Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 20:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe
-
Size
70KB
-
MD5
4c2713169fd9688aed5c1c9e80b6ecd2
-
SHA1
a36f1cee992c67f51b1d876fe0af7d763cd4b0df
-
SHA256
216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515
-
SHA512
efdaadb0564e2dc5ac6e4a62cf46de8b6b4b995df410ccbb38bc72fd5cd2c2c963bbde3d2a851ad9bd48c664515ab57f5b4d5194495455b119eb2405e3cb1c72
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgyYrc:ymb3NkkiQ3mdBjFo73thY4
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/3528-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1896-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/984-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1828-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1572-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3040-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2012-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3960-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2976-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1924-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2440-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1712-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2616-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2228-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4812-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 28 IoCs
Processes:
resource yara_rule behavioral2/memory/3528-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4000-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/932-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2152-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1896-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/984-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4344-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1828-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1572-60-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3040-68-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3040-67-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2848-74-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3040-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4504-85-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4968-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2012-97-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3960-103-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5012-109-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2976-114-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1924-120-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2440-128-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1712-134-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3652-138-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2616-144-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2228-156-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1780-183-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4812-186-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1552-204-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
jdjvp.exeflrrlrr.exenttttn.exevjdjd.exedvdjv.exettbntt.exenbtnhb.exeddpjj.exelffxrrl.exenhhbbb.exepjjdd.exentnhbb.exepjjjd.exeffrffrl.exenttnhb.exeddvpj.exerlrrlll.exexfrrrxx.exetbbtnn.exejvddp.exedppdv.exerlxxlxr.exehnnnhh.exejdvvp.exefrxllll.exefrrrrff.exentbbhn.exejjdpp.exexfxffxr.exe9ttnhh.exebhhbbh.exe7vvpd.exejvjdv.exennttbb.exejdvpj.exevpddd.exefffxxxf.exehhhbtt.exe9vjjp.exevvdvv.exexfrlxll.exe7pjjd.exerxxrffx.exe1nntth.exe3jvpp.exevpdvd.exefxffllr.exellxxxxf.exepjvvd.exejvpjv.exepvvvd.exepjjjv.exeflrlfxx.exe5rllrrx.exetnnhhh.exe3bhhbh.exedddvp.exelxrxfrf.exefxfflfr.exejdvpj.exeffrxxfl.exebhhbhn.exehhhbhn.exevjvpj.exepid process 4000 jdjvp.exe 932 flrrlrr.exe 2152 nttttn.exe 1896 vjdjd.exe 984 dvdjv.exe 4344 ttbntt.exe 1828 nbtnhb.exe 1572 ddpjj.exe 3040 lffxrrl.exe 2848 nhhbbb.exe 4504 pjjdd.exe 4968 ntnhbb.exe 2012 pjjjd.exe 3960 ffrffrl.exe 5012 nttnhb.exe 2976 ddvpj.exe 1924 rlrrlll.exe 2440 xfrrrxx.exe 1712 tbbtnn.exe 3652 jvddp.exe 2616 dppdv.exe 4564 rlxxlxr.exe 2228 hnnnhh.exe 2968 jdvvp.exe 2044 frxllll.exe 3092 frrrrff.exe 1780 ntbbhn.exe 4812 jjdpp.exe 2496 xfxffxr.exe 1268 9ttnhh.exe 1552 bhhbbh.exe 4380 7vvpd.exe 4884 jvjdv.exe 4880 nnttbb.exe 4224 jdvpj.exe 4872 vpddd.exe 1396 fffxxxf.exe 3844 hhhbtt.exe 4460 9vjjp.exe 2884 vvdvv.exe 5092 xfrlxll.exe 4652 7pjjd.exe 2832 rxxrffx.exe 2836 1nntth.exe 1048 3jvpp.exe 1216 vpdvd.exe 4296 fxffllr.exe 2308 llxxxxf.exe 4356 pjvvd.exe 2072 jvpjv.exe 2152 pvvvd.exe 3632 pjjjv.exe 4820 flrlfxx.exe 5100 5rllrrx.exe 3436 tnnhhh.exe 5096 3bhhbh.exe 2504 dddvp.exe 2560 lxrxfrf.exe 2612 fxfflfr.exe 3952 jdvpj.exe 3008 ffrxxfl.exe 3132 bhhbhn.exe 2432 hhhbhn.exe 4180 vjvpj.exe -
Processes:
resource yara_rule behavioral2/memory/3528-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1896-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/984-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1828-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1572-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3040-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3040-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3040-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2012-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3960-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2976-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1924-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1712-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2616-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2228-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1552-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exejdjvp.exeflrrlrr.exenttttn.exevjdjd.exedvdjv.exettbntt.exenbtnhb.exeddpjj.exelffxrrl.exenhhbbb.exepjjdd.exentnhbb.exepjjjd.exeffrffrl.exenttnhb.exeddvpj.exerlrrlll.exexfrrrxx.exetbbtnn.exejvddp.exedppdv.exedescription pid process target process PID 3528 wrote to memory of 4000 3528 216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe jdjvp.exe PID 3528 wrote to memory of 4000 3528 216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe jdjvp.exe PID 3528 wrote to memory of 4000 3528 216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe jdjvp.exe PID 4000 wrote to memory of 932 4000 jdjvp.exe flrrlrr.exe PID 4000 wrote to memory of 932 4000 jdjvp.exe flrrlrr.exe PID 4000 wrote to memory of 932 4000 jdjvp.exe flrrlrr.exe PID 932 wrote to memory of 2152 932 flrrlrr.exe nttttn.exe PID 932 wrote to memory of 2152 932 flrrlrr.exe nttttn.exe PID 932 wrote to memory of 2152 932 flrrlrr.exe nttttn.exe PID 2152 wrote to memory of 1896 2152 nttttn.exe vjdjd.exe PID 2152 wrote to memory of 1896 2152 nttttn.exe vjdjd.exe PID 2152 wrote to memory of 1896 2152 nttttn.exe vjdjd.exe PID 1896 wrote to memory of 984 1896 vjdjd.exe dvdjv.exe PID 1896 wrote to memory of 984 1896 vjdjd.exe dvdjv.exe PID 1896 wrote to memory of 984 1896 vjdjd.exe dvdjv.exe PID 984 wrote to memory of 4344 984 dvdjv.exe ttbntt.exe PID 984 wrote to memory of 4344 984 dvdjv.exe ttbntt.exe PID 984 wrote to memory of 4344 984 dvdjv.exe ttbntt.exe PID 4344 wrote to memory of 1828 4344 ttbntt.exe nbtnhb.exe PID 4344 wrote to memory of 1828 4344 ttbntt.exe nbtnhb.exe PID 4344 wrote to memory of 1828 4344 ttbntt.exe nbtnhb.exe PID 1828 wrote to memory of 1572 1828 nbtnhb.exe ddpjj.exe PID 1828 wrote to memory of 1572 1828 nbtnhb.exe ddpjj.exe PID 1828 wrote to memory of 1572 1828 nbtnhb.exe ddpjj.exe PID 1572 wrote to memory of 3040 1572 ddpjj.exe lffxrrl.exe PID 1572 wrote to memory of 3040 1572 ddpjj.exe lffxrrl.exe PID 1572 wrote to memory of 3040 1572 ddpjj.exe lffxrrl.exe PID 3040 wrote to memory of 2848 3040 lffxrrl.exe nhhbbb.exe PID 3040 wrote to memory of 2848 3040 lffxrrl.exe nhhbbb.exe PID 3040 wrote to memory of 2848 3040 lffxrrl.exe nhhbbb.exe PID 2848 wrote to memory of 4504 2848 nhhbbb.exe pjjdd.exe PID 2848 wrote to memory of 4504 2848 nhhbbb.exe pjjdd.exe PID 2848 wrote to memory of 4504 2848 nhhbbb.exe pjjdd.exe PID 4504 wrote to memory of 4968 4504 pjjdd.exe ntnhbb.exe PID 4504 wrote to memory of 4968 4504 pjjdd.exe ntnhbb.exe PID 4504 wrote to memory of 4968 4504 pjjdd.exe ntnhbb.exe PID 4968 wrote to memory of 2012 4968 ntnhbb.exe pjjjd.exe PID 4968 wrote to memory of 2012 4968 ntnhbb.exe pjjjd.exe PID 4968 wrote to memory of 2012 4968 ntnhbb.exe pjjjd.exe PID 2012 wrote to memory of 3960 2012 pjjjd.exe ffrffrl.exe PID 2012 wrote to memory of 3960 2012 pjjjd.exe ffrffrl.exe PID 2012 wrote to memory of 3960 2012 pjjjd.exe ffrffrl.exe PID 3960 wrote to memory of 5012 3960 ffrffrl.exe nttnhb.exe PID 3960 wrote to memory of 5012 3960 ffrffrl.exe nttnhb.exe PID 3960 wrote to memory of 5012 3960 ffrffrl.exe nttnhb.exe PID 5012 wrote to memory of 2976 5012 nttnhb.exe ddvpj.exe PID 5012 wrote to memory of 2976 5012 nttnhb.exe ddvpj.exe PID 5012 wrote to memory of 2976 5012 nttnhb.exe ddvpj.exe PID 2976 wrote to memory of 1924 2976 ddvpj.exe rlrrlll.exe PID 2976 wrote to memory of 1924 2976 ddvpj.exe rlrrlll.exe PID 2976 wrote to memory of 1924 2976 ddvpj.exe rlrrlll.exe PID 1924 wrote to memory of 2440 1924 rlrrlll.exe xfrrrxx.exe PID 1924 wrote to memory of 2440 1924 rlrrlll.exe xfrrrxx.exe PID 1924 wrote to memory of 2440 1924 rlrrlll.exe xfrrrxx.exe PID 2440 wrote to memory of 1712 2440 xfrrrxx.exe tbbtnn.exe PID 2440 wrote to memory of 1712 2440 xfrrrxx.exe tbbtnn.exe PID 2440 wrote to memory of 1712 2440 xfrrrxx.exe tbbtnn.exe PID 1712 wrote to memory of 3652 1712 tbbtnn.exe jvddp.exe PID 1712 wrote to memory of 3652 1712 tbbtnn.exe jvddp.exe PID 1712 wrote to memory of 3652 1712 tbbtnn.exe jvddp.exe PID 3652 wrote to memory of 2616 3652 jvddp.exe dppdv.exe PID 3652 wrote to memory of 2616 3652 jvddp.exe dppdv.exe PID 3652 wrote to memory of 2616 3652 jvddp.exe dppdv.exe PID 2616 wrote to memory of 4564 2616 dppdv.exe rlxxlxr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe"C:\Users\Admin\AppData\Local\Temp\216afb510e3aad4e9b8b5935534ad628195549cd8a9777d9a888bdc20fa82515.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\jdjvp.exec:\jdjvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\flrrlrr.exec:\flrrlrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\nttttn.exec:\nttttn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\vjdjd.exec:\vjdjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\dvdjv.exec:\dvdjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
\??\c:\ttbntt.exec:\ttbntt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
\??\c:\nbtnhb.exec:\nbtnhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
\??\c:\ddpjj.exec:\ddpjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\lffxrrl.exec:\lffxrrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\nhhbbb.exec:\nhhbbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\pjjdd.exec:\pjjdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\ntnhbb.exec:\ntnhbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\pjjjd.exec:\pjjjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\ffrffrl.exec:\ffrffrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\nttnhb.exec:\nttnhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\ddvpj.exec:\ddvpj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\rlrrlll.exec:\rlrrlll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\xfrrrxx.exec:\xfrrrxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\tbbtnn.exec:\tbbtnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\jvddp.exec:\jvddp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\dppdv.exec:\dppdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\rlxxlxr.exec:\rlxxlxr.exe23⤵
- Executes dropped EXE
PID:4564 -
\??\c:\hnnnhh.exec:\hnnnhh.exe24⤵
- Executes dropped EXE
PID:2228 -
\??\c:\jdvvp.exec:\jdvvp.exe25⤵
- Executes dropped EXE
PID:2968 -
\??\c:\frxllll.exec:\frxllll.exe26⤵
- Executes dropped EXE
PID:2044 -
\??\c:\frrrrff.exec:\frrrrff.exe27⤵
- Executes dropped EXE
PID:3092 -
\??\c:\ntbbhn.exec:\ntbbhn.exe28⤵
- Executes dropped EXE
PID:1780 -
\??\c:\jjdpp.exec:\jjdpp.exe29⤵
- Executes dropped EXE
PID:4812 -
\??\c:\xfxffxr.exec:\xfxffxr.exe30⤵
- Executes dropped EXE
PID:2496 -
\??\c:\9ttnhh.exec:\9ttnhh.exe31⤵
- Executes dropped EXE
PID:1268 -
\??\c:\bhhbbh.exec:\bhhbbh.exe32⤵
- Executes dropped EXE
PID:1552 -
\??\c:\7vvpd.exec:\7vvpd.exe33⤵
- Executes dropped EXE
PID:4380 -
\??\c:\jvjdv.exec:\jvjdv.exe34⤵
- Executes dropped EXE
PID:4884 -
\??\c:\nnttbb.exec:\nnttbb.exe35⤵
- Executes dropped EXE
PID:4880 -
\??\c:\jdvpj.exec:\jdvpj.exe36⤵
- Executes dropped EXE
PID:4224 -
\??\c:\vpddd.exec:\vpddd.exe37⤵
- Executes dropped EXE
PID:4872 -
\??\c:\fffxxxf.exec:\fffxxxf.exe38⤵
- Executes dropped EXE
PID:1396 -
\??\c:\hhhbtt.exec:\hhhbtt.exe39⤵
- Executes dropped EXE
PID:3844 -
\??\c:\9vjjp.exec:\9vjjp.exe40⤵
- Executes dropped EXE
PID:4460 -
\??\c:\vvdvv.exec:\vvdvv.exe41⤵
- Executes dropped EXE
PID:2884 -
\??\c:\xfrlxll.exec:\xfrlxll.exe42⤵
- Executes dropped EXE
PID:5092 -
\??\c:\7pjjd.exec:\7pjjd.exe43⤵
- Executes dropped EXE
PID:4652 -
\??\c:\rxxrffx.exec:\rxxrffx.exe44⤵
- Executes dropped EXE
PID:2832 -
\??\c:\1nntth.exec:\1nntth.exe45⤵
- Executes dropped EXE
PID:2836 -
\??\c:\3jvpp.exec:\3jvpp.exe46⤵
- Executes dropped EXE
PID:1048 -
\??\c:\vpdvd.exec:\vpdvd.exe47⤵
- Executes dropped EXE
PID:1216 -
\??\c:\fxffllr.exec:\fxffllr.exe48⤵
- Executes dropped EXE
PID:4296 -
\??\c:\llxxxxf.exec:\llxxxxf.exe49⤵
- Executes dropped EXE
PID:2308 -
\??\c:\pjvvd.exec:\pjvvd.exe50⤵
- Executes dropped EXE
PID:4356 -
\??\c:\jvpjv.exec:\jvpjv.exe51⤵
- Executes dropped EXE
PID:2072 -
\??\c:\pvvvd.exec:\pvvvd.exe52⤵
- Executes dropped EXE
PID:2152 -
\??\c:\pjjjv.exec:\pjjjv.exe53⤵
- Executes dropped EXE
PID:3632 -
\??\c:\flrlfxx.exec:\flrlfxx.exe54⤵
- Executes dropped EXE
PID:4820 -
\??\c:\5rllrrx.exec:\5rllrrx.exe55⤵
- Executes dropped EXE
PID:5100 -
\??\c:\tnnhhh.exec:\tnnhhh.exe56⤵
- Executes dropped EXE
PID:3436 -
\??\c:\3bhhbh.exec:\3bhhbh.exe57⤵
- Executes dropped EXE
PID:5096 -
\??\c:\dddvp.exec:\dddvp.exe58⤵
- Executes dropped EXE
PID:2504 -
\??\c:\lxrxfrf.exec:\lxrxfrf.exe59⤵
- Executes dropped EXE
PID:2560 -
\??\c:\fxfflfr.exec:\fxfflfr.exe60⤵
- Executes dropped EXE
PID:2612 -
\??\c:\jdvpj.exec:\jdvpj.exe61⤵
- Executes dropped EXE
PID:3952 -
\??\c:\ffrxxfl.exec:\ffrxxfl.exe62⤵
- Executes dropped EXE
PID:3008 -
\??\c:\bhhbhn.exec:\bhhbhn.exe63⤵
- Executes dropped EXE
PID:3132 -
\??\c:\hhhbhn.exec:\hhhbhn.exe64⤵
- Executes dropped EXE
PID:2432 -
\??\c:\vjvpj.exec:\vjvpj.exe65⤵
- Executes dropped EXE
PID:4180 -
\??\c:\jdvpd.exec:\jdvpd.exe66⤵PID:5004
-
\??\c:\frxfrxr.exec:\frxfrxr.exe67⤵PID:3440
-
\??\c:\nthtnh.exec:\nthtnh.exe68⤵PID:3752
-
\??\c:\tntnbb.exec:\tntnbb.exe69⤵PID:2444
-
\??\c:\jdvvp.exec:\jdvvp.exe70⤵PID:3456
-
\??\c:\ffrlxxr.exec:\ffrlxxr.exe71⤵PID:3852
-
\??\c:\1fxxxxx.exec:\1fxxxxx.exe72⤵PID:2808
-
\??\c:\hbttnn.exec:\hbttnn.exe73⤵PID:4956
-
\??\c:\9nnnnn.exec:\9nnnnn.exe74⤵PID:1696
-
\??\c:\9dppd.exec:\9dppd.exe75⤵PID:400
-
\??\c:\djjjd.exec:\djjjd.exe76⤵PID:5068
-
\??\c:\rlxfrrr.exec:\rlxfrrr.exe77⤵PID:4196
-
\??\c:\thnnhh.exec:\thnnhh.exe78⤵PID:2364
-
\??\c:\btnhhh.exec:\btnhhh.exe79⤵PID:4464
-
\??\c:\hntbtt.exec:\hntbtt.exe80⤵PID:2816
-
\??\c:\fxxrlll.exec:\fxxrlll.exe81⤵PID:2968
-
\??\c:\rxrlfff.exec:\rxrlfff.exe82⤵PID:4212
-
\??\c:\3lxrllf.exec:\3lxrllf.exe83⤵PID:3092
-
\??\c:\nbtnhb.exec:\nbtnhb.exe84⤵PID:1780
-
\??\c:\tbbttn.exec:\tbbttn.exe85⤵PID:1692
-
\??\c:\5dpdd.exec:\5dpdd.exe86⤵PID:2496
-
\??\c:\djjjv.exec:\djjjv.exe87⤵PID:1668
-
\??\c:\lllflll.exec:\lllflll.exe88⤵PID:2800
-
\??\c:\llxrllf.exec:\llxrllf.exe89⤵PID:3048
-
\??\c:\nbttnh.exec:\nbttnh.exe90⤵PID:3380
-
\??\c:\5nnhht.exec:\5nnhht.exe91⤵PID:4224
-
\??\c:\hbthbb.exec:\hbthbb.exe92⤵PID:2408
-
\??\c:\vvdvj.exec:\vvdvj.exe93⤵PID:2668
-
\??\c:\pjdvp.exec:\pjdvp.exe94⤵PID:900
-
\??\c:\1xffxxr.exec:\1xffxxr.exe95⤵PID:1580
-
\??\c:\rxxrllf.exec:\rxxrllf.exe96⤵PID:2856
-
\??\c:\ntttnt.exec:\ntttnt.exe97⤵PID:2832
-
\??\c:\1thbnn.exec:\1thbnn.exe98⤵PID:3308
-
\??\c:\vvvpd.exec:\vvvpd.exe99⤵PID:4280
-
\??\c:\vjvpp.exec:\vjvpp.exe100⤵PID:3528
-
\??\c:\rffxllf.exec:\rffxllf.exe101⤵PID:2308
-
\??\c:\nbhbbb.exec:\nbhbbb.exe102⤵PID:4672
-
\??\c:\rflflfl.exec:\rflflfl.exe103⤵PID:3624
-
\??\c:\htbbtt.exec:\htbbtt.exe104⤵PID:3052
-
\??\c:\3tbnnt.exec:\3tbnnt.exe105⤵PID:2756
-
\??\c:\pvddj.exec:\pvddj.exe106⤵PID:4376
-
\??\c:\rfllfrx.exec:\rfllfrx.exe107⤵PID:5100
-
\??\c:\tnnhhh.exec:\tnnhhh.exe108⤵PID:1916
-
\??\c:\vpvpp.exec:\vpvpp.exe109⤵PID:3608
-
\??\c:\xrlrrlr.exec:\xrlrrlr.exe110⤵PID:880
-
\??\c:\btttnn.exec:\btttnn.exe111⤵PID:1448
-
\??\c:\ntttbb.exec:\ntttbb.exe112⤵PID:448
-
\??\c:\jjdvp.exec:\jjdvp.exe113⤵PID:1100
-
\??\c:\lfxrflf.exec:\lfxrflf.exe114⤵PID:2936
-
\??\c:\3lrrrrl.exec:\3lrrrrl.exe115⤵PID:4080
-
\??\c:\tnbbbn.exec:\tnbbbn.exe116⤵PID:4520
-
\??\c:\dvjvp.exec:\dvjvp.exe117⤵PID:4968
-
\??\c:\dvdvv.exec:\dvdvv.exe118⤵PID:2012
-
\??\c:\fxrlxll.exec:\fxrlxll.exe119⤵PID:1800
-
\??\c:\rlxflrl.exec:\rlxflrl.exe120⤵PID:1428
-
\??\c:\ttttbb.exec:\ttttbb.exe121⤵PID:5084
-
\??\c:\vpjjd.exec:\vpjjd.exe122⤵PID:2976
-
\??\c:\vdjdv.exec:\vdjdv.exe123⤵PID:1468
-
\??\c:\rlrlxxr.exec:\rlrlxxr.exe124⤵PID:2440
-
\??\c:\lrrlffx.exec:\lrrlffx.exe125⤵PID:2220
-
\??\c:\1bhbbb.exec:\1bhbbb.exe126⤵PID:1696
-
\??\c:\pjjjv.exec:\pjjjv.exe127⤵PID:2512
-
\??\c:\ppvjd.exec:\ppvjd.exe128⤵PID:4448
-
\??\c:\rrlrrrl.exec:\rrlrrrl.exe129⤵PID:2908
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe130⤵PID:732
-
\??\c:\tbbnnn.exec:\tbbnnn.exe131⤵PID:4064
-
\??\c:\jvddj.exec:\jvddj.exe132⤵PID:2544
-
\??\c:\pdddv.exec:\pdddv.exe133⤵PID:404
-
\??\c:\fxxfrrx.exec:\fxxfrrx.exe134⤵PID:3824
-
\??\c:\lfxrrrl.exec:\lfxrrrl.exe135⤵PID:3092
-
\??\c:\bnnnth.exec:\bnnnth.exe136⤵PID:1780
-
\??\c:\ttbbtt.exec:\ttbbtt.exe137⤵PID:2516
-
\??\c:\pddvp.exec:\pddvp.exe138⤵PID:708
-
\??\c:\ppddp.exec:\ppddp.exe139⤵PID:3604
-
\??\c:\5fffxff.exec:\5fffxff.exe140⤵PID:3164
-
\??\c:\nhhbbb.exec:\nhhbbb.exe141⤵PID:1980
-
\??\c:\tnhttt.exec:\tnhttt.exe142⤵PID:2784
-
\??\c:\vpppj.exec:\vpppj.exe143⤵PID:4872
-
\??\c:\1vjdj.exec:\1vjdj.exe144⤵PID:1212
-
\??\c:\xfxxrrr.exec:\xfxxrrr.exe145⤵PID:3516
-
\??\c:\lffxrrl.exec:\lffxrrl.exe146⤵PID:3920
-
\??\c:\ntntnt.exec:\ntntnt.exe147⤵PID:4444
-
\??\c:\pdppj.exec:\pdppj.exe148⤵PID:4440
-
\??\c:\pjvpp.exec:\pjvpp.exe149⤵PID:3680
-
\??\c:\rfffrxr.exec:\rfffrxr.exe150⤵PID:1240
-
\??\c:\rlllxxr.exec:\rlllxxr.exe151⤵PID:4296
-
\??\c:\vjpvp.exec:\vjpvp.exe152⤵PID:2148
-
\??\c:\7ddvj.exec:\7ddvj.exe153⤵PID:2684
-
\??\c:\rllxrrf.exec:\rllxrrf.exe154⤵PID:1288
-
\??\c:\9rrrrrr.exec:\9rrrrrr.exe155⤵PID:1716
-
\??\c:\tttnnn.exec:\tttnnn.exe156⤵PID:2152
-
\??\c:\vpjjv.exec:\vpjjv.exe157⤵PID:4568
-
\??\c:\jvvpd.exec:\jvvpd.exe158⤵PID:4664
-
\??\c:\rlfxrrr.exec:\rlfxrrr.exe159⤵PID:2208
-
\??\c:\btnnbt.exec:\btnnbt.exe160⤵PID:4384
-
\??\c:\thhbth.exec:\thhbth.exe161⤵PID:1524
-
\??\c:\pjjdd.exec:\pjjdd.exe162⤵PID:4680
-
\??\c:\jdvpv.exec:\jdvpv.exe163⤵PID:3000
-
\??\c:\xfxrxxx.exec:\xfxrxxx.exe164⤵PID:448
-
\??\c:\ttnnbb.exec:\ttnnbb.exe165⤵PID:4076
-
\??\c:\bbnhnn.exec:\bbnhnn.exe166⤵PID:3132
-
\??\c:\pjjjv.exec:\pjjjv.exe167⤵PID:2844
-
\??\c:\7jdvv.exec:\7jdvv.exe168⤵PID:5064
-
\??\c:\rrfrxxl.exec:\rrfrxxl.exe169⤵PID:2744
-
\??\c:\nbhhnt.exec:\nbhhnt.exe170⤵PID:1836
-
\??\c:\thbhnb.exec:\thbhnb.exe171⤵PID:4588
-
\??\c:\jppjd.exec:\jppjd.exe172⤵PID:3176
-
\??\c:\xrxlfxr.exec:\xrxlfxr.exe173⤵PID:1924
-
\??\c:\xrxrrrl.exec:\xrxrrrl.exe174⤵PID:3656
-
\??\c:\thhnnn.exec:\thhnnn.exe175⤵PID:1468
-
\??\c:\tbnbtt.exec:\tbnbtt.exe176⤵PID:320
-
\??\c:\dppjd.exec:\dppjd.exe177⤵PID:4472
-
\??\c:\5flfxxf.exec:\5flfxxf.exe178⤵PID:3396
-
\??\c:\xrrllll.exec:\xrrllll.exe179⤵PID:2616
-
\??\c:\nbhbtt.exec:\nbhbtt.exe180⤵PID:548
-
\??\c:\vpvdv.exec:\vpvdv.exe181⤵PID:4188
-
\??\c:\dppjv.exec:\dppjv.exe182⤵PID:4992
-
\??\c:\7rflfxx.exec:\7rflfxx.exe183⤵PID:2044
-
\??\c:\hbnnth.exec:\hbnnth.exe184⤵PID:4916
-
\??\c:\5tbtnh.exec:\5tbtnh.exe185⤵PID:3140
-
\??\c:\jpppj.exec:\jpppj.exe186⤵PID:3984
-
\??\c:\pddvv.exec:\pddvv.exe187⤵PID:2376
-
\??\c:\lfrlfxx.exec:\lfrlfxx.exe188⤵PID:4480
-
\??\c:\btbtnn.exec:\btbtnn.exe189⤵PID:4084
-
\??\c:\btbbhh.exec:\btbbhh.exe190⤵PID:5048
-
\??\c:\7pvvv.exec:\7pvvv.exe191⤵PID:3412
-
\??\c:\xxlllll.exec:\xxlllll.exe192⤵PID:696
-
\??\c:\rlxxxxr.exec:\rlxxxxr.exe193⤵PID:5036
-
\??\c:\tbhhhb.exec:\tbhhhb.exe194⤵PID:1604
-
\??\c:\5nbtnn.exec:\5nbtnn.exe195⤵PID:1764
-
\??\c:\rlrrxxx.exec:\rlrrxxx.exe196⤵PID:4528
-
\??\c:\flrrfxr.exec:\flrrfxr.exe197⤵PID:3920
-
\??\c:\htnbhh.exec:\htnbhh.exe198⤵PID:4444
-
\??\c:\vvpjp.exec:\vvpjp.exe199⤵PID:2832
-
\??\c:\pvjdv.exec:\pvjdv.exe200⤵PID:4908
-
\??\c:\lffrfrr.exec:\lffrfrr.exe201⤵PID:1240
-
\??\c:\5nnnnn.exec:\5nnnnn.exe202⤵PID:4296
-
\??\c:\bbbtnn.exec:\bbbtnn.exe203⤵PID:3712
-
\??\c:\pjjdp.exec:\pjjdp.exe204⤵PID:4416
-
\??\c:\3fllfff.exec:\3fllfff.exe205⤵PID:4824
-
\??\c:\3frlxxx.exec:\3frlxxx.exe206⤵PID:1716
-
\??\c:\5ntnhh.exec:\5ntnhh.exe207⤵PID:1900
-
\??\c:\jppjd.exec:\jppjd.exe208⤵PID:3436
-
\??\c:\9pvpj.exec:\9pvpj.exe209⤵PID:396
-
\??\c:\7fffrrr.exec:\7fffrrr.exe210⤵PID:4576
-
\??\c:\5nbbnn.exec:\5nbbnn.exe211⤵PID:4384
-
\??\c:\bhhbtt.exec:\bhhbtt.exe212⤵PID:1372
-
\??\c:\pjddd.exec:\pjddd.exe213⤵PID:4680
-
\??\c:\rfxrrlf.exec:\rfxrrlf.exe214⤵PID:4628
-
\??\c:\3ntnhh.exec:\3ntnhh.exe215⤵PID:448
-
\??\c:\7bhtnn.exec:\7bhtnn.exe216⤵PID:544
-
\??\c:\pppjd.exec:\pppjd.exe217⤵PID:756
-
\??\c:\5rrxxxr.exec:\5rrxxxr.exe218⤵PID:1808
-
\??\c:\xrrlxxl.exec:\xrrlxxl.exe219⤵PID:4968
-
\??\c:\bttnnn.exec:\bttnnn.exe220⤵PID:3828
-
\??\c:\tbtbtb.exec:\tbtbtb.exe221⤵PID:792
-
\??\c:\vppjd.exec:\vppjd.exe222⤵PID:2852
-
\??\c:\9lrlfxr.exec:\9lrlfxr.exe223⤵PID:3476
-
\??\c:\7flllll.exec:\7flllll.exe224⤵PID:1924
-
\??\c:\1nhbhb.exec:\1nhbhb.exe225⤵PID:3656
-
\??\c:\jvddp.exec:\jvddp.exe226⤵PID:3424
-
\??\c:\jjppj.exec:\jjppj.exe227⤵PID:3652
-
\??\c:\3xflfrf.exec:\3xflfrf.exe228⤵PID:4472
-
\??\c:\lxrlrfl.exec:\lxrlrfl.exe229⤵PID:5112
-
\??\c:\bnnnhn.exec:\bnnnhn.exe230⤵PID:1340
-
\??\c:\dddvp.exec:\dddvp.exe231⤵PID:1952
-
\??\c:\jdjjd.exec:\jdjjd.exe232⤵PID:2096
-
\??\c:\xlxxrrl.exec:\xlxxrrl.exe233⤵PID:1948
-
\??\c:\tnbbtt.exec:\tnbbtt.exe234⤵PID:3576
-
\??\c:\vvpdd.exec:\vvpdd.exe235⤵PID:4916
-
\??\c:\vjddd.exec:\vjddd.exe236⤵PID:3140
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe237⤵PID:1780
-
\??\c:\rfllffx.exec:\rfllffx.exe238⤵PID:1644
-
\??\c:\tnbtbn.exec:\tnbtbn.exe239⤵PID:2644
-
\??\c:\dvdvd.exec:\dvdvd.exe240⤵PID:3544
-
\??\c:\fxfrxlr.exec:\fxfrxlr.exe241⤵PID:3048
-
\??\c:\fxffxxx.exec:\fxffxxx.exe242⤵PID:4328