Analysis
-
max time kernel
46s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 19:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6c4c9e6ee2481a70fa2770fb69e1a915.exe
Resource
win7-20240220-en
5 signatures
150 seconds
General
-
Target
6c4c9e6ee2481a70fa2770fb69e1a915.exe
-
Size
62KB
-
MD5
6c4c9e6ee2481a70fa2770fb69e1a915
-
SHA1
f8d1e8b3f8948fefe95b12611de26600ce4ba470
-
SHA256
07d3d2d56c5c35a7ab5aab27973790c0f5b8524efcaaebcdd8e9ce409d705b28
-
SHA512
c8513bf0ac517f8545632ede3dfc055cd4d512297662d9e91d18131afeb4c45fa00259a1a296a2a02cb5a0b5fd04f7bd85fa29fff913397255e1bc4df1ddeb12
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iWR:ymb3NkkiQ3mdBjF+3TU2PR
Malware Config
Signatures
-
Detect Blackmoon payload 35 IoCs
resource yara_rule behavioral1/memory/2080-1-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1740-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2308-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1348-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/680-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1420-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/896-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1048-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1540-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1208-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2080-320-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-348-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-356-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-365-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-439-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/324-513-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-536-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-583-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-584-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-616-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-652-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/644-774-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-790-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1740 1djvv.exe 2920 ntbnbn.exe 2632 rrrxllr.exe 2540 ppvvd.exe 2688 5xxlxlf.exe 2580 jvpdd.exe 2428 xfflxfx.exe 2832 vppvp.exe 2204 xfxffxr.exe 2308 ppjdd.exe 1348 flrlxrx.exe 680 vpdjp.exe 2324 hbbhht.exe 776 lrlfrxr.exe 1916 hbbhnh.exe 1420 xflxfrx.exe 896 jdpjd.exe 2516 hhhtbt.exe 1048 5llrrfr.exe 1540 vdjdp.exe 348 vddpp.exe 3000 tnhbhn.exe 868 frfrflr.exe 1704 9hnbtt.exe 1804 ppvpp.exe 1208 flfrrrr.exe 2952 jddvj.exe 2876 xxxfrrl.exe 2232 jvjvj.exe 2940 3rlrxfl.exe 2808 jjjdd.exe 2080 nnhtth.exe 2000 pjdpv.exe 3016 bnhbhb.exe 2612 vdppv.exe 2424 lflxlxl.exe 2576 pjjjv.exe 2704 lrrllff.exe 2200 1vjvj.exe 2676 tbbtbt.exe 2836 pjvvd.exe 2428 1tnbth.exe 2832 ddvjd.exe 2156 hhhhhh.exe 1580 ppjvd.exe 1808 frrxxlf.exe 2336 7hbnbt.exe 2148 llflxlx.exe 1628 bhnnth.exe 1884 9xxrfff.exe 2212 bhbhtn.exe 644 ddppv.exe 1420 djpdd.exe 2812 xxxrxlf.exe 2264 thbbhb.exe 2168 xflflfr.exe 540 ttttnb.exe 324 rfxlxrx.exe 584 bnbhhh.exe 880 rxlllll.exe 2596 jpppp.exe 1708 xffrrff.exe 1912 jdvpj.exe 916 rfxxffr.exe -
resource yara_rule behavioral1/memory/2080-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1740-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1348-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/680-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/680-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1420-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/896-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/896-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1048-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1540-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1540-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1208-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-289-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2080-320-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-348-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-356-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-365-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-394-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-409-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-439-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-482-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-497-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/324-512-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/324-513-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/880-528-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-536-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1708-544-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-552-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/916-560-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-575-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-583-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-584-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-592-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-607-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-616-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-623-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-652-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-709-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1548-773-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/644-774-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-790-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1076-811-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-963-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-1013-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-1021-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1740 2080 6c4c9e6ee2481a70fa2770fb69e1a915.exe 28 PID 2080 wrote to memory of 1740 2080 6c4c9e6ee2481a70fa2770fb69e1a915.exe 28 PID 2080 wrote to memory of 1740 2080 6c4c9e6ee2481a70fa2770fb69e1a915.exe 28 PID 2080 wrote to memory of 1740 2080 6c4c9e6ee2481a70fa2770fb69e1a915.exe 28 PID 1740 wrote to memory of 2920 1740 1djvv.exe 29 PID 1740 wrote to memory of 2920 1740 1djvv.exe 29 PID 1740 wrote to memory of 2920 1740 1djvv.exe 29 PID 1740 wrote to memory of 2920 1740 1djvv.exe 29 PID 2920 wrote to memory of 2632 2920 ntbnbn.exe 30 PID 2920 wrote to memory of 2632 2920 ntbnbn.exe 30 PID 2920 wrote to memory of 2632 2920 ntbnbn.exe 30 PID 2920 wrote to memory of 2632 2920 ntbnbn.exe 30 PID 2632 wrote to memory of 2540 2632 rrrxllr.exe 31 PID 2632 wrote to memory of 2540 2632 rrrxllr.exe 31 PID 2632 wrote to memory of 2540 2632 rrrxllr.exe 31 PID 2632 wrote to memory of 2540 2632 rrrxllr.exe 31 PID 2540 wrote to memory of 2688 2540 ppvvd.exe 32 PID 2540 wrote to memory of 2688 2540 ppvvd.exe 32 PID 2540 wrote to memory of 2688 2540 ppvvd.exe 32 PID 2540 wrote to memory of 2688 2540 ppvvd.exe 32 PID 2688 wrote to memory of 2580 2688 5xxlxlf.exe 33 PID 2688 wrote to memory of 2580 2688 5xxlxlf.exe 33 PID 2688 wrote to memory of 2580 2688 5xxlxlf.exe 33 PID 2688 wrote to memory of 2580 2688 5xxlxlf.exe 33 PID 2580 wrote to memory of 2428 2580 jvpdd.exe 34 PID 2580 wrote to memory of 2428 2580 jvpdd.exe 34 PID 2580 wrote to memory of 2428 2580 jvpdd.exe 34 PID 2580 wrote to memory of 2428 2580 jvpdd.exe 34 PID 2428 wrote to memory of 2832 2428 xfflxfx.exe 35 PID 2428 wrote to memory of 2832 2428 xfflxfx.exe 35 PID 2428 wrote to memory of 2832 2428 xfflxfx.exe 35 PID 2428 wrote to memory of 2832 2428 xfflxfx.exe 35 PID 2832 wrote to memory of 2204 2832 vppvp.exe 36 PID 2832 wrote to memory of 2204 2832 vppvp.exe 36 PID 2832 wrote to memory of 2204 2832 vppvp.exe 36 PID 2832 wrote to memory of 2204 2832 vppvp.exe 36 PID 2204 wrote to memory of 2308 2204 xfxffxr.exe 37 PID 2204 wrote to memory of 2308 2204 xfxffxr.exe 37 PID 2204 wrote to memory of 2308 2204 xfxffxr.exe 37 PID 2204 wrote to memory of 2308 2204 xfxffxr.exe 37 PID 2308 wrote to memory of 1348 2308 ppjdd.exe 38 PID 2308 wrote to memory of 1348 2308 ppjdd.exe 38 PID 2308 wrote to memory of 1348 2308 ppjdd.exe 38 PID 2308 wrote to memory of 1348 2308 ppjdd.exe 38 PID 1348 wrote to memory of 680 1348 flrlxrx.exe 39 PID 1348 wrote to memory of 680 1348 flrlxrx.exe 39 PID 1348 wrote to memory of 680 1348 flrlxrx.exe 39 PID 1348 wrote to memory of 680 1348 flrlxrx.exe 39 PID 680 wrote to memory of 2324 680 vpdjp.exe 40 PID 680 wrote to memory of 2324 680 vpdjp.exe 40 PID 680 wrote to memory of 2324 680 vpdjp.exe 40 PID 680 wrote to memory of 2324 680 vpdjp.exe 40 PID 2324 wrote to memory of 776 2324 hbbhht.exe 41 PID 2324 wrote to memory of 776 2324 hbbhht.exe 41 PID 2324 wrote to memory of 776 2324 hbbhht.exe 41 PID 2324 wrote to memory of 776 2324 hbbhht.exe 41 PID 776 wrote to memory of 1916 776 lrlfrxr.exe 42 PID 776 wrote to memory of 1916 776 lrlfrxr.exe 42 PID 776 wrote to memory of 1916 776 lrlfrxr.exe 42 PID 776 wrote to memory of 1916 776 lrlfrxr.exe 42 PID 1916 wrote to memory of 1420 1916 hbbhnh.exe 43 PID 1916 wrote to memory of 1420 1916 hbbhnh.exe 43 PID 1916 wrote to memory of 1420 1916 hbbhnh.exe 43 PID 1916 wrote to memory of 1420 1916 hbbhnh.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c4c9e6ee2481a70fa2770fb69e1a915.exe"C:\Users\Admin\AppData\Local\Temp\6c4c9e6ee2481a70fa2770fb69e1a915.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\1djvv.exec:\1djvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\ntbnbn.exec:\ntbnbn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\rrrxllr.exec:\rrrxllr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\ppvvd.exec:\ppvvd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\5xxlxlf.exec:\5xxlxlf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\jvpdd.exec:\jvpdd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\xfflxfx.exec:\xfflxfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\vppvp.exec:\vppvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\xfxffxr.exec:\xfxffxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\ppjdd.exec:\ppjdd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\flrlxrx.exec:\flrlxrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\vpdjp.exec:\vpdjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\hbbhht.exec:\hbbhht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\lrlfrxr.exec:\lrlfrxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\hbbhnh.exec:\hbbhnh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\xflxfrx.exec:\xflxfrx.exe17⤵
- Executes dropped EXE
PID:1420 -
\??\c:\jdpjd.exec:\jdpjd.exe18⤵
- Executes dropped EXE
PID:896 -
\??\c:\hhhtbt.exec:\hhhtbt.exe19⤵
- Executes dropped EXE
PID:2516 -
\??\c:\5llrrfr.exec:\5llrrfr.exe20⤵
- Executes dropped EXE
PID:1048 -
\??\c:\vdjdp.exec:\vdjdp.exe21⤵
- Executes dropped EXE
PID:1540 -
\??\c:\vddpp.exec:\vddpp.exe22⤵
- Executes dropped EXE
PID:348 -
\??\c:\tnhbhn.exec:\tnhbhn.exe23⤵
- Executes dropped EXE
PID:3000 -
\??\c:\frfrflr.exec:\frfrflr.exe24⤵
- Executes dropped EXE
PID:868 -
\??\c:\9hnbtt.exec:\9hnbtt.exe25⤵
- Executes dropped EXE
PID:1704 -
\??\c:\ppvpp.exec:\ppvpp.exe26⤵
- Executes dropped EXE
PID:1804 -
\??\c:\flfrrrr.exec:\flfrrrr.exe27⤵
- Executes dropped EXE
PID:1208 -
\??\c:\jddvj.exec:\jddvj.exe28⤵
- Executes dropped EXE
PID:2952 -
\??\c:\xxxfrrl.exec:\xxxfrrl.exe29⤵
- Executes dropped EXE
PID:2876 -
\??\c:\jvjvj.exec:\jvjvj.exe30⤵
- Executes dropped EXE
PID:2232 -
\??\c:\3rlrxfl.exec:\3rlrxfl.exe31⤵
- Executes dropped EXE
PID:2940 -
\??\c:\jjjdd.exec:\jjjdd.exe32⤵
- Executes dropped EXE
PID:2808 -
\??\c:\nnhtth.exec:\nnhtth.exe33⤵
- Executes dropped EXE
PID:2080 -
\??\c:\pjdpv.exec:\pjdpv.exe34⤵
- Executes dropped EXE
PID:2000 -
\??\c:\bnhbhb.exec:\bnhbhb.exe35⤵
- Executes dropped EXE
PID:3016 -
\??\c:\vdppv.exec:\vdppv.exe36⤵
- Executes dropped EXE
PID:2612 -
\??\c:\lflxlxl.exec:\lflxlxl.exe37⤵
- Executes dropped EXE
PID:2424 -
\??\c:\pjjjv.exec:\pjjjv.exe38⤵
- Executes dropped EXE
PID:2576 -
\??\c:\lrrllff.exec:\lrrllff.exe39⤵
- Executes dropped EXE
PID:2704 -
\??\c:\1vjvj.exec:\1vjvj.exe40⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tbbtbt.exec:\tbbtbt.exe41⤵
- Executes dropped EXE
PID:2676 -
\??\c:\pjvvd.exec:\pjvvd.exe42⤵
- Executes dropped EXE
PID:2836 -
\??\c:\1tnbth.exec:\1tnbth.exe43⤵
- Executes dropped EXE
PID:2428 -
\??\c:\ddvjd.exec:\ddvjd.exe44⤵
- Executes dropped EXE
PID:2832 -
\??\c:\hhhhhh.exec:\hhhhhh.exe45⤵
- Executes dropped EXE
PID:2156 -
\??\c:\ppjvd.exec:\ppjvd.exe46⤵
- Executes dropped EXE
PID:1580 -
\??\c:\frrxxlf.exec:\frrxxlf.exe47⤵
- Executes dropped EXE
PID:1808 -
\??\c:\7hbnbt.exec:\7hbnbt.exe48⤵
- Executes dropped EXE
PID:2336 -
\??\c:\llflxlx.exec:\llflxlx.exe49⤵
- Executes dropped EXE
PID:2148 -
\??\c:\bhnnth.exec:\bhnnth.exe50⤵
- Executes dropped EXE
PID:1628 -
\??\c:\9xxrfff.exec:\9xxrfff.exe51⤵
- Executes dropped EXE
PID:1884 -
\??\c:\bhbhtn.exec:\bhbhtn.exe52⤵
- Executes dropped EXE
PID:2212 -
\??\c:\ddppv.exec:\ddppv.exe53⤵
- Executes dropped EXE
PID:644 -
\??\c:\djpdd.exec:\djpdd.exe54⤵
- Executes dropped EXE
PID:1420 -
\??\c:\xxxrxlf.exec:\xxxrxlf.exe55⤵
- Executes dropped EXE
PID:2812 -
\??\c:\thbbhb.exec:\thbbhb.exe56⤵
- Executes dropped EXE
PID:2264 -
\??\c:\xflflfr.exec:\xflflfr.exe57⤵
- Executes dropped EXE
PID:2168 -
\??\c:\ttttnb.exec:\ttttnb.exe58⤵
- Executes dropped EXE
PID:540 -
\??\c:\rfxlxrx.exec:\rfxlxrx.exe59⤵
- Executes dropped EXE
PID:324 -
\??\c:\bnbhhh.exec:\bnbhhh.exe60⤵
- Executes dropped EXE
PID:584 -
\??\c:\rxlllll.exec:\rxlllll.exe61⤵
- Executes dropped EXE
PID:880 -
\??\c:\jpppp.exec:\jpppp.exe62⤵
- Executes dropped EXE
PID:2596 -
\??\c:\xffrrff.exec:\xffrrff.exe63⤵
- Executes dropped EXE
PID:1708 -
\??\c:\jdvpj.exec:\jdvpj.exe64⤵
- Executes dropped EXE
PID:1912 -
\??\c:\rfxxffr.exec:\rfxxffr.exe65⤵
- Executes dropped EXE
PID:916 -
\??\c:\hthhnt.exec:\hthhnt.exe66⤵PID:2980
-
\??\c:\flrrxrx.exec:\flrrxrx.exe67⤵PID:2868
-
\??\c:\thntbt.exec:\thntbt.exe68⤵PID:2952
-
\??\c:\rlxlfxl.exec:\rlxlfxl.exe69⤵PID:3040
-
\??\c:\9hntbn.exec:\9hntbn.exe70⤵PID:1304
-
\??\c:\rxxrlxr.exec:\rxxrlxr.exe71⤵PID:2796
-
\??\c:\dvpjv.exec:\dvpjv.exe72⤵PID:2604
-
\??\c:\bntntb.exec:\bntntb.exe73⤵PID:1536
-
\??\c:\lfrlfrf.exec:\lfrlfrf.exe74⤵PID:2520
-
\??\c:\nhtbht.exec:\nhtbht.exe75⤵PID:2968
-
\??\c:\5pjpp.exec:\5pjpp.exe76⤵PID:2120
-
\??\c:\5frxrxr.exec:\5frxrxr.exe77⤵PID:2664
-
\??\c:\jvvvv.exec:\jvvvv.exe78⤵PID:2548
-
\??\c:\ntbtnb.exec:\ntbtnb.exe79⤵PID:2456
-
\??\c:\ffxllxf.exec:\ffxllxf.exe80⤵PID:2420
-
\??\c:\nnhtnt.exec:\nnhtnt.exe81⤵PID:2200
-
\??\c:\jdvdj.exec:\jdvdj.exe82⤵PID:1756
-
\??\c:\3btbnt.exec:\3btbnt.exe83⤵PID:2836
-
\??\c:\7dpvv.exec:\7dpvv.exe84⤵PID:780
-
\??\c:\btnbbb.exec:\btnbbb.exe85⤵PID:2392
-
\??\c:\1pjdp.exec:\1pjdp.exe86⤵PID:1644
-
\??\c:\xlllxlf.exec:\xlllxlf.exe87⤵PID:1548
-
\??\c:\3jdvd.exec:\3jdvd.exe88⤵PID:1512
-
\??\c:\xrflxlx.exec:\xrflxlx.exe89⤵PID:1868
-
\??\c:\5btntt.exec:\5btntt.exe90⤵PID:340
-
\??\c:\ppvvj.exec:\ppvvj.exe91⤵PID:1728
-
\??\c:\lrlfllf.exec:\lrlfllf.exe92⤵PID:1880
-
\??\c:\bhbtnh.exec:\bhbtnh.exe93⤵PID:1448
-
\??\c:\flxllfl.exec:\flxllfl.exe94⤵PID:644
-
\??\c:\thbhnn.exec:\thbhnn.exe95⤵PID:1420
-
\??\c:\pvdpp.exec:\pvdpp.exe96⤵PID:2516
-
\??\c:\tnhtbn.exec:\tnhtbn.exe97⤵PID:2024
-
\??\c:\3jvvv.exec:\3jvvv.exe98⤵PID:604
-
\??\c:\ttnthn.exec:\ttnthn.exe99⤵PID:1076
-
\??\c:\9dpdv.exec:\9dpdv.exe100⤵PID:2888
-
\??\c:\bthhnt.exec:\bthhnt.exe101⤵PID:1128
-
\??\c:\9dpvv.exec:\9dpvv.exe102⤵PID:1460
-
\??\c:\hhbhth.exec:\hhbhth.exe103⤵PID:1948
-
\??\c:\jvpjp.exec:\jvpjp.exe104⤵PID:1752
-
\??\c:\ttntht.exec:\ttntht.exe105⤵PID:2780
-
\??\c:\jpdvj.exec:\jpdvj.exe106⤵PID:3064
-
\??\c:\3flxfff.exec:\3flxfff.exe107⤵PID:2872
-
\??\c:\dpvjj.exec:\dpvjj.exe108⤵PID:1576
-
\??\c:\7fxrxxl.exec:\7fxrxxl.exe109⤵PID:1216
-
\??\c:\dvpdj.exec:\dvpdj.exe110⤵PID:2952
-
\??\c:\3rxrrll.exec:\3rxrrll.exe111⤵PID:2188
-
\??\c:\nhbbht.exec:\nhbbht.exe112⤵PID:1924
-
\??\c:\rxxrrll.exec:\rxxrrll.exe113⤵PID:2748
-
\??\c:\5lxrlrr.exec:\5lxrlrr.exe114⤵PID:2084
-
\??\c:\dvjpd.exec:\dvjpd.exe115⤵PID:2036
-
\??\c:\ntbtbb.exec:\ntbtbb.exe116⤵PID:2556
-
\??\c:\9frxflx.exec:\9frxflx.exe117⤵PID:2764
-
\??\c:\vjppd.exec:\vjppd.exe118⤵PID:2572
-
\??\c:\5tbtbn.exec:\5tbtbn.exe119⤵PID:2636
-
\??\c:\dvppj.exec:\dvppj.exe120⤵PID:2464
-
\??\c:\3htbbn.exec:\3htbbn.exe121⤵PID:2576
-
\??\c:\djppv.exec:\djppv.exe122⤵PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-