Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 19:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe
-
Size
64KB
-
MD5
ffab8fc6e6365ac7fd3dea66452595e7
-
SHA1
8732058eaafb1c4617f8b4dd01f0bdfb9de3312c
-
SHA256
1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4
-
SHA512
d3cfe9897b7dec2f3fd2ce743f1abc0233ff589ce9bec06db59971215a4f772e2fd45dc38f484e8973a923746f0f4bc2eb75872ea3e456949b98a60534b3b666
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfs:ymb3NkkiQ3mdBjFI4VY
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/2312-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1628-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4580-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2860-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1604-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2036-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3816-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4696-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2348-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4104-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2032-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4312-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3620-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3520-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/548-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4804-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3304-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5096-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1592-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/872-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 27 IoCs
Processes:
resource yara_rule behavioral2/memory/2312-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2252-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1628-23-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1580-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4032-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4580-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2860-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1604-59-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2912-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2036-73-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3816-82-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4644-88-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4696-101-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2348-106-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4104-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2032-136-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4312-148-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3620-154-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3520-161-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/548-166-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4964-172-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4804-177-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3304-184-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5096-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1592-196-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/872-201-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
jpppp.exe7rfffff.exennbbnt.exehthbbb.exepjjpp.exerrxrxxf.exe1lxffll.exettthbn.exeppdvp.exexrxxffl.exebbbbbb.exeddpjd.exerfrrxxr.exebtnthn.exejvvpj.exerfrrxrx.exehnhtbh.exennnbbb.exexxxxlxx.exenhbbtb.exetnnnht.exevjvvp.exelffffrf.exefrxxrrl.exeddpjd.exevdjvd.exexlrfxrr.exenbthtb.exedpjdj.exefxlrllf.exehtnhtb.exedpjpj.exexrlfxxr.exe5hhhtt.exerflfxxx.exenhntbh.exejvdpp.exedpddp.exelxflxrr.exettnhbt.exevvvjj.exexllfxlf.exetbtnhb.exetnbbbn.exedvvvp.exeflfllxr.exehnhbtb.exetnnnhn.exejjjpj.exebbnhnb.exetnhbth.exe3pvvj.exeflfflll.exehntnbt.exe7vpvv.exe1jdvp.exe9fffxfx.exethtnhb.exebbbttt.exe1jppj.exelxxlffr.exetnnhbt.exejdpdd.exe1djjv.exepid process 2252 jpppp.exe 2860 7rfffff.exe 1628 nnbbnt.exe 4904 hthbbb.exe 1580 pjjpp.exe 4032 rrxrxxf.exe 4580 1lxffll.exe 1604 ttthbn.exe 2912 ppdvp.exe 2036 xrxxffl.exe 3816 bbbbbb.exe 4644 ddpjd.exe 4952 rfrrxxr.exe 4696 btnthn.exe 2348 jvvpj.exe 2244 rfrrxrx.exe 4104 hnhtbh.exe 4468 nnnbbb.exe 2012 xxxxlxx.exe 2032 nhbbtb.exe 4812 tnnnht.exe 4312 vjvvp.exe 3620 lffffrf.exe 3520 frxxrrl.exe 548 ddpjd.exe 4964 vdjvd.exe 4804 xlrfxrr.exe 3304 nbthtb.exe 5096 dpjdj.exe 1592 fxlrllf.exe 872 htnhtb.exe 4212 dpjpj.exe 5100 xrlfxxr.exe 1556 5hhhtt.exe 540 rflfxxx.exe 3904 nhntbh.exe 1344 jvdpp.exe 4820 dpddp.exe 3664 lxflxrr.exe 2220 ttnhbt.exe 4900 vvvjj.exe 2844 xllfxlf.exe 3964 tbtnhb.exe 4936 tnbbbn.exe 3332 dvvvp.exe 1880 flfllxr.exe 4612 hnhbtb.exe 1044 tnnnhn.exe 4428 jjjpj.exe 4060 bbnhnb.exe 1512 tnhbth.exe 3464 3pvvj.exe 1056 flfflll.exe 3760 hntnbt.exe 3740 7vpvv.exe 2788 1jdvp.exe 3004 9fffxfx.exe 4884 thtnhb.exe 2160 bbbttt.exe 4964 1jppj.exe 3580 lxxlffr.exe 3276 tnnhbt.exe 4396 jdpdd.exe 1392 1djjv.exe -
Processes:
resource yara_rule behavioral2/memory/2312-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1628-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4580-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2860-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1604-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2036-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3816-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4696-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2348-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4104-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2032-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4312-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3620-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3520-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/548-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4804-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3304-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5096-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/872-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exejpppp.exe7rfffff.exennbbnt.exehthbbb.exepjjpp.exerrxrxxf.exe1lxffll.exettthbn.exeppdvp.exexrxxffl.exebbbbbb.exeddpjd.exerfrrxxr.exebtnthn.exejvvpj.exerfrrxrx.exehnhtbh.exennnbbb.exexxxxlxx.exenhbbtb.exetnnnht.exedescription pid process target process PID 2312 wrote to memory of 2252 2312 1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe jpppp.exe PID 2312 wrote to memory of 2252 2312 1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe jpppp.exe PID 2312 wrote to memory of 2252 2312 1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe jpppp.exe PID 2252 wrote to memory of 2860 2252 jpppp.exe 7rfffff.exe PID 2252 wrote to memory of 2860 2252 jpppp.exe 7rfffff.exe PID 2252 wrote to memory of 2860 2252 jpppp.exe 7rfffff.exe PID 2860 wrote to memory of 1628 2860 7rfffff.exe nnbbnt.exe PID 2860 wrote to memory of 1628 2860 7rfffff.exe nnbbnt.exe PID 2860 wrote to memory of 1628 2860 7rfffff.exe nnbbnt.exe PID 1628 wrote to memory of 4904 1628 nnbbnt.exe hthbbb.exe PID 1628 wrote to memory of 4904 1628 nnbbnt.exe hthbbb.exe PID 1628 wrote to memory of 4904 1628 nnbbnt.exe hthbbb.exe PID 4904 wrote to memory of 1580 4904 hthbbb.exe pjjpp.exe PID 4904 wrote to memory of 1580 4904 hthbbb.exe pjjpp.exe PID 4904 wrote to memory of 1580 4904 hthbbb.exe pjjpp.exe PID 1580 wrote to memory of 4032 1580 pjjpp.exe rrxrxxf.exe PID 1580 wrote to memory of 4032 1580 pjjpp.exe rrxrxxf.exe PID 1580 wrote to memory of 4032 1580 pjjpp.exe rrxrxxf.exe PID 4032 wrote to memory of 4580 4032 rrxrxxf.exe 1lxffll.exe PID 4032 wrote to memory of 4580 4032 rrxrxxf.exe 1lxffll.exe PID 4032 wrote to memory of 4580 4032 rrxrxxf.exe 1lxffll.exe PID 4580 wrote to memory of 1604 4580 1lxffll.exe ttthbn.exe PID 4580 wrote to memory of 1604 4580 1lxffll.exe ttthbn.exe PID 4580 wrote to memory of 1604 4580 1lxffll.exe ttthbn.exe PID 1604 wrote to memory of 2912 1604 ttthbn.exe ppdvp.exe PID 1604 wrote to memory of 2912 1604 ttthbn.exe ppdvp.exe PID 1604 wrote to memory of 2912 1604 ttthbn.exe ppdvp.exe PID 2912 wrote to memory of 2036 2912 ppdvp.exe xrxxffl.exe PID 2912 wrote to memory of 2036 2912 ppdvp.exe xrxxffl.exe PID 2912 wrote to memory of 2036 2912 ppdvp.exe xrxxffl.exe PID 2036 wrote to memory of 3816 2036 xrxxffl.exe bbbbbb.exe PID 2036 wrote to memory of 3816 2036 xrxxffl.exe bbbbbb.exe PID 2036 wrote to memory of 3816 2036 xrxxffl.exe bbbbbb.exe PID 3816 wrote to memory of 4644 3816 bbbbbb.exe ddpjd.exe PID 3816 wrote to memory of 4644 3816 bbbbbb.exe ddpjd.exe PID 3816 wrote to memory of 4644 3816 bbbbbb.exe ddpjd.exe PID 4644 wrote to memory of 4952 4644 ddpjd.exe rfrrxxr.exe PID 4644 wrote to memory of 4952 4644 ddpjd.exe rfrrxxr.exe PID 4644 wrote to memory of 4952 4644 ddpjd.exe rfrrxxr.exe PID 4952 wrote to memory of 4696 4952 rfrrxxr.exe btnthn.exe PID 4952 wrote to memory of 4696 4952 rfrrxxr.exe btnthn.exe PID 4952 wrote to memory of 4696 4952 rfrrxxr.exe btnthn.exe PID 4696 wrote to memory of 2348 4696 btnthn.exe jvvpj.exe PID 4696 wrote to memory of 2348 4696 btnthn.exe jvvpj.exe PID 4696 wrote to memory of 2348 4696 btnthn.exe jvvpj.exe PID 2348 wrote to memory of 2244 2348 jvvpj.exe rfrrxrx.exe PID 2348 wrote to memory of 2244 2348 jvvpj.exe rfrrxrx.exe PID 2348 wrote to memory of 2244 2348 jvvpj.exe rfrrxrx.exe PID 2244 wrote to memory of 4104 2244 rfrrxrx.exe hnhtbh.exe PID 2244 wrote to memory of 4104 2244 rfrrxrx.exe hnhtbh.exe PID 2244 wrote to memory of 4104 2244 rfrrxrx.exe hnhtbh.exe PID 4104 wrote to memory of 4468 4104 hnhtbh.exe nnnbbb.exe PID 4104 wrote to memory of 4468 4104 hnhtbh.exe nnnbbb.exe PID 4104 wrote to memory of 4468 4104 hnhtbh.exe nnnbbb.exe PID 4468 wrote to memory of 2012 4468 nnnbbb.exe xxxxlxx.exe PID 4468 wrote to memory of 2012 4468 nnnbbb.exe xxxxlxx.exe PID 4468 wrote to memory of 2012 4468 nnnbbb.exe xxxxlxx.exe PID 2012 wrote to memory of 2032 2012 xxxxlxx.exe nhbbtb.exe PID 2012 wrote to memory of 2032 2012 xxxxlxx.exe nhbbtb.exe PID 2012 wrote to memory of 2032 2012 xxxxlxx.exe nhbbtb.exe PID 2032 wrote to memory of 4812 2032 nhbbtb.exe tnnnht.exe PID 2032 wrote to memory of 4812 2032 nhbbtb.exe tnnnht.exe PID 2032 wrote to memory of 4812 2032 nhbbtb.exe tnnnht.exe PID 4812 wrote to memory of 4312 4812 tnnnht.exe vjvvp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe"C:\Users\Admin\AppData\Local\Temp\1697a06eee6d9d0373e55aa34b5cbf9a92337d44dd1af975a29172c4fd80a9d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\jpppp.exec:\jpppp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\7rfffff.exec:\7rfffff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\nnbbnt.exec:\nnbbnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\hthbbb.exec:\hthbbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\pjjpp.exec:\pjjpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\rrxrxxf.exec:\rrxrxxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
\??\c:\1lxffll.exec:\1lxffll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\ttthbn.exec:\ttthbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\ppdvp.exec:\ppdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\xrxxffl.exec:\xrxxffl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\bbbbbb.exec:\bbbbbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816 -
\??\c:\ddpjd.exec:\ddpjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\rfrrxxr.exec:\rfrrxxr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\btnthn.exec:\btnthn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
\??\c:\jvvpj.exec:\jvvpj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\rfrrxrx.exec:\rfrrxrx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\hnhtbh.exec:\hnhtbh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
\??\c:\nnnbbb.exec:\nnnbbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
\??\c:\xxxxlxx.exec:\xxxxlxx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\nhbbtb.exec:\nhbbtb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\tnnnht.exec:\tnnnht.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\vjvvp.exec:\vjvvp.exe23⤵
- Executes dropped EXE
PID:4312 -
\??\c:\lffffrf.exec:\lffffrf.exe24⤵
- Executes dropped EXE
PID:3620 -
\??\c:\frxxrrl.exec:\frxxrrl.exe25⤵
- Executes dropped EXE
PID:3520 -
\??\c:\ddpjd.exec:\ddpjd.exe26⤵
- Executes dropped EXE
PID:548 -
\??\c:\vdjvd.exec:\vdjvd.exe27⤵
- Executes dropped EXE
PID:4964 -
\??\c:\xlrfxrr.exec:\xlrfxrr.exe28⤵
- Executes dropped EXE
PID:4804 -
\??\c:\nbthtb.exec:\nbthtb.exe29⤵
- Executes dropped EXE
PID:3304 -
\??\c:\dpjdj.exec:\dpjdj.exe30⤵
- Executes dropped EXE
PID:5096 -
\??\c:\fxlrllf.exec:\fxlrllf.exe31⤵
- Executes dropped EXE
PID:1592 -
\??\c:\htnhtb.exec:\htnhtb.exe32⤵
- Executes dropped EXE
PID:872 -
\??\c:\dpjpj.exec:\dpjpj.exe33⤵
- Executes dropped EXE
PID:4212 -
\??\c:\xrlfxxr.exec:\xrlfxxr.exe34⤵
- Executes dropped EXE
PID:5100 -
\??\c:\5hhhtt.exec:\5hhhtt.exe35⤵
- Executes dropped EXE
PID:1556 -
\??\c:\rflfxxx.exec:\rflfxxx.exe36⤵
- Executes dropped EXE
PID:540 -
\??\c:\nhntbh.exec:\nhntbh.exe37⤵
- Executes dropped EXE
PID:3904 -
\??\c:\jvdpp.exec:\jvdpp.exe38⤵
- Executes dropped EXE
PID:1344 -
\??\c:\dpddp.exec:\dpddp.exe39⤵
- Executes dropped EXE
PID:4820 -
\??\c:\lxflxrr.exec:\lxflxrr.exe40⤵
- Executes dropped EXE
PID:3664 -
\??\c:\ttnhbt.exec:\ttnhbt.exe41⤵
- Executes dropped EXE
PID:2220 -
\??\c:\vvvjj.exec:\vvvjj.exe42⤵
- Executes dropped EXE
PID:4900 -
\??\c:\xllfxlf.exec:\xllfxlf.exe43⤵
- Executes dropped EXE
PID:2844 -
\??\c:\tbtnhb.exec:\tbtnhb.exe44⤵
- Executes dropped EXE
PID:3964 -
\??\c:\tnbbbn.exec:\tnbbbn.exe45⤵
- Executes dropped EXE
PID:4936 -
\??\c:\dvvvp.exec:\dvvvp.exe46⤵
- Executes dropped EXE
PID:3332 -
\??\c:\flfllxr.exec:\flfllxr.exe47⤵
- Executes dropped EXE
PID:1880 -
\??\c:\hnhbtb.exec:\hnhbtb.exe48⤵
- Executes dropped EXE
PID:4612 -
\??\c:\tnnnhn.exec:\tnnnhn.exe49⤵
- Executes dropped EXE
PID:1044 -
\??\c:\jjjpj.exec:\jjjpj.exe50⤵
- Executes dropped EXE
PID:4428 -
\??\c:\bbnhnb.exec:\bbnhnb.exe51⤵
- Executes dropped EXE
PID:4060 -
\??\c:\tnhbth.exec:\tnhbth.exe52⤵
- Executes dropped EXE
PID:1512 -
\??\c:\3pvvj.exec:\3pvvj.exe53⤵
- Executes dropped EXE
PID:3464 -
\??\c:\flfflll.exec:\flfflll.exe54⤵
- Executes dropped EXE
PID:1056 -
\??\c:\hntnbt.exec:\hntnbt.exe55⤵
- Executes dropped EXE
PID:3760 -
\??\c:\7vpvv.exec:\7vpvv.exe56⤵
- Executes dropped EXE
PID:3740 -
\??\c:\1jdvp.exec:\1jdvp.exe57⤵
- Executes dropped EXE
PID:2788 -
\??\c:\9fffxfx.exec:\9fffxfx.exe58⤵
- Executes dropped EXE
PID:3004 -
\??\c:\thtnhb.exec:\thtnhb.exe59⤵
- Executes dropped EXE
PID:4884 -
\??\c:\bbbttt.exec:\bbbttt.exe60⤵
- Executes dropped EXE
PID:2160 -
\??\c:\1jppj.exec:\1jppj.exe61⤵
- Executes dropped EXE
PID:4964 -
\??\c:\lxxlffr.exec:\lxxlffr.exe62⤵
- Executes dropped EXE
PID:3580 -
\??\c:\tnnhbt.exec:\tnnhbt.exe63⤵
- Executes dropped EXE
PID:3276 -
\??\c:\jdpdd.exec:\jdpdd.exe64⤵
- Executes dropped EXE
PID:4396 -
\??\c:\1djjv.exec:\1djjv.exe65⤵
- Executes dropped EXE
PID:1392 -
\??\c:\xxrrxxr.exec:\xxrrxxr.exe66⤵PID:4524
-
\??\c:\nnbhht.exec:\nnbhht.exe67⤵PID:872
-
\??\c:\vvdvv.exec:\vvdvv.exe68⤵PID:812
-
\??\c:\pvvpj.exec:\pvvpj.exe69⤵PID:1116
-
\??\c:\rlllfxx.exec:\rlllfxx.exe70⤵PID:4156
-
\??\c:\9xfrlxr.exec:\9xfrlxr.exe71⤵PID:2168
-
\??\c:\tnbttn.exec:\tnbttn.exe72⤵PID:2388
-
\??\c:\dvjdp.exec:\dvjdp.exe73⤵PID:5008
-
\??\c:\fflfflr.exec:\fflfflr.exe74⤵PID:3668
-
\??\c:\xxrrlll.exec:\xxrrlll.exe75⤵PID:228
-
\??\c:\dvjdv.exec:\dvjdv.exe76⤵PID:4956
-
\??\c:\pvjpp.exec:\pvjpp.exe77⤵PID:772
-
\??\c:\xrlrrxx.exec:\xrlrrxx.exe78⤵PID:2036
-
\??\c:\3xfxrlx.exec:\3xfxrlx.exe79⤵PID:1632
-
\??\c:\1ttnnn.exec:\1ttnnn.exe80⤵PID:4616
-
\??\c:\jdpjd.exec:\jdpjd.exe81⤵PID:3336
-
\??\c:\dvddj.exec:\dvddj.exe82⤵PID:3880
-
\??\c:\xrrlxxr.exec:\xrrlxxr.exe83⤵PID:3188
-
\??\c:\nhntbb.exec:\nhntbb.exe84⤵PID:2260
-
\??\c:\7bthbb.exec:\7bthbb.exe85⤵PID:3788
-
\??\c:\jvjdv.exec:\jvjdv.exe86⤵PID:864
-
\??\c:\lrflrlf.exec:\lrflrlf.exe87⤵PID:836
-
\??\c:\ttnnnn.exec:\ttnnnn.exe88⤵PID:2712
-
\??\c:\bttttt.exec:\bttttt.exe89⤵PID:4004
-
\??\c:\jpjpv.exec:\jpjpv.exe90⤵PID:4344
-
\??\c:\rllfrfr.exec:\rllfrfr.exe91⤵PID:4240
-
\??\c:\rflrlrr.exec:\rflrlrr.exe92⤵PID:4328
-
\??\c:\nnthht.exec:\nnthht.exe93⤵PID:4300
-
\??\c:\btbhhh.exec:\btbhhh.exe94⤵PID:1388
-
\??\c:\3vpjd.exec:\3vpjd.exe95⤵PID:804
-
\??\c:\ppjjj.exec:\ppjjj.exe96⤵PID:3476
-
\??\c:\rfffxxx.exec:\rfffxxx.exe97⤵PID:4168
-
\??\c:\llffflf.exec:\llffflf.exe98⤵PID:4368
-
\??\c:\ttbbhn.exec:\ttbbhn.exe99⤵PID:4464
-
\??\c:\nhbtbn.exec:\nhbtbn.exe100⤵PID:1392
-
\??\c:\jdvdv.exec:\jdvdv.exe101⤵PID:2860
-
\??\c:\llrlfll.exec:\llrlfll.exe102⤵PID:3184
-
\??\c:\1xfffrr.exec:\1xfffrr.exe103⤵PID:1892
-
\??\c:\bthhnn.exec:\bthhnn.exe104⤵PID:3780
-
\??\c:\pdpjv.exec:\pdpjv.exe105⤵PID:2256
-
\??\c:\jpjdj.exec:\jpjdj.exe106⤵PID:4564
-
\??\c:\rffffff.exec:\rffffff.exe107⤵PID:1380
-
\??\c:\flrllfl.exec:\flrllfl.exe108⤵PID:3856
-
\??\c:\htnttb.exec:\htnttb.exe109⤵PID:4908
-
\??\c:\tttbbh.exec:\tttbbh.exe110⤵PID:3828
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe111⤵PID:2996
-
\??\c:\hhhbhb.exec:\hhhbhb.exe112⤵PID:3816
-
\??\c:\7vppp.exec:\7vppp.exe113⤵PID:3940
-
\??\c:\djjjd.exec:\djjjd.exe114⤵PID:2516
-
\??\c:\xlrlffl.exec:\xlrlffl.exe115⤵PID:5092
-
\??\c:\bhbhhn.exec:\bhbhhn.exe116⤵PID:3188
-
\??\c:\nhbbtt.exec:\nhbbtt.exe117⤵PID:4896
-
\??\c:\jdpvp.exec:\jdpvp.exe118⤵PID:1404
-
\??\c:\ppvpv.exec:\ppvpv.exe119⤵PID:3444
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe120⤵PID:3028
-
\??\c:\nhbbbb.exec:\nhbbbb.exe121⤵PID:4004
-
\??\c:\vpvdv.exec:\vpvdv.exe122⤵PID:3760
-
\??\c:\pvpjv.exec:\pvpjv.exe123⤵PID:2764
-
\??\c:\rlfxffx.exec:\rlfxffx.exe124⤵PID:4328
-
\??\c:\xrrrrxx.exec:\xrrrrxx.exe125⤵PID:588
-
\??\c:\9thbtt.exec:\9thbtt.exe126⤵PID:2468
-
\??\c:\dvppj.exec:\dvppj.exe127⤵PID:3580
-
\??\c:\vdpjp.exec:\vdpjp.exe128⤵PID:4392
-
\??\c:\lfrlfxx.exec:\lfrlfxx.exe129⤵PID:5096
-
\??\c:\hbhhtt.exec:\hbhhtt.exe130⤵PID:4524
-
\??\c:\7bhnnt.exec:\7bhnnt.exe131⤵PID:3184
-
\??\c:\dvvdd.exec:\dvvdd.exe132⤵PID:1580
-
\??\c:\dvjjp.exec:\dvjjp.exe133⤵PID:640
-
\??\c:\lfrfxrr.exec:\lfrfxrr.exe134⤵PID:5008
-
\??\c:\frflfxf.exec:\frflfxf.exe135⤵PID:1380
-
\??\c:\hnbhnb.exec:\hnbhnb.exe136⤵PID:2948
-
\??\c:\bbnthh.exec:\bbnthh.exe137⤵PID:4556
-
\??\c:\ddppj.exec:\ddppj.exe138⤵PID:1756
-
\??\c:\dvvdp.exec:\dvvdp.exe139⤵PID:3200
-
\??\c:\rrrlrxx.exec:\rrrlrxx.exe140⤵PID:4976
-
\??\c:\bhnnbt.exec:\bhnnbt.exe141⤵PID:3880
-
\??\c:\bhbhtb.exec:\bhbhtb.exe142⤵PID:4856
-
\??\c:\vpjjd.exec:\vpjjd.exe143⤵PID:2272
-
\??\c:\xfllfrf.exec:\xfllfrf.exe144⤵PID:1712
-
\??\c:\hhbhnn.exec:\hhbhnn.exe145⤵PID:1288
-
\??\c:\httbtb.exec:\httbtb.exe146⤵PID:3444
-
\??\c:\pvjjj.exec:\pvjjj.exe147⤵PID:4004
-
\??\c:\vvddj.exec:\vvddj.exe148⤵PID:336
-
\??\c:\7rxrlrr.exec:\7rxrlrr.exe149⤵PID:720
-
\??\c:\ffxxxfx.exec:\ffxxxfx.exe150⤵PID:1232
-
\??\c:\bhnbhn.exec:\bhnbhn.exe151⤵PID:3304
-
\??\c:\hbbbbt.exec:\hbbbbt.exe152⤵PID:2956
-
\??\c:\fxllrrx.exec:\fxllrrx.exe153⤵PID:2868
-
\??\c:\nthhnt.exec:\nthhnt.exe154⤵PID:2252
-
\??\c:\tntthn.exec:\tntthn.exe155⤵PID:3592
-
\??\c:\pvjjp.exec:\pvjjp.exe156⤵PID:4524
-
\??\c:\9ffrrlf.exec:\9ffrrlf.exe157⤵PID:3184
-
\??\c:\hbbttt.exec:\hbbttt.exe158⤵PID:2384
-
\??\c:\tnnhhh.exec:\tnnhhh.exe159⤵PID:4044
-
\??\c:\jddvv.exec:\jddvv.exe160⤵PID:3048
-
\??\c:\dvvpp.exec:\dvvpp.exe161⤵PID:228
-
\??\c:\fxxrlff.exec:\fxxrlff.exe162⤵PID:2844
-
\??\c:\hbhntt.exec:\hbhntt.exe163⤵PID:4956
-
\??\c:\5thhht.exec:\5thhht.exe164⤵PID:1756
-
\??\c:\jpvvv.exec:\jpvvv.exe165⤵PID:3940
-
\??\c:\vvjjd.exec:\vvjjd.exe166⤵PID:2364
-
\??\c:\rxlllrf.exec:\rxlllrf.exe167⤵PID:3880
-
\??\c:\xrrrlrx.exec:\xrrrlrx.exe168⤵PID:3212
-
\??\c:\5tntbb.exec:\5tntbb.exe169⤵PID:1404
-
\??\c:\llffrlx.exec:\llffrlx.exe170⤵PID:5032
-
\??\c:\3bnbth.exec:\3bnbth.exe171⤵PID:4664
-
\??\c:\rfrxxff.exec:\rfrxxff.exe172⤵PID:3620
-
\??\c:\ddjjv.exec:\ddjjv.exe173⤵PID:548
-
\??\c:\jvvvp.exec:\jvvvp.exe174⤵PID:4328
-
\??\c:\rxlxrff.exec:\rxlxrff.exe175⤵PID:1040
-
\??\c:\nbhhnb.exec:\nbhhnb.exe176⤵PID:5016
-
\??\c:\pvvpj.exec:\pvvpj.exe177⤵PID:4392
-
\??\c:\vpjjj.exec:\vpjjj.exe178⤵PID:5052
-
\??\c:\3frrlxf.exec:\3frrlxf.exe179⤵PID:3780
-
\??\c:\xflxfll.exec:\xflxfll.exe180⤵PID:3000
-
\??\c:\bnhnhn.exec:\bnhnhn.exe181⤵PID:1580
-
\??\c:\hbtbbt.exec:\hbtbbt.exe182⤵PID:5008
-
\??\c:\djppd.exec:\djppd.exe183⤵PID:1380
-
\??\c:\7rlrllf.exec:\7rlrllf.exe184⤵PID:1200
-
\??\c:\3xxlffx.exec:\3xxlffx.exe185⤵PID:3964
-
\??\c:\htnnbt.exec:\htnnbt.exe186⤵PID:4632
-
\??\c:\tbbhht.exec:\tbbhht.exe187⤵PID:4928
-
\??\c:\pjppp.exec:\pjppp.exe188⤵PID:1620
-
\??\c:\1xxrrll.exec:\1xxrrll.exe189⤵PID:4468
-
\??\c:\xrllxfl.exec:\xrllxfl.exe190⤵PID:2484
-
\??\c:\nntntn.exec:\nntntn.exe191⤵PID:3188
-
\??\c:\ddjdd.exec:\ddjdd.exe192⤵PID:4796
-
\??\c:\lflxlrf.exec:\lflxlrf.exe193⤵PID:2892
-
\??\c:\flfxffr.exec:\flfxffr.exe194⤵PID:4240
-
\??\c:\tnbhht.exec:\tnbhht.exe195⤵PID:1468
-
\??\c:\pvdpj.exec:\pvdpj.exe196⤵PID:336
-
\??\c:\vvvpj.exec:\vvvpj.exe197⤵PID:3276
-
\??\c:\rlxrllf.exec:\rlxrllf.exe198⤵PID:4388
-
\??\c:\xxfflxl.exec:\xxfflxl.exe199⤵PID:4672
-
\??\c:\hnnttt.exec:\hnnttt.exe200⤵PID:2860
-
\??\c:\jdvdj.exec:\jdvdj.exe201⤵PID:3904
-
\??\c:\jvvpj.exec:\jvvpj.exe202⤵PID:2672
-
\??\c:\xxllffx.exec:\xxllffx.exe203⤵PID:3668
-
\??\c:\xrlxrll.exec:\xrlxrll.exe204⤵PID:4140
-
\??\c:\9nbnht.exec:\9nbnht.exe205⤵PID:3112
-
\??\c:\nbnnth.exec:\nbnnth.exe206⤵PID:3948
-
\??\c:\jjvpd.exec:\jjvpd.exe207⤵PID:3964
-
\??\c:\pppjj.exec:\pppjj.exe208⤵PID:4644
-
\??\c:\rxxlfff.exec:\rxxlfff.exe209⤵PID:4976
-
\??\c:\7bnnhh.exec:\7bnnhh.exe210⤵PID:2364
-
\??\c:\httnnn.exec:\httnnn.exe211⤵PID:3880
-
\??\c:\9vpjj.exec:\9vpjj.exe212⤵PID:2484
-
\??\c:\5dddv.exec:\5dddv.exe213⤵PID:4268
-
\??\c:\9flfxxl.exec:\9flfxxl.exe214⤵PID:3068
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe215⤵PID:5032
-
\??\c:\nhhhtt.exec:\nhhhtt.exe216⤵PID:2892
-
\??\c:\vjjpp.exec:\vjjpp.exe217⤵PID:4240
-
\??\c:\jjddd.exec:\jjddd.exe218⤵PID:4560
-
\??\c:\xxlffxr.exec:\xxlffxr.exe219⤵PID:2956
-
\??\c:\5bbbtb.exec:\5bbbtb.exe220⤵PID:4316
-
\??\c:\nntnhh.exec:\nntnhh.exe221⤵PID:3492
-
\??\c:\pjvvv.exec:\pjvvv.exe222⤵PID:4036
-
\??\c:\xxffxfl.exec:\xxffxfl.exe223⤵PID:3904
-
\??\c:\xfrrrxl.exec:\xfrrrxl.exe224⤵PID:4348
-
\??\c:\bthhbh.exec:\bthhbh.exe225⤵PID:3164
-
\??\c:\pjjpv.exec:\pjjpv.exe226⤵PID:772
-
\??\c:\3jjdv.exec:\3jjdv.exe227⤵PID:3036
-
\??\c:\1rfxxxr.exec:\1rfxxxr.exe228⤵PID:1632
-
\??\c:\1nbhth.exec:\1nbhth.exe229⤵PID:1604
-
\??\c:\nbnbht.exec:\nbnbht.exe230⤵PID:1620
-
\??\c:\jvvvv.exec:\jvvvv.exe231⤵PID:5092
-
\??\c:\dvddv.exec:\dvddv.exe232⤵PID:864
-
\??\c:\xrfxllx.exec:\xrfxllx.exe233⤵PID:4168
-
\??\c:\1tnbtn.exec:\1tnbtn.exe234⤵PID:3212
-
\??\c:\pdpdj.exec:\pdpdj.exe235⤵PID:2192
-
\??\c:\7jjjj.exec:\7jjjj.exe236⤵PID:1976
-
\??\c:\xlfxxxx.exec:\xlfxxxx.exe237⤵PID:2764
-
\??\c:\5xxfffl.exec:\5xxfffl.exe238⤵PID:720
-
\??\c:\nhnnht.exec:\nhnnht.exe239⤵PID:4368
-
\??\c:\vdddd.exec:\vdddd.exe240⤵PID:4396
-
\??\c:\7rlfffx.exec:\7rlfffx.exe241⤵PID:4992
-
\??\c:\tnhnhh.exec:\tnhnhh.exe242⤵PID:1360