Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 23:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe
-
Size
199KB
-
MD5
5bf5a2dea8bd521d15db82dfbedd2c09
-
SHA1
7c63579fdf8f0639a90a0e520eab24980efff31b
-
SHA256
2370ca21360736bc3f7eec84b2d26fae4e3b676a2471a2609851b1b16415aa1a
-
SHA512
18c632be7f7a41e180f9f2fb1573b7845de634121b8ab71d037477775a4df0630d7cf7461dab1dbcccf950146cb375e805a7c9c3289c6916a590f61675667181
-
SSDEEP
1536:PvQBeOGtrYSSsrc93UBIfdC67m6AJiqyvU2r1vsKM4ltg:PhOm2sI93UufdC67cihvH1Sz
Malware Config
Signatures
-
Detect Blackmoon payload 48 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-0-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3004-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-63-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2424-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/964-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1332-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2808-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/764-149-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/764-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/764-150-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2808-162-0x00000000005C0000-0x00000000005E9000-memory.dmp family_blackmoon behavioral1/memory/1660-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1732-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-209-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/3052-208-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/676-219-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1200-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1116-237-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1728-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-308-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-321-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-388-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-387-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2424-395-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/532-402-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/276-459-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/764-468-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1260-487-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1416-549-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/560-575-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1432-614-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-635-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-642-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1172-693-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2232-706-0x00000000001B0000-0x00000000001D9000-memory.dmp family_blackmoon behavioral1/memory/2232-707-0x00000000001B0000-0x00000000001D9000-memory.dmp family_blackmoon behavioral1/memory/1324-745-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2232-743-0x00000000001B0000-0x00000000001D9000-memory.dmp family_blackmoon behavioral1/memory/1140-853-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
xnxpr.exeptrvf.exenllhdfv.exehfbrj.exexndnpt.exevhxhfhx.exexjdtvxh.exepdtlpt.exexldtdj.exefjhnx.exelrtptt.exellnnbd.exepvljvt.exehfrxj.exehbhnbdd.exepxttd.exepbhdbh.exehjxhx.exehfhthv.exerthdj.exetjfbn.exebhvrbb.exetlhnxn.exehhnrpp.exefjrdr.exeljhtlx.exeftjft.exethlhlbn.exejdldrj.exefdjjhh.exedntdfh.exerbxdjp.exefldrtv.exejhrvnx.exevtxndv.exexfjxp.exepddxpjj.exextbpjd.exeddnjd.exelhtxx.exebdnxx.exeppvpjx.exelrbvtrh.exebjtnjbv.exetbtvt.exepltdjb.exetphnrp.exethbpb.exepdpnbf.exedjnhxl.exebvnnhj.exepvnphpv.exevllnrv.exexnrhp.exejptppr.exebhbltnp.exedppfv.exelpfhxj.exebvfhx.exejvrfrpl.exexftdt.exepbjlltf.exejppfdt.exeplxnj.exepid process 2356 xnxpr.exe 3004 ptrvf.exe 2692 nllhdfv.exe 2644 hfbrj.exe 2680 xndnpt.exe 2704 vhxhfhx.exe 2424 xjdtvxh.exe 1164 pdtlpt.exe 964 xldtdj.exe 1332 fjhnx.exe 2808 lrtptt.exe 2940 llnnbd.exe 2012 pvljvt.exe 1640 hfrxj.exe 764 hbhnbdd.exe 2520 pxttd.exe 1036 pbhdbh.exe 1660 hjxhx.exe 1732 hfhthv.exe 3056 rthdj.exe 3052 tjfbn.exe 676 bhvrbb.exe 1200 tlhnxn.exe 1116 hhnrpp.exe 1440 fjrdr.exe 1060 ljhtlx.exe 1812 ftjft.exe 908 thlhlbn.exe 1728 jdldrj.exe 844 fdjjhh.exe 2740 dntdfh.exe 1300 rbxdjp.exe 1632 fldrtv.exe 2952 jhrvnx.exe 1572 vtxndv.exe 2032 xfjxp.exe 2616 pddxpjj.exe 2632 xtbpjd.exe 2576 ddnjd.exe 2556 lhtxx.exe 2676 bdnxx.exe 2680 ppvpjx.exe 2028 lrbvtrh.exe 2468 bjtnjbv.exe 2424 tbtvt.exe 532 pltdjb.exe 2736 tphnrp.exe 2268 thbpb.exe 2824 pdpnbf.exe 2832 djnhxl.exe 1048 bvnnhj.exe 1676 pvnphpv.exe 1296 vllnrv.exe 1640 xnrhp.exe 276 jptppr.exe 764 bhbltnp.exe 1744 dppfv.exe 1664 lpfhxj.exe 1260 bvfhx.exe 2288 jvrfrpl.exe 2860 xftdt.exe 3016 pbjlltf.exe 1680 jppfdt.exe 3060 plxnj.exe -
Processes:
resource yara_rule behavioral1/memory/1704-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/964-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1332-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/764-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1660-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1732-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1200-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-308-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-321-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-346-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-361-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-388-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-395-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/532-402-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/276-459-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/764-468-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1260-487-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-496-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-516-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1672-550-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/560-575-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1316-582-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1432-614-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-615-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-635-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-642-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-649-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-668-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-752-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-760-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3012-798-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1140-853-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-878-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exexnxpr.exeptrvf.exenllhdfv.exehfbrj.exexndnpt.exevhxhfhx.exexjdtvxh.exepdtlpt.exexldtdj.exefjhnx.exelrtptt.exellnnbd.exepvljvt.exehfrxj.exehbhnbdd.exedescription pid process target process PID 1704 wrote to memory of 2356 1704 5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe xnxpr.exe PID 1704 wrote to memory of 2356 1704 5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe xnxpr.exe PID 1704 wrote to memory of 2356 1704 5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe xnxpr.exe PID 1704 wrote to memory of 2356 1704 5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe xnxpr.exe PID 2356 wrote to memory of 3004 2356 xnxpr.exe ptrvf.exe PID 2356 wrote to memory of 3004 2356 xnxpr.exe ptrvf.exe PID 2356 wrote to memory of 3004 2356 xnxpr.exe ptrvf.exe PID 2356 wrote to memory of 3004 2356 xnxpr.exe ptrvf.exe PID 3004 wrote to memory of 2692 3004 ptrvf.exe nllhdfv.exe PID 3004 wrote to memory of 2692 3004 ptrvf.exe nllhdfv.exe PID 3004 wrote to memory of 2692 3004 ptrvf.exe nllhdfv.exe PID 3004 wrote to memory of 2692 3004 ptrvf.exe nllhdfv.exe PID 2692 wrote to memory of 2644 2692 nllhdfv.exe hfbrj.exe PID 2692 wrote to memory of 2644 2692 nllhdfv.exe hfbrj.exe PID 2692 wrote to memory of 2644 2692 nllhdfv.exe hfbrj.exe PID 2692 wrote to memory of 2644 2692 nllhdfv.exe hfbrj.exe PID 2644 wrote to memory of 2680 2644 hfbrj.exe xndnpt.exe PID 2644 wrote to memory of 2680 2644 hfbrj.exe xndnpt.exe PID 2644 wrote to memory of 2680 2644 hfbrj.exe xndnpt.exe PID 2644 wrote to memory of 2680 2644 hfbrj.exe xndnpt.exe PID 2680 wrote to memory of 2704 2680 xndnpt.exe vhxhfhx.exe PID 2680 wrote to memory of 2704 2680 xndnpt.exe vhxhfhx.exe PID 2680 wrote to memory of 2704 2680 xndnpt.exe vhxhfhx.exe PID 2680 wrote to memory of 2704 2680 xndnpt.exe vhxhfhx.exe PID 2704 wrote to memory of 2424 2704 vhxhfhx.exe xjdtvxh.exe PID 2704 wrote to memory of 2424 2704 vhxhfhx.exe xjdtvxh.exe PID 2704 wrote to memory of 2424 2704 vhxhfhx.exe xjdtvxh.exe PID 2704 wrote to memory of 2424 2704 vhxhfhx.exe xjdtvxh.exe PID 2424 wrote to memory of 1164 2424 xjdtvxh.exe pdtlpt.exe PID 2424 wrote to memory of 1164 2424 xjdtvxh.exe pdtlpt.exe PID 2424 wrote to memory of 1164 2424 xjdtvxh.exe pdtlpt.exe PID 2424 wrote to memory of 1164 2424 xjdtvxh.exe pdtlpt.exe PID 1164 wrote to memory of 964 1164 pdtlpt.exe xldtdj.exe PID 1164 wrote to memory of 964 1164 pdtlpt.exe xldtdj.exe PID 1164 wrote to memory of 964 1164 pdtlpt.exe xldtdj.exe PID 1164 wrote to memory of 964 1164 pdtlpt.exe xldtdj.exe PID 964 wrote to memory of 1332 964 xldtdj.exe fjhnx.exe PID 964 wrote to memory of 1332 964 xldtdj.exe fjhnx.exe PID 964 wrote to memory of 1332 964 xldtdj.exe fjhnx.exe PID 964 wrote to memory of 1332 964 xldtdj.exe fjhnx.exe PID 1332 wrote to memory of 2808 1332 fjhnx.exe lrtptt.exe PID 1332 wrote to memory of 2808 1332 fjhnx.exe lrtptt.exe PID 1332 wrote to memory of 2808 1332 fjhnx.exe lrtptt.exe PID 1332 wrote to memory of 2808 1332 fjhnx.exe lrtptt.exe PID 2808 wrote to memory of 2940 2808 lrtptt.exe llnnbd.exe PID 2808 wrote to memory of 2940 2808 lrtptt.exe llnnbd.exe PID 2808 wrote to memory of 2940 2808 lrtptt.exe llnnbd.exe PID 2808 wrote to memory of 2940 2808 lrtptt.exe llnnbd.exe PID 2940 wrote to memory of 2012 2940 llnnbd.exe pvljvt.exe PID 2940 wrote to memory of 2012 2940 llnnbd.exe pvljvt.exe PID 2940 wrote to memory of 2012 2940 llnnbd.exe pvljvt.exe PID 2940 wrote to memory of 2012 2940 llnnbd.exe pvljvt.exe PID 2012 wrote to memory of 1640 2012 pvljvt.exe hfrxj.exe PID 2012 wrote to memory of 1640 2012 pvljvt.exe hfrxj.exe PID 2012 wrote to memory of 1640 2012 pvljvt.exe hfrxj.exe PID 2012 wrote to memory of 1640 2012 pvljvt.exe hfrxj.exe PID 1640 wrote to memory of 764 1640 hfrxj.exe hbhnbdd.exe PID 1640 wrote to memory of 764 1640 hfrxj.exe hbhnbdd.exe PID 1640 wrote to memory of 764 1640 hfrxj.exe hbhnbdd.exe PID 1640 wrote to memory of 764 1640 hfrxj.exe hbhnbdd.exe PID 764 wrote to memory of 2520 764 hbhnbdd.exe pxttd.exe PID 764 wrote to memory of 2520 764 hbhnbdd.exe pxttd.exe PID 764 wrote to memory of 2520 764 hbhnbdd.exe pxttd.exe PID 764 wrote to memory of 2520 764 hbhnbdd.exe pxttd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5bf5a2dea8bd521d15db82dfbedd2c09_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\xnxpr.exec:\xnxpr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\ptrvf.exec:\ptrvf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\nllhdfv.exec:\nllhdfv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\hfbrj.exec:\hfbrj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\xndnpt.exec:\xndnpt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\vhxhfhx.exec:\vhxhfhx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\xjdtvxh.exec:\xjdtvxh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\pdtlpt.exec:\pdtlpt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\xldtdj.exec:\xldtdj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\fjhnx.exec:\fjhnx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\lrtptt.exec:\lrtptt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\llnnbd.exec:\llnnbd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\pvljvt.exec:\pvljvt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\hfrxj.exec:\hfrxj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\hbhnbdd.exec:\hbhnbdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\pxttd.exec:\pxttd.exe17⤵
- Executes dropped EXE
PID:2520 -
\??\c:\pbhdbh.exec:\pbhdbh.exe18⤵
- Executes dropped EXE
PID:1036 -
\??\c:\hjxhx.exec:\hjxhx.exe19⤵
- Executes dropped EXE
PID:1660 -
\??\c:\hfhthv.exec:\hfhthv.exe20⤵
- Executes dropped EXE
PID:1732 -
\??\c:\rthdj.exec:\rthdj.exe21⤵
- Executes dropped EXE
PID:3056 -
\??\c:\tjfbn.exec:\tjfbn.exe22⤵
- Executes dropped EXE
PID:3052 -
\??\c:\bhvrbb.exec:\bhvrbb.exe23⤵
- Executes dropped EXE
PID:676 -
\??\c:\tlhnxn.exec:\tlhnxn.exe24⤵
- Executes dropped EXE
PID:1200 -
\??\c:\hhnrpp.exec:\hhnrpp.exe25⤵
- Executes dropped EXE
PID:1116 -
\??\c:\fjrdr.exec:\fjrdr.exe26⤵
- Executes dropped EXE
PID:1440 -
\??\c:\ljhtlx.exec:\ljhtlx.exe27⤵
- Executes dropped EXE
PID:1060 -
\??\c:\ftjft.exec:\ftjft.exe28⤵
- Executes dropped EXE
PID:1812 -
\??\c:\thlhlbn.exec:\thlhlbn.exe29⤵
- Executes dropped EXE
PID:908 -
\??\c:\jdldrj.exec:\jdldrj.exe30⤵
- Executes dropped EXE
PID:1728 -
\??\c:\fdjjhh.exec:\fdjjhh.exe31⤵
- Executes dropped EXE
PID:844 -
\??\c:\dntdfh.exec:\dntdfh.exe32⤵
- Executes dropped EXE
PID:2740 -
\??\c:\rbxdjp.exec:\rbxdjp.exe33⤵
- Executes dropped EXE
PID:1300 -
\??\c:\fldrtv.exec:\fldrtv.exe34⤵
- Executes dropped EXE
PID:1632 -
\??\c:\jhrvnx.exec:\jhrvnx.exe35⤵
- Executes dropped EXE
PID:2952 -
\??\c:\vtxndv.exec:\vtxndv.exe36⤵
- Executes dropped EXE
PID:1572 -
\??\c:\xfjxp.exec:\xfjxp.exe37⤵
- Executes dropped EXE
PID:2032 -
\??\c:\pddxpjj.exec:\pddxpjj.exe38⤵
- Executes dropped EXE
PID:2616 -
\??\c:\xtbpjd.exec:\xtbpjd.exe39⤵
- Executes dropped EXE
PID:2632 -
\??\c:\ddnjd.exec:\ddnjd.exe40⤵
- Executes dropped EXE
PID:2576 -
\??\c:\lhtxx.exec:\lhtxx.exe41⤵
- Executes dropped EXE
PID:2556 -
\??\c:\bdnxx.exec:\bdnxx.exe42⤵
- Executes dropped EXE
PID:2676 -
\??\c:\ppvpjx.exec:\ppvpjx.exe43⤵
- Executes dropped EXE
PID:2680 -
\??\c:\lrbvtrh.exec:\lrbvtrh.exe44⤵
- Executes dropped EXE
PID:2028 -
\??\c:\bjtnjbv.exec:\bjtnjbv.exe45⤵
- Executes dropped EXE
PID:2468 -
\??\c:\tbtvt.exec:\tbtvt.exe46⤵
- Executes dropped EXE
PID:2424 -
\??\c:\pltdjb.exec:\pltdjb.exe47⤵
- Executes dropped EXE
PID:532 -
\??\c:\tphnrp.exec:\tphnrp.exe48⤵
- Executes dropped EXE
PID:2736 -
\??\c:\thbpb.exec:\thbpb.exe49⤵
- Executes dropped EXE
PID:2268 -
\??\c:\pdpnbf.exec:\pdpnbf.exe50⤵
- Executes dropped EXE
PID:2824 -
\??\c:\djnhxl.exec:\djnhxl.exe51⤵
- Executes dropped EXE
PID:2832 -
\??\c:\bvnnhj.exec:\bvnnhj.exe52⤵
- Executes dropped EXE
PID:1048 -
\??\c:\pvnphpv.exec:\pvnphpv.exe53⤵
- Executes dropped EXE
PID:1676 -
\??\c:\vllnrv.exec:\vllnrv.exe54⤵
- Executes dropped EXE
PID:1296 -
\??\c:\xnrhp.exec:\xnrhp.exe55⤵
- Executes dropped EXE
PID:1640 -
\??\c:\jptppr.exec:\jptppr.exe56⤵
- Executes dropped EXE
PID:276 -
\??\c:\bhbltnp.exec:\bhbltnp.exe57⤵
- Executes dropped EXE
PID:764 -
\??\c:\dppfv.exec:\dppfv.exe58⤵
- Executes dropped EXE
PID:1744 -
\??\c:\lpfhxj.exec:\lpfhxj.exe59⤵
- Executes dropped EXE
PID:1664 -
\??\c:\bvfhx.exec:\bvfhx.exe60⤵
- Executes dropped EXE
PID:1260 -
\??\c:\jvrfrpl.exec:\jvrfrpl.exe61⤵
- Executes dropped EXE
PID:2288 -
\??\c:\xftdt.exec:\xftdt.exe62⤵
- Executes dropped EXE
PID:2860 -
\??\c:\pbjlltf.exec:\pbjlltf.exe63⤵
- Executes dropped EXE
PID:3016 -
\??\c:\jppfdt.exec:\jppfdt.exe64⤵
- Executes dropped EXE
PID:1680 -
\??\c:\plxnj.exec:\plxnj.exe65⤵
- Executes dropped EXE
PID:3060 -
\??\c:\tlftnlh.exec:\tlftnlh.exe66⤵PID:1304
-
\??\c:\rrbjxnt.exec:\rrbjxnt.exe67⤵PID:3040
-
\??\c:\vvffrv.exec:\vvffrv.exe68⤵PID:1476
-
\??\c:\xjrlrp.exec:\xjrlrp.exe69⤵PID:1416
-
\??\c:\tlfbh.exec:\tlfbh.exe70⤵PID:1672
-
\??\c:\ppjrrrp.exec:\ppjrrrp.exe71⤵PID:1756
-
\??\c:\hbdvvl.exec:\hbdvvl.exe72⤵PID:1816
-
\??\c:\ffnvxpl.exec:\ffnvxpl.exe73⤵PID:560
-
\??\c:\jxhhl.exec:\jxhhl.exe74⤵PID:2960
-
\??\c:\jrfjtj.exec:\jrfjtj.exe75⤵PID:1316
-
\??\c:\njvdf.exec:\njvdf.exe76⤵PID:844
-
\??\c:\rtxbf.exec:\rtxbf.exe77⤵PID:1932
-
\??\c:\jhhdd.exec:\jhhdd.exe78⤵PID:1596
-
\??\c:\bdxbvfn.exec:\bdxbvfn.exe79⤵PID:1432
-
\??\c:\nndddv.exec:\nndddv.exe80⤵PID:2836
-
\??\c:\jnfjpvd.exec:\jnfjpvd.exe81⤵PID:2984
-
\??\c:\bfbnvhr.exec:\bfbnvhr.exe82⤵PID:2552
-
\??\c:\vvjbxbv.exec:\vvjbxbv.exe83⤵PID:2528
-
\??\c:\hxhjh.exec:\hxhjh.exe84⤵PID:2648
-
\??\c:\llttf.exec:\llttf.exe85⤵PID:2532
-
\??\c:\jfnxbp.exec:\jfnxbp.exe86⤵PID:2712
-
\??\c:\prbthxv.exec:\prbthxv.exe87⤵PID:2584
-
\??\c:\tpvht.exec:\tpvht.exe88⤵PID:2420
-
\??\c:\vhjnj.exec:\vhjnj.exe89⤵PID:2920
-
\??\c:\vjnfnx.exec:\vjnfnx.exe90⤵PID:2380
-
\??\c:\jrtpf.exec:\jrtpf.exe91⤵PID:1172
-
\??\c:\hjtrbp.exec:\hjtrbp.exe92⤵PID:1964
-
\??\c:\brjrdl.exec:\brjrdl.exe93⤵PID:2232
-
\??\c:\ppvnfb.exec:\ppvnfb.exe94⤵PID:2760
-
\??\c:\ppdtnv.exec:\ppdtnv.exe95⤵PID:2784
-
\??\c:\rnthjrj.exec:\rnthjrj.exe96⤵PID:2820
-
\??\c:\hjjxb.exec:\hjjxb.exe97⤵PID:1892
-
\??\c:\dvftdb.exec:\dvftdb.exe98⤵PID:952
-
\??\c:\njtfvp.exec:\njtfvp.exe99⤵PID:1324
-
\??\c:\lbntt.exec:\lbntt.exe100⤵PID:944
-
\??\c:\hthfrx.exec:\hthfrx.exe101⤵PID:2484
-
\??\c:\dxtvt.exec:\dxtvt.exe102⤵PID:2524
-
\??\c:\pfrdff.exec:\pfrdff.exe103⤵PID:2512
-
\??\c:\hpljxvh.exec:\hpljxvh.exe104⤵PID:2300
-
\??\c:\nlllx.exec:\nlllx.exe105⤵PID:1784
-
\??\c:\pfrhld.exec:\pfrhld.exe106⤵PID:2392
-
\??\c:\ltfnn.exec:\ltfnn.exe107⤵PID:840
-
\??\c:\drtbdnx.exec:\drtbdnx.exe108⤵PID:3012
-
\??\c:\pxtrhrf.exec:\pxtrhrf.exe109⤵PID:2860
-
\??\c:\bfvjfvv.exec:\bfvjfvv.exe110⤵PID:2076
-
\??\c:\hvlnljh.exec:\hvlnljh.exe111⤵PID:1680
-
\??\c:\vrljfx.exec:\vrljfx.exe112⤵PID:3060
-
\??\c:\frdxh.exec:\frdxh.exe113⤵PID:804
-
\??\c:\fnddtt.exec:\fnddtt.exe114⤵PID:1128
-
\??\c:\hbdfnbh.exec:\hbdfnbh.exe115⤵PID:1384
-
\??\c:\fjhtv.exec:\fjhtv.exe116⤵PID:976
-
\??\c:\jndnpt.exec:\jndnpt.exe117⤵PID:1140
-
\??\c:\rlblx.exec:\rlblx.exe118⤵PID:2156
-
\??\c:\dxdbl.exec:\dxdbl.exe119⤵PID:2324
-
\??\c:\vxphprx.exec:\vxphprx.exe120⤵PID:2892
-
\??\c:\pbtth.exec:\pbtth.exe121⤵PID:2856
-
\??\c:\xflhbh.exec:\xflhbh.exe122⤵PID:1240
-
\??\c:\dpvbxjv.exec:\dpvbxjv.exe123⤵PID:2188
-
\??\c:\ftrvxdt.exec:\ftrvxdt.exe124⤵PID:1300
-
\??\c:\fjrnn.exec:\fjrnn.exe125⤵PID:2956
-
\??\c:\vrhbln.exec:\vrhbln.exe126⤵PID:1560
-
\??\c:\vlhrhr.exec:\vlhrhr.exe127⤵PID:1292
-
\??\c:\xvrjv.exec:\xvrjv.exe128⤵PID:1572
-
\??\c:\pjffpvr.exec:\pjffpvr.exe129⤵PID:2652
-
\??\c:\pjvnbb.exec:\pjvnbb.exe130⤵PID:2264
-
\??\c:\hdpllln.exec:\hdpllln.exe131⤵PID:2604
-
\??\c:\nhrfvft.exec:\nhrfvft.exe132⤵PID:2460
-
\??\c:\fprfxpl.exec:\fprfxpl.exe133⤵PID:2532
-
\??\c:\pbndf.exec:\pbndf.exe134⤵PID:2696
-
\??\c:\pxpjjf.exec:\pxpjjf.exe135⤵PID:2488
-
\??\c:\lbhxj.exec:\lbhxj.exe136⤵PID:2496
-
\??\c:\dnrjf.exec:\dnrjf.exe137⤵PID:1264
-
\??\c:\ddlxfv.exec:\ddlxfv.exe138⤵PID:1960
-
\??\c:\vnvxtn.exec:\vnvxtn.exe139⤵PID:636
-
\??\c:\lnhxlh.exec:\lnhxlh.exe140⤵PID:2232
-
\??\c:\tfxdxjj.exec:\tfxdxjj.exe141⤵PID:2800
-
\??\c:\jrrnlr.exec:\jrrnlr.exe142⤵PID:2808
-
\??\c:\btdbrp.exec:\btdbrp.exe143⤵PID:956
-
\??\c:\hfnrd.exec:\hfnrd.exe144⤵PID:2404
-
\??\c:\jxjxp.exec:\jxjxp.exe145⤵PID:2672
-
\??\c:\fjhrh.exec:\fjhrh.exe146⤵PID:1996
-
\??\c:\tlvrd.exec:\tlvrd.exe147⤵PID:1032
-
\??\c:\ndjpv.exec:\ndjpv.exe148⤵PID:2484
-
\??\c:\lhdxl.exec:\lhdxl.exe149⤵PID:2732
-
\??\c:\drdthv.exec:\drdthv.exe150⤵PID:1952
-
\??\c:\vfdrf.exec:\vfdrf.exe151⤵PID:1736
-
\??\c:\tbjln.exec:\tbjln.exe152⤵PID:1660
-
\??\c:\pnbvxnx.exec:\pnbvxnx.exe153⤵PID:1732
-
\??\c:\fjpxl.exec:\fjpxl.exe154⤵PID:596
-
\??\c:\vxlnljn.exec:\vxlnljn.exe155⤵PID:3044
-
\??\c:\vnbddd.exec:\vnbddd.exe156⤵PID:816
-
\??\c:\xhnnnx.exec:\xhnnnx.exe157⤵PID:1356
-
\??\c:\jvfpl.exec:\jvfpl.exe158⤵PID:2084
-
\??\c:\xfhhrr.exec:\xfhhrr.exe159⤵PID:2368
-
\??\c:\hhxlhfb.exec:\hhxlhfb.exe160⤵PID:1148
-
\??\c:\vtlhf.exec:\vtlhf.exe161⤵PID:1984
-
\??\c:\pfbnfp.exec:\pfbnfp.exe162⤵PID:1440
-
\??\c:\pxlxtl.exec:\pxlxtl.exe163⤵PID:2176
-
\??\c:\lbdvlp.exec:\lbdvlp.exe164⤵PID:1884
-
\??\c:\djjfbf.exec:\djjfbf.exe165⤵PID:1036
-
\??\c:\xjblfp.exec:\xjblfp.exe166⤵PID:1768
-
\??\c:\dhlvt.exec:\dhlvt.exe167⤵PID:2140
-
\??\c:\tnbhxx.exec:\tnbhxx.exe168⤵PID:2856
-
\??\c:\vtnhjfd.exec:\vtnhjfd.exe169⤵PID:588
-
\??\c:\bplxj.exec:\bplxj.exe170⤵PID:2904
-
\??\c:\vtvxfdn.exec:\vtvxfdn.exe171⤵PID:2948
-
\??\c:\bjlpnxt.exec:\bjlpnxt.exe172⤵PID:616
-
\??\c:\bxlfrtv.exec:\bxlfrtv.exe173⤵PID:1432
-
\??\c:\vdjtxd.exec:\vdjtxd.exe174⤵PID:1512
-
\??\c:\jbfnl.exec:\jbfnl.exe175⤵PID:3064
-
\??\c:\jfxtrd.exec:\jfxtrd.exe176⤵PID:2688
-
\??\c:\htvfrn.exec:\htvfrn.exe177⤵PID:2656
-
\??\c:\vrffxpb.exec:\vrffxpb.exe178⤵PID:2004
-
\??\c:\lxlxpjd.exec:\lxlxpjd.exe179⤵PID:2096
-
\??\c:\nppjjtr.exec:\nppjjtr.exe180⤵PID:2596
-
\??\c:\dpdbdpp.exec:\dpdbdpp.exe181⤵PID:2440
-
\??\c:\rplnjfb.exec:\rplnjfb.exe182⤵PID:2280
-
\??\c:\hbxtpl.exec:\hbxtpl.exe183⤵PID:2920
-
\??\c:\thlft.exec:\thlft.exe184⤵PID:2468
-
\??\c:\fnxrv.exec:\fnxrv.exe185⤵PID:112
-
\??\c:\bdjdpvj.exec:\bdjdpvj.exe186⤵PID:2408
-
\??\c:\hrdnfh.exec:\hrdnfh.exe187⤵PID:2348
-
\??\c:\dpvrnd.exec:\dpvrnd.exe188⤵PID:2760
-
\??\c:\htpjtnd.exec:\htpjtnd.exe189⤵PID:2812
-
\??\c:\fbtnxtn.exec:\fbtnxtn.exe190⤵PID:2940
-
\??\c:\rrnvptt.exec:\rrnvptt.exe191⤵PID:948
-
\??\c:\pjnptn.exec:\pjnptn.exe192⤵PID:2012
-
\??\c:\pdjxl.exec:\pdjxl.exe193⤵PID:2672
-
\??\c:\pbfvlpr.exec:\pbfvlpr.exe194⤵PID:1996
-
\??\c:\hhxlbft.exec:\hhxlbft.exe195⤵PID:2396
-
\??\c:\hnxftbx.exec:\hnxftbx.exe196⤵PID:764
-
\??\c:\dvpfhdj.exec:\dvpfhdj.exe197⤵PID:1516
-
\??\c:\rdhrjht.exec:\rdhrjht.exe198⤵PID:2300
-
\??\c:\hdffppn.exec:\hdffppn.exe199⤵PID:1260
-
\??\c:\ppfnbdj.exec:\ppfnbdj.exe200⤵PID:2868
-
\??\c:\dldhdr.exec:\dldhdr.exe201⤵PID:840
-
\??\c:\rhhhvdn.exec:\rhhhvdn.exe202⤵PID:3052
-
\??\c:\ntlfxxd.exec:\ntlfxxd.exe203⤵PID:2052
-
\??\c:\fpvjvv.exec:\fpvjvv.exe204⤵PID:2072
-
\??\c:\dpptjp.exec:\dpptjp.exe205⤵PID:988
-
\??\c:\lrhbtv.exec:\lrhbtv.exe206⤵PID:1444
-
\??\c:\jrdrdfx.exec:\jrdrdfx.exe207⤵PID:1148
-
\??\c:\drvtjhv.exec:\drvtjhv.exe208⤵PID:1476
-
\??\c:\ljxrd.exec:\ljxrd.exe209⤵PID:1440
-
\??\c:\drvvp.exec:\drvvp.exe210⤵PID:1140
-
\??\c:\rtrtf.exec:\rtrtf.exe211⤵PID:1824
-
\??\c:\lxnxt.exec:\lxnxt.exe212⤵PID:2324
-
\??\c:\xxvxfn.exec:\xxvxfn.exe213⤵PID:1368
-
\??\c:\pxdfp.exec:\pxdfp.exe214⤵PID:1316
-
\??\c:\brhdxff.exec:\brhdxff.exe215⤵PID:2856
-
\??\c:\blrvpf.exec:\blrvpf.exe216⤵PID:2976
-
\??\c:\xfjlbvx.exec:\xfjlbvx.exe217⤵PID:1628
-
\??\c:\npfdv.exec:\npfdv.exe218⤵PID:1284
-
\??\c:\fbpnbp.exec:\fbpnbp.exe219⤵PID:2952
-
\??\c:\tjhvfjx.exec:\tjhvfjx.exe220⤵PID:1752
-
\??\c:\lpdlfrb.exec:\lpdlfrb.exe221⤵PID:2984
-
\??\c:\tnvvfnl.exec:\tnvvfnl.exe222⤵PID:2552
-
\??\c:\fnrfrl.exec:\fnrfrl.exe223⤵PID:3064
-
\??\c:\rfdnb.exec:\rfdnb.exe224⤵PID:2432
-
\??\c:\dfdnf.exec:\dfdnf.exe225⤵PID:2604
-
\??\c:\nfrpndb.exec:\nfrpndb.exe226⤵PID:3008
-
\??\c:\tdvhh.exec:\tdvhh.exe227⤵PID:2096
-
\??\c:\ttnfnft.exec:\ttnfnft.exe228⤵PID:2584
-
\??\c:\bnhxhr.exec:\bnhxhr.exe229⤵PID:2456
-
\??\c:\hvtjhv.exec:\hvtjhv.exe230⤵PID:240
-
\??\c:\hfhpb.exec:\hfhpb.exe231⤵PID:1392
-
\??\c:\dxdnlv.exec:\dxdnlv.exe232⤵PID:1684
-
\??\c:\bvdtn.exec:\bvdtn.exe233⤵PID:532
-
\??\c:\dxnrhrv.exec:\dxnrhrv.exe234⤵PID:2768
-
\??\c:\lhxtdx.exec:\lhxtdx.exe235⤵PID:2772
-
\??\c:\ltlfdj.exec:\ltlfdj.exe236⤵PID:2800
-
\??\c:\lxlhr.exec:\lxlhr.exe237⤵PID:1332
-
\??\c:\fvvff.exec:\fvvff.exe238⤵PID:956
-
\??\c:\ptpfbf.exec:\ptpfbf.exe239⤵PID:1688
-
\??\c:\lrllnt.exec:\lrllnt.exe240⤵PID:1988
-
\??\c:\tlbnd.exec:\tlbnd.exe241⤵PID:944
-
\??\c:\hjfrf.exec:\hjfrf.exe242⤵PID:2672