Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 23:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe
-
Size
374KB
-
MD5
61391507ef42fee71c6d0b7e336bf22a
-
SHA1
7eea423a162e57449d1df0726a2fff3c60f52249
-
SHA256
ff74659f38626027cf7c1db434e718f506fedb2ffd22ca4203a5bc2e1a52609f
-
SHA512
c6794d7e1c9af598cd235b49b03f37363427a96812b20f14407be591478db9c1d08a7e7d73ffe88523bb88b40a9f1387372030b0d12d8fe5fe75378deb0cae33
-
SSDEEP
3072:8hOm2sI93UufdC67cimD5t251UrRE9TTFwCFtI:8cm7ImGddXmNt251UriZFwCFW
Malware Config
Signatures
-
Detect Blackmoon payload 41 IoCs
Processes:
resource yara_rule behavioral1/memory/1284-1-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2356-16-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2264-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2688-34-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2684-45-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2680-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2356-59-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2704-64-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2424-75-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2388-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2760-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2144-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2252-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/812-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2512-160-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2512-157-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1040-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1660-171-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3012-196-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/3012-195-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1680-207-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3052-204-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1384-247-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1796-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1764-283-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1872-301-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2956-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2676-348-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2448-368-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2696-375-0x00000000001C0000-0x00000000001EA000-memory.dmp family_blackmoon behavioral1/memory/1892-419-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1996-438-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1852-537-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1488-622-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2552-628-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2676-649-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2280-702-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2412-740-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2080-766-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2080-773-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2860-788-0x00000000002C0000-0x00000000002EA000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
prnfx.exeltxrnj.exexrtjb.exelrvvvl.exeldnbr.exennbxhx.exertlxf.exevxtfnt.exefffdxp.exelvrlt.exevlpxrfn.exejhblxth.exernjfx.exebvrrb.exejdnhpd.exeplvpfn.exetnlbxtf.exelbjbt.exenlpjt.exevljdvb.exejdvljdj.exefftnlph.exefdblbbj.exebhxnln.exenrvlj.exefdtvvf.exenlfrhx.exexpvdpn.exeprvln.exethbjpxj.exejffhht.exeblhhjxt.exebhbfrxd.exexxpbptn.exepptvbb.exerfnrbf.exefpxfphl.exedtxlhv.exejnrxblx.exehpbtvh.exejjvjfl.exefvrtvp.exelfhjtf.exerftfn.exefnbflfx.exelrrvxlb.exerjxpr.exefrjrpr.exejrhlx.exexpnjtrr.exelfnll.exefltfxf.exentvxhvx.exejhdbf.exexxdtvt.exelrhvnj.exebbdtdb.exerlbpjvb.exendthx.exepnhtbj.exenpvbf.exexxbrx.exenrvjllf.exenfppxx.exepid process 2356 prnfx.exe 2264 ltxrnj.exe 2688 xrtjb.exe 2684 lrvvvl.exe 2680 ldnbr.exe 2704 nnbxhx.exe 2424 rtlxf.exe 2388 vxtfnt.exe 2280 fffdxp.exe 2760 lvrlt.exe 2804 vlpxrfn.exe 2144 jhblxth.exe 2252 rnjfx.exe 812 bvrrb.exe 764 jdnhpd.exe 2512 plvpfn.exe 1040 tnlbxtf.exe 1660 lbjbt.exe 2024 nlpjt.exe 3012 vljdvb.exe 3052 jdvljdj.exe 1680 fftnlph.exe 1200 fdblbbj.exe 856 bhxnln.exe 1984 nrvlj.exe 1384 fdtvvf.exe 1796 nlfrhx.exe 2200 xpvdpn.exe 884 prvln.exe 1764 thbjpxj.exe 2120 jffhht.exe 1872 blhhjxt.exe 2232 bhbfrxd.exe 2956 xxpbptn.exe 2032 pptvbb.exe 1768 rfnrbf.exe 2624 fpxfphl.exe 2580 dtxlhv.exe 2676 jnrxblx.exe 2684 hpbtvh.exe 2848 jjvjfl.exe 2448 fvrtvp.exe 2696 lfhjtf.exe 2496 rftfn.exe 2924 fnbflfx.exe 240 lrrvxlb.exe 1392 rjxpr.exe 2800 frjrpr.exe 2828 jrhlx.exe 1892 xpnjtrr.exe 1676 lfnll.exe 1996 fltfxf.exe 1640 ntvxhvx.exe 276 jhdbf.exe 2708 xxdtvt.exe 1648 lrhvnj.exe 1740 bbdtdb.exe 2312 rlbpjvb.exe 1636 ndthx.exe 1288 pnhtbj.exe 2104 npvbf.exe 2876 xxbrx.exe 3052 nrvjllf.exe 1356 nfppxx.exe -
Processes:
resource yara_rule behavioral1/memory/1284-1-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2356-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2264-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2688-34-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2684-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2684-45-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2704-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2680-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2704-64-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2424-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2388-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2760-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2144-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2252-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/812-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/812-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2512-160-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1040-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1660-171-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-195-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1680-207-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3052-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3012-239-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1384-247-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1796-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/884-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1764-283-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1872-293-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1872-301-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2200-309-0x00000000002C0000-0x00000000002EA000-memory.dmp upx behavioral1/memory/2956-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2676-348-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2448-361-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2496-376-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1892-419-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1676-425-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1640-439-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1996-438-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2368-523-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1852-537-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2840-574-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2552-628-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2676-649-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3008-655-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2420-663-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2412-740-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1760-759-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2080-766-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2860-780-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exeprnfx.exeltxrnj.exexrtjb.exelrvvvl.exeldnbr.exennbxhx.exertlxf.exevxtfnt.exefffdxp.exelvrlt.exevlpxrfn.exejhblxth.exernjfx.exebvrrb.exejdnhpd.exedescription pid process target process PID 1284 wrote to memory of 2356 1284 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe prnfx.exe PID 1284 wrote to memory of 2356 1284 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe prnfx.exe PID 1284 wrote to memory of 2356 1284 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe prnfx.exe PID 1284 wrote to memory of 2356 1284 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe prnfx.exe PID 2356 wrote to memory of 2264 2356 prnfx.exe ltxrnj.exe PID 2356 wrote to memory of 2264 2356 prnfx.exe ltxrnj.exe PID 2356 wrote to memory of 2264 2356 prnfx.exe ltxrnj.exe PID 2356 wrote to memory of 2264 2356 prnfx.exe ltxrnj.exe PID 2264 wrote to memory of 2688 2264 ltxrnj.exe xrtjb.exe PID 2264 wrote to memory of 2688 2264 ltxrnj.exe xrtjb.exe PID 2264 wrote to memory of 2688 2264 ltxrnj.exe xrtjb.exe PID 2264 wrote to memory of 2688 2264 ltxrnj.exe xrtjb.exe PID 2688 wrote to memory of 2684 2688 xrtjb.exe lrvvvl.exe PID 2688 wrote to memory of 2684 2688 xrtjb.exe lrvvvl.exe PID 2688 wrote to memory of 2684 2688 xrtjb.exe lrvvvl.exe PID 2688 wrote to memory of 2684 2688 xrtjb.exe lrvvvl.exe PID 2684 wrote to memory of 2680 2684 lrvvvl.exe ldnbr.exe PID 2684 wrote to memory of 2680 2684 lrvvvl.exe ldnbr.exe PID 2684 wrote to memory of 2680 2684 lrvvvl.exe ldnbr.exe PID 2684 wrote to memory of 2680 2684 lrvvvl.exe ldnbr.exe PID 2680 wrote to memory of 2704 2680 ldnbr.exe nnbxhx.exe PID 2680 wrote to memory of 2704 2680 ldnbr.exe nnbxhx.exe PID 2680 wrote to memory of 2704 2680 ldnbr.exe nnbxhx.exe PID 2680 wrote to memory of 2704 2680 ldnbr.exe nnbxhx.exe PID 2704 wrote to memory of 2424 2704 nnbxhx.exe rtlxf.exe PID 2704 wrote to memory of 2424 2704 nnbxhx.exe rtlxf.exe PID 2704 wrote to memory of 2424 2704 nnbxhx.exe rtlxf.exe PID 2704 wrote to memory of 2424 2704 nnbxhx.exe rtlxf.exe PID 2424 wrote to memory of 2388 2424 rtlxf.exe vxtfnt.exe PID 2424 wrote to memory of 2388 2424 rtlxf.exe vxtfnt.exe PID 2424 wrote to memory of 2388 2424 rtlxf.exe vxtfnt.exe PID 2424 wrote to memory of 2388 2424 rtlxf.exe vxtfnt.exe PID 2388 wrote to memory of 2280 2388 vxtfnt.exe fffdxp.exe PID 2388 wrote to memory of 2280 2388 vxtfnt.exe fffdxp.exe PID 2388 wrote to memory of 2280 2388 vxtfnt.exe fffdxp.exe PID 2388 wrote to memory of 2280 2388 vxtfnt.exe fffdxp.exe PID 2280 wrote to memory of 2760 2280 fffdxp.exe lvrlt.exe PID 2280 wrote to memory of 2760 2280 fffdxp.exe lvrlt.exe PID 2280 wrote to memory of 2760 2280 fffdxp.exe lvrlt.exe PID 2280 wrote to memory of 2760 2280 fffdxp.exe lvrlt.exe PID 2760 wrote to memory of 2804 2760 lvrlt.exe vlpxrfn.exe PID 2760 wrote to memory of 2804 2760 lvrlt.exe vlpxrfn.exe PID 2760 wrote to memory of 2804 2760 lvrlt.exe vlpxrfn.exe PID 2760 wrote to memory of 2804 2760 lvrlt.exe vlpxrfn.exe PID 2804 wrote to memory of 2144 2804 vlpxrfn.exe jhblxth.exe PID 2804 wrote to memory of 2144 2804 vlpxrfn.exe jhblxth.exe PID 2804 wrote to memory of 2144 2804 vlpxrfn.exe jhblxth.exe PID 2804 wrote to memory of 2144 2804 vlpxrfn.exe jhblxth.exe PID 2144 wrote to memory of 2252 2144 jhblxth.exe rnjfx.exe PID 2144 wrote to memory of 2252 2144 jhblxth.exe rnjfx.exe PID 2144 wrote to memory of 2252 2144 jhblxth.exe rnjfx.exe PID 2144 wrote to memory of 2252 2144 jhblxth.exe rnjfx.exe PID 2252 wrote to memory of 812 2252 rnjfx.exe bvrrb.exe PID 2252 wrote to memory of 812 2252 rnjfx.exe bvrrb.exe PID 2252 wrote to memory of 812 2252 rnjfx.exe bvrrb.exe PID 2252 wrote to memory of 812 2252 rnjfx.exe bvrrb.exe PID 812 wrote to memory of 764 812 bvrrb.exe jdnhpd.exe PID 812 wrote to memory of 764 812 bvrrb.exe jdnhpd.exe PID 812 wrote to memory of 764 812 bvrrb.exe jdnhpd.exe PID 812 wrote to memory of 764 812 bvrrb.exe jdnhpd.exe PID 764 wrote to memory of 2512 764 jdnhpd.exe plvpfn.exe PID 764 wrote to memory of 2512 764 jdnhpd.exe plvpfn.exe PID 764 wrote to memory of 2512 764 jdnhpd.exe plvpfn.exe PID 764 wrote to memory of 2512 764 jdnhpd.exe plvpfn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\prnfx.exec:\prnfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\ltxrnj.exec:\ltxrnj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\xrtjb.exec:\xrtjb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\lrvvvl.exec:\lrvvvl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\ldnbr.exec:\ldnbr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\nnbxhx.exec:\nnbxhx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\rtlxf.exec:\rtlxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\vxtfnt.exec:\vxtfnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\fffdxp.exec:\fffdxp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\lvrlt.exec:\lvrlt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\vlpxrfn.exec:\vlpxrfn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\jhblxth.exec:\jhblxth.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\rnjfx.exec:\rnjfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\bvrrb.exec:\bvrrb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\jdnhpd.exec:\jdnhpd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\plvpfn.exec:\plvpfn.exe17⤵
- Executes dropped EXE
PID:2512 -
\??\c:\tnlbxtf.exec:\tnlbxtf.exe18⤵
- Executes dropped EXE
PID:1040 -
\??\c:\lbjbt.exec:\lbjbt.exe19⤵
- Executes dropped EXE
PID:1660 -
\??\c:\nlpjt.exec:\nlpjt.exe20⤵
- Executes dropped EXE
PID:2024 -
\??\c:\vljdvb.exec:\vljdvb.exe21⤵
- Executes dropped EXE
PID:3012 -
\??\c:\jdvljdj.exec:\jdvljdj.exe22⤵
- Executes dropped EXE
PID:3052 -
\??\c:\fftnlph.exec:\fftnlph.exe23⤵
- Executes dropped EXE
PID:1680 -
\??\c:\fdblbbj.exec:\fdblbbj.exe24⤵
- Executes dropped EXE
PID:1200 -
\??\c:\bhxnln.exec:\bhxnln.exe25⤵
- Executes dropped EXE
PID:856 -
\??\c:\nrvlj.exec:\nrvlj.exe26⤵
- Executes dropped EXE
PID:1984 -
\??\c:\fdtvvf.exec:\fdtvvf.exe27⤵
- Executes dropped EXE
PID:1384 -
\??\c:\nlfrhx.exec:\nlfrhx.exe28⤵
- Executes dropped EXE
PID:1796 -
\??\c:\xpvdpn.exec:\xpvdpn.exe29⤵
- Executes dropped EXE
PID:2200 -
\??\c:\prvln.exec:\prvln.exe30⤵
- Executes dropped EXE
PID:884 -
\??\c:\thbjpxj.exec:\thbjpxj.exe31⤵
- Executes dropped EXE
PID:1764 -
\??\c:\jffhht.exec:\jffhht.exe32⤵
- Executes dropped EXE
PID:2120 -
\??\c:\blhhjxt.exec:\blhhjxt.exe33⤵
- Executes dropped EXE
PID:1872 -
\??\c:\bhbfrxd.exec:\bhbfrxd.exe34⤵
- Executes dropped EXE
PID:2232 -
\??\c:\xxpbptn.exec:\xxpbptn.exe35⤵
- Executes dropped EXE
PID:2956 -
\??\c:\pptvbb.exec:\pptvbb.exe36⤵
- Executes dropped EXE
PID:2032 -
\??\c:\rfnrbf.exec:\rfnrbf.exe37⤵
- Executes dropped EXE
PID:1768 -
\??\c:\fpxfphl.exec:\fpxfphl.exe38⤵
- Executes dropped EXE
PID:2624 -
\??\c:\dtxlhv.exec:\dtxlhv.exe39⤵
- Executes dropped EXE
PID:2580 -
\??\c:\jnrxblx.exec:\jnrxblx.exe40⤵
- Executes dropped EXE
PID:2676 -
\??\c:\hpbtvh.exec:\hpbtvh.exe41⤵
- Executes dropped EXE
PID:2684 -
\??\c:\jjvjfl.exec:\jjvjfl.exe42⤵
- Executes dropped EXE
PID:2848 -
\??\c:\fvrtvp.exec:\fvrtvp.exe43⤵
- Executes dropped EXE
PID:2448 -
\??\c:\lfhjtf.exec:\lfhjtf.exe44⤵
- Executes dropped EXE
PID:2696 -
\??\c:\rftfn.exec:\rftfn.exe45⤵
- Executes dropped EXE
PID:2496 -
\??\c:\fnbflfx.exec:\fnbflfx.exe46⤵
- Executes dropped EXE
PID:2924 -
\??\c:\lrrvxlb.exec:\lrrvxlb.exe47⤵
- Executes dropped EXE
PID:240 -
\??\c:\rjxpr.exec:\rjxpr.exe48⤵
- Executes dropped EXE
PID:1392 -
\??\c:\frjrpr.exec:\frjrpr.exe49⤵
- Executes dropped EXE
PID:2800 -
\??\c:\jrhlx.exec:\jrhlx.exe50⤵
- Executes dropped EXE
PID:2828 -
\??\c:\xpnjtrr.exec:\xpnjtrr.exe51⤵
- Executes dropped EXE
PID:1892 -
\??\c:\lfnll.exec:\lfnll.exe52⤵
- Executes dropped EXE
PID:1676 -
\??\c:\fltfxf.exec:\fltfxf.exe53⤵
- Executes dropped EXE
PID:1996 -
\??\c:\ntvxhvx.exec:\ntvxhvx.exe54⤵
- Executes dropped EXE
PID:1640 -
\??\c:\jhdbf.exec:\jhdbf.exe55⤵
- Executes dropped EXE
PID:276 -
\??\c:\xxdtvt.exec:\xxdtvt.exe56⤵
- Executes dropped EXE
PID:2708 -
\??\c:\lrhvnj.exec:\lrhvnj.exe57⤵
- Executes dropped EXE
PID:1648 -
\??\c:\bbdtdb.exec:\bbdtdb.exe58⤵
- Executes dropped EXE
PID:1740 -
\??\c:\rlbpjvb.exec:\rlbpjvb.exe59⤵
- Executes dropped EXE
PID:2312 -
\??\c:\ndthx.exec:\ndthx.exe60⤵
- Executes dropped EXE
PID:1636 -
\??\c:\pnhtbj.exec:\pnhtbj.exe61⤵
- Executes dropped EXE
PID:1288 -
\??\c:\npvbf.exec:\npvbf.exe62⤵
- Executes dropped EXE
PID:2104 -
\??\c:\xxbrx.exec:\xxbrx.exe63⤵
- Executes dropped EXE
PID:2876 -
\??\c:\nrvjllf.exec:\nrvjllf.exe64⤵
- Executes dropped EXE
PID:3052 -
\??\c:\nfppxx.exec:\nfppxx.exe65⤵
- Executes dropped EXE
PID:1356 -
\??\c:\dpttld.exec:\dpttld.exe66⤵PID:440
-
\??\c:\pxrdlh.exec:\pxrdlh.exe67⤵PID:2368
-
\??\c:\xhrdb.exec:\xhrdb.exe68⤵PID:1852
-
\??\c:\vpvvjlt.exec:\vpvvjlt.exe69⤵PID:828
-
\??\c:\lthrlxt.exec:\lthrlxt.exe70⤵PID:976
-
\??\c:\pdrhfhb.exec:\pdrhfhb.exe71⤵PID:1756
-
\??\c:\pbppf.exec:\pbppf.exe72⤵PID:2200
-
\??\c:\frljt.exec:\frljt.exe73⤵PID:2324
-
\??\c:\pdjbp.exec:\pdjbp.exe74⤵PID:2840
-
\??\c:\dpjhv.exec:\dpjhv.exe75⤵PID:1488
-
\??\c:\jfrpxr.exec:\jfrpxr.exe76⤵PID:2900
-
\??\c:\ltldxxj.exec:\ltldxxj.exe77⤵PID:1628
-
\??\c:\fvjhp.exec:\fvjhp.exe78⤵PID:888
-
\??\c:\nlhxbf.exec:\nlhxbf.exe79⤵PID:1596
-
\??\c:\vxvft.exec:\vxvft.exe80⤵PID:2980
-
\??\c:\fttxn.exec:\fttxn.exe81⤵PID:1708
-
\??\c:\bphrvbx.exec:\bphrvbx.exe82⤵PID:2552
-
\??\c:\thhljxd.exec:\thhljxd.exe83⤵PID:2632
-
\??\c:\lbfbtxv.exec:\lbfbtxv.exe84⤵PID:2852
-
\??\c:\xlflrpt.exec:\xlflrpt.exe85⤵PID:2676
-
\??\c:\xnhvr.exec:\xnhvr.exe86⤵PID:3008
-
\??\c:\xldnx.exec:\xldnx.exe87⤵PID:2420
-
\??\c:\frjpr.exec:\frjpr.exe88⤵PID:2456
-
\??\c:\txxjbl.exec:\txxjbl.exe89⤵PID:2472
-
\??\c:\npfvbtf.exec:\npfvbtf.exe90⤵PID:2388
-
\??\c:\hrpjlh.exec:\hrpjlh.exe91⤵PID:2924
-
\??\c:\ddltv.exec:\ddltv.exe92⤵PID:2280
-
\??\c:\dvpjd.exec:\dvpjd.exe93⤵PID:2404
-
\??\c:\tnxbj.exec:\tnxbj.exe94⤵PID:2816
-
\??\c:\dtxdfbh.exec:\dtxdfbh.exe95⤵PID:956
-
\??\c:\ntnxrr.exec:\ntnxrr.exe96⤵PID:1308
-
\??\c:\xtxhlx.exec:\xtxhlx.exe97⤵PID:1296
-
\??\c:\brphtb.exec:\brphtb.exe98⤵PID:760
-
\??\c:\bpnrvdr.exec:\bpnrvdr.exe99⤵PID:2412
-
\??\c:\vhlhnt.exec:\vhlhnt.exe100⤵PID:2272
-
\??\c:\dfpvv.exec:\dfpvv.exe101⤵PID:2752
-
\??\c:\fthbfh.exec:\fthbfh.exe102⤵PID:1760
-
\??\c:\nvhdx.exec:\nvhdx.exe103⤵PID:2080
-
\??\c:\hnbhf.exec:\hnbhf.exe104⤵PID:2288
-
\??\c:\rfrblfd.exec:\rfrblfd.exe105⤵PID:2860
-
\??\c:\btxhjb.exec:\btxhjb.exe106⤵PID:468
-
\??\c:\trlxhnh.exec:\trlxhnh.exe107⤵PID:2104
-
\??\c:\jlhdjnn.exec:\jlhdjnn.exe108⤵PID:2876
-
\??\c:\fbjfnt.exec:\fbjfnt.exe109⤵PID:400
-
\??\c:\ldxnd.exec:\ldxnd.exe110⤵PID:1116
-
\??\c:\jblnxrl.exec:\jblnxrl.exe111⤵PID:856
-
\??\c:\vjjvdxh.exec:\vjjvdxh.exe112⤵PID:2776
-
\??\c:\xxxhn.exec:\xxxhn.exe113⤵PID:1588
-
\??\c:\hjnlnvh.exec:\hjnlnvh.exe114⤵PID:828
-
\??\c:\nfbfj.exec:\nfbfj.exe115⤵PID:976
-
\??\c:\dlrpfx.exec:\dlrpfx.exe116⤵PID:1204
-
\??\c:\pvdprp.exec:\pvdprp.exe117⤵PID:2856
-
\??\c:\xbjhxvt.exec:\xbjhxvt.exe118⤵PID:1268
-
\??\c:\tprnpr.exec:\tprnpr.exe119⤵PID:2216
-
\??\c:\xjrfhh.exec:\xjrfhh.exe120⤵PID:2904
-
\??\c:\ndtdj.exec:\ndtdj.exe121⤵PID:2896
-
\??\c:\fplrdjl.exec:\fplrdjl.exe122⤵PID:2064
-
\??\c:\jvvdttd.exec:\jvvdttd.exe123⤵PID:1872
-
\??\c:\ntbthvp.exec:\ntbthvp.exe124⤵PID:1284
-
\??\c:\pfnvlb.exec:\pfnvlb.exe125⤵PID:1572
-
\??\c:\vbxtfr.exec:\vbxtfr.exe126⤵PID:2032
-
\??\c:\xhpjxhj.exec:\xhpjxhj.exe127⤵PID:2264
-
\??\c:\pnnvtj.exec:\pnnvtj.exe128⤵PID:2564
-
\??\c:\vfjddpr.exec:\vfjddpr.exe129⤵PID:2604
-
\??\c:\dxhvr.exec:\dxhvr.exe130⤵PID:2460
-
\??\c:\vlhdflv.exec:\vlhdflv.exe131⤵PID:2540
-
\??\c:\vdrhpd.exec:\vdrhpd.exe132⤵PID:2592
-
\??\c:\hxjpd.exec:\hxjpd.exe133⤵PID:2480
-
\??\c:\vltjx.exec:\vltjx.exe134⤵PID:2376
-
\??\c:\tbvrfl.exec:\tbvrfl.exe135⤵PID:2544
-
\??\c:\jxptpr.exec:\jxptpr.exe136⤵PID:2992
-
\??\c:\vnlhx.exec:\vnlhx.exe137⤵PID:240
-
\??\c:\xlvln.exec:\xlvln.exe138⤵PID:2768
-
\??\c:\nhpfxjh.exec:\nhpfxjh.exe139⤵PID:2800
-
\??\c:\bdtxbn.exec:\bdtxbn.exe140⤵PID:1848
-
\??\c:\lblvx.exec:\lblvx.exe141⤵PID:2136
-
\??\c:\nptprv.exec:\nptprv.exe142⤵PID:1980
-
\??\c:\dbtxjxd.exec:\dbtxjxd.exe143⤵PID:2672
-
\??\c:\hxjfjn.exec:\hxjfjn.exe144⤵PID:760
-
\??\c:\ftrtxtr.exec:\ftrtxtr.exe145⤵PID:2412
-
\??\c:\bpdfr.exec:\bpdfr.exe146⤵PID:1516
-
\??\c:\xvtpvb.exec:\xvtpvb.exe147⤵PID:1744
-
\??\c:\fxvjb.exec:\fxvjb.exe148⤵PID:1760
-
\??\c:\pblltbj.exec:\pblltbj.exe149⤵PID:2080
-
\??\c:\pbbhj.exec:\pbbhj.exe150⤵PID:2288
-
\??\c:\vhnrb.exec:\vhnrb.exe151⤵PID:2308
-
\??\c:\bjfnvh.exec:\bjfnvh.exe152⤵PID:2316
-
\??\c:\rnrfd.exec:\rnrfd.exe153⤵PID:1288
-
\??\c:\nxvbjx.exec:\nxvbjx.exe154⤵PID:1680
-
\??\c:\nlfrv.exec:\nlfrv.exe155⤵PID:2084
-
\??\c:\xtlfhtb.exec:\xtlfhtb.exe156⤵PID:1148
-
\??\c:\plvdlxn.exec:\plvdlxn.exe157⤵PID:1440
-
\??\c:\tndlfx.exec:\tndlfx.exe158⤵PID:1644
-
\??\c:\lfvhxnn.exec:\lfvhxnn.exe159⤵PID:1128
-
\??\c:\lnfvhv.exec:\lnfvhv.exe160⤵PID:1836
-
\??\c:\rxbnl.exec:\rxbnl.exe161⤵PID:2176
-
\??\c:\btxjjj.exec:\btxjjj.exe162⤵PID:1728
-
\??\c:\vppvx.exec:\vppvx.exe163⤵PID:2892
-
\??\c:\ddtjbjb.exec:\ddtjbjb.exe164⤵PID:1748
-
\??\c:\rnpbf.exec:\rnpbf.exe165⤵PID:2132
-
\??\c:\tbhhthp.exec:\tbhhthp.exe166⤵PID:1300
-
\??\c:\vrjfbvh.exec:\vrjfbvh.exe167⤵PID:1044
-
\??\c:\tfpvnbx.exec:\tfpvnbx.exe168⤵PID:2888
-
\??\c:\dhjflv.exec:\dhjflv.exe169⤵PID:2056
-
\??\c:\dfxtdt.exec:\dfxtdt.exe170⤵PID:2948
-
\??\c:\xbdltjf.exec:\xbdltjf.exe171⤵PID:1596
-
\??\c:\pbdxtn.exec:\pbdxtn.exe172⤵PID:2912
-
\??\c:\hvvbf.exec:\hvvbf.exe173⤵PID:1708
-
\??\c:\pdrxx.exec:\pdrxx.exe174⤵PID:2616
-
\??\c:\xrxxd.exec:\xrxxd.exe175⤵PID:2548
-
\??\c:\pfxlph.exec:\pfxlph.exe176⤵PID:2564
-
\??\c:\trnjhl.exec:\trnjhl.exe177⤵PID:2676
-
\??\c:\xhtnp.exec:\xhtnp.exe178⤵PID:2560
-
\??\c:\nnrbdb.exec:\nnrbdb.exe179⤵PID:2440
-
\??\c:\bfxlplt.exec:\bfxlplt.exe180⤵PID:1432
-
\??\c:\nblhtdl.exec:\nblhtdl.exe181⤵PID:2488
-
\??\c:\bhdlbl.exec:\bhdlbl.exe182⤵PID:2928
-
\??\c:\dhvxn.exec:\dhvxn.exe183⤵PID:2408
-
\??\c:\vnfbx.exec:\vnfbx.exe184⤵PID:436
-
\??\c:\dffpt.exec:\dffpt.exe185⤵PID:240
-
\??\c:\rlhbl.exec:\rlhbl.exe186⤵PID:2476
-
\??\c:\tdprx.exec:\tdprx.exe187⤵PID:2796
-
\??\c:\lvrrfh.exec:\lvrrfh.exe188⤵PID:948
-
\??\c:\vvntx.exec:\vvntx.exe189⤵PID:1324
-
\??\c:\frdfbjt.exec:\frdfbjt.exe190⤵PID:1308
-
\??\c:\prbdr.exec:\prbdr.exe191⤵PID:2672
-
\??\c:\pxnhdt.exec:\pxnhdt.exe192⤵PID:864
-
\??\c:\pvhjvpp.exec:\pvhjvpp.exe193⤵PID:768
-
\??\c:\pvlvvph.exec:\pvlvvph.exe194⤵PID:2708
-
\??\c:\fvlhr.exec:\fvlhr.exe195⤵PID:1744
-
\??\c:\bhnvd.exec:\bhnvd.exe196⤵PID:1760
-
\??\c:\phdldph.exec:\phdldph.exe197⤵PID:1660
-
\??\c:\dhpjrl.exec:\dhpjrl.exe198⤵PID:3020
-
\??\c:\xxdtj.exec:\xxdtj.exe199⤵PID:2308
-
\??\c:\fptnfp.exec:\fptnfp.exe200⤵PID:2316
-
\??\c:\jlljdh.exec:\jlljdh.exe201⤵PID:2052
-
\??\c:\frrpxh.exec:\frrpxh.exe202⤵PID:3068
-
\??\c:\xtfdtf.exec:\xtfdtf.exe203⤵PID:652
-
\??\c:\vfbnb.exec:\vfbnb.exe204⤵PID:1344
-
\??\c:\fprvtrl.exec:\fprvtrl.exe205⤵PID:1112
-
\??\c:\vrbtdf.exec:\vrbtdf.exe206⤵PID:1816
-
\??\c:\hjlrj.exec:\hjlrj.exe207⤵PID:1128
-
\??\c:\nxvvttn.exec:\nxvvttn.exe208⤵PID:1836
-
\??\c:\rvjbj.exec:\rvjbj.exe209⤵PID:2176
-
\??\c:\vldnbv.exec:\vldnbv.exe210⤵PID:1088
-
\??\c:\phtfrvv.exec:\phtfrvv.exe211⤵PID:2892
-
\??\c:\vlljlx.exec:\vlljlx.exe212⤵PID:1748
-
\??\c:\xddlxhh.exec:\xddlxhh.exe213⤵PID:2132
-
\??\c:\hhlldfd.exec:\hhlldfd.exe214⤵PID:1300
-
\??\c:\nrjvxv.exec:\nrjvxv.exe215⤵PID:616
-
\??\c:\fddxxn.exec:\fddxxn.exe216⤵PID:2056
-
\??\c:\pjlnl.exec:\pjlnl.exe217⤵PID:2836
-
\??\c:\lbxbxj.exec:\lbxbxj.exe218⤵PID:1512
-
\??\c:\ppvfblf.exec:\ppvfblf.exe219⤵PID:3004
-
\??\c:\phhpdbn.exec:\phhpdbn.exe220⤵PID:1568
-
\??\c:\rppfx.exec:\rppfx.exe221⤵PID:2568
-
\??\c:\lvthfdd.exec:\lvthfdd.exe222⤵PID:2624
-
\??\c:\vhtxdt.exec:\vhtxdt.exe223⤵PID:2004
-
\??\c:\jbdln.exec:\jbdln.exe224⤵PID:2564
-
\??\c:\dddlbb.exec:\dddlbb.exe225⤵PID:2676
-
\??\c:\ttjdrxr.exec:\ttjdrxr.exe226⤵PID:2464
-
\??\c:\plfvhbh.exec:\plfvhbh.exe227⤵PID:2028
-
\??\c:\vlxttxj.exec:\vlxttxj.exe228⤵PID:2468
-
\??\c:\jrppd.exec:\jrppd.exe229⤵PID:2488
-
\??\c:\lflnnnf.exec:\lflnnnf.exe230⤵PID:1172
-
\??\c:\lvlfjxr.exec:\lvlfjxr.exe231⤵PID:1396
-
\??\c:\rptvjrx.exec:\rptvjrx.exe232⤵PID:2812
-
\??\c:\tfpdbv.exec:\tfpdbv.exe233⤵PID:1052
-
\??\c:\xnxhljx.exec:\xnxhljx.exe234⤵PID:2824
-
\??\c:\bdbnbbt.exec:\bdbnbbt.exe235⤵PID:1848
-
\??\c:\lxlflt.exec:\lxlflt.exe236⤵PID:1992
-
\??\c:\pnfdvb.exec:\pnfdvb.exe237⤵PID:948
-
\??\c:\btlnxtd.exec:\btlnxtd.exe238⤵PID:2484
-
\??\c:\fhbxx.exec:\fhbxx.exe239⤵PID:812
-
\??\c:\pfxvplh.exec:\pfxvplh.exe240⤵PID:2744
-
\??\c:\htdhj.exec:\htdhj.exe241⤵PID:2460
-
\??\c:\fxvnxf.exec:\fxvnxf.exe242⤵PID:1648