Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 18:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
General
-
Target
00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe
-
Size
144KB
-
MD5
6f353a8cbfde5548f64b6c967a069c52
-
SHA1
7a88dad4952a1a999053b993c3b5ca9cc9e0152f
-
SHA256
00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77
-
SHA512
7ff5bacf8710b546a83731a4c8c3a424fab29f365c767875a9a59678150cbced7cbec02e0bc467f7fa19d4153a3b2f4dddb978296fffe77788500e7fec7e1369
-
SSDEEP
3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmklgQA:n3C9BRosxW8MFHLMW7QA
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2224-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3036-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1944-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1516-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2536-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1100-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/824-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/584-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/780-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1392-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-607-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 23 IoCs
Processes:
resource yara_rule behavioral1/memory/2224-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2224-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2176-21-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3036-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1944-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2652-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2872-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2472-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2472-74-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2472-84-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2456-87-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2848-102-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2684-120-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1516-156-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2536-166-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1100-174-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/824-220-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/584-228-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/844-246-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/780-255-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1392-283-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2904-292-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2176-607-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
bnhnbb.exeppjjj.exelfxfllx.exenbtbnn.exepjpdj.exedvvdp.exerlfxllx.exebhbbnt.exebbnbnh.exedjdjp.exejdvdp.exellfrlxl.exe3bhhtt.exetntbtb.exevpjvp.exepvddd.exe1rllffr.exebbbntt.exedvdvp.exevdjvd.exe1fllfxl.exeffxrxfx.exe7bnbnt.exedpvdv.exepddvj.exe5rffxrx.exe3nbbbh.exethtthh.exevvvvp.exelfflfrr.exenhtnnn.exeththhb.exeddjpj.exepjvvd.exerlflfrx.exe7lrrxrr.exennbhtn.exehbnhnh.exeppdjv.exejvjjv.exellfrflx.exe1xlrxxx.exehbbhnt.exe5bhbnh.exevpddp.exevpjvd.exe9xrfxxl.exexxflffr.exe9fxrffr.exe1bnthh.exepjddd.exepvvdj.exe1dvvj.exe5xfxlxx.exerlrxfrf.exetnhnbb.exeppjpj.exejdppv.exe3fxflxf.exeffrfrrf.exe1tbbnt.exehhhnbb.exevvdjv.exe3jpdj.exepid process 2176 bnhnbb.exe 3036 ppjjj.exe 1944 lfxfllx.exe 2652 nbtbnn.exe 2876 pjpdj.exe 2872 dvvdp.exe 2472 rlfxllx.exe 2456 bhbbnt.exe 2848 bbnbnh.exe 2280 djdjp.exe 2684 jdvdp.exe 1676 llfrlxl.exe 1248 3bhhtt.exe 2020 tntbtb.exe 1516 vpjvp.exe 2536 pvddd.exe 1100 1rllffr.exe 1984 bbbntt.exe 1648 dvdvp.exe 2024 vdjvd.exe 1968 1fllfxl.exe 824 ffxrxfx.exe 584 7bnbnt.exe 1800 dpvdv.exe 844 pddvj.exe 780 5rffxrx.exe 952 3nbbbh.exe 2004 thtthh.exe 1392 vvvvp.exe 2904 lfflfrr.exe 1684 nhtnnn.exe 2252 ththhb.exe 2224 ddjpj.exe 3060 pjvvd.exe 1588 rlflfrx.exe 3024 7lrrxrr.exe 3004 nnbhtn.exe 2636 hbnhnh.exe 2700 ppdjv.exe 2564 jvjjv.exe 2820 llfrflx.exe 2612 1xlrxxx.exe 2484 hbbhnt.exe 2568 5bhbnh.exe 2456 vpddp.exe 2972 vpjvd.exe 944 9xrfxxl.exe 1620 xxflffr.exe 2316 9fxrffr.exe 1676 1bnthh.exe 1248 pjddd.exe 2784 pvvdj.exe 2812 1dvvj.exe 1192 5xfxlxx.exe 2932 rlrxfrf.exe 856 tnhnbb.exe 2312 ppjpj.exe 1952 jdppv.exe 1656 3fxflxf.exe 1888 ffrfrrf.exe 616 1tbbnt.exe 848 hhhnbb.exe 664 vvdjv.exe 1040 3jpdj.exe -
Processes:
resource yara_rule behavioral1/memory/2224-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3036-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1516-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2536-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1100-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/824-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/584-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/780-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1392-283-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-607-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exebnhnbb.exeppjjj.exelfxfllx.exenbtbnn.exepjpdj.exedvvdp.exerlfxllx.exebhbbnt.exebbnbnh.exedjdjp.exejdvdp.exellfrlxl.exe3bhhtt.exetntbtb.exevpjvp.exedescription pid process target process PID 2224 wrote to memory of 2176 2224 00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe bnhnbb.exe PID 2224 wrote to memory of 2176 2224 00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe bnhnbb.exe PID 2224 wrote to memory of 2176 2224 00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe bnhnbb.exe PID 2224 wrote to memory of 2176 2224 00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe bnhnbb.exe PID 2176 wrote to memory of 3036 2176 bnhnbb.exe ppjjj.exe PID 2176 wrote to memory of 3036 2176 bnhnbb.exe ppjjj.exe PID 2176 wrote to memory of 3036 2176 bnhnbb.exe ppjjj.exe PID 2176 wrote to memory of 3036 2176 bnhnbb.exe ppjjj.exe PID 3036 wrote to memory of 1944 3036 ppjjj.exe lfxfllx.exe PID 3036 wrote to memory of 1944 3036 ppjjj.exe lfxfllx.exe PID 3036 wrote to memory of 1944 3036 ppjjj.exe lfxfllx.exe PID 3036 wrote to memory of 1944 3036 ppjjj.exe lfxfllx.exe PID 1944 wrote to memory of 2652 1944 lfxfllx.exe nbtbnn.exe PID 1944 wrote to memory of 2652 1944 lfxfllx.exe nbtbnn.exe PID 1944 wrote to memory of 2652 1944 lfxfllx.exe nbtbnn.exe PID 1944 wrote to memory of 2652 1944 lfxfllx.exe nbtbnn.exe PID 2652 wrote to memory of 2876 2652 nbtbnn.exe pjpdj.exe PID 2652 wrote to memory of 2876 2652 nbtbnn.exe pjpdj.exe PID 2652 wrote to memory of 2876 2652 nbtbnn.exe pjpdj.exe PID 2652 wrote to memory of 2876 2652 nbtbnn.exe pjpdj.exe PID 2876 wrote to memory of 2872 2876 pjpdj.exe dvvdp.exe PID 2876 wrote to memory of 2872 2876 pjpdj.exe dvvdp.exe PID 2876 wrote to memory of 2872 2876 pjpdj.exe dvvdp.exe PID 2876 wrote to memory of 2872 2876 pjpdj.exe dvvdp.exe PID 2872 wrote to memory of 2472 2872 dvvdp.exe rlfxllx.exe PID 2872 wrote to memory of 2472 2872 dvvdp.exe rlfxllx.exe PID 2872 wrote to memory of 2472 2872 dvvdp.exe rlfxllx.exe PID 2872 wrote to memory of 2472 2872 dvvdp.exe rlfxllx.exe PID 2472 wrote to memory of 2456 2472 rlfxllx.exe bhbbnt.exe PID 2472 wrote to memory of 2456 2472 rlfxllx.exe bhbbnt.exe PID 2472 wrote to memory of 2456 2472 rlfxllx.exe bhbbnt.exe PID 2472 wrote to memory of 2456 2472 rlfxllx.exe bhbbnt.exe PID 2456 wrote to memory of 2848 2456 bhbbnt.exe bbnbnh.exe PID 2456 wrote to memory of 2848 2456 bhbbnt.exe bbnbnh.exe PID 2456 wrote to memory of 2848 2456 bhbbnt.exe bbnbnh.exe PID 2456 wrote to memory of 2848 2456 bhbbnt.exe bbnbnh.exe PID 2848 wrote to memory of 2280 2848 bbnbnh.exe djdjp.exe PID 2848 wrote to memory of 2280 2848 bbnbnh.exe djdjp.exe PID 2848 wrote to memory of 2280 2848 bbnbnh.exe djdjp.exe PID 2848 wrote to memory of 2280 2848 bbnbnh.exe djdjp.exe PID 2280 wrote to memory of 2684 2280 djdjp.exe jdvdp.exe PID 2280 wrote to memory of 2684 2280 djdjp.exe jdvdp.exe PID 2280 wrote to memory of 2684 2280 djdjp.exe jdvdp.exe PID 2280 wrote to memory of 2684 2280 djdjp.exe jdvdp.exe PID 2684 wrote to memory of 1676 2684 jdvdp.exe llfrlxl.exe PID 2684 wrote to memory of 1676 2684 jdvdp.exe llfrlxl.exe PID 2684 wrote to memory of 1676 2684 jdvdp.exe llfrlxl.exe PID 2684 wrote to memory of 1676 2684 jdvdp.exe llfrlxl.exe PID 1676 wrote to memory of 1248 1676 llfrlxl.exe 3bhhtt.exe PID 1676 wrote to memory of 1248 1676 llfrlxl.exe 3bhhtt.exe PID 1676 wrote to memory of 1248 1676 llfrlxl.exe 3bhhtt.exe PID 1676 wrote to memory of 1248 1676 llfrlxl.exe 3bhhtt.exe PID 1248 wrote to memory of 2020 1248 3bhhtt.exe tntbtb.exe PID 1248 wrote to memory of 2020 1248 3bhhtt.exe tntbtb.exe PID 1248 wrote to memory of 2020 1248 3bhhtt.exe tntbtb.exe PID 1248 wrote to memory of 2020 1248 3bhhtt.exe tntbtb.exe PID 2020 wrote to memory of 1516 2020 tntbtb.exe vpjvp.exe PID 2020 wrote to memory of 1516 2020 tntbtb.exe vpjvp.exe PID 2020 wrote to memory of 1516 2020 tntbtb.exe vpjvp.exe PID 2020 wrote to memory of 1516 2020 tntbtb.exe vpjvp.exe PID 1516 wrote to memory of 2536 1516 vpjvp.exe pvddd.exe PID 1516 wrote to memory of 2536 1516 vpjvp.exe pvddd.exe PID 1516 wrote to memory of 2536 1516 vpjvp.exe pvddd.exe PID 1516 wrote to memory of 2536 1516 vpjvp.exe pvddd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe"C:\Users\Admin\AppData\Local\Temp\00178ee63339cf9336f5f8647bfefb615643da9aae91e980ec4bc6c96c7f2f77.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\bnhnbb.exec:\bnhnbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\ppjjj.exec:\ppjjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\lfxfllx.exec:\lfxfllx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\nbtbnn.exec:\nbtbnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\pjpdj.exec:\pjpdj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\dvvdp.exec:\dvvdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\rlfxllx.exec:\rlfxllx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\bhbbnt.exec:\bhbbnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\bbnbnh.exec:\bbnbnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\djdjp.exec:\djdjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\jdvdp.exec:\jdvdp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\llfrlxl.exec:\llfrlxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\3bhhtt.exec:\3bhhtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\tntbtb.exec:\tntbtb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\vpjvp.exec:\vpjvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\pvddd.exec:\pvddd.exe17⤵
- Executes dropped EXE
PID:2536 -
\??\c:\1rllffr.exec:\1rllffr.exe18⤵
- Executes dropped EXE
PID:1100 -
\??\c:\bbbntt.exec:\bbbntt.exe19⤵
- Executes dropped EXE
PID:1984 -
\??\c:\dvdvp.exec:\dvdvp.exe20⤵
- Executes dropped EXE
PID:1648 -
\??\c:\vdjvd.exec:\vdjvd.exe21⤵
- Executes dropped EXE
PID:2024 -
\??\c:\1fllfxl.exec:\1fllfxl.exe22⤵
- Executes dropped EXE
PID:1968 -
\??\c:\ffxrxfx.exec:\ffxrxfx.exe23⤵
- Executes dropped EXE
PID:824 -
\??\c:\7bnbnt.exec:\7bnbnt.exe24⤵
- Executes dropped EXE
PID:584 -
\??\c:\dpvdv.exec:\dpvdv.exe25⤵
- Executes dropped EXE
PID:1800 -
\??\c:\pddvj.exec:\pddvj.exe26⤵
- Executes dropped EXE
PID:844 -
\??\c:\5rffxrx.exec:\5rffxrx.exe27⤵
- Executes dropped EXE
PID:780 -
\??\c:\3nbbbh.exec:\3nbbbh.exe28⤵
- Executes dropped EXE
PID:952 -
\??\c:\thtthh.exec:\thtthh.exe29⤵
- Executes dropped EXE
PID:2004 -
\??\c:\vvvvp.exec:\vvvvp.exe30⤵
- Executes dropped EXE
PID:1392 -
\??\c:\lfflfrr.exec:\lfflfrr.exe31⤵
- Executes dropped EXE
PID:2904 -
\??\c:\nhtnnn.exec:\nhtnnn.exe32⤵
- Executes dropped EXE
PID:1684 -
\??\c:\ththhb.exec:\ththhb.exe33⤵
- Executes dropped EXE
PID:2252 -
\??\c:\ddjpj.exec:\ddjpj.exe34⤵
- Executes dropped EXE
PID:2224 -
\??\c:\pjvvd.exec:\pjvvd.exe35⤵
- Executes dropped EXE
PID:3060 -
\??\c:\rlflfrx.exec:\rlflfrx.exe36⤵
- Executes dropped EXE
PID:1588 -
\??\c:\7lrrxrr.exec:\7lrrxrr.exe37⤵
- Executes dropped EXE
PID:3024 -
\??\c:\nnbhtn.exec:\nnbhtn.exe38⤵
- Executes dropped EXE
PID:3004 -
\??\c:\hbnhnh.exec:\hbnhnh.exe39⤵
- Executes dropped EXE
PID:2636 -
\??\c:\ppdjv.exec:\ppdjv.exe40⤵
- Executes dropped EXE
PID:2700 -
\??\c:\jvjjv.exec:\jvjjv.exe41⤵
- Executes dropped EXE
PID:2564 -
\??\c:\llfrflx.exec:\llfrflx.exe42⤵
- Executes dropped EXE
PID:2820 -
\??\c:\1xlrxxx.exec:\1xlrxxx.exe43⤵
- Executes dropped EXE
PID:2612 -
\??\c:\hbbhnt.exec:\hbbhnt.exe44⤵
- Executes dropped EXE
PID:2484 -
\??\c:\5bhbnh.exec:\5bhbnh.exe45⤵
- Executes dropped EXE
PID:2568 -
\??\c:\vpddp.exec:\vpddp.exe46⤵
- Executes dropped EXE
PID:2456 -
\??\c:\vpjvd.exec:\vpjvd.exe47⤵
- Executes dropped EXE
PID:2972 -
\??\c:\9xrfxxl.exec:\9xrfxxl.exe48⤵
- Executes dropped EXE
PID:944 -
\??\c:\xxflffr.exec:\xxflffr.exe49⤵
- Executes dropped EXE
PID:1620 -
\??\c:\9fxrffr.exec:\9fxrffr.exe50⤵
- Executes dropped EXE
PID:2316 -
\??\c:\1bnthh.exec:\1bnthh.exe51⤵
- Executes dropped EXE
PID:1676 -
\??\c:\pjddd.exec:\pjddd.exe52⤵
- Executes dropped EXE
PID:1248 -
\??\c:\pvvdj.exec:\pvvdj.exe53⤵
- Executes dropped EXE
PID:2784 -
\??\c:\1dvvj.exec:\1dvvj.exe54⤵
- Executes dropped EXE
PID:2812 -
\??\c:\5xfxlxx.exec:\5xfxlxx.exe55⤵
- Executes dropped EXE
PID:1192 -
\??\c:\rlrxfrf.exec:\rlrxfrf.exe56⤵
- Executes dropped EXE
PID:2932 -
\??\c:\tnhnbb.exec:\tnhnbb.exe57⤵
- Executes dropped EXE
PID:856 -
\??\c:\ppjpj.exec:\ppjpj.exe58⤵
- Executes dropped EXE
PID:2312 -
\??\c:\jdppv.exec:\jdppv.exe59⤵
- Executes dropped EXE
PID:1952 -
\??\c:\3fxflxf.exec:\3fxflxf.exe60⤵
- Executes dropped EXE
PID:1656 -
\??\c:\ffrfrrf.exec:\ffrfrrf.exe61⤵
- Executes dropped EXE
PID:1888 -
\??\c:\1tbbnt.exec:\1tbbnt.exe62⤵
- Executes dropped EXE
PID:616 -
\??\c:\hhhnbb.exec:\hhhnbb.exe63⤵
- Executes dropped EXE
PID:848 -
\??\c:\vvdjv.exec:\vvdjv.exe64⤵
- Executes dropped EXE
PID:664 -
\??\c:\3jpdj.exec:\3jpdj.exe65⤵
- Executes dropped EXE
PID:1040 -
\??\c:\llffxxf.exec:\llffxxf.exe66⤵PID:1544
-
\??\c:\1tbtbt.exec:\1tbtbt.exe67⤵PID:2376
-
\??\c:\nhnthb.exec:\nhnthb.exe68⤵PID:960
-
\??\c:\5pddj.exec:\5pddj.exe69⤵PID:1532
-
\??\c:\1vjdp.exec:\1vjdp.exe70⤵PID:2004
-
\??\c:\7rlrfrl.exec:\7rlrfrl.exe71⤵PID:2880
-
\??\c:\xrxfrxl.exec:\xrxfrxl.exe72⤵PID:2836
-
\??\c:\nhbhnt.exec:\nhbhnt.exe73⤵PID:2352
-
\??\c:\ppvpv.exec:\ppvpv.exe74⤵PID:2120
-
\??\c:\5djvj.exec:\5djvj.exe75⤵PID:1608
-
\??\c:\xlffrlf.exec:\xlffrlf.exe76⤵PID:2176
-
\??\c:\xrfrfxx.exec:\xrfrfxx.exe77⤵PID:1980
-
\??\c:\bthhnn.exec:\bthhnn.exe78⤵PID:1600
-
\??\c:\9vjpp.exec:\9vjpp.exe79⤵PID:3036
-
\??\c:\jpvpv.exec:\jpvpv.exe80⤵PID:2672
-
\??\c:\9fxfxxl.exec:\9fxfxxl.exe81⤵PID:2600
-
\??\c:\5xlfllr.exec:\5xlfllr.exe82⤵PID:2664
-
\??\c:\lfllxxf.exec:\lfllxxf.exe83⤵PID:2608
-
\??\c:\hbnbtb.exec:\hbnbtb.exe84⤵PID:2620
-
\??\c:\thbbhh.exec:\thbbhh.exe85⤵PID:2584
-
\??\c:\vvjdp.exec:\vvjdp.exe86⤵PID:2616
-
\??\c:\7rlrxfr.exec:\7rlrxfr.exe87⤵PID:2496
-
\??\c:\1flllrx.exec:\1flllrx.exe88⤵PID:2796
-
\??\c:\7bnnhh.exec:\7bnnhh.exe89⤵PID:2156
-
\??\c:\jdvvd.exec:\jdvvd.exe90⤵PID:1668
-
\??\c:\7ppvj.exec:\7ppvj.exe91⤵PID:2684
-
\??\c:\frxrrlf.exec:\frxrrlf.exe92⤵PID:2732
-
\??\c:\nhthnb.exec:\nhthnb.exe93⤵PID:1756
-
\??\c:\9tthnb.exec:\9tthnb.exe94⤵PID:2692
-
\??\c:\9pjjp.exec:\9pjjp.exe95⤵PID:2800
-
\??\c:\7jvvv.exec:\7jvvv.exe96⤵PID:1160
-
\??\c:\rrflrlx.exec:\rrflrlx.exe97⤵PID:860
-
\??\c:\bbhhnt.exec:\bbhhnt.exe98⤵PID:2964
-
\??\c:\7bnnth.exec:\7bnnth.exe99⤵PID:1768
-
\??\c:\dvppd.exec:\dvppd.exe100⤵PID:2948
-
\??\c:\pvdjv.exec:\pvdjv.exe101⤵PID:1624
-
\??\c:\9rfxffl.exec:\9rfxffl.exe102⤵PID:336
-
\??\c:\frffllx.exec:\frffllx.exe103⤵PID:884
-
\??\c:\ntttbt.exec:\ntttbt.exe104⤵PID:1368
-
\??\c:\5hhtnt.exec:\5hhtnt.exe105⤵PID:1700
-
\??\c:\1dvvj.exec:\1dvvj.exe106⤵PID:108
-
\??\c:\jjdpp.exec:\jjdpp.exe107⤵PID:1188
-
\??\c:\pjjdj.exec:\pjjdj.exe108⤵PID:1260
-
\??\c:\fxlxlxf.exec:\fxlxlxf.exe109⤵PID:1416
-
\??\c:\lfxlrxf.exec:\lfxlrxf.exe110⤵PID:1172
-
\??\c:\hhnhtt.exec:\hhnhtt.exe111⤵PID:2328
-
\??\c:\3dpvp.exec:\3dpvp.exe112⤵PID:2928
-
\??\c:\ppdvd.exec:\ppdvd.exe113⤵PID:532
-
\??\c:\xrxrfxl.exec:\xrxrfxl.exe114⤵PID:1780
-
\??\c:\rlrrlfr.exec:\rlrrlfr.exe115⤵PID:2212
-
\??\c:\7ntthh.exec:\7ntthh.exe116⤵PID:2728
-
\??\c:\ppjjp.exec:\ppjjp.exe117⤵PID:2384
-
\??\c:\dvpdv.exec:\dvpdv.exe118⤵PID:2744
-
\??\c:\lxrrxfr.exec:\lxrrxfr.exe119⤵PID:1596
-
\??\c:\lfflrrr.exec:\lfflrrr.exe120⤵PID:2144
-
\??\c:\bntbhb.exec:\bntbhb.exe121⤵PID:1944
-
\??\c:\nhtnhn.exec:\nhtnhn.exe122⤵PID:2604
-
\??\c:\pvppv.exec:\pvppv.exe123⤵PID:2648
-
\??\c:\vjdvj.exec:\vjdvj.exe124⤵PID:2876
-
\??\c:\rrxfrrf.exec:\rrxfrrf.exe125⤵PID:3040
-
\??\c:\btttbb.exec:\btttbb.exe126⤵PID:2820
-
\??\c:\1pjvv.exec:\1pjvv.exe127⤵PID:2520
-
\??\c:\vjddv.exec:\vjddv.exe128⤵PID:2952
-
\??\c:\5ffrrrx.exec:\5ffrrrx.exe129⤵PID:1524
-
\??\c:\fxrfrfl.exec:\fxrfrfl.exe130⤵PID:1632
-
\??\c:\9hhntt.exec:\9hhntt.exe131⤵PID:2280
-
\??\c:\3bthht.exec:\3bthht.exe132⤵PID:2808
-
\??\c:\ddpdp.exec:\ddpdp.exe133⤵PID:2756
-
\??\c:\1jdjj.exec:\1jdjj.exe134⤵PID:2316
-
\??\c:\fxllrxf.exec:\fxllrxf.exe135⤵PID:2736
-
\??\c:\llxxflf.exec:\llxxflf.exe136⤵PID:2768
-
\??\c:\7nhnhn.exec:\7nhnhn.exe137⤵PID:2832
-
\??\c:\htbtbh.exec:\htbtbh.exe138⤵PID:2536
-
\??\c:\jdjpd.exec:\jdjpd.exe139⤵PID:1748
-
\??\c:\jvjjp.exec:\jvjjp.exe140⤵PID:2852
-
\??\c:\xrfxffl.exec:\xrfxffl.exe141⤵PID:2404
-
\??\c:\hbthbb.exec:\hbthbb.exe142⤵PID:2944
-
\??\c:\ttthtt.exec:\ttthtt.exe143⤵PID:2024
-
\??\c:\ddpdp.exec:\ddpdp.exe144⤵PID:1012
-
\??\c:\1dppv.exec:\1dppv.exe145⤵PID:788
-
\??\c:\9xrrrlf.exec:\9xrrrlf.exe146⤵PID:1120
-
\??\c:\frlfrlr.exec:\frlfrlr.exe147⤵PID:700
-
\??\c:\hbntbh.exec:\hbntbh.exe148⤵PID:1316
-
\??\c:\nnbnhn.exec:\nnbnhn.exe149⤵PID:1040
-
\??\c:\3jppd.exec:\3jppd.exe150⤵PID:2504
-
\??\c:\pjvjd.exec:\pjvjd.exe151⤵PID:1708
-
\??\c:\xrlxflx.exec:\xrlxflx.exe152⤵PID:2920
-
\??\c:\1tnbtb.exec:\1tnbtb.exe153⤵PID:2264
-
\??\c:\5tbbnb.exec:\5tbbnb.exe154⤵PID:2996
-
\??\c:\pjvjd.exec:\pjvjd.exe155⤵PID:1764
-
\??\c:\vvdpj.exec:\vvdpj.exe156⤵PID:1244
-
\??\c:\frfxfxx.exec:\frfxfxx.exe157⤵PID:2216
-
\??\c:\rrlxrlf.exec:\rrlxrlf.exe158⤵PID:2860
-
\??\c:\bbbttn.exec:\bbbttn.exe159⤵PID:1884
-
\??\c:\hbhntb.exec:\hbhntb.exe160⤵PID:2348
-
\??\c:\pppdv.exec:\pppdv.exe161⤵PID:2160
-
\??\c:\lxflxll.exec:\lxflxll.exe162⤵PID:3024
-
\??\c:\rffllff.exec:\rffllff.exe163⤵PID:2720
-
\??\c:\thtnnh.exec:\thtnnh.exe164⤵PID:2636
-
\??\c:\bnhhhh.exec:\bnhhhh.exe165⤵PID:2712
-
\??\c:\5pdpd.exec:\5pdpd.exe166⤵PID:2480
-
\??\c:\frxxlfr.exec:\frxxlfr.exe167⤵PID:2560
-
\??\c:\lflrxrf.exec:\lflrxrf.exe168⤵PID:2464
-
\??\c:\3ntnbb.exec:\3ntnbb.exe169⤵PID:2512
-
\??\c:\thhbbb.exec:\thhbbb.exe170⤵PID:2448
-
\??\c:\vpddd.exec:\vpddd.exe171⤵PID:1908
-
\??\c:\7djvv.exec:\7djvv.exe172⤵PID:2972
-
\??\c:\9rllllr.exec:\9rllllr.exe173⤵PID:944
-
\??\c:\rrxlxlf.exec:\rrxlxlf.exe174⤵PID:1472
-
\??\c:\bnbbtt.exec:\bnbbtt.exe175⤵PID:1308
-
\??\c:\nnhhbh.exec:\nnhhbh.exe176⤵PID:1676
-
\??\c:\jppvj.exec:\jppvj.exe177⤵PID:2776
-
\??\c:\1rrrrrr.exec:\1rrrrrr.exe178⤵PID:1068
-
\??\c:\xlrxlll.exec:\xlrxlll.exe179⤵PID:1540
-
\??\c:\1hthnb.exec:\1hthnb.exe180⤵PID:1100
-
\??\c:\9btbtt.exec:\9btbtt.exe181⤵PID:1060
-
\??\c:\pdjdd.exec:\pdjdd.exe182⤵PID:856
-
\??\c:\1dpjd.exec:\1dpjd.exe183⤵PID:1648
-
\??\c:\1xrflrx.exec:\1xrflrx.exe184⤵PID:1952
-
\??\c:\3lxlrxf.exec:\3lxlrxf.exe185⤵PID:488
-
\??\c:\thtthh.exec:\thtthh.exe186⤵PID:1376
-
\??\c:\htbbnn.exec:\htbbnn.exe187⤵PID:1636
-
\??\c:\pdjpd.exec:\pdjpd.exe188⤵PID:808
-
\??\c:\vjjjp.exec:\vjjjp.exe189⤵PID:1324
-
\??\c:\flxrrlr.exec:\flxrrlr.exe190⤵PID:1800
-
\??\c:\xlflfxx.exec:\xlflfxx.exe191⤵PID:1116
-
\??\c:\htnhhb.exec:\htnhhb.exe192⤵PID:1332
-
\??\c:\jvdjv.exec:\jvdjv.exe193⤵PID:2864
-
\??\c:\xrlxfrl.exec:\xrlxfrl.exe194⤵PID:984
-
\??\c:\llffffl.exec:\llffffl.exe195⤵PID:2128
-
\??\c:\nhbhhh.exec:\nhbhhh.exe196⤵PID:908
-
\??\c:\btbbbb.exec:\btbbbb.exe197⤵PID:1688
-
\??\c:\jdppv.exec:\jdppv.exe198⤵PID:1684
-
\??\c:\vpddj.exec:\vpddj.exe199⤵PID:2252
-
\??\c:\rflfxxf.exec:\rflfxxf.exe200⤵PID:1616
-
\??\c:\fxxxlff.exec:\fxxxlff.exe201⤵PID:2060
-
\??\c:\thnhbb.exec:\thnhbb.exe202⤵PID:3016
-
\??\c:\3nbhhn.exec:\3nbhhn.exe203⤵PID:2144
-
\??\c:\vdjjd.exec:\vdjjd.exe204⤵PID:3044
-
\??\c:\pjpjd.exec:\pjpjd.exe205⤵PID:2604
-
\??\c:\fxfxxrr.exec:\fxfxxrr.exe206⤵PID:2592
-
\??\c:\rrfrfrx.exec:\rrfrfrx.exe207⤵PID:2876
-
\??\c:\hbhbhn.exec:\hbhbhn.exe208⤵PID:2552
-
\??\c:\bntttt.exec:\bntttt.exe209⤵PID:2820
-
\??\c:\jdpdp.exec:\jdpdp.exe210⤵PID:2468
-
\??\c:\xlxxrlr.exec:\xlxxrlr.exe211⤵PID:2952
-
\??\c:\lrrrlrr.exec:\lrrrlrr.exe212⤵PID:2524
-
\??\c:\nnnbht.exec:\nnnbht.exe213⤵PID:1632
-
\??\c:\tnhhtt.exec:\tnhhtt.exe214⤵PID:1268
-
\??\c:\vjjdp.exec:\vjjdp.exe215⤵PID:2808
-
\??\c:\7jdjp.exec:\7jdjp.exe216⤵PID:2228
-
\??\c:\fffxlfr.exec:\fffxlfr.exe217⤵PID:2316
-
\??\c:\5frlrlr.exec:\5frlrlr.exe218⤵PID:1760
-
\??\c:\1tbhtn.exec:\1tbhtn.exe219⤵PID:1932
-
\??\c:\5bttnn.exec:\5bttnn.exe220⤵PID:2768
-
\??\c:\vppjp.exec:\vppjp.exe221⤵PID:2536
-
\??\c:\llxlxfl.exec:\llxlxfl.exe222⤵PID:876
-
\??\c:\rfffffx.exec:\rfffffx.exe223⤵PID:1088
-
\??\c:\3thhhh.exec:\3thhhh.exe224⤵PID:1768
-
\??\c:\tttnnt.exec:\tttnnt.exe225⤵PID:2944
-
\??\c:\dvpvp.exec:\dvpvp.exe226⤵PID:2028
-
\??\c:\9pdjj.exec:\9pdjj.exe227⤵PID:1896
-
\??\c:\9rxflrf.exec:\9rxflrf.exe228⤵PID:1352
-
\??\c:\nbnnnn.exec:\nbnnnn.exe229⤵PID:1120
-
\??\c:\nnnbth.exec:\nnnbth.exe230⤵PID:2428
-
\??\c:\jdjjj.exec:\jdjjj.exe231⤵PID:1488
-
\??\c:\pjppv.exec:\pjppv.exe232⤵PID:2036
-
\??\c:\xlxflrl.exec:\xlxflrl.exe233⤵PID:2504
-
\??\c:\1rffflr.exec:\1rffflr.exe234⤵PID:2416
-
\??\c:\tnbbhb.exec:\tnbbhb.exe235⤵PID:2328
-
\??\c:\5ntbtt.exec:\5ntbtt.exe236⤵PID:1652
-
\??\c:\pdjjp.exec:\pdjjp.exe237⤵PID:1072
-
\??\c:\dvjdv.exec:\dvjdv.exe238⤵PID:2928
-
\??\c:\1vjjj.exec:\1vjjj.exe239⤵PID:908
-
\??\c:\3xfllfl.exec:\3xfllfl.exe240⤵PID:1764
-
\??\c:\fxrllxl.exec:\fxrllxl.exe241⤵PID:1684
-
\??\c:\thtnnn.exec:\thtnnn.exe242⤵PID:2628