Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 00:54
Behavioral task
behavioral1
Sample
040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe
-
Size
69KB
-
MD5
040595063bc3dab0a5f45266365469b3
-
SHA1
7c369a426d3448de17da5edfc5142dffe118791f
-
SHA256
3c4692334a07ef091543fb47e7cdc2e671f177571eccadad3c9adb2bba095130
-
SHA512
7b65d182f9064a1542bf8f96f904739901bf52ae9f04471df6131c7ec5a532c1c09115865f1e5c6d708c82aa9f197c050c0296c6e52ce512bee7260b70f8c629
-
SSDEEP
1536:JvQBeOGtrYS3srx93UBWfwC6Ggnouy8WFRxZOQ+p98:JhOmTsF93UYfwC6GIoutWFfp+v8
Malware Config
Signatures
-
Detect Blackmoon payload 54 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1860-14-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3060-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2684-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2632-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1108-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2724-58-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2744-66-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3016-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2512-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2372-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1604-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2468-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1956-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/236-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1768-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1768-132-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/860-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2520-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1244-187-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3024-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/292-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2132-252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1164-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1972-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1972-292-0x0000000077610000-0x000000007772F000-memory.dmp family_blackmoon behavioral1/memory/1972-294-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2204-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2608-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2488-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2516-340-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1636-383-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2660-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2584-397-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/780-479-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1408-485-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1016-528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2444-554-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2204-587-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2204-593-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2136-694-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2328-722-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2212-744-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1688-839-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1720-850-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1720-881-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2548-908-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1408-1033-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2260-1116-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1972-8521-0x0000000077610000-0x000000007772F000-memory.dmp family_blackmoon behavioral1/memory/1972-9911-0x0000000077610000-0x000000007772F000-memory.dmp family_blackmoon behavioral1/memory/1972-10189-0x0000000077610000-0x000000007772F000-memory.dmp family_blackmoon behavioral1/memory/1972-11817-0x0000000077610000-0x000000007772F000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3rlrxfr.exetnbbtt.exejdpvv.exe1fxrxrf.exe1httbt.exe9hhntn.exevpddd.exexlrlllr.exethtnbt.exehttttt.exerlfrlfr.exe5lrrxxr.exe5nbthh.exenbnttb.exe9fxfffl.exelxrrrrr.exenhttbb.exejdpjp.exedvppd.exerlxllfl.exelfxflrx.exehbnntt.exepdjjj.exejvjdv.exexlfxfxx.exe9htnnn.exehhthtb.exe1dvdp.exerrflrxl.exe9lxxrxx.exebnhntb.exedpvjp.exe7vjdp.exexrfxxfr.exe5fxrfxf.exetnhbnn.exe1btbhh.exe7pjpp.exepjvdj.exexxrllff.exe5xlrffl.exe1frxfrx.exenbnnbh.exenbbnnb.exe1dvjj.exevjvdj.exefxllrxf.exe7nbbhh.exehttbnn.exepjvvd.exejvvdj.exefxrlrrx.exexlxrfff.exefrxfllr.exe5bhhbb.exe5bnntb.exedvddj.exellxxlfl.exelfxlxrf.exerfrfrrx.exethnttt.exehtbnbt.exejvpjp.exe7vpdj.exepid process 1860 3rlrxfr.exe 3060 tnbbtt.exe 2684 jdpvv.exe 2632 1fxrxrf.exe 1108 1httbt.exe 2724 9hhntn.exe 2744 vpddd.exe 2512 xlrlllr.exe 3016 thtnbt.exe 2372 httttt.exe 1604 rlfrlfr.exe 2468 5lrrxxr.exe 1956 5nbthh.exe 236 nbnttb.exe 1768 9fxfffl.exe 2148 lxrrrrr.exe 2388 nhttbb.exe 1576 jdpjp.exe 1448 dvppd.exe 860 rlxllfl.exe 2520 lfxflrx.exe 1244 hbnntt.exe 2464 pdjjj.exe 2796 jvjdv.exe 772 xlfxfxx.exe 3024 9htnnn.exe 1160 hhthtb.exe 2100 1dvdp.exe 1964 rrflrxl.exe 292 9lxxrxx.exe 2132 bnhntb.exe 2216 dpvjp.exe 2188 7vjdp.exe 1796 xrfxxfr.exe 1164 5fxrfxf.exe 2320 tnhbnn.exe 2972 1btbhh.exe 1920 7pjpp.exe 1972 pjvdj.exe 2976 xxrllff.exe 2204 5xlrffl.exe 2672 1frxfrx.exe 2700 nbnnbh.exe 2608 nbbnnb.exe 2488 1dvjj.exe 2668 vjvdj.exe 2516 fxllrxf.exe 2724 7nbbhh.exe 2500 httbnn.exe 2936 pjvvd.exe 2300 jvvdj.exe 2932 fxrlrrx.exe 1600 xlxrfff.exe 1372 frxfllr.exe 1636 5bhhbb.exe 2660 5bnntb.exe 2584 dvddj.exe 1816 llxxlfl.exe 1800 lfxlxrf.exe 2400 rfrfrrx.exe 316 thnttt.exe 2808 htbnbt.exe 1708 jvpjp.exe 1640 7vpdj.exe -
Processes:
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3rlrxfr.exe upx behavioral1/memory/2084-7-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbbtt.exe upx behavioral1/memory/1860-14-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3060-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3060-24-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdpvv.exe upx C:\1fxrxrf.exe upx behavioral1/memory/2684-31-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1httbt.exe upx behavioral1/memory/2632-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1108-41-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9hhntn.exe upx behavioral1/memory/1108-48-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpddd.exe upx behavioral1/memory/2724-57-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\xlrlllr.exe upx behavioral1/memory/2744-66-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\thtnbt.exe upx behavioral1/memory/3016-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2512-74-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\httttt.exe upx behavioral1/memory/2372-84-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlfrlfr.exe upx behavioral1/memory/2372-92-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1604-99-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5lrrxxr.exe upx C:\5nbthh.exe upx behavioral1/memory/2468-108-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1956-112-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbnttb.exe upx C:\9fxfffl.exe upx behavioral1/memory/236-125-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxrrrrr.exe upx behavioral1/memory/1768-133-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhttbb.exe upx C:\jdpjp.exe upx behavioral1/memory/1576-149-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dvppd.exe upx C:\rlxllfl.exe upx \??\c:\lfxflrx.exe upx behavioral1/memory/860-171-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbnntt.exe upx behavioral1/memory/2520-173-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pdjjj.exe upx behavioral1/memory/1244-187-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jvjdv.exe upx C:\xlfxfxx.exe upx C:\9htnnn.exe upx C:\hhthtb.exe upx behavioral1/memory/3024-216-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1dvdp.exe upx C:\rrflrxl.exe upx C:\9lxxrxx.exe upx behavioral1/memory/292-244-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnhntb.exe upx behavioral1/memory/2132-252-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dpvjp.exe upx behavioral1/memory/1164-275-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1972-291-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1676-295-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2976-301-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2204-312-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe3rlrxfr.exetnbbtt.exejdpvv.exe1fxrxrf.exe1httbt.exe9hhntn.exevpddd.exexlrlllr.exethtnbt.exehttttt.exerlfrlfr.exe5lrrxxr.exe5nbthh.exenbnttb.exe9fxfffl.exedescription pid process target process PID 2084 wrote to memory of 1860 2084 040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe 3rlrxfr.exe PID 2084 wrote to memory of 1860 2084 040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe 3rlrxfr.exe PID 2084 wrote to memory of 1860 2084 040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe 3rlrxfr.exe PID 2084 wrote to memory of 1860 2084 040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe 3rlrxfr.exe PID 1860 wrote to memory of 3060 1860 3rlrxfr.exe tnbbtt.exe PID 1860 wrote to memory of 3060 1860 3rlrxfr.exe tnbbtt.exe PID 1860 wrote to memory of 3060 1860 3rlrxfr.exe tnbbtt.exe PID 1860 wrote to memory of 3060 1860 3rlrxfr.exe tnbbtt.exe PID 3060 wrote to memory of 2684 3060 tnbbtt.exe jdpvv.exe PID 3060 wrote to memory of 2684 3060 tnbbtt.exe jdpvv.exe PID 3060 wrote to memory of 2684 3060 tnbbtt.exe jdpvv.exe PID 3060 wrote to memory of 2684 3060 tnbbtt.exe jdpvv.exe PID 2684 wrote to memory of 2632 2684 jdpvv.exe 1fxrxrf.exe PID 2684 wrote to memory of 2632 2684 jdpvv.exe 1fxrxrf.exe PID 2684 wrote to memory of 2632 2684 jdpvv.exe 1fxrxrf.exe PID 2684 wrote to memory of 2632 2684 jdpvv.exe 1fxrxrf.exe PID 2632 wrote to memory of 1108 2632 1fxrxrf.exe 1httbt.exe PID 2632 wrote to memory of 1108 2632 1fxrxrf.exe 1httbt.exe PID 2632 wrote to memory of 1108 2632 1fxrxrf.exe 1httbt.exe PID 2632 wrote to memory of 1108 2632 1fxrxrf.exe 1httbt.exe PID 1108 wrote to memory of 2724 1108 1httbt.exe 9hhntn.exe PID 1108 wrote to memory of 2724 1108 1httbt.exe 9hhntn.exe PID 1108 wrote to memory of 2724 1108 1httbt.exe 9hhntn.exe PID 1108 wrote to memory of 2724 1108 1httbt.exe 9hhntn.exe PID 2724 wrote to memory of 2744 2724 9hhntn.exe vpddd.exe PID 2724 wrote to memory of 2744 2724 9hhntn.exe vpddd.exe PID 2724 wrote to memory of 2744 2724 9hhntn.exe vpddd.exe PID 2724 wrote to memory of 2744 2724 9hhntn.exe vpddd.exe PID 2744 wrote to memory of 2512 2744 vpddd.exe xlrlllr.exe PID 2744 wrote to memory of 2512 2744 vpddd.exe xlrlllr.exe PID 2744 wrote to memory of 2512 2744 vpddd.exe xlrlllr.exe PID 2744 wrote to memory of 2512 2744 vpddd.exe xlrlllr.exe PID 2512 wrote to memory of 3016 2512 xlrlllr.exe thtnbt.exe PID 2512 wrote to memory of 3016 2512 xlrlllr.exe thtnbt.exe PID 2512 wrote to memory of 3016 2512 xlrlllr.exe thtnbt.exe PID 2512 wrote to memory of 3016 2512 xlrlllr.exe thtnbt.exe PID 3016 wrote to memory of 2372 3016 thtnbt.exe httttt.exe PID 3016 wrote to memory of 2372 3016 thtnbt.exe httttt.exe PID 3016 wrote to memory of 2372 3016 thtnbt.exe httttt.exe PID 3016 wrote to memory of 2372 3016 thtnbt.exe httttt.exe PID 2372 wrote to memory of 1604 2372 httttt.exe rlfrlfr.exe PID 2372 wrote to memory of 1604 2372 httttt.exe rlfrlfr.exe PID 2372 wrote to memory of 1604 2372 httttt.exe rlfrlfr.exe PID 2372 wrote to memory of 1604 2372 httttt.exe rlfrlfr.exe PID 1604 wrote to memory of 2468 1604 rlfrlfr.exe 5lrrxxr.exe PID 1604 wrote to memory of 2468 1604 rlfrlfr.exe 5lrrxxr.exe PID 1604 wrote to memory of 2468 1604 rlfrlfr.exe 5lrrxxr.exe PID 1604 wrote to memory of 2468 1604 rlfrlfr.exe 5lrrxxr.exe PID 2468 wrote to memory of 1956 2468 5lrrxxr.exe 5nbthh.exe PID 2468 wrote to memory of 1956 2468 5lrrxxr.exe 5nbthh.exe PID 2468 wrote to memory of 1956 2468 5lrrxxr.exe 5nbthh.exe PID 2468 wrote to memory of 1956 2468 5lrrxxr.exe 5nbthh.exe PID 1956 wrote to memory of 236 1956 5nbthh.exe nbnttb.exe PID 1956 wrote to memory of 236 1956 5nbthh.exe nbnttb.exe PID 1956 wrote to memory of 236 1956 5nbthh.exe nbnttb.exe PID 1956 wrote to memory of 236 1956 5nbthh.exe nbnttb.exe PID 236 wrote to memory of 1768 236 nbnttb.exe 9fxfffl.exe PID 236 wrote to memory of 1768 236 nbnttb.exe 9fxfffl.exe PID 236 wrote to memory of 1768 236 nbnttb.exe 9fxfffl.exe PID 236 wrote to memory of 1768 236 nbnttb.exe 9fxfffl.exe PID 1768 wrote to memory of 2148 1768 9fxfffl.exe lxrrrrr.exe PID 1768 wrote to memory of 2148 1768 9fxfffl.exe lxrrrrr.exe PID 1768 wrote to memory of 2148 1768 9fxfffl.exe lxrrrrr.exe PID 1768 wrote to memory of 2148 1768 9fxfffl.exe lxrrrrr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\040595063bc3dab0a5f45266365469b3_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\3rlrxfr.exec:\3rlrxfr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\tnbbtt.exec:\tnbbtt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\jdpvv.exec:\jdpvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\1fxrxrf.exec:\1fxrxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\1httbt.exec:\1httbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\9hhntn.exec:\9hhntn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\vpddd.exec:\vpddd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\xlrlllr.exec:\xlrlllr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\thtnbt.exec:\thtnbt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\httttt.exec:\httttt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\rlfrlfr.exec:\rlfrlfr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\5lrrxxr.exec:\5lrrxxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\5nbthh.exec:\5nbthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\nbnttb.exec:\nbnttb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:236 -
\??\c:\9fxfffl.exec:\9fxfffl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\lxrrrrr.exec:\lxrrrrr.exe17⤵
- Executes dropped EXE
PID:2148 -
\??\c:\nhttbb.exec:\nhttbb.exe18⤵
- Executes dropped EXE
PID:2388 -
\??\c:\jdpjp.exec:\jdpjp.exe19⤵
- Executes dropped EXE
PID:1576 -
\??\c:\dvppd.exec:\dvppd.exe20⤵
- Executes dropped EXE
PID:1448 -
\??\c:\rlxllfl.exec:\rlxllfl.exe21⤵
- Executes dropped EXE
PID:860 -
\??\c:\lfxflrx.exec:\lfxflrx.exe22⤵
- Executes dropped EXE
PID:2520 -
\??\c:\hbnntt.exec:\hbnntt.exe23⤵
- Executes dropped EXE
PID:1244 -
\??\c:\pdjjj.exec:\pdjjj.exe24⤵
- Executes dropped EXE
PID:2464 -
\??\c:\jvjdv.exec:\jvjdv.exe25⤵
- Executes dropped EXE
PID:2796 -
\??\c:\xlfxfxx.exec:\xlfxfxx.exe26⤵
- Executes dropped EXE
PID:772 -
\??\c:\9htnnn.exec:\9htnnn.exe27⤵
- Executes dropped EXE
PID:3024 -
\??\c:\hhthtb.exec:\hhthtb.exe28⤵
- Executes dropped EXE
PID:1160 -
\??\c:\1dvdp.exec:\1dvdp.exe29⤵
- Executes dropped EXE
PID:2100 -
\??\c:\rrflrxl.exec:\rrflrxl.exe30⤵
- Executes dropped EXE
PID:1964 -
\??\c:\9lxxrxx.exec:\9lxxrxx.exe31⤵
- Executes dropped EXE
PID:292 -
\??\c:\bnhntb.exec:\bnhntb.exe32⤵
- Executes dropped EXE
PID:2132 -
\??\c:\dpvjp.exec:\dpvjp.exe33⤵
- Executes dropped EXE
PID:2216 -
\??\c:\7vjdp.exec:\7vjdp.exe34⤵
- Executes dropped EXE
PID:2188 -
\??\c:\xrfxxfr.exec:\xrfxxfr.exe35⤵
- Executes dropped EXE
PID:1796 -
\??\c:\5fxrfxf.exec:\5fxrfxf.exe36⤵
- Executes dropped EXE
PID:1164 -
\??\c:\tnhbnn.exec:\tnhbnn.exe37⤵
- Executes dropped EXE
PID:2320 -
\??\c:\1btbhh.exec:\1btbhh.exe38⤵
- Executes dropped EXE
PID:2972 -
\??\c:\7pjpp.exec:\7pjpp.exe39⤵
- Executes dropped EXE
PID:1920 -
\??\c:\pjvdj.exec:\pjvdj.exe40⤵
- Executes dropped EXE
PID:1972 -
\??\c:\frrfxff.exec:\frrfxff.exe41⤵PID:1676
-
\??\c:\xxrllff.exec:\xxrllff.exe42⤵
- Executes dropped EXE
PID:2976 -
\??\c:\5xlrffl.exec:\5xlrffl.exe43⤵
- Executes dropped EXE
PID:2204 -
\??\c:\1frxfrx.exec:\1frxfrx.exe44⤵
- Executes dropped EXE
PID:2672 -
\??\c:\nbnnbh.exec:\nbnnbh.exe45⤵
- Executes dropped EXE
PID:2700 -
\??\c:\nbbnnb.exec:\nbbnnb.exe46⤵
- Executes dropped EXE
PID:2608 -
\??\c:\1dvjj.exec:\1dvjj.exe47⤵
- Executes dropped EXE
PID:2488 -
\??\c:\vjvdj.exec:\vjvdj.exe48⤵
- Executes dropped EXE
PID:2668 -
\??\c:\fxllrxf.exec:\fxllrxf.exe49⤵
- Executes dropped EXE
PID:2516 -
\??\c:\7nbbhh.exec:\7nbbhh.exe50⤵
- Executes dropped EXE
PID:2724 -
\??\c:\httbnn.exec:\httbnn.exe51⤵
- Executes dropped EXE
PID:2500 -
\??\c:\pjvvd.exec:\pjvvd.exe52⤵
- Executes dropped EXE
PID:2936 -
\??\c:\jvvdj.exec:\jvvdj.exe53⤵
- Executes dropped EXE
PID:2300 -
\??\c:\fxrlrrx.exec:\fxrlrrx.exe54⤵
- Executes dropped EXE
PID:2932 -
\??\c:\xlxrfff.exec:\xlxrfff.exe55⤵
- Executes dropped EXE
PID:1600 -
\??\c:\frxfllr.exec:\frxfllr.exe56⤵
- Executes dropped EXE
PID:1372 -
\??\c:\5bhhbb.exec:\5bhhbb.exe57⤵
- Executes dropped EXE
PID:1636 -
\??\c:\5bnntb.exec:\5bnntb.exe58⤵
- Executes dropped EXE
PID:2660 -
\??\c:\dvddj.exec:\dvddj.exe59⤵
- Executes dropped EXE
PID:2584 -
\??\c:\llxxlfl.exec:\llxxlfl.exe60⤵
- Executes dropped EXE
PID:1816 -
\??\c:\lfxlxrf.exec:\lfxlxrf.exe61⤵
- Executes dropped EXE
PID:1800 -
\??\c:\rfrfrrx.exec:\rfrfrrx.exe62⤵
- Executes dropped EXE
PID:2400 -
\??\c:\thnttt.exec:\thnttt.exe63⤵
- Executes dropped EXE
PID:316 -
\??\c:\htbnbt.exec:\htbnbt.exe64⤵
- Executes dropped EXE
PID:2808 -
\??\c:\jvpjp.exec:\jvpjp.exe65⤵
- Executes dropped EXE
PID:1708 -
\??\c:\7vpdj.exec:\7vpdj.exe66⤵
- Executes dropped EXE
PID:1640 -
\??\c:\rlrrxxf.exec:\rlrrxxf.exe67⤵PID:1576
-
\??\c:\3frlxxx.exec:\3frlxxx.exe68⤵PID:1428
-
\??\c:\nbhntn.exec:\nbhntn.exe69⤵PID:2908
-
\??\c:\nhtntt.exec:\nhtntt.exe70⤵PID:2948
-
\??\c:\9jpvj.exec:\9jpvj.exe71⤵PID:2200
-
\??\c:\pjvvp.exec:\pjvvp.exe72⤵PID:2196
-
\??\c:\xflrrlx.exec:\xflrrlx.exe73⤵PID:2232
-
\??\c:\lfxfxrx.exec:\lfxfxrx.exe74⤵PID:780
-
\??\c:\nbbbhh.exec:\nbbbhh.exe75⤵PID:1408
-
\??\c:\ttnnhh.exec:\ttnnhh.exe76⤵PID:2996
-
\??\c:\3dvdd.exec:\3dvdd.exe77⤵PID:1808
-
\??\c:\xrflffx.exec:\xrflffx.exe78⤵PID:2104
-
\??\c:\7lrlxfl.exec:\7lrlxfl.exe79⤵PID:1724
-
\??\c:\7nnhnn.exec:\7nnhnn.exe80⤵PID:1312
-
\??\c:\bnthnt.exec:\bnthnt.exe81⤵PID:340
-
\??\c:\jdppv.exec:\jdppv.exe82⤵PID:1856
-
\??\c:\jdvvv.exec:\jdvvv.exe83⤵PID:840
-
\??\c:\xlxfrxr.exec:\xlxfrxr.exe84⤵PID:1016
-
\??\c:\xflrlrx.exec:\xflrlrx.exe85⤵PID:2060
-
\??\c:\hthnbb.exec:\hthnbb.exe86⤵PID:1592
-
\??\c:\3ttnnh.exec:\3ttnnh.exe87⤵PID:1796
-
\??\c:\jdpvv.exec:\jdpvv.exe88⤵PID:2292
-
\??\c:\vjpjv.exec:\vjpjv.exe89⤵PID:2444
-
\??\c:\1rfxflx.exec:\1rfxflx.exe90⤵PID:2972
-
\??\c:\5lxflfr.exec:\5lxflfr.exe91⤵PID:2856
-
\??\c:\tnbbhh.exec:\tnbbhh.exe92⤵PID:1216
-
\??\c:\nbttnt.exec:\nbttnt.exe93⤵PID:1536
-
\??\c:\5dpvj.exec:\5dpvj.exe94⤵PID:2976
-
\??\c:\dvjjp.exec:\dvjjp.exe95⤵PID:2204
-
\??\c:\rrlrffr.exec:\rrlrffr.exe96⤵PID:2676
-
\??\c:\5llrlll.exec:\5llrlll.exe97⤵PID:2700
-
\??\c:\hthhnh.exec:\hthhnh.exe98⤵PID:2644
-
\??\c:\nbnntn.exec:\nbnntn.exe99⤵PID:2508
-
\??\c:\3ddpv.exec:\3ddpv.exe100⤵PID:2648
-
\??\c:\5vjvj.exec:\5vjvj.exe101⤵PID:2748
-
\??\c:\fxflrrf.exec:\fxflrrf.exe102⤵PID:2724
-
\??\c:\5lfrffl.exec:\5lfrffl.exe103⤵PID:2928
-
\??\c:\ttbhtn.exec:\ttbhtn.exe104⤵PID:2936
-
\??\c:\7bntnn.exec:\7bntnn.exe105⤵PID:2944
-
\??\c:\pjvvv.exec:\pjvvv.exe106⤵PID:1780
-
\??\c:\pjdjv.exec:\pjdjv.exe107⤵PID:2456
-
\??\c:\pdvdd.exec:\pdvdd.exe108⤵PID:1368
-
\??\c:\rfrlfrx.exec:\rfrlfrx.exe109⤵PID:1952
-
\??\c:\thtthb.exec:\thtthb.exe110⤵PID:2156
-
\??\c:\3bhnnn.exec:\3bhnnn.exe111⤵PID:1268
-
\??\c:\tntthn.exec:\tntthn.exe112⤵PID:1552
-
\??\c:\vpjpp.exec:\vpjpp.exe113⤵PID:1940
-
\??\c:\pjddd.exec:\pjddd.exe114⤵PID:2136
-
\??\c:\xrxxffx.exec:\xrxxffx.exe115⤵PID:316
-
\??\c:\bntbnn.exec:\bntbnn.exe116⤵PID:1572
-
\??\c:\nhnthb.exec:\nhnthb.exe117⤵PID:2388
-
\??\c:\jdpdp.exec:\jdpdp.exe118⤵PID:1188
-
\??\c:\jvjpv.exec:\jvjpv.exe119⤵PID:2328
-
\??\c:\xlrxfrx.exec:\xlrxfrx.exe120⤵PID:2424
-
\??\c:\9rffrrl.exec:\9rffrrl.exe121⤵PID:2088
-
\??\c:\bnbnhh.exec:\bnbnhh.exe122⤵PID:2868
-
\??\c:\thtbnt.exec:\thtbnt.exe123⤵PID:1900
-
\??\c:\jvjjp.exec:\jvjjp.exe124⤵PID:2212
-
\??\c:\1jpvp.exec:\1jpvp.exe125⤵PID:2232
-
\??\c:\1xxfrlr.exec:\1xxfrlr.exe126⤵PID:704
-
\??\c:\lfrxfff.exec:\lfrxfff.exe127⤵PID:1076
-
\??\c:\hthnnn.exec:\hthnnn.exe128⤵PID:1208
-
\??\c:\1htnnb.exec:\1htnnb.exe129⤵PID:1744
-
\??\c:\ppjjp.exec:\ppjjp.exe130⤵PID:1736
-
\??\c:\dvdjj.exec:\dvdjj.exe131⤵PID:928
-
\??\c:\1fxlllx.exec:\1fxlllx.exe132⤵PID:2360
-
\??\c:\lrxxfxf.exec:\lrxxfxf.exe133⤵PID:340
-
\??\c:\bntttb.exec:\bntttb.exe134⤵PID:612
-
\??\c:\nbhnbt.exec:\nbhnbt.exe135⤵PID:840
-
\??\c:\pjvdd.exec:\pjvdd.exe136⤵PID:668
-
\??\c:\3jdvp.exec:\3jdvp.exe137⤵PID:1348
-
\??\c:\llxfrxl.exec:\llxfrxl.exe138⤵PID:836
-
\??\c:\tnbbbh.exec:\tnbbbh.exe139⤵PID:1796
-
\??\c:\nnbhbh.exec:\nnbhbh.exe140⤵PID:1436
-
\??\c:\bnhhnt.exec:\bnhhnt.exe141⤵PID:1916
-
\??\c:\7vppj.exec:\7vppj.exe142⤵PID:1688
-
\??\c:\lxxxxxx.exec:\lxxxxxx.exe143⤵PID:1720
-
\??\c:\1nbhtt.exec:\1nbhtt.exe144⤵PID:1504
-
\??\c:\pjpvd.exec:\pjpvd.exe145⤵PID:2344
-
\??\c:\7pvjp.exec:\7pvjp.exe146⤵PID:2704
-
\??\c:\frxfflr.exec:\frxfflr.exe147⤵PID:2756
-
\??\c:\lxrrffl.exec:\lxrrffl.exe148⤵PID:2616
-
\??\c:\htthht.exec:\htthht.exe149⤵PID:3056
-
\??\c:\pdpvd.exec:\pdpvd.exe150⤵PID:2304
-
\??\c:\jvjvp.exec:\jvjvp.exe151⤵PID:2816
-
\??\c:\jdvvj.exec:\jdvvj.exe152⤵PID:2492
-
\??\c:\3frxxxl.exec:\3frxxxl.exe153⤵PID:2548
-
\??\c:\rrffrlr.exec:\rrffrlr.exe154⤵PID:2308
-
\??\c:\tnnntt.exec:\tnnntt.exe155⤵PID:2512
-
\??\c:\bbnntt.exec:\bbnntt.exe156⤵PID:1508
-
\??\c:\vjvvp.exec:\vjvvp.exe157⤵PID:1780
-
\??\c:\vpddd.exec:\vpddd.exe158⤵PID:1644
-
\??\c:\xlflrxx.exec:\xlflrxx.exe159⤵PID:1368
-
\??\c:\lflrffx.exec:\lflrffx.exe160⤵PID:2792
-
\??\c:\3nbhnn.exec:\3nbhnn.exe161⤵PID:1740
-
\??\c:\7bbttt.exec:\7bbttt.exe162⤵PID:756
-
\??\c:\1dpvd.exec:\1dpvd.exe163⤵PID:1924
-
\??\c:\jvppj.exec:\jvppj.exe164⤵PID:1928
-
\??\c:\xlfllrr.exec:\xlfllrr.exe165⤵PID:1980
-
\??\c:\frflrrx.exec:\frflrrx.exe166⤵PID:2136
-
\??\c:\ntthtb.exec:\ntthtb.exe167⤵PID:316
-
\??\c:\nnbbbb.exec:\nnbbbb.exe168⤵PID:2812
-
\??\c:\9bbhnh.exec:\9bbhnh.exe169⤵PID:1448
-
\??\c:\jjjpp.exec:\jjjpp.exe170⤵PID:3044
-
\??\c:\dvpvv.exec:\dvpvv.exe171⤵PID:2952
-
\??\c:\rrflrrf.exec:\rrflrrf.exe172⤵PID:2000
-
\??\c:\fxlllrr.exec:\fxlllrr.exe173⤵PID:2876
-
\??\c:\tnbntt.exec:\tnbntt.exe174⤵PID:2460
-
\??\c:\bnbbhn.exec:\bnbbhn.exe175⤵PID:592
-
\??\c:\5vjpj.exec:\5vjpj.exe176⤵PID:876
-
\??\c:\5vdpp.exec:\5vdpp.exe177⤵PID:2880
-
\??\c:\5djpv.exec:\5djpv.exe178⤵PID:1408
-
\??\c:\9flflrx.exec:\9flflrx.exe179⤵PID:3028
-
\??\c:\xrflxxf.exec:\xrflxxf.exe180⤵PID:2116
-
\??\c:\hbnbnn.exec:\hbnbnn.exe181⤵PID:1276
-
\??\c:\btbnhb.exec:\btbnhb.exe182⤵PID:2104
-
\??\c:\vjdvv.exec:\vjdvv.exe183⤵PID:928
-
\??\c:\7pvdd.exec:\7pvdd.exe184⤵PID:1000
-
\??\c:\rlxxrlf.exec:\rlxxrlf.exe185⤵PID:2132
-
\??\c:\xrfxffl.exec:\xrfxffl.exe186⤵PID:2956
-
\??\c:\thtthb.exec:\thtthb.exe187⤵PID:2836
-
\??\c:\1nttbb.exec:\1nttbb.exe188⤵PID:2188
-
\??\c:\ttnbnt.exec:\ttnbnt.exe189⤵PID:668
-
\??\c:\dvppd.exec:\dvppd.exe190⤵PID:1164
-
\??\c:\vjdvd.exec:\vjdvd.exe191⤵PID:888
-
\??\c:\rflrlrr.exec:\rflrlrr.exe192⤵PID:2180
-
\??\c:\rlllrll.exec:\rlllrll.exe193⤵PID:2260
-
\??\c:\7hnthb.exec:\7hnthb.exe194⤵PID:2972
-
\??\c:\9tnttb.exec:\9tnttb.exe195⤵PID:1216
-
\??\c:\9dvpd.exec:\9dvpd.exe196⤵PID:2032
-
\??\c:\dpdjd.exec:\dpdjd.exe197⤵PID:2696
-
\??\c:\rlxlrxl.exec:\rlxlrxl.exe198⤵PID:2708
-
\??\c:\9tnnbh.exec:\9tnnbh.exe199⤵PID:2732
-
\??\c:\pdvpp.exec:\pdvpp.exe200⤵PID:2616
-
\??\c:\9vvvj.exec:\9vvvj.exe201⤵PID:2488
-
\??\c:\rrxrxxr.exec:\rrxrxxr.exe202⤵PID:1108
-
\??\c:\9xxxllx.exec:\9xxxllx.exe203⤵PID:2648
-
\??\c:\nhtthn.exec:\nhtthn.exe204⤵PID:2560
-
\??\c:\hbhthn.exec:\hbhthn.exe205⤵PID:2500
-
\??\c:\pjpvj.exec:\pjpvj.exe206⤵PID:2308
-
\??\c:\fxllfxf.exec:\fxllfxf.exe207⤵PID:2544
-
\??\c:\xrxffxf.exec:\xrxffxf.exe208⤵PID:2512
-
\??\c:\bnbhtt.exec:\bnbhtt.exe209⤵PID:1656
-
\??\c:\hbtbhb.exec:\hbtbhb.exe210⤵PID:2540
-
\??\c:\jvjpv.exec:\jvjpv.exe211⤵PID:2456
-
\??\c:\3vdjp.exec:\3vdjp.exe212⤵PID:1772
-
\??\c:\rfxxxfl.exec:\rfxxxfl.exe213⤵PID:1548
-
\??\c:\rlxlxxr.exec:\rlxlxxr.exe214⤵PID:236
-
\??\c:\9bntbb.exec:\9bntbb.exe215⤵PID:1800
-
\??\c:\hthhhh.exec:\hthhhh.exe216⤵PID:1924
-
\??\c:\9pdpv.exec:\9pdpv.exe217⤵PID:2396
-
\??\c:\ppjdp.exec:\ppjdp.exe218⤵PID:1512
-
\??\c:\lxfrrff.exec:\lxfrrff.exe219⤵PID:2820
-
\??\c:\rlflxff.exec:\rlflxff.exe220⤵PID:2812
-
\??\c:\nhnntn.exec:\nhnntn.exe221⤵PID:1188
-
\??\c:\thnbbb.exec:\thnbbb.exe222⤵PID:2316
-
\??\c:\dvjpp.exec:\dvjpp.exe223⤵PID:2920
-
\??\c:\pjddv.exec:\pjddv.exe224⤵PID:2908
-
\??\c:\rllrflx.exec:\rllrflx.exe225⤵PID:2088
-
\??\c:\fllffrx.exec:\fllffrx.exe226⤵PID:2460
-
\??\c:\thhbbb.exec:\thhbbb.exe227⤵PID:980
-
\??\c:\bnthhb.exec:\bnthhb.exe228⤵PID:592
-
\??\c:\pdpvd.exec:\pdpvd.exe229⤵PID:908
-
\??\c:\dvvpp.exec:\dvvpp.exe230⤵PID:2880
-
\??\c:\7rffllx.exec:\7rffllx.exe231⤵PID:1408
-
\??\c:\9rlfllr.exec:\9rlfllr.exe232⤵PID:1128
-
\??\c:\rfflrrr.exec:\rfflrrr.exe233⤵PID:1208
-
\??\c:\nhthnn.exec:\nhthnn.exe234⤵PID:1276
-
\??\c:\7nhntb.exec:\7nhntb.exe235⤵PID:556
-
\??\c:\1jpvj.exec:\1jpvj.exe236⤵PID:928
-
\??\c:\vpjdd.exec:\vpjdd.exe237⤵PID:868
-
\??\c:\pjvdj.exec:\pjvdj.exe238⤵PID:1184
-
\??\c:\rlxfrlr.exec:\rlxfrlr.exe239⤵PID:2956
-
\??\c:\xlxfrlr.exec:\xlxfrlr.exe240⤵PID:1016
-
\??\c:\htnttn.exec:\htnttn.exe241⤵PID:2176
-
\??\c:\5htttb.exec:\5htttb.exe242⤵PID:2004