Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 00:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe
Resource
win7-20240220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe
-
Size
81KB
-
MD5
54d21f843b65560a988e8ca6faee40f7
-
SHA1
7e931c487cd3f0ee4eaf07d9456cdbf939ad2b8a
-
SHA256
8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9
-
SHA512
b07286da49311b7158f1f6d3630bfaf01e99e97f357f43763459c22c602ad05be17a8d252e7e8af178d3b3954ad158bfb4a3754021ad2a6218233e8f333de412
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo7xCkTsIwtOa2dYS8nje:ymb3NkkiQ3mdBjFo7LAIbT6je
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/2908-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4924-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2672-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2480-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3960-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1412-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3068-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2916-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4956-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4956-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4324-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/608-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3504-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4640-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3800-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2368-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4940-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/760-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2004-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4924-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 30 IoCs
Processes:
resource yara_rule behavioral2/memory/2908-5-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4924-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2192-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2672-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2480-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2480-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2480-31-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2480-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3960-42-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1412-50-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3068-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2916-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4956-77-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4956-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4956-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4856-87-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4324-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/608-99-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2892-105-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3504-111-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4640-117-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3800-123-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2368-135-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3088-153-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4940-164-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/760-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5052-177-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2980-183-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2004-195-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4924-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
vdjdv.exefxrlfxr.exetthtnt.exerlrlfll.exevjppd.exe9lrfxxx.exehhbnbh.exenbbhth.exedvdjj.exe7llfxlx.exerlrlfff.exellfllxx.exe3bhnht.exevpddv.exerxxrlll.exerfffrrl.exe5bthhh.exevvddd.exelfrlrrr.exebtttbn.exedpjdv.exexxllffx.exe1rrfrlx.exetntbnn.exejjjjd.exelrfffxf.exethnnnn.exedvjpj.exedpvpj.exerllrlfr.exebbtbtn.exepjjjp.exe5rxlxfx.exepvjjp.exefxffrll.exexxfxllf.exetbtttn.exepjvvp.exefxflrxx.exerxfxxlr.exetthbbb.exejdddp.exepdjpp.exerrxrlrl.exe5bnbnh.exehbhbth.exejjjpp.exevjjjd.exelfrlrlf.exettnnhh.exenbtntb.exeddvpv.exefrxrxfl.exefrrlrfl.exe3tttnn.exepvdpd.exerlrxrxr.exe5xfxllr.exe7hnhbh.exe3tnbtt.exe9dddv.exelrflfrr.exehbnhhb.exehbtnhb.exepid process 4924 vdjdv.exe 2192 fxrlfxr.exe 2672 tthtnt.exe 2480 rlrlfll.exe 3960 vjppd.exe 1412 9lrfxxx.exe 4896 hhbnbh.exe 3068 nbbhth.exe 2916 dvdjj.exe 4956 7llfxlx.exe 4856 rlrlfff.exe 4324 llfllxx.exe 608 3bhnht.exe 2892 vpddv.exe 3504 rxxrlll.exe 4640 rfffrrl.exe 3800 5bthhh.exe 2476 vvddd.exe 2368 lfrlrrr.exe 1696 btttbn.exe 4436 dpjdv.exe 3088 xxllffx.exe 3680 1rrfrlx.exe 4940 tntbnn.exe 760 jjjjd.exe 5052 lrfffxf.exe 2980 thnnnn.exe 2580 dvjpj.exe 2004 dpvpj.exe 4924 rllrlfr.exe 4112 bbtbtn.exe 4396 pjjjp.exe 2408 5rxlxfx.exe 3656 pvjjp.exe 4628 fxffrll.exe 884 xxfxllf.exe 4852 tbtttn.exe 3384 pjvvp.exe 3928 fxflrxx.exe 2612 rxfxxlr.exe 4380 tthbbb.exe 2788 jdddp.exe 1544 pdjpp.exe 4384 rrxrlrl.exe 4416 5bnbnh.exe 5044 hbhbth.exe 4740 jjjpp.exe 4548 vjjjd.exe 2952 lfrlrlf.exe 4260 ttnnhh.exe 4900 nbtntb.exe 3964 ddvpv.exe 4516 frxrxfl.exe 5008 frrlrfl.exe 3588 3tttnn.exe 4436 pvdpd.exe 2780 rlrxrxr.exe 3488 5xfxllr.exe 4940 7hnhbh.exe 760 3tnbtt.exe 384 9dddv.exe 4336 lrflfrr.exe 452 hbnhhb.exe 3972 hbtnhb.exe -
Processes:
resource yara_rule behavioral2/memory/2908-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3960-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1412-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3068-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2916-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4956-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4956-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4956-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/608-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3504-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4640-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3800-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/760-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2004-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exevdjdv.exefxrlfxr.exetthtnt.exerlrlfll.exevjppd.exe9lrfxxx.exehhbnbh.exenbbhth.exedvdjj.exe7llfxlx.exerlrlfff.exellfllxx.exe3bhnht.exevpddv.exerxxrlll.exerfffrrl.exe5bthhh.exevvddd.exelfrlrrr.exebtttbn.exedpjdv.exedescription pid process target process PID 2908 wrote to memory of 4924 2908 8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe vdjdv.exe PID 2908 wrote to memory of 4924 2908 8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe vdjdv.exe PID 2908 wrote to memory of 4924 2908 8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe vdjdv.exe PID 4924 wrote to memory of 2192 4924 vdjdv.exe fxrlfxr.exe PID 4924 wrote to memory of 2192 4924 vdjdv.exe fxrlfxr.exe PID 4924 wrote to memory of 2192 4924 vdjdv.exe fxrlfxr.exe PID 2192 wrote to memory of 2672 2192 fxrlfxr.exe tthtnt.exe PID 2192 wrote to memory of 2672 2192 fxrlfxr.exe tthtnt.exe PID 2192 wrote to memory of 2672 2192 fxrlfxr.exe tthtnt.exe PID 2672 wrote to memory of 2480 2672 tthtnt.exe rlrlfll.exe PID 2672 wrote to memory of 2480 2672 tthtnt.exe rlrlfll.exe PID 2672 wrote to memory of 2480 2672 tthtnt.exe rlrlfll.exe PID 2480 wrote to memory of 3960 2480 rlrlfll.exe vjppd.exe PID 2480 wrote to memory of 3960 2480 rlrlfll.exe vjppd.exe PID 2480 wrote to memory of 3960 2480 rlrlfll.exe vjppd.exe PID 3960 wrote to memory of 1412 3960 vjppd.exe 9lrfxxx.exe PID 3960 wrote to memory of 1412 3960 vjppd.exe 9lrfxxx.exe PID 3960 wrote to memory of 1412 3960 vjppd.exe 9lrfxxx.exe PID 1412 wrote to memory of 4896 1412 9lrfxxx.exe hhbnbh.exe PID 1412 wrote to memory of 4896 1412 9lrfxxx.exe hhbnbh.exe PID 1412 wrote to memory of 4896 1412 9lrfxxx.exe hhbnbh.exe PID 4896 wrote to memory of 3068 4896 hhbnbh.exe nbbhth.exe PID 4896 wrote to memory of 3068 4896 hhbnbh.exe nbbhth.exe PID 4896 wrote to memory of 3068 4896 hhbnbh.exe nbbhth.exe PID 3068 wrote to memory of 2916 3068 nbbhth.exe dvdjj.exe PID 3068 wrote to memory of 2916 3068 nbbhth.exe dvdjj.exe PID 3068 wrote to memory of 2916 3068 nbbhth.exe dvdjj.exe PID 2916 wrote to memory of 4956 2916 dvdjj.exe 7llfxlx.exe PID 2916 wrote to memory of 4956 2916 dvdjj.exe 7llfxlx.exe PID 2916 wrote to memory of 4956 2916 dvdjj.exe 7llfxlx.exe PID 4956 wrote to memory of 4856 4956 7llfxlx.exe rlrlfff.exe PID 4956 wrote to memory of 4856 4956 7llfxlx.exe rlrlfff.exe PID 4956 wrote to memory of 4856 4956 7llfxlx.exe rlrlfff.exe PID 4856 wrote to memory of 4324 4856 rlrlfff.exe llfllxx.exe PID 4856 wrote to memory of 4324 4856 rlrlfff.exe llfllxx.exe PID 4856 wrote to memory of 4324 4856 rlrlfff.exe llfllxx.exe PID 4324 wrote to memory of 608 4324 llfllxx.exe 3bhnht.exe PID 4324 wrote to memory of 608 4324 llfllxx.exe 3bhnht.exe PID 4324 wrote to memory of 608 4324 llfllxx.exe 3bhnht.exe PID 608 wrote to memory of 2892 608 3bhnht.exe vpddv.exe PID 608 wrote to memory of 2892 608 3bhnht.exe vpddv.exe PID 608 wrote to memory of 2892 608 3bhnht.exe vpddv.exe PID 2892 wrote to memory of 3504 2892 vpddv.exe rxxrlll.exe PID 2892 wrote to memory of 3504 2892 vpddv.exe rxxrlll.exe PID 2892 wrote to memory of 3504 2892 vpddv.exe rxxrlll.exe PID 3504 wrote to memory of 4640 3504 rxxrlll.exe rfffrrl.exe PID 3504 wrote to memory of 4640 3504 rxxrlll.exe rfffrrl.exe PID 3504 wrote to memory of 4640 3504 rxxrlll.exe rfffrrl.exe PID 4640 wrote to memory of 3800 4640 rfffrrl.exe 5bthhh.exe PID 4640 wrote to memory of 3800 4640 rfffrrl.exe 5bthhh.exe PID 4640 wrote to memory of 3800 4640 rfffrrl.exe 5bthhh.exe PID 3800 wrote to memory of 2476 3800 5bthhh.exe vvddd.exe PID 3800 wrote to memory of 2476 3800 5bthhh.exe vvddd.exe PID 3800 wrote to memory of 2476 3800 5bthhh.exe vvddd.exe PID 2476 wrote to memory of 2368 2476 vvddd.exe lfrlrrr.exe PID 2476 wrote to memory of 2368 2476 vvddd.exe lfrlrrr.exe PID 2476 wrote to memory of 2368 2476 vvddd.exe lfrlrrr.exe PID 2368 wrote to memory of 1696 2368 lfrlrrr.exe btttbn.exe PID 2368 wrote to memory of 1696 2368 lfrlrrr.exe btttbn.exe PID 2368 wrote to memory of 1696 2368 lfrlrrr.exe btttbn.exe PID 1696 wrote to memory of 4436 1696 btttbn.exe dpjdv.exe PID 1696 wrote to memory of 4436 1696 btttbn.exe dpjdv.exe PID 1696 wrote to memory of 4436 1696 btttbn.exe dpjdv.exe PID 4436 wrote to memory of 3088 4436 dpjdv.exe xxllffx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe"C:\Users\Admin\AppData\Local\Temp\8611ab486e64482d9c33859891b937b09803718329f7f5740c328ec531f8dab9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\vdjdv.exec:\vdjdv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\fxrlfxr.exec:\fxrlfxr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\tthtnt.exec:\tthtnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\rlrlfll.exec:\rlrlfll.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\vjppd.exec:\vjppd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\9lrfxxx.exec:\9lrfxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
\??\c:\hhbnbh.exec:\hhbnbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\nbbhth.exec:\nbbhth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\dvdjj.exec:\dvdjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\7llfxlx.exec:\7llfxlx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\rlrlfff.exec:\rlrlfff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
\??\c:\llfllxx.exec:\llfllxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\3bhnht.exec:\3bhnht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
\??\c:\vpddv.exec:\vpddv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\rxxrlll.exec:\rxxrlll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
\??\c:\rfffrrl.exec:\rfffrrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\5bthhh.exec:\5bthhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
\??\c:\vvddd.exec:\vvddd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\lfrlrrr.exec:\lfrlrrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\btttbn.exec:\btttbn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\dpjdv.exec:\dpjdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
\??\c:\xxllffx.exec:\xxllffx.exe23⤵
- Executes dropped EXE
PID:3088 -
\??\c:\1rrfrlx.exec:\1rrfrlx.exe24⤵
- Executes dropped EXE
PID:3680 -
\??\c:\tntbnn.exec:\tntbnn.exe25⤵
- Executes dropped EXE
PID:4940 -
\??\c:\jjjjd.exec:\jjjjd.exe26⤵
- Executes dropped EXE
PID:760 -
\??\c:\lrfffxf.exec:\lrfffxf.exe27⤵
- Executes dropped EXE
PID:5052 -
\??\c:\thnnnn.exec:\thnnnn.exe28⤵
- Executes dropped EXE
PID:2980 -
\??\c:\dvjpj.exec:\dvjpj.exe29⤵
- Executes dropped EXE
PID:2580 -
\??\c:\dpvpj.exec:\dpvpj.exe30⤵
- Executes dropped EXE
PID:2004 -
\??\c:\rllrlfr.exec:\rllrlfr.exe31⤵
- Executes dropped EXE
PID:4924 -
\??\c:\bbtbtn.exec:\bbtbtn.exe32⤵
- Executes dropped EXE
PID:4112 -
\??\c:\pjjjp.exec:\pjjjp.exe33⤵
- Executes dropped EXE
PID:4396 -
\??\c:\5rxlxfx.exec:\5rxlxfx.exe34⤵
- Executes dropped EXE
PID:2408 -
\??\c:\pvjjp.exec:\pvjjp.exe35⤵
- Executes dropped EXE
PID:3656 -
\??\c:\fxffrll.exec:\fxffrll.exe36⤵
- Executes dropped EXE
PID:4628 -
\??\c:\xxfxllf.exec:\xxfxllf.exe37⤵
- Executes dropped EXE
PID:884 -
\??\c:\tbtttn.exec:\tbtttn.exe38⤵
- Executes dropped EXE
PID:4852 -
\??\c:\pjvvp.exec:\pjvvp.exe39⤵
- Executes dropped EXE
PID:3384 -
\??\c:\fxflrxx.exec:\fxflrxx.exe40⤵
- Executes dropped EXE
PID:3928 -
\??\c:\rxfxxlr.exec:\rxfxxlr.exe41⤵
- Executes dropped EXE
PID:2612 -
\??\c:\tthbbb.exec:\tthbbb.exe42⤵
- Executes dropped EXE
PID:4380 -
\??\c:\jdddp.exec:\jdddp.exe43⤵
- Executes dropped EXE
PID:2788 -
\??\c:\pdjpp.exec:\pdjpp.exe44⤵
- Executes dropped EXE
PID:1544 -
\??\c:\rrxrlrl.exec:\rrxrlrl.exe45⤵
- Executes dropped EXE
PID:4384 -
\??\c:\5bnbnh.exec:\5bnbnh.exe46⤵
- Executes dropped EXE
PID:4416 -
\??\c:\hbhbth.exec:\hbhbth.exe47⤵
- Executes dropped EXE
PID:5044 -
\??\c:\jjjpp.exec:\jjjpp.exe48⤵
- Executes dropped EXE
PID:4740 -
\??\c:\vjjjd.exec:\vjjjd.exe49⤵
- Executes dropped EXE
PID:4548 -
\??\c:\lfrlrlf.exec:\lfrlrlf.exe50⤵
- Executes dropped EXE
PID:2952 -
\??\c:\ttnnhh.exec:\ttnnhh.exe51⤵
- Executes dropped EXE
PID:4260 -
\??\c:\nbtntb.exec:\nbtntb.exe52⤵
- Executes dropped EXE
PID:4900 -
\??\c:\ddvpv.exec:\ddvpv.exe53⤵
- Executes dropped EXE
PID:3964 -
\??\c:\frxrxfl.exec:\frxrxfl.exe54⤵
- Executes dropped EXE
PID:4516 -
\??\c:\frrlrfl.exec:\frrlrfl.exe55⤵
- Executes dropped EXE
PID:5008 -
\??\c:\3tttnn.exec:\3tttnn.exe56⤵
- Executes dropped EXE
PID:3588 -
\??\c:\pvdpd.exec:\pvdpd.exe57⤵
- Executes dropped EXE
PID:4436 -
\??\c:\rlrxrxr.exec:\rlrxrxr.exe58⤵
- Executes dropped EXE
PID:2780 -
\??\c:\5xfxllr.exec:\5xfxllr.exe59⤵
- Executes dropped EXE
PID:3488 -
\??\c:\7hnhbh.exec:\7hnhbh.exe60⤵
- Executes dropped EXE
PID:4940 -
\??\c:\3tnbtt.exec:\3tnbtt.exe61⤵
- Executes dropped EXE
PID:760 -
\??\c:\9dddv.exec:\9dddv.exe62⤵
- Executes dropped EXE
PID:384 -
\??\c:\lrflfrr.exec:\lrflfrr.exe63⤵
- Executes dropped EXE
PID:4336 -
\??\c:\hbnhhb.exec:\hbnhhb.exe64⤵
- Executes dropped EXE
PID:452 -
\??\c:\hbtnhb.exec:\hbtnhb.exe65⤵
- Executes dropped EXE
PID:3972 -
\??\c:\jppdv.exec:\jppdv.exe66⤵PID:3284
-
\??\c:\lrrlllf.exec:\lrrlllf.exe67⤵PID:2960
-
\??\c:\ntnbhn.exec:\ntnbhn.exe68⤵PID:4092
-
\??\c:\nnnbhn.exec:\nnnbhn.exe69⤵PID:4784
-
\??\c:\pdpvp.exec:\pdpvp.exe70⤵PID:2024
-
\??\c:\rxxffll.exec:\rxxffll.exe71⤵PID:2408
-
\??\c:\hbhbnn.exec:\hbhbnn.exe72⤵PID:3932
-
\??\c:\nbhtbh.exec:\nbhtbh.exe73⤵PID:2972
-
\??\c:\fffxxff.exec:\fffxxff.exe74⤵PID:5000
-
\??\c:\5xfffff.exec:\5xfffff.exe75⤵PID:1436
-
\??\c:\tnnntt.exec:\tnnntt.exe76⤵PID:4596
-
\??\c:\pjppv.exec:\pjppv.exe77⤵PID:844
-
\??\c:\lxrrrxx.exec:\lxrrrxx.exe78⤵PID:4488
-
\??\c:\lrrfffx.exec:\lrrfffx.exe79⤵PID:2852
-
\??\c:\7tttbn.exec:\7tttbn.exe80⤵PID:2224
-
\??\c:\vjjvj.exec:\vjjvj.exe81⤵PID:4300
-
\??\c:\5bhbbb.exec:\5bhbbb.exe82⤵PID:2316
-
\??\c:\7vdjp.exec:\7vdjp.exe83⤵PID:1904
-
\??\c:\xlxffll.exec:\xlxffll.exe84⤵PID:3220
-
\??\c:\thhthb.exec:\thhthb.exe85⤵PID:4376
-
\??\c:\vdpdd.exec:\vdpdd.exe86⤵PID:2552
-
\??\c:\dpvpj.exec:\dpvpj.exe87⤵PID:4480
-
\??\c:\xfrlfxf.exec:\xfrlfxf.exe88⤵PID:2160
-
\??\c:\bttbtt.exec:\bttbtt.exe89⤵PID:3552
-
\??\c:\jpvdv.exec:\jpvdv.exe90⤵PID:4948
-
\??\c:\jdpjp.exec:\jdpjp.exe91⤵PID:4536
-
\??\c:\xrlffxx.exec:\xrlffxx.exe92⤵PID:4436
-
\??\c:\llxrlff.exec:\llxrlff.exe93⤵PID:2780
-
\??\c:\bttnbb.exec:\bttnbb.exe94⤵PID:3488
-
\??\c:\jdjjp.exec:\jdjjp.exe95⤵PID:4940
-
\??\c:\9xflfll.exec:\9xflfll.exe96⤵PID:2908
-
\??\c:\bbthnh.exec:\bbthnh.exe97⤵PID:4400
-
\??\c:\ntnhbt.exec:\ntnhbt.exe98⤵PID:2580
-
\??\c:\5jddv.exec:\5jddv.exe99⤵PID:1560
-
\??\c:\fxfffxx.exec:\fxfffxx.exe100⤵PID:2336
-
\??\c:\dppvj.exec:\dppvj.exe101⤵PID:1084
-
\??\c:\lllrxfr.exec:\lllrxfr.exe102⤵PID:2436
-
\??\c:\nhhnhh.exec:\nhhnhh.exe103⤵PID:4396
-
\??\c:\9bhhtb.exec:\9bhhtb.exe104⤵PID:4052
-
\??\c:\ppdvp.exec:\ppdvp.exe105⤵PID:2408
-
\??\c:\ffrlfll.exec:\ffrlfll.exe106⤵PID:1920
-
\??\c:\lrrllff.exec:\lrrllff.exe107⤵PID:3960
-
\??\c:\bhbbht.exec:\bhbbht.exe108⤵PID:2604
-
\??\c:\djpjd.exec:\djpjd.exe109⤵PID:4852
-
\??\c:\lxfrlfr.exec:\lxfrlfr.exe110⤵PID:4808
-
\??\c:\fxxfffl.exec:\fxxfffl.exe111⤵PID:1880
-
\??\c:\btnnhb.exec:\btnnhb.exe112⤵PID:2360
-
\??\c:\dpddv.exec:\dpddv.exe113⤵PID:924
-
\??\c:\dvvvj.exec:\dvvvj.exe114⤵PID:5060
-
\??\c:\5flrffr.exec:\5flrffr.exe115⤵PID:1544
-
\??\c:\hhtnbh.exec:\hhtnbh.exe116⤵PID:3164
-
\??\c:\pppdd.exec:\pppdd.exe117⤵PID:1904
-
\??\c:\pdvdj.exec:\pdvdj.exe118⤵PID:1564
-
\??\c:\lllxxfx.exec:\lllxxfx.exe119⤵PID:3800
-
\??\c:\lflffff.exec:\lflffff.exe120⤵PID:4480
-
\??\c:\tnbhtb.exec:\tnbhtb.exe121⤵PID:944
-
\??\c:\dpvpj.exec:\dpvpj.exe122⤵PID:2124
-
\??\c:\jjppp.exec:\jjppp.exe123⤵PID:1576
-
\??\c:\9lxrxxf.exec:\9lxrxxf.exe124⤵PID:3944
-
\??\c:\xflffff.exec:\xflffff.exe125⤵PID:632
-
\??\c:\nnbbnb.exec:\nnbbnb.exe126⤵PID:1956
-
\??\c:\5hnnht.exec:\5hnnht.exe127⤵PID:4036
-
\??\c:\djvpp.exec:\djvpp.exe128⤵PID:384
-
\??\c:\rfrfrrf.exec:\rfrfrrf.exe129⤵PID:4336
-
\??\c:\xfffffx.exec:\xfffffx.exe130⤵PID:4928
-
\??\c:\bntnhh.exec:\bntnhh.exe131⤵PID:3972
-
\??\c:\tntnnt.exec:\tntnnt.exe132⤵PID:4016
-
\??\c:\djvpj.exec:\djvpj.exe133⤵PID:3976
-
\??\c:\vjpjd.exec:\vjpjd.exe134⤵PID:2176
-
\??\c:\7xlxlfx.exec:\7xlxlfx.exe135⤵PID:2964
-
\??\c:\ttbtnn.exec:\ttbtnn.exe136⤵PID:4936
-
\??\c:\bbbhnh.exec:\bbbhnh.exe137⤵PID:4716
-
\??\c:\pvppj.exec:\pvppj.exe138⤵PID:812
-
\??\c:\9ppjv.exec:\9ppjv.exe139⤵PID:4896
-
\??\c:\lxxxxxx.exec:\lxxxxxx.exe140⤵PID:3672
-
\??\c:\bbhnnb.exec:\bbhnnb.exe141⤵PID:4808
-
\??\c:\vjjjd.exec:\vjjjd.exe142⤵PID:3264
-
\??\c:\5rfrxxx.exec:\5rfrxxx.exe143⤵PID:2600
-
\??\c:\nnbthn.exec:\nnbthn.exe144⤵PID:4956
-
\??\c:\hbhbtt.exec:\hbhbtt.exe145⤵PID:3084
-
\??\c:\vjjpp.exec:\vjjpp.exe146⤵PID:1388
-
\??\c:\1fffxxr.exec:\1fffxxr.exe147⤵PID:3856
-
\??\c:\rrxxrlf.exec:\rrxxrlf.exe148⤵PID:1356
-
\??\c:\hntnnn.exec:\hntnnn.exe149⤵PID:2252
-
\??\c:\hnthbt.exec:\hnthbt.exe150⤵PID:4948
-
\??\c:\vvdvd.exec:\vvdvd.exe151⤵PID:3588
-
\??\c:\xrxfffx.exec:\xrxfffx.exe152⤵PID:4276
-
\??\c:\hbnnbb.exec:\hbnnbb.exe153⤵PID:3912
-
\??\c:\jjvvv.exec:\jjvvv.exe154⤵PID:3196
-
\??\c:\dpjjp.exec:\dpjjp.exe155⤵PID:2392
-
\??\c:\1xxxffx.exec:\1xxxffx.exe156⤵PID:2908
-
\??\c:\xxflxxf.exec:\xxflxxf.exe157⤵PID:764
-
\??\c:\bnnhhn.exec:\bnnhhn.exe158⤵PID:4728
-
\??\c:\dpjdv.exec:\dpjdv.exe159⤵PID:4020
-
\??\c:\xfxxrlf.exec:\xfxxrlf.exe160⤵PID:2336
-
\??\c:\fxffffl.exec:\fxffffl.exe161⤵PID:1084
-
\??\c:\bhhttn.exec:\bhhttn.exe162⤵PID:3136
-
\??\c:\ddjpd.exec:\ddjpd.exe163⤵PID:1524
-
\??\c:\pjpvd.exec:\pjpvd.exe164⤵PID:3656
-
\??\c:\xxxxflx.exec:\xxxxflx.exe165⤵PID:1412
-
\??\c:\fflrxlx.exec:\fflrxlx.exe166⤵PID:4896
-
\??\c:\thhtnt.exec:\thhtnt.exe167⤵PID:4060
-
\??\c:\vpdpv.exec:\vpdpv.exe168⤵PID:4856
-
\??\c:\vpdpd.exec:\vpdpd.exe169⤵PID:4376
-
\??\c:\llrrrfl.exec:\llrrrfl.exe170⤵PID:3100
-
\??\c:\nhbbtt.exec:\nhbbtt.exe171⤵PID:3472
-
\??\c:\jppjd.exec:\jppjd.exe172⤵PID:4548
-
\??\c:\fxrffxx.exec:\fxrffxx.exe173⤵PID:1568
-
\??\c:\tntnnn.exec:\tntnnn.exe174⤵PID:2476
-
\??\c:\nnttnn.exec:\nnttnn.exe175⤵PID:3120
-
\??\c:\ddpjj.exec:\ddpjj.exe176⤵PID:1356
-
\??\c:\ddppj.exec:\ddppj.exe177⤵PID:2252
-
\??\c:\5tnnht.exec:\5tnnht.exe178⤵PID:4536
-
\??\c:\jpdvp.exec:\jpdvp.exe179⤵PID:3452
-
\??\c:\lfllfff.exec:\lfllfff.exe180⤵PID:3168
-
\??\c:\htbhnb.exec:\htbhnb.exe181⤵PID:1956
-
\??\c:\llfxlxf.exec:\llfxlxf.exe182⤵PID:3196
-
\??\c:\ddvvp.exec:\ddvvp.exe183⤵PID:2392
-
\??\c:\rfrfxrx.exec:\rfrfxrx.exe184⤵PID:4336
-
\??\c:\hbttnt.exec:\hbttnt.exe185⤵PID:4924
-
\??\c:\thhhnh.exec:\thhhnh.exe186⤵PID:440
-
\??\c:\9jjdp.exec:\9jjdp.exe187⤵PID:4020
-
\??\c:\lrrrlrr.exec:\lrrrlrr.exe188⤵PID:5080
-
\??\c:\3rxrllx.exec:\3rxrllx.exe189⤵PID:3852
-
\??\c:\hbhttn.exec:\hbhttn.exe190⤵PID:3268
-
\??\c:\jpddd.exec:\jpddd.exe191⤵PID:2972
-
\??\c:\5jdjp.exec:\5jdjp.exe192⤵PID:3656
-
\??\c:\1lllrrr.exec:\1lllrrr.exe193⤵PID:5064
-
\??\c:\nhhbtt.exec:\nhhbtt.exe194⤵PID:4996
-
\??\c:\nntnhh.exec:\nntnhh.exe195⤵PID:3220
-
\??\c:\pjddv.exec:\pjddv.exe196⤵PID:4340
-
\??\c:\xxrlfff.exec:\xxrlfff.exe197⤵PID:348
-
\??\c:\lflxrfx.exec:\lflxrfx.exe198⤵PID:4956
-
\??\c:\1bnttt.exec:\1bnttt.exe199⤵PID:3164
-
\??\c:\djpjj.exec:\djpjj.exe200⤵PID:1568
-
\??\c:\jvppd.exec:\jvppd.exe201⤵PID:2284
-
\??\c:\flflxxr.exec:\flflxxr.exe202⤵PID:4480
-
\??\c:\hhbhhb.exec:\hhbhhb.exe203⤵PID:1356
-
\??\c:\ppddv.exec:\ppddv.exe204⤵PID:4532
-
\??\c:\xrrrrrl.exec:\xrrrrrl.exe205⤵PID:3588
-
\??\c:\xrrrllr.exec:\xrrrllr.exe206⤵PID:5076
-
\??\c:\ntbbbn.exec:\ntbbbn.exe207⤵PID:2016
-
\??\c:\tbttbt.exec:\tbttbt.exe208⤵PID:2980
-
\??\c:\9jpdj.exec:\9jpdj.exe209⤵PID:4328
-
\??\c:\5vvjd.exec:\5vvjd.exe210⤵PID:4428
-
\??\c:\rxlfxxr.exec:\rxlfxxr.exe211⤵PID:2384
-
\??\c:\nnbttb.exec:\nnbttb.exe212⤵PID:1404
-
\??\c:\ttbttn.exec:\ttbttn.exe213⤵PID:2376
-
\??\c:\3jjdp.exec:\3jjdp.exe214⤵PID:2192
-
\??\c:\flxfxrf.exec:\flxfxrf.exe215⤵PID:548
-
\??\c:\rxlrlxr.exec:\rxlrlxr.exe216⤵PID:3704
-
\??\c:\hhnbtb.exec:\hhnbtb.exe217⤵PID:3268
-
\??\c:\htbttt.exec:\htbttt.exe218⤵PID:3672
-
\??\c:\pddpj.exec:\pddpj.exe219⤵PID:2604
-
\??\c:\9vdvp.exec:\9vdvp.exe220⤵PID:4996
-
\??\c:\9rfrrrr.exec:\9rfrrrr.exe221⤵PID:4856
-
\??\c:\ttttnb.exec:\ttttnb.exe222⤵PID:4788
-
\??\c:\ntbbhh.exec:\ntbbhh.exe223⤵PID:2316
-
\??\c:\jvddp.exec:\jvddp.exe224⤵PID:2100
-
\??\c:\9dpjd.exec:\9dpjd.exe225⤵PID:4260
-
\??\c:\xrrllff.exec:\xrrllff.exe226⤵PID:4952
-
\??\c:\xfffxxx.exec:\xfffxxx.exe227⤵PID:3188
-
\??\c:\bhnnbb.exec:\bhnnbb.exe228⤵PID:4948
-
\??\c:\hbtnnn.exec:\hbtnnn.exe229⤵PID:2252
-
\??\c:\jjjpv.exec:\jjjpv.exe230⤵PID:4276
-
\??\c:\jddvp.exec:\jddvp.exe231⤵PID:512
-
\??\c:\lffxrrr.exec:\lffxrrr.exe232⤵PID:3168
-
\??\c:\lfffflf.exec:\lfffflf.exe233⤵PID:4352
-
\??\c:\bttnhh.exec:\bttnhh.exe234⤵PID:2872
-
\??\c:\nnttbb.exec:\nnttbb.exe235⤵PID:3196
-
\??\c:\3dvvd.exec:\3dvvd.exe236⤵PID:1556
-
\??\c:\9ppjv.exec:\9ppjv.exe237⤵PID:4304
-
\??\c:\llrllll.exec:\llrllll.exe238⤵PID:3972
-
\??\c:\xxlllll.exec:\xxlllll.exe239⤵PID:1404
-
\??\c:\nnbbbh.exec:\nnbbbh.exe240⤵PID:5080
-
\??\c:\thhhbh.exec:\thhhbh.exe241⤵PID:4868
-
\??\c:\vvppd.exec:\vvppd.exe242⤵PID:3852