Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe
-
Size
93KB
-
MD5
e24f3ec5c237e0f6f9c70828cf4ae5e5
-
SHA1
ded123c56457f5d7e7797d484655e55389b42f2b
-
SHA256
f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f
-
SHA512
0c8aa2ee22a342fd056c9b95ff91ad33741a00aa43a9d0ae5778566eb19ae48cfc1d45ae2270ccaf3a5f0e7fa1032a6648d27f08212ea9d820a1f4d98abdb7ce
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDodtzac0Hobv0byLufTJfJvWV:ymb3NkkiQ3mdBjFodt27HobvcyLufNfM
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/4140-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-82-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1176-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3920-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4828-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2796-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4880-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4908-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3796-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/700-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1756-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1996-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2016-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/512-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4320-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1136-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5104-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1240-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 29 IoCs
Processes:
resource yara_rule behavioral2/memory/4140-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1176-112-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3628-196-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3920-202-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4856-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4828-160-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2796-148-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4880-141-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4908-136-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3796-130-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/700-124-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1756-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1996-106-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2016-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/512-88-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3692-81-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4320-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1136-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5104-58-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1240-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5056-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5056-35-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5056-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1340-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3940-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-12-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1580-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
tbbttt.exepdddv.exexrfffxx.exenbbnhh.exettbnbh.exepdvpp.exevdvdd.exelfrlxxx.exehhttbh.exejjddv.exevvpjd.exe5ffxlll.exehbtthh.exe7hhbtb.exevvdvp.exepjjvp.exexllllrr.exebthbth.exebhnnbh.exejjjpv.exevjvpp.exe1xxrfff.exe7nnnht.exetntttt.exevjdvv.exelxfxrlf.exexlfxffr.exebhbbbn.exe5hbhhh.exepjppv.exejvddd.exexxxxxll.exeflrrxrx.exenthnbn.exehhtbtt.exevjvjd.exepdjdd.exefrllrxf.exelfllrxf.exehhbhhb.exetbbnhn.exedvpvd.exedjvdj.exejjjpp.exelrffxrf.exe1flrflr.exethbbhn.exetbttbt.exejdjdv.exe5vjjv.exe7dppd.exeffllfll.exefxfffll.exerrlrxrx.exe3bthhn.exehbhhnt.exevpjdj.exedvvdj.exe7lxfflr.exexllrrrr.exelrxfffr.exehthbbt.exe1nhnbt.exepjvdv.exepid process 4952 tbbttt.exe 3940 pdddv.exe 1340 xrfffxx.exe 5056 nbbnhh.exe 4140 ttbnbh.exe 1240 pdvpp.exe 5104 vdvdd.exe 1136 lfrlxxx.exe 4320 hhttbh.exe 3692 jjddv.exe 512 vvpjd.exe 2016 5ffxlll.exe 1172 hbtthh.exe 1996 7hhbtb.exe 1176 vvdvp.exe 1756 pjjvp.exe 700 xllllrr.exe 3796 bthbth.exe 4908 bhnnbh.exe 4880 jjjpv.exe 2796 vjvpp.exe 3644 1xxrfff.exe 4828 7nnnht.exe 4616 tntttt.exe 2596 vjdvv.exe 4912 lxfxrlf.exe 3908 xlfxffr.exe 4856 bhbbbn.exe 3628 5hbhhh.exe 3920 pjppv.exe 4972 jvddd.exe 2452 xxxxxll.exe 2964 flrrxrx.exe 1480 nthnbn.exe 4192 hhtbtt.exe 1724 vjvjd.exe 4472 pdjdd.exe 1408 frllrxf.exe 4688 lfllrxf.exe 3296 hhbhhb.exe 1444 tbbnhn.exe 3372 dvpvd.exe 208 djvdj.exe 2844 jjjpp.exe 656 lrffxrf.exe 1092 1flrflr.exe 4524 thbbhn.exe 4032 tbttbt.exe 1704 jdjdv.exe 3592 5vjjv.exe 3580 7dppd.exe 696 ffllfll.exe 644 fxfffll.exe 1268 rrlrxrx.exe 4564 3bthhn.exe 972 hbhhnt.exe 1320 vpjdj.exe 3916 dvvdj.exe 680 7lxfflr.exe 2392 xllrrrr.exe 184 lrxfffr.exe 2200 hthbbt.exe 3664 1nhnbt.exe 4220 pjvdv.exe -
Processes:
resource yara_rule behavioral2/memory/4140-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3920-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4828-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2796-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4880-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4908-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/700-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1756-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1996-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/512-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5104-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1240-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-3-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exetbbttt.exepdddv.exexrfffxx.exenbbnhh.exettbnbh.exepdvpp.exevdvdd.exelfrlxxx.exehhttbh.exejjddv.exevvpjd.exe5ffxlll.exehbtthh.exe7hhbtb.exevvdvp.exepjjvp.exexllllrr.exebthbth.exebhnnbh.exejjjpv.exevjvpp.exedescription pid process target process PID 1580 wrote to memory of 4952 1580 f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe tbbttt.exe PID 1580 wrote to memory of 4952 1580 f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe tbbttt.exe PID 1580 wrote to memory of 4952 1580 f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe tbbttt.exe PID 4952 wrote to memory of 3940 4952 tbbttt.exe pdddv.exe PID 4952 wrote to memory of 3940 4952 tbbttt.exe pdddv.exe PID 4952 wrote to memory of 3940 4952 tbbttt.exe pdddv.exe PID 3940 wrote to memory of 1340 3940 pdddv.exe xrfffxx.exe PID 3940 wrote to memory of 1340 3940 pdddv.exe xrfffxx.exe PID 3940 wrote to memory of 1340 3940 pdddv.exe xrfffxx.exe PID 1340 wrote to memory of 5056 1340 xrfffxx.exe nbbnhh.exe PID 1340 wrote to memory of 5056 1340 xrfffxx.exe nbbnhh.exe PID 1340 wrote to memory of 5056 1340 xrfffxx.exe nbbnhh.exe PID 5056 wrote to memory of 4140 5056 nbbnhh.exe ttbnbh.exe PID 5056 wrote to memory of 4140 5056 nbbnhh.exe ttbnbh.exe PID 5056 wrote to memory of 4140 5056 nbbnhh.exe ttbnbh.exe PID 4140 wrote to memory of 1240 4140 ttbnbh.exe pdvpp.exe PID 4140 wrote to memory of 1240 4140 ttbnbh.exe pdvpp.exe PID 4140 wrote to memory of 1240 4140 ttbnbh.exe pdvpp.exe PID 1240 wrote to memory of 5104 1240 pdvpp.exe vdvdd.exe PID 1240 wrote to memory of 5104 1240 pdvpp.exe vdvdd.exe PID 1240 wrote to memory of 5104 1240 pdvpp.exe vdvdd.exe PID 5104 wrote to memory of 1136 5104 vdvdd.exe lfrlxxx.exe PID 5104 wrote to memory of 1136 5104 vdvdd.exe lfrlxxx.exe PID 5104 wrote to memory of 1136 5104 vdvdd.exe lfrlxxx.exe PID 1136 wrote to memory of 4320 1136 lfrlxxx.exe hhttbh.exe PID 1136 wrote to memory of 4320 1136 lfrlxxx.exe hhttbh.exe PID 1136 wrote to memory of 4320 1136 lfrlxxx.exe hhttbh.exe PID 4320 wrote to memory of 3692 4320 hhttbh.exe jjddv.exe PID 4320 wrote to memory of 3692 4320 hhttbh.exe jjddv.exe PID 4320 wrote to memory of 3692 4320 hhttbh.exe jjddv.exe PID 3692 wrote to memory of 512 3692 jjddv.exe vvpjd.exe PID 3692 wrote to memory of 512 3692 jjddv.exe vvpjd.exe PID 3692 wrote to memory of 512 3692 jjddv.exe vvpjd.exe PID 512 wrote to memory of 2016 512 vvpjd.exe 5ffxlll.exe PID 512 wrote to memory of 2016 512 vvpjd.exe 5ffxlll.exe PID 512 wrote to memory of 2016 512 vvpjd.exe 5ffxlll.exe PID 2016 wrote to memory of 1172 2016 5ffxlll.exe hbtthh.exe PID 2016 wrote to memory of 1172 2016 5ffxlll.exe hbtthh.exe PID 2016 wrote to memory of 1172 2016 5ffxlll.exe hbtthh.exe PID 1172 wrote to memory of 1996 1172 hbtthh.exe 7hhbtb.exe PID 1172 wrote to memory of 1996 1172 hbtthh.exe 7hhbtb.exe PID 1172 wrote to memory of 1996 1172 hbtthh.exe 7hhbtb.exe PID 1996 wrote to memory of 1176 1996 7hhbtb.exe vvdvp.exe PID 1996 wrote to memory of 1176 1996 7hhbtb.exe vvdvp.exe PID 1996 wrote to memory of 1176 1996 7hhbtb.exe vvdvp.exe PID 1176 wrote to memory of 1756 1176 vvdvp.exe pjjvp.exe PID 1176 wrote to memory of 1756 1176 vvdvp.exe pjjvp.exe PID 1176 wrote to memory of 1756 1176 vvdvp.exe pjjvp.exe PID 1756 wrote to memory of 700 1756 pjjvp.exe xllllrr.exe PID 1756 wrote to memory of 700 1756 pjjvp.exe xllllrr.exe PID 1756 wrote to memory of 700 1756 pjjvp.exe xllllrr.exe PID 700 wrote to memory of 3796 700 xllllrr.exe bthbth.exe PID 700 wrote to memory of 3796 700 xllllrr.exe bthbth.exe PID 700 wrote to memory of 3796 700 xllllrr.exe bthbth.exe PID 3796 wrote to memory of 4908 3796 bthbth.exe bhnnbh.exe PID 3796 wrote to memory of 4908 3796 bthbth.exe bhnnbh.exe PID 3796 wrote to memory of 4908 3796 bthbth.exe bhnnbh.exe PID 4908 wrote to memory of 4880 4908 bhnnbh.exe jjjpv.exe PID 4908 wrote to memory of 4880 4908 bhnnbh.exe jjjpv.exe PID 4908 wrote to memory of 4880 4908 bhnnbh.exe jjjpv.exe PID 4880 wrote to memory of 2796 4880 jjjpv.exe vjvpp.exe PID 4880 wrote to memory of 2796 4880 jjjpv.exe vjvpp.exe PID 4880 wrote to memory of 2796 4880 jjjpv.exe vjvpp.exe PID 2796 wrote to memory of 3644 2796 vjvpp.exe 1xxrfff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe"C:\Users\Admin\AppData\Local\Temp\f2dadb0556042dc291f1a7985f630a0f44d1205295bf1c73166127191d0c335f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\tbbttt.exec:\tbbttt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdddv.exec:\pdddv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrfffxx.exec:\xrfffxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbbnhh.exec:\nbbnhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbnbh.exec:\ttbnbh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdvpp.exec:\pdvpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdvdd.exec:\vdvdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrlxxx.exec:\lfrlxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhttbh.exec:\hhttbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjddv.exec:\jjddv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpjd.exec:\vvpjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5ffxlll.exec:\5ffxlll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbtthh.exec:\hbtthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7hhbtb.exec:\7hhbtb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvdvp.exec:\vvdvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjvp.exec:\pjjvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xllllrr.exec:\xllllrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bthbth.exec:\bthbth.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhnnbh.exec:\bhnnbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjjpv.exec:\jjjpv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjvpp.exec:\vjvpp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xxrfff.exec:\1xxrfff.exe23⤵
- Executes dropped EXE
-
\??\c:\7nnnht.exec:\7nnnht.exe24⤵
- Executes dropped EXE
-
\??\c:\tntttt.exec:\tntttt.exe25⤵
- Executes dropped EXE
-
\??\c:\vjdvv.exec:\vjdvv.exe26⤵
- Executes dropped EXE
-
\??\c:\lxfxrlf.exec:\lxfxrlf.exe27⤵
- Executes dropped EXE
-
\??\c:\xlfxffr.exec:\xlfxffr.exe28⤵
- Executes dropped EXE
-
\??\c:\bhbbbn.exec:\bhbbbn.exe29⤵
- Executes dropped EXE
-
\??\c:\5hbhhh.exec:\5hbhhh.exe30⤵
- Executes dropped EXE
-
\??\c:\pjppv.exec:\pjppv.exe31⤵
- Executes dropped EXE
-
\??\c:\jvddd.exec:\jvddd.exe32⤵
- Executes dropped EXE
-
\??\c:\xxxxxll.exec:\xxxxxll.exe33⤵
- Executes dropped EXE
-
\??\c:\flrrxrx.exec:\flrrxrx.exe34⤵
- Executes dropped EXE
-
\??\c:\nthnbn.exec:\nthnbn.exe35⤵
- Executes dropped EXE
-
\??\c:\hhtbtt.exec:\hhtbtt.exe36⤵
- Executes dropped EXE
-
\??\c:\vjvjd.exec:\vjvjd.exe37⤵
- Executes dropped EXE
-
\??\c:\pdjdd.exec:\pdjdd.exe38⤵
- Executes dropped EXE
-
\??\c:\frllrxf.exec:\frllrxf.exe39⤵
- Executes dropped EXE
-
\??\c:\lfllrxf.exec:\lfllrxf.exe40⤵
- Executes dropped EXE
-
\??\c:\hhbhhb.exec:\hhbhhb.exe41⤵
- Executes dropped EXE
-
\??\c:\tbbnhn.exec:\tbbnhn.exe42⤵
- Executes dropped EXE
-
\??\c:\dvpvd.exec:\dvpvd.exe43⤵
- Executes dropped EXE
-
\??\c:\djvdj.exec:\djvdj.exe44⤵
- Executes dropped EXE
-
\??\c:\jjjpp.exec:\jjjpp.exe45⤵
- Executes dropped EXE
-
\??\c:\lrffxrf.exec:\lrffxrf.exe46⤵
- Executes dropped EXE
-
\??\c:\1flrflr.exec:\1flrflr.exe47⤵
- Executes dropped EXE
-
\??\c:\thbbhn.exec:\thbbhn.exe48⤵
- Executes dropped EXE
-
\??\c:\tbttbt.exec:\tbttbt.exe49⤵
- Executes dropped EXE
-
\??\c:\jdjdv.exec:\jdjdv.exe50⤵
- Executes dropped EXE
-
\??\c:\5vjjv.exec:\5vjjv.exe51⤵
- Executes dropped EXE
-
\??\c:\7dppd.exec:\7dppd.exe52⤵
- Executes dropped EXE
-
\??\c:\ffllfll.exec:\ffllfll.exe53⤵
- Executes dropped EXE
-
\??\c:\fxfffll.exec:\fxfffll.exe54⤵
- Executes dropped EXE
-
\??\c:\rrlrxrx.exec:\rrlrxrx.exe55⤵
- Executes dropped EXE
-
\??\c:\3bthhn.exec:\3bthhn.exe56⤵
- Executes dropped EXE
-
\??\c:\hbhhnt.exec:\hbhhnt.exe57⤵
- Executes dropped EXE
-
\??\c:\vpjdj.exec:\vpjdj.exe58⤵
- Executes dropped EXE
-
\??\c:\dvvdj.exec:\dvvdj.exe59⤵
- Executes dropped EXE
-
\??\c:\7lxfflr.exec:\7lxfflr.exe60⤵
- Executes dropped EXE
-
\??\c:\xllrrrr.exec:\xllrrrr.exe61⤵
- Executes dropped EXE
-
\??\c:\lrxfffr.exec:\lrxfffr.exe62⤵
- Executes dropped EXE
-
\??\c:\hthbbt.exec:\hthbbt.exe63⤵
- Executes dropped EXE
-
\??\c:\1nhnbt.exec:\1nhnbt.exe64⤵
- Executes dropped EXE
-
\??\c:\pjvdv.exec:\pjvdv.exe65⤵
- Executes dropped EXE
-
\??\c:\7pvdp.exec:\7pvdp.exe66⤵
-
\??\c:\ffxfxff.exec:\ffxfxff.exe67⤵
-
\??\c:\1llllrr.exec:\1llllrr.exe68⤵
-
\??\c:\xrfxxff.exec:\xrfxxff.exe69⤵
-
\??\c:\ttbttt.exec:\ttbttt.exe70⤵
-
\??\c:\hhnnhn.exec:\hhnnhn.exe71⤵
-
\??\c:\1pppp.exec:\1pppp.exe72⤵
-
\??\c:\djpdd.exec:\djpdd.exe73⤵
-
\??\c:\rxfxrxr.exec:\rxfxrxr.exe74⤵
-
\??\c:\lxffxxr.exec:\lxffxxr.exe75⤵
-
\??\c:\5bnbhn.exec:\5bnbhn.exe76⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe77⤵
-
\??\c:\jvdvd.exec:\jvdvd.exe78⤵
-
\??\c:\xlfxlll.exec:\xlfxlll.exe79⤵
-
\??\c:\lrflfff.exec:\lrflfff.exe80⤵
-
\??\c:\tnnhhh.exec:\tnnhhh.exe81⤵
-
\??\c:\5nntnn.exec:\5nntnn.exe82⤵
-
\??\c:\jppdd.exec:\jppdd.exe83⤵
-
\??\c:\ddddv.exec:\ddddv.exe84⤵
-
\??\c:\xfrlfrr.exec:\xfrlfrr.exe85⤵
-
\??\c:\xrrlffl.exec:\xrrlffl.exe86⤵
-
\??\c:\tnbtnt.exec:\tnbtnt.exe87⤵
-
\??\c:\nttnhh.exec:\nttnhh.exe88⤵
-
\??\c:\jvjvv.exec:\jvjvv.exe89⤵
-
\??\c:\pppjv.exec:\pppjv.exe90⤵
-
\??\c:\5llxrff.exec:\5llxrff.exe91⤵
-
\??\c:\xxfffxf.exec:\xxfffxf.exe92⤵
-
\??\c:\lfxlrfr.exec:\lfxlrfr.exe93⤵
-
\??\c:\tnbbnn.exec:\tnbbnn.exe94⤵
-
\??\c:\dvjpv.exec:\dvjpv.exe95⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe96⤵
-
\??\c:\lxxlfxl.exec:\lxxlfxl.exe97⤵
-
\??\c:\lxffxxf.exec:\lxffxxf.exe98⤵
-
\??\c:\hhtbtn.exec:\hhtbtn.exe99⤵
-
\??\c:\lrxlrxl.exec:\lrxlrxl.exe100⤵
-
\??\c:\nnbbtt.exec:\nnbbtt.exe101⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe102⤵
-
\??\c:\xrxrrrr.exec:\xrxrrrr.exe103⤵
-
\??\c:\hbnbhb.exec:\hbnbhb.exe104⤵
-
\??\c:\pvddp.exec:\pvddp.exe105⤵
-
\??\c:\xrlxxxx.exec:\xrlxxxx.exe106⤵
-
\??\c:\1nhhhn.exec:\1nhhhn.exe107⤵
-
\??\c:\jdddj.exec:\jdddj.exe108⤵
-
\??\c:\flrrxll.exec:\flrrxll.exe109⤵
-
\??\c:\lfxrrrr.exec:\lfxrrrr.exe110⤵
-
\??\c:\jpvvv.exec:\jpvvv.exe111⤵
-
\??\c:\pdvdd.exec:\pdvdd.exe112⤵
-
\??\c:\fflxfrf.exec:\fflxfrf.exe113⤵
-
\??\c:\tbbbhh.exec:\tbbbhh.exe114⤵
-
\??\c:\vjjdj.exec:\vjjdj.exe115⤵
-
\??\c:\fxlrxff.exec:\fxlrxff.exe116⤵
-
\??\c:\vddjp.exec:\vddjp.exe117⤵
-
\??\c:\9btntt.exec:\9btntt.exe118⤵
-
\??\c:\vvvvp.exec:\vvvvp.exe119⤵
-
\??\c:\tntbtn.exec:\tntbtn.exe120⤵
-
\??\c:\3pjdp.exec:\3pjdp.exe121⤵
-
\??\c:\lffxxfx.exec:\lffxxfx.exe122⤵
-
\??\c:\bbbnhh.exec:\bbbnhh.exe123⤵
-
\??\c:\9jjdv.exec:\9jjdv.exe124⤵
-
\??\c:\xlrlxxr.exec:\xlrlxxr.exe125⤵
-
\??\c:\jvjjv.exec:\jvjjv.exe126⤵
-
\??\c:\lfflxlx.exec:\lfflxlx.exe127⤵
-
\??\c:\5ttnnh.exec:\5ttnnh.exe128⤵
-
\??\c:\frxfxxx.exec:\frxfxxx.exe129⤵
-
\??\c:\fflxxxx.exec:\fflxxxx.exe130⤵
-
\??\c:\vjvdd.exec:\vjvdd.exe131⤵
-
\??\c:\9flfxxr.exec:\9flfxxr.exe132⤵
-
\??\c:\nbbhhn.exec:\nbbhhn.exe133⤵
-
\??\c:\vdpjp.exec:\vdpjp.exe134⤵
-
\??\c:\lxxrrrr.exec:\lxxrrrr.exe135⤵
-
\??\c:\xxrxrfl.exec:\xxrxrfl.exe136⤵
-
\??\c:\rrxxxxx.exec:\rrxxxxx.exe137⤵
-
\??\c:\rrxxrxx.exec:\rrxxrxx.exe138⤵
-
\??\c:\vvpvj.exec:\vvpvj.exe139⤵
-
\??\c:\bnhbbb.exec:\bnhbbb.exe140⤵
-
\??\c:\lxlxxxx.exec:\lxlxxxx.exe141⤵
-
\??\c:\5jpvd.exec:\5jpvd.exe142⤵
-
\??\c:\tbbhnt.exec:\tbbhnt.exe143⤵
-
\??\c:\jvjvp.exec:\jvjvp.exe144⤵
-
\??\c:\frlrrrx.exec:\frlrrrx.exe145⤵
-
\??\c:\jvjdv.exec:\jvjdv.exe146⤵
-
\??\c:\djjjj.exec:\djjjj.exe147⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe148⤵
-
\??\c:\rrxxxfl.exec:\rrxxxfl.exe149⤵
-
\??\c:\fxlrlrr.exec:\fxlrlrr.exe150⤵
-
\??\c:\btnttb.exec:\btnttb.exe151⤵
-
\??\c:\djddj.exec:\djddj.exe152⤵
-
\??\c:\rfllrrx.exec:\rfllrrx.exe153⤵
-
\??\c:\xfflxfx.exec:\xfflxfx.exe154⤵
-
\??\c:\nbtbbt.exec:\nbtbbt.exe155⤵
-
\??\c:\nnhnhn.exec:\nnhnhn.exe156⤵
-
\??\c:\ppjjp.exec:\ppjjp.exe157⤵
-
\??\c:\dvddv.exec:\dvddv.exe158⤵
-
\??\c:\3xxfxff.exec:\3xxfxff.exe159⤵
-
\??\c:\hhbbnt.exec:\hhbbnt.exe160⤵
-
\??\c:\nhhtnt.exec:\nhhtnt.exe161⤵
-
\??\c:\3vddj.exec:\3vddj.exe162⤵
-
\??\c:\llllfrr.exec:\llllfrr.exe163⤵
-
\??\c:\7frfllx.exec:\7frfllx.exe164⤵
-
\??\c:\ntnhht.exec:\ntnhht.exe165⤵
-
\??\c:\ttbbbh.exec:\ttbbbh.exe166⤵
-
\??\c:\vpvvv.exec:\vpvvv.exe167⤵
-
\??\c:\ppjjd.exec:\ppjjd.exe168⤵
-
\??\c:\xffrlff.exec:\xffrlff.exe169⤵
-
\??\c:\hhnttt.exec:\hhnttt.exe170⤵
-
\??\c:\vvvvv.exec:\vvvvv.exe171⤵
-
\??\c:\ddddv.exec:\ddddv.exe172⤵
-
\??\c:\3xffxfl.exec:\3xffxfl.exe173⤵
-
\??\c:\nnbhht.exec:\nnbhht.exe174⤵
-
\??\c:\3bbbbh.exec:\3bbbbh.exe175⤵
-
\??\c:\5dvdj.exec:\5dvdj.exe176⤵
-
\??\c:\pvdjj.exec:\pvdjj.exe177⤵
-
\??\c:\7rxxrxx.exec:\7rxxrxx.exe178⤵
-
\??\c:\nbtbhb.exec:\nbtbhb.exe179⤵
-
\??\c:\jvvvv.exec:\jvvvv.exe180⤵
-
\??\c:\3xllrff.exec:\3xllrff.exe181⤵
-
\??\c:\1flrxff.exec:\1flrxff.exe182⤵
-
\??\c:\3bhtnh.exec:\3bhtnh.exe183⤵
-
\??\c:\tthnnn.exec:\tthnnn.exe184⤵
-
\??\c:\ddddj.exec:\ddddj.exe185⤵
-
\??\c:\llfxxxx.exec:\llfxxxx.exe186⤵
-
\??\c:\xrffrxl.exec:\xrffrxl.exe187⤵
-
\??\c:\nttthh.exec:\nttthh.exe188⤵
-
\??\c:\ddppj.exec:\ddppj.exe189⤵
-
\??\c:\jvpdj.exec:\jvpdj.exe190⤵
-
\??\c:\lffffff.exec:\lffffff.exe191⤵
-
\??\c:\tththt.exec:\tththt.exe192⤵
-
\??\c:\nhhbnn.exec:\nhhbnn.exe193⤵
-
\??\c:\jvdvp.exec:\jvdvp.exe194⤵
-
\??\c:\ddjjj.exec:\ddjjj.exe195⤵
-
\??\c:\ffrfxfl.exec:\ffrfxfl.exe196⤵
-
\??\c:\ntnthn.exec:\ntnthn.exe197⤵
-
\??\c:\bbbtnh.exec:\bbbtnh.exe198⤵
-
\??\c:\pdjpj.exec:\pdjpj.exe199⤵
-
\??\c:\xlrllll.exec:\xlrllll.exe200⤵
-
\??\c:\xxllfll.exec:\xxllfll.exe201⤵
-
\??\c:\bhbbhn.exec:\bhbbhn.exe202⤵
-
\??\c:\1djpp.exec:\1djpp.exe203⤵
-
\??\c:\vvvdp.exec:\vvvdp.exe204⤵
-
\??\c:\xfrrlrl.exec:\xfrrlrl.exe205⤵
-
\??\c:\nhhnnn.exec:\nhhnnn.exe206⤵
-
\??\c:\vjpvp.exec:\vjpvp.exe207⤵
-
\??\c:\xrffxfl.exec:\xrffxfl.exe208⤵
-
\??\c:\frlrxrx.exec:\frlrxrx.exe209⤵
-
\??\c:\3ntbbt.exec:\3ntbbt.exe210⤵
-
\??\c:\9hnntt.exec:\9hnntt.exe211⤵
-
\??\c:\vvpjj.exec:\vvpjj.exe212⤵
-
\??\c:\rrxrflr.exec:\rrxrflr.exe213⤵
-
\??\c:\tnhbbh.exec:\tnhbbh.exe214⤵
-
\??\c:\nbhbtt.exec:\nbhbtt.exe215⤵
-
\??\c:\vvvpj.exec:\vvvpj.exe216⤵
-
\??\c:\lflxrrl.exec:\lflxrrl.exe217⤵
-
\??\c:\fxlllll.exec:\fxlllll.exe218⤵
-
\??\c:\bnnhbt.exec:\bnnhbt.exe219⤵
-
\??\c:\vdjvj.exec:\vdjvj.exe220⤵
-
\??\c:\3xxfllx.exec:\3xxfllx.exe221⤵
-
\??\c:\7xlrrxx.exec:\7xlrrxx.exe222⤵
-
\??\c:\nbnttb.exec:\nbnttb.exe223⤵
-
\??\c:\tbtbtb.exec:\tbtbtb.exe224⤵
-
\??\c:\jpjjp.exec:\jpjjp.exe225⤵
-
\??\c:\9xfxrrr.exec:\9xfxrrr.exe226⤵
-
\??\c:\fllfxxr.exec:\fllfxxr.exe227⤵
-
\??\c:\bbtnnb.exec:\bbtnnb.exe228⤵
-
\??\c:\vvvpp.exec:\vvvpp.exe229⤵
-
\??\c:\vdddv.exec:\vdddv.exe230⤵
-
\??\c:\ffflrxx.exec:\ffflrxx.exe231⤵
-
\??\c:\bbbnth.exec:\bbbnth.exe232⤵
-
\??\c:\3dppj.exec:\3dppj.exe233⤵
-
\??\c:\1jjpj.exec:\1jjpj.exe234⤵
-
\??\c:\lrrlffx.exec:\lrrlffx.exe235⤵
-
\??\c:\bhnnnh.exec:\bhnnnh.exe236⤵
-
\??\c:\thnhtn.exec:\thnhtn.exe237⤵
-
\??\c:\pjdvv.exec:\pjdvv.exe238⤵
-
\??\c:\9xxxrrr.exec:\9xxxrrr.exe239⤵
-
\??\c:\lfllflf.exec:\lfllflf.exe240⤵
-
\??\c:\hntnnn.exec:\hntnnn.exe241⤵