Analysis
-
max time kernel
90s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe
-
Size
88KB
-
MD5
d3e3de1053468af11e1d6d52c21bcebf
-
SHA1
5dc49c66fb81a6b9eeeb42a1d83baca14dc52d93
-
SHA256
acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6
-
SHA512
012ff76db905a1bf28dc98ba87fc1ad569166db0eb6e62ebd19f2dd7257df6383691f46b6f8b8857fb365191b0b270c927b072216e913ae146ed8dd9ede59fbf
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoLU1grORPfr0k890Ct:ymb3NkkiQ3mdBjFoLk8Pk890Ct
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/4868-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3016-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4064-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2432-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1740-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4244-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1460-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4696-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/704-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4496-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3512-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/432-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1088-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/440-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5004-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5004-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/336-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3688-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3464-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 35 IoCs
Processes:
resource yara_rule behavioral2/memory/4868-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3016-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5052-55-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4064-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2432-98-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1684-122-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4412-140-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1740-205-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4244-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1460-182-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4696-176-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3148-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4120-165-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/704-152-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4496-146-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3512-115-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/432-110-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1088-104-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/440-92-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1580-83-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/840-67-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4576-69-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/840-60-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/840-59-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/840-58-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5004-42-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5004-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5004-35-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5004-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/336-28-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3688-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3688-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3688-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3688-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3464-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
hbhttt.exe4028646.exe8220044.exenhhbtt.exehhbbtb.exehttbhh.exe48666.exe826420.exeddvvp.exethnntb.exe2228244.exe084888.exettntbb.exevdvdv.exe884884.exeppjjd.exe22620.exe06280.exe2666482.exefflfrfr.exedvvdd.exe06680.exe224044.exe48846.exexfrfxrl.exethbthb.exe4222228.exefxffflr.exejppvv.exe1fxrfrl.exebttbtt.exe26604.exe6604844.exe0882646.exevdpdv.exe46284.exe24000.exelfffxll.exenhtnbb.exe4422066.exepjjpd.exevppjd.exe88804.exe224022.exea0040.exeq24020.exe608266.exe88800.exe0260488.exejppvv.exe1hhntb.exe02288.exehhbtnh.exe4626448.exetbttbt.exe262600.exexrxxrxl.exe2664048.exevpppv.exe0042646.exe80848.exe4648862.exe4620882.exe44444.exepid process 4868 hbhttt.exe 3688 4028646.exe 336 8220044.exe 5004 nhhbtt.exe 3016 hhbbtb.exe 5052 httbhh.exe 840 48666.exe 4576 826420.exe 4064 ddvvp.exe 1580 thnntb.exe 440 2228244.exe 2432 084888.exe 1088 ttntbb.exe 432 vdvdv.exe 3512 884884.exe 1684 ppjjd.exe 4088 22620.exe 3196 06280.exe 4412 2666482.exe 4496 fflfrfr.exe 704 dvvdd.exe 2852 06680.exe 4120 224044.exe 3148 48846.exe 4696 xfrfxrl.exe 1460 thbthb.exe 5000 4222228.exe 4692 fxffflr.exe 4244 jppvv.exe 1740 1fxrfrl.exe 1268 bttbtt.exe 3316 26604.exe 5044 6604844.exe 2328 0882646.exe 4260 vdpdv.exe 2332 46284.exe 4460 24000.exe 1068 lfffxll.exe 4868 nhtnbb.exe 1504 4422066.exe 1016 pjjpd.exe 5004 vppjd.exe 2800 88804.exe 3276 224022.exe 5060 a0040.exe 840 q24020.exe 2744 608266.exe 2564 88800.exe 4792 0260488.exe 656 jppvv.exe 5096 1hhntb.exe 3120 02288.exe 808 hhbtnh.exe 1588 4626448.exe 1308 tbttbt.exe 4976 262600.exe 2436 xrxxrxl.exe 2164 2664048.exe 4720 vpppv.exe 4236 0042646.exe 1244 80848.exe 3900 4648862.exe 5036 4620882.exe 2852 44444.exe -
Processes:
resource yara_rule behavioral2/memory/4868-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4064-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4244-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1460-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4696-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/704-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3512-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/432-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1088-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/440-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3464-4-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exehbhttt.exe4028646.exe8220044.exenhhbtt.exehhbbtb.exehttbhh.exe48666.exe826420.exeddvvp.exethnntb.exe2228244.exe084888.exettntbb.exevdvdv.exe884884.exeppjjd.exe22620.exe06280.exe2666482.exefflfrfr.exedvvdd.exedescription pid process target process PID 3464 wrote to memory of 4868 3464 acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe hbhttt.exe PID 3464 wrote to memory of 4868 3464 acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe hbhttt.exe PID 3464 wrote to memory of 4868 3464 acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe hbhttt.exe PID 4868 wrote to memory of 3688 4868 hbhttt.exe 4028646.exe PID 4868 wrote to memory of 3688 4868 hbhttt.exe 4028646.exe PID 4868 wrote to memory of 3688 4868 hbhttt.exe 4028646.exe PID 3688 wrote to memory of 336 3688 4028646.exe 8220044.exe PID 3688 wrote to memory of 336 3688 4028646.exe 8220044.exe PID 3688 wrote to memory of 336 3688 4028646.exe 8220044.exe PID 336 wrote to memory of 5004 336 8220044.exe nhhbtt.exe PID 336 wrote to memory of 5004 336 8220044.exe nhhbtt.exe PID 336 wrote to memory of 5004 336 8220044.exe nhhbtt.exe PID 5004 wrote to memory of 3016 5004 nhhbtt.exe 04284.exe PID 5004 wrote to memory of 3016 5004 nhhbtt.exe 04284.exe PID 5004 wrote to memory of 3016 5004 nhhbtt.exe 04284.exe PID 3016 wrote to memory of 5052 3016 hhbbtb.exe httbhh.exe PID 3016 wrote to memory of 5052 3016 hhbbtb.exe httbhh.exe PID 3016 wrote to memory of 5052 3016 hhbbtb.exe httbhh.exe PID 5052 wrote to memory of 840 5052 httbhh.exe 48666.exe PID 5052 wrote to memory of 840 5052 httbhh.exe 48666.exe PID 5052 wrote to memory of 840 5052 httbhh.exe 48666.exe PID 840 wrote to memory of 4576 840 48666.exe 2482008.exe PID 840 wrote to memory of 4576 840 48666.exe 2482008.exe PID 840 wrote to memory of 4576 840 48666.exe 2482008.exe PID 4576 wrote to memory of 4064 4576 826420.exe ddvvp.exe PID 4576 wrote to memory of 4064 4576 826420.exe ddvvp.exe PID 4576 wrote to memory of 4064 4576 826420.exe ddvvp.exe PID 4064 wrote to memory of 1580 4064 ddvvp.exe thnntb.exe PID 4064 wrote to memory of 1580 4064 ddvvp.exe thnntb.exe PID 4064 wrote to memory of 1580 4064 ddvvp.exe thnntb.exe PID 1580 wrote to memory of 440 1580 thnntb.exe 2228244.exe PID 1580 wrote to memory of 440 1580 thnntb.exe 2228244.exe PID 1580 wrote to memory of 440 1580 thnntb.exe 2228244.exe PID 440 wrote to memory of 2432 440 2228244.exe 084888.exe PID 440 wrote to memory of 2432 440 2228244.exe 084888.exe PID 440 wrote to memory of 2432 440 2228244.exe 084888.exe PID 2432 wrote to memory of 1088 2432 084888.exe ttntbb.exe PID 2432 wrote to memory of 1088 2432 084888.exe ttntbb.exe PID 2432 wrote to memory of 1088 2432 084888.exe ttntbb.exe PID 1088 wrote to memory of 432 1088 ttntbb.exe vdvdv.exe PID 1088 wrote to memory of 432 1088 ttntbb.exe vdvdv.exe PID 1088 wrote to memory of 432 1088 ttntbb.exe vdvdv.exe PID 432 wrote to memory of 3512 432 vdvdv.exe 884884.exe PID 432 wrote to memory of 3512 432 vdvdv.exe 884884.exe PID 432 wrote to memory of 3512 432 vdvdv.exe 884884.exe PID 3512 wrote to memory of 1684 3512 884884.exe ppjjd.exe PID 3512 wrote to memory of 1684 3512 884884.exe ppjjd.exe PID 3512 wrote to memory of 1684 3512 884884.exe ppjjd.exe PID 1684 wrote to memory of 4088 1684 ppjjd.exe 22620.exe PID 1684 wrote to memory of 4088 1684 ppjjd.exe 22620.exe PID 1684 wrote to memory of 4088 1684 ppjjd.exe 22620.exe PID 4088 wrote to memory of 3196 4088 22620.exe 06280.exe PID 4088 wrote to memory of 3196 4088 22620.exe 06280.exe PID 4088 wrote to memory of 3196 4088 22620.exe 06280.exe PID 3196 wrote to memory of 4412 3196 06280.exe 2666482.exe PID 3196 wrote to memory of 4412 3196 06280.exe 2666482.exe PID 3196 wrote to memory of 4412 3196 06280.exe 2666482.exe PID 4412 wrote to memory of 4496 4412 2666482.exe fflfrfr.exe PID 4412 wrote to memory of 4496 4412 2666482.exe fflfrfr.exe PID 4412 wrote to memory of 4496 4412 2666482.exe fflfrfr.exe PID 4496 wrote to memory of 704 4496 fflfrfr.exe dvvdd.exe PID 4496 wrote to memory of 704 4496 fflfrfr.exe dvvdd.exe PID 4496 wrote to memory of 704 4496 fflfrfr.exe dvvdd.exe PID 704 wrote to memory of 2852 704 dvvdd.exe 06680.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\640762122\zmstage.exeC:\Users\Admin\AppData\Local\Temp\640762122\zmstage.exe1⤵PID:2872
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv r95meCWk30Kj/0N6gTa7WA.01⤵PID:968
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe"C:\Users\Admin\AppData\Local\Temp\acf964bf7622a3275fc7fd1124775ceb8b96b3c663ff19eac29bbce1b36999d6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
\??\c:\hbhttt.exec:\hbhttt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
\??\c:\4028646.exec:\4028646.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\8220044.exec:\8220044.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
\??\c:\nhhbtt.exec:\nhhbtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\hhbbtb.exec:\hhbbtb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\httbhh.exec:\httbhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\48666.exec:\48666.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\826420.exec:\826420.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\ddvvp.exec:\ddvvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\thnntb.exec:\thnntb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\2228244.exec:\2228244.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\084888.exec:\084888.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\ttntbb.exec:\ttntbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
\??\c:\vdvdv.exec:\vdvdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
\??\c:\884884.exec:\884884.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\ppjjd.exec:\ppjjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\22620.exec:\22620.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\06280.exec:\06280.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
\??\c:\2666482.exec:\2666482.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\fflfrfr.exec:\fflfrfr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\dvvdd.exec:\dvvdd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
\??\c:\06680.exec:\06680.exe23⤵
- Executes dropped EXE
PID:2852 -
\??\c:\224044.exec:\224044.exe24⤵
- Executes dropped EXE
PID:4120 -
\??\c:\48846.exec:\48846.exe25⤵
- Executes dropped EXE
PID:3148 -
\??\c:\xfrfxrl.exec:\xfrfxrl.exe26⤵
- Executes dropped EXE
PID:4696 -
\??\c:\thbthb.exec:\thbthb.exe27⤵
- Executes dropped EXE
PID:1460 -
\??\c:\4222228.exec:\4222228.exe28⤵
- Executes dropped EXE
PID:5000 -
\??\c:\fxffflr.exec:\fxffflr.exe29⤵
- Executes dropped EXE
PID:4692 -
\??\c:\jppvv.exec:\jppvv.exe30⤵
- Executes dropped EXE
PID:4244 -
\??\c:\1fxrfrl.exec:\1fxrfrl.exe31⤵
- Executes dropped EXE
PID:1740 -
\??\c:\bttbtt.exec:\bttbtt.exe32⤵
- Executes dropped EXE
PID:1268 -
\??\c:\26604.exec:\26604.exe33⤵
- Executes dropped EXE
PID:3316 -
\??\c:\6604844.exec:\6604844.exe34⤵
- Executes dropped EXE
PID:5044 -
\??\c:\0882646.exec:\0882646.exe35⤵
- Executes dropped EXE
PID:2328 -
\??\c:\vdpdv.exec:\vdpdv.exe36⤵
- Executes dropped EXE
PID:4260 -
\??\c:\46284.exec:\46284.exe37⤵
- Executes dropped EXE
PID:2332 -
\??\c:\24000.exec:\24000.exe38⤵
- Executes dropped EXE
PID:4460 -
\??\c:\lfffxll.exec:\lfffxll.exe39⤵
- Executes dropped EXE
PID:1068 -
\??\c:\nhtnbb.exec:\nhtnbb.exe40⤵
- Executes dropped EXE
PID:4868 -
\??\c:\4422066.exec:\4422066.exe41⤵
- Executes dropped EXE
PID:1504 -
\??\c:\pjjpd.exec:\pjjpd.exe42⤵
- Executes dropped EXE
PID:1016 -
\??\c:\vppjd.exec:\vppjd.exe43⤵
- Executes dropped EXE
PID:5004 -
\??\c:\88804.exec:\88804.exe44⤵
- Executes dropped EXE
PID:2800 -
\??\c:\224022.exec:\224022.exe45⤵
- Executes dropped EXE
PID:3276 -
\??\c:\a0040.exec:\a0040.exe46⤵
- Executes dropped EXE
PID:5060 -
\??\c:\q24020.exec:\q24020.exe47⤵
- Executes dropped EXE
PID:840 -
\??\c:\608266.exec:\608266.exe48⤵
- Executes dropped EXE
PID:2744 -
\??\c:\88800.exec:\88800.exe49⤵
- Executes dropped EXE
PID:2564 -
\??\c:\0260488.exec:\0260488.exe50⤵
- Executes dropped EXE
PID:4792 -
\??\c:\jppvv.exec:\jppvv.exe51⤵
- Executes dropped EXE
PID:656 -
\??\c:\1hhntb.exec:\1hhntb.exe52⤵
- Executes dropped EXE
PID:5096 -
\??\c:\02288.exec:\02288.exe53⤵
- Executes dropped EXE
PID:3120 -
\??\c:\hhbtnh.exec:\hhbtnh.exe54⤵
- Executes dropped EXE
PID:808 -
\??\c:\4626448.exec:\4626448.exe55⤵
- Executes dropped EXE
PID:1588 -
\??\c:\tbttbt.exec:\tbttbt.exe56⤵
- Executes dropped EXE
PID:1308 -
\??\c:\262600.exec:\262600.exe57⤵
- Executes dropped EXE
PID:4976 -
\??\c:\xrxxrxl.exec:\xrxxrxl.exe58⤵
- Executes dropped EXE
PID:2436 -
\??\c:\2664048.exec:\2664048.exe59⤵
- Executes dropped EXE
PID:2164 -
\??\c:\vpppv.exec:\vpppv.exe60⤵
- Executes dropped EXE
PID:4720 -
\??\c:\0042646.exec:\0042646.exe61⤵
- Executes dropped EXE
PID:4236 -
\??\c:\80848.exec:\80848.exe62⤵
- Executes dropped EXE
PID:1244 -
\??\c:\4648862.exec:\4648862.exe63⤵
- Executes dropped EXE
PID:3900 -
\??\c:\4620882.exec:\4620882.exe64⤵
- Executes dropped EXE
PID:5036 -
\??\c:\44444.exec:\44444.exe65⤵
- Executes dropped EXE
PID:2852 -
\??\c:\lflxlxx.exec:\lflxlxx.exe66⤵PID:884
-
\??\c:\dpddd.exec:\dpddd.exe67⤵PID:3328
-
\??\c:\824420.exec:\824420.exe68⤵PID:1520
-
\??\c:\hbhbbb.exec:\hbhbbb.exe69⤵PID:4708
-
\??\c:\026268.exec:\026268.exe70⤵PID:1460
-
\??\c:\6608884.exec:\6608884.exe71⤵PID:3056
-
\??\c:\ttnttn.exec:\ttnttn.exe72⤵PID:4684
-
\??\c:\pvvdj.exec:\pvvdj.exe73⤵PID:4776
-
\??\c:\5xlffll.exec:\5xlffll.exe74⤵PID:832
-
\??\c:\62648.exec:\62648.exe75⤵PID:4952
-
\??\c:\8288440.exec:\8288440.exe76⤵PID:2188
-
\??\c:\460682.exec:\460682.exe77⤵PID:4800
-
\??\c:\02486.exec:\02486.exe78⤵PID:5044
-
\??\c:\62868.exec:\62868.exe79⤵PID:5024
-
\??\c:\lfxlflr.exec:\lfxlflr.exe80⤵PID:3088
-
\??\c:\662262.exec:\662262.exe81⤵PID:1176
-
\??\c:\nntttt.exec:\nntttt.exe82⤵PID:3232
-
\??\c:\40402.exec:\40402.exe83⤵PID:1928
-
\??\c:\3lrlxxf.exec:\3lrlxxf.exe84⤵PID:2264
-
\??\c:\0226420.exec:\0226420.exe85⤵PID:2568
-
\??\c:\608468.exec:\608468.exe86⤵PID:3188
-
\??\c:\8222666.exec:\8222666.exe87⤵PID:3176
-
\??\c:\0004266.exec:\0004266.exe88⤵PID:2644
-
\??\c:\vppvj.exec:\vppvj.exe89⤵PID:2840
-
\??\c:\ttbhbb.exec:\ttbhbb.exe90⤵PID:4488
-
\??\c:\1nhnnt.exec:\1nhnnt.exe91⤵PID:4748
-
\??\c:\080422.exec:\080422.exe92⤵PID:4924
-
\??\c:\84442.exec:\84442.exe93⤵PID:5060
-
\??\c:\3frxrff.exec:\3frxrff.exe94⤵PID:840
-
\??\c:\5lrllll.exec:\5lrllll.exe95⤵PID:2744
-
\??\c:\200044.exec:\200044.exe96⤵PID:4052
-
\??\c:\4442826.exec:\4442826.exe97⤵PID:452
-
\??\c:\lffffff.exec:\lffffff.exe98⤵PID:3296
-
\??\c:\xlrxlff.exec:\xlrxlff.exe99⤵PID:3544
-
\??\c:\6088884.exec:\6088884.exe100⤵PID:2340
-
\??\c:\688402.exec:\688402.exe101⤵PID:808
-
\??\c:\88400.exec:\88400.exe102⤵PID:4104
-
\??\c:\1hhbbb.exec:\1hhbbb.exe103⤵PID:1684
-
\??\c:\044844.exec:\044844.exe104⤵PID:4272
-
\??\c:\5lxrrrx.exec:\5lxrrrx.exe105⤵PID:4564
-
\??\c:\btbbbh.exec:\btbbbh.exe106⤵PID:3028
-
\??\c:\3nntnb.exec:\3nntnb.exe107⤵PID:4720
-
\??\c:\606862.exec:\606862.exe108⤵PID:812
-
\??\c:\482660.exec:\482660.exe109⤵PID:5028
-
\??\c:\2882086.exec:\2882086.exe110⤵PID:1440
-
\??\c:\xlrlrxl.exec:\xlrlrxl.exe111⤵PID:3884
-
\??\c:\lllrllr.exec:\lllrllr.exe112⤵PID:1036
-
\??\c:\bbhhht.exec:\bbhhht.exe113⤵PID:884
-
\??\c:\046200.exec:\046200.exe114⤵PID:804
-
\??\c:\fffffff.exec:\fffffff.exe115⤵PID:1520
-
\??\c:\804826.exec:\804826.exe116⤵PID:2300
-
\??\c:\9bntbb.exec:\9bntbb.exe117⤵PID:3104
-
\??\c:\026840.exec:\026840.exe118⤵PID:3056
-
\??\c:\02880.exec:\02880.exe119⤵PID:3584
-
\??\c:\608806.exec:\608806.exe120⤵PID:2480
-
\??\c:\60048.exec:\60048.exe121⤵PID:1996
-
\??\c:\q00822.exec:\q00822.exe122⤵PID:3536
-
\??\c:\884822.exec:\884822.exe123⤵PID:3908
-
\??\c:\jdvvp.exec:\jdvvp.exe124⤵PID:4800
-
\??\c:\jjdjj.exec:\jjdjj.exe125⤵PID:1188
-
\??\c:\4022080.exec:\4022080.exe126⤵PID:4260
-
\??\c:\20228.exec:\20228.exe127⤵PID:4428
-
\??\c:\rrxrrrl.exec:\rrxrrrl.exe128⤵PID:2900
-
\??\c:\486226.exec:\486226.exe129⤵PID:2660
-
\??\c:\hthbbb.exec:\hthbbb.exe130⤵PID:4492
-
\??\c:\662844.exec:\662844.exe131⤵PID:2108
-
\??\c:\rffllrf.exec:\rffllrf.exe132⤵PID:4868
-
\??\c:\40064.exec:\40064.exe133⤵PID:3176
-
\??\c:\6622468.exec:\6622468.exe134⤵PID:5004
-
\??\c:\44224.exec:\44224.exe135⤵PID:2228
-
\??\c:\frrrfxx.exec:\frrrfxx.exe136⤵PID:8
-
\??\c:\00260.exec:\00260.exe137⤵PID:4448
-
\??\c:\e40488.exec:\e40488.exe138⤵PID:4060
-
\??\c:\00480.exec:\00480.exe139⤵PID:2380
-
\??\c:\hbbttn.exec:\hbbttn.exe140⤵PID:840
-
\??\c:\s6826.exec:\s6826.exe141⤵PID:5016
-
\??\c:\w00666.exec:\w00666.exe142⤵PID:4052
-
\??\c:\tttttb.exec:\tttttb.exe143⤵PID:2432
-
\??\c:\08442.exec:\08442.exe144⤵PID:3296
-
\??\c:\vvjjj.exec:\vvjjj.exe145⤵PID:3544
-
\??\c:\48682.exec:\48682.exe146⤵PID:2340
-
\??\c:\jpvvj.exec:\jpvvj.exe147⤵PID:808
-
\??\c:\842086.exec:\842086.exe148⤵PID:1596
-
\??\c:\htbhhb.exec:\htbhhb.exe149⤵PID:3652
-
\??\c:\200448.exec:\200448.exe150⤵PID:4272
-
\??\c:\4422284.exec:\4422284.exe151⤵PID:4564
-
\??\c:\nthnhn.exec:\nthnhn.exe152⤵PID:4112
-
\??\c:\284624.exec:\284624.exe153⤵PID:2296
-
\??\c:\ttnttt.exec:\ttnttt.exe154⤵PID:3900
-
\??\c:\lrffrfl.exec:\lrffrfl.exe155⤵PID:2704
-
\??\c:\2828680.exec:\2828680.exe156⤵PID:752
-
\??\c:\hbhtnn.exec:\hbhtnn.exe157⤵PID:768
-
\??\c:\rlffxfx.exec:\rlffxfx.exe158⤵PID:3148
-
\??\c:\4282666.exec:\4282666.exe159⤵PID:4144
-
\??\c:\880488.exec:\880488.exe160⤵PID:4788
-
\??\c:\bttnbh.exec:\bttnbh.exe161⤵PID:5000
-
\??\c:\dvddv.exec:\dvddv.exe162⤵PID:916
-
\??\c:\426404.exec:\426404.exe163⤵PID:4044
-
\??\c:\60488.exec:\60488.exe164⤵PID:2008
-
\??\c:\i880000.exec:\i880000.exe165⤵PID:3584
-
\??\c:\4464408.exec:\4464408.exe166⤵PID:3172
-
\??\c:\bttbtt.exec:\bttbtt.exe167⤵PID:2256
-
\??\c:\9ddjd.exec:\9ddjd.exe168⤵PID:5012
-
\??\c:\hnnthn.exec:\hnnthn.exe169⤵PID:4584
-
\??\c:\jvvvv.exec:\jvvvv.exe170⤵PID:2332
-
\??\c:\0688082.exec:\0688082.exe171⤵PID:2640
-
\??\c:\ppjvp.exec:\ppjvp.exe172⤵PID:3928
-
\??\c:\bhhhhb.exec:\bhhhhb.exe173⤵PID:3896
-
\??\c:\844006.exec:\844006.exe174⤵PID:4148
-
\??\c:\080482.exec:\080482.exe175⤵PID:2464
-
\??\c:\jjvpd.exec:\jjvpd.exe176⤵PID:4912
-
\??\c:\u062042.exec:\u062042.exe177⤵PID:4092
-
\??\c:\pvjvp.exec:\pvjvp.exe178⤵PID:3776
-
\??\c:\44044.exec:\44044.exe179⤵PID:1284
-
\??\c:\84048.exec:\84048.exe180⤵PID:4792
-
\??\c:\ddpjj.exec:\ddpjj.exe181⤵PID:3724
-
\??\c:\fxflxrf.exec:\fxflxrf.exe182⤵PID:1196
-
\??\c:\66400.exec:\66400.exe183⤵PID:2044
-
\??\c:\8660444.exec:\8660444.exe184⤵PID:3120
-
\??\c:\ttbtnn.exec:\ttbtnn.exe185⤵PID:2184
-
\??\c:\fflfrxf.exec:\fflfrxf.exe186⤵PID:2724
-
\??\c:\g6844.exec:\g6844.exe187⤵PID:2316
-
\??\c:\fxfrffx.exec:\fxfrffx.exe188⤵PID:2620
-
\??\c:\nbnnbn.exec:\nbnnbn.exe189⤵PID:3128
-
\??\c:\40608.exec:\40608.exe190⤵PID:2484
-
\??\c:\6060448.exec:\6060448.exe191⤵PID:4412
-
\??\c:\64662.exec:\64662.exe192⤵PID:880
-
\??\c:\fllxrrl.exec:\fllxrrl.exe193⤵PID:5032
-
\??\c:\o422446.exec:\o422446.exe194⤵PID:704
-
\??\c:\1jdjd.exec:\1jdjd.exe195⤵PID:2248
-
\??\c:\lxrrfrf.exec:\lxrrfrf.exe196⤵PID:4188
-
\??\c:\1fffffl.exec:\1fffffl.exe197⤵PID:2768
-
\??\c:\6800044.exec:\6800044.exe198⤵PID:4124
-
\??\c:\tthhtb.exec:\tthhtb.exe199⤵PID:224
-
\??\c:\pdvvd.exec:\pdvvd.exe200⤵PID:3496
-
\??\c:\hhnnbt.exec:\hhnnbt.exe201⤵PID:932
-
\??\c:\pjvdj.exec:\pjvdj.exe202⤵PID:4708
-
\??\c:\nbtnhh.exec:\nbtnhh.exe203⤵PID:1636
-
\??\c:\7vjpv.exec:\7vjpv.exe204⤵PID:3532
-
\??\c:\hbbbhb.exec:\hbbbhb.exe205⤵PID:1092
-
\??\c:\jvvvv.exec:\jvvvv.exe206⤵PID:4508
-
\??\c:\k86604.exec:\k86604.exe207⤵PID:4776
-
\??\c:\6228884.exec:\6228884.exe208⤵PID:2008
-
\??\c:\24604.exec:\24604.exe209⤵PID:3332
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe210⤵PID:3536
-
\??\c:\fxrlflf.exec:\fxrlflf.exe211⤵PID:3908
-
\??\c:\frlfxfl.exec:\frlfxfl.exe212⤵PID:3324
-
\??\c:\666884.exec:\666884.exe213⤵PID:3020
-
\??\c:\o048888.exec:\o048888.exe214⤵PID:3464
-
\??\c:\e88606.exec:\e88606.exe215⤵PID:640
-
\??\c:\88848.exec:\88848.exe216⤵PID:4492
-
\??\c:\04284.exec:\04284.exe217⤵PID:3016
-
\??\c:\pjvdd.exec:\pjvdd.exe218⤵PID:2920
-
\??\c:\bnnbth.exec:\bnnbth.exe219⤵PID:3668
-
\??\c:\2482008.exec:\2482008.exe220⤵PID:4576
-
\??\c:\200640.exec:\200640.exe221⤵PID:5060
-
\??\c:\thnbbt.exec:\thnbbt.exe222⤵PID:324
-
\??\c:\xxffxxx.exec:\xxffxxx.exe223⤵PID:4064
-
\??\c:\jjvvd.exec:\jjvvd.exe224⤵PID:4020
-
\??\c:\822600.exec:\822600.exe225⤵PID:452
-
\??\c:\u066444.exec:\u066444.exe226⤵PID:2748
-
\??\c:\djjdv.exec:\djjdv.exe227⤵PID:3624
-
\??\c:\6460448.exec:\6460448.exe228⤵PID:4740
-
\??\c:\vdpjp.exec:\vdpjp.exe229⤵PID:1572
-
\??\c:\220446.exec:\220446.exe230⤵PID:1404
-
\??\c:\042468.exec:\042468.exe231⤵PID:4880
-
\??\c:\bbhhnh.exec:\bbhhnh.exe232⤵PID:2284
-
\??\c:\pjvpp.exec:\pjvpp.exe233⤵PID:2164
-
\??\c:\24460.exec:\24460.exe234⤵PID:1212
-
\??\c:\404028.exec:\404028.exe235⤵PID:4768
-
\??\c:\nthhhh.exec:\nthhhh.exe236⤵PID:2804
-
\??\c:\5rllxxl.exec:\5rllxxl.exe237⤵PID:320
-
\??\c:\rxxfxxl.exec:\rxxfxxl.exe238⤵PID:1076
-
\??\c:\nntttt.exec:\nntttt.exe239⤵PID:3220
-
\??\c:\jdjpv.exec:\jdjpv.exe240⤵PID:4724
-
\??\c:\ntbhnn.exec:\ntbhnn.exe241⤵PID:2636
-
\??\c:\88822.exec:\88822.exe242⤵PID:3004