Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 21:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe
-
Size
61KB
-
MD5
a2b73faba4334ce019f71e22a1bd996f
-
SHA1
b77fe53d99ad523cde4179aa6762f198236c3fef
-
SHA256
4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd
-
SHA512
255fcc877449ba46723151760dd1f29e2d3045bd8a2cf6f4adb10de0b77da80c4ab1c58395f348e58b7cecfea486b5e3437fc511a4a69205cfe0a57d07d27872
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzkzNb:ymb3NkkiQ3mdBjFIvlpb
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/5080-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5008-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4280-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3272-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4924-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4376-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4036-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1204-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3832-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3116-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1224-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1724-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3448-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 31 IoCs
Processes:
resource yara_rule behavioral2/memory/1224-60-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5080-99-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1616-141-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/928-207-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5008-188-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4280-184-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3272-177-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4924-171-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4928-147-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4576-135-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4376-123-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4036-93-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1204-84-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3832-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3116-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1224-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1224-61-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2252-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2108-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2108-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2108-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2108-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1724-37-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4160-29-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4160-28-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4160-27-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2504-21-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3448-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3448-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3448-12-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4856-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
rxxxrlf.exennnnnn.exettbtnt.exevvjjj.exe7llfffx.exe5frxxfl.exehbttbb.exedjjvj.exedjvvj.exe9ffrfrf.exexfxllfl.exebntnhh.exe5ddvj.exedppjp.exefffxrrr.exelrxrlll.exetnbbnt.exedjjjv.exe3vjjv.exefrfxrrr.exefrfrlff.exebnnhtt.exebtttbb.exedjpjd.exedjjjv.exelffrrfl.exerllfxxr.exehbbnnh.exedjvpp.exe9jvpd.exexfxxlff.exentbtbb.exethhtnh.exejpjvp.exefrflffr.exefxlfrlx.exebbbnbh.exenbbnhn.exejjddd.exellffrxl.exe5rllffx.exettbtbh.exebtnnbb.exejvjvp.exe7ddvp.exefxlfllr.exelrlxxlf.exenttbtb.exetntbth.exedpjjd.exe9rflrfx.exexrxxxxr.exebttnhh.exetnttbb.exennbtbn.exeddjpv.exeppdvd.exexrxxrrl.exehbhbbb.exehbthtt.exepdpjd.exedvvvj.exelxllffr.exefxffflf.exepid process 3448 rxxxrlf.exe 2504 nnnnnn.exe 4160 ttbtnt.exe 1724 vvjjj.exe 2108 7llfffx.exe 2252 5frxxfl.exe 1224 hbttbb.exe 3116 djjvj.exe 3832 djvvj.exe 1204 9ffrfrf.exe 4036 xfxllfl.exe 5080 bntnhh.exe 3084 5ddvj.exe 2028 dppjp.exe 1512 fffxrrr.exe 4376 lrxrlll.exe 4920 tnbbnt.exe 4576 djjjv.exe 1616 3vjjv.exe 4928 frfxrrr.exe 4976 frfrlff.exe 2276 bnnhtt.exe 2268 btttbb.exe 4924 djpjd.exe 3272 djjjv.exe 4280 lffrrfl.exe 5008 rllfxxr.exe 4868 hbbnnh.exe 3956 djvpp.exe 928 9jvpd.exe 4672 xfxxlff.exe 3752 ntbtbb.exe 2752 thhtnh.exe 4508 jpjvp.exe 4956 frflffr.exe 5092 fxlfrlx.exe 4728 bbbnbh.exe 3252 nbbnhn.exe 1296 jjddd.exe 2940 llffrxl.exe 4788 5rllffx.exe 2104 ttbtbh.exe 1960 btnnbb.exe 948 jvjvp.exe 1568 7ddvp.exe 4832 fxlfllr.exe 4736 lrlxxlf.exe 3068 nttbtb.exe 5016 tntbth.exe 4848 dpjjd.exe 3424 9rflrfx.exe 4356 xrxxxxr.exe 2608 bttnhh.exe 1896 tnttbb.exe 1656 nnbtbn.exe 1440 ddjpv.exe 3248 ppdvd.exe 2872 xrxxrrl.exe 3660 hbhbbb.exe 740 hbthtt.exe 1080 pdpjd.exe 5080 dvvvj.exe 3084 lxllffr.exe 4380 fxffflf.exe -
Processes:
resource yara_rule behavioral2/memory/1224-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1616-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5008-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4280-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3272-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4376-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4036-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1204-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3116-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1224-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1224-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1724-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3448-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3448-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3448-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-4-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exerxxxrlf.exennnnnn.exettbtnt.exevvjjj.exe7llfffx.exe5frxxfl.exehbttbb.exedjjvj.exedjvvj.exe9ffrfrf.exexfxllfl.exebntnhh.exe5ddvj.exedppjp.exefffxrrr.exelrxrlll.exetnbbnt.exedjjjv.exe3vjjv.exefrfxrrr.exefrfrlff.exedescription pid process target process PID 4856 wrote to memory of 3448 4856 4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe rxxxrlf.exe PID 4856 wrote to memory of 3448 4856 4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe rxxxrlf.exe PID 4856 wrote to memory of 3448 4856 4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe rxxxrlf.exe PID 3448 wrote to memory of 2504 3448 rxxxrlf.exe nnnnnn.exe PID 3448 wrote to memory of 2504 3448 rxxxrlf.exe nnnnnn.exe PID 3448 wrote to memory of 2504 3448 rxxxrlf.exe nnnnnn.exe PID 2504 wrote to memory of 4160 2504 nnnnnn.exe ttbtnt.exe PID 2504 wrote to memory of 4160 2504 nnnnnn.exe ttbtnt.exe PID 2504 wrote to memory of 4160 2504 nnnnnn.exe ttbtnt.exe PID 4160 wrote to memory of 1724 4160 ttbtnt.exe vvjjj.exe PID 4160 wrote to memory of 1724 4160 ttbtnt.exe vvjjj.exe PID 4160 wrote to memory of 1724 4160 ttbtnt.exe vvjjj.exe PID 1724 wrote to memory of 2108 1724 vvjjj.exe 7llfffx.exe PID 1724 wrote to memory of 2108 1724 vvjjj.exe 7llfffx.exe PID 1724 wrote to memory of 2108 1724 vvjjj.exe 7llfffx.exe PID 2108 wrote to memory of 2252 2108 7llfffx.exe 5frxxfl.exe PID 2108 wrote to memory of 2252 2108 7llfffx.exe 5frxxfl.exe PID 2108 wrote to memory of 2252 2108 7llfffx.exe 5frxxfl.exe PID 2252 wrote to memory of 1224 2252 5frxxfl.exe hbttbb.exe PID 2252 wrote to memory of 1224 2252 5frxxfl.exe hbttbb.exe PID 2252 wrote to memory of 1224 2252 5frxxfl.exe hbttbb.exe PID 1224 wrote to memory of 3116 1224 hbttbb.exe djjvj.exe PID 1224 wrote to memory of 3116 1224 hbttbb.exe djjvj.exe PID 1224 wrote to memory of 3116 1224 hbttbb.exe djjvj.exe PID 3116 wrote to memory of 3832 3116 djjvj.exe djvvj.exe PID 3116 wrote to memory of 3832 3116 djjvj.exe djvvj.exe PID 3116 wrote to memory of 3832 3116 djjvj.exe djvvj.exe PID 3832 wrote to memory of 1204 3832 djvvj.exe 9ffrfrf.exe PID 3832 wrote to memory of 1204 3832 djvvj.exe 9ffrfrf.exe PID 3832 wrote to memory of 1204 3832 djvvj.exe 9ffrfrf.exe PID 1204 wrote to memory of 4036 1204 9ffrfrf.exe xfxllfl.exe PID 1204 wrote to memory of 4036 1204 9ffrfrf.exe xfxllfl.exe PID 1204 wrote to memory of 4036 1204 9ffrfrf.exe xfxllfl.exe PID 4036 wrote to memory of 5080 4036 xfxllfl.exe bntnhh.exe PID 4036 wrote to memory of 5080 4036 xfxllfl.exe bntnhh.exe PID 4036 wrote to memory of 5080 4036 xfxllfl.exe bntnhh.exe PID 5080 wrote to memory of 3084 5080 bntnhh.exe 5ddvj.exe PID 5080 wrote to memory of 3084 5080 bntnhh.exe 5ddvj.exe PID 5080 wrote to memory of 3084 5080 bntnhh.exe 5ddvj.exe PID 3084 wrote to memory of 2028 3084 5ddvj.exe dppjp.exe PID 3084 wrote to memory of 2028 3084 5ddvj.exe dppjp.exe PID 3084 wrote to memory of 2028 3084 5ddvj.exe dppjp.exe PID 2028 wrote to memory of 1512 2028 dppjp.exe xfrrxrx.exe PID 2028 wrote to memory of 1512 2028 dppjp.exe xfrrxrx.exe PID 2028 wrote to memory of 1512 2028 dppjp.exe xfrrxrx.exe PID 1512 wrote to memory of 4376 1512 fffxrrr.exe lrxrlll.exe PID 1512 wrote to memory of 4376 1512 fffxrrr.exe lrxrlll.exe PID 1512 wrote to memory of 4376 1512 fffxrrr.exe lrxrlll.exe PID 4376 wrote to memory of 4920 4376 lrxrlll.exe djvdj.exe PID 4376 wrote to memory of 4920 4376 lrxrlll.exe djvdj.exe PID 4376 wrote to memory of 4920 4376 lrxrlll.exe djvdj.exe PID 4920 wrote to memory of 4576 4920 tnbbnt.exe djjjv.exe PID 4920 wrote to memory of 4576 4920 tnbbnt.exe djjjv.exe PID 4920 wrote to memory of 4576 4920 tnbbnt.exe djjjv.exe PID 4576 wrote to memory of 1616 4576 djjjv.exe 3vjjv.exe PID 4576 wrote to memory of 1616 4576 djjjv.exe 3vjjv.exe PID 4576 wrote to memory of 1616 4576 djjjv.exe 3vjjv.exe PID 1616 wrote to memory of 4928 1616 3vjjv.exe frfxrrr.exe PID 1616 wrote to memory of 4928 1616 3vjjv.exe frfxrrr.exe PID 1616 wrote to memory of 4928 1616 3vjjv.exe frfxrrr.exe PID 4928 wrote to memory of 4976 4928 frfxrrr.exe frfrlff.exe PID 4928 wrote to memory of 4976 4928 frfxrrr.exe frfrlff.exe PID 4928 wrote to memory of 4976 4928 frfxrrr.exe frfrlff.exe PID 4976 wrote to memory of 2276 4976 frfrlff.exe bnnhtt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\605845472\zmstage.exeC:\Users\Admin\AppData\Local\Temp\605845472\zmstage.exe1⤵
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe"C:\Users\Admin\AppData\Local\Temp\4da5e179858b40208c36458051199609a721aa93e3973abd75ee5886661d09bd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxxrlf.exec:\rxxxrlf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnnnnn.exec:\nnnnnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbtnt.exec:\ttbtnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvjjj.exec:\vvjjj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7llfffx.exec:\7llfffx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5frxxfl.exec:\5frxxfl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbttbb.exec:\hbttbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djjvj.exec:\djjvj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djvvj.exec:\djvvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9ffrfrf.exec:\9ffrfrf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxllfl.exec:\xfxllfl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bntnhh.exec:\bntnhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5ddvj.exec:\5ddvj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dppjp.exec:\dppjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fffxrrr.exec:\fffxrrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrxrlll.exec:\lrxrlll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnbbnt.exec:\tnbbnt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djjjv.exec:\djjjv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3vjjv.exec:\3vjjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frfxrrr.exec:\frfxrrr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frfrlff.exec:\frfrlff.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnhtt.exec:\bnnhtt.exe23⤵
- Executes dropped EXE
-
\??\c:\btttbb.exec:\btttbb.exe24⤵
- Executes dropped EXE
-
\??\c:\djpjd.exec:\djpjd.exe25⤵
- Executes dropped EXE
-
\??\c:\djjjv.exec:\djjjv.exe26⤵
- Executes dropped EXE
-
\??\c:\lffrrfl.exec:\lffrrfl.exe27⤵
- Executes dropped EXE
-
\??\c:\rllfxxr.exec:\rllfxxr.exe28⤵
- Executes dropped EXE
-
\??\c:\hbbnnh.exec:\hbbnnh.exe29⤵
- Executes dropped EXE
-
\??\c:\djvpp.exec:\djvpp.exe30⤵
- Executes dropped EXE
-
\??\c:\9jvpd.exec:\9jvpd.exe31⤵
- Executes dropped EXE
-
\??\c:\xfxxlff.exec:\xfxxlff.exe32⤵
- Executes dropped EXE
-
\??\c:\ntbtbb.exec:\ntbtbb.exe33⤵
- Executes dropped EXE
-
\??\c:\thhtnh.exec:\thhtnh.exe34⤵
- Executes dropped EXE
-
\??\c:\jpjvp.exec:\jpjvp.exe35⤵
- Executes dropped EXE
-
\??\c:\frflffr.exec:\frflffr.exe36⤵
- Executes dropped EXE
-
\??\c:\fxlfrlx.exec:\fxlfrlx.exe37⤵
- Executes dropped EXE
-
\??\c:\bbbnbh.exec:\bbbnbh.exe38⤵
- Executes dropped EXE
-
\??\c:\nbbnhn.exec:\nbbnhn.exe39⤵
- Executes dropped EXE
-
\??\c:\jjddd.exec:\jjddd.exe40⤵
- Executes dropped EXE
-
\??\c:\llffrxl.exec:\llffrxl.exe41⤵
- Executes dropped EXE
-
\??\c:\5rllffx.exec:\5rllffx.exe42⤵
- Executes dropped EXE
-
\??\c:\ttbtbh.exec:\ttbtbh.exe43⤵
- Executes dropped EXE
-
\??\c:\btnnbb.exec:\btnnbb.exe44⤵
- Executes dropped EXE
-
\??\c:\jvjvp.exec:\jvjvp.exe45⤵
- Executes dropped EXE
-
\??\c:\7ddvp.exec:\7ddvp.exe46⤵
- Executes dropped EXE
-
\??\c:\fxlfllr.exec:\fxlfllr.exe47⤵
- Executes dropped EXE
-
\??\c:\lrlxxlf.exec:\lrlxxlf.exe48⤵
- Executes dropped EXE
-
\??\c:\nttbtb.exec:\nttbtb.exe49⤵
- Executes dropped EXE
-
\??\c:\tntbth.exec:\tntbth.exe50⤵
- Executes dropped EXE
-
\??\c:\dpjjd.exec:\dpjjd.exe51⤵
- Executes dropped EXE
-
\??\c:\9rflrfx.exec:\9rflrfx.exe52⤵
- Executes dropped EXE
-
\??\c:\xrxxxxr.exec:\xrxxxxr.exe53⤵
- Executes dropped EXE
-
\??\c:\bttnhh.exec:\bttnhh.exe54⤵
- Executes dropped EXE
-
\??\c:\tnttbb.exec:\tnttbb.exe55⤵
- Executes dropped EXE
-
\??\c:\nnbtbn.exec:\nnbtbn.exe56⤵
- Executes dropped EXE
-
\??\c:\ddjpv.exec:\ddjpv.exe57⤵
- Executes dropped EXE
-
\??\c:\ppdvd.exec:\ppdvd.exe58⤵
- Executes dropped EXE
-
\??\c:\xrxxrrl.exec:\xrxxrrl.exe59⤵
- Executes dropped EXE
-
\??\c:\hbhbbb.exec:\hbhbbb.exe60⤵
- Executes dropped EXE
-
\??\c:\hbthtt.exec:\hbthtt.exe61⤵
- Executes dropped EXE
-
\??\c:\pdpjd.exec:\pdpjd.exe62⤵
- Executes dropped EXE
-
\??\c:\dvvvj.exec:\dvvvj.exe63⤵
- Executes dropped EXE
-
\??\c:\lxllffr.exec:\lxllffr.exe64⤵
- Executes dropped EXE
-
\??\c:\fxffflf.exec:\fxffflf.exe65⤵
- Executes dropped EXE
-
\??\c:\bhnttb.exec:\bhnttb.exe66⤵
-
\??\c:\hthnbh.exec:\hthnbh.exe67⤵
-
\??\c:\ddvpp.exec:\ddvpp.exe68⤵
-
\??\c:\vvjpd.exec:\vvjpd.exe69⤵
-
\??\c:\xxxrlll.exec:\xxxrlll.exe70⤵
-
\??\c:\xlrllrx.exec:\xlrllrx.exe71⤵
-
\??\c:\9bbhhn.exec:\9bbhhn.exe72⤵
-
\??\c:\7bntth.exec:\7bntth.exe73⤵
-
\??\c:\ppvpj.exec:\ppvpj.exe74⤵
-
\??\c:\pdpvd.exec:\pdpvd.exe75⤵
-
\??\c:\xrfxrrr.exec:\xrfxrrr.exe76⤵
-
\??\c:\1rlfxfx.exec:\1rlfxfx.exe77⤵
-
\??\c:\3rlfxxx.exec:\3rlfxxx.exe78⤵
-
\??\c:\tnhbtn.exec:\tnhbtn.exe79⤵
-
\??\c:\nnnnhh.exec:\nnnnhh.exe80⤵
-
\??\c:\ddpvj.exec:\ddpvj.exe81⤵
-
\??\c:\jjpjp.exec:\jjpjp.exe82⤵
-
\??\c:\ffrxlxl.exec:\ffrxlxl.exe83⤵
-
\??\c:\3flllll.exec:\3flllll.exe84⤵
-
\??\c:\bnnnnn.exec:\bnnnnn.exe85⤵
-
\??\c:\hhbtnn.exec:\hhbtnn.exe86⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe87⤵
-
\??\c:\7djdd.exec:\7djdd.exe88⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe89⤵
-
\??\c:\flrlfxx.exec:\flrlfxx.exe90⤵
-
\??\c:\fxfxrxx.exec:\fxfxrxx.exe91⤵
-
\??\c:\thtnnn.exec:\thtnnn.exe92⤵
-
\??\c:\hbhnhh.exec:\hbhnhh.exe93⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe94⤵
-
\??\c:\dpvjv.exec:\dpvjv.exe95⤵
-
\??\c:\lflfxxr.exec:\lflfxxr.exe96⤵
-
\??\c:\5rrlflf.exec:\5rrlflf.exe97⤵
-
\??\c:\nnhbbb.exec:\nnhbbb.exe98⤵
-
\??\c:\rfrfrrr.exec:\rfrfrrr.exe99⤵
-
\??\c:\xfffrrl.exec:\xfffrrl.exe100⤵
-
\??\c:\tnntbn.exec:\tnntbn.exe101⤵
-
\??\c:\htntht.exec:\htntht.exe102⤵
-
\??\c:\vjjpp.exec:\vjjpp.exe103⤵
-
\??\c:\vdjjv.exec:\vdjjv.exe104⤵
-
\??\c:\lfllxfr.exec:\lfllxfr.exe105⤵
-
\??\c:\xrxflxx.exec:\xrxflxx.exe106⤵
-
\??\c:\tbtttb.exec:\tbtttb.exe107⤵
-
\??\c:\9hhhbb.exec:\9hhhbb.exe108⤵
-
\??\c:\ddddj.exec:\ddddj.exe109⤵
-
\??\c:\pdjdv.exec:\pdjdv.exe110⤵
-
\??\c:\7xlxxxf.exec:\7xlxxxf.exe111⤵
-
\??\c:\nhhhhh.exec:\nhhhhh.exe112⤵
-
\??\c:\5jppp.exec:\5jppp.exe113⤵
-
\??\c:\dvvpv.exec:\dvvpv.exe114⤵
-
\??\c:\xrlfffx.exec:\xrlfffx.exe115⤵
-
\??\c:\lffxrrr.exec:\lffxrrr.exe116⤵
-
\??\c:\3ttnnh.exec:\3ttnnh.exe117⤵
-
\??\c:\bhhhtt.exec:\bhhhtt.exe118⤵
-
\??\c:\vjvjj.exec:\vjvjj.exe119⤵
-
\??\c:\5pddp.exec:\5pddp.exe120⤵
-
\??\c:\3lrlllr.exec:\3lrlllr.exe121⤵
-
\??\c:\lffxfff.exec:\lffxfff.exe122⤵
-
\??\c:\nnbtnn.exec:\nnbtnn.exe123⤵
-
\??\c:\nnnnbb.exec:\nnnnbb.exe124⤵
-
\??\c:\hnnhtb.exec:\hnnhtb.exe125⤵
-
\??\c:\jpvpv.exec:\jpvpv.exe126⤵
-
\??\c:\pdvdv.exec:\pdvdv.exe127⤵
-
\??\c:\ffxrrxl.exec:\ffxrrxl.exe128⤵
-
\??\c:\fxlxxfx.exec:\fxlxxfx.exe129⤵
-
\??\c:\bnttbb.exec:\bnttbb.exe130⤵
-
\??\c:\nhhbbb.exec:\nhhbbb.exe131⤵
-
\??\c:\bthhbb.exec:\bthhbb.exe132⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe133⤵
-
\??\c:\3ddvp.exec:\3ddvp.exe134⤵
-
\??\c:\frllfxx.exec:\frllfxx.exe135⤵
-
\??\c:\fxfxrxx.exec:\fxfxrxx.exe136⤵
-
\??\c:\nnttnn.exec:\nnttnn.exe137⤵
-
\??\c:\5tbbbb.exec:\5tbbbb.exe138⤵
-
\??\c:\tnnhth.exec:\tnnhth.exe139⤵
-
\??\c:\vpppd.exec:\vpppd.exe140⤵
-
\??\c:\jvdvp.exec:\jvdvp.exe141⤵
-
\??\c:\fxfflfl.exec:\fxfflfl.exe142⤵
-
\??\c:\rrxxflx.exec:\rrxxflx.exe143⤵
-
\??\c:\bbhbhh.exec:\bbhbhh.exe144⤵
-
\??\c:\btbbnb.exec:\btbbnb.exe145⤵
-
\??\c:\pjvpd.exec:\pjvpd.exe146⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe147⤵
-
\??\c:\vvjvv.exec:\vvjvv.exe148⤵
-
\??\c:\lffxxxr.exec:\lffxxxr.exe149⤵
-
\??\c:\lllllff.exec:\lllllff.exe150⤵
-
\??\c:\tnttth.exec:\tnttth.exe151⤵
-
\??\c:\httnbb.exec:\httnbb.exe152⤵
-
\??\c:\htbtnn.exec:\htbtnn.exe153⤵
-
\??\c:\vpjdd.exec:\vpjdd.exe154⤵
-
\??\c:\3dppp.exec:\3dppp.exe155⤵
-
\??\c:\7fffrrf.exec:\7fffrrf.exe156⤵
-
\??\c:\ffllllf.exec:\ffllllf.exe157⤵
-
\??\c:\5tnbtt.exec:\5tnbtt.exe158⤵
-
\??\c:\bhnhtt.exec:\bhnhtt.exe159⤵
-
\??\c:\jjdjp.exec:\jjdjp.exe160⤵
-
\??\c:\pdjvv.exec:\pdjvv.exe161⤵
-
\??\c:\ddpvj.exec:\ddpvj.exe162⤵
-
\??\c:\3lxxrrr.exec:\3lxxrrr.exe163⤵
-
\??\c:\xflxlll.exec:\xflxlll.exe164⤵
-
\??\c:\3bbtnn.exec:\3bbtnn.exe165⤵
-
\??\c:\tbhhbh.exec:\tbhhbh.exe166⤵
-
\??\c:\jdvpp.exec:\jdvpp.exe167⤵
-
\??\c:\jjvjp.exec:\jjvjp.exe168⤵
-
\??\c:\rxlxxfr.exec:\rxlxxfr.exe169⤵
-
\??\c:\ffxllfr.exec:\ffxllfr.exe170⤵
-
\??\c:\nbbbtt.exec:\nbbbtt.exe171⤵
-
\??\c:\htbhhh.exec:\htbhhh.exe172⤵
-
\??\c:\dvddv.exec:\dvddv.exe173⤵
-
\??\c:\dpjjd.exec:\dpjjd.exe174⤵
-
\??\c:\frxlfrl.exec:\frxlfrl.exe175⤵
-
\??\c:\lrrllff.exec:\lrrllff.exe176⤵
-
\??\c:\xllfrfl.exec:\xllfrfl.exe177⤵
-
\??\c:\ntbttb.exec:\ntbttb.exe178⤵
-
\??\c:\nbhhbt.exec:\nbhhbt.exe179⤵
-
\??\c:\1ddvj.exec:\1ddvj.exe180⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe181⤵
-
\??\c:\xxxxrrl.exec:\xxxxrrl.exe182⤵
-
\??\c:\fxfffff.exec:\fxfffff.exe183⤵
-
\??\c:\bbtthh.exec:\bbtthh.exe184⤵
-
\??\c:\bbbbbh.exec:\bbbbbh.exe185⤵
-
\??\c:\hbttnn.exec:\hbttnn.exe186⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe187⤵
-
\??\c:\3jjjv.exec:\3jjjv.exe188⤵
-
\??\c:\lfxrrrl.exec:\lfxrrrl.exe189⤵
-
\??\c:\xxffllr.exec:\xxffllr.exe190⤵
-
\??\c:\tbhnnb.exec:\tbhnnb.exe191⤵
-
\??\c:\5tthhb.exec:\5tthhb.exe192⤵
-
\??\c:\jpdjv.exec:\jpdjv.exe193⤵
-
\??\c:\1djdp.exec:\1djdp.exe194⤵
-
\??\c:\vvpdp.exec:\vvpdp.exe195⤵
-
\??\c:\rfrrffr.exec:\rfrrffr.exe196⤵
-
\??\c:\fxrrlll.exec:\fxrrlll.exe197⤵
-
\??\c:\9hnttt.exec:\9hnttt.exe198⤵
-
\??\c:\thhnnn.exec:\thhnnn.exe199⤵
-
\??\c:\htnhth.exec:\htnhth.exe200⤵
-
\??\c:\djvdd.exec:\djvdd.exe201⤵
-
\??\c:\ddpvj.exec:\ddpvj.exe202⤵
-
\??\c:\rfxxrxr.exec:\rfxxrxr.exe203⤵
-
\??\c:\rflllrx.exec:\rflllrx.exe204⤵
-
\??\c:\xxlxfrx.exec:\xxlxfrx.exe205⤵
-
\??\c:\nnbbht.exec:\nnbbht.exe206⤵
-
\??\c:\hhhhbb.exec:\hhhhbb.exe207⤵
-
\??\c:\dpdjp.exec:\dpdjp.exe208⤵
-
\??\c:\dppvj.exec:\dppvj.exe209⤵
-
\??\c:\5vvvp.exec:\5vvvp.exe210⤵
-
\??\c:\xrlflrr.exec:\xrlflrr.exe211⤵
-
\??\c:\rxlllff.exec:\rxlllff.exe212⤵
-
\??\c:\ttntht.exec:\ttntht.exe213⤵
-
\??\c:\tbbnbn.exec:\tbbnbn.exe214⤵
-
\??\c:\9pvdp.exec:\9pvdp.exe215⤵
-
\??\c:\dvvjv.exec:\dvvjv.exe216⤵
-
\??\c:\jddjd.exec:\jddjd.exe217⤵
-
\??\c:\xfffxxr.exec:\xfffxxr.exe218⤵
-
\??\c:\rfxxllx.exec:\rfxxllx.exe219⤵
-
\??\c:\bhbnth.exec:\bhbnth.exe220⤵
-
\??\c:\tnnnbb.exec:\tnnnbb.exe221⤵
-
\??\c:\rfxxrrl.exec:\rfxxrrl.exe222⤵
-
\??\c:\xlllffx.exec:\xlllffx.exe223⤵
-
\??\c:\bnttbh.exec:\bnttbh.exe224⤵
-
\??\c:\5ttbhn.exec:\5ttbhn.exe225⤵
-
\??\c:\pjvvd.exec:\pjvvd.exe226⤵
-
\??\c:\7pppj.exec:\7pppj.exe227⤵
-
\??\c:\9xffrrr.exec:\9xffrrr.exe228⤵
-
\??\c:\rfxfxfr.exec:\rfxfxfr.exe229⤵
-
\??\c:\nhnhhn.exec:\nhnhhn.exe230⤵
-
\??\c:\nbbbhn.exec:\nbbbhn.exe231⤵
-
\??\c:\ddvdp.exec:\ddvdp.exe232⤵
-
\??\c:\djdjv.exec:\djdjv.exe233⤵
-
\??\c:\rlrlxrr.exec:\rlrlxrr.exe234⤵
-
\??\c:\rflfrlr.exec:\rflfrlr.exe235⤵
-
\??\c:\thtbht.exec:\thtbht.exe236⤵
-
\??\c:\nhnhbt.exec:\nhnhbt.exe237⤵
-
\??\c:\tttnhn.exec:\tttnhn.exe238⤵
-
\??\c:\vpvpv.exec:\vpvpv.exe239⤵
-
\??\c:\vddjv.exec:\vddjv.exe240⤵
-
\??\c:\xfrrxrx.exec:\xfrrxrx.exe241⤵