Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 03:56
Behavioral task
behavioral1
Sample
e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe
Resource
win7-20240611-en
7 signatures
150 seconds
General
-
Target
e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe
-
Size
489KB
-
MD5
44760b49c001c67749e2ca1eae3fc253
-
SHA1
d55904227bf350a2824db27df52e79c853cd7ac0
-
SHA256
e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643
-
SHA512
8d0560cf61938e8cbb4c4f92b2a008780344ebdcc8650df8611a598bf0df9b5352e894482fb4a50c412c6de4378c23f5894701e7d2f965edace091b0412ff36a
-
SSDEEP
6144:n3C9BRo7tvnJ9oH0IRgZvjkUo7tvnJ9oH0IiVByq9CPobNVj:n3C9ytvngQjgtvngSV3CPobNVj
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/2796-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/920-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4772-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3232-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4544-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2384-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3928-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2944-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3948-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1556-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3780-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4040-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3892-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1312-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/900-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3792-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1212-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2908-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 28 IoCs
Processes:
resource yara_rule behavioral2/memory/2796-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/920-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4772-31-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3232-48-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4544-147-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2384-159-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1284-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3928-206-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4264-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2944-183-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3948-154-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1556-140-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3568-116-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3780-110-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4040-104-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3892-98-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4172-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1312-88-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/900-77-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4752-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3792-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1212-55-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2196-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2196-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2196-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2196-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1816-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2908-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
jdvjd.exerlrlllf.exenhtbbb.exe1pdvv.exevvjvp.exe1rxxxff.exenthhbb.exepdjdv.exejvdvp.exetttnhh.exe7djdd.exelfllrrx.exelrlrrrr.exebbtnhb.exepdjjj.exeffrrxfl.exetbbbbb.exe1xfffff.exe9ttnbb.exepvvjv.exe3xrffxr.exenttbtt.exexrrflrr.exettnnnn.exevppjv.exevdjpd.exexlrlffx.exebtnhbb.exe9djdv.exe5fllfrx.exe9hhtht.exejvjdv.exellfxlll.exexlxlfrl.exejdjjd.exepvpjd.exefxxxrrl.exebntbbt.exedvpdj.exe3xfxlrl.exehbhhhh.exehtbbbb.exe5jvpp.exeffffxxx.exerxxxrrx.exenttnnn.exehnttnt.exe3jvvv.exe5ttnhn.exejdjdv.exe5pvpp.exelffxxxr.exebbbnht.exebbttnn.exedjpjj.exerfrfrfx.exevpdvv.exejvdvp.exe3rlfxxr.exetnnnnt.exepjdvp.exeflrrlll.exe1nnhbh.exevvddd.exepid process 920 jdvjd.exe 2908 rlrlllf.exe 1816 nhtbbb.exe 4772 1pdvv.exe 2196 vvjvp.exe 3232 1rxxxff.exe 1212 nthhbb.exe 3792 pdjdv.exe 4752 jvdvp.exe 900 tttnhh.exe 1312 7djdd.exe 4172 lfllrrx.exe 3892 lrlrrrr.exe 4040 bbtnhb.exe 3780 pdjjj.exe 3568 ffrrxfl.exe 2584 tbbbbb.exe 2320 1xfffff.exe 2756 9ttnbb.exe 1556 pvvjv.exe 4544 3xrffxr.exe 3948 nttbtt.exe 2384 xrrflrr.exe 4660 ttnnnn.exe 1284 vppjv.exe 3036 vdjpd.exe 2944 xlrlffx.exe 5064 btnhbb.exe 1648 9djdv.exe 4264 5fllfrx.exe 3928 9hhtht.exe 4208 jvjdv.exe 1568 llfxlll.exe 2876 xlxlfrl.exe 3456 jdjjd.exe 2556 pvpjd.exe 5116 fxxxrrl.exe 564 bntbbt.exe 2436 dvpdj.exe 2824 3xfxlrl.exe 2864 hbhhhh.exe 4176 htbbbb.exe 2100 5jvpp.exe 4380 ffffxxx.exe 2712 rxxxrrx.exe 2296 nttnnn.exe 2972 hnttnt.exe 2656 3jvvv.exe 380 5ttnhn.exe 3104 jdjdv.exe 952 5pvpp.exe 3040 lffxxxr.exe 1076 bbbnht.exe 4340 bbttnn.exe 3436 djpjj.exe 4560 rfrfrfx.exe 4048 vpdvv.exe 4924 jvdvp.exe 2016 3rlfxxr.exe 4472 tnnnnt.exe 2948 pjdvp.exe 792 flrrlll.exe 3296 1nnhbh.exe 3196 vvddd.exe -
Processes:
resource yara_rule behavioral2/memory/2796-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/920-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4772-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3232-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4544-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2384-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3928-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4264-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3948-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1556-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3780-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4040-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3892-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1312-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/900-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1212-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2908-17-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exejdvjd.exerlrlllf.exenhtbbb.exe1pdvv.exevvjvp.exe1rxxxff.exenthhbb.exepdjdv.exejvdvp.exetttnhh.exe7djdd.exelfllrrx.exelrlrrrr.exebbtnhb.exepdjjj.exeffrrxfl.exetbbbbb.exe1xfffff.exe9ttnbb.exepvvjv.exe3xrffxr.exedescription pid process target process PID 2796 wrote to memory of 920 2796 e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe jdvjd.exe PID 2796 wrote to memory of 920 2796 e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe jdvjd.exe PID 2796 wrote to memory of 920 2796 e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe jdvjd.exe PID 920 wrote to memory of 2908 920 jdvjd.exe rlrlllf.exe PID 920 wrote to memory of 2908 920 jdvjd.exe rlrlllf.exe PID 920 wrote to memory of 2908 920 jdvjd.exe rlrlllf.exe PID 2908 wrote to memory of 1816 2908 rlrlllf.exe nhtbbb.exe PID 2908 wrote to memory of 1816 2908 rlrlllf.exe nhtbbb.exe PID 2908 wrote to memory of 1816 2908 rlrlllf.exe nhtbbb.exe PID 1816 wrote to memory of 4772 1816 nhtbbb.exe 1pdvv.exe PID 1816 wrote to memory of 4772 1816 nhtbbb.exe 1pdvv.exe PID 1816 wrote to memory of 4772 1816 nhtbbb.exe 1pdvv.exe PID 4772 wrote to memory of 2196 4772 1pdvv.exe vvjvp.exe PID 4772 wrote to memory of 2196 4772 1pdvv.exe vvjvp.exe PID 4772 wrote to memory of 2196 4772 1pdvv.exe vvjvp.exe PID 2196 wrote to memory of 3232 2196 vvjvp.exe 1rxxxff.exe PID 2196 wrote to memory of 3232 2196 vvjvp.exe 1rxxxff.exe PID 2196 wrote to memory of 3232 2196 vvjvp.exe 1rxxxff.exe PID 3232 wrote to memory of 1212 3232 1rxxxff.exe nthhbb.exe PID 3232 wrote to memory of 1212 3232 1rxxxff.exe nthhbb.exe PID 3232 wrote to memory of 1212 3232 1rxxxff.exe nthhbb.exe PID 1212 wrote to memory of 3792 1212 nthhbb.exe pdjdv.exe PID 1212 wrote to memory of 3792 1212 nthhbb.exe pdjdv.exe PID 1212 wrote to memory of 3792 1212 nthhbb.exe pdjdv.exe PID 3792 wrote to memory of 4752 3792 pdjdv.exe jvdvp.exe PID 3792 wrote to memory of 4752 3792 pdjdv.exe jvdvp.exe PID 3792 wrote to memory of 4752 3792 pdjdv.exe jvdvp.exe PID 4752 wrote to memory of 900 4752 jvdvp.exe rlrlxxr.exe PID 4752 wrote to memory of 900 4752 jvdvp.exe rlrlxxr.exe PID 4752 wrote to memory of 900 4752 jvdvp.exe rlrlxxr.exe PID 900 wrote to memory of 1312 900 tttnhh.exe 7djdd.exe PID 900 wrote to memory of 1312 900 tttnhh.exe 7djdd.exe PID 900 wrote to memory of 1312 900 tttnhh.exe 7djdd.exe PID 1312 wrote to memory of 4172 1312 7djdd.exe lfllrrx.exe PID 1312 wrote to memory of 4172 1312 7djdd.exe lfllrrx.exe PID 1312 wrote to memory of 4172 1312 7djdd.exe lfllrrx.exe PID 4172 wrote to memory of 3892 4172 lfllrrx.exe lrlrrrr.exe PID 4172 wrote to memory of 3892 4172 lfllrrx.exe lrlrrrr.exe PID 4172 wrote to memory of 3892 4172 lfllrrx.exe lrlrrrr.exe PID 3892 wrote to memory of 4040 3892 lrlrrrr.exe 7tbtnt.exe PID 3892 wrote to memory of 4040 3892 lrlrrrr.exe 7tbtnt.exe PID 3892 wrote to memory of 4040 3892 lrlrrrr.exe 7tbtnt.exe PID 4040 wrote to memory of 3780 4040 bbtnhb.exe pdjjj.exe PID 4040 wrote to memory of 3780 4040 bbtnhb.exe pdjjj.exe PID 4040 wrote to memory of 3780 4040 bbtnhb.exe pdjjj.exe PID 3780 wrote to memory of 3568 3780 pdjjj.exe ffrrxfl.exe PID 3780 wrote to memory of 3568 3780 pdjjj.exe ffrrxfl.exe PID 3780 wrote to memory of 3568 3780 pdjjj.exe ffrrxfl.exe PID 3568 wrote to memory of 2584 3568 ffrrxfl.exe tbbbbb.exe PID 3568 wrote to memory of 2584 3568 ffrrxfl.exe tbbbbb.exe PID 3568 wrote to memory of 2584 3568 ffrrxfl.exe tbbbbb.exe PID 2584 wrote to memory of 2320 2584 tbbbbb.exe rxflffx.exe PID 2584 wrote to memory of 2320 2584 tbbbbb.exe rxflffx.exe PID 2584 wrote to memory of 2320 2584 tbbbbb.exe rxflffx.exe PID 2320 wrote to memory of 2756 2320 1xfffff.exe pppdv.exe PID 2320 wrote to memory of 2756 2320 1xfffff.exe pppdv.exe PID 2320 wrote to memory of 2756 2320 1xfffff.exe pppdv.exe PID 2756 wrote to memory of 1556 2756 9ttnbb.exe pvvjv.exe PID 2756 wrote to memory of 1556 2756 9ttnbb.exe pvvjv.exe PID 2756 wrote to memory of 1556 2756 9ttnbb.exe pvvjv.exe PID 1556 wrote to memory of 4544 1556 pvvjv.exe 3xrffxr.exe PID 1556 wrote to memory of 4544 1556 pvvjv.exe 3xrffxr.exe PID 1556 wrote to memory of 4544 1556 pvvjv.exe 3xrffxr.exe PID 4544 wrote to memory of 3948 4544 3xrffxr.exe nttbtt.exe
Processes
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe"C:\Users\Admin\AppData\Local\Temp\e61eed96def408b119e90903e3eb6744de28ebe8707227c1d11d82d9dd2dc643.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvjd.exec:\jdvjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlrlllf.exec:\rlrlllf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtbbb.exec:\nhtbbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1pdvv.exec:\1pdvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvjvp.exec:\vvjvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1rxxxff.exec:\1rxxxff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nthhbb.exec:\nthhbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjdv.exec:\pdjdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvdvp.exec:\jvdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tttnhh.exec:\tttnhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7djdd.exec:\7djdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfllrrx.exec:\lfllrrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrlrrrr.exec:\lrlrrrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbtnhb.exec:\bbtnhb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjjj.exec:\pdjjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffrrxfl.exec:\ffrrxfl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbbbbb.exec:\tbbbbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xfffff.exec:\1xfffff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9ttnbb.exec:\9ttnbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvvjv.exec:\pvvjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3xrffxr.exec:\3xrffxr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nttbtt.exec:\nttbtt.exe23⤵
- Executes dropped EXE
-
\??\c:\xrrflrr.exec:\xrrflrr.exe24⤵
- Executes dropped EXE
-
\??\c:\ttnnnn.exec:\ttnnnn.exe25⤵
- Executes dropped EXE
-
\??\c:\vppjv.exec:\vppjv.exe26⤵
- Executes dropped EXE
-
\??\c:\vdjpd.exec:\vdjpd.exe27⤵
- Executes dropped EXE
-
\??\c:\xlrlffx.exec:\xlrlffx.exe28⤵
- Executes dropped EXE
-
\??\c:\btnhbb.exec:\btnhbb.exe29⤵
- Executes dropped EXE
-
\??\c:\9djdv.exec:\9djdv.exe30⤵
- Executes dropped EXE
-
\??\c:\5fllfrx.exec:\5fllfrx.exe31⤵
- Executes dropped EXE
-
\??\c:\9hhtht.exec:\9hhtht.exe32⤵
- Executes dropped EXE
-
\??\c:\jvjdv.exec:\jvjdv.exe33⤵
- Executes dropped EXE
-
\??\c:\llfxlll.exec:\llfxlll.exe34⤵
- Executes dropped EXE
-
\??\c:\xlxlfrl.exec:\xlxlfrl.exe35⤵
- Executes dropped EXE
-
\??\c:\jdjjd.exec:\jdjjd.exe36⤵
- Executes dropped EXE
-
\??\c:\pvpjd.exec:\pvpjd.exe37⤵
- Executes dropped EXE
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe38⤵
- Executes dropped EXE
-
\??\c:\bntbbt.exec:\bntbbt.exe39⤵
- Executes dropped EXE
-
\??\c:\dvpdj.exec:\dvpdj.exe40⤵
- Executes dropped EXE
-
\??\c:\3xfxlrl.exec:\3xfxlrl.exe41⤵
- Executes dropped EXE
-
\??\c:\hbhhhh.exec:\hbhhhh.exe42⤵
- Executes dropped EXE
-
\??\c:\htbbbb.exec:\htbbbb.exe43⤵
- Executes dropped EXE
-
\??\c:\5jvpp.exec:\5jvpp.exe44⤵
- Executes dropped EXE
-
\??\c:\ffffxxx.exec:\ffffxxx.exe45⤵
- Executes dropped EXE
-
\??\c:\rxxxrrx.exec:\rxxxrrx.exe46⤵
- Executes dropped EXE
-
\??\c:\nttnnn.exec:\nttnnn.exe47⤵
- Executes dropped EXE
-
\??\c:\hnttnt.exec:\hnttnt.exe48⤵
- Executes dropped EXE
-
\??\c:\3jvvv.exec:\3jvvv.exe49⤵
- Executes dropped EXE
-
\??\c:\frrlffx.exec:\frrlffx.exe50⤵
-
\??\c:\5ttnhn.exec:\5ttnhn.exe51⤵
- Executes dropped EXE
-
\??\c:\jdjdv.exec:\jdjdv.exe52⤵
- Executes dropped EXE
-
\??\c:\5pvpp.exec:\5pvpp.exe53⤵
- Executes dropped EXE
-
\??\c:\lffxxxr.exec:\lffxxxr.exe54⤵
- Executes dropped EXE
-
\??\c:\bbbnht.exec:\bbbnht.exe55⤵
- Executes dropped EXE
-
\??\c:\bbttnn.exec:\bbttnn.exe56⤵
- Executes dropped EXE
-
\??\c:\djpjj.exec:\djpjj.exe57⤵
- Executes dropped EXE
-
\??\c:\rfrfrfx.exec:\rfrfrfx.exe58⤵
- Executes dropped EXE
-
\??\c:\vpdvv.exec:\vpdvv.exe59⤵
- Executes dropped EXE
-
\??\c:\jvdvp.exec:\jvdvp.exe60⤵
- Executes dropped EXE
-
\??\c:\3rlfxxr.exec:\3rlfxxr.exe61⤵
- Executes dropped EXE
-
\??\c:\tnnnnt.exec:\tnnnnt.exe62⤵
- Executes dropped EXE
-
\??\c:\pjdvp.exec:\pjdvp.exe63⤵
- Executes dropped EXE
-
\??\c:\flrrlll.exec:\flrrlll.exe64⤵
- Executes dropped EXE
-
\??\c:\1nnhbh.exec:\1nnhbh.exe65⤵
- Executes dropped EXE
-
\??\c:\vvddd.exec:\vvddd.exe66⤵
- Executes dropped EXE
-
\??\c:\jddvj.exec:\jddvj.exe67⤵
-
\??\c:\frxrrrf.exec:\frxrrrf.exe68⤵
-
\??\c:\bnhbbh.exec:\bnhbbh.exe69⤵
-
\??\c:\1hbtnt.exec:\1hbtnt.exe70⤵
-
\??\c:\9dpjj.exec:\9dpjj.exe71⤵
-
\??\c:\pppdv.exec:\pppdv.exe72⤵
-
\??\c:\rflfxrl.exec:\rflfxrl.exe73⤵
-
\??\c:\ttthbb.exec:\ttthbb.exe74⤵
-
\??\c:\jpjpd.exec:\jpjpd.exe75⤵
-
\??\c:\rrlllrx.exec:\rrlllrx.exe76⤵
-
\??\c:\hhnnbb.exec:\hhnnbb.exe77⤵
-
\??\c:\bnhnth.exec:\bnhnth.exe78⤵
-
\??\c:\jdpjd.exec:\jdpjd.exe79⤵
-
\??\c:\xrffllr.exec:\xrffllr.exe80⤵
-
\??\c:\bbtnth.exec:\bbtnth.exe81⤵
-
\??\c:\pjppp.exec:\pjppp.exe82⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe83⤵
-
\??\c:\frfxrrl.exec:\frfxrrl.exe84⤵
-
\??\c:\btbbbb.exec:\btbbbb.exe85⤵
-
\??\c:\nnnhbb.exec:\nnnhbb.exe86⤵
-
\??\c:\jvddp.exec:\jvddp.exe87⤵
-
\??\c:\ffrlrfl.exec:\ffrlrfl.exe88⤵
-
\??\c:\9xfffff.exec:\9xfffff.exe89⤵
-
\??\c:\bhhbnh.exec:\bhhbnh.exe90⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe91⤵
-
\??\c:\5dpjd.exec:\5dpjd.exe92⤵
-
\??\c:\7rlxrrl.exec:\7rlxrrl.exe93⤵
-
\??\c:\tbhnhh.exec:\tbhnhh.exe94⤵
-
\??\c:\nntttb.exec:\nntttb.exe95⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe96⤵
-
\??\c:\jppvd.exec:\jppvd.exe97⤵
-
\??\c:\rxffflf.exec:\rxffflf.exe98⤵
-
\??\c:\nnnnhh.exec:\nnnnhh.exe99⤵
-
\??\c:\hnbnbb.exec:\hnbnbb.exe100⤵
-
\??\c:\dvjdd.exec:\dvjdd.exe101⤵
-
\??\c:\xlrlfff.exec:\xlrlfff.exe102⤵
-
\??\c:\lfllffx.exec:\lfllffx.exe103⤵
-
\??\c:\bbhbbt.exec:\bbhbbt.exe104⤵
-
\??\c:\jdppp.exec:\jdppp.exe105⤵
-
\??\c:\1dpjj.exec:\1dpjj.exe106⤵
-
\??\c:\xrrllll.exec:\xrrllll.exe107⤵
-
\??\c:\rfxxrlf.exec:\rfxxrlf.exe108⤵
-
\??\c:\5bhbbb.exec:\5bhbbb.exe109⤵
-
\??\c:\1vjjp.exec:\1vjjp.exe110⤵
-
\??\c:\pvdvv.exec:\pvdvv.exe111⤵
-
\??\c:\lfrlfxx.exec:\lfrlfxx.exe112⤵
-
\??\c:\tnbttt.exec:\tnbttt.exe113⤵
-
\??\c:\ttnhbb.exec:\ttnhbb.exe114⤵
-
\??\c:\ddvvj.exec:\ddvvj.exe115⤵
-
\??\c:\9ffrlxr.exec:\9ffrlxr.exe116⤵
-
\??\c:\lffxxxr.exec:\lffxxxr.exe117⤵
-
\??\c:\tnbbtb.exec:\tnbbtb.exe118⤵
-
\??\c:\ppjpj.exec:\ppjpj.exe119⤵
-
\??\c:\5jdpp.exec:\5jdpp.exe120⤵
-
\??\c:\xrrlxxr.exec:\xrrlxxr.exe121⤵
-
\??\c:\nnnnnn.exec:\nnnnnn.exe122⤵
-
\??\c:\thnbtt.exec:\thnbtt.exe123⤵
-
\??\c:\dvpjj.exec:\dvpjj.exe124⤵
-
\??\c:\xlfxfrl.exec:\xlfxfrl.exe125⤵
-
\??\c:\rxflffx.exec:\rxflffx.exe126⤵
-
\??\c:\btnnbt.exec:\btnnbt.exe127⤵
-
\??\c:\vvdpd.exec:\vvdpd.exe128⤵
-
\??\c:\jddvj.exec:\jddvj.exe129⤵
-
\??\c:\7xxxrxl.exec:\7xxxrxl.exe130⤵
-
\??\c:\nntnht.exec:\nntnht.exe131⤵
-
\??\c:\btnhbt.exec:\btnhbt.exe132⤵
-
\??\c:\vvdjd.exec:\vvdjd.exe133⤵
-
\??\c:\xlrlffx.exec:\xlrlffx.exe134⤵
-
\??\c:\rxfrlrx.exec:\rxfrlrx.exe135⤵
-
\??\c:\bbhhnn.exec:\bbhhnn.exe136⤵
-
\??\c:\ppvpj.exec:\ppvpj.exe137⤵
-
\??\c:\pjdvv.exec:\pjdvv.exe138⤵
-
\??\c:\lllllrr.exec:\lllllrr.exe139⤵
-
\??\c:\5btnnn.exec:\5btnnn.exe140⤵
-
\??\c:\jdpjj.exec:\jdpjj.exe141⤵
-
\??\c:\5rlxrxl.exec:\5rlxrxl.exe142⤵
-
\??\c:\xrfrxff.exec:\xrfrxff.exe143⤵
-
\??\c:\nntnbb.exec:\nntnbb.exe144⤵
-
\??\c:\jvvpv.exec:\jvvpv.exe145⤵
-
\??\c:\pjdvd.exec:\pjdvd.exe146⤵
-
\??\c:\xlxrllf.exec:\xlxrllf.exe147⤵
-
\??\c:\bbnnbb.exec:\bbnnbb.exe148⤵
-
\??\c:\thhbtt.exec:\thhbtt.exe149⤵
-
\??\c:\jjvvj.exec:\jjvvj.exe150⤵
-
\??\c:\djjdd.exec:\djjdd.exe151⤵
-
\??\c:\5xrfffx.exec:\5xrfffx.exe152⤵
-
\??\c:\bntnnt.exec:\bntnnt.exe153⤵
-
\??\c:\btbbtb.exec:\btbbtb.exe154⤵
-
\??\c:\ppjjj.exec:\ppjjj.exe155⤵
-
\??\c:\3vvpp.exec:\3vvpp.exe156⤵
-
\??\c:\rfflxxx.exec:\rfflxxx.exe157⤵
-
\??\c:\btttnt.exec:\btttnt.exe158⤵
-
\??\c:\5nnnnn.exec:\5nnnnn.exe159⤵
-
\??\c:\djjpp.exec:\djjpp.exe160⤵
-
\??\c:\pddvv.exec:\pddvv.exe161⤵
-
\??\c:\flxrrrl.exec:\flxrrrl.exe162⤵
-
\??\c:\tbhttn.exec:\tbhttn.exe163⤵
-
\??\c:\nhbtnn.exec:\nhbtnn.exe164⤵
-
\??\c:\pppjd.exec:\pppjd.exe165⤵
-
\??\c:\vvjdj.exec:\vvjdj.exe166⤵
-
\??\c:\rrlflxl.exec:\rrlflxl.exe167⤵
-
\??\c:\hhhbbb.exec:\hhhbbb.exe168⤵
-
\??\c:\btbbtt.exec:\btbbtt.exe169⤵
-
\??\c:\ppvpd.exec:\ppvpd.exe170⤵
-
\??\c:\lrrlxfx.exec:\lrrlxfx.exe171⤵
-
\??\c:\xllfxfx.exec:\xllfxfx.exe172⤵
-
\??\c:\5hhbtb.exec:\5hhbtb.exe173⤵
-
\??\c:\hnbthh.exec:\hnbthh.exe174⤵
-
\??\c:\vdjjd.exec:\vdjjd.exe175⤵
-
\??\c:\rxxfrxf.exec:\rxxfrxf.exe176⤵
-
\??\c:\rxffxxr.exec:\rxffxxr.exe177⤵
-
\??\c:\hhhhht.exec:\hhhhht.exe178⤵
-
\??\c:\pjvpj.exec:\pjvpj.exe179⤵
-
\??\c:\3jjpj.exec:\3jjpj.exe180⤵
-
\??\c:\rrxxrxx.exec:\rrxxrxx.exe181⤵
-
\??\c:\frfxxxr.exec:\frfxxxr.exe182⤵
-
\??\c:\hhtnbb.exec:\hhtnbb.exe183⤵
-
\??\c:\vdjpd.exec:\vdjpd.exe184⤵
-
\??\c:\7djdd.exec:\7djdd.exe185⤵
-
\??\c:\rxfxxff.exec:\rxfxxff.exe186⤵
-
\??\c:\rlxxffl.exec:\rlxxffl.exe187⤵
-
\??\c:\tnttnn.exec:\tnttnn.exe188⤵
-
\??\c:\djvpd.exec:\djvpd.exe189⤵
-
\??\c:\pvdvp.exec:\pvdvp.exe190⤵
-
\??\c:\7lrlffx.exec:\7lrlffx.exe191⤵
-
\??\c:\1xxrffx.exec:\1xxrffx.exe192⤵
-
\??\c:\hthbtn.exec:\hthbtn.exe193⤵
-
\??\c:\3hbttt.exec:\3hbttt.exe194⤵
-
\??\c:\jppvp.exec:\jppvp.exe195⤵
-
\??\c:\xllfxrl.exec:\xllfxrl.exe196⤵
-
\??\c:\rrxrlff.exec:\rrxrlff.exe197⤵
-
\??\c:\bttnbb.exec:\bttnbb.exe198⤵
-
\??\c:\5djdv.exec:\5djdv.exe199⤵
-
\??\c:\dpdvv.exec:\dpdvv.exe200⤵
-
\??\c:\rffxxxx.exec:\rffxxxx.exe201⤵
-
\??\c:\hbhttn.exec:\hbhttn.exe202⤵
-
\??\c:\thnhbb.exec:\thnhbb.exe203⤵
-
\??\c:\jvdvp.exec:\jvdvp.exe204⤵
-
\??\c:\flrrrrr.exec:\flrrrrr.exe205⤵
-
\??\c:\xxxrllf.exec:\xxxrllf.exe206⤵
-
\??\c:\nhnhhb.exec:\nhnhhb.exe207⤵
-
\??\c:\dppjv.exec:\dppjv.exe208⤵
-
\??\c:\pvdpp.exec:\pvdpp.exe209⤵
-
\??\c:\fxlfxfx.exec:\fxlfxfx.exe210⤵
-
\??\c:\5ntnhh.exec:\5ntnhh.exe211⤵
-
\??\c:\bthbbb.exec:\bthbbb.exe212⤵
-
\??\c:\jddvv.exec:\jddvv.exe213⤵
-
\??\c:\5xlfxrr.exec:\5xlfxrr.exe214⤵
-
\??\c:\rflxxlx.exec:\rflxxlx.exe215⤵
-
\??\c:\hntnnn.exec:\hntnnn.exe216⤵
-
\??\c:\bbbttt.exec:\bbbttt.exe217⤵
-
\??\c:\dvpvp.exec:\dvpvp.exe218⤵
-
\??\c:\rrlxrrf.exec:\rrlxrrf.exe219⤵
-
\??\c:\llffxxr.exec:\llffxxr.exe220⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe221⤵
-
\??\c:\bbhhbb.exec:\bbhhbb.exe222⤵
-
\??\c:\jdppp.exec:\jdppp.exe223⤵
-
\??\c:\vpvvp.exec:\vpvvp.exe224⤵
-
\??\c:\rlrlfff.exec:\rlrlfff.exe225⤵
-
\??\c:\bbnnhh.exec:\bbnnhh.exe226⤵
-
\??\c:\hhhtht.exec:\hhhtht.exe227⤵
-
\??\c:\frxxrrl.exec:\frxxrrl.exe228⤵
-
\??\c:\rffxrrl.exec:\rffxrrl.exe229⤵
-
\??\c:\bnbbnh.exec:\bnbbnh.exe230⤵
-
\??\c:\7bbbbb.exec:\7bbbbb.exe231⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe232⤵
-
\??\c:\djpjj.exec:\djpjj.exe233⤵
-
\??\c:\rlrlxxr.exec:\rlrlxxr.exe234⤵
-
\??\c:\bttnhb.exec:\bttnhb.exe235⤵
-
\??\c:\nhnnhh.exec:\nhnnhh.exe236⤵
-
\??\c:\jjjjj.exec:\jjjjj.exe237⤵
-
\??\c:\5jppj.exec:\5jppj.exe238⤵
-
\??\c:\rrffflf.exec:\rrffflf.exe239⤵
-
\??\c:\bbhbtt.exec:\bbhbtt.exe240⤵
-
\??\c:\nthhhh.exec:\nthhhh.exe241⤵