Analysis
-
max time kernel
149s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 22:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe
-
Size
59KB
-
MD5
00a93b6c659a5482b9bdfed47fcc6a83
-
SHA1
91efee20c3d9740f61fb6f287ecceece73e453cf
-
SHA256
58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074
-
SHA512
3f17b2802c7167e6f53ee640a431618d49b8519c4bc02f86b66234e0d168faa92aa604a7f2faef2bb2d5f196b512d3d266ce388ccc4f3b30a0eb82fa9b0899ea
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsImsBd:ymb3NkkiQ3mdBjFIsIFBd
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/1856-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4240-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4436-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2664-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2992-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-41-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4964-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3984-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1160-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1572-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2352-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3008-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2668-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3460-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4568-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2624-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/984-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4840-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 28 IoCs
Processes:
resource yara_rule behavioral2/memory/1856-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4240-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4436-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2664-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2992-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2152-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4964-48-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3984-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1160-61-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1572-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1572-71-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2352-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4264-83-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3008-89-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2668-96-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3460-108-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4744-114-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4568-120-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2624-127-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/928-132-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4352-138-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-144-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4616-156-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/408-162-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1584-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/984-192-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4840-198-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3568-205-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
xllxxfx.exefrrlxxl.exetthtnh.exe7jpjd.exevpvpv.exefrlxrrl.exetntttt.exenbntnh.exejpdvj.exe1rrfrlf.exerrfxrrl.exetnnhhh.exevjppj.exe1fxxllf.exelflfrlf.exethtnbt.exepjpjj.exerxxrrlf.exe3xxrfxr.exe9ntnnh.exepvvpv.exepppvj.exerxrrfxr.exebthtnh.exenbtnbb.exebhnhtt.exedppjv.exelrrxrfx.exehbnnnh.exebhbnhb.exedjddv.exejpvjd.exerxfxxxr.exehnnhbt.exetbhbnn.exedvpjv.exe7vpdv.exerxrxrrl.exehbtntn.exedjpjj.exeppjjd.exe3xlfffl.exerrffxxl.exentbbbh.exe9tbttt.exe9vvpd.exejjpjj.exefrrlxxr.exelrxlffx.exenhnhtt.exejdjdp.exevpdjv.exevdvpj.exexlrrrrr.exenhbthh.exedvvdv.exebtnnbb.exe5hnnbb.exe3vvpd.exejpppv.exerlfrffr.exeffxlxrl.exentbtnn.exetbnhhb.exepid process 4436 xllxxfx.exe 4240 frrlxxl.exe 2664 tthtnh.exe 2992 7jpjd.exe 2152 vpvpv.exe 4964 frlxrrl.exe 3984 tntttt.exe 1160 nbntnh.exe 1572 jpdvj.exe 2352 1rrfrlf.exe 4264 rrfxrrl.exe 3008 tnnhhh.exe 2668 vjppj.exe 4392 1fxxllf.exe 3460 lflfrlf.exe 4744 thtnbt.exe 4568 pjpjj.exe 2624 rxxrrlf.exe 928 3xxrfxr.exe 4352 9ntnnh.exe 4952 pvvpv.exe 1128 pppvj.exe 4616 rxrrfxr.exe 408 bthtnh.exe 3864 nbtnbb.exe 1584 bhnhtt.exe 4472 dppjv.exe 4672 lrrxrfx.exe 984 hbnnnh.exe 4840 bhbnhb.exe 3568 djddv.exe 1836 jpvjd.exe 2488 rxfxxxr.exe 3524 hnnhbt.exe 4244 tbhbnn.exe 2220 dvpjv.exe 2944 7vpdv.exe 5020 rxrxrrl.exe 692 hbtntn.exe 4376 djpjj.exe 412 ppjjd.exe 1360 3xlfffl.exe 3552 rrffxxl.exe 3852 ntbbbh.exe 3916 9tbttt.exe 4984 9vvpd.exe 3828 jjpjj.exe 2384 frrlxxr.exe 3984 lrxlffx.exe 1580 nhnhtt.exe 3404 jdjdp.exe 1664 vpdjv.exe 3160 vdvpj.exe 4720 xlrrrrr.exe 3024 nhbthh.exe 5048 dvvdv.exe 2668 btnnbb.exe 3608 5hnnbb.exe 4248 3vvpd.exe 2596 jpppv.exe 760 rlfrffr.exe 1468 ffxlxrl.exe 1112 ntbtnn.exe 4308 tbnhhb.exe -
Processes:
resource yara_rule behavioral2/memory/1856-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4240-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2664-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2992-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3984-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1160-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1572-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1572-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2352-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4264-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3008-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2668-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3460-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4744-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4568-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2624-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/984-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4840-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exexllxxfx.exefrrlxxl.exetthtnh.exe7jpjd.exevpvpv.exefrlxrrl.exetntttt.exenbntnh.exejpdvj.exe1rrfrlf.exerrfxrrl.exetnnhhh.exevjppj.exe1fxxllf.exelflfrlf.exethtnbt.exepjpjj.exerxxrrlf.exe3xxrfxr.exe9ntnnh.exepvvpv.exedescription pid process target process PID 1856 wrote to memory of 4436 1856 58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe xllxxfx.exe PID 1856 wrote to memory of 4436 1856 58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe xllxxfx.exe PID 1856 wrote to memory of 4436 1856 58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe xllxxfx.exe PID 4436 wrote to memory of 4240 4436 xllxxfx.exe frrlxxl.exe PID 4436 wrote to memory of 4240 4436 xllxxfx.exe frrlxxl.exe PID 4436 wrote to memory of 4240 4436 xllxxfx.exe frrlxxl.exe PID 4240 wrote to memory of 2664 4240 frrlxxl.exe tthtnh.exe PID 4240 wrote to memory of 2664 4240 frrlxxl.exe tthtnh.exe PID 4240 wrote to memory of 2664 4240 frrlxxl.exe tthtnh.exe PID 2664 wrote to memory of 2992 2664 tthtnh.exe 7jpjd.exe PID 2664 wrote to memory of 2992 2664 tthtnh.exe 7jpjd.exe PID 2664 wrote to memory of 2992 2664 tthtnh.exe 7jpjd.exe PID 2992 wrote to memory of 2152 2992 7jpjd.exe vpvpv.exe PID 2992 wrote to memory of 2152 2992 7jpjd.exe vpvpv.exe PID 2992 wrote to memory of 2152 2992 7jpjd.exe vpvpv.exe PID 2152 wrote to memory of 4964 2152 vpvpv.exe frlxrrl.exe PID 2152 wrote to memory of 4964 2152 vpvpv.exe frlxrrl.exe PID 2152 wrote to memory of 4964 2152 vpvpv.exe frlxrrl.exe PID 4964 wrote to memory of 3984 4964 frlxrrl.exe tntttt.exe PID 4964 wrote to memory of 3984 4964 frlxrrl.exe tntttt.exe PID 4964 wrote to memory of 3984 4964 frlxrrl.exe tntttt.exe PID 3984 wrote to memory of 1160 3984 tntttt.exe nbntnh.exe PID 3984 wrote to memory of 1160 3984 tntttt.exe nbntnh.exe PID 3984 wrote to memory of 1160 3984 tntttt.exe nbntnh.exe PID 1160 wrote to memory of 1572 1160 nbntnh.exe jpdvj.exe PID 1160 wrote to memory of 1572 1160 nbntnh.exe jpdvj.exe PID 1160 wrote to memory of 1572 1160 nbntnh.exe jpdvj.exe PID 1572 wrote to memory of 2352 1572 jpdvj.exe 1rrfrlf.exe PID 1572 wrote to memory of 2352 1572 jpdvj.exe 1rrfrlf.exe PID 1572 wrote to memory of 2352 1572 jpdvj.exe 1rrfrlf.exe PID 2352 wrote to memory of 4264 2352 1rrfrlf.exe rrfxrrl.exe PID 2352 wrote to memory of 4264 2352 1rrfrlf.exe rrfxrrl.exe PID 2352 wrote to memory of 4264 2352 1rrfrlf.exe rrfxrrl.exe PID 4264 wrote to memory of 3008 4264 rrfxrrl.exe tnnhhh.exe PID 4264 wrote to memory of 3008 4264 rrfxrrl.exe tnnhhh.exe PID 4264 wrote to memory of 3008 4264 rrfxrrl.exe tnnhhh.exe PID 3008 wrote to memory of 2668 3008 tnnhhh.exe vjppj.exe PID 3008 wrote to memory of 2668 3008 tnnhhh.exe vjppj.exe PID 3008 wrote to memory of 2668 3008 tnnhhh.exe vjppj.exe PID 2668 wrote to memory of 4392 2668 vjppj.exe 1fxxllf.exe PID 2668 wrote to memory of 4392 2668 vjppj.exe 1fxxllf.exe PID 2668 wrote to memory of 4392 2668 vjppj.exe 1fxxllf.exe PID 4392 wrote to memory of 3460 4392 1fxxllf.exe lflfrlf.exe PID 4392 wrote to memory of 3460 4392 1fxxllf.exe lflfrlf.exe PID 4392 wrote to memory of 3460 4392 1fxxllf.exe lflfrlf.exe PID 3460 wrote to memory of 4744 3460 lflfrlf.exe thtnbt.exe PID 3460 wrote to memory of 4744 3460 lflfrlf.exe thtnbt.exe PID 3460 wrote to memory of 4744 3460 lflfrlf.exe thtnbt.exe PID 4744 wrote to memory of 4568 4744 thtnbt.exe pjpjj.exe PID 4744 wrote to memory of 4568 4744 thtnbt.exe pjpjj.exe PID 4744 wrote to memory of 4568 4744 thtnbt.exe pjpjj.exe PID 4568 wrote to memory of 2624 4568 pjpjj.exe rxxrrlf.exe PID 4568 wrote to memory of 2624 4568 pjpjj.exe rxxrrlf.exe PID 4568 wrote to memory of 2624 4568 pjpjj.exe rxxrrlf.exe PID 2624 wrote to memory of 928 2624 rxxrrlf.exe 3xxrfxr.exe PID 2624 wrote to memory of 928 2624 rxxrrlf.exe 3xxrfxr.exe PID 2624 wrote to memory of 928 2624 rxxrrlf.exe 3xxrfxr.exe PID 928 wrote to memory of 4352 928 3xxrfxr.exe 9ntnnh.exe PID 928 wrote to memory of 4352 928 3xxrfxr.exe 9ntnnh.exe PID 928 wrote to memory of 4352 928 3xxrfxr.exe 9ntnnh.exe PID 4352 wrote to memory of 4952 4352 9ntnnh.exe pvvpv.exe PID 4352 wrote to memory of 4952 4352 9ntnnh.exe pvvpv.exe PID 4352 wrote to memory of 4952 4352 9ntnnh.exe pvvpv.exe PID 4952 wrote to memory of 1128 4952 pvvpv.exe pppvj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe"C:\Users\Admin\AppData\Local\Temp\58d794c22451972848c091a6ea891f1f3f52a946b7a68dec04df6d191e02f074.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\xllxxfx.exec:\xllxxfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
\??\c:\frrlxxl.exec:\frrlxxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\tthtnh.exec:\tthtnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\7jpjd.exec:\7jpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\vpvpv.exec:\vpvpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\frlxrrl.exec:\frlxrrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
\??\c:\tntttt.exec:\tntttt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
\??\c:\nbntnh.exec:\nbntnh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
\??\c:\jpdvj.exec:\jpdvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\1rrfrlf.exec:\1rrfrlf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\rrfxrrl.exec:\rrfxrrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\tnnhhh.exec:\tnnhhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\vjppj.exec:\vjppj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\1fxxllf.exec:\1fxxllf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\lflfrlf.exec:\lflfrlf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\thtnbt.exec:\thtnbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\pjpjj.exec:\pjpjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
\??\c:\rxxrrlf.exec:\rxxrrlf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\3xxrfxr.exec:\3xxrfxr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\9ntnnh.exec:\9ntnnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\pvvpv.exec:\pvvpv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\pppvj.exec:\pppvj.exe23⤵
- Executes dropped EXE
PID:1128 -
\??\c:\rxrrfxr.exec:\rxrrfxr.exe24⤵
- Executes dropped EXE
PID:4616 -
\??\c:\bthtnh.exec:\bthtnh.exe25⤵
- Executes dropped EXE
PID:408 -
\??\c:\nbtnbb.exec:\nbtnbb.exe26⤵
- Executes dropped EXE
PID:3864 -
\??\c:\bhnhtt.exec:\bhnhtt.exe27⤵
- Executes dropped EXE
PID:1584 -
\??\c:\dppjv.exec:\dppjv.exe28⤵
- Executes dropped EXE
PID:4472 -
\??\c:\lrrxrfx.exec:\lrrxrfx.exe29⤵
- Executes dropped EXE
PID:4672 -
\??\c:\hbnnnh.exec:\hbnnnh.exe30⤵
- Executes dropped EXE
PID:984 -
\??\c:\bhbnhb.exec:\bhbnhb.exe31⤵
- Executes dropped EXE
PID:4840 -
\??\c:\djddv.exec:\djddv.exe32⤵
- Executes dropped EXE
PID:3568 -
\??\c:\jpvjd.exec:\jpvjd.exe33⤵
- Executes dropped EXE
PID:1836 -
\??\c:\rxfxxxr.exec:\rxfxxxr.exe34⤵
- Executes dropped EXE
PID:2488 -
\??\c:\hnnhbt.exec:\hnnhbt.exe35⤵
- Executes dropped EXE
PID:3524 -
\??\c:\tbhbnn.exec:\tbhbnn.exe36⤵
- Executes dropped EXE
PID:4244 -
\??\c:\dvpjv.exec:\dvpjv.exe37⤵
- Executes dropped EXE
PID:2220 -
\??\c:\7vpdv.exec:\7vpdv.exe38⤵
- Executes dropped EXE
PID:2944 -
\??\c:\rxrxrrl.exec:\rxrxrrl.exe39⤵
- Executes dropped EXE
PID:5020 -
\??\c:\hbtntn.exec:\hbtntn.exe40⤵
- Executes dropped EXE
PID:692 -
\??\c:\djpjj.exec:\djpjj.exe41⤵
- Executes dropped EXE
PID:4376 -
\??\c:\ppjjd.exec:\ppjjd.exe42⤵
- Executes dropped EXE
PID:412 -
\??\c:\3xlfffl.exec:\3xlfffl.exe43⤵
- Executes dropped EXE
PID:1360 -
\??\c:\rrffxxl.exec:\rrffxxl.exe44⤵
- Executes dropped EXE
PID:3552 -
\??\c:\ntbbbh.exec:\ntbbbh.exe45⤵
- Executes dropped EXE
PID:3852 -
\??\c:\9tbttt.exec:\9tbttt.exe46⤵
- Executes dropped EXE
PID:3916 -
\??\c:\9vvpd.exec:\9vvpd.exe47⤵
- Executes dropped EXE
PID:4984 -
\??\c:\jjpjj.exec:\jjpjj.exe48⤵
- Executes dropped EXE
PID:3828 -
\??\c:\frrlxxr.exec:\frrlxxr.exe49⤵
- Executes dropped EXE
PID:2384 -
\??\c:\lrxlffx.exec:\lrxlffx.exe50⤵
- Executes dropped EXE
PID:3984 -
\??\c:\nhnhtt.exec:\nhnhtt.exe51⤵
- Executes dropped EXE
PID:1580 -
\??\c:\jdjdp.exec:\jdjdp.exe52⤵
- Executes dropped EXE
PID:3404 -
\??\c:\vpdjv.exec:\vpdjv.exe53⤵
- Executes dropped EXE
PID:1664 -
\??\c:\vdvpj.exec:\vdvpj.exe54⤵
- Executes dropped EXE
PID:3160 -
\??\c:\xlrrrrr.exec:\xlrrrrr.exe55⤵
- Executes dropped EXE
PID:4720 -
\??\c:\nhbthh.exec:\nhbthh.exe56⤵
- Executes dropped EXE
PID:3024 -
\??\c:\dvvdv.exec:\dvvdv.exe57⤵
- Executes dropped EXE
PID:5048 -
\??\c:\btnnbb.exec:\btnnbb.exe58⤵
- Executes dropped EXE
PID:2668 -
\??\c:\5hnnbb.exec:\5hnnbb.exe59⤵
- Executes dropped EXE
PID:3608 -
\??\c:\3vvpd.exec:\3vvpd.exe60⤵
- Executes dropped EXE
PID:4248 -
\??\c:\jpppv.exec:\jpppv.exe61⤵
- Executes dropped EXE
PID:2596 -
\??\c:\rlfrffr.exec:\rlfrffr.exe62⤵
- Executes dropped EXE
PID:760 -
\??\c:\ffxlxrl.exec:\ffxlxrl.exe63⤵
- Executes dropped EXE
PID:1468 -
\??\c:\ntbtnn.exec:\ntbtnn.exe64⤵
- Executes dropped EXE
PID:1112 -
\??\c:\tbnhhb.exec:\tbnhhb.exe65⤵
- Executes dropped EXE
PID:4308 -
\??\c:\jdvjv.exec:\jdvjv.exe66⤵PID:1640
-
\??\c:\pddpd.exec:\pddpd.exe67⤵PID:4408
-
\??\c:\rfxlfxl.exec:\rfxlfxl.exe68⤵PID:4332
-
\??\c:\rrlxrxl.exec:\rrlxrxl.exe69⤵PID:2552
-
\??\c:\1bbtbt.exec:\1bbtbt.exe70⤵PID:2656
-
\??\c:\btnhtn.exec:\btnhtn.exe71⤵PID:4168
-
\??\c:\vdjdp.exec:\vdjdp.exe72⤵PID:3632
-
\??\c:\lxxxfxx.exec:\lxxxfxx.exe73⤵PID:4140
-
\??\c:\rlxrllf.exec:\rlxrllf.exe74⤵PID:4284
-
\??\c:\nhhbtt.exec:\nhhbtt.exe75⤵PID:3908
-
\??\c:\httnbh.exec:\httnbh.exe76⤵PID:2204
-
\??\c:\httnth.exec:\httnth.exe77⤵PID:4540
-
\??\c:\jvpjv.exec:\jvpjv.exe78⤵PID:3340
-
\??\c:\frfxrxr.exec:\frfxrxr.exe79⤵PID:2052
-
\??\c:\bhnhbt.exec:\bhnhbt.exe80⤵PID:3464
-
\??\c:\hbtbtb.exec:\hbtbtb.exe81⤵PID:2620
-
\??\c:\vddvp.exec:\vddvp.exe82⤵PID:4732
-
\??\c:\nbbhtn.exec:\nbbhtn.exe83⤵PID:1984
-
\??\c:\hbnhth.exec:\hbnhth.exe84⤵PID:4656
-
\??\c:\thtnbt.exec:\thtnbt.exe85⤵PID:3960
-
\??\c:\pvdvp.exec:\pvdvp.exe86⤵PID:2220
-
\??\c:\fxxlrlf.exec:\fxxlrlf.exe87⤵PID:1416
-
\??\c:\7nhbtt.exec:\7nhbtt.exe88⤵PID:4432
-
\??\c:\nbbthh.exec:\nbbthh.exe89⤵PID:1876
-
\??\c:\5fxrllf.exec:\5fxrllf.exe90⤵PID:4360
-
\??\c:\xrlfffx.exec:\xrlfffx.exe91⤵PID:4048
-
\??\c:\hhhbtn.exec:\hhhbtn.exe92⤵PID:3628
-
\??\c:\dvvpv.exec:\dvvpv.exe93⤵PID:744
-
\??\c:\llxfrlx.exec:\llxfrlx.exe94⤵PID:3852
-
\??\c:\fxrxrxr.exec:\fxrxrxr.exe95⤵PID:3916
-
\??\c:\btnnhn.exec:\btnnhn.exe96⤵PID:572
-
\??\c:\nntnnt.exec:\nntnnt.exe97⤵PID:1244
-
\??\c:\vvvdp.exec:\vvvdp.exe98⤵PID:1160
-
\??\c:\5xfxlxx.exec:\5xfxlxx.exe99⤵PID:1760
-
\??\c:\7rrlxrf.exec:\7rrlxrf.exe100⤵PID:3764
-
\??\c:\tnhhbt.exec:\tnhhbt.exe101⤵PID:2412
-
\??\c:\btnhbb.exec:\btnhbb.exe102⤵PID:688
-
\??\c:\pdvpj.exec:\pdvpj.exe103⤵PID:4036
-
\??\c:\djddp.exec:\djddp.exe104⤵PID:4124
-
\??\c:\3frfxxr.exec:\3frfxxr.exe105⤵PID:3024
-
\??\c:\1xfffxx.exec:\1xfffxx.exe106⤵PID:5116
-
\??\c:\nbtnnn.exec:\nbtnnn.exe107⤵PID:4460
-
\??\c:\9htnnn.exec:\9htnnn.exe108⤵PID:1252
-
\??\c:\vjjdp.exec:\vjjdp.exe109⤵PID:3668
-
\??\c:\pvdvj.exec:\pvdvj.exe110⤵PID:4456
-
\??\c:\1lfrffx.exec:\1lfrffx.exe111⤵PID:2624
-
\??\c:\9xrlffx.exec:\9xrlffx.exe112⤵PID:4000
-
\??\c:\frlfxrl.exec:\frlfxrl.exe113⤵PID:4912
-
\??\c:\nhhbtn.exec:\nhhbtn.exe114⤵PID:3356
-
\??\c:\5hhbtt.exec:\5hhbtt.exe115⤵PID:2852
-
\??\c:\ppjdj.exec:\ppjdj.exe116⤵PID:3472
-
\??\c:\dppvv.exec:\dppvv.exe117⤵PID:408
-
\??\c:\rxrlrrl.exec:\rxrlrrl.exe118⤵PID:1564
-
\??\c:\7xfrrll.exec:\7xfrrll.exe119⤵PID:1992
-
\??\c:\ttnhtb.exec:\ttnhtb.exe120⤵PID:4140
-
\??\c:\ttbthh.exec:\ttbthh.exe121⤵PID:4284
-
\??\c:\3pjdv.exec:\3pjdv.exe122⤵PID:2288
-
\??\c:\ddpjv.exec:\ddpjv.exe123⤵PID:4972
-
\??\c:\xxlxlrl.exec:\xxlxlrl.exe124⤵PID:2948
-
\??\c:\fffxfff.exec:\fffxfff.exe125⤵PID:1964
-
\??\c:\nhhbbb.exec:\nhhbbb.exe126⤵PID:4448
-
\??\c:\vvvpj.exec:\vvvpj.exe127⤵PID:4764
-
\??\c:\1dvvj.exec:\1dvvj.exe128⤵PID:4900
-
\??\c:\xrrlfff.exec:\xrrlfff.exe129⤵PID:3524
-
\??\c:\bnnnhb.exec:\bnnnhb.exe130⤵PID:4404
-
\??\c:\vjdvp.exec:\vjdvp.exe131⤵PID:640
-
\??\c:\lfflrlx.exec:\lfflrlx.exe132⤵PID:2944
-
\??\c:\llllffx.exec:\llllffx.exe133⤵PID:1856
-
\??\c:\5hnbnb.exec:\5hnbnb.exe134⤵PID:692
-
\??\c:\dvvvv.exec:\dvvvv.exe135⤵PID:3788
-
\??\c:\ppjvj.exec:\ppjvj.exe136⤵PID:5068
-
\??\c:\fxlxrfr.exec:\fxlxrfr.exe137⤵PID:632
-
\??\c:\lxfxfxr.exec:\lxfxfxr.exe138⤵PID:1076
-
\??\c:\dvdjd.exec:\dvdjd.exe139⤵PID:2964
-
\??\c:\vvvjd.exec:\vvvjd.exe140⤵PID:3224
-
\??\c:\ffxxxrr.exec:\ffxxxrr.exe141⤵PID:1232
-
\??\c:\hhnbbh.exec:\hhnbbh.exe142⤵PID:3984
-
\??\c:\btnhnn.exec:\btnhnn.exe143⤵PID:4944
-
\??\c:\nbtnbb.exec:\nbtnbb.exe144⤵PID:3404
-
\??\c:\ppvpj.exec:\ppvpj.exe145⤵PID:3312
-
\??\c:\lllrflf.exec:\lllrflf.exe146⤵PID:4136
-
\??\c:\xfllrxr.exec:\xfllrxr.exe147⤵PID:1412
-
\??\c:\nhbttn.exec:\nhbttn.exe148⤵PID:4036
-
\??\c:\ttbnbt.exec:\ttbnbt.exe149⤵PID:4124
-
\??\c:\pjdpd.exec:\pjdpd.exe150⤵PID:3640
-
\??\c:\jjjpj.exec:\jjjpj.exe151⤵PID:5116
-
\??\c:\7rrrxlf.exec:\7rrrxlf.exe152⤵PID:3184
-
\??\c:\lflxrlr.exec:\lflxrlr.exe153⤵PID:4892
-
\??\c:\ththnt.exec:\ththnt.exe154⤵PID:2792
-
\??\c:\hnbttn.exec:\hnbttn.exe155⤵PID:1116
-
\??\c:\3jpjv.exec:\3jpjv.exe156⤵PID:372
-
\??\c:\5jjdv.exec:\5jjdv.exe157⤵PID:4000
-
\??\c:\lffrfxr.exec:\lffrfxr.exe158⤵PID:5056
-
\??\c:\ffffffx.exec:\ffffffx.exe159⤵PID:4712
-
\??\c:\dppjd.exec:\dppjd.exe160⤵PID:996
-
\??\c:\djjdv.exec:\djjdv.exe161⤵PID:3472
-
\??\c:\rffxlll.exec:\rffxlll.exe162⤵PID:2376
-
\??\c:\rxlxflx.exec:\rxlxflx.exe163⤵PID:1088
-
\??\c:\bbbbnb.exec:\bbbbnb.exe164⤵PID:884
-
\??\c:\jdvpv.exec:\jdvpv.exe165⤵PID:4140
-
\??\c:\jjdvp.exec:\jjdvp.exe166⤵PID:4284
-
\??\c:\1rxlxxl.exec:\1rxlxxl.exe167⤵PID:984
-
\??\c:\5lxxrrl.exec:\5lxxrrl.exe168⤵PID:4972
-
\??\c:\7tttnh.exec:\7tttnh.exe169⤵PID:4916
-
\??\c:\jjppp.exec:\jjppp.exe170⤵PID:3804
-
\??\c:\jdpjj.exec:\jdpjj.exe171⤵PID:4696
-
\??\c:\rxlxlfx.exec:\rxlxlfx.exe172⤵PID:4732
-
\??\c:\rlrxffl.exec:\rlrxffl.exe173⤵PID:2316
-
\??\c:\hthbnb.exec:\hthbnb.exe174⤵PID:3020
-
\??\c:\bnnhbt.exec:\bnnhbt.exe175⤵PID:1240
-
\??\c:\vdvvp.exec:\vdvvp.exe176⤵PID:640
-
\??\c:\xrlxllf.exec:\xrlxllf.exe177⤵PID:1416
-
\??\c:\xrrrxrx.exec:\xrrrxrx.exe178⤵PID:1856
-
\??\c:\bbtnnh.exec:\bbtnnh.exe179⤵PID:3572
-
\??\c:\3bbhth.exec:\3bbhth.exe180⤵PID:3316
-
\??\c:\vpjdp.exec:\vpjdp.exe181⤵PID:2664
-
\??\c:\pdpjj.exec:\pdpjj.exe182⤵PID:2152
-
\??\c:\xlllxxx.exec:\xlllxxx.exe183⤵PID:2832
-
\??\c:\hbhbnh.exec:\hbhbnh.exe184⤵PID:1084
-
\??\c:\bbhbtn.exec:\bbhbtn.exe185⤵PID:4948
-
\??\c:\ddvpj.exec:\ddvpj.exe186⤵PID:824
-
\??\c:\pdjvj.exec:\pdjvj.exe187⤵PID:3084
-
\??\c:\5fxlfxl.exec:\5fxlfxl.exe188⤵PID:4136
-
\??\c:\lffxrlf.exec:\lffxrlf.exe189⤵PID:3388
-
\??\c:\tbttnn.exec:\tbttnn.exe190⤵PID:2600
-
\??\c:\nbhtnh.exec:\nbhtnh.exe191⤵PID:3392
-
\??\c:\jdpjv.exec:\jdpjv.exe192⤵PID:2512
-
\??\c:\7vpjv.exec:\7vpjv.exe193⤵PID:4956
-
\??\c:\lxlffrx.exec:\lxlffrx.exe194⤵PID:4352
-
\??\c:\9xflflf.exec:\9xflflf.exe195⤵PID:372
-
\??\c:\7bnhhb.exec:\7bnhhb.exe196⤵PID:4952
-
\??\c:\nhnhtt.exec:\nhnhtt.exe197⤵PID:4332
-
\??\c:\vdjjv.exec:\vdjjv.exe198⤵PID:4712
-
\??\c:\ppvvp.exec:\ppvvp.exe199⤵PID:3544
-
\??\c:\jpdpd.exec:\jpdpd.exe200⤵PID:4120
-
\??\c:\rrfffrx.exec:\rrfffrx.exe201⤵PID:2240
-
\??\c:\lfrlxxl.exec:\lfrlxxl.exe202⤵PID:4588
-
\??\c:\nhhbhb.exec:\nhhbhb.exe203⤵PID:5092
-
\??\c:\bhbthh.exec:\bhbthh.exe204⤵PID:2288
-
\??\c:\pvppd.exec:\pvppd.exe205⤵PID:2848
-
\??\c:\dvvpd.exec:\dvvpd.exe206⤵PID:3568
-
\??\c:\xrrlxrl.exec:\xrrlxrl.exe207⤵PID:1608
-
\??\c:\xrllffx.exec:\xrllffx.exe208⤵PID:3464
-
\??\c:\bnhhbt.exec:\bnhhbt.exe209⤵PID:2620
-
\??\c:\bhhhtn.exec:\bhhhtn.exe210⤵PID:4220
-
\??\c:\vjjjd.exec:\vjjjd.exe211⤵PID:4732
-
\??\c:\7dvvp.exec:\7dvvp.exe212⤵PID:1092
-
\??\c:\1flxllr.exec:\1flxllr.exe213⤵PID:3960
-
\??\c:\xlfxrxr.exec:\xlfxrxr.exe214⤵PID:4248
-
\??\c:\thnhhb.exec:\thnhhb.exe215⤵PID:1172
-
\??\c:\nhhtbt.exec:\nhhtbt.exe216⤵PID:224
-
\??\c:\vppjv.exec:\vppjv.exe217⤵PID:1416
-
\??\c:\dvpdp.exec:\dvpdp.exe218⤵PID:4432
-
\??\c:\lfrfrrl.exec:\lfrfrrl.exe219⤵PID:4048
-
\??\c:\rlfllxx.exec:\rlfllxx.exe220⤵PID:3656
-
\??\c:\hhhtnh.exec:\hhhtnh.exe221⤵PID:2888
-
\??\c:\hntnbb.exec:\hntnbb.exe222⤵PID:3344
-
\??\c:\jddvp.exec:\jddvp.exe223⤵PID:4436
-
\??\c:\9ddvj.exec:\9ddvj.exe224⤵PID:2832
-
\??\c:\fffrfxl.exec:\fffrfxl.exe225⤵PID:1084
-
\??\c:\lxrlxxf.exec:\lxrlxxf.exe226⤵PID:2352
-
\??\c:\5btnhh.exec:\5btnhh.exe227⤵PID:3372
-
\??\c:\tbnbnh.exec:\tbnbnh.exe228⤵PID:3576
-
\??\c:\nnnbtn.exec:\nnnbtn.exe229⤵PID:3260
-
\??\c:\jpvpv.exec:\jpvpv.exe230⤵PID:5096
-
\??\c:\ddddv.exec:\ddddv.exe231⤵PID:4460
-
\??\c:\xrlrfxl.exec:\xrlrfxl.exe232⤵PID:1096
-
\??\c:\rffxrll.exec:\rffxrll.exe233⤵PID:2792
-
\??\c:\nbthtt.exec:\nbthtt.exe234⤵PID:1116
-
\??\c:\htnthb.exec:\htnthb.exe235⤵PID:4408
-
\??\c:\pjvpd.exec:\pjvpd.exe236⤵PID:372
-
\??\c:\5vvjv.exec:\5vvjv.exe237⤵PID:4952
-
\??\c:\xllxlfx.exec:\xllxlfx.exe238⤵PID:1688
-
\??\c:\lffxrlx.exec:\lffxrlx.exe239⤵PID:1860
-
\??\c:\bnnnhb.exec:\bnnnhb.exe240⤵PID:2376
-
\??\c:\bbnnbt.exec:\bbnnbt.exe241⤵PID:4028
-
\??\c:\jdjjd.exec:\jdjjd.exe242⤵PID:4672