Analysis
-
max time kernel
152s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 03:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe
Resource
win7-20240611-en
6 signatures
150 seconds
General
-
Target
f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe
-
Size
341KB
-
MD5
1f6a71638bc1e8632b85383b0efd7717
-
SHA1
c228ce7c5b253ea7eacca5c82bc73ab096fc755e
-
SHA256
f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f
-
SHA512
082fb58b5b4c1ca076bb2abc0bb6fb065284e64d07de4cb8c11799a0b11f7cec0f107ea6b2f1d7eaca6d49d3ae96c595fae2d012288977803e8b20afc7a232e6
-
SSDEEP
6144:n3C9BRo/AIX2MUXownfWQkyCpxwJz9e0pQowLh3EhToK9cT085mnFhXjmnwJQyaK:n3C9uDnUXoSWlnwJv90aKToFqwfaK
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1916-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2156-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1304-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1304-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2248-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/948-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/748-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1308-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1564-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1292-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/760-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/824-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral1/memory/1916-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2156-13-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1304-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1304-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1304-22-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2248-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2760-47-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2608-56-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2508-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2664-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2888-86-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/948-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/748-109-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1308-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1644-145-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1564-172-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1292-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2300-199-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/760-208-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/824-253-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1680-262-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
ntdhd.exebpvbhth.exehjvxb.exehftdnrt.exevjbhb.exebfrrj.exehjddnnf.exebrbxrv.exexxbrflb.exehvfnlnp.exevbntv.exetvddhxd.exejndpxxx.exenlhxbh.exeljhnr.exexxlndh.exebptft.exebjhth.exetvfnvd.exehdnxdt.exexjpbfvt.exebnlht.exejttftt.exelhvbbh.exevhrlnrr.exertvtb.exejbjtpvd.exeltbdr.exebphhrt.exelvvrfnb.exehfddb.exepjdbd.exebrxvtvn.exerrrdjfd.exevdnpldj.exebdfdxv.exefppnr.exejtxbtl.exejhnph.exeddfhtj.exexjbnvh.exedrvnvv.exenhhtxd.exehxtlrh.exetvxxlv.exepjrjrv.exelblvpp.exebxxlhl.exenljlpht.exetlttnbv.exefhvbddx.exejdlpvpx.exehfbhn.exedljxfdl.exepthdjj.exetxfhd.exenppdvd.exepjrtxx.exevbvttp.exejfltnfn.exedvrrp.exehjtxjv.exerfxpxlh.exefplpxp.exepid process 2156 ntdhd.exe 1304 bpvbhth.exe 2248 hjvxb.exe 2760 hftdnrt.exe 2608 vjbhb.exe 2508 bfrrj.exe 2664 hjddnnf.exe 2888 brbxrv.exe 948 xxbrflb.exe 748 hvfnlnp.exe 1308 vbntv.exe 2764 tvddhxd.exe 784 jndpxxx.exe 1644 nlhxbh.exe 796 ljhnr.exe 1660 xxlndh.exe 1564 bptft.exe 368 bjhth.exe 1292 tvfnvd.exe 2300 hdnxdt.exe 760 xjpbfvt.exe 2832 bnlht.exe 1324 jttftt.exe 1284 lhvbbh.exe 1336 vhrlnrr.exe 824 rtvtb.exe 1680 jbjtpvd.exe 1608 ltbdr.exe 2360 bphhrt.exe 1212 lvvrfnb.exe 2040 hfddb.exe 1488 pjdbd.exe 2948 brxvtvn.exe 2096 rrrdjfd.exe 1592 vdnpldj.exe 2668 bdfdxv.exe 3012 fppnr.exe 2708 jtxbtl.exe 2248 jhnph.exe 2684 ddfhtj.exe 2972 xjbnvh.exe 2780 drvnvv.exe 1152 nhhtxd.exe 2528 hxtlrh.exe 2664 tvxxlv.exe 740 pjrjrv.exe 2452 lblvpp.exe 748 bxxlhl.exe 2460 nljlpht.exe 2784 tlttnbv.exe 2188 fhvbddx.exe 1820 jdlpvpx.exe 1668 hfbhn.exe 2148 dljxfdl.exe 2384 pthdjj.exe 1684 txfhd.exe 1564 nppdvd.exe 368 pjrtxx.exe 2024 vbvttp.exe 860 jfltnfn.exe 2376 dvrrp.exe 2880 hjtxjv.exe 760 rfxpxlh.exe 1984 fplpxp.exe -
Processes:
resource yara_rule behavioral1/memory/1916-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1304-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1304-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1304-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2248-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/948-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/748-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1308-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1564-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/824-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-262-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exentdhd.exebpvbhth.exehjvxb.exehftdnrt.exevjbhb.exebfrrj.exehjddnnf.exebrbxrv.exexxbrflb.exehvfnlnp.exevbntv.exetvddhxd.exejndpxxx.exenlhxbh.exeljhnr.exedescription pid process target process PID 1916 wrote to memory of 2156 1916 f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe ntdhd.exe PID 1916 wrote to memory of 2156 1916 f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe ntdhd.exe PID 1916 wrote to memory of 2156 1916 f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe ntdhd.exe PID 1916 wrote to memory of 2156 1916 f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe ntdhd.exe PID 2156 wrote to memory of 1304 2156 ntdhd.exe bpvbhth.exe PID 2156 wrote to memory of 1304 2156 ntdhd.exe bpvbhth.exe PID 2156 wrote to memory of 1304 2156 ntdhd.exe bpvbhth.exe PID 2156 wrote to memory of 1304 2156 ntdhd.exe bpvbhth.exe PID 1304 wrote to memory of 2248 1304 bpvbhth.exe hjvxb.exe PID 1304 wrote to memory of 2248 1304 bpvbhth.exe hjvxb.exe PID 1304 wrote to memory of 2248 1304 bpvbhth.exe hjvxb.exe PID 1304 wrote to memory of 2248 1304 bpvbhth.exe hjvxb.exe PID 2248 wrote to memory of 2760 2248 hjvxb.exe hftdnrt.exe PID 2248 wrote to memory of 2760 2248 hjvxb.exe hftdnrt.exe PID 2248 wrote to memory of 2760 2248 hjvxb.exe hftdnrt.exe PID 2248 wrote to memory of 2760 2248 hjvxb.exe hftdnrt.exe PID 2760 wrote to memory of 2608 2760 hftdnrt.exe vjbhb.exe PID 2760 wrote to memory of 2608 2760 hftdnrt.exe vjbhb.exe PID 2760 wrote to memory of 2608 2760 hftdnrt.exe vjbhb.exe PID 2760 wrote to memory of 2608 2760 hftdnrt.exe vjbhb.exe PID 2608 wrote to memory of 2508 2608 vjbhb.exe bfrrj.exe PID 2608 wrote to memory of 2508 2608 vjbhb.exe bfrrj.exe PID 2608 wrote to memory of 2508 2608 vjbhb.exe bfrrj.exe PID 2608 wrote to memory of 2508 2608 vjbhb.exe bfrrj.exe PID 2508 wrote to memory of 2664 2508 bfrrj.exe hjddnnf.exe PID 2508 wrote to memory of 2664 2508 bfrrj.exe hjddnnf.exe PID 2508 wrote to memory of 2664 2508 bfrrj.exe hjddnnf.exe PID 2508 wrote to memory of 2664 2508 bfrrj.exe hjddnnf.exe PID 2664 wrote to memory of 2888 2664 hjddnnf.exe brbxrv.exe PID 2664 wrote to memory of 2888 2664 hjddnnf.exe brbxrv.exe PID 2664 wrote to memory of 2888 2664 hjddnnf.exe brbxrv.exe PID 2664 wrote to memory of 2888 2664 hjddnnf.exe brbxrv.exe PID 2888 wrote to memory of 948 2888 brbxrv.exe xxbrflb.exe PID 2888 wrote to memory of 948 2888 brbxrv.exe xxbrflb.exe PID 2888 wrote to memory of 948 2888 brbxrv.exe xxbrflb.exe PID 2888 wrote to memory of 948 2888 brbxrv.exe xxbrflb.exe PID 948 wrote to memory of 748 948 xxbrflb.exe hvfnlnp.exe PID 948 wrote to memory of 748 948 xxbrflb.exe hvfnlnp.exe PID 948 wrote to memory of 748 948 xxbrflb.exe hvfnlnp.exe PID 948 wrote to memory of 748 948 xxbrflb.exe hvfnlnp.exe PID 748 wrote to memory of 1308 748 hvfnlnp.exe vbntv.exe PID 748 wrote to memory of 1308 748 hvfnlnp.exe vbntv.exe PID 748 wrote to memory of 1308 748 hvfnlnp.exe vbntv.exe PID 748 wrote to memory of 1308 748 hvfnlnp.exe vbntv.exe PID 1308 wrote to memory of 2764 1308 vbntv.exe tvddhxd.exe PID 1308 wrote to memory of 2764 1308 vbntv.exe tvddhxd.exe PID 1308 wrote to memory of 2764 1308 vbntv.exe tvddhxd.exe PID 1308 wrote to memory of 2764 1308 vbntv.exe tvddhxd.exe PID 2764 wrote to memory of 784 2764 tvddhxd.exe jndpxxx.exe PID 2764 wrote to memory of 784 2764 tvddhxd.exe jndpxxx.exe PID 2764 wrote to memory of 784 2764 tvddhxd.exe jndpxxx.exe PID 2764 wrote to memory of 784 2764 tvddhxd.exe jndpxxx.exe PID 784 wrote to memory of 1644 784 jndpxxx.exe nlhxbh.exe PID 784 wrote to memory of 1644 784 jndpxxx.exe nlhxbh.exe PID 784 wrote to memory of 1644 784 jndpxxx.exe nlhxbh.exe PID 784 wrote to memory of 1644 784 jndpxxx.exe nlhxbh.exe PID 1644 wrote to memory of 796 1644 nlhxbh.exe ljhnr.exe PID 1644 wrote to memory of 796 1644 nlhxbh.exe ljhnr.exe PID 1644 wrote to memory of 796 1644 nlhxbh.exe ljhnr.exe PID 1644 wrote to memory of 796 1644 nlhxbh.exe ljhnr.exe PID 796 wrote to memory of 1660 796 ljhnr.exe xxlndh.exe PID 796 wrote to memory of 1660 796 ljhnr.exe xxlndh.exe PID 796 wrote to memory of 1660 796 ljhnr.exe xxlndh.exe PID 796 wrote to memory of 1660 796 ljhnr.exe xxlndh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe"C:\Users\Admin\AppData\Local\Temp\f52d55a3eee65a2c15ee62bdaad683995dab683c2b6dd15d41bbdd5ee4bc550f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\ntdhd.exec:\ntdhd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bpvbhth.exec:\bpvbhth.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hjvxb.exec:\hjvxb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hftdnrt.exec:\hftdnrt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjbhb.exec:\vjbhb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bfrrj.exec:\bfrrj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hjddnnf.exec:\hjddnnf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\brbxrv.exec:\brbxrv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxbrflb.exec:\xxbrflb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hvfnlnp.exec:\hvfnlnp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vbntv.exec:\vbntv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tvddhxd.exec:\tvddhxd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jndpxxx.exec:\jndpxxx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nlhxbh.exec:\nlhxbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ljhnr.exec:\ljhnr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxlndh.exec:\xxlndh.exe17⤵
- Executes dropped EXE
-
\??\c:\bptft.exec:\bptft.exe18⤵
- Executes dropped EXE
-
\??\c:\bjhth.exec:\bjhth.exe19⤵
- Executes dropped EXE
-
\??\c:\tvfnvd.exec:\tvfnvd.exe20⤵
- Executes dropped EXE
-
\??\c:\hdnxdt.exec:\hdnxdt.exe21⤵
- Executes dropped EXE
-
\??\c:\xjpbfvt.exec:\xjpbfvt.exe22⤵
- Executes dropped EXE
-
\??\c:\bnlht.exec:\bnlht.exe23⤵
- Executes dropped EXE
-
\??\c:\jttftt.exec:\jttftt.exe24⤵
- Executes dropped EXE
-
\??\c:\lhvbbh.exec:\lhvbbh.exe25⤵
- Executes dropped EXE
-
\??\c:\vhrlnrr.exec:\vhrlnrr.exe26⤵
- Executes dropped EXE
-
\??\c:\rtvtb.exec:\rtvtb.exe27⤵
- Executes dropped EXE
-
\??\c:\jbjtpvd.exec:\jbjtpvd.exe28⤵
- Executes dropped EXE
-
\??\c:\ltbdr.exec:\ltbdr.exe29⤵
- Executes dropped EXE
-
\??\c:\bphhrt.exec:\bphhrt.exe30⤵
- Executes dropped EXE
-
\??\c:\lvvrfnb.exec:\lvvrfnb.exe31⤵
- Executes dropped EXE
-
\??\c:\hfddb.exec:\hfddb.exe32⤵
- Executes dropped EXE
-
\??\c:\pjdbd.exec:\pjdbd.exe33⤵
- Executes dropped EXE
-
\??\c:\brxvtvn.exec:\brxvtvn.exe34⤵
- Executes dropped EXE
-
\??\c:\rrrdjfd.exec:\rrrdjfd.exe35⤵
- Executes dropped EXE
-
\??\c:\vfvldl.exec:\vfvldl.exe36⤵
-
\??\c:\vdnpldj.exec:\vdnpldj.exe37⤵
- Executes dropped EXE
-
\??\c:\bdfdxv.exec:\bdfdxv.exe38⤵
- Executes dropped EXE
-
\??\c:\fppnr.exec:\fppnr.exe39⤵
- Executes dropped EXE
-
\??\c:\jtxbtl.exec:\jtxbtl.exe40⤵
- Executes dropped EXE
-
\??\c:\jhnph.exec:\jhnph.exe41⤵
- Executes dropped EXE
-
\??\c:\ddfhtj.exec:\ddfhtj.exe42⤵
- Executes dropped EXE
-
\??\c:\xjbnvh.exec:\xjbnvh.exe43⤵
- Executes dropped EXE
-
\??\c:\drvnvv.exec:\drvnvv.exe44⤵
- Executes dropped EXE
-
\??\c:\nhhtxd.exec:\nhhtxd.exe45⤵
- Executes dropped EXE
-
\??\c:\hxtlrh.exec:\hxtlrh.exe46⤵
- Executes dropped EXE
-
\??\c:\tvxxlv.exec:\tvxxlv.exe47⤵
- Executes dropped EXE
-
\??\c:\pjrjrv.exec:\pjrjrv.exe48⤵
- Executes dropped EXE
-
\??\c:\lblvpp.exec:\lblvpp.exe49⤵
- Executes dropped EXE
-
\??\c:\bxxlhl.exec:\bxxlhl.exe50⤵
- Executes dropped EXE
-
\??\c:\nljlpht.exec:\nljlpht.exe51⤵
- Executes dropped EXE
-
\??\c:\tlttnbv.exec:\tlttnbv.exe52⤵
- Executes dropped EXE
-
\??\c:\fhvbddx.exec:\fhvbddx.exe53⤵
- Executes dropped EXE
-
\??\c:\jdlpvpx.exec:\jdlpvpx.exe54⤵
- Executes dropped EXE
-
\??\c:\hfbhn.exec:\hfbhn.exe55⤵
- Executes dropped EXE
-
\??\c:\dljxfdl.exec:\dljxfdl.exe56⤵
- Executes dropped EXE
-
\??\c:\pthdjj.exec:\pthdjj.exe57⤵
- Executes dropped EXE
-
\??\c:\txfhd.exec:\txfhd.exe58⤵
- Executes dropped EXE
-
\??\c:\nppdvd.exec:\nppdvd.exe59⤵
- Executes dropped EXE
-
\??\c:\pjrtxx.exec:\pjrtxx.exe60⤵
- Executes dropped EXE
-
\??\c:\vbvttp.exec:\vbvttp.exe61⤵
- Executes dropped EXE
-
\??\c:\jfltnfn.exec:\jfltnfn.exe62⤵
- Executes dropped EXE
-
\??\c:\dvrrp.exec:\dvrrp.exe63⤵
- Executes dropped EXE
-
\??\c:\hjtxjv.exec:\hjtxjv.exe64⤵
- Executes dropped EXE
-
\??\c:\rfxpxlh.exec:\rfxpxlh.exe65⤵
- Executes dropped EXE
-
\??\c:\fplpxp.exec:\fplpxp.exe66⤵
- Executes dropped EXE
-
\??\c:\jvbnjjr.exec:\jvbnjjr.exe67⤵
-
\??\c:\lpjlvjt.exec:\lpjlvjt.exe68⤵
-
\??\c:\nhnjn.exec:\nhnjn.exe69⤵
-
\??\c:\tnnhp.exec:\tnnhp.exe70⤵
-
\??\c:\rpbvrnr.exec:\rpbvrnr.exe71⤵
-
\??\c:\lxjjx.exec:\lxjjx.exe72⤵
-
\??\c:\lhvff.exec:\lhvff.exe73⤵
-
\??\c:\vbptnhn.exec:\vbptnhn.exe74⤵
-
\??\c:\rtbhj.exec:\rtbhj.exe75⤵
-
\??\c:\hnvjhp.exec:\hnvjhp.exe76⤵
-
\??\c:\pbtpjpn.exec:\pbtpjpn.exe77⤵
-
\??\c:\hdptfjb.exec:\hdptfjb.exe78⤵
-
\??\c:\fxnrfbl.exec:\fxnrfbl.exe79⤵
-
\??\c:\hvjfflf.exec:\hvjfflf.exe80⤵
-
\??\c:\fhllrh.exec:\fhllrh.exe81⤵
-
\??\c:\vntdf.exec:\vntdf.exe82⤵
-
\??\c:\dtjlb.exec:\dtjlb.exe83⤵
-
\??\c:\hbrpflh.exec:\hbrpflh.exe84⤵
-
\??\c:\vfvpn.exec:\vfvpn.exe85⤵
-
\??\c:\jtjrfdh.exec:\jtjrfdh.exe86⤵
-
\??\c:\xbbxf.exec:\xbbxf.exe87⤵
-
\??\c:\jxjdtd.exec:\jxjdtd.exe88⤵
-
\??\c:\xtnhrdv.exec:\xtnhrdv.exe89⤵
-
\??\c:\fxvvnv.exec:\fxvvnv.exe90⤵
-
\??\c:\rdtfvjf.exec:\rdtfvjf.exe91⤵
-
\??\c:\xvhjx.exec:\xvhjx.exe92⤵
-
\??\c:\jlbtrtj.exec:\jlbtrtj.exe93⤵
-
\??\c:\xvrvd.exec:\xvrvd.exe94⤵
-
\??\c:\nbdtbhd.exec:\nbdtbhd.exe95⤵
-
\??\c:\pxnhpv.exec:\pxnhpv.exe96⤵
-
\??\c:\bpjvxfl.exec:\bpjvxfl.exe97⤵
-
\??\c:\vvnbrrx.exec:\vvnbrrx.exe98⤵
-
\??\c:\xxljj.exec:\xxljj.exe99⤵
-
\??\c:\fjhtlvr.exec:\fjhtlvr.exe100⤵
-
\??\c:\fxvhjhj.exec:\fxvhjhj.exe101⤵
-
\??\c:\bnnprft.exec:\bnnprft.exe102⤵
-
\??\c:\ptbtr.exec:\ptbtr.exe103⤵
-
\??\c:\fvblnb.exec:\fvblnb.exe104⤵
-
\??\c:\hvrfxp.exec:\hvrfxp.exe105⤵
-
\??\c:\brjjlt.exec:\brjjlt.exe106⤵
-
\??\c:\pnljjf.exec:\pnljjf.exe107⤵
-
\??\c:\plxddl.exec:\plxddl.exe108⤵
-
\??\c:\rldbt.exec:\rldbt.exe109⤵
-
\??\c:\rphjhft.exec:\rphjhft.exe110⤵
-
\??\c:\dxfbttf.exec:\dxfbttf.exe111⤵
-
\??\c:\bbvvbn.exec:\bbvvbn.exe112⤵
-
\??\c:\vvpxp.exec:\vvpxp.exe113⤵
-
\??\c:\bvnprhl.exec:\bvnprhl.exe114⤵
-
\??\c:\jrhjpr.exec:\jrhjpr.exe115⤵
-
\??\c:\rfpbbj.exec:\rfpbbj.exe116⤵
-
\??\c:\xdvbt.exec:\xdvbt.exe117⤵
-
\??\c:\vrdrn.exec:\vrdrn.exe118⤵
-
\??\c:\nbhdp.exec:\nbhdp.exe119⤵
-
\??\c:\pbphfjj.exec:\pbphfjj.exe120⤵
-
\??\c:\xrnvjp.exec:\xrnvjp.exe121⤵
-
\??\c:\bndvvjj.exec:\bndvvjj.exe122⤵
-
\??\c:\drvlbj.exec:\drvlbj.exe123⤵
-
\??\c:\xtlndxn.exec:\xtlndxn.exe124⤵
-
\??\c:\pxrdd.exec:\pxrdd.exe125⤵
-
\??\c:\tjvrn.exec:\tjvrn.exe126⤵
-
\??\c:\vhrbr.exec:\vhrbr.exe127⤵
-
\??\c:\xjblj.exec:\xjblj.exe128⤵
-
\??\c:\hjnrpft.exec:\hjnrpft.exe129⤵
-
\??\c:\nbvhnl.exec:\nbvhnl.exe130⤵
-
\??\c:\hhnhlb.exec:\hhnhlb.exe131⤵
-
\??\c:\dhrjplt.exec:\dhrjplt.exe132⤵
-
\??\c:\fnhpldp.exec:\fnhpldp.exe133⤵
-
\??\c:\xplnt.exec:\xplnt.exe134⤵
-
\??\c:\drxljp.exec:\drxljp.exe135⤵
-
\??\c:\ntxpb.exec:\ntxpb.exe136⤵
-
\??\c:\djrhlx.exec:\djrhlx.exe137⤵
-
\??\c:\hbjvf.exec:\hbjvf.exe138⤵
-
\??\c:\fhjxvdv.exec:\fhjxvdv.exe139⤵
-
\??\c:\fjjdh.exec:\fjjdh.exe140⤵
-
\??\c:\hvdlxll.exec:\hvdlxll.exe141⤵
-
\??\c:\drrtlp.exec:\drrtlp.exe142⤵
-
\??\c:\tjhxbr.exec:\tjhxbr.exe143⤵
-
\??\c:\hhdnrrl.exec:\hhdnrrl.exe144⤵
-
\??\c:\jvrlp.exec:\jvrlp.exe145⤵
-
\??\c:\dfbrtj.exec:\dfbrtj.exe146⤵
-
\??\c:\bjlxrj.exec:\bjlxrj.exe147⤵
-
\??\c:\btblj.exec:\btblj.exe148⤵
-
\??\c:\ltxpbn.exec:\ltxpbn.exe149⤵
-
\??\c:\vdrpvt.exec:\vdrpvt.exe150⤵
-
\??\c:\fhvpjh.exec:\fhvpjh.exe151⤵
-
\??\c:\rhbvtr.exec:\rhbvtr.exe152⤵
-
\??\c:\xrxxl.exec:\xrxxl.exe153⤵
-
\??\c:\brnbbxv.exec:\brnbbxv.exe154⤵
-
\??\c:\ptnnxh.exec:\ptnnxh.exe155⤵
-
\??\c:\prndbtv.exec:\prndbtv.exe156⤵
-
\??\c:\jfjpfvn.exec:\jfjpfvn.exe157⤵
-
\??\c:\rfrlfvd.exec:\rfrlfvd.exe158⤵
-
\??\c:\nprrr.exec:\nprrr.exe159⤵
-
\??\c:\trjlljx.exec:\trjlljx.exe160⤵
-
\??\c:\tbtnt.exec:\tbtnt.exe161⤵
-
\??\c:\dvlbx.exec:\dvlbx.exe162⤵
-
\??\c:\xbjhnt.exec:\xbjhnt.exe163⤵
-
\??\c:\hdjttjh.exec:\hdjttjh.exe164⤵
-
\??\c:\pfnff.exec:\pfnff.exe165⤵
-
\??\c:\xxjnnl.exec:\xxjnnl.exe166⤵
-
\??\c:\vdpxf.exec:\vdpxf.exe167⤵
-
\??\c:\xhldnxf.exec:\xhldnxf.exe168⤵
-
\??\c:\hbrxhnv.exec:\hbrxhnv.exe169⤵
-
\??\c:\lhhhrvv.exec:\lhhhrvv.exe170⤵
-
\??\c:\xjjxtl.exec:\xjjxtl.exe171⤵
-
\??\c:\pjprd.exec:\pjprd.exe172⤵
-
\??\c:\hbbjb.exec:\hbbjb.exe173⤵
-
\??\c:\fflrvpd.exec:\fflrvpd.exe174⤵
-
\??\c:\hhxrrr.exec:\hhxrrr.exe175⤵
-
\??\c:\xfdpvrb.exec:\xfdpvrb.exe176⤵
-
\??\c:\rdtbx.exec:\rdtbx.exe177⤵
-
\??\c:\tlvjvdr.exec:\tlvjvdr.exe178⤵
-
\??\c:\jlhdrtp.exec:\jlhdrtp.exe179⤵
-
\??\c:\rhxtxf.exec:\rhxtxf.exe180⤵
-
\??\c:\tftjl.exec:\tftjl.exe181⤵
-
\??\c:\nhhtdl.exec:\nhhtdl.exe182⤵
-
\??\c:\hpftvph.exec:\hpftvph.exe183⤵
-
\??\c:\bllpn.exec:\bllpn.exe184⤵
-
\??\c:\xbbtb.exec:\xbbtb.exe185⤵
-
\??\c:\nhtnljl.exec:\nhtnljl.exe186⤵
-
\??\c:\frrll.exec:\frrll.exe187⤵
-
\??\c:\nfvbljv.exec:\nfvbljv.exe188⤵
-
\??\c:\htvljhb.exec:\htvljhb.exe189⤵
-
\??\c:\jnntf.exec:\jnntf.exe190⤵
-
\??\c:\bpfrxrr.exec:\bpfrxrr.exe191⤵
-
\??\c:\dvhnfr.exec:\dvhnfr.exe192⤵
-
\??\c:\dbfjv.exec:\dbfjv.exe193⤵
-
\??\c:\nvhxl.exec:\nvhxl.exe194⤵
-
\??\c:\bhfljx.exec:\bhfljx.exe195⤵
-
\??\c:\hlpxp.exec:\hlpxp.exe196⤵
-
\??\c:\xlbhxdd.exec:\xlbhxdd.exe197⤵
-
\??\c:\fdbjtht.exec:\fdbjtht.exe198⤵
-
\??\c:\lhxfr.exec:\lhxfr.exe199⤵
-
\??\c:\nfnnplv.exec:\nfnnplv.exe200⤵
-
\??\c:\xfrjf.exec:\xfrjf.exe201⤵
-
\??\c:\nrntdrn.exec:\nrntdrn.exe202⤵
-
\??\c:\nbntt.exec:\nbntt.exe203⤵
-
\??\c:\dhvndp.exec:\dhvndp.exe204⤵
-
\??\c:\fdhrnnr.exec:\fdhrnnr.exe205⤵
-
\??\c:\ffnbj.exec:\ffnbj.exe206⤵
-
\??\c:\bpldn.exec:\bpldn.exe207⤵
-
\??\c:\tptjpn.exec:\tptjpn.exe208⤵
-
\??\c:\xrrhfxl.exec:\xrrhfxl.exe209⤵
-
\??\c:\vvpntn.exec:\vvpntn.exe210⤵
-
\??\c:\lfxpl.exec:\lfxpl.exe211⤵
-
\??\c:\xhbdvrb.exec:\xhbdvrb.exe212⤵
-
\??\c:\btbrbjp.exec:\btbrbjp.exe213⤵
-
\??\c:\prtbtx.exec:\prtbtx.exe214⤵
-
\??\c:\rbfnnb.exec:\rbfnnb.exe215⤵
-
\??\c:\jhbxdbn.exec:\jhbxdbn.exe216⤵
-
\??\c:\brxbbpb.exec:\brxbbpb.exe217⤵
-
\??\c:\tjxljl.exec:\tjxljl.exe218⤵
-
\??\c:\ndxfvn.exec:\ndxfvn.exe219⤵
-
\??\c:\htpflf.exec:\htpflf.exe220⤵
-
\??\c:\jtdxp.exec:\jtdxp.exe221⤵
-
\??\c:\xrhvp.exec:\xrhvp.exe222⤵
-
\??\c:\lnpxrl.exec:\lnpxrl.exe223⤵
-
\??\c:\dhrppn.exec:\dhrppn.exe224⤵
-
\??\c:\jjrxdb.exec:\jjrxdb.exe225⤵
-
\??\c:\ntrdr.exec:\ntrdr.exe226⤵
-
\??\c:\rtpvxl.exec:\rtpvxl.exe227⤵
-
\??\c:\jrdrvt.exec:\jrdrvt.exe228⤵
-
\??\c:\hbpxfnt.exec:\hbpxfnt.exe229⤵
-
\??\c:\rvjbjnj.exec:\rvjbjnj.exe230⤵
-
\??\c:\ndhdjl.exec:\ndhdjl.exe231⤵
-
\??\c:\dfdbp.exec:\dfdbp.exe232⤵
-
\??\c:\pvdfdn.exec:\pvdfdn.exe233⤵
-
\??\c:\xrlbt.exec:\xrlbt.exe234⤵
-
\??\c:\lvjrjt.exec:\lvjrjt.exe235⤵
-
\??\c:\pnrbdhr.exec:\pnrbdhr.exe236⤵
-
\??\c:\pbnrr.exec:\pbnrr.exe237⤵
-
\??\c:\hxftbjv.exec:\hxftbjv.exe238⤵
-
\??\c:\plbjnx.exec:\plbjnx.exe239⤵
-
\??\c:\hfxxnn.exec:\hfxxnn.exe240⤵
-
\??\c:\lljljr.exec:\lljljr.exe241⤵