Analysis
-
max time kernel
150s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 00:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe
Resource
win7-20240611-en
6 signatures
150 seconds
General
-
Target
8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe
-
Size
78KB
-
MD5
27c6b87385074beec5fb276e5c6839c6
-
SHA1
2584d7d77857b8777ecb1a083779053826e379ae
-
SHA256
8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c
-
SHA512
c7cb4d8cba23984d6ee17c2959b036bb8f9fc139c6fc500f5907268158cf37ad81e7a21a5dfd8d9cf2ad8decebcd9a0f390e8effed9e38ffb5d2a6a37a019360
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIpWCz+FR4RzWqC5ZzF:ymb3NkkiQ3mdBjFIsIpZ+R4RzWqCp
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/4384-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1996-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2660-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2232-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2200-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2128-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2656-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/412-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2228-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2288-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4700-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2064-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2772-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2044-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4168-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4024-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3932-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3984-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2660-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4432-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 31 IoCs
Processes:
resource yara_rule behavioral2/memory/4384-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1996-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2660-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2660-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4032-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2232-162-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4620-209-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2200-196-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2072-191-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2128-167-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2656-155-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/412-149-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2228-143-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2288-138-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4700-125-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2064-119-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2772-113-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2044-101-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4168-95-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4024-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4876-80-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3932-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3932-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3932-71-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4032-67-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4032-61-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3984-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4748-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/60-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2660-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4432-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
pjppv.exepdjjv.exerfxxfxx.exennnbbb.exe3tbhhb.exedpdjv.exexxrrrxr.exe1flxxff.exebtntnb.exejdjdv.exevjjjv.exe1lxrlll.exexxffxfl.exe5ttnnn.exedvdjj.exevdjdp.exexlrxxfl.exebhhhbh.exehbhhht.exepvpvj.exepvvpp.exerxxxfll.exelfrrrrr.exebthbtb.exe5pvdd.exevjpvv.exelfllffx.exe5rlllll.exehthhhb.exenntttt.exepppvp.exepvvpp.exerlxxrrr.exefxfxxxr.exebbnnhh.exe5bhhnn.exejjppv.exejjppp.exerfxrxxf.exexfxrrrx.exenthbhh.exetnttbn.exeddjjj.exepdjjj.exefxlffxr.exe7lrxxrr.exettbbtb.exetttnhh.exehntthn.exedpdvd.exevpdvp.exefffxrrr.exexxxrlrx.exenbnnbn.exehhnnnt.exevdvvv.exeppvvv.exerlxflxf.exeflffrxf.exethhhhn.exejpvpd.exejdjpj.exeddvpd.exeflrlxrl.exepid process 1996 pjppv.exe 4432 pdjjv.exe 2660 rfxxfxx.exe 60 nnnbbb.exe 4748 3tbhhb.exe 540 dpdjv.exe 3984 xxrrrxr.exe 4032 1flxxff.exe 3932 btntnb.exe 4876 jdjdv.exe 4024 vjjjv.exe 4168 1lxrlll.exe 2044 xxffxfl.exe 2992 5ttnnn.exe 2772 dvdjj.exe 2064 vdjdp.exe 4700 xlrxxfl.exe 3748 bhhhbh.exe 2288 hbhhht.exe 2228 pvpvj.exe 412 pvvpp.exe 2656 rxxxfll.exe 2232 lfrrrrr.exe 2128 bthbtb.exe 888 5pvdd.exe 4440 vjpvv.exe 4400 lfllffx.exe 2072 5rlllll.exe 2200 hthhhb.exe 1624 nntttt.exe 4620 pppvp.exe 3256 pvvpp.exe 3536 rlxxrrr.exe 4404 fxfxxxr.exe 1860 bbnnhh.exe 4896 5bhhnn.exe 4812 jjppv.exe 3008 jjppp.exe 3212 rfxrxxf.exe 1604 xfxrrrx.exe 2624 nthbhh.exe 4268 tnttbn.exe 3268 ddjjj.exe 3968 pdjjj.exe 2116 fxlffxr.exe 4072 7lrxxrr.exe 4928 ttbbtb.exe 5092 tttnhh.exe 4340 hntthn.exe 4120 dpdvd.exe 3276 vpdvp.exe 1020 fffxrrr.exe 536 xxxrlrx.exe 1612 nbnnbn.exe 4668 hhnnnt.exe 4748 vdvvv.exe 1116 ppvvv.exe 1188 rlxflxf.exe 3088 flffrxf.exe 1948 thhhhn.exe 3048 jpvpd.exe 4424 jdjpj.exe 532 ddvpd.exe 1528 flrlxrl.exe -
Processes:
resource yara_rule behavioral2/memory/4384-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1996-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2232-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-209-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2200-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2128-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2656-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/412-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2228-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2288-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4700-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2064-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2772-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2044-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4168-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4024-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3984-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4432-18-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exepjppv.exepdjjv.exerfxxfxx.exennnbbb.exe3tbhhb.exedpdjv.exexxrrrxr.exe1flxxff.exebtntnb.exejdjdv.exevjjjv.exe1lxrlll.exexxffxfl.exe5ttnnn.exedvdjj.exevdjdp.exexlrxxfl.exebhhhbh.exehbhhht.exepvpvj.exepvvpp.exedescription pid process target process PID 4384 wrote to memory of 1996 4384 8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe bbhbtt.exe PID 4384 wrote to memory of 1996 4384 8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe bbhbtt.exe PID 4384 wrote to memory of 1996 4384 8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe bbhbtt.exe PID 1996 wrote to memory of 4432 1996 pjppv.exe pdjjv.exe PID 1996 wrote to memory of 4432 1996 pjppv.exe pdjjv.exe PID 1996 wrote to memory of 4432 1996 pjppv.exe pdjjv.exe PID 4432 wrote to memory of 2660 4432 pdjjv.exe rfxxfxx.exe PID 4432 wrote to memory of 2660 4432 pdjjv.exe rfxxfxx.exe PID 4432 wrote to memory of 2660 4432 pdjjv.exe rfxxfxx.exe PID 2660 wrote to memory of 60 2660 rfxxfxx.exe nnnbbb.exe PID 2660 wrote to memory of 60 2660 rfxxfxx.exe nnnbbb.exe PID 2660 wrote to memory of 60 2660 rfxxfxx.exe nnnbbb.exe PID 60 wrote to memory of 4748 60 nnnbbb.exe 3tbhhb.exe PID 60 wrote to memory of 4748 60 nnnbbb.exe 3tbhhb.exe PID 60 wrote to memory of 4748 60 nnnbbb.exe 3tbhhb.exe PID 4748 wrote to memory of 540 4748 3tbhhb.exe dpdjv.exe PID 4748 wrote to memory of 540 4748 3tbhhb.exe dpdjv.exe PID 4748 wrote to memory of 540 4748 3tbhhb.exe dpdjv.exe PID 540 wrote to memory of 3984 540 dpdjv.exe xxrrrxr.exe PID 540 wrote to memory of 3984 540 dpdjv.exe xxrrrxr.exe PID 540 wrote to memory of 3984 540 dpdjv.exe xxrrrxr.exe PID 3984 wrote to memory of 4032 3984 xxrrrxr.exe tbbtnb.exe PID 3984 wrote to memory of 4032 3984 xxrrrxr.exe tbbtnb.exe PID 3984 wrote to memory of 4032 3984 xxrrrxr.exe tbbtnb.exe PID 4032 wrote to memory of 3932 4032 1flxxff.exe btntnb.exe PID 4032 wrote to memory of 3932 4032 1flxxff.exe btntnb.exe PID 4032 wrote to memory of 3932 4032 1flxxff.exe btntnb.exe PID 3932 wrote to memory of 4876 3932 btntnb.exe nnttbh.exe PID 3932 wrote to memory of 4876 3932 btntnb.exe nnttbh.exe PID 3932 wrote to memory of 4876 3932 btntnb.exe nnttbh.exe PID 4876 wrote to memory of 4024 4876 jdjdv.exe vjjjv.exe PID 4876 wrote to memory of 4024 4876 jdjdv.exe vjjjv.exe PID 4876 wrote to memory of 4024 4876 jdjdv.exe vjjjv.exe PID 4024 wrote to memory of 4168 4024 vjjjv.exe 1lxrlll.exe PID 4024 wrote to memory of 4168 4024 vjjjv.exe 1lxrlll.exe PID 4024 wrote to memory of 4168 4024 vjjjv.exe 1lxrlll.exe PID 4168 wrote to memory of 2044 4168 1lxrlll.exe 9nnnhh.exe PID 4168 wrote to memory of 2044 4168 1lxrlll.exe 9nnnhh.exe PID 4168 wrote to memory of 2044 4168 1lxrlll.exe 9nnnhh.exe PID 2044 wrote to memory of 2992 2044 xxffxfl.exe 5ttnnn.exe PID 2044 wrote to memory of 2992 2044 xxffxfl.exe 5ttnnn.exe PID 2044 wrote to memory of 2992 2044 xxffxfl.exe 5ttnnn.exe PID 2992 wrote to memory of 2772 2992 5ttnnn.exe dvdjj.exe PID 2992 wrote to memory of 2772 2992 5ttnnn.exe dvdjj.exe PID 2992 wrote to memory of 2772 2992 5ttnnn.exe dvdjj.exe PID 2772 wrote to memory of 2064 2772 dvdjj.exe bbbbtn.exe PID 2772 wrote to memory of 2064 2772 dvdjj.exe bbbbtn.exe PID 2772 wrote to memory of 2064 2772 dvdjj.exe bbbbtn.exe PID 2064 wrote to memory of 4700 2064 vdjdp.exe xlrxxfl.exe PID 2064 wrote to memory of 4700 2064 vdjdp.exe xlrxxfl.exe PID 2064 wrote to memory of 4700 2064 vdjdp.exe xlrxxfl.exe PID 4700 wrote to memory of 3748 4700 xlrxxfl.exe bhhhbh.exe PID 4700 wrote to memory of 3748 4700 xlrxxfl.exe bhhhbh.exe PID 4700 wrote to memory of 3748 4700 xlrxxfl.exe bhhhbh.exe PID 3748 wrote to memory of 2288 3748 bhhhbh.exe hbhhht.exe PID 3748 wrote to memory of 2288 3748 bhhhbh.exe hbhhht.exe PID 3748 wrote to memory of 2288 3748 bhhhbh.exe hbhhht.exe PID 2288 wrote to memory of 2228 2288 hbhhht.exe xlfrfxr.exe PID 2288 wrote to memory of 2228 2288 hbhhht.exe xlfrfxr.exe PID 2288 wrote to memory of 2228 2288 hbhhht.exe xlfrfxr.exe PID 2228 wrote to memory of 412 2228 pvpvj.exe pvvpp.exe PID 2228 wrote to memory of 412 2228 pvpvj.exe pvvpp.exe PID 2228 wrote to memory of 412 2228 pvpvj.exe pvvpp.exe PID 412 wrote to memory of 2656 412 pvvpp.exe rxxxfll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe"C:\Users\Admin\AppData\Local\Temp\8cc7d12a9f9eaac87c273998ac0463445cb6b1679bdd809a7496ed96d09f094c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\pjppv.exec:\pjppv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjjv.exec:\pdjjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rfxxfxx.exec:\rfxxfxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnnbbb.exec:\nnnbbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3tbhhb.exec:\3tbhhb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpdjv.exec:\dpdjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxrrrxr.exec:\xxrrrxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1flxxff.exec:\1flxxff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btntnb.exec:\btntnb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdjdv.exec:\jdjdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjjjv.exec:\vjjjv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1lxrlll.exec:\1lxrlll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxffxfl.exec:\xxffxfl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5ttnnn.exec:\5ttnnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvdjj.exec:\dvdjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdjdp.exec:\vdjdp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlrxxfl.exec:\xlrxxfl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhhhbh.exec:\bhhhbh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhhht.exec:\hbhhht.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvpvj.exec:\pvpvj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvvpp.exec:\pvvpp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxxfll.exec:\rxxxfll.exe23⤵
- Executes dropped EXE
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe24⤵
- Executes dropped EXE
-
\??\c:\bthbtb.exec:\bthbtb.exe25⤵
- Executes dropped EXE
-
\??\c:\5pvdd.exec:\5pvdd.exe26⤵
- Executes dropped EXE
-
\??\c:\vjpvv.exec:\vjpvv.exe27⤵
- Executes dropped EXE
-
\??\c:\lfllffx.exec:\lfllffx.exe28⤵
- Executes dropped EXE
-
\??\c:\5rlllll.exec:\5rlllll.exe29⤵
- Executes dropped EXE
-
\??\c:\hthhhb.exec:\hthhhb.exe30⤵
- Executes dropped EXE
-
\??\c:\nntttt.exec:\nntttt.exe31⤵
- Executes dropped EXE
-
\??\c:\pppvp.exec:\pppvp.exe32⤵
- Executes dropped EXE
-
\??\c:\pvvpp.exec:\pvvpp.exe33⤵
- Executes dropped EXE
-
\??\c:\rlxxrrr.exec:\rlxxrrr.exe34⤵
- Executes dropped EXE
-
\??\c:\fxfxxxr.exec:\fxfxxxr.exe35⤵
- Executes dropped EXE
-
\??\c:\bbnnhh.exec:\bbnnhh.exe36⤵
- Executes dropped EXE
-
\??\c:\5bhhnn.exec:\5bhhnn.exe37⤵
- Executes dropped EXE
-
\??\c:\jjppv.exec:\jjppv.exe38⤵
- Executes dropped EXE
-
\??\c:\jjppp.exec:\jjppp.exe39⤵
- Executes dropped EXE
-
\??\c:\rfxrxxf.exec:\rfxrxxf.exe40⤵
- Executes dropped EXE
-
\??\c:\xfxrrrx.exec:\xfxrrrx.exe41⤵
- Executes dropped EXE
-
\??\c:\nthbhh.exec:\nthbhh.exe42⤵
- Executes dropped EXE
-
\??\c:\tnttbn.exec:\tnttbn.exe43⤵
- Executes dropped EXE
-
\??\c:\ddjjj.exec:\ddjjj.exe44⤵
- Executes dropped EXE
-
\??\c:\pdjjj.exec:\pdjjj.exe45⤵
- Executes dropped EXE
-
\??\c:\fxlffxr.exec:\fxlffxr.exe46⤵
- Executes dropped EXE
-
\??\c:\7lrxxrr.exec:\7lrxxrr.exe47⤵
- Executes dropped EXE
-
\??\c:\ttbbtb.exec:\ttbbtb.exe48⤵
- Executes dropped EXE
-
\??\c:\tttnhh.exec:\tttnhh.exe49⤵
- Executes dropped EXE
-
\??\c:\hntthn.exec:\hntthn.exe50⤵
- Executes dropped EXE
-
\??\c:\dpdvd.exec:\dpdvd.exe51⤵
- Executes dropped EXE
-
\??\c:\vpdvp.exec:\vpdvp.exe52⤵
- Executes dropped EXE
-
\??\c:\fffxrrr.exec:\fffxrrr.exe53⤵
- Executes dropped EXE
-
\??\c:\xxxrlrx.exec:\xxxrlrx.exe54⤵
- Executes dropped EXE
-
\??\c:\nbnnbn.exec:\nbnnbn.exe55⤵
- Executes dropped EXE
-
\??\c:\hhnnnt.exec:\hhnnnt.exe56⤵
- Executes dropped EXE
-
\??\c:\vdvvv.exec:\vdvvv.exe57⤵
- Executes dropped EXE
-
\??\c:\ppvvv.exec:\ppvvv.exe58⤵
- Executes dropped EXE
-
\??\c:\rlxflxf.exec:\rlxflxf.exe59⤵
- Executes dropped EXE
-
\??\c:\flffrxf.exec:\flffrxf.exe60⤵
- Executes dropped EXE
-
\??\c:\thhhhn.exec:\thhhhn.exe61⤵
- Executes dropped EXE
-
\??\c:\jpvpd.exec:\jpvpd.exe62⤵
- Executes dropped EXE
-
\??\c:\jdjpj.exec:\jdjpj.exe63⤵
- Executes dropped EXE
-
\??\c:\ddvpd.exec:\ddvpd.exe64⤵
- Executes dropped EXE
-
\??\c:\flrlxrl.exec:\flrlxrl.exe65⤵
- Executes dropped EXE
-
\??\c:\tbnnhh.exec:\tbnnhh.exe66⤵
-
\??\c:\hnttbh.exec:\hnttbh.exe67⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe68⤵
-
\??\c:\jpvvd.exec:\jpvvd.exe69⤵
-
\??\c:\fxxxxxl.exec:\fxxxxxl.exe70⤵
-
\??\c:\xxxxrrr.exec:\xxxxrrr.exe71⤵
-
\??\c:\hhbtnn.exec:\hhbtnn.exe72⤵
-
\??\c:\ttbttt.exec:\ttbttt.exe73⤵
-
\??\c:\nhbbhn.exec:\nhbbhn.exe74⤵
-
\??\c:\jppjd.exec:\jppjd.exe75⤵
-
\??\c:\dpdpv.exec:\dpdpv.exe76⤵
-
\??\c:\rlrlflf.exec:\rlrlflf.exe77⤵
-
\??\c:\lrxxxff.exec:\lrxxxff.exe78⤵
-
\??\c:\ttttnn.exec:\ttttnn.exe79⤵
-
\??\c:\bbtnbn.exec:\bbtnbn.exe80⤵
-
\??\c:\bnbhht.exec:\bnbhht.exe81⤵
-
\??\c:\jpppj.exec:\jpppj.exe82⤵
-
\??\c:\ddjjj.exec:\ddjjj.exe83⤵
-
\??\c:\ffrlllf.exec:\ffrlllf.exe84⤵
-
\??\c:\xflfxxf.exec:\xflfxxf.exe85⤵
-
\??\c:\bbttnt.exec:\bbttnt.exe86⤵
-
\??\c:\nhhhbb.exec:\nhhhbb.exe87⤵
-
\??\c:\nnhbbb.exec:\nnhbbb.exe88⤵
-
\??\c:\djdvj.exec:\djdvj.exe89⤵
-
\??\c:\vvjvv.exec:\vvjvv.exe90⤵
-
\??\c:\lxxrfff.exec:\lxxrfff.exe91⤵
-
\??\c:\3rxxrrl.exec:\3rxxrrl.exe92⤵
-
\??\c:\hhhhbb.exec:\hhhhbb.exe93⤵
-
\??\c:\bbhbtt.exec:\bbhbtt.exe94⤵
-
\??\c:\btbttt.exec:\btbttt.exe95⤵
-
\??\c:\jjdvv.exec:\jjdvv.exe96⤵
-
\??\c:\vvddd.exec:\vvddd.exe97⤵
-
\??\c:\xfffxrr.exec:\xfffxrr.exe98⤵
-
\??\c:\rflllrr.exec:\rflllrr.exe99⤵
-
\??\c:\rflllll.exec:\rflllll.exe100⤵
-
\??\c:\tttnhb.exec:\tttnhb.exe101⤵
-
\??\c:\tnthbb.exec:\tnthbb.exe102⤵
-
\??\c:\dvvvj.exec:\dvvvj.exe103⤵
-
\??\c:\vjddv.exec:\vjddv.exe104⤵
-
\??\c:\pvdvj.exec:\pvdvj.exe105⤵
-
\??\c:\vjjdj.exec:\vjjdj.exe106⤵
-
\??\c:\ppddv.exec:\ppddv.exe107⤵
-
\??\c:\fxffxff.exec:\fxffxff.exe108⤵
-
\??\c:\frxxxxx.exec:\frxxxxx.exe109⤵
-
\??\c:\thnttb.exec:\thnttb.exe110⤵
-
\??\c:\nnhbhn.exec:\nnhbhn.exe111⤵
-
\??\c:\jdvvj.exec:\jdvvj.exe112⤵
-
\??\c:\dpvvp.exec:\dpvvp.exe113⤵
-
\??\c:\xflfrfl.exec:\xflfrfl.exe114⤵
-
\??\c:\fffxxfx.exec:\fffxxfx.exe115⤵
-
\??\c:\nhttbb.exec:\nhttbb.exe116⤵
-
\??\c:\djjjd.exec:\djjjd.exe117⤵
-
\??\c:\vdvdj.exec:\vdvdj.exe118⤵
-
\??\c:\ppddp.exec:\ppddp.exe119⤵
-
\??\c:\fffflll.exec:\fffflll.exe120⤵
-
\??\c:\xxxxxfx.exec:\xxxxxfx.exe121⤵
-
\??\c:\9tnhbt.exec:\9tnhbt.exe122⤵
-
\??\c:\bhtntb.exec:\bhtntb.exe123⤵
-
\??\c:\pddvj.exec:\pddvj.exe124⤵
-
\??\c:\vvpvp.exec:\vvpvp.exe125⤵
-
\??\c:\pjppp.exec:\pjppp.exe126⤵
-
\??\c:\lrlrfxf.exec:\lrlrfxf.exe127⤵
-
\??\c:\xfxllrr.exec:\xfxllrr.exe128⤵
-
\??\c:\llxxlrl.exec:\llxxlrl.exe129⤵
-
\??\c:\ntbbhn.exec:\ntbbhn.exe130⤵
-
\??\c:\ntnthn.exec:\ntnthn.exe131⤵
-
\??\c:\jvjjj.exec:\jvjjj.exe132⤵
-
\??\c:\ppdjj.exec:\ppdjj.exe133⤵
-
\??\c:\lfxxfxx.exec:\lfxxfxx.exe134⤵
-
\??\c:\lrxfflr.exec:\lrxfflr.exe135⤵
-
\??\c:\xrfllfl.exec:\xrfllfl.exe136⤵
-
\??\c:\nbnhtt.exec:\nbnhtt.exe137⤵
-
\??\c:\1nhthb.exec:\1nhthb.exe138⤵
-
\??\c:\jdjpp.exec:\jdjpp.exe139⤵
-
\??\c:\jdppj.exec:\jdppj.exe140⤵
-
\??\c:\ffrfxxl.exec:\ffrfxxl.exe141⤵
-
\??\c:\rxrxlrf.exec:\rxrxlrf.exe142⤵
-
\??\c:\xxflfff.exec:\xxflfff.exe143⤵
-
\??\c:\3ntbht.exec:\3ntbht.exe144⤵
-
\??\c:\nbtbbn.exec:\nbtbbn.exe145⤵
-
\??\c:\nbhnbh.exec:\nbhnbh.exe146⤵
-
\??\c:\pjjjj.exec:\pjjjj.exe147⤵
-
\??\c:\vvddj.exec:\vvddj.exe148⤵
-
\??\c:\rlfffll.exec:\rlfffll.exe149⤵
-
\??\c:\rrlllrr.exec:\rrlllrr.exe150⤵
-
\??\c:\1flfffl.exec:\1flfffl.exe151⤵
-
\??\c:\bnbbnb.exec:\bnbbnb.exe152⤵
-
\??\c:\7tbbtn.exec:\7tbbtn.exe153⤵
-
\??\c:\nnhhbb.exec:\nnhhbb.exe154⤵
-
\??\c:\3vdjj.exec:\3vdjj.exe155⤵
-
\??\c:\dpdjv.exec:\dpdjv.exe156⤵
-
\??\c:\ffxrllf.exec:\ffxrllf.exe157⤵
-
\??\c:\lfrxfll.exec:\lfrxfll.exe158⤵
-
\??\c:\llfffll.exec:\llfffll.exe159⤵
-
\??\c:\bttbhh.exec:\bttbhh.exe160⤵
-
\??\c:\ttbthh.exec:\ttbthh.exe161⤵
-
\??\c:\vvvvv.exec:\vvvvv.exe162⤵
-
\??\c:\1pppp.exec:\1pppp.exe163⤵
-
\??\c:\rlrrllr.exec:\rlrrllr.exe164⤵
-
\??\c:\ffrrllf.exec:\ffrrllf.exe165⤵
-
\??\c:\rxlflfl.exec:\rxlflfl.exe166⤵
-
\??\c:\3bhbbb.exec:\3bhbbb.exe167⤵
-
\??\c:\tbttnn.exec:\tbttnn.exe168⤵
-
\??\c:\vjvvp.exec:\vjvvp.exe169⤵
-
\??\c:\pdvvd.exec:\pdvvd.exe170⤵
-
\??\c:\frllrll.exec:\frllrll.exe171⤵
-
\??\c:\5flfrrl.exec:\5flfrrl.exe172⤵
-
\??\c:\tbnbbt.exec:\tbnbbt.exe173⤵
-
\??\c:\5hhtnt.exec:\5hhtnt.exe174⤵
-
\??\c:\7pppp.exec:\7pppp.exe175⤵
-
\??\c:\jvvdd.exec:\jvvdd.exe176⤵
-
\??\c:\xfxxlxl.exec:\xfxxlxl.exe177⤵
-
\??\c:\lrrfrfr.exec:\lrrfrfr.exe178⤵
-
\??\c:\lrflflx.exec:\lrflflx.exe179⤵
-
\??\c:\5tnttt.exec:\5tnttt.exe180⤵
-
\??\c:\hnnntn.exec:\hnnntn.exe181⤵
-
\??\c:\pvddd.exec:\pvddd.exe182⤵
-
\??\c:\lrxxffr.exec:\lrxxffr.exe183⤵
-
\??\c:\xfxrrlf.exec:\xfxrrlf.exe184⤵
-
\??\c:\5rxxxfr.exec:\5rxxxfr.exe185⤵
-
\??\c:\nnttbh.exec:\nnttbh.exe186⤵
-
\??\c:\tbtttb.exec:\tbtttb.exe187⤵
-
\??\c:\vvjjp.exec:\vvjjp.exe188⤵
-
\??\c:\pvvvj.exec:\pvvvj.exe189⤵
-
\??\c:\fxllrfl.exec:\fxllrfl.exe190⤵
-
\??\c:\lrxrrll.exec:\lrxrrll.exe191⤵
-
\??\c:\nnbbnt.exec:\nnbbnt.exe192⤵
-
\??\c:\tbhhtt.exec:\tbhhtt.exe193⤵
-
\??\c:\9jpjj.exec:\9jpjj.exe194⤵
-
\??\c:\jjpjv.exec:\jjpjv.exe195⤵
-
\??\c:\rrxxxxx.exec:\rrxxxxx.exe196⤵
-
\??\c:\rlllrfl.exec:\rlllrfl.exe197⤵
-
\??\c:\bnhhnn.exec:\bnhhnn.exe198⤵
-
\??\c:\9tntnb.exec:\9tntnb.exe199⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe200⤵
-
\??\c:\vdvjv.exec:\vdvjv.exe201⤵
-
\??\c:\xrxxrxl.exec:\xrxxrxl.exe202⤵
-
\??\c:\xxflrxx.exec:\xxflrxx.exe203⤵
-
\??\c:\rrrlrxx.exec:\rrrlrxx.exe204⤵
-
\??\c:\1nnhbh.exec:\1nnhbh.exe205⤵
-
\??\c:\tbbtnt.exec:\tbbtnt.exe206⤵
-
\??\c:\thntth.exec:\thntth.exe207⤵
-
\??\c:\ddvvv.exec:\ddvvv.exe208⤵
-
\??\c:\dvjdd.exec:\dvjdd.exe209⤵
-
\??\c:\dpvdd.exec:\dpvdd.exe210⤵
-
\??\c:\9xlfxff.exec:\9xlfxff.exe211⤵
-
\??\c:\frffxff.exec:\frffxff.exe212⤵
-
\??\c:\xllxfll.exec:\xllxfll.exe213⤵
-
\??\c:\hbnnnn.exec:\hbnnnn.exe214⤵
-
\??\c:\nhnhhn.exec:\nhnhhn.exe215⤵
-
\??\c:\ppvvv.exec:\ppvvv.exe216⤵
-
\??\c:\dvddd.exec:\dvddd.exe217⤵
-
\??\c:\vdpvv.exec:\vdpvv.exe218⤵
-
\??\c:\5rfflrx.exec:\5rfflrx.exe219⤵
-
\??\c:\xxllrxr.exec:\xxllrxr.exe220⤵
-
\??\c:\llxrrxl.exec:\llxrrxl.exe221⤵
-
\??\c:\btttbt.exec:\btttbt.exe222⤵
-
\??\c:\hhnbht.exec:\hhnbht.exe223⤵
-
\??\c:\bbtthh.exec:\bbtthh.exe224⤵
-
\??\c:\9jppj.exec:\9jppj.exe225⤵
-
\??\c:\3pvdp.exec:\3pvdp.exe226⤵
-
\??\c:\xrfffll.exec:\xrfffll.exe227⤵
-
\??\c:\xlrllxf.exec:\xlrllxf.exe228⤵
-
\??\c:\lxrrfxl.exec:\lxrrfxl.exe229⤵
-
\??\c:\nbhtht.exec:\nbhtht.exe230⤵
-
\??\c:\nttbth.exec:\nttbth.exe231⤵
-
\??\c:\jpppv.exec:\jpppv.exe232⤵
-
\??\c:\ppvpp.exec:\ppvpp.exe233⤵
-
\??\c:\vjjdd.exec:\vjjdd.exe234⤵
-
\??\c:\fxllfff.exec:\fxllfff.exe235⤵
-
\??\c:\llfxlfl.exec:\llfxlfl.exe236⤵
-
\??\c:\jpjdd.exec:\jpjdd.exe237⤵
-
\??\c:\3jdvj.exec:\3jdvj.exe238⤵
-
\??\c:\xrffrrr.exec:\xrffrrr.exe239⤵
-
\??\c:\ffxrxxx.exec:\ffxrxxx.exe240⤵
-
\??\c:\bhnnnt.exec:\bhnnnt.exe241⤵