Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 19:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe
-
Size
64KB
-
MD5
00c555673e53439168fa5db43ab7bbf5
-
SHA1
0e67ac14b25de7e98251b5b42c88fdb35ec20ca5
-
SHA256
0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682
-
SHA512
06390b28024b3ba5ff6d920b8175bfadd15839d3c20c67f67cfac313657df23cbd407f6de8393b07ec3a627bd83e1e62b235ac2d4823590127af17f145ab00ef
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6Mu/ePS3AS:ymb3NkkiQ3mdBjFI46TQS
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/3080-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2468-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4768-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/448-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/448-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2864-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4304-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3180-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2820-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4936-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2428-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1548-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2808-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1120-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2572-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2260-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4408-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2360-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3268-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1740-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 27 IoCs
Processes:
resource yara_rule behavioral2/memory/3080-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3240-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3024-31-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2468-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4768-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/448-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/696-52-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/696-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2864-60-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4304-68-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4304-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3180-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-84-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2820-90-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4936-95-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4836-114-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2428-120-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1548-126-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2808-138-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1120-144-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2572-151-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2260-168-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4408-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2360-179-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3268-185-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2788-197-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1740-204-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
dppjd.exerrllxxf.exelrrlffx.exe3nnnnn.exe3tbbhh.exepdppj.exe7ppjd.exe5nttnn.exenhnhhn.exepjjjd.exe7llfflf.exe1fxlflf.exebbnhht.exevpjdv.exefrxrllf.exerllllll.exehnbbbh.exejdddv.exe3pppj.exeflrlffx.exehbhbbb.exepvvvv.exerllrffr.exe9jjjd.exerlrrlll.exefxfxxxx.exehnhhbh.exejvvvp.exevvpjj.exerllfxxr.exellffxxl.exetnnbbt.exedjdjj.exe5dppp.exelfxlfrr.exe9xrrxxf.exe5nbbbb.exe5httnt.exejddvp.exepjjdd.exe7rrlflf.exerfxrrrl.exetntttt.exehntnnn.exejdppj.exepjjdv.exe3fxrlll.exexrxrfxx.exetbhbtt.exenhhbbh.exepjjpp.exe5vvpp.exe5rrlxxr.exellxxrfx.exehtttnt.exehtttnn.exedvvpd.exe3fllxxx.exehtnntb.exe1hhnhh.exedvdvp.exe5jddv.exe3xfrlll.exe3tnhbb.exepid process 3240 dppjd.exe 448 rrllxxf.exe 4768 lrrlffx.exe 3024 3nnnnn.exe 2540 3tbbhh.exe 2468 pdppj.exe 696 7ppjd.exe 2864 5nttnn.exe 4304 nhnhhn.exe 3180 pjjjd.exe 1524 7llfflf.exe 2820 1fxlflf.exe 4936 bbnhht.exe 4460 vpjdv.exe 3716 frxrllf.exe 4836 rllllll.exe 2428 hnbbbh.exe 1548 jdddv.exe 520 3pppj.exe 2808 flrlffx.exe 1120 hbhbbb.exe 2572 pvvvv.exe 2392 rllrffr.exe 3752 9jjjd.exe 2260 rlrrlll.exe 4408 fxfxxxx.exe 2360 hnhhbh.exe 3268 jvvvp.exe 3240 vvpjj.exe 2788 rllfxxr.exe 1740 llffxxl.exe 4348 tnnbbt.exe 2884 djdjj.exe 1708 5dppp.exe 4004 lfxlfrr.exe 1864 9xrrxxf.exe 3224 5nbbbb.exe 1524 5httnt.exe 1492 jddvp.exe 3852 pjjdd.exe 392 7rrlflf.exe 4460 rfxrrrl.exe 3716 tntttt.exe 5012 hntnnn.exe 4024 jdppj.exe 3116 pjjdv.exe 2588 3fxrlll.exe 1076 xrxrfxx.exe 2156 tbhbtt.exe 2808 nhhbbh.exe 2612 pjjpp.exe 3628 5vvpp.exe 2748 5rrlxxr.exe 4716 llxxrfx.exe 4652 htttnt.exe 2260 htttnn.exe 2184 dvvpd.exe 1760 3fllxxx.exe 1968 htnntb.exe 4888 1hhnhh.exe 5092 dvdvp.exe 4032 5jddv.exe 4768 3xfrlll.exe 3156 3tnhbb.exe -
Processes:
resource yara_rule behavioral2/memory/3080-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2468-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4768-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/448-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2864-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4304-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4304-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3180-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2820-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4936-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2428-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1548-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2808-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1120-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2572-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2260-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2360-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3268-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exedppjd.exerrllxxf.exelrrlffx.exe3nnnnn.exe3tbbhh.exepdppj.exe7ppjd.exe5nttnn.exenhnhhn.exepjjjd.exe7llfflf.exe1fxlflf.exebbnhht.exevpjdv.exefrxrllf.exerllllll.exehnbbbh.exejdddv.exe3pppj.exeflrlffx.exehbhbbb.exedescription pid process target process PID 3080 wrote to memory of 3240 3080 0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe dppjd.exe PID 3080 wrote to memory of 3240 3080 0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe dppjd.exe PID 3080 wrote to memory of 3240 3080 0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe dppjd.exe PID 3240 wrote to memory of 448 3240 dppjd.exe rrllxxf.exe PID 3240 wrote to memory of 448 3240 dppjd.exe rrllxxf.exe PID 3240 wrote to memory of 448 3240 dppjd.exe rrllxxf.exe PID 448 wrote to memory of 4768 448 rrllxxf.exe lrrlffx.exe PID 448 wrote to memory of 4768 448 rrllxxf.exe lrrlffx.exe PID 448 wrote to memory of 4768 448 rrllxxf.exe lrrlffx.exe PID 4768 wrote to memory of 3024 4768 lrrlffx.exe 3nnnnn.exe PID 4768 wrote to memory of 3024 4768 lrrlffx.exe 3nnnnn.exe PID 4768 wrote to memory of 3024 4768 lrrlffx.exe 3nnnnn.exe PID 3024 wrote to memory of 2540 3024 3nnnnn.exe 3tbbhh.exe PID 3024 wrote to memory of 2540 3024 3nnnnn.exe 3tbbhh.exe PID 3024 wrote to memory of 2540 3024 3nnnnn.exe 3tbbhh.exe PID 2540 wrote to memory of 2468 2540 3tbbhh.exe pdppj.exe PID 2540 wrote to memory of 2468 2540 3tbbhh.exe pdppj.exe PID 2540 wrote to memory of 2468 2540 3tbbhh.exe pdppj.exe PID 2468 wrote to memory of 696 2468 pdppj.exe 7ppjd.exe PID 2468 wrote to memory of 696 2468 pdppj.exe 7ppjd.exe PID 2468 wrote to memory of 696 2468 pdppj.exe 7ppjd.exe PID 696 wrote to memory of 2864 696 7ppjd.exe 5nttnn.exe PID 696 wrote to memory of 2864 696 7ppjd.exe 5nttnn.exe PID 696 wrote to memory of 2864 696 7ppjd.exe 5nttnn.exe PID 2864 wrote to memory of 4304 2864 5nttnn.exe nhnhhn.exe PID 2864 wrote to memory of 4304 2864 5nttnn.exe nhnhhn.exe PID 2864 wrote to memory of 4304 2864 5nttnn.exe nhnhhn.exe PID 4304 wrote to memory of 3180 4304 nhnhhn.exe pjjjd.exe PID 4304 wrote to memory of 3180 4304 nhnhhn.exe pjjjd.exe PID 4304 wrote to memory of 3180 4304 nhnhhn.exe pjjjd.exe PID 3180 wrote to memory of 1524 3180 pjjjd.exe 7llfflf.exe PID 3180 wrote to memory of 1524 3180 pjjjd.exe 7llfflf.exe PID 3180 wrote to memory of 1524 3180 pjjjd.exe 7llfflf.exe PID 1524 wrote to memory of 2820 1524 7llfflf.exe 1fxlflf.exe PID 1524 wrote to memory of 2820 1524 7llfflf.exe 1fxlflf.exe PID 1524 wrote to memory of 2820 1524 7llfflf.exe 1fxlflf.exe PID 2820 wrote to memory of 4936 2820 1fxlflf.exe bbnhht.exe PID 2820 wrote to memory of 4936 2820 1fxlflf.exe bbnhht.exe PID 2820 wrote to memory of 4936 2820 1fxlflf.exe bbnhht.exe PID 4936 wrote to memory of 4460 4936 bbnhht.exe vpjdv.exe PID 4936 wrote to memory of 4460 4936 bbnhht.exe vpjdv.exe PID 4936 wrote to memory of 4460 4936 bbnhht.exe vpjdv.exe PID 4460 wrote to memory of 3716 4460 vpjdv.exe frxrllf.exe PID 4460 wrote to memory of 3716 4460 vpjdv.exe frxrllf.exe PID 4460 wrote to memory of 3716 4460 vpjdv.exe frxrllf.exe PID 3716 wrote to memory of 4836 3716 frxrllf.exe rllllll.exe PID 3716 wrote to memory of 4836 3716 frxrllf.exe rllllll.exe PID 3716 wrote to memory of 4836 3716 frxrllf.exe rllllll.exe PID 4836 wrote to memory of 2428 4836 rllllll.exe hnbbbh.exe PID 4836 wrote to memory of 2428 4836 rllllll.exe hnbbbh.exe PID 4836 wrote to memory of 2428 4836 rllllll.exe hnbbbh.exe PID 2428 wrote to memory of 1548 2428 hnbbbh.exe jdddv.exe PID 2428 wrote to memory of 1548 2428 hnbbbh.exe jdddv.exe PID 2428 wrote to memory of 1548 2428 hnbbbh.exe jdddv.exe PID 1548 wrote to memory of 520 1548 jdddv.exe 3pppj.exe PID 1548 wrote to memory of 520 1548 jdddv.exe 3pppj.exe PID 1548 wrote to memory of 520 1548 jdddv.exe 3pppj.exe PID 520 wrote to memory of 2808 520 3pppj.exe flrlffx.exe PID 520 wrote to memory of 2808 520 3pppj.exe flrlffx.exe PID 520 wrote to memory of 2808 520 3pppj.exe flrlffx.exe PID 2808 wrote to memory of 1120 2808 flrlffx.exe hbhbbb.exe PID 2808 wrote to memory of 1120 2808 flrlffx.exe hbhbbb.exe PID 2808 wrote to memory of 1120 2808 flrlffx.exe hbhbbb.exe PID 1120 wrote to memory of 2572 1120 hbhbbb.exe pvvvv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe"C:\Users\Admin\AppData\Local\Temp\0fa2b24458229a266a47f9659760234f63f2ab33e0dbef1e2cfc4de3bcd9f682.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\dppjd.exec:\dppjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
\??\c:\rrllxxf.exec:\rrllxxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
\??\c:\lrrlffx.exec:\lrrlffx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
\??\c:\3nnnnn.exec:\3nnnnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\3tbbhh.exec:\3tbbhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\pdppj.exec:\pdppj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\7ppjd.exec:\7ppjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\5nttnn.exec:\5nttnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\nhnhhn.exec:\nhnhhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
\??\c:\pjjjd.exec:\pjjjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
\??\c:\7llfflf.exec:\7llfflf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\1fxlflf.exec:\1fxlflf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\bbnhht.exec:\bbnhht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\vpjdv.exec:\vpjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
\??\c:\frxrllf.exec:\frxrllf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
\??\c:\rllllll.exec:\rllllll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\hnbbbh.exec:\hnbbbh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\jdddv.exec:\jdddv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\3pppj.exec:\3pppj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
\??\c:\flrlffx.exec:\flrlffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\hbhbbb.exec:\hbhbbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
\??\c:\pvvvv.exec:\pvvvv.exe23⤵
- Executes dropped EXE
PID:2572 -
\??\c:\rllrffr.exec:\rllrffr.exe24⤵
- Executes dropped EXE
PID:2392 -
\??\c:\9jjjd.exec:\9jjjd.exe25⤵
- Executes dropped EXE
PID:3752 -
\??\c:\rlrrlll.exec:\rlrrlll.exe26⤵
- Executes dropped EXE
PID:2260 -
\??\c:\fxfxxxx.exec:\fxfxxxx.exe27⤵
- Executes dropped EXE
PID:4408 -
\??\c:\hnhhbh.exec:\hnhhbh.exe28⤵
- Executes dropped EXE
PID:2360 -
\??\c:\jvvvp.exec:\jvvvp.exe29⤵
- Executes dropped EXE
PID:3268 -
\??\c:\vvpjj.exec:\vvpjj.exe30⤵
- Executes dropped EXE
PID:3240 -
\??\c:\rllfxxr.exec:\rllfxxr.exe31⤵
- Executes dropped EXE
PID:2788 -
\??\c:\llffxxl.exec:\llffxxl.exe32⤵
- Executes dropped EXE
PID:1740 -
\??\c:\tnnbbt.exec:\tnnbbt.exe33⤵
- Executes dropped EXE
PID:4348 -
\??\c:\djdjj.exec:\djdjj.exe34⤵
- Executes dropped EXE
PID:2884 -
\??\c:\5dppp.exec:\5dppp.exe35⤵
- Executes dropped EXE
PID:1708 -
\??\c:\lfxlfrr.exec:\lfxlfrr.exe36⤵
- Executes dropped EXE
PID:4004 -
\??\c:\9xrrxxf.exec:\9xrrxxf.exe37⤵
- Executes dropped EXE
PID:1864 -
\??\c:\5nbbbb.exec:\5nbbbb.exe38⤵
- Executes dropped EXE
PID:3224 -
\??\c:\5httnt.exec:\5httnt.exe39⤵
- Executes dropped EXE
PID:1524 -
\??\c:\jddvp.exec:\jddvp.exe40⤵
- Executes dropped EXE
PID:1492 -
\??\c:\pjjdd.exec:\pjjdd.exe41⤵
- Executes dropped EXE
PID:3852 -
\??\c:\7rrlflf.exec:\7rrlflf.exe42⤵
- Executes dropped EXE
PID:392 -
\??\c:\rfxrrrl.exec:\rfxrrrl.exe43⤵
- Executes dropped EXE
PID:4460 -
\??\c:\tntttt.exec:\tntttt.exe44⤵
- Executes dropped EXE
PID:3716 -
\??\c:\hntnnn.exec:\hntnnn.exe45⤵
- Executes dropped EXE
PID:5012 -
\??\c:\jdppj.exec:\jdppj.exe46⤵
- Executes dropped EXE
PID:4024 -
\??\c:\pjjdv.exec:\pjjdv.exe47⤵
- Executes dropped EXE
PID:3116 -
\??\c:\3fxrlll.exec:\3fxrlll.exe48⤵
- Executes dropped EXE
PID:2588 -
\??\c:\xrxrfxx.exec:\xrxrfxx.exe49⤵
- Executes dropped EXE
PID:1076 -
\??\c:\tbhbtt.exec:\tbhbtt.exe50⤵
- Executes dropped EXE
PID:2156 -
\??\c:\nhhbbh.exec:\nhhbbh.exe51⤵
- Executes dropped EXE
PID:2808 -
\??\c:\pjjpp.exec:\pjjpp.exe52⤵
- Executes dropped EXE
PID:2612 -
\??\c:\5vvpp.exec:\5vvpp.exe53⤵
- Executes dropped EXE
PID:3628 -
\??\c:\5rrlxxr.exec:\5rrlxxr.exe54⤵
- Executes dropped EXE
PID:2748 -
\??\c:\llxxrfx.exec:\llxxrfx.exe55⤵
- Executes dropped EXE
PID:4716 -
\??\c:\htttnt.exec:\htttnt.exe56⤵
- Executes dropped EXE
PID:4652 -
\??\c:\htttnn.exec:\htttnn.exe57⤵
- Executes dropped EXE
PID:2260 -
\??\c:\dvvpd.exec:\dvvpd.exe58⤵
- Executes dropped EXE
PID:2184 -
\??\c:\3fllxxx.exec:\3fllxxx.exe59⤵
- Executes dropped EXE
PID:1760 -
\??\c:\htnntb.exec:\htnntb.exe60⤵
- Executes dropped EXE
PID:1968 -
\??\c:\1hhnhh.exec:\1hhnhh.exe61⤵
- Executes dropped EXE
PID:4888 -
\??\c:\dvdvp.exec:\dvdvp.exe62⤵
- Executes dropped EXE
PID:5092 -
\??\c:\5jddv.exec:\5jddv.exe63⤵
- Executes dropped EXE
PID:4032 -
\??\c:\3xfrlll.exec:\3xfrlll.exe64⤵
- Executes dropped EXE
PID:4768 -
\??\c:\3tnhbb.exec:\3tnhbb.exe65⤵
- Executes dropped EXE
PID:3156 -
\??\c:\bnttbh.exec:\bnttbh.exe66⤵PID:1432
-
\??\c:\pdvdp.exec:\pdvdp.exe67⤵PID:1216
-
\??\c:\xrrxrrx.exec:\xrrxrrx.exe68⤵PID:2376
-
\??\c:\bbhhnh.exec:\bbhhnh.exe69⤵PID:1864
-
\??\c:\ppddj.exec:\ppddj.exe70⤵PID:3224
-
\??\c:\3bnbnt.exec:\3bnbnt.exe71⤵PID:4860
-
\??\c:\jddvp.exec:\jddvp.exe72⤵PID:2212
-
\??\c:\5rrlffx.exec:\5rrlffx.exe73⤵PID:3160
-
\??\c:\3lrrlll.exec:\3lrrlll.exe74⤵PID:1540
-
\??\c:\rllfxxx.exec:\rllfxxx.exe75⤵PID:3052
-
\??\c:\3nbbhh.exec:\3nbbhh.exe76⤵PID:3836
-
\??\c:\tbhbnn.exec:\tbhbnn.exe77⤵PID:1888
-
\??\c:\vpppp.exec:\vpppp.exe78⤵PID:1444
-
\??\c:\xrrlfff.exec:\xrrlfff.exe79⤵PID:520
-
\??\c:\hbbhbb.exec:\hbbhbb.exe80⤵PID:3720
-
\??\c:\hbhbbt.exec:\hbhbbt.exe81⤵PID:1860
-
\??\c:\jvvvp.exec:\jvvvp.exe82⤵PID:3588
-
\??\c:\vvdjd.exec:\vvdjd.exe83⤵PID:2612
-
\??\c:\1xfllll.exec:\1xfllll.exe84⤵PID:2392
-
\??\c:\htbtnt.exec:\htbtnt.exe85⤵PID:3752
-
\??\c:\jjpvv.exec:\jjpvv.exe86⤵PID:4312
-
\??\c:\pjjdv.exec:\pjjdv.exe87⤵PID:4412
-
\??\c:\3rrrfff.exec:\3rrrfff.exe88⤵PID:2260
-
\??\c:\1xxrllf.exec:\1xxrllf.exe89⤵PID:1404
-
\??\c:\nhbhbn.exec:\nhbhbn.exe90⤵PID:4964
-
\??\c:\bbtnhh.exec:\bbtnhh.exe91⤵PID:4480
-
\??\c:\jdjjp.exec:\jdjjp.exe92⤵PID:1660
-
\??\c:\jvdpv.exec:\jvdpv.exe93⤵PID:4012
-
\??\c:\3xlfxll.exec:\3xlfxll.exe94⤵PID:4300
-
\??\c:\nntthh.exec:\nntthh.exe95⤵PID:1432
-
\??\c:\vjdjd.exec:\vjdjd.exe96⤵PID:4304
-
\??\c:\bttnnn.exec:\bttnnn.exe97⤵PID:4672
-
\??\c:\tnhttn.exec:\tnhttn.exe98⤵PID:1776
-
\??\c:\vjppj.exec:\vjppj.exe99⤵PID:4224
-
\??\c:\1jpjd.exec:\1jpjd.exe100⤵PID:4936
-
\??\c:\lfffrrl.exec:\lfffrrl.exe101⤵PID:2088
-
\??\c:\lrlrrll.exec:\lrlrrll.exe102⤵PID:2784
-
\??\c:\hbnhnn.exec:\hbnhnn.exe103⤵PID:3396
-
\??\c:\hbtttt.exec:\hbtttt.exe104⤵PID:3484
-
\??\c:\bbbtbb.exec:\bbbtbb.exe105⤵PID:4760
-
\??\c:\dpvvv.exec:\dpvvv.exe106⤵PID:1088
-
\??\c:\fllllff.exec:\fllllff.exe107⤵PID:3764
-
\??\c:\9xflrrx.exec:\9xflrrx.exe108⤵PID:1140
-
\??\c:\thhbbb.exec:\thhbbb.exe109⤵PID:3720
-
\??\c:\hthhbb.exec:\hthhbb.exe110⤵PID:4600
-
\??\c:\3vdvj.exec:\3vdvj.exe111⤵PID:324
-
\??\c:\djpdv.exec:\djpdv.exe112⤵PID:1696
-
\??\c:\7rxxfrl.exec:\7rxxfrl.exe113⤵PID:3004
-
\??\c:\xfllfff.exec:\xfllfff.exe114⤵PID:4236
-
\??\c:\nbtnnn.exec:\nbtnnn.exe115⤵PID:4652
-
\??\c:\3bnhbh.exec:\3bnhbh.exe116⤵PID:960
-
\??\c:\jdjdj.exec:\jdjdj.exe117⤵PID:2360
-
\??\c:\pdvvp.exec:\pdvvp.exe118⤵PID:1460
-
\??\c:\5lfxrrr.exec:\5lfxrrr.exe119⤵PID:552
-
\??\c:\5ffllrr.exec:\5ffllrr.exe120⤵PID:1064
-
\??\c:\tnbbtb.exec:\tnbbtb.exe121⤵PID:2084
-
\??\c:\htbtnn.exec:\htbtnn.exe122⤵PID:1032
-
\??\c:\dvdvd.exec:\dvdvd.exe123⤵PID:4880
-
\??\c:\pddvj.exec:\pddvj.exe124⤵PID:1596
-
\??\c:\5rrrxfx.exec:\5rrrxfx.exe125⤵PID:4300
-
\??\c:\fxllxxl.exec:\fxllxxl.exe126⤵PID:4348
-
\??\c:\9nttnn.exec:\9nttnn.exe127⤵PID:3000
-
\??\c:\hbhbbb.exec:\hbhbbb.exe128⤵PID:1776
-
\??\c:\ddjpv.exec:\ddjpv.exe129⤵PID:3940
-
\??\c:\djppp.exec:\djppp.exe130⤵PID:392
-
\??\c:\rllfrxf.exec:\rllfrxf.exe131⤵PID:4984
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe132⤵PID:1804
-
\??\c:\xxlfxfl.exec:\xxlfxfl.exe133⤵PID:3632
-
\??\c:\hbtbbh.exec:\hbtbbh.exe134⤵PID:3948
-
\??\c:\bbttnt.exec:\bbttnt.exe135⤵PID:4900
-
\??\c:\3pjjd.exec:\3pjjd.exe136⤵PID:520
-
\??\c:\pvvpp.exec:\pvvpp.exe137⤵PID:1140
-
\??\c:\vpjdd.exec:\vpjdd.exe138⤵PID:720
-
\??\c:\xfffllx.exec:\xfffllx.exe139⤵PID:3588
-
\??\c:\frxrlll.exec:\frxrlll.exe140⤵PID:4852
-
\??\c:\bbntbn.exec:\bbntbn.exe141⤵PID:2616
-
\??\c:\btnnhb.exec:\btnnhb.exe142⤵PID:4236
-
\??\c:\9djjp.exec:\9djjp.exe143⤵PID:1668
-
\??\c:\7dddv.exec:\7dddv.exe144⤵PID:3032
-
\??\c:\dvddp.exec:\dvddp.exe145⤵PID:4772
-
\??\c:\9lllxrl.exec:\9lllxrl.exe146⤵PID:552
-
\??\c:\fxrlllf.exec:\fxrlllf.exe147⤵PID:2804
-
\??\c:\5hhbbb.exec:\5hhbbb.exe148⤵PID:876
-
\??\c:\hbnhnt.exec:\hbnhnt.exe149⤵PID:1596
-
\??\c:\pjvdv.exec:\pjvdv.exe150⤵PID:3172
-
\??\c:\jpvpj.exec:\jpvpj.exe151⤵PID:2708
-
\??\c:\vpppp.exec:\vpppp.exe152⤵PID:4436
-
\??\c:\llrlffx.exec:\llrlffx.exe153⤵PID:1776
-
\??\c:\lrxrllf.exec:\lrxrllf.exe154⤵PID:3940
-
\??\c:\nhhbtt.exec:\nhhbtt.exe155⤵PID:3052
-
\??\c:\3hhhbb.exec:\3hhhbb.exe156⤵PID:4956
-
\??\c:\nbhbbt.exec:\nbhbbt.exe157⤵PID:4724
-
\??\c:\dvpjj.exec:\dvpjj.exe158⤵PID:3576
-
\??\c:\7rrlfff.exec:\7rrlfff.exe159⤵PID:3764
-
\??\c:\5bhhht.exec:\5bhhht.exe160⤵PID:3720
-
\??\c:\hhnnnn.exec:\hhnnnn.exe161⤵PID:4952
-
\??\c:\ppjjp.exec:\ppjjp.exe162⤵PID:1620
-
\??\c:\pdvpp.exec:\pdvpp.exe163⤵PID:4404
-
\??\c:\flxrllf.exec:\flxrllf.exe164⤵PID:3004
-
\??\c:\5rfffff.exec:\5rfffff.exe165⤵PID:4532
-
\??\c:\hhhhhn.exec:\hhhhhn.exe166⤵PID:4236
-
\??\c:\7dpvj.exec:\7dpvj.exe167⤵PID:1964
-
\??\c:\pjpvj.exec:\pjpvj.exe168⤵PID:3032
-
\??\c:\7xxxxxx.exec:\7xxxxxx.exe169⤵PID:1028
-
\??\c:\tnnnhh.exec:\tnnnhh.exe170⤵PID:1064
-
\??\c:\pdjvv.exec:\pdjvv.exe171⤵PID:316
-
\??\c:\7lrlrlx.exec:\7lrlrlx.exe172⤵PID:4948
-
\??\c:\xlllxff.exec:\xlllxff.exe173⤵PID:4004
-
\??\c:\hnnnbb.exec:\hnnnbb.exe174⤵PID:1748
-
\??\c:\dpppd.exec:\dpppd.exe175⤵PID:1496
-
\??\c:\tbnhbb.exec:\tbnhbb.exe176⤵PID:1836
-
\??\c:\ttnnnn.exec:\ttnnnn.exe177⤵PID:3920
-
\??\c:\djddd.exec:\djddd.exe178⤵PID:2696
-
\??\c:\llrllll.exec:\llrllll.exe179⤵PID:3716
-
\??\c:\bbnnnn.exec:\bbnnnn.exe180⤵PID:4116
-
\??\c:\hbhbhh.exec:\hbhbhh.exe181⤵PID:3948
-
\??\c:\3vjdj.exec:\3vjdj.exe182⤵PID:1820
-
\??\c:\rrxfrfl.exec:\rrxfrfl.exe183⤵PID:4764
-
\??\c:\tbthbb.exec:\tbthbb.exe184⤵PID:4140
-
\??\c:\hbtbbt.exec:\hbtbbt.exe185⤵PID:1696
-
\??\c:\9vppd.exec:\9vppd.exe186⤵PID:232
-
\??\c:\fffxrrf.exec:\fffxrrf.exe187⤵PID:2616
-
\??\c:\rllfffl.exec:\rllfffl.exe188⤵PID:1968
-
\??\c:\7nnbtn.exec:\7nnbtn.exe189⤵PID:3264
-
\??\c:\ntnhbb.exec:\ntnhbb.exe190⤵PID:3240
-
\??\c:\vvdvj.exec:\vvdvj.exe191⤵PID:552
-
\??\c:\rflfxlx.exec:\rflfxlx.exe192⤵PID:2084
-
\??\c:\rffxrlf.exec:\rffxrlf.exe193⤵PID:752
-
\??\c:\tnbbbb.exec:\tnbbbb.exe194⤵PID:1928
-
\??\c:\jdvvp.exec:\jdvvp.exe195⤵PID:4224
-
\??\c:\jjdjp.exec:\jjdjp.exe196⤵PID:1972
-
\??\c:\llxffxr.exec:\llxffxr.exe197⤵PID:4436
-
\??\c:\rfxxfxl.exec:\rfxxfxl.exe198⤵PID:1288
-
\??\c:\7thnbn.exec:\7thnbn.exe199⤵PID:1336
-
\??\c:\bbhbbb.exec:\bbhbbb.exe200⤵PID:4984
-
\??\c:\vpjdp.exec:\vpjdp.exe201⤵PID:3836
-
\??\c:\vjdvj.exec:\vjdvj.exe202⤵PID:1664
-
\??\c:\xfxfxxr.exec:\xfxfxxr.exe203⤵PID:4292
-
\??\c:\lfxxrxr.exec:\lfxxrxr.exe204⤵PID:2572
-
\??\c:\btbtnb.exec:\btbtnb.exe205⤵PID:520
-
\??\c:\nhbnbt.exec:\nhbnbt.exe206⤵PID:3720
-
\??\c:\pppdp.exec:\pppdp.exe207⤵PID:1780
-
\??\c:\jdvpd.exec:\jdvpd.exe208⤵PID:4420
-
\??\c:\pdjdp.exec:\pdjdp.exe209⤵PID:2920
-
\??\c:\rfrrfxf.exec:\rfrrfxf.exe210⤵PID:2364
-
\??\c:\rlrffff.exec:\rlrffff.exe211⤵PID:2360
-
\??\c:\nbhnbh.exec:\nbhnbh.exe212⤵PID:4160
-
\??\c:\7ttnhh.exec:\7ttnhh.exe213⤵PID:4440
-
\??\c:\5dpjd.exec:\5dpjd.exe214⤵PID:3740
-
\??\c:\pdvjv.exec:\pdvjv.exe215⤵PID:3172
-
\??\c:\ffxfrlf.exec:\ffxfrlf.exe216⤵PID:2740
-
\??\c:\xffxxxr.exec:\xffxxxr.exe217⤵PID:3528
-
\??\c:\rxfrlfx.exec:\rxfrlfx.exe218⤵PID:3852
-
\??\c:\ntnhtt.exec:\ntnhtt.exe219⤵PID:2088
-
\??\c:\vjpjv.exec:\vjpjv.exe220⤵PID:392
-
\??\c:\pjpjv.exec:\pjpjv.exe221⤵PID:1804
-
\??\c:\fxxlxxr.exec:\fxxlxxr.exe222⤵PID:1088
-
\??\c:\hbhbbt.exec:\hbhbbt.exe223⤵PID:2744
-
\??\c:\ttbnnh.exec:\ttbnnh.exe224⤵PID:3576
-
\??\c:\hbnbnb.exec:\hbnbnb.exe225⤵PID:1820
-
\??\c:\jpjdp.exec:\jpjdp.exe226⤵PID:4900
-
\??\c:\vdvpv.exec:\vdvpv.exe227⤵PID:3224
-
\??\c:\5xrlxxr.exec:\5xrlxxr.exe228⤵PID:520
-
\??\c:\fxxxxrl.exec:\fxxxxrl.exe229⤵PID:1696
-
\??\c:\9ffxrrl.exec:\9ffxrrl.exe230⤵PID:2996
-
\??\c:\thbtnn.exec:\thbtnn.exe231⤵PID:3248
-
\??\c:\thhhbt.exec:\thhhbt.exe232⤵PID:4532
-
\??\c:\jdvvp.exec:\jdvvp.exe233⤵PID:2364
-
\??\c:\jddpd.exec:\jddpd.exe234⤵PID:1192
-
\??\c:\pddpj.exec:\pddpj.exe235⤵PID:4160
-
\??\c:\xfflflf.exec:\xfflflf.exe236⤵PID:1596
-
\??\c:\3xxrlfr.exec:\3xxrlfr.exe237⤵PID:3740
-
\??\c:\1hbthb.exec:\1hbthb.exe238⤵PID:3172
-
\??\c:\btthtt.exec:\btthtt.exe239⤵PID:1616
-
\??\c:\9jdvp.exec:\9jdvp.exe240⤵PID:1496
-
\??\c:\vdjdp.exec:\vdjdp.exe241⤵PID:2084
-
\??\c:\7fxrrlf.exec:\7fxrrlf.exe242⤵PID:3852