Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe
-
Size
306KB
-
MD5
ca154b3b3b8bfdd413af1b880a72b6b0
-
SHA1
c3b5ee5201dc7546093adf8f72002e64d039d64f
-
SHA256
1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e
-
SHA512
efe6da22648095463113cfed5a7c8bb00c64c92f0f902360bc1d2da1c5fc1faf68fe7e806bdac6515f8d06b39bdb3f5a7f9523bac08a01791f09a68a90480a83
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvwN4:n3C9uDVOXLmHBKWyn+Pgvu4
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/4520-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2260-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4192-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1996-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1252-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3180-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4516-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2636-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4740-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3856-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2956-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/832-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1220-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/760-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3528-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2344-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 24 IoCs
Processes:
resource yara_rule behavioral2/memory/4520-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2260-16-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4192-29-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1996-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2848-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4944-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/840-52-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1648-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1252-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3180-82-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4516-87-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2636-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4740-105-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3856-111-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2956-117-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/832-129-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1220-141-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4752-148-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1960-152-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/760-159-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3528-165-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3940-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2344-188-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1284-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
9dvpd.exelxxrlfx.exetnnhbn.exe9nnnnn.exepdjdd.exevpppj.exehbnhnn.exehbnhbt.exejvjdv.exe3llfffx.exerrxffxr.exenthbbb.exepvdpj.exehbnhhh.exehbtnnt.exefflfxxr.exevppdv.exe5vdvv.exe5bnhhh.exerrrllll.exe5htnhh.exevdjjj.exedpvpv.exepdjdd.exevpvpv.exe3bnttt.exe7xxxrrl.exenbhbbb.exe9vdvp.exelfrlrlr.exe3nhbtb.exejvdvv.exefxfffll.exe5ntbhn.exebnnhbt.exedpjvd.exelfrlrrl.exetnthhb.exe5ntnnn.exedjpjd.exelfrlfxr.exelxffflf.exe5nnnhh.exe3djjj.exexllxrrl.exehhtnhb.exehbnhhn.exedpdvv.exerflrxxx.exehbhbtb.exevjpjj.exexflfllr.exenhhnhn.exe9jvpp.exevppjj.exelllffxx.exebntnnn.exetnbtbb.exevddvv.exexrxlfrr.exe5xfxxxx.exehbtnnn.exeddjdp.exefxxrllf.exepid process 1996 9dvpd.exe 2260 lxxrlfx.exe 3504 tnnhbn.exe 4192 9nnnnn.exe 2848 pdjdd.exe 4944 vpppj.exe 840 hbnhnn.exe 4044 hbnhbt.exe 1648 jvjdv.exe 1252 3llfffx.exe 3180 rrxffxr.exe 4516 nthbbb.exe 4880 pvdpj.exe 2636 hbnhhh.exe 4740 hbtnnt.exe 3856 fflfxxr.exe 2956 vppdv.exe 1592 5vdvv.exe 832 5bnhhh.exe 1248 rrrllll.exe 1220 5htnhh.exe 4752 vdjjj.exe 1960 dpvpv.exe 760 pdjdd.exe 3528 vpvpv.exe 3940 3bnttt.exe 4552 7xxxrrl.exe 3952 nbhbbb.exe 2344 9vdvp.exe 4060 lfrlrlr.exe 1284 3nhbtb.exe 4548 jvdvv.exe 2136 fxfffll.exe 1852 5ntbhn.exe 4836 bnnhbt.exe 3472 dpjvd.exe 3092 lfrlrrl.exe 700 tnthhb.exe 4960 5ntnnn.exe 1704 djpjd.exe 980 lfrlfxr.exe 3624 lxffflf.exe 2872 5nnnhh.exe 3856 3djjj.exe 4580 xllxrrl.exe 4264 hhtnhb.exe 2956 hbnhhn.exe 3792 dpdvv.exe 892 rflrxxx.exe 2360 hbhbtb.exe 1220 vjpjj.exe 1400 xflfllr.exe 4996 nhhnhn.exe 3388 9jvpp.exe 5060 vppjj.exe 2172 lllffxx.exe 3444 bntnnn.exe 4736 tnbtbb.exe 2348 vddvv.exe 3952 xrxlfrr.exe 2344 5xfxxxx.exe 2180 hbtnnn.exe 2928 ddjdp.exe 4876 fxxrllf.exe -
Processes:
resource yara_rule behavioral2/memory/4520-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2260-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4192-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1996-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1252-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3180-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2636-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4740-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3856-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2956-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/832-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1220-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/760-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3528-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2344-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe9dvpd.exelxxrlfx.exetnnhbn.exe9nnnnn.exepdjdd.exevpppj.exehbnhnn.exehbnhbt.exejvjdv.exe3llfffx.exerrxffxr.exenthbbb.exepvdpj.exehbnhhh.exehbtnnt.exefflfxxr.exevppdv.exe5vdvv.exe5bnhhh.exerrrllll.exe5htnhh.exedescription pid process target process PID 4520 wrote to memory of 1996 4520 1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe 9dvpd.exe PID 4520 wrote to memory of 1996 4520 1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe 9dvpd.exe PID 4520 wrote to memory of 1996 4520 1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe 9dvpd.exe PID 1996 wrote to memory of 2260 1996 9dvpd.exe lxxrlfx.exe PID 1996 wrote to memory of 2260 1996 9dvpd.exe lxxrlfx.exe PID 1996 wrote to memory of 2260 1996 9dvpd.exe lxxrlfx.exe PID 2260 wrote to memory of 3504 2260 lxxrlfx.exe tnnhbn.exe PID 2260 wrote to memory of 3504 2260 lxxrlfx.exe tnnhbn.exe PID 2260 wrote to memory of 3504 2260 lxxrlfx.exe tnnhbn.exe PID 3504 wrote to memory of 4192 3504 tnnhbn.exe 9nnnnn.exe PID 3504 wrote to memory of 4192 3504 tnnhbn.exe 9nnnnn.exe PID 3504 wrote to memory of 4192 3504 tnnhbn.exe 9nnnnn.exe PID 4192 wrote to memory of 2848 4192 9nnnnn.exe pdjdd.exe PID 4192 wrote to memory of 2848 4192 9nnnnn.exe pdjdd.exe PID 4192 wrote to memory of 2848 4192 9nnnnn.exe pdjdd.exe PID 2848 wrote to memory of 4944 2848 pdjdd.exe vpppj.exe PID 2848 wrote to memory of 4944 2848 pdjdd.exe vpppj.exe PID 2848 wrote to memory of 4944 2848 pdjdd.exe vpppj.exe PID 4944 wrote to memory of 840 4944 vpppj.exe hbnhnn.exe PID 4944 wrote to memory of 840 4944 vpppj.exe hbnhnn.exe PID 4944 wrote to memory of 840 4944 vpppj.exe hbnhnn.exe PID 840 wrote to memory of 4044 840 hbnhnn.exe hbnhbt.exe PID 840 wrote to memory of 4044 840 hbnhnn.exe hbnhbt.exe PID 840 wrote to memory of 4044 840 hbnhnn.exe hbnhbt.exe PID 4044 wrote to memory of 1648 4044 hbnhbt.exe jvjdv.exe PID 4044 wrote to memory of 1648 4044 hbnhbt.exe jvjdv.exe PID 4044 wrote to memory of 1648 4044 hbnhbt.exe jvjdv.exe PID 1648 wrote to memory of 1252 1648 jvjdv.exe 3llfffx.exe PID 1648 wrote to memory of 1252 1648 jvjdv.exe 3llfffx.exe PID 1648 wrote to memory of 1252 1648 jvjdv.exe 3llfffx.exe PID 1252 wrote to memory of 3180 1252 3llfffx.exe rrxffxr.exe PID 1252 wrote to memory of 3180 1252 3llfffx.exe rrxffxr.exe PID 1252 wrote to memory of 3180 1252 3llfffx.exe rrxffxr.exe PID 3180 wrote to memory of 4516 3180 rrxffxr.exe nthbbb.exe PID 3180 wrote to memory of 4516 3180 rrxffxr.exe nthbbb.exe PID 3180 wrote to memory of 4516 3180 rrxffxr.exe nthbbb.exe PID 4516 wrote to memory of 4880 4516 nthbbb.exe pvdpj.exe PID 4516 wrote to memory of 4880 4516 nthbbb.exe pvdpj.exe PID 4516 wrote to memory of 4880 4516 nthbbb.exe pvdpj.exe PID 4880 wrote to memory of 2636 4880 pvdpj.exe hbnhhh.exe PID 4880 wrote to memory of 2636 4880 pvdpj.exe hbnhhh.exe PID 4880 wrote to memory of 2636 4880 pvdpj.exe hbnhhh.exe PID 2636 wrote to memory of 4740 2636 hbnhhh.exe hbtnnt.exe PID 2636 wrote to memory of 4740 2636 hbnhhh.exe hbtnnt.exe PID 2636 wrote to memory of 4740 2636 hbnhhh.exe hbtnnt.exe PID 4740 wrote to memory of 3856 4740 hbtnnt.exe fflfxxr.exe PID 4740 wrote to memory of 3856 4740 hbtnnt.exe fflfxxr.exe PID 4740 wrote to memory of 3856 4740 hbtnnt.exe fflfxxr.exe PID 3856 wrote to memory of 2956 3856 fflfxxr.exe vppdv.exe PID 3856 wrote to memory of 2956 3856 fflfxxr.exe vppdv.exe PID 3856 wrote to memory of 2956 3856 fflfxxr.exe vppdv.exe PID 2956 wrote to memory of 1592 2956 vppdv.exe 5vdvv.exe PID 2956 wrote to memory of 1592 2956 vppdv.exe 5vdvv.exe PID 2956 wrote to memory of 1592 2956 vppdv.exe 5vdvv.exe PID 1592 wrote to memory of 832 1592 5vdvv.exe 5bnhhh.exe PID 1592 wrote to memory of 832 1592 5vdvv.exe 5bnhhh.exe PID 1592 wrote to memory of 832 1592 5vdvv.exe 5bnhhh.exe PID 832 wrote to memory of 1248 832 5bnhhh.exe rrrllll.exe PID 832 wrote to memory of 1248 832 5bnhhh.exe rrrllll.exe PID 832 wrote to memory of 1248 832 5bnhhh.exe rrrllll.exe PID 1248 wrote to memory of 1220 1248 rrrllll.exe 5htnhh.exe PID 1248 wrote to memory of 1220 1248 rrrllll.exe 5htnhh.exe PID 1248 wrote to memory of 1220 1248 rrrllll.exe 5htnhh.exe PID 1220 wrote to memory of 4752 1220 5htnhh.exe vdjjj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe"C:\Users\Admin\AppData\Local\Temp\1b7ea709cbe4a127f9757ff32486f4d1b4198d70e2f8e980f6c317fc0b4a5a8e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\9dvpd.exec:\9dvpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\tnnhbn.exec:\tnnhbn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
\??\c:\9nnnnn.exec:\9nnnnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\pdjdd.exec:\pdjdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\vpppj.exec:\vpppj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\hbnhnn.exec:\hbnhnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\hbnhbt.exec:\hbnhbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\jvjdv.exec:\jvjdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\3llfffx.exec:\3llfffx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\rrxffxr.exec:\rrxffxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
\??\c:\nthbbb.exec:\nthbbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\pvdpj.exec:\pvdpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
\??\c:\hbnhhh.exec:\hbnhhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\hbtnnt.exec:\hbtnnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
\??\c:\fflfxxr.exec:\fflfxxr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\vppdv.exec:\vppdv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\5vdvv.exec:\5vdvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\5bnhhh.exec:\5bnhhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
\??\c:\rrrllll.exec:\rrrllll.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\5htnhh.exec:\5htnhh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\vdjjj.exec:\vdjjj.exe23⤵
- Executes dropped EXE
PID:4752 -
\??\c:\dpvpv.exec:\dpvpv.exe24⤵
- Executes dropped EXE
PID:1960 -
\??\c:\pdjdd.exec:\pdjdd.exe25⤵
- Executes dropped EXE
PID:760 -
\??\c:\vpvpv.exec:\vpvpv.exe26⤵
- Executes dropped EXE
PID:3528 -
\??\c:\3bnttt.exec:\3bnttt.exe27⤵
- Executes dropped EXE
PID:3940 -
\??\c:\7xxxrrl.exec:\7xxxrrl.exe28⤵
- Executes dropped EXE
PID:4552 -
\??\c:\nbhbbb.exec:\nbhbbb.exe29⤵
- Executes dropped EXE
PID:3952 -
\??\c:\9vdvp.exec:\9vdvp.exe30⤵
- Executes dropped EXE
PID:2344 -
\??\c:\lfrlrlr.exec:\lfrlrlr.exe31⤵
- Executes dropped EXE
PID:4060 -
\??\c:\3nhbtb.exec:\3nhbtb.exe32⤵
- Executes dropped EXE
PID:1284 -
\??\c:\jvdvv.exec:\jvdvv.exe33⤵
- Executes dropped EXE
PID:4548 -
\??\c:\fxfffll.exec:\fxfffll.exe34⤵
- Executes dropped EXE
PID:2136 -
\??\c:\5ntbhn.exec:\5ntbhn.exe35⤵
- Executes dropped EXE
PID:1852 -
\??\c:\bnnhbt.exec:\bnnhbt.exe36⤵
- Executes dropped EXE
PID:4836 -
\??\c:\dpjvd.exec:\dpjvd.exe37⤵
- Executes dropped EXE
PID:3472 -
\??\c:\lfrlrrl.exec:\lfrlrrl.exe38⤵
- Executes dropped EXE
PID:3092 -
\??\c:\tnthhb.exec:\tnthhb.exe39⤵
- Executes dropped EXE
PID:700 -
\??\c:\5ntnnn.exec:\5ntnnn.exe40⤵
- Executes dropped EXE
PID:4960 -
\??\c:\djpjd.exec:\djpjd.exe41⤵
- Executes dropped EXE
PID:1704 -
\??\c:\lfrlfxr.exec:\lfrlfxr.exe42⤵
- Executes dropped EXE
PID:980 -
\??\c:\lxffflf.exec:\lxffflf.exe43⤵
- Executes dropped EXE
PID:3624 -
\??\c:\5nnnhh.exec:\5nnnhh.exe44⤵
- Executes dropped EXE
PID:2872 -
\??\c:\3djjj.exec:\3djjj.exe45⤵
- Executes dropped EXE
PID:3856 -
\??\c:\xllxrrl.exec:\xllxrrl.exe46⤵
- Executes dropped EXE
PID:4580 -
\??\c:\hhtnhb.exec:\hhtnhb.exe47⤵
- Executes dropped EXE
PID:4264 -
\??\c:\hbnhhn.exec:\hbnhhn.exe48⤵
- Executes dropped EXE
PID:2956 -
\??\c:\dpdvv.exec:\dpdvv.exe49⤵
- Executes dropped EXE
PID:3792 -
\??\c:\rflrxxx.exec:\rflrxxx.exe50⤵
- Executes dropped EXE
PID:892 -
\??\c:\hbhbtb.exec:\hbhbtb.exe51⤵
- Executes dropped EXE
PID:2360 -
\??\c:\vjpjj.exec:\vjpjj.exe52⤵
- Executes dropped EXE
PID:1220 -
\??\c:\xflfllr.exec:\xflfllr.exe53⤵
- Executes dropped EXE
PID:1400 -
\??\c:\nhhnhn.exec:\nhhnhn.exe54⤵
- Executes dropped EXE
PID:4996 -
\??\c:\9jvpp.exec:\9jvpp.exe55⤵
- Executes dropped EXE
PID:3388 -
\??\c:\vppjj.exec:\vppjj.exe56⤵
- Executes dropped EXE
PID:5060 -
\??\c:\lllffxx.exec:\lllffxx.exe57⤵
- Executes dropped EXE
PID:2172 -
\??\c:\bntnnn.exec:\bntnnn.exe58⤵
- Executes dropped EXE
PID:3444 -
\??\c:\tnbtbb.exec:\tnbtbb.exe59⤵
- Executes dropped EXE
PID:4736 -
\??\c:\vddvv.exec:\vddvv.exe60⤵
- Executes dropped EXE
PID:2348 -
\??\c:\xrxlfrr.exec:\xrxlfrr.exe61⤵
- Executes dropped EXE
PID:3952 -
\??\c:\5xfxxxx.exec:\5xfxxxx.exe62⤵
- Executes dropped EXE
PID:2344 -
\??\c:\hbtnnn.exec:\hbtnnn.exe63⤵
- Executes dropped EXE
PID:2180 -
\??\c:\ddjdp.exec:\ddjdp.exe64⤵
- Executes dropped EXE
PID:2928 -
\??\c:\fxxrllf.exec:\fxxrllf.exe65⤵
- Executes dropped EXE
PID:4876 -
\??\c:\lxfxrrr.exec:\lxfxrrr.exe66⤵PID:5048
-
\??\c:\hbnnnn.exec:\hbnnnn.exe67⤵PID:4724
-
\??\c:\1vdvp.exec:\1vdvp.exe68⤵PID:1848
-
\??\c:\dpdvd.exec:\dpdvd.exe69⤵PID:3760
-
\??\c:\lxfxxrr.exec:\lxfxxrr.exe70⤵PID:2408
-
\??\c:\frxxrrr.exec:\frxxrrr.exe71⤵PID:864
-
\??\c:\tnnnnn.exec:\tnnnnn.exe72⤵PID:4880
-
\??\c:\ntbtnn.exec:\ntbtnn.exe73⤵PID:2088
-
\??\c:\3jjdd.exec:\3jjdd.exe74⤵PID:5052
-
\??\c:\lflfxxx.exec:\lflfxxx.exe75⤵PID:4740
-
\??\c:\fxxxrrr.exec:\fxxxrrr.exe76⤵PID:1620
-
\??\c:\7bnhbh.exec:\7bnhbh.exe77⤵PID:2396
-
\??\c:\3bnnhh.exec:\3bnnhh.exe78⤵PID:1280
-
\??\c:\jvddv.exec:\jvddv.exe79⤵PID:4100
-
\??\c:\jdppd.exec:\jdppd.exe80⤵PID:2956
-
\??\c:\fxrfrxf.exec:\fxrfrxf.exe81⤵PID:1692
-
\??\c:\tnbbhh.exec:\tnbbhh.exe82⤵PID:892
-
\??\c:\btbnnh.exec:\btbnnh.exe83⤵PID:2360
-
\??\c:\jdjdv.exec:\jdjdv.exe84⤵PID:1220
-
\??\c:\pjpjv.exec:\pjpjv.exe85⤵PID:1960
-
\??\c:\xrrrlll.exec:\xrrrlll.exe86⤵PID:4996
-
\??\c:\rflfxfx.exec:\rflfxfx.exe87⤵PID:3788
-
\??\c:\nnntnn.exec:\nnntnn.exe88⤵PID:5060
-
\??\c:\dvvvv.exec:\dvvvv.exe89⤵PID:2172
-
\??\c:\jpvpj.exec:\jpvpj.exe90⤵PID:3444
-
\??\c:\rlllxxx.exec:\rlllxxx.exe91⤵PID:4912
-
\??\c:\hhhhbb.exec:\hhhhbb.exe92⤵PID:2348
-
\??\c:\1ntnnn.exec:\1ntnnn.exe93⤵PID:3104
-
\??\c:\jdjdv.exec:\jdjdv.exe94⤵PID:1500
-
\??\c:\pjvjv.exec:\pjvjv.exe95⤵PID:3712
-
\??\c:\xrfxxxl.exec:\xrfxxxl.exe96⤵PID:2540
-
\??\c:\bhnhtb.exec:\bhnhtb.exe97⤵PID:4112
-
\??\c:\7jjjd.exec:\7jjjd.exe98⤵PID:3180
-
\??\c:\5rxxrff.exec:\5rxxrff.exe99⤵PID:4836
-
\??\c:\xfllfll.exec:\xfllfll.exe100⤵PID:3472
-
\??\c:\tnthbb.exec:\tnthbb.exe101⤵PID:3760
-
\??\c:\thnnhn.exec:\thnnhn.exe102⤵PID:3492
-
\??\c:\jvjdv.exec:\jvjdv.exe103⤵PID:1704
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe104⤵PID:1712
-
\??\c:\lfxrlrl.exec:\lfxrlrl.exe105⤵PID:4740
-
\??\c:\bnbttt.exec:\bnbttt.exe106⤵PID:3856
-
\??\c:\dvdjd.exec:\dvdjd.exe107⤵PID:2396
-
\??\c:\pjvvp.exec:\pjvvp.exe108⤵PID:1280
-
\??\c:\xfrlffx.exec:\xfrlffx.exe109⤵PID:4260
-
\??\c:\xrfxrxr.exec:\xrfxrxr.exe110⤵PID:4292
-
\??\c:\5hnnhb.exec:\5hnnhb.exe111⤵PID:3368
-
\??\c:\nhbtnn.exec:\nhbtnn.exe112⤵PID:4480
-
\??\c:\3vpjd.exec:\3vpjd.exe113⤵PID:2212
-
\??\c:\1pppj.exec:\1pppj.exe114⤵PID:1996
-
\??\c:\7rxxxxf.exec:\7rxxxxf.exe115⤵PID:2260
-
\??\c:\flrrrll.exec:\flrrrll.exe116⤵PID:4856
-
\??\c:\bhtnbb.exec:\bhtnbb.exe117⤵PID:4088
-
\??\c:\ntbttn.exec:\ntbttn.exe118⤵PID:2316
-
\??\c:\vpppj.exec:\vpppj.exe119⤵PID:4736
-
\??\c:\pppjd.exec:\pppjd.exe120⤵PID:3444
-
\??\c:\llxxfxx.exec:\llxxfxx.exe121⤵PID:2224
-
\??\c:\fxxrllf.exec:\fxxrllf.exe122⤵PID:2348
-
\??\c:\nhnhnn.exec:\nhnhnn.exe123⤵PID:2364
-
\??\c:\btbttt.exec:\btbttt.exe124⤵PID:4360
-
\??\c:\jvjdv.exec:\jvjdv.exe125⤵PID:4876
-
\??\c:\llrrxrx.exec:\llrrxrx.exe126⤵PID:5048
-
\??\c:\rfffxfx.exec:\rfffxfx.exe127⤵PID:4724
-
\??\c:\tnttnb.exec:\tnttnb.exe128⤵PID:1076
-
\??\c:\jdjjv.exec:\jdjjv.exe129⤵PID:4836
-
\??\c:\vdjvp.exec:\vdjvp.exe130⤵PID:3472
-
\??\c:\7rrfxxx.exec:\7rrfxxx.exe131⤵PID:2176
-
\??\c:\fffrlrr.exec:\fffrlrr.exe132⤵PID:2536
-
\??\c:\tnthhh.exec:\tnthhh.exe133⤵PID:3892
-
\??\c:\dvvvv.exec:\dvvvv.exe134⤵PID:656
-
\??\c:\xrrlffx.exec:\xrrlffx.exe135⤵PID:1296
-
\??\c:\nnnnhh.exec:\nnnnhh.exe136⤵PID:4580
-
\??\c:\dpjdp.exec:\dpjdp.exe137⤵PID:1496
-
\??\c:\xxrllll.exec:\xxrllll.exe138⤵PID:1248
-
\??\c:\xlxrrll.exec:\xlxrrll.exe139⤵PID:4488
-
\??\c:\dvvpj.exec:\dvvpj.exe140⤵PID:892
-
\??\c:\dpdvp.exec:\dpdvp.exe141⤵PID:4480
-
\??\c:\rlxrxrx.exec:\rlxrxrx.exe142⤵PID:3216
-
\??\c:\1bbttt.exec:\1bbttt.exe143⤵PID:860
-
\??\c:\9bbtbb.exec:\9bbtbb.exe144⤵PID:4020
-
\??\c:\jvddv.exec:\jvddv.exe145⤵PID:4068
-
\??\c:\dvvpp.exec:\dvvpp.exe146⤵PID:3556
-
\??\c:\xrrlrll.exec:\xrrlrll.exe147⤵PID:4540
-
\??\c:\3tnttb.exec:\3tnttb.exe148⤵PID:2092
-
\??\c:\bthbbb.exec:\bthbbb.exe149⤵PID:3952
-
\??\c:\pdvpj.exec:\pdvpj.exe150⤵PID:2928
-
\??\c:\rxffxfx.exec:\rxffxfx.exe151⤵PID:3712
-
\??\c:\llrllll.exec:\llrllll.exe152⤵PID:2540
-
\??\c:\ttnnhh.exec:\ttnnhh.exe153⤵PID:2944
-
\??\c:\bntttn.exec:\bntttn.exe154⤵PID:2580
-
\??\c:\dvvpp.exec:\dvvpp.exe155⤵PID:4040
-
\??\c:\lrlrrxx.exec:\lrlrrxx.exe156⤵PID:4452
-
\??\c:\1fxxxxx.exec:\1fxxxxx.exe157⤵PID:4516
-
\??\c:\9nnhbb.exec:\9nnhbb.exe158⤵PID:700
-
\??\c:\pjpjd.exec:\pjpjd.exe159⤵PID:4688
-
\??\c:\vppjd.exec:\vppjd.exe160⤵PID:4656
-
\??\c:\xlxrrlf.exec:\xlxrrlf.exe161⤵PID:2880
-
\??\c:\nhnnhb.exec:\nhnnhb.exe162⤵PID:4568
-
\??\c:\tbhhbn.exec:\tbhhbn.exe163⤵PID:1280
-
\??\c:\ddpjd.exec:\ddpjd.exe164⤵PID:4292
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe165⤵PID:1360
-
\??\c:\nnbtnh.exec:\nnbtnh.exe166⤵PID:2360
-
\??\c:\bbttbb.exec:\bbttbb.exe167⤵PID:624
-
\??\c:\jvdvp.exec:\jvdvp.exe168⤵PID:3192
-
\??\c:\fffxlff.exec:\fffxlff.exe169⤵PID:3216
-
\??\c:\lflfxrx.exec:\lflfxrx.exe170⤵PID:4832
-
\??\c:\tnhbtb.exec:\tnhbtb.exe171⤵PID:2848
-
\??\c:\3dvjd.exec:\3dvjd.exe172⤵PID:4636
-
\??\c:\1vdvp.exec:\1vdvp.exe173⤵PID:3556
-
\??\c:\flrllll.exec:\flrllll.exe174⤵PID:3008
-
\??\c:\fffffff.exec:\fffffff.exe175⤵PID:1284
-
\??\c:\nbhhhh.exec:\nbhhhh.exe176⤵PID:2364
-
\??\c:\btbbtb.exec:\btbbtb.exe177⤵PID:1816
-
\??\c:\7pjdd.exec:\7pjdd.exe178⤵PID:4112
-
\??\c:\rrffxxf.exec:\rrffxxf.exe179⤵PID:3844
-
\??\c:\nbhbbt.exec:\nbhbbt.exe180⤵PID:1944
-
\??\c:\bbhbtt.exec:\bbhbtt.exe181⤵PID:4816
-
\??\c:\vvjjv.exec:\vvjjv.exe182⤵PID:2088
-
\??\c:\vppjj.exec:\vppjj.exe183⤵PID:3748
-
\??\c:\ffrlrlr.exec:\ffrlrlr.exe184⤵PID:1480
-
\??\c:\rrxxrrr.exec:\rrxxrrr.exe185⤵PID:4164
-
\??\c:\7bbtnn.exec:\7bbtnn.exe186⤵PID:1060
-
\??\c:\hhbttb.exec:\hhbttb.exe187⤵PID:4488
-
\??\c:\pdjjd.exec:\pdjjd.exe188⤵PID:4752
-
\??\c:\xxxfffx.exec:\xxxfffx.exe189⤵PID:3528
-
\??\c:\lxrrxxx.exec:\lxrrxxx.exe190⤵PID:860
-
\??\c:\btbttn.exec:\btbttn.exe191⤵PID:2316
-
\??\c:\vpdvp.exec:\vpdvp.exe192⤵PID:1040
-
\??\c:\jdvpd.exec:\jdvpd.exe193⤵PID:4072
-
\??\c:\5ffxrrr.exec:\5ffxrrr.exe194⤵PID:4044
-
\??\c:\9nhbtt.exec:\9nhbtt.exe195⤵PID:2092
-
\??\c:\tbnnbb.exec:\tbnnbb.exe196⤵PID:4288
-
\??\c:\jvpjd.exec:\jvpjd.exe197⤵PID:2424
-
\??\c:\lrfxrrr.exec:\lrfxrrr.exe198⤵PID:2540
-
\??\c:\xrllxxx.exec:\xrllxxx.exe199⤵PID:4696
-
\??\c:\btnhhh.exec:\btnhhh.exe200⤵PID:4040
-
\??\c:\dvjjd.exec:\dvjjd.exe201⤵PID:4452
-
\??\c:\7jjjj.exec:\7jjjj.exe202⤵PID:3892
-
\??\c:\hbnhhn.exec:\hbnhhn.exe203⤵PID:2088
-
\??\c:\hnntnt.exec:\hnntnt.exe204⤵PID:3748
-
\??\c:\jjvdd.exec:\jjvdd.exe205⤵PID:372
-
\??\c:\9llfxxx.exec:\9llfxxx.exe206⤵PID:3768
-
\??\c:\llxxrll.exec:\llxxrll.exe207⤵PID:892
-
\??\c:\9bthnn.exec:\9bthnn.exe208⤵PID:3788
-
\??\c:\pjddj.exec:\pjddj.exe209⤵PID:3192
-
\??\c:\bthntb.exec:\bthntb.exe210⤵PID:4824
-
\??\c:\vvdvv.exec:\vvdvv.exe211⤵PID:4832
-
\??\c:\llffxxx.exec:\llffxxx.exe212⤵PID:2848
-
\??\c:\hnbhhh.exec:\hnbhhh.exe213⤵PID:4636
-
\??\c:\rxffllr.exec:\rxffllr.exe214⤵PID:3676
-
\??\c:\hbnntt.exec:\hbnntt.exe215⤵PID:3008
-
\??\c:\htbbbh.exec:\htbbbh.exe216⤵PID:4360
-
\??\c:\dvdvv.exec:\dvdvv.exe217⤵PID:2012
-
\??\c:\9rxrlrl.exec:\9rxrlrl.exe218⤵PID:1816
-
\??\c:\nhhbth.exec:\nhhbth.exe219⤵PID:4836
-
\??\c:\bhtnnh.exec:\bhtnnh.exe220⤵PID:1992
-
\??\c:\dvvpp.exec:\dvvpp.exe221⤵PID:2176
-
\??\c:\fxffxxx.exec:\fxffxxx.exe222⤵PID:4688
-
\??\c:\bttnhh.exec:\bttnhh.exe223⤵PID:956
-
\??\c:\hhnhhb.exec:\hhnhhb.exe224⤵PID:3792
-
\??\c:\ppvpp.exec:\ppvpp.exe225⤵PID:1060
-
\??\c:\lllfxrr.exec:\lllfxrr.exe226⤵PID:4488
-
\??\c:\rxxlrrr.exec:\rxxlrrr.exe227⤵PID:4752
-
\??\c:\nbbtnh.exec:\nbbtnh.exe228⤵PID:4308
-
\??\c:\vjppj.exec:\vjppj.exe229⤵PID:3216
-
\??\c:\xrfrlfr.exec:\xrfrlfr.exe230⤵PID:4068
-
\??\c:\lllffxr.exec:\lllffxr.exe231⤵PID:1768
-
\??\c:\bbhttb.exec:\bbhttb.exe232⤵PID:4540
-
\??\c:\dvjdv.exec:\dvjdv.exe233⤵PID:2344
-
\??\c:\pdvpj.exec:\pdvpj.exe234⤵PID:2876
-
\??\c:\1fxrrrr.exec:\1fxrrrr.exe235⤵PID:3008
-
\??\c:\rllffff.exec:\rllffff.exe236⤵PID:3180
-
\??\c:\hbhnht.exec:\hbhnht.exe237⤵PID:4288
-
\??\c:\vjvpj.exec:\vjvpj.exe238⤵PID:1252
-
\??\c:\1vpvv.exec:\1vpvv.exe239⤵PID:4396
-
\??\c:\flrlfll.exec:\flrlfll.exe240⤵PID:3424
-
\??\c:\hbnhhh.exec:\hbnhhh.exe241⤵PID:4960
-
\??\c:\btbbtt.exec:\btbbtt.exe242⤵PID:864