Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe
-
Size
54KB
-
MD5
d2a7e08b0924b3382fd78f754d333ba3
-
SHA1
2e264e0bc45683d4cf6b3254bad15672a97eeb62
-
SHA256
b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c
-
SHA512
054cb9a86b4541fdbbe8507b55fd8d80cc80786170b820a6c738db0d2373f5a537e1a1aa5ed4bedd5d2ca36c7dc60fbe13af42218fd18dceec22b5fe399a63a4
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFyz:ymb3NkkiQ3mdBjFIFO
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/2368-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3012-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3736-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3704-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3740-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/516-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1020-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/844-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/776-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3368-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3520-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/536-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1952-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2700-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2668-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4768-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4164-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1532-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2440-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2172-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2824-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3700-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4580-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 32 IoCs
Processes:
resource yara_rule behavioral2/memory/2368-46-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3096-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3012-95-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3736-137-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3704-210-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3740-202-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/516-192-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1020-188-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/844-178-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/776-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3368-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3520-154-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/536-132-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1952-125-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2700-113-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2668-108-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4768-101-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4164-74-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3096-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3096-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3096-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1532-57-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2440-49-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2440-48-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2368-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2368-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2368-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2172-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2824-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4160-20-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3700-13-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4580-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
3jdvv.exefrrxlfx.exentbtnh.exetnnhhh.exevjdvp.exeflrlxxx.exefxrlfff.exetthhht.exeddvvd.exevvvpd.exefrxfrrl.exetbhhbt.exepjddd.exevvdjd.exefxrfxrf.exe7lrfxrl.exebhnntb.exevddjj.exeflfxxxx.exexxxrxxl.exebtbtnh.exethtnhn.exevdjjp.exerxrrrlr.exentbbtt.exehbhbbb.exedvvpj.exexrflxlx.exelffflrx.exenhtnth.exebbbttt.exe7rlfxxr.exe9nhbbb.exedpjdv.exeddjvj.exexrlxlll.exerfxrlff.exettbbbb.exeppdjj.exevdppv.exe9frxrfx.exelxlfrxx.exehhhhhh.exebbttnh.exe1ddpj.exepdppd.exe1rlfxrl.exe9hhbtt.exethnbtt.exedpdvp.exexxllxrr.exellfxrrl.exennnttn.exejppvp.exejdjjd.exefflfxfx.exefffffrl.exethbhnt.exehtnhbh.exedjpjd.exeflxxrlf.exelfrrrrl.exenhttnt.exehhbbtt.exepid process 3700 3jdvv.exe 4160 frrxlfx.exe 2824 ntbtnh.exe 2172 tnnhhh.exe 2368 vjdvp.exe 2440 flrlxxx.exe 1532 fxrlfff.exe 3096 tthhht.exe 4164 ddvvd.exe 808 vvvpd.exe 3868 frxfrrl.exe 3012 tbhhbt.exe 4768 pjddd.exe 2668 vvdjd.exe 2700 fxrfxrf.exe 3056 7lrfxrl.exe 1952 bhnntb.exe 536 vddjj.exe 3736 flfxxxx.exe 2724 xxxrxxl.exe 4952 btbtnh.exe 3520 thtnhn.exe 5048 vdjjp.exe 3368 rxrrrlr.exe 776 ntbbtt.exe 844 hbhbbb.exe 1020 dvvpj.exe 516 xrflxlx.exe 64 lffflrx.exe 3740 nhtnth.exe 3704 bbbttt.exe 4012 7rlfxxr.exe 4288 9nhbbb.exe 396 dpjdv.exe 1348 ddjvj.exe 4848 xrlxlll.exe 4128 rfxrlff.exe 4844 ttbbbb.exe 412 ppdjj.exe 2608 vdppv.exe 212 9frxrfx.exe 4792 lxlfrxx.exe 4364 hhhhhh.exe 1136 bbttnh.exe 2284 1ddpj.exe 1752 pdppd.exe 1608 1rlfxrl.exe 4768 9hhbtt.exe 4136 thnbtt.exe 1296 dpdvp.exe 3972 xxllxrr.exe 4084 llfxrrl.exe 4572 nnnttn.exe 3500 jppvp.exe 3984 jdjjd.exe 4568 fflfxfx.exe 2740 fffffrl.exe 2080 thbhnt.exe 2912 htnhbh.exe 3416 djpjd.exe 3568 flxxrlf.exe 4376 lfrrrrl.exe 2180 nhttnt.exe 4508 hhbbtt.exe -
Processes:
resource yara_rule behavioral2/memory/2368-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3012-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3736-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3704-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3740-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/516-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1020-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/776-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3368-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3520-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/536-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1952-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2700-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2668-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4768-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4164-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1532-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2172-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2824-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3700-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4580-4-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe3jdvv.exefrrxlfx.exentbtnh.exetnnhhh.exevjdvp.exeflrlxxx.exefxrlfff.exetthhht.exeddvvd.exevvvpd.exefrxfrrl.exetbhhbt.exepjddd.exevvdjd.exefxrfxrf.exe7lrfxrl.exebhnntb.exevddjj.exeflfxxxx.exexxxrxxl.exebtbtnh.exedescription pid process target process PID 4580 wrote to memory of 3700 4580 b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe 3jdvv.exe PID 4580 wrote to memory of 3700 4580 b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe 3jdvv.exe PID 4580 wrote to memory of 3700 4580 b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe 3jdvv.exe PID 3700 wrote to memory of 4160 3700 3jdvv.exe frrxlfx.exe PID 3700 wrote to memory of 4160 3700 3jdvv.exe frrxlfx.exe PID 3700 wrote to memory of 4160 3700 3jdvv.exe frrxlfx.exe PID 4160 wrote to memory of 2824 4160 frrxlfx.exe ntbtnh.exe PID 4160 wrote to memory of 2824 4160 frrxlfx.exe ntbtnh.exe PID 4160 wrote to memory of 2824 4160 frrxlfx.exe ntbtnh.exe PID 2824 wrote to memory of 2172 2824 ntbtnh.exe tnnhhh.exe PID 2824 wrote to memory of 2172 2824 ntbtnh.exe tnnhhh.exe PID 2824 wrote to memory of 2172 2824 ntbtnh.exe tnnhhh.exe PID 2172 wrote to memory of 2368 2172 tnnhhh.exe vjdvp.exe PID 2172 wrote to memory of 2368 2172 tnnhhh.exe vjdvp.exe PID 2172 wrote to memory of 2368 2172 tnnhhh.exe vjdvp.exe PID 2368 wrote to memory of 2440 2368 vjdvp.exe flrlxxx.exe PID 2368 wrote to memory of 2440 2368 vjdvp.exe flrlxxx.exe PID 2368 wrote to memory of 2440 2368 vjdvp.exe flrlxxx.exe PID 2440 wrote to memory of 1532 2440 flrlxxx.exe fxrlfff.exe PID 2440 wrote to memory of 1532 2440 flrlxxx.exe fxrlfff.exe PID 2440 wrote to memory of 1532 2440 flrlxxx.exe fxrlfff.exe PID 1532 wrote to memory of 3096 1532 fxrlfff.exe tthhht.exe PID 1532 wrote to memory of 3096 1532 fxrlfff.exe tthhht.exe PID 1532 wrote to memory of 3096 1532 fxrlfff.exe tthhht.exe PID 3096 wrote to memory of 4164 3096 tthhht.exe ddvvd.exe PID 3096 wrote to memory of 4164 3096 tthhht.exe ddvvd.exe PID 3096 wrote to memory of 4164 3096 tthhht.exe ddvvd.exe PID 4164 wrote to memory of 808 4164 ddvvd.exe vvvpd.exe PID 4164 wrote to memory of 808 4164 ddvvd.exe vvvpd.exe PID 4164 wrote to memory of 808 4164 ddvvd.exe vvvpd.exe PID 808 wrote to memory of 3868 808 vvvpd.exe frxfrrl.exe PID 808 wrote to memory of 3868 808 vvvpd.exe frxfrrl.exe PID 808 wrote to memory of 3868 808 vvvpd.exe frxfrrl.exe PID 3868 wrote to memory of 3012 3868 frxfrrl.exe tbhhbt.exe PID 3868 wrote to memory of 3012 3868 frxfrrl.exe tbhhbt.exe PID 3868 wrote to memory of 3012 3868 frxfrrl.exe tbhhbt.exe PID 3012 wrote to memory of 4768 3012 tbhhbt.exe pjddd.exe PID 3012 wrote to memory of 4768 3012 tbhhbt.exe pjddd.exe PID 3012 wrote to memory of 4768 3012 tbhhbt.exe pjddd.exe PID 4768 wrote to memory of 2668 4768 pjddd.exe vvdjd.exe PID 4768 wrote to memory of 2668 4768 pjddd.exe vvdjd.exe PID 4768 wrote to memory of 2668 4768 pjddd.exe vvdjd.exe PID 2668 wrote to memory of 2700 2668 vvdjd.exe fxrfxrf.exe PID 2668 wrote to memory of 2700 2668 vvdjd.exe fxrfxrf.exe PID 2668 wrote to memory of 2700 2668 vvdjd.exe fxrfxrf.exe PID 2700 wrote to memory of 3056 2700 fxrfxrf.exe 7lrfxrl.exe PID 2700 wrote to memory of 3056 2700 fxrfxrf.exe 7lrfxrl.exe PID 2700 wrote to memory of 3056 2700 fxrfxrf.exe 7lrfxrl.exe PID 3056 wrote to memory of 1952 3056 7lrfxrl.exe bhnntb.exe PID 3056 wrote to memory of 1952 3056 7lrfxrl.exe bhnntb.exe PID 3056 wrote to memory of 1952 3056 7lrfxrl.exe bhnntb.exe PID 1952 wrote to memory of 536 1952 bhnntb.exe vddjj.exe PID 1952 wrote to memory of 536 1952 bhnntb.exe vddjj.exe PID 1952 wrote to memory of 536 1952 bhnntb.exe vddjj.exe PID 536 wrote to memory of 3736 536 vddjj.exe flfxxxx.exe PID 536 wrote to memory of 3736 536 vddjj.exe flfxxxx.exe PID 536 wrote to memory of 3736 536 vddjj.exe flfxxxx.exe PID 3736 wrote to memory of 2724 3736 flfxxxx.exe xxxrxxl.exe PID 3736 wrote to memory of 2724 3736 flfxxxx.exe xxxrxxl.exe PID 3736 wrote to memory of 2724 3736 flfxxxx.exe xxxrxxl.exe PID 2724 wrote to memory of 4952 2724 xxxrxxl.exe btbtnh.exe PID 2724 wrote to memory of 4952 2724 xxxrxxl.exe btbtnh.exe PID 2724 wrote to memory of 4952 2724 xxxrxxl.exe btbtnh.exe PID 4952 wrote to memory of 3520 4952 btbtnh.exe nbbbtn.exe
Processes
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe"C:\Users\Admin\AppData\Local\Temp\b61da362f567ddbbf1b6e9dc20146b77f999d1a46aa36c1407126a9e1242c40c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\3jdvv.exec:\3jdvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
\??\c:\frrxlfx.exec:\frrxlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\ntbtnh.exec:\ntbtnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\tnnhhh.exec:\tnnhhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\vjdvp.exec:\vjdvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\flrlxxx.exec:\flrlxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\fxrlfff.exec:\fxrlfff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\tthhht.exec:\tthhht.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\ddvvd.exec:\ddvvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\vvvpd.exec:\vvvpd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
\??\c:\frxfrrl.exec:\frxfrrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\tbhhbt.exec:\tbhhbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\pjddd.exec:\pjddd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\vvdjd.exec:\vvdjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\fxrfxrf.exec:\fxrfxrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\7lrfxrl.exec:\7lrfxrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\bhnntb.exec:\bhnntb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\vddjj.exec:\vddjj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\flfxxxx.exec:\flfxxxx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\xxxrxxl.exec:\xxxrxxl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\btbtnh.exec:\btbtnh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\thtnhn.exec:\thtnhn.exe23⤵
- Executes dropped EXE
PID:3520 -
\??\c:\vdjjp.exec:\vdjjp.exe24⤵
- Executes dropped EXE
PID:5048 -
\??\c:\rxrrrlr.exec:\rxrrrlr.exe25⤵
- Executes dropped EXE
PID:3368 -
\??\c:\ntbbtt.exec:\ntbbtt.exe26⤵
- Executes dropped EXE
PID:776 -
\??\c:\hbhbbb.exec:\hbhbbb.exe27⤵
- Executes dropped EXE
PID:844 -
\??\c:\dvvpj.exec:\dvvpj.exe28⤵
- Executes dropped EXE
PID:1020 -
\??\c:\xrflxlx.exec:\xrflxlx.exe29⤵
- Executes dropped EXE
PID:516 -
\??\c:\lffflrx.exec:\lffflrx.exe30⤵
- Executes dropped EXE
PID:64 -
\??\c:\nhtnth.exec:\nhtnth.exe31⤵
- Executes dropped EXE
PID:3740 -
\??\c:\bbbttt.exec:\bbbttt.exe32⤵
- Executes dropped EXE
PID:3704 -
\??\c:\7rlfxxr.exec:\7rlfxxr.exe33⤵
- Executes dropped EXE
PID:4012 -
\??\c:\9nhbbb.exec:\9nhbbb.exe34⤵
- Executes dropped EXE
PID:4288 -
\??\c:\dpjdv.exec:\dpjdv.exe35⤵
- Executes dropped EXE
PID:396 -
\??\c:\ddjvj.exec:\ddjvj.exe36⤵
- Executes dropped EXE
PID:1348 -
\??\c:\xrlxlll.exec:\xrlxlll.exe37⤵
- Executes dropped EXE
PID:4848 -
\??\c:\rfxrlff.exec:\rfxrlff.exe38⤵
- Executes dropped EXE
PID:4128 -
\??\c:\ttbbbb.exec:\ttbbbb.exe39⤵
- Executes dropped EXE
PID:4844 -
\??\c:\ppdjj.exec:\ppdjj.exe40⤵
- Executes dropped EXE
PID:412 -
\??\c:\vdppv.exec:\vdppv.exe41⤵
- Executes dropped EXE
PID:2608 -
\??\c:\9frxrfx.exec:\9frxrfx.exe42⤵
- Executes dropped EXE
PID:212 -
\??\c:\lxlfrxx.exec:\lxlfrxx.exe43⤵
- Executes dropped EXE
PID:4792 -
\??\c:\hhhhhh.exec:\hhhhhh.exe44⤵
- Executes dropped EXE
PID:4364 -
\??\c:\bbttnh.exec:\bbttnh.exe45⤵
- Executes dropped EXE
PID:1136 -
\??\c:\1ddpj.exec:\1ddpj.exe46⤵
- Executes dropped EXE
PID:2284 -
\??\c:\pdppd.exec:\pdppd.exe47⤵
- Executes dropped EXE
PID:1752 -
\??\c:\1rlfxrl.exec:\1rlfxrl.exe48⤵
- Executes dropped EXE
PID:1608 -
\??\c:\9hhbtt.exec:\9hhbtt.exe49⤵
- Executes dropped EXE
PID:4768 -
\??\c:\thnbtt.exec:\thnbtt.exe50⤵
- Executes dropped EXE
PID:4136 -
\??\c:\dpdvp.exec:\dpdvp.exe51⤵
- Executes dropped EXE
PID:1296 -
\??\c:\xxllxrr.exec:\xxllxrr.exe52⤵
- Executes dropped EXE
PID:3972 -
\??\c:\llfxrrl.exec:\llfxrrl.exe53⤵
- Executes dropped EXE
PID:4084 -
\??\c:\nnnttn.exec:\nnnttn.exe54⤵
- Executes dropped EXE
PID:4572 -
\??\c:\jppvp.exec:\jppvp.exe55⤵
- Executes dropped EXE
PID:3500 -
\??\c:\jdjjd.exec:\jdjjd.exe56⤵
- Executes dropped EXE
PID:3984 -
\??\c:\fflfxfx.exec:\fflfxfx.exe57⤵
- Executes dropped EXE
PID:4568 -
\??\c:\fffffrl.exec:\fffffrl.exe58⤵
- Executes dropped EXE
PID:2740 -
\??\c:\thbhnt.exec:\thbhnt.exe59⤵
- Executes dropped EXE
PID:2080 -
\??\c:\htnhbh.exec:\htnhbh.exe60⤵
- Executes dropped EXE
PID:2912 -
\??\c:\djpjd.exec:\djpjd.exe61⤵
- Executes dropped EXE
PID:3416 -
\??\c:\flxxrlf.exec:\flxxrlf.exe62⤵
- Executes dropped EXE
PID:3568 -
\??\c:\lfrrrrl.exec:\lfrrrrl.exe63⤵
- Executes dropped EXE
PID:4376 -
\??\c:\nhttnt.exec:\nhttnt.exe64⤵
- Executes dropped EXE
PID:2180 -
\??\c:\hhbbtt.exec:\hhbbtt.exe65⤵
- Executes dropped EXE
PID:4508 -
\??\c:\pppdv.exec:\pppdv.exe66⤵PID:4652
-
\??\c:\xxffffr.exec:\xxffffr.exe67⤵PID:4344
-
\??\c:\bhtttb.exec:\bhtttb.exe68⤵PID:3332
-
\??\c:\tbbttn.exec:\tbbttn.exe69⤵PID:3768
-
\??\c:\vdjjp.exec:\vdjjp.exe70⤵PID:2148
-
\??\c:\xrfxfrx.exec:\xrfxfrx.exe71⤵PID:4636
-
\??\c:\hnnhtn.exec:\hnnhtn.exe72⤵PID:5040
-
\??\c:\pvppd.exec:\pvppd.exe73⤵PID:1036
-
\??\c:\frxffxr.exec:\frxffxr.exe74⤵PID:5096
-
\??\c:\nbbttn.exec:\nbbttn.exe75⤵PID:4816
-
\??\c:\nttnhh.exec:\nttnhh.exe76⤵PID:4128
-
\??\c:\jvdpj.exec:\jvdpj.exe77⤵PID:4844
-
\??\c:\7xrllll.exec:\7xrllll.exe78⤵PID:4148
-
\??\c:\frrlfll.exec:\frrlfll.exe79⤵PID:4324
-
\??\c:\bbntnn.exec:\bbntnn.exe80⤵PID:4852
-
\??\c:\thntbb.exec:\thntbb.exe81⤵PID:220
-
\??\c:\vdpjj.exec:\vdpjj.exe82⤵PID:3876
-
\??\c:\pvdvp.exec:\pvdvp.exe83⤵PID:4420
-
\??\c:\xxllllr.exec:\xxllllr.exe84⤵PID:4632
-
\??\c:\nbhnnb.exec:\nbhnnb.exe85⤵PID:3248
-
\??\c:\thtnhb.exec:\thtnhb.exe86⤵PID:2628
-
\??\c:\dppjd.exec:\dppjd.exe87⤵PID:4032
-
\??\c:\lxxxrxr.exec:\lxxxrxr.exe88⤵PID:4976
-
\??\c:\fffxxff.exec:\fffxxff.exe89⤵PID:4924
-
\??\c:\tbbnnh.exec:\tbbnnh.exe90⤵PID:3056
-
\??\c:\htnhth.exec:\htnhth.exe91⤵PID:2232
-
\??\c:\dvjvj.exec:\dvjvj.exe92⤵PID:2860
-
\??\c:\pdppv.exec:\pdppv.exe93⤵PID:5100
-
\??\c:\fxxrxrf.exec:\fxxrxrf.exe94⤵PID:1128
-
\??\c:\bntttb.exec:\bntttb.exe95⤵PID:588
-
\??\c:\nthbbb.exec:\nthbbb.exe96⤵PID:4004
-
\??\c:\jvddv.exec:\jvddv.exe97⤵PID:2740
-
\??\c:\llfrrlx.exec:\llfrrlx.exe98⤵PID:5048
-
\??\c:\xrlfxrr.exec:\xrlfxrr.exe99⤵PID:4640
-
\??\c:\tnnbbb.exec:\tnnbbb.exe100⤵PID:4608
-
\??\c:\tbttnt.exec:\tbttnt.exe101⤵PID:1412
-
\??\c:\vjpdv.exec:\vjpdv.exe102⤵PID:4376
-
\??\c:\vpjpd.exec:\vpjpd.exe103⤵PID:1144
-
\??\c:\jddvd.exec:\jddvd.exe104⤵PID:2564
-
\??\c:\lffxrxr.exec:\lffxrxr.exe105⤵PID:64
-
\??\c:\rrxlfxx.exec:\rrxlfxx.exe106⤵PID:228
-
\??\c:\hhbhhn.exec:\hhbhhn.exe107⤵PID:2644
-
\??\c:\bnnhtn.exec:\bnnhtn.exe108⤵PID:4280
-
\??\c:\tbttth.exec:\tbttth.exe109⤵PID:2544
-
\??\c:\pjpdd.exec:\pjpdd.exe110⤵PID:5020
-
\??\c:\xllfxxr.exec:\xllfxxr.exe111⤵PID:4832
-
\??\c:\xrrfrlf.exec:\xrrfrlf.exe112⤵PID:2636
-
\??\c:\hbnbnh.exec:\hbnbnh.exe113⤵PID:3412
-
\??\c:\bnnhbb.exec:\bnnhbb.exe114⤵PID:4528
-
\??\c:\tbhbtb.exec:\tbhbtb.exe115⤵PID:1432
-
\??\c:\1djpj.exec:\1djpj.exe116⤵PID:4816
-
\??\c:\pddpp.exec:\pddpp.exe117⤵PID:1004
-
\??\c:\frfxxrr.exec:\frfxxrr.exe118⤵PID:1764
-
\??\c:\fxlfllr.exec:\fxlfllr.exe119⤵PID:4148
-
\??\c:\bbtbbh.exec:\bbtbbh.exe120⤵PID:4472
-
\??\c:\tntbhn.exec:\tntbhn.exe121⤵PID:2920
-
\??\c:\hhtnnt.exec:\hhtnnt.exe122⤵PID:4364
-
\??\c:\pjjdd.exec:\pjjdd.exe123⤵PID:5092
-
\??\c:\jddvp.exec:\jddvp.exe124⤵PID:3248
-
\??\c:\rrxrfxx.exec:\rrxrfxx.exe125⤵PID:2004
-
\??\c:\lfffxxr.exec:\lfffxxr.exe126⤵PID:464
-
\??\c:\btbbnt.exec:\btbbnt.exe127⤵PID:3180
-
\??\c:\7tttnb.exec:\7tttnb.exe128⤵PID:2880
-
\??\c:\pvvdj.exec:\pvvdj.exe129⤵PID:2860
-
\??\c:\jppdp.exec:\jppdp.exe130⤵PID:2724
-
\??\c:\xlrrlrl.exec:\xlrrlrl.exe131⤵PID:1128
-
\??\c:\lxxrlll.exec:\lxxrlll.exe132⤵PID:588
-
\??\c:\nnbbbb.exec:\nnbbbb.exe133⤵PID:4612
-
\??\c:\hnbttb.exec:\hnbttb.exe134⤵PID:3784
-
\??\c:\jvvvp.exec:\jvvvp.exe135⤵PID:4372
-
\??\c:\vvjvp.exec:\vvjvp.exe136⤵PID:3620
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe137⤵PID:4496
-
\??\c:\rxxxrxx.exec:\rxxxrxx.exe138⤵PID:4064
-
\??\c:\hbhhhh.exec:\hbhhhh.exe139⤵PID:4508
-
\??\c:\tthnbt.exec:\tthnbt.exe140⤵PID:2960
-
\??\c:\ppppd.exec:\ppppd.exe141⤵PID:2040
-
\??\c:\7vpjj.exec:\7vpjj.exe142⤵PID:2748
-
\??\c:\rrlxffr.exec:\rrlxffr.exe143⤵PID:4208
-
\??\c:\frrlfff.exec:\frrlfff.exe144⤵PID:2644
-
\??\c:\hbttbb.exec:\hbttbb.exe145⤵PID:4000
-
\??\c:\lllrrfr.exec:\lllrrfr.exe146⤵PID:396
-
\??\c:\rllrllf.exec:\rllrllf.exe147⤵PID:2796
-
\??\c:\rlrlflx.exec:\rlrlflx.exe148⤵PID:1872
-
\??\c:\9nnhbb.exec:\9nnhbb.exe149⤵PID:1348
-
\??\c:\bhnhbh.exec:\bhnhbh.exe150⤵PID:4848
-
\??\c:\jjjdd.exec:\jjjdd.exe151⤵PID:5096
-
\??\c:\1pjjd.exec:\1pjjd.exe152⤵PID:3264
-
\??\c:\5vddv.exec:\5vddv.exe153⤵PID:2440
-
\??\c:\rlffffx.exec:\rlffffx.exe154⤵PID:1200
-
\??\c:\bhhbbb.exec:\bhhbbb.exe155⤵PID:1988
-
\??\c:\hnbnth.exec:\hnbnth.exe156⤵PID:220
-
\??\c:\hthnhb.exec:\hthnhb.exe157⤵PID:808
-
\??\c:\djjdj.exec:\djjdj.exe158⤵PID:3988
-
\??\c:\9pvpp.exec:\9pvpp.exe159⤵PID:2412
-
\??\c:\ffffflx.exec:\ffffflx.exe160⤵PID:4252
-
\??\c:\lrllllr.exec:\lrllllr.exe161⤵PID:4976
-
\??\c:\thhthn.exec:\thhthn.exe162⤵PID:3420
-
\??\c:\hhthtt.exec:\hhthtt.exe163⤵PID:4924
-
\??\c:\thnnnt.exec:\thnnnt.exe164⤵PID:536
-
\??\c:\vjdpd.exec:\vjdpd.exe165⤵PID:5100
-
\??\c:\pddjv.exec:\pddjv.exe166⤵PID:2616
-
\??\c:\rfxfflr.exec:\rfxfflr.exe167⤵PID:3148
-
\??\c:\xlfrxrr.exec:\xlfrxrr.exe168⤵PID:3532
-
\??\c:\tttntb.exec:\tttntb.exe169⤵PID:2912
-
\??\c:\jjdjv.exec:\jjdjv.exe170⤵PID:3416
-
\??\c:\dpddd.exec:\dpddd.exe171⤵PID:844
-
\??\c:\xrrlfxx.exec:\xrrlfxx.exe172⤵PID:4068
-
\??\c:\7rfrxrr.exec:\7rfrxrr.exe173⤵PID:2088
-
\??\c:\tnhbtb.exec:\tnhbtb.exe174⤵PID:3516
-
\??\c:\bbhhtt.exec:\bbhhtt.exe175⤵PID:1828
-
\??\c:\9vvjd.exec:\9vvjd.exe176⤵PID:3680
-
\??\c:\vjdpp.exec:\vjdpp.exe177⤵PID:228
-
\??\c:\xxlxrlf.exec:\xxlxrlf.exe178⤵PID:3704
-
\??\c:\fxxrxxx.exec:\fxxrxxx.exe179⤵PID:4208
-
\??\c:\tnbnhh.exec:\tnbnhh.exe180⤵PID:4904
-
\??\c:\ttnbnn.exec:\ttnbnn.exe181⤵PID:3612
-
\??\c:\dvvpd.exec:\dvvpd.exe182⤵PID:1040
-
\??\c:\rrlxrlx.exec:\rrlxrlx.exe183⤵PID:3328
-
\??\c:\frlrlfx.exec:\frlrlfx.exe184⤵PID:4000
-
\??\c:\hbbtnb.exec:\hbbtnb.exe185⤵PID:396
-
\??\c:\nbbthb.exec:\nbbthb.exe186⤵PID:2824
-
\??\c:\vpjdd.exec:\vpjdd.exe187⤵PID:4828
-
\??\c:\ppdvd.exec:\ppdvd.exe188⤵PID:1908
-
\??\c:\rlrrxrx.exec:\rlrrxrx.exe189⤵PID:4812
-
\??\c:\xfxrllx.exec:\xfxrllx.exe190⤵PID:2252
-
\??\c:\7bbntt.exec:\7bbntt.exe191⤵PID:764
-
\??\c:\hhbthh.exec:\hhbthh.exe192⤵PID:1308
-
\??\c:\bnbthb.exec:\bnbthb.exe193⤵PID:2500
-
\??\c:\ddvpj.exec:\ddvpj.exe194⤵PID:212
-
\??\c:\jdjvp.exec:\jdjvp.exe195⤵PID:2256
-
\??\c:\ffxrllr.exec:\ffxrllr.exe196⤵PID:3008
-
\??\c:\xlrlfxx.exec:\xlrlfxx.exe197⤵PID:4632
-
\??\c:\ntttnh.exec:\ntttnh.exe198⤵PID:4076
-
\??\c:\tbhbnh.exec:\tbhbnh.exe199⤵PID:1540
-
\??\c:\pjjdp.exec:\pjjdp.exe200⤵PID:4600
-
\??\c:\vjjdv.exec:\vjjdv.exe201⤵PID:4916
-
\??\c:\ffxrfxx.exec:\ffxrfxx.exe202⤵PID:3460
-
\??\c:\9rlllll.exec:\9rlllll.exe203⤵PID:4920
-
\??\c:\lfxxxxr.exec:\lfxxxxr.exe204⤵PID:2972
-
\??\c:\nthbnn.exec:\nthbnn.exe205⤵PID:4004
-
\??\c:\tnnthb.exec:\tnnthb.exe206⤵PID:2740
-
\??\c:\pppdv.exec:\pppdv.exe207⤵PID:3368
-
\??\c:\jdjvd.exec:\jdjvd.exe208⤵PID:4460
-
\??\c:\dvjvp.exec:\dvjvp.exe209⤵PID:3768
-
\??\c:\lrffllr.exec:\lrffllr.exe210⤵PID:844
-
\??\c:\tntnhh.exec:\tntnhh.exe211⤵PID:4068
-
\??\c:\hbhhbb.exec:\hbhhbb.exe212⤵PID:1876
-
\??\c:\btbbbt.exec:\btbbbt.exe213⤵PID:3640
-
\??\c:\dpvvj.exec:\dpvvj.exe214⤵PID:836
-
\??\c:\vpjjd.exec:\vpjjd.exe215⤵PID:64
-
\??\c:\vvjdp.exec:\vvjdp.exe216⤵PID:2040
-
\??\c:\lxxllfr.exec:\lxxllfr.exe217⤵PID:5064
-
\??\c:\rrlfxxr.exec:\rrlfxxr.exe218⤵PID:4208
-
\??\c:\bhtthb.exec:\bhtthb.exe219⤵PID:4984
-
\??\c:\hbbtbh.exec:\hbbtbh.exe220⤵PID:4012
-
\??\c:\vdpdj.exec:\vdpdj.exe221⤵PID:3700
-
\??\c:\jdjdd.exec:\jdjdd.exe222⤵PID:4876
-
\??\c:\rrxrrrl.exec:\rrxrrrl.exe223⤵PID:4636
-
\??\c:\xffffff.exec:\xffffff.exe224⤵PID:3036
-
\??\c:\5xxrllf.exec:\5xxrllf.exe225⤵PID:5036
-
\??\c:\bnttbb.exec:\bnttbb.exe226⤵PID:1872
-
\??\c:\bhhbtn.exec:\bhhbtn.exe227⤵PID:1432
-
\??\c:\vdjpv.exec:\vdjpv.exe228⤵PID:4848
-
\??\c:\djpjd.exec:\djpjd.exe229⤵PID:4816
-
\??\c:\dpdvj.exec:\dpdvj.exe230⤵PID:1536
-
\??\c:\frlffff.exec:\frlffff.exe231⤵PID:2608
-
\??\c:\rffrfff.exec:\rffrfff.exe232⤵PID:404
-
\??\c:\hnhhht.exec:\hnhhht.exe233⤵PID:3584
-
\??\c:\nhhbth.exec:\nhhbth.exe234⤵PID:4364
-
\??\c:\pvppj.exec:\pvppj.exe235⤵PID:724
-
\??\c:\vpppd.exec:\vpppd.exe236⤵PID:3068
-
\??\c:\fxrxllr.exec:\fxrxllr.exe237⤵PID:2412
-
\??\c:\rxfxlxr.exec:\rxfxlxr.exe238⤵PID:4676
-
\??\c:\7rrlxxl.exec:\7rrlxxl.exe239⤵PID:3180
-
\??\c:\ntnhtn.exec:\ntnhtn.exe240⤵PID:4900
-
\??\c:\tnhbnh.exec:\tnhbnh.exe241⤵PID:1812
-
\??\c:\jvvjv.exec:\jvvjv.exe242⤵PID:2860