Analysis
-
max time kernel
150s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 18:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe
Resource
win7-20240419-en
6 signatures
150 seconds
General
-
Target
13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe
-
Size
208KB
-
MD5
05ad4047e3a7c1e89221a9d09a40fd09
-
SHA1
682421591c8acfae6cd9a6f95f6358a2d695451d
-
SHA256
13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e
-
SHA512
e866385fe4a7ed8f969473c1e31868ca1951cbab714dc83b92101f38abfb2c5256964258ce50056ad440309aab9858c71f1883aed1c1ed52566a78089e733461
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31L:n3C9BRo7MlrWKo+lL
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/1568-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2852-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/388-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/388-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2776-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3324-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3056-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3056-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4548-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1800-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2656-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3112-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4600-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1248-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3648-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3976-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2532-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2636-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 35 IoCs
Processes:
resource yara_rule behavioral2/memory/1568-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1780-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3408-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2852-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4628-37-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/388-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/388-46-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/388-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2776-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2776-55-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2776-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2776-59-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3324-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3056-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3056-71-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4548-78-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4548-80-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4548-79-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4548-84-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3556-90-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2892-97-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1800-103-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2656-114-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3112-126-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/232-135-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/932-137-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/212-150-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4600-156-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1248-162-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3648-167-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3976-174-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2532-186-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4004-193-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4172-198-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2636-209-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
jjjvv.exexfxlxlf.exejppdj.exefxllfff.exentbnbt.exerfxlfrf.exethnbtt.exevjdpd.exexrrxxlf.exeththbn.exefrlxfxf.exebnhtnn.exevvpdv.exe9rxllfx.exettbnhh.exe7vpjv.exe9xrrxfr.exerxxrlff.exehbbttn.exe5ntnnn.exerxffffr.exenhbtnh.exedppvp.exelfxflxf.exevpjvv.exebbhbth.exepddvp.exe9rlfxxr.exebbbtnt.exejvvjp.exe9lfllfx.exexxxlxlf.exenhtthh.exejjdvp.exerxlfxxx.exefrfrrxf.exe9hnnnt.exedpdvv.exedvvpd.exefrlxlfx.exebbthbt.exevjdpj.exevjjvp.exeffxfrlf.exe1tnbnn.exe3vpdv.exevdjvj.exelffxrfx.exelrflrrx.exenhthnt.exedpvpp.exerxxlxrl.exerxflxrf.exe5nbhnh.exe1pdvd.exejpdvd.exexrfxffl.exetttnhb.exe9hhbnh.exe1vdvp.exerfrlfxr.exe5rxxllx.exetnnthb.exedppvp.exepid process 1780 jjjvv.exe 3408 xfxlxlf.exe 2852 jppdj.exe 1488 fxllfff.exe 4628 ntbnbt.exe 388 rfxlfrf.exe 2776 thnbtt.exe 3324 vjdpd.exe 3056 xrrxxlf.exe 4548 ththbn.exe 3556 frlxfxf.exe 2892 bnhtnn.exe 1800 vvpdv.exe 3448 9rxllfx.exe 2656 ttbnhh.exe 676 7vpjv.exe 3112 9xrrxfr.exe 232 rxxrlff.exe 932 hbbttn.exe 3964 5ntnnn.exe 212 rxffffr.exe 4600 nhbtnh.exe 1248 dppvp.exe 3648 lfxflxf.exe 3976 vpjvv.exe 3260 bbhbth.exe 2532 pddvp.exe 4004 9rlfxxr.exe 4172 bbbtnt.exe 520 jvvjp.exe 2636 9lfllfx.exe 4764 xxxlxlf.exe 5056 nhtthh.exe 1964 jjdvp.exe 2744 rxlfxxx.exe 4460 frfrrxf.exe 1876 9hnnnt.exe 3416 dpdvv.exe 2408 dvvpd.exe 3628 frlxlfx.exe 4908 bbthbt.exe 2492 vjdpj.exe 3720 vjjvp.exe 5108 ffxfrlf.exe 872 1tnbnn.exe 4388 3vpdv.exe 3656 vdjvj.exe 3900 lffxrfx.exe 2616 lrflrrx.exe 3116 nhthnt.exe 836 dpvpp.exe 3500 rxxlxrl.exe 4024 rxflxrf.exe 3384 5nbhnh.exe 4592 1pdvd.exe 4008 jpdvd.exe 3064 xrfxffl.exe 544 tttnhb.exe 740 9hhbnh.exe 4084 1vdvp.exe 1112 rfrlfxr.exe 3128 5rxxllx.exe 3476 tnnthb.exe 4564 dppvp.exe -
Processes:
resource yara_rule behavioral2/memory/1568-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2852-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/388-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/388-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/388-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3324-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3056-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3056-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1800-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2656-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3112-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3648-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3976-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2532-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2636-209-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exejjjvv.exexfxlxlf.exejppdj.exefxllfff.exentbnbt.exerfxlfrf.exethnbtt.exevjdpd.exexrrxxlf.exeththbn.exefrlxfxf.exebnhtnn.exevvpdv.exe9rxllfx.exettbnhh.exe7vpjv.exe9xrrxfr.exerxxrlff.exehbbttn.exe5ntnnn.exerxffffr.exedescription pid process target process PID 1568 wrote to memory of 1780 1568 13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe jjjvv.exe PID 1568 wrote to memory of 1780 1568 13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe jjjvv.exe PID 1568 wrote to memory of 1780 1568 13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe jjjvv.exe PID 1780 wrote to memory of 3408 1780 jjjvv.exe xfxlxlf.exe PID 1780 wrote to memory of 3408 1780 jjjvv.exe xfxlxlf.exe PID 1780 wrote to memory of 3408 1780 jjjvv.exe xfxlxlf.exe PID 3408 wrote to memory of 2852 3408 xfxlxlf.exe jppdj.exe PID 3408 wrote to memory of 2852 3408 xfxlxlf.exe jppdj.exe PID 3408 wrote to memory of 2852 3408 xfxlxlf.exe jppdj.exe PID 2852 wrote to memory of 1488 2852 jppdj.exe fxllfff.exe PID 2852 wrote to memory of 1488 2852 jppdj.exe fxllfff.exe PID 2852 wrote to memory of 1488 2852 jppdj.exe fxllfff.exe PID 1488 wrote to memory of 4628 1488 fxllfff.exe ntbnbt.exe PID 1488 wrote to memory of 4628 1488 fxllfff.exe ntbnbt.exe PID 1488 wrote to memory of 4628 1488 fxllfff.exe ntbnbt.exe PID 4628 wrote to memory of 388 4628 ntbnbt.exe rfxlfrf.exe PID 4628 wrote to memory of 388 4628 ntbnbt.exe rfxlfrf.exe PID 4628 wrote to memory of 388 4628 ntbnbt.exe rfxlfrf.exe PID 388 wrote to memory of 2776 388 rfxlfrf.exe thnbtt.exe PID 388 wrote to memory of 2776 388 rfxlfrf.exe thnbtt.exe PID 388 wrote to memory of 2776 388 rfxlfrf.exe thnbtt.exe PID 2776 wrote to memory of 3324 2776 thnbtt.exe vjdpd.exe PID 2776 wrote to memory of 3324 2776 thnbtt.exe vjdpd.exe PID 2776 wrote to memory of 3324 2776 thnbtt.exe vjdpd.exe PID 3324 wrote to memory of 3056 3324 vjdpd.exe xrrxxlf.exe PID 3324 wrote to memory of 3056 3324 vjdpd.exe xrrxxlf.exe PID 3324 wrote to memory of 3056 3324 vjdpd.exe xrrxxlf.exe PID 3056 wrote to memory of 4548 3056 xrrxxlf.exe ththbn.exe PID 3056 wrote to memory of 4548 3056 xrrxxlf.exe ththbn.exe PID 3056 wrote to memory of 4548 3056 xrrxxlf.exe ththbn.exe PID 4548 wrote to memory of 3556 4548 ththbn.exe frlxfxf.exe PID 4548 wrote to memory of 3556 4548 ththbn.exe frlxfxf.exe PID 4548 wrote to memory of 3556 4548 ththbn.exe frlxfxf.exe PID 3556 wrote to memory of 2892 3556 frlxfxf.exe bnhtnn.exe PID 3556 wrote to memory of 2892 3556 frlxfxf.exe bnhtnn.exe PID 3556 wrote to memory of 2892 3556 frlxfxf.exe bnhtnn.exe PID 2892 wrote to memory of 1800 2892 bnhtnn.exe vvpdv.exe PID 2892 wrote to memory of 1800 2892 bnhtnn.exe vvpdv.exe PID 2892 wrote to memory of 1800 2892 bnhtnn.exe vvpdv.exe PID 1800 wrote to memory of 3448 1800 vvpdv.exe 9rxllfx.exe PID 1800 wrote to memory of 3448 1800 vvpdv.exe 9rxllfx.exe PID 1800 wrote to memory of 3448 1800 vvpdv.exe 9rxllfx.exe PID 3448 wrote to memory of 2656 3448 9rxllfx.exe ttbnhh.exe PID 3448 wrote to memory of 2656 3448 9rxllfx.exe ttbnhh.exe PID 3448 wrote to memory of 2656 3448 9rxllfx.exe ttbnhh.exe PID 2656 wrote to memory of 676 2656 ttbnhh.exe 7vpjv.exe PID 2656 wrote to memory of 676 2656 ttbnhh.exe 7vpjv.exe PID 2656 wrote to memory of 676 2656 ttbnhh.exe 7vpjv.exe PID 676 wrote to memory of 3112 676 7vpjv.exe 9xrrxfr.exe PID 676 wrote to memory of 3112 676 7vpjv.exe 9xrrxfr.exe PID 676 wrote to memory of 3112 676 7vpjv.exe 9xrrxfr.exe PID 3112 wrote to memory of 232 3112 9xrrxfr.exe rxxrlff.exe PID 3112 wrote to memory of 232 3112 9xrrxfr.exe rxxrlff.exe PID 3112 wrote to memory of 232 3112 9xrrxfr.exe rxxrlff.exe PID 232 wrote to memory of 932 232 rxxrlff.exe hbbttn.exe PID 232 wrote to memory of 932 232 rxxrlff.exe hbbttn.exe PID 232 wrote to memory of 932 232 rxxrlff.exe hbbttn.exe PID 932 wrote to memory of 3964 932 hbbttn.exe 5ntnnn.exe PID 932 wrote to memory of 3964 932 hbbttn.exe 5ntnnn.exe PID 932 wrote to memory of 3964 932 hbbttn.exe 5ntnnn.exe PID 3964 wrote to memory of 212 3964 5ntnnn.exe rxffffr.exe PID 3964 wrote to memory of 212 3964 5ntnnn.exe rxffffr.exe PID 3964 wrote to memory of 212 3964 5ntnnn.exe rxffffr.exe PID 212 wrote to memory of 4600 212 rxffffr.exe nhbtnh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe"C:\Users\Admin\AppData\Local\Temp\13b6ebb93029b7f7c4bb6848d0f78eed2f7252f321b77a736cfbff81cc16ae4e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\jjjvv.exec:\jjjvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxlxlf.exec:\xfxlxlf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jppdj.exec:\jppdj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxllfff.exec:\fxllfff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntbnbt.exec:\ntbnbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rfxlfrf.exec:\rfxlfrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thnbtt.exec:\thnbtt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjdpd.exec:\vjdpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrxxlf.exec:\xrrxxlf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ththbn.exec:\ththbn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frlxfxf.exec:\frlxfxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnhtnn.exec:\bnhtnn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpdv.exec:\vvpdv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9rxllfx.exec:\9rxllfx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbnhh.exec:\ttbnhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7vpjv.exec:\7vpjv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9xrrxfr.exec:\9xrrxfr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxrlff.exec:\rxxrlff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbbttn.exec:\hbbttn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5ntnnn.exec:\5ntnnn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxffffr.exec:\rxffffr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhbtnh.exec:\nhbtnh.exe23⤵
- Executes dropped EXE
-
\??\c:\dppvp.exec:\dppvp.exe24⤵
- Executes dropped EXE
-
\??\c:\lfxflxf.exec:\lfxflxf.exe25⤵
- Executes dropped EXE
-
\??\c:\vpjvv.exec:\vpjvv.exe26⤵
- Executes dropped EXE
-
\??\c:\bbhbth.exec:\bbhbth.exe27⤵
- Executes dropped EXE
-
\??\c:\pddvp.exec:\pddvp.exe28⤵
- Executes dropped EXE
-
\??\c:\9rlfxxr.exec:\9rlfxxr.exe29⤵
- Executes dropped EXE
-
\??\c:\bbbtnt.exec:\bbbtnt.exe30⤵
- Executes dropped EXE
-
\??\c:\jvvjp.exec:\jvvjp.exe31⤵
- Executes dropped EXE
-
\??\c:\9lfllfx.exec:\9lfllfx.exe32⤵
- Executes dropped EXE
-
\??\c:\xxxlxlf.exec:\xxxlxlf.exe33⤵
- Executes dropped EXE
-
\??\c:\nhtthh.exec:\nhtthh.exe34⤵
- Executes dropped EXE
-
\??\c:\jjdvp.exec:\jjdvp.exe35⤵
- Executes dropped EXE
-
\??\c:\rxlfxxx.exec:\rxlfxxx.exe36⤵
- Executes dropped EXE
-
\??\c:\frfrrxf.exec:\frfrrxf.exe37⤵
- Executes dropped EXE
-
\??\c:\9hnnnt.exec:\9hnnnt.exe38⤵
- Executes dropped EXE
-
\??\c:\dpdvv.exec:\dpdvv.exe39⤵
- Executes dropped EXE
-
\??\c:\dvvpd.exec:\dvvpd.exe40⤵
- Executes dropped EXE
-
\??\c:\frlxlfx.exec:\frlxlfx.exe41⤵
- Executes dropped EXE
-
\??\c:\bbthbt.exec:\bbthbt.exe42⤵
- Executes dropped EXE
-
\??\c:\vjdpj.exec:\vjdpj.exe43⤵
- Executes dropped EXE
-
\??\c:\vjjvp.exec:\vjjvp.exe44⤵
- Executes dropped EXE
-
\??\c:\ffxfrlf.exec:\ffxfrlf.exe45⤵
- Executes dropped EXE
-
\??\c:\1tnbnn.exec:\1tnbnn.exe46⤵
- Executes dropped EXE
-
\??\c:\3vpdv.exec:\3vpdv.exe47⤵
- Executes dropped EXE
-
\??\c:\vdjvj.exec:\vdjvj.exe48⤵
- Executes dropped EXE
-
\??\c:\lffxrfx.exec:\lffxrfx.exe49⤵
- Executes dropped EXE
-
\??\c:\lrflrrx.exec:\lrflrrx.exe50⤵
- Executes dropped EXE
-
\??\c:\nhthnt.exec:\nhthnt.exe51⤵
- Executes dropped EXE
-
\??\c:\dpvpp.exec:\dpvpp.exe52⤵
- Executes dropped EXE
-
\??\c:\rxxlxrl.exec:\rxxlxrl.exe53⤵
- Executes dropped EXE
-
\??\c:\rxflxrf.exec:\rxflxrf.exe54⤵
- Executes dropped EXE
-
\??\c:\5nbhnh.exec:\5nbhnh.exe55⤵
- Executes dropped EXE
-
\??\c:\1pdvd.exec:\1pdvd.exe56⤵
- Executes dropped EXE
-
\??\c:\jpdvd.exec:\jpdvd.exe57⤵
- Executes dropped EXE
-
\??\c:\xrfxffl.exec:\xrfxffl.exe58⤵
- Executes dropped EXE
-
\??\c:\tttnhb.exec:\tttnhb.exe59⤵
- Executes dropped EXE
-
\??\c:\9hhbnh.exec:\9hhbnh.exe60⤵
- Executes dropped EXE
-
\??\c:\1vdvp.exec:\1vdvp.exe61⤵
- Executes dropped EXE
-
\??\c:\rfrlfxr.exec:\rfrlfxr.exe62⤵
- Executes dropped EXE
-
\??\c:\5rxxllx.exec:\5rxxllx.exe63⤵
- Executes dropped EXE
-
\??\c:\tnnthb.exec:\tnnthb.exe64⤵
- Executes dropped EXE
-
\??\c:\dppvp.exec:\dppvp.exe65⤵
- Executes dropped EXE
-
\??\c:\jdjvp.exec:\jdjvp.exe66⤵
-
\??\c:\rllrfxx.exec:\rllrfxx.exe67⤵
-
\??\c:\1bbnhh.exec:\1bbnhh.exe68⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe69⤵
-
\??\c:\vjjdd.exec:\vjjdd.exe70⤵
-
\??\c:\1fflffr.exec:\1fflffr.exe71⤵
-
\??\c:\nhbnht.exec:\nhbnht.exe72⤵
-
\??\c:\btbnbt.exec:\btbnbt.exe73⤵
-
\??\c:\5dpdp.exec:\5dpdp.exe74⤵
-
\??\c:\frfxllf.exec:\frfxllf.exe75⤵
-
\??\c:\rlfrlfr.exec:\rlfrlfr.exe76⤵
-
\??\c:\httnbb.exec:\httnbb.exe77⤵
-
\??\c:\vpjvv.exec:\vpjvv.exe78⤵
-
\??\c:\9xlfxrl.exec:\9xlfxrl.exe79⤵
-
\??\c:\xlrrflf.exec:\xlrrflf.exe80⤵
-
\??\c:\nbhtnh.exec:\nbhtnh.exe81⤵
-
\??\c:\1pjvj.exec:\1pjvj.exe82⤵
-
\??\c:\rfrfrlr.exec:\rfrfrlr.exe83⤵
-
\??\c:\1nnhtt.exec:\1nnhtt.exe84⤵
-
\??\c:\bnnhtt.exec:\bnnhtt.exe85⤵
-
\??\c:\7jvpj.exec:\7jvpj.exe86⤵
-
\??\c:\vpvpv.exec:\vpvpv.exe87⤵
-
\??\c:\xxxxrrr.exec:\xxxxrrr.exe88⤵
-
\??\c:\tbhhhb.exec:\tbhhhb.exe89⤵
-
\??\c:\hhbttn.exec:\hhbttn.exe90⤵
-
\??\c:\djjdv.exec:\djjdv.exe91⤵
-
\??\c:\xrfxrrr.exec:\xrfxrrr.exe92⤵
-
\??\c:\thbbbt.exec:\thbbbt.exe93⤵
-
\??\c:\bbnnbn.exec:\bbnnbn.exe94⤵
-
\??\c:\pvvjd.exec:\pvvjd.exe95⤵
-
\??\c:\9pvpv.exec:\9pvpv.exe96⤵
-
\??\c:\xxlrffl.exec:\xxlrffl.exe97⤵
-
\??\c:\rrxrxrx.exec:\rrxrxrx.exe98⤵
-
\??\c:\3nhnbn.exec:\3nhnbn.exe99⤵
-
\??\c:\jpdpj.exec:\jpdpj.exe100⤵
-
\??\c:\5pddj.exec:\5pddj.exe101⤵
-
\??\c:\flffxrl.exec:\flffxrl.exe102⤵
-
\??\c:\dddvv.exec:\dddvv.exe103⤵
-
\??\c:\1fxrlll.exec:\1fxrlll.exe104⤵
-
\??\c:\xxxrlrf.exec:\xxxrlrf.exe105⤵
-
\??\c:\tnhnhn.exec:\tnhnhn.exe106⤵
-
\??\c:\bhhnbn.exec:\bhhnbn.exe107⤵
-
\??\c:\ppdvj.exec:\ppdvj.exe108⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe109⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe110⤵
-
\??\c:\bthhtt.exec:\bthhtt.exe111⤵
-
\??\c:\htbnhn.exec:\htbnhn.exe112⤵
-
\??\c:\jpdvp.exec:\jpdvp.exe113⤵
-
\??\c:\lxfxrlf.exec:\lxfxrlf.exe114⤵
-
\??\c:\hbhhbn.exec:\hbhhbn.exe115⤵
-
\??\c:\tthbhh.exec:\tthbhh.exe116⤵
-
\??\c:\ddpvp.exec:\ddpvp.exe117⤵
-
\??\c:\pdjpp.exec:\pdjpp.exe118⤵
-
\??\c:\3lrlxrl.exec:\3lrlxrl.exe119⤵
-
\??\c:\fflllll.exec:\fflllll.exe120⤵
-
\??\c:\hbbtnh.exec:\hbbtnh.exe121⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe122⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe123⤵
-
\??\c:\xrffxxr.exec:\xrffxxr.exe124⤵
-
\??\c:\bttnnn.exec:\bttnnn.exe125⤵
-
\??\c:\9hnhht.exec:\9hnhht.exe126⤵
-
\??\c:\3vvvv.exec:\3vvvv.exe127⤵
-
\??\c:\vpddp.exec:\vpddp.exe128⤵
-
\??\c:\rlfrxfr.exec:\rlfrxfr.exe129⤵
-
\??\c:\frrlfff.exec:\frrlfff.exe130⤵
-
\??\c:\ntbttt.exec:\ntbttt.exe131⤵
-
\??\c:\ntnhtn.exec:\ntnhtn.exe132⤵
-
\??\c:\pjpvp.exec:\pjpvp.exe133⤵
-
\??\c:\lxxrrrl.exec:\lxxrrrl.exe134⤵
-
\??\c:\5lxrffl.exec:\5lxrffl.exe135⤵
-
\??\c:\nbtbbt.exec:\nbtbbt.exe136⤵
-
\??\c:\9pvpp.exec:\9pvpp.exe137⤵
-
\??\c:\9ppjd.exec:\9ppjd.exe138⤵
-
\??\c:\flrrrxr.exec:\flrrrxr.exe139⤵
-
\??\c:\bnhnbb.exec:\bnhnbb.exe140⤵
-
\??\c:\vdjdp.exec:\vdjdp.exe141⤵
-
\??\c:\vpdjp.exec:\vpdjp.exe142⤵
-
\??\c:\lllfrll.exec:\lllfrll.exe143⤵
-
\??\c:\xrrlffx.exec:\xrrlffx.exe144⤵
-
\??\c:\5dvpp.exec:\5dvpp.exe145⤵
-
\??\c:\vjpjv.exec:\vjpjv.exe146⤵
-
\??\c:\lfllrfl.exec:\lfllrfl.exe147⤵
-
\??\c:\bhbtnh.exec:\bhbtnh.exe148⤵
-
\??\c:\1hthnn.exec:\1hthnn.exe149⤵
-
\??\c:\dvpdv.exec:\dvpdv.exe150⤵
-
\??\c:\9llllrf.exec:\9llllrf.exe151⤵
-
\??\c:\3nbbbh.exec:\3nbbbh.exe152⤵
-
\??\c:\7ttnbt.exec:\7ttnbt.exe153⤵
-
\??\c:\jdppv.exec:\jdppv.exe154⤵
-
\??\c:\dppvv.exec:\dppvv.exe155⤵
-
\??\c:\9ffxllf.exec:\9ffxllf.exe156⤵
-
\??\c:\xlllfxf.exec:\xlllfxf.exe157⤵
-
\??\c:\hnnnhh.exec:\hnnnhh.exe158⤵
-
\??\c:\vvvvd.exec:\vvvvd.exe159⤵
-
\??\c:\dpddv.exec:\dpddv.exe160⤵
-
\??\c:\5xfxlxx.exec:\5xfxlxx.exe161⤵
-
\??\c:\xrxlxrx.exec:\xrxlxrx.exe162⤵
-
\??\c:\nbhnbb.exec:\nbhnbb.exe163⤵
-
\??\c:\nbbbtt.exec:\nbbbtt.exe164⤵
-
\??\c:\pvjdv.exec:\pvjdv.exe165⤵
-
\??\c:\jjjvv.exec:\jjjvv.exe166⤵
-
\??\c:\lfrxxxx.exec:\lfrxxxx.exe167⤵
-
\??\c:\rfxrffx.exec:\rfxrffx.exe168⤵
-
\??\c:\bhbbht.exec:\bhbbht.exe169⤵
-
\??\c:\jpvvv.exec:\jpvvv.exe170⤵
-
\??\c:\flxxrrr.exec:\flxxrrr.exe171⤵
-
\??\c:\fxllllf.exec:\fxllllf.exe172⤵
-
\??\c:\3btnhn.exec:\3btnhn.exe173⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe174⤵
-
\??\c:\pvdvv.exec:\pvdvv.exe175⤵
-
\??\c:\1rxrxxr.exec:\1rxrxxr.exe176⤵
-
\??\c:\fxrrlll.exec:\fxrrlll.exe177⤵
-
\??\c:\7bbnhh.exec:\7bbnhh.exe178⤵
-
\??\c:\5pjjd.exec:\5pjjd.exe179⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe180⤵
-
\??\c:\xrrlfxr.exec:\xrrlfxr.exe181⤵
-
\??\c:\htnhbt.exec:\htnhbt.exe182⤵
-
\??\c:\3tnhtt.exec:\3tnhtt.exe183⤵
-
\??\c:\vvvjd.exec:\vvvjd.exe184⤵
-
\??\c:\9flffff.exec:\9flffff.exe185⤵
-
\??\c:\nnnnhn.exec:\nnnnhn.exe186⤵
-
\??\c:\ttnbhh.exec:\ttnbhh.exe187⤵
-
\??\c:\ppvvj.exec:\ppvvj.exe188⤵
-
\??\c:\lflxxxr.exec:\lflxxxr.exe189⤵
-
\??\c:\thbtnn.exec:\thbtnn.exe190⤵
-
\??\c:\hbttnn.exec:\hbttnn.exe191⤵
-
\??\c:\9vvpj.exec:\9vvpj.exe192⤵
-
\??\c:\xfxffll.exec:\xfxffll.exe193⤵
-
\??\c:\rlrxrlx.exec:\rlrxrlx.exe194⤵
-
\??\c:\bnnnnh.exec:\bnnnnh.exe195⤵
-
\??\c:\5djdd.exec:\5djdd.exe196⤵
-
\??\c:\vvvvj.exec:\vvvvj.exe197⤵
-
\??\c:\3lfxrrl.exec:\3lfxrrl.exe198⤵
-
\??\c:\nhhnnn.exec:\nhhnnn.exe199⤵
-
\??\c:\1hnhtt.exec:\1hnhtt.exe200⤵
-
\??\c:\7ddpp.exec:\7ddpp.exe201⤵
-
\??\c:\rlxrllf.exec:\rlxrllf.exe202⤵
-
\??\c:\lfflffx.exec:\lfflffx.exe203⤵
-
\??\c:\1thbbb.exec:\1thbbb.exe204⤵
-
\??\c:\vpdvv.exec:\vpdvv.exe205⤵
-
\??\c:\xlrlflf.exec:\xlrlflf.exe206⤵
-
\??\c:\rllfxxr.exec:\rllfxxr.exe207⤵
-
\??\c:\bnthhn.exec:\bnthhn.exe208⤵
-
\??\c:\btthtt.exec:\btthtt.exe209⤵
-
\??\c:\1jjdv.exec:\1jjdv.exe210⤵
-
\??\c:\rlxlrlr.exec:\rlxlrlr.exe211⤵
-
\??\c:\frrlfxr.exec:\frrlfxr.exe212⤵
-
\??\c:\btnhtt.exec:\btnhtt.exe213⤵
-
\??\c:\3jjvv.exec:\3jjvv.exe214⤵
-
\??\c:\rffxffl.exec:\rffxffl.exe215⤵
-
\??\c:\llxrxxx.exec:\llxrxxx.exe216⤵
-
\??\c:\tnbhbh.exec:\tnbhbh.exe217⤵
-
\??\c:\5nnbnn.exec:\5nnbnn.exe218⤵
-
\??\c:\dvvpv.exec:\dvvpv.exe219⤵
-
\??\c:\xxffrxr.exec:\xxffrxr.exe220⤵
-
\??\c:\nbhbtt.exec:\nbhbtt.exe221⤵
-
\??\c:\ttttnn.exec:\ttttnn.exe222⤵
-
\??\c:\ppjdv.exec:\ppjdv.exe223⤵
-
\??\c:\1rlfrrl.exec:\1rlfrrl.exe224⤵
-
\??\c:\lxxrxll.exec:\lxxrxll.exe225⤵
-
\??\c:\hhbbbh.exec:\hhbbbh.exe226⤵
-
\??\c:\bthhbh.exec:\bthhbh.exe227⤵
-
\??\c:\dvdvd.exec:\dvdvd.exe228⤵
-
\??\c:\fxfrlll.exec:\fxfrlll.exe229⤵
-
\??\c:\7lfxrrr.exec:\7lfxrrr.exe230⤵
-
\??\c:\hntttt.exec:\hntttt.exe231⤵
-
\??\c:\nbnhhh.exec:\nbnhhh.exe232⤵
-
\??\c:\pddvv.exec:\pddvv.exe233⤵
-
\??\c:\vdjjd.exec:\vdjjd.exe234⤵
-
\??\c:\llrrllr.exec:\llrrllr.exe235⤵
-
\??\c:\fflfxxx.exec:\fflfxxx.exe236⤵
-
\??\c:\httbbt.exec:\httbbt.exe237⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe238⤵
-
\??\c:\3dvjv.exec:\3dvjv.exe239⤵
-
\??\c:\fxffxxf.exec:\fxffxxf.exe240⤵
-
\??\c:\fflfxfx.exec:\fflfxfx.exe241⤵