Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 03:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe
-
Size
245KB
-
MD5
6588e6442ca562303a06c08a6e9ad0c7
-
SHA1
4e3d73ad83dab235ba6a9cd4620d55be4cc1efe1
-
SHA256
de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d
-
SHA512
c49785771528602130d4b0e36a863944e79003adbad90920e0d0dc461ca10bed6042daa51e55acdc9e9bef1167e676e35562517acc71eae8402636e278009345
-
SSDEEP
6144:n3C9BRo7tvnJ9oEz2Eu9XgcVyDOoZU0wGFspp:n3C9ytvnV2NQAo20wGFC
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/3948-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3876-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/556-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1116-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2352-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1136-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5108-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2984-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1112-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4432-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4184-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2660-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3356-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2832-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4452-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4972-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4708-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3104-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 31 IoCs
Processes:
resource yara_rule behavioral2/memory/3948-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3876-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/556-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1116-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2352-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1136-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1136-40-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1136-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4220-48-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4220-47-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5108-56-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2984-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2984-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2984-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2984-69-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5040-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1112-81-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4432-89-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4184-96-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2556-107-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2660-113-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4848-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3356-128-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1448-134-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2832-148-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4452-166-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4972-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4620-179-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4708-191-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4120-202-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3104-209-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
vdppv.exehbbhbb.exepvppj.exedjvpv.exepjjvv.exevdpdd.exethtbht.exeddppd.exetttbhn.exeppjpj.exehthbtn.exelflllrr.exehbnbnh.exejpdpv.exehhnnbn.exevvpjj.exelffxfff.exethtbtt.exejdjjp.exethhtnt.exepppvv.exe9flxrrr.exerxfxrrl.exe7nbnhh.exerrxxxrx.exebhnhbb.exerlfrffl.exennhnnb.exexxfxxfl.exe9bnnnt.exevvvvv.exerlrfffx.exe9nbbbt.exe7pvpp.exetbtbbh.exevpppj.exefrfrfxr.exexrlrlrx.exetbhhbh.exenntnhb.exedvjjj.exexrxxxff.exethbnbt.exetbtnth.exedjdpp.exefxrrxxr.exepvvvd.exellrffxr.exethntbb.exe9vdvv.exedvdvd.exe1hhbtn.exetnbhbt.exelrfxrrr.exelrxrrrr.exebbbhnt.exevjppj.exefxfxllf.exerxrxxrx.exebhnttb.exe3pjjp.exerrlfxxr.exe5bbttt.exevvppp.exepid process 3876 vdppv.exe 556 hbbhbb.exe 2352 pvppj.exe 1116 djvpv.exe 1136 pjjvv.exe 4220 vdpdd.exe 5108 thtbht.exe 2984 ddppd.exe 5040 tttbhn.exe 1112 ppjpj.exe 4432 hthbtn.exe 4184 lflllrr.exe 4580 hbnbnh.exe 2556 jpdpv.exe 2660 hhnnbn.exe 4848 vvpjj.exe 3356 lffxfff.exe 1448 thtbtt.exe 3932 jdjjp.exe 2828 thhtnt.exe 2832 pppvv.exe 2328 9flxrrr.exe 2168 rxfxrrl.exe 4452 7nbnhh.exe 4972 rrxxxrx.exe 4620 bhnhbb.exe 4316 rlfrffl.exe 4708 nnhnnb.exe 4488 xxfxxfl.exe 4120 9bnnnt.exe 3104 vvvvv.exe 324 rlrfffx.exe 4988 9nbbbt.exe 3568 7pvpp.exe 644 tbtbbh.exe 3516 vpppj.exe 1028 frfrfxr.exe 920 xrlrlrx.exe 3008 tbhhbh.exe 972 nntnhb.exe 3384 dvjjj.exe 1136 xrxxxff.exe 3448 thbnbt.exe 4668 tbtnth.exe 4480 djdpp.exe 2532 fxrrxxr.exe 4868 pvvvd.exe 1600 llrffxr.exe 5060 thntbb.exe 1112 9vdvv.exe 4460 dvdvd.exe 4784 1hhbtn.exe 4932 tnbhbt.exe 4580 lrfxrrr.exe 2180 lrxrrrr.exe 3100 bbbhnt.exe 4652 vjppj.exe 4384 fxfxllf.exe 3248 rxrxxrx.exe 1932 bhnttb.exe 2372 3pjjp.exe 816 rrlfxxr.exe 4940 5bbttt.exe 1768 vvppp.exe -
Processes:
resource yara_rule behavioral2/memory/3948-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3876-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/556-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2352-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5108-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1112-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4432-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4184-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3356-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4972-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3104-209-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exevdppv.exehbbhbb.exepvppj.exedjvpv.exepjjvv.exevdpdd.exethtbht.exeddppd.exetttbhn.exeppjpj.exehthbtn.exelflllrr.exehbnbnh.exejpdpv.exehhnnbn.exevvpjj.exelffxfff.exethtbtt.exejdjjp.exethhtnt.exepppvv.exedescription pid process target process PID 3948 wrote to memory of 3876 3948 de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe vdppv.exe PID 3948 wrote to memory of 3876 3948 de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe vdppv.exe PID 3948 wrote to memory of 3876 3948 de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe vdppv.exe PID 3876 wrote to memory of 556 3876 vdppv.exe hbbhbb.exe PID 3876 wrote to memory of 556 3876 vdppv.exe hbbhbb.exe PID 3876 wrote to memory of 556 3876 vdppv.exe hbbhbb.exe PID 556 wrote to memory of 2352 556 hbbhbb.exe pvppj.exe PID 556 wrote to memory of 2352 556 hbbhbb.exe pvppj.exe PID 556 wrote to memory of 2352 556 hbbhbb.exe pvppj.exe PID 2352 wrote to memory of 1116 2352 pvppj.exe djvpv.exe PID 2352 wrote to memory of 1116 2352 pvppj.exe djvpv.exe PID 2352 wrote to memory of 1116 2352 pvppj.exe djvpv.exe PID 1116 wrote to memory of 1136 1116 djvpv.exe pjjvv.exe PID 1116 wrote to memory of 1136 1116 djvpv.exe pjjvv.exe PID 1116 wrote to memory of 1136 1116 djvpv.exe pjjvv.exe PID 1136 wrote to memory of 4220 1136 pjjvv.exe vdpdd.exe PID 1136 wrote to memory of 4220 1136 pjjvv.exe vdpdd.exe PID 1136 wrote to memory of 4220 1136 pjjvv.exe vdpdd.exe PID 4220 wrote to memory of 5108 4220 vdpdd.exe thtbht.exe PID 4220 wrote to memory of 5108 4220 vdpdd.exe thtbht.exe PID 4220 wrote to memory of 5108 4220 vdpdd.exe thtbht.exe PID 5108 wrote to memory of 2984 5108 thtbht.exe ddppd.exe PID 5108 wrote to memory of 2984 5108 thtbht.exe ddppd.exe PID 5108 wrote to memory of 2984 5108 thtbht.exe ddppd.exe PID 2984 wrote to memory of 5040 2984 ddppd.exe tttbhn.exe PID 2984 wrote to memory of 5040 2984 ddppd.exe tttbhn.exe PID 2984 wrote to memory of 5040 2984 ddppd.exe tttbhn.exe PID 5040 wrote to memory of 1112 5040 tttbhn.exe ppjpj.exe PID 5040 wrote to memory of 1112 5040 tttbhn.exe ppjpj.exe PID 5040 wrote to memory of 1112 5040 tttbhn.exe ppjpj.exe PID 1112 wrote to memory of 4432 1112 ppjpj.exe hthbtn.exe PID 1112 wrote to memory of 4432 1112 ppjpj.exe hthbtn.exe PID 1112 wrote to memory of 4432 1112 ppjpj.exe hthbtn.exe PID 4432 wrote to memory of 4184 4432 hthbtn.exe lflllrr.exe PID 4432 wrote to memory of 4184 4432 hthbtn.exe lflllrr.exe PID 4432 wrote to memory of 4184 4432 hthbtn.exe lflllrr.exe PID 4184 wrote to memory of 4580 4184 lflllrr.exe hbnbnh.exe PID 4184 wrote to memory of 4580 4184 lflllrr.exe hbnbnh.exe PID 4184 wrote to memory of 4580 4184 lflllrr.exe hbnbnh.exe PID 4580 wrote to memory of 2556 4580 hbnbnh.exe jpdpv.exe PID 4580 wrote to memory of 2556 4580 hbnbnh.exe jpdpv.exe PID 4580 wrote to memory of 2556 4580 hbnbnh.exe jpdpv.exe PID 2556 wrote to memory of 2660 2556 jpdpv.exe hhnnbn.exe PID 2556 wrote to memory of 2660 2556 jpdpv.exe hhnnbn.exe PID 2556 wrote to memory of 2660 2556 jpdpv.exe hhnnbn.exe PID 2660 wrote to memory of 4848 2660 hhnnbn.exe vvpjj.exe PID 2660 wrote to memory of 4848 2660 hhnnbn.exe vvpjj.exe PID 2660 wrote to memory of 4848 2660 hhnnbn.exe vvpjj.exe PID 4848 wrote to memory of 3356 4848 vvpjj.exe lffxfff.exe PID 4848 wrote to memory of 3356 4848 vvpjj.exe lffxfff.exe PID 4848 wrote to memory of 3356 4848 vvpjj.exe lffxfff.exe PID 3356 wrote to memory of 1448 3356 lffxfff.exe thtbtt.exe PID 3356 wrote to memory of 1448 3356 lffxfff.exe thtbtt.exe PID 3356 wrote to memory of 1448 3356 lffxfff.exe thtbtt.exe PID 1448 wrote to memory of 3932 1448 thtbtt.exe jdjjp.exe PID 1448 wrote to memory of 3932 1448 thtbtt.exe jdjjp.exe PID 1448 wrote to memory of 3932 1448 thtbtt.exe jdjjp.exe PID 3932 wrote to memory of 2828 3932 jdjjp.exe thhtnt.exe PID 3932 wrote to memory of 2828 3932 jdjjp.exe thhtnt.exe PID 3932 wrote to memory of 2828 3932 jdjjp.exe thhtnt.exe PID 2828 wrote to memory of 2832 2828 thhtnt.exe pppvv.exe PID 2828 wrote to memory of 2832 2828 thhtnt.exe pppvv.exe PID 2828 wrote to memory of 2832 2828 thhtnt.exe pppvv.exe PID 2832 wrote to memory of 2328 2832 pppvv.exe 9flxrrr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe"C:\Users\Admin\AppData\Local\Temp\de987544389df960e2d348a6a2aa531aab207995a7a9a9a85ab8ca905e136c2d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\vdppv.exec:\vdppv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\hbbhbb.exec:\hbbhbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\pvppj.exec:\pvppj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\djvpv.exec:\djvpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\pjjvv.exec:\pjjvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\vdpdd.exec:\vdpdd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\thtbht.exec:\thtbht.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\ddppd.exec:\ddppd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\tttbhn.exec:\tttbhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\ppjpj.exec:\ppjpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\hthbtn.exec:\hthbtn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
\??\c:\lflllrr.exec:\lflllrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
\??\c:\hbnbnh.exec:\hbnbnh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\jpdpv.exec:\jpdpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\hhnnbn.exec:\hhnnbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\vvpjj.exec:\vvpjj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\lffxfff.exec:\lffxfff.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
\??\c:\thtbtt.exec:\thtbtt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\jdjjp.exec:\jdjjp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\thhtnt.exec:\thhtnt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\pppvv.exec:\pppvv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\9flxrrr.exec:\9flxrrr.exe23⤵
- Executes dropped EXE
PID:2328 -
\??\c:\rxfxrrl.exec:\rxfxrrl.exe24⤵
- Executes dropped EXE
PID:2168 -
\??\c:\7nbnhh.exec:\7nbnhh.exe25⤵
- Executes dropped EXE
PID:4452 -
\??\c:\rrxxxrx.exec:\rrxxxrx.exe26⤵
- Executes dropped EXE
PID:4972 -
\??\c:\bhnhbb.exec:\bhnhbb.exe27⤵
- Executes dropped EXE
PID:4620 -
\??\c:\rlfrffl.exec:\rlfrffl.exe28⤵
- Executes dropped EXE
PID:4316 -
\??\c:\nnhnnb.exec:\nnhnnb.exe29⤵
- Executes dropped EXE
PID:4708 -
\??\c:\xxfxxfl.exec:\xxfxxfl.exe30⤵
- Executes dropped EXE
PID:4488 -
\??\c:\9bnnnt.exec:\9bnnnt.exe31⤵
- Executes dropped EXE
PID:4120 -
\??\c:\vvvvv.exec:\vvvvv.exe32⤵
- Executes dropped EXE
PID:3104 -
\??\c:\rlrfffx.exec:\rlrfffx.exe33⤵
- Executes dropped EXE
PID:324 -
\??\c:\9nbbbt.exec:\9nbbbt.exe34⤵
- Executes dropped EXE
PID:4988 -
\??\c:\7pvpp.exec:\7pvpp.exe35⤵
- Executes dropped EXE
PID:3568 -
\??\c:\rfrxxlr.exec:\rfrxxlr.exe36⤵PID:4872
-
\??\c:\tbtbbh.exec:\tbtbbh.exe37⤵
- Executes dropped EXE
PID:644 -
\??\c:\vpppj.exec:\vpppj.exe38⤵
- Executes dropped EXE
PID:3516 -
\??\c:\frfrfxr.exec:\frfrfxr.exe39⤵
- Executes dropped EXE
PID:1028 -
\??\c:\xrlrlrx.exec:\xrlrlrx.exe40⤵
- Executes dropped EXE
PID:920 -
\??\c:\tbhhbh.exec:\tbhhbh.exe41⤵
- Executes dropped EXE
PID:3008 -
\??\c:\nntnhb.exec:\nntnhb.exe42⤵
- Executes dropped EXE
PID:972 -
\??\c:\dvjjj.exec:\dvjjj.exe43⤵
- Executes dropped EXE
PID:3384 -
\??\c:\xrxxxff.exec:\xrxxxff.exe44⤵
- Executes dropped EXE
PID:1136 -
\??\c:\thbnbt.exec:\thbnbt.exe45⤵
- Executes dropped EXE
PID:3448 -
\??\c:\tbtnth.exec:\tbtnth.exe46⤵
- Executes dropped EXE
PID:4668 -
\??\c:\djdpp.exec:\djdpp.exe47⤵
- Executes dropped EXE
PID:4480 -
\??\c:\fxrrxxr.exec:\fxrrxxr.exe48⤵
- Executes dropped EXE
PID:2532 -
\??\c:\pvvvd.exec:\pvvvd.exe49⤵
- Executes dropped EXE
PID:4868 -
\??\c:\llrffxr.exec:\llrffxr.exe50⤵
- Executes dropped EXE
PID:1600 -
\??\c:\thntbb.exec:\thntbb.exe51⤵
- Executes dropped EXE
PID:5060 -
\??\c:\9vdvv.exec:\9vdvv.exe52⤵
- Executes dropped EXE
PID:1112 -
\??\c:\dvdvd.exec:\dvdvd.exe53⤵
- Executes dropped EXE
PID:4460 -
\??\c:\1hhbtn.exec:\1hhbtn.exe54⤵
- Executes dropped EXE
PID:4784 -
\??\c:\tnbhbt.exec:\tnbhbt.exe55⤵
- Executes dropped EXE
PID:4932 -
\??\c:\lrfxrrr.exec:\lrfxrrr.exe56⤵
- Executes dropped EXE
PID:4580 -
\??\c:\lrxrrrr.exec:\lrxrrrr.exe57⤵
- Executes dropped EXE
PID:2180 -
\??\c:\bbbhnt.exec:\bbbhnt.exe58⤵
- Executes dropped EXE
PID:3100 -
\??\c:\vjppj.exec:\vjppj.exe59⤵
- Executes dropped EXE
PID:4652 -
\??\c:\fxfxllf.exec:\fxfxllf.exe60⤵
- Executes dropped EXE
PID:4384 -
\??\c:\rxrxxrx.exec:\rxrxxrx.exe61⤵
- Executes dropped EXE
PID:3248 -
\??\c:\bhnttb.exec:\bhnttb.exe62⤵
- Executes dropped EXE
PID:1932 -
\??\c:\3pjjp.exec:\3pjjp.exe63⤵
- Executes dropped EXE
PID:2372 -
\??\c:\rrlfxxr.exec:\rrlfxxr.exe64⤵
- Executes dropped EXE
PID:816 -
\??\c:\5bbttt.exec:\5bbttt.exe65⤵
- Executes dropped EXE
PID:4940 -
\??\c:\vvppp.exec:\vvppp.exe66⤵
- Executes dropped EXE
PID:1768 -
\??\c:\jdpjp.exec:\jdpjp.exe67⤵PID:2168
-
\??\c:\xlrlffx.exec:\xlrlffx.exe68⤵PID:4452
-
\??\c:\rflfxxr.exec:\rflfxxr.exe69⤵PID:4084
-
\??\c:\tttttt.exec:\tttttt.exe70⤵PID:756
-
\??\c:\jjvvv.exec:\jjvvv.exe71⤵PID:4024
-
\??\c:\9rrlxxl.exec:\9rrlxxl.exe72⤵PID:1764
-
\??\c:\xxrrxxx.exec:\xxrrxxx.exe73⤵PID:5088
-
\??\c:\bbttnt.exec:\bbttnt.exe74⤵PID:2496
-
\??\c:\jvdjd.exec:\jvdjd.exe75⤵PID:3620
-
\??\c:\llxflfl.exec:\llxflfl.exe76⤵PID:4484
-
\??\c:\bntbbt.exec:\bntbbt.exe77⤵PID:4120
-
\??\c:\pjdvp.exec:\pjdvp.exe78⤵PID:1308
-
\??\c:\xlxrrxr.exec:\xlxrrxr.exe79⤵PID:2656
-
\??\c:\5hnbhb.exec:\5hnbhb.exe80⤵PID:4404
-
\??\c:\1pppv.exec:\1pppv.exe81⤵PID:3784
-
\??\c:\xrxxfll.exec:\xrxxfll.exe82⤵PID:2260
-
\??\c:\dpjpp.exec:\dpjpp.exe83⤵PID:4224
-
\??\c:\dpvpp.exec:\dpvpp.exe84⤵PID:1388
-
\??\c:\rlrrxfx.exec:\rlrrxfx.exe85⤵PID:1268
-
\??\c:\nttnbb.exec:\nttnbb.exe86⤵PID:4496
-
\??\c:\vpdpv.exec:\vpdpv.exe87⤵PID:3916
-
\??\c:\lfllrrr.exec:\lfllrrr.exe88⤵PID:3368
-
\??\c:\ttbbbt.exec:\ttbbbt.exe89⤵PID:1852
-
\??\c:\jdpvj.exec:\jdpvj.exe90⤵PID:5108
-
\??\c:\jppjj.exec:\jppjj.exe91⤵PID:1816
-
\??\c:\rfflrfr.exec:\rfflrfr.exe92⤵PID:1236
-
\??\c:\bhnnnn.exec:\bhnnnn.exe93⤵PID:864
-
\??\c:\djppj.exec:\djppj.exe94⤵PID:2888
-
\??\c:\ppppv.exec:\ppppv.exe95⤵PID:4184
-
\??\c:\lxrxrxr.exec:\lxrxrxr.exe96⤵PID:4420
-
\??\c:\nntttt.exec:\nntttt.exe97⤵PID:2752
-
\??\c:\1ppvv.exec:\1ppvv.exe98⤵PID:2660
-
\??\c:\dvppp.exec:\dvppp.exe99⤵PID:4828
-
\??\c:\rfffxxx.exec:\rfffxxx.exe100⤵PID:4648
-
\??\c:\thnttn.exec:\thnttn.exe101⤵PID:1448
-
\??\c:\vpjdv.exec:\vpjdv.exe102⤵PID:1196
-
\??\c:\7xlflrl.exec:\7xlflrl.exe103⤵PID:4680
-
\??\c:\rlrrrxx.exec:\rlrrrxx.exe104⤵PID:3632
-
\??\c:\hnnhht.exec:\hnnhht.exe105⤵PID:4940
-
\??\c:\lrxrlll.exec:\lrxrlll.exe106⤵PID:1768
-
\??\c:\ttbbtt.exec:\ttbbtt.exe107⤵PID:5016
-
\??\c:\ddpvd.exec:\ddpvd.exe108⤵PID:4452
-
\??\c:\pddvv.exec:\pddvv.exe109⤵PID:4072
-
\??\c:\ntbntb.exec:\ntbntb.exe110⤵PID:756
-
\??\c:\jdvpj.exec:\jdvpj.exe111⤵PID:1264
-
\??\c:\rfrrffl.exec:\rfrrffl.exe112⤵PID:1764
-
\??\c:\nnbbhh.exec:\nnbbhh.exe113⤵PID:3296
-
\??\c:\jpdpv.exec:\jpdpv.exe114⤵PID:2496
-
\??\c:\rfxflrl.exec:\rfxflrl.exe115⤵PID:1364
-
\??\c:\fllxfrl.exec:\fllxfrl.exe116⤵PID:4504
-
\??\c:\tbtnnt.exec:\tbtnnt.exe117⤵PID:1848
-
\??\c:\pjpdp.exec:\pjpdp.exe118⤵PID:4988
-
\??\c:\lfxfrfx.exec:\lfxfrfx.exe119⤵PID:1320
-
\??\c:\frxrllf.exec:\frxrllf.exe120⤵PID:3580
-
\??\c:\bttbtb.exec:\bttbtb.exe121⤵PID:1240
-
\??\c:\3vjdv.exec:\3vjdv.exe122⤵PID:1388
-
\??\c:\lflxxxr.exec:\lflxxxr.exe123⤵PID:1268
-
\??\c:\rlffxxx.exec:\rlffxxx.exe124⤵PID:4496
-
\??\c:\ttbtnn.exec:\ttbtnn.exe125⤵PID:3916
-
\??\c:\9dpjd.exec:\9dpjd.exe126⤵PID:2200
-
\??\c:\jjdpp.exec:\jjdpp.exe127⤵PID:1796
-
\??\c:\rrrlfrl.exec:\rrrlfrl.exe128⤵PID:5108
-
\??\c:\thnnhh.exec:\thnnhh.exe129⤵PID:4564
-
\??\c:\jddvp.exec:\jddvp.exe130⤵PID:2624
-
\??\c:\rfxrrrl.exec:\rfxrrrl.exe131⤵PID:2692
-
\??\c:\xfrlffx.exec:\xfrlffx.exe132⤵PID:2368
-
\??\c:\bntnnn.exec:\bntnnn.exe133⤵PID:4580
-
\??\c:\jpdvj.exec:\jpdvj.exe134⤵PID:2872
-
\??\c:\pddvp.exec:\pddvp.exe135⤵PID:516
-
\??\c:\rlllllx.exec:\rlllllx.exe136⤵PID:2660
-
\??\c:\hnthnt.exec:\hnthnt.exe137⤵PID:3248
-
\??\c:\5djpp.exec:\5djpp.exe138⤵PID:1932
-
\??\c:\thntbb.exec:\thntbb.exe139⤵PID:3932
-
\??\c:\ttbbtn.exec:\ttbbtn.exe140⤵PID:3292
-
\??\c:\1jvvd.exec:\1jvvd.exe141⤵PID:2736
-
\??\c:\xllflll.exec:\xllflll.exe142⤵PID:1628
-
\??\c:\htbntt.exec:\htbntt.exe143⤵PID:1508
-
\??\c:\ppvvd.exec:\ppvvd.exe144⤵PID:4672
-
\??\c:\3rfffll.exec:\3rfffll.exe145⤵PID:892
-
\??\c:\lrlrlrr.exec:\lrlrlrr.exe146⤵PID:2560
-
\??\c:\tbtnhn.exec:\tbtnhn.exe147⤵PID:4316
-
\??\c:\jvjpd.exec:\jvjpd.exe148⤵PID:3124
-
\??\c:\rrrxlxx.exec:\rrrxlxx.exe149⤵PID:5088
-
\??\c:\tttbbh.exec:\tttbbh.exe150⤵PID:4712
-
\??\c:\tbhhnh.exec:\tbhhnh.exe151⤵PID:2084
-
\??\c:\djpjp.exec:\djpjp.exe152⤵PID:4484
-
\??\c:\rxflffl.exec:\rxflffl.exe153⤵PID:5004
-
\??\c:\9nnbtn.exec:\9nnbtn.exe154⤵PID:4376
-
\??\c:\nnnnth.exec:\nnnnth.exe155⤵PID:4872
-
\??\c:\jvdpj.exec:\jvdpj.exe156⤵PID:644
-
\??\c:\ffrfxxf.exec:\ffrfxxf.exe157⤵PID:4400
-
\??\c:\nbtttb.exec:\nbtttb.exe158⤵PID:432
-
\??\c:\vpvvv.exec:\vpvvv.exe159⤵PID:4312
-
\??\c:\xxxlllf.exec:\xxxlllf.exe160⤵PID:4996
-
\??\c:\bnhbth.exec:\bnhbth.exe161⤵PID:3008
-
\??\c:\vjjvd.exec:\vjjvd.exe162⤵PID:5116
-
\??\c:\llxllxf.exec:\llxllxf.exe163⤵PID:3692
-
\??\c:\rfllllf.exec:\rfllllf.exe164⤵PID:3944
-
\??\c:\ttbnnn.exec:\ttbnnn.exe165⤵PID:4480
-
\??\c:\vjdjv.exec:\vjdjv.exe166⤵PID:5040
-
\??\c:\llxrlll.exec:\llxrlll.exe167⤵PID:2196
-
\??\c:\hhtbtn.exec:\hhtbtn.exe168⤵PID:2624
-
\??\c:\pjvvp.exec:\pjvvp.exe169⤵PID:548
-
\??\c:\pvjjp.exec:\pvjjp.exe170⤵PID:3048
-
\??\c:\llfffxx.exec:\llfffxx.exe171⤵PID:3100
-
\??\c:\tntnhb.exec:\tntnhb.exe172⤵PID:2104
-
\??\c:\vdjdj.exec:\vdjdj.exe173⤵PID:2700
-
\??\c:\vpjpp.exec:\vpjpp.exe174⤵PID:2456
-
\??\c:\lllxlfx.exec:\lllxlfx.exe175⤵PID:4968
-
\??\c:\ttbtbh.exec:\ttbtbh.exe176⤵PID:868
-
\??\c:\vjvpp.exec:\vjvpp.exe177⤵PID:3920
-
\??\c:\dvddj.exec:\dvddj.exe178⤵PID:1972
-
\??\c:\xrfffxf.exec:\xrfffxf.exe179⤵PID:4056
-
\??\c:\5rffrxr.exec:\5rffrxr.exe180⤵PID:3500
-
\??\c:\7hnntb.exec:\7hnntb.exe181⤵PID:2740
-
\??\c:\jjpvv.exec:\jjpvv.exe182⤵PID:2144
-
\??\c:\flllrxx.exec:\flllrxx.exe183⤵PID:1264
-
\??\c:\rrlxffx.exec:\rrlxffx.exe184⤵PID:3840
-
\??\c:\hhnnnt.exec:\hhnnnt.exe185⤵PID:1760
-
\??\c:\dpjpj.exec:\dpjpj.exe186⤵PID:2404
-
\??\c:\rfllllx.exec:\rfllllx.exe187⤵PID:3364
-
\??\c:\hhttbh.exec:\hhttbh.exe188⤵PID:4120
-
\??\c:\jdppj.exec:\jdppj.exe189⤵PID:1780
-
\??\c:\rlrrrrr.exec:\rlrrrrr.exe190⤵PID:4168
-
\??\c:\nnhnnn.exec:\nnhnnn.exe191⤵PID:3476
-
\??\c:\tbbthh.exec:\tbbthh.exe192⤵PID:2408
-
\??\c:\9jvjp.exec:\9jvjp.exe193⤵PID:3876
-
\??\c:\rlxllrr.exec:\rlxllrr.exe194⤵PID:2728
-
\??\c:\xllffxr.exec:\xllffxr.exe195⤵PID:5100
-
\??\c:\hhttnn.exec:\hhttnn.exe196⤵PID:392
-
\??\c:\vvpdj.exec:\vvpdj.exe197⤵PID:1136
-
\??\c:\xrlxxxx.exec:\xrlxxxx.exe198⤵PID:1852
-
\??\c:\fxxrxxx.exec:\fxxrxxx.exe199⤵PID:3692
-
\??\c:\1ntttb.exec:\1ntttb.exe200⤵PID:3376
-
\??\c:\ttntbh.exec:\ttntbh.exe201⤵PID:1236
-
\??\c:\vjvjj.exec:\vjvjj.exe202⤵PID:4108
-
\??\c:\xfffxfr.exec:\xfffxfr.exe203⤵PID:2252
-
\??\c:\hbtttb.exec:\hbtttb.exe204⤵PID:4640
-
\??\c:\bnbbbb.exec:\bnbbbb.exe205⤵PID:4848
-
\??\c:\vjjjd.exec:\vjjjd.exe206⤵PID:3048
-
\??\c:\rrfffll.exec:\rrfffll.exe207⤵PID:2704
-
\??\c:\fxfllff.exec:\fxfllff.exe208⤵PID:5052
-
\??\c:\nhhbbh.exec:\nhhbbh.exe209⤵PID:2044
-
\??\c:\hhtnth.exec:\hhtnth.exe210⤵PID:2968
-
\??\c:\5pvvv.exec:\5pvvv.exe211⤵PID:2828
-
\??\c:\fflrlll.exec:\fflrlll.exe212⤵PID:2372
-
\??\c:\rrxrxxf.exec:\rrxrxxf.exe213⤵PID:816
-
\??\c:\bnnbnb.exec:\bnnbnb.exe214⤵PID:4940
-
\??\c:\nntbbh.exec:\nntbbh.exe215⤵PID:2452
-
\??\c:\jjpdv.exec:\jjpdv.exe216⤵PID:3336
-
\??\c:\rrrlllf.exec:\rrrlllf.exe217⤵PID:2052
-
\??\c:\xffffff.exec:\xffffff.exe218⤵PID:4620
-
\??\c:\ntbbtb.exec:\ntbbtb.exe219⤵PID:448
-
\??\c:\jdjjj.exec:\jdjjj.exe220⤵PID:2172
-
\??\c:\llrllll.exec:\llrllll.exe221⤵PID:4172
-
\??\c:\9lrrxxx.exec:\9lrrxxx.exe222⤵PID:3764
-
\??\c:\nhnttb.exec:\nhnttb.exe223⤵PID:628
-
\??\c:\jpdjd.exec:\jpdjd.exe224⤵PID:2436
-
\??\c:\xxrfrrf.exec:\xxrfrrf.exe225⤵PID:1308
-
\??\c:\hhhhbh.exec:\hhhhbh.exe226⤵PID:2656
-
\??\c:\nnthbh.exec:\nnthbh.exe227⤵PID:3324
-
\??\c:\5vjdd.exec:\5vjdd.exe228⤵PID:3784
-
\??\c:\llxfflf.exec:\llxfflf.exe229⤵PID:4224
-
\??\c:\hhhnnn.exec:\hhhnnn.exe230⤵PID:3196
-
\??\c:\pjjdd.exec:\pjjdd.exe231⤵PID:2684
-
\??\c:\7xrrfxx.exec:\7xrrfxx.exe232⤵PID:556
-
\??\c:\rrfxxxr.exec:\rrfxxxr.exe233⤵PID:1612
-
\??\c:\xfllrff.exec:\xfllrff.exe234⤵PID:3804
-
\??\c:\bthtbh.exec:\bthtbh.exe235⤵PID:4496
-
\??\c:\pdvvd.exec:\pdvvd.exe236⤵PID:2984
-
\??\c:\lxlxlfr.exec:\lxlxlfr.exe237⤵PID:4668
-
\??\c:\xfrrxfx.exec:\xfrrxfx.exe238⤵PID:1672
-
\??\c:\bbhnnh.exec:\bbhnnh.exe239⤵PID:1044
-
\??\c:\dvddd.exec:\dvddd.exe240⤵PID:1864
-
\??\c:\djjdp.exec:\djjdp.exe241⤵PID:4580
-
\??\c:\5xxllff.exec:\5xxllff.exe242⤵PID:2752