfht.exe100⤵
-
\??\c:\hdlxnl.exec:\hdlxnl.exe101⤵
-
\??\c:\xdfrnhn.exec:\xdfrnhn.exe102⤵
-
\??\c:\txfbld.exec:\txfbld.exe103⤵
-
\??\c:\fjdxvbf.exec:\fjdxvbf.exe104⤵
-
\??\c:\ttptxrd.exec:\ttptxrd.exe105⤵
-
\??\c:\jldtxvr.exec:\jldtxvr.exe106⤵
-
\??\c:\pfjnfrd.exec:\pfjnfrd.exe107⤵
-
\??\c:\nxrlbt.exec:\nxrlbt.exe108⤵
-
\??\c:\trldfpn.exec:\trldfpn.exe109⤵
-
\??\c:\hdvtd.exec:\hdvtd.exe110⤵
-
\??\c:\xttnxx.exec:\xttnxx.exe111⤵
-
\??\c:\fntvnbl.exec:\fntvnbl.exe112⤵
-
\??\c:\vnfnddp.exec:\vnfnddp.exe113⤵
-
\??\c:\lhthj.exec:\lhthj.exe114⤵
-
\??\c:\njlhrvt.exec:\njlhrvt.exe115⤵
-
\??\c:\rxxlx.exec:\rxxlx.exe116⤵
-
\??\c:\fvdtvbp.exec:\fvdtvbp.exe117⤵
-
\??\c:\xrxvr.exec:\xrxvr.exe118⤵
-
\??\c:\hfhfrj.exec:\hfhfrj.exe119⤵
-
\??\c:\lhvjfl.exec:\lhvjfl.exe120⤵
-
\??\c:\dhffxlj.exec:\dhffxlj.exe121⤵
-
\??\c:\tphnxnr.exec:\tphnxnr.exe122⤵
-
\??\c:\jfxfp.exec:\jfxfp.exe123⤵
-
\??\c:\pfvxhld.exec:\pfvxhld.exe124⤵
-
\??\c:\jnjjnf.exec:\jnjjnf.exe125⤵
-
\??\c:\trpdj.exec:\trpdj.exe126⤵
-
\??\c:\jfjnr.exec:\jfjnr.exe127⤵
-
\??\c:\bjlvrrd.exec:\bjlvrrd.exe128⤵
-
\??\c:\pjjlxfp.exec:\pjjlxfp.exe129⤵
-
\??\c:\hrxfpxb.exec:\hrxfpxb.exe130⤵
-
\??\c:\fbftfln.exec:\fbftfln.exe131⤵
-
\??\c:\vxpvrl.exec:\vxpvrl.exe132⤵
-
\??\c:\fjrtbvv.exec:\fjrtbvv.exe133⤵
-
\??\c:\tbrld.exec:\tbrld.exe134⤵
-
\??\c:\fhfnl.exec:\fhfnl.exe135⤵
-
\??\c:\nhpbxr.exec:\nhpbxr.exe136⤵
-
\??\c:\nbjhltp.exec:\nbjhltp.exe137⤵
-
\??\c:\phdpvv.exec:\phdpvv.exe138⤵
-
\??\c:\ptplv.exec:\ptplv.exe139⤵
-
\??\c:\thdhhxl.exec:\thdhhxl.exe140⤵
-
\??\c:\rjfbrn.exec:\rjfbrn.exe141⤵
-
\??\c:\fdpprv.exec:\fdpprv.exe142⤵
-
\??\c:\hhtdh.exec:\hhtdh.exe143⤵
-
\??\c:\dfjpx.exec:\dfjpx.exe144⤵
-
\??\c:\bvjhv.exec:\bvjhv.exe145⤵
-
\??\c:\frvdv.exec:\frvdv.exe146⤵
-
\??\c:\jttdnd.exec:\jttdnd.exe147⤵
-
\??\c:\rdphdv.exec:\rdphdv.exe148⤵
-
\??\c:\vxnldxf.exec:\vxnldxf.exe149⤵
-
\??\c:\vbdbjbf.exec:\vbdbjbf.exe150⤵
-
\??\c:\tbbfndl.exec:\tbbfndl.exe151⤵
-
\??\c:\tlfff.exec:\tlfff.exe152⤵
-
\??\c:\vvntbt.exec:\vvntbt.exe153⤵
-
\??\c:\htptfl.exec:\htptfl.exe154⤵
-
\??\c:\xrnhd.exec:\xrnhd.exe155⤵
-
\??\c:\nvlff.exec:\nvlff.exe156⤵
-
\??\c:\fbndrh.exec:\fbndrh.exe157⤵
-
\??\c:\fxfphpr.exec:\fxfphpr.exe158⤵
-
\??\c:\drvhnt.exec:\drvhnt.exe159⤵
-
\??\c:\pdhxlf.exec:\pdhxlf.exe160⤵
-
\??\c:\rvflt.exec:\rvflt.exe161⤵
-
\??\c:\nhpvpn.exec:\nhpvpn.exe162⤵
-
\??\c:\ftnjrpd.exec:\ftnjrpd.exe163⤵
-
\??\c:\tpfjlt.exec:\tpfjlt.exe164⤵
-
\??\c:\hhljj.exec:\hhljj.exe165⤵
-
\??\c:\vplrx.exec:\vplrx.exe166⤵
-
\??\c:\nrdjj.exec:\nrdjj.exe167⤵
-
\??\c:\vrflt.exec:\vrflt.exe168⤵
-
\??\c:\bptbjt.exec:\bptbjt.exe169⤵
-
\??\c:\bjfltfp.exec:\bjfltfp.exe170⤵
-
\??\c:\xnjpbr.exec:\xnjpbr.exe171⤵
-
\??\c:\rjflxpj.exec:\rjflxpj.exe172⤵
-
\??\c:\hljvb.exec:\hljvb.exe173⤵
-
\??\c:\hpxbbhf.exec:\hpxbbhf.exe174⤵
-
\??\c:\rhvdj.exec:\rhvdj.exe175⤵
-
\??\c:\thdnd.exec:\thdnd.exe176⤵
-
\??\c:\bhnprff.exec:\bhnprff.exe177⤵
-
\??\c:\lbxvr.exec:\lbxvr.exe178⤵
-
\??\c:\dvrhpjx.exec:\dvrhpjx.exe179⤵
-
\??\c:\bjllxrf.exec:\bjllxrf.exe180⤵
-
\??\c:\rfjdf.exec:\rfjdf.exe181⤵
-
\??\c:\vfdfvf.exec:\vfdfvf.exe182⤵
-
\??\c:\bppxbfd.exec:\bppxbfd.exe183⤵
-
\??\c:\xdvtdpp.exec:\xdvtdpp.exe184⤵
-
\??\c:\hdfjhnh.exec:\hdfjhnh.exe185⤵
-
\??\c:\phvrd.exec:\phvrd.exe186⤵
-
\??\c:\hfdxh.exec:\hfdxh.exe187⤵
-
\??\c:\nbnrxvl.exec:\nbnrxvl.exe188⤵
-
\??\c:\fnpvvrh.exec:\fnpvvrh.exe189⤵
-
\??\c:\vbftdn.exec:\vbftdn.exe190⤵
-
\??\c:\bvfrl.exec:\bvfrl.exe191⤵
-
\??\c:\dvxtlpl.exec:\dvxtlpl.exe192⤵
-
\??\c:\jnvflj.exec:\jnvflj.exe193⤵
-
\??\c:\ndpjd.exec:\ndpjd.exe194⤵
-
\??\c:\jpbxrpn.exec:\jpbxrpn.exe195⤵
-
\??\c:\plvpdp.exec:\plvpdp.exe196⤵
-
\??\c:\pdhvrlt.exec:\pdhvrlt.exe197⤵
-
\??\c:\rbhnp.exec:\rbhnp.exe198⤵
-
\??\c:\xvdlnrv.exec:\xvdlnrv.exe199⤵
-
\??\c:\pdhfd.exec:\pdhfd.exe200⤵
-
\??\c:\rrlfvjt.exec:\rrlfvjt.exe201⤵
-
\??\c:\hxpbb.exec:\hxpbb.exe202⤵
-
\??\c:\bftlxx.exec:\bftlxx.exe203⤵
-
\??\c:\lrdvt.exec:\lrdvt.exe204⤵
-
\??\c:\rfbdpfx.exec:\rfbdpfx.exe205⤵
-
\??\c:\jfhlhp.exec:\jfhlhp.exe206⤵
-
\??\c:\vrhtr.exec:\vrhtr.exe207⤵
-
\??\c:\tdnbhn.exec:\tdnbhn.exe208⤵
-
\??\c:\hvhlx.exec:\hvhlx.exe209⤵
-
\??\c:\pllfdf.exec:\pllfdf.exe210⤵
-
\??\c:\dfljhnd.exec:\dfljhnd.exe211⤵
-
\??\c:\bldrvv.exec:\bldrvv.exe212⤵
-
\??\c:\vfrvj.exec:\vfrvj.exe213⤵
-
\??\c:\tlbdp.exec:\tlbdp.exe214⤵
-
\??\c:\djhjjt.exec:\djhjjt.exe215⤵
-
\??\c:\nvfvnjn.exec:\nvfvnjn.exe216⤵
-
\??\c:\vxtxfhh.exec:\vxtxfhh.exe217⤵
-
\??\c:\jbprdh.exec:\jbprdh.exe218⤵
-
\??\c:\xllphrj.exec:\xllphrj.exe219⤵
-
\??\c:\bpphf.exec:\bpphf.exe220⤵
-
\??\c:\fltdtb.exec:\fltdtb.exe221⤵
-
\??\c:\ppvtrr.exec:\ppvtrr.exe222⤵
-
\??\c:\ttpnj.exec:\ttpnj.exe223⤵
-
\??\c:\dvfnf.exec:\dvfnf.exe224⤵
-
\??\c:\rvlfxj.exec:\rvlfxj.exe225⤵
-
\??\c:\dpfnp.exec:\dpfnp.exe226⤵
-
\??\c:\jnxldfv.exec:\jnxldfv.exe227⤵
-
\??\c:\nvptdpl.exec:\nvptdpl.exe228⤵
-
\??\c:\pxxnd.exec:\pxxnd.exe229⤵
-
\??\c:\dddtbdf.exec:\dddtbdf.exe230⤵
-
\??\c:\hxtnx.exec:\hxtnx.exe231⤵
-
\??\c:\nhhdn.exec:\nhhdn.exe232⤵
-
\??\c:\vfldf.exec:\vfldf.exe233⤵
-
\??\c:\lbfvljj.exec:\lbfvljj.exe234⤵
-
\??\c:\drxtnfd.exec:\drxtnfd.exe235⤵
-
\??\c:\lrxxn.exec:\lrxxn.exe236⤵
-
\??\c:\vtvjltx.exec:\vtvjltx.exe237⤵
-
\??\c:\tflvv.exec:\tflvv.exe238⤵
-
\??\c:\dtxfhtb.exec:\dtxfhtb.exe239⤵
-
\??\c:\ndlpp.exec:\ndlpp.exe240⤵
-
\??\c:\nbtlttl.exec:\nbtlttl.exe241⤵