Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 00:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe
-
Size
72KB
-
MD5
cd4c3aa127b4cdd8241c1f1d899e8567
-
SHA1
afde7591f97a1b69c684e9be0e3b12194086195b
-
SHA256
8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f
-
SHA512
e6bf6347a49aef267f4e74599d524c54243482672e2515c306e0c4e1c807268b79619c806884d62d891a32f8b9f71ff2287705b496b71b07205836d43ff6c332
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIrmCeRMKwWP:ymb3NkkiQ3mdBjFIjeKC
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3032-5-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4820-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2760-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2380-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4896-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1800-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1436-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/512-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3796-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1112-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/448-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3064-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3492-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/64-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3956-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4376-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 25 IoCs
Processes:
resource yara_rule behavioral2/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4820-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3456-31-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4560-38-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4876-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2676-13-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3624-52-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2760-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2760-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2380-73-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2892-82-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4896-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1800-99-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1436-106-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/512-112-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1540-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3796-130-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1112-135-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/448-142-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3064-154-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3492-162-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/64-168-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3956-171-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4376-178-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3616-202-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
thnnnh.exedjjjj.exelfffffl.exenbbbth.exenhtnbb.exedvddp.exevpvpj.exefrxrflf.exebthbbb.exetnttnn.exedvdvp.exexlrlffl.exebtttht.exehbtnhh.exevvpjd.exexxffxxx.exelxxxrxr.exehhbnhh.exepjjdj.exe5rrllrr.exexfrrrxr.exebhbhnn.exeppvpd.exefxlflfx.exerfrllll.exehhtnhh.exethhhbb.exepjdvj.exerlxxlfr.exebbnbtt.exe3bbbtn.exepjpjv.exelffxrrr.exebbtttt.exetntnhh.exepdppv.exedvjdp.exe7frlxfr.exebbtttt.exenntthb.exepjppp.exevpvvp.exejdpjp.exerllllll.exerrrrxff.exetbhbbb.exethttbb.exedpjjd.exevvddv.exerxfxlfx.exellrlrlx.exentnhbt.exedvvvj.exevdjjd.exeffllllr.exerrfxxff.exetbbttt.exetbnnnn.exedjpjd.exevppdv.exerlllfff.exehhhtnn.exenhnhtt.exeppppd.exepid process 2676 thnnnh.exe 4820 djjjj.exe 4876 lfffffl.exe 3456 nbbbth.exe 4560 nhtnbb.exe 2268 dvddp.exe 3624 vpvpj.exe 1192 frxrflf.exe 2760 bthbbb.exe 2380 tnttnn.exe 2892 dvdvp.exe 5024 xlrlffl.exe 4896 btttht.exe 1800 hbtnhh.exe 1436 vvpjd.exe 512 xxffxxx.exe 1540 lxxxrxr.exe 4732 hhbnhh.exe 3796 pjjdj.exe 1112 5rrllrr.exe 448 xfrrrxr.exe 2908 bhbhnn.exe 3064 ppvpd.exe 3492 fxlflfx.exe 64 rfrllll.exe 3956 hhtnhh.exe 4376 thhhbb.exe 388 pjdvj.exe 4224 rlxxlfr.exe 5112 bbnbtt.exe 3616 3bbbtn.exe 212 pjpjv.exe 3760 lffxrrr.exe 3940 bbtttt.exe 4396 tntnhh.exe 3032 pdppv.exe 4308 dvjdp.exe 4816 7frlxfr.exe 4820 bbtttt.exe 216 nntthb.exe 2460 pjppp.exe 2500 vpvvp.exe 900 jdpjp.exe 1428 rllllll.exe 3324 rrrrxff.exe 3212 tbhbbb.exe 1156 thttbb.exe 3116 dpjjd.exe 3972 vvddv.exe 2664 rxfxlfx.exe 2892 llrlrlx.exe 5016 ntnhbt.exe 768 dvvvj.exe 740 vdjjd.exe 1800 ffllllr.exe 3444 rrfxxff.exe 1892 tbbttt.exe 2772 tbnnnn.exe 2108 djpjd.exe 4544 vppdv.exe 1016 rlllfff.exe 2724 hhhtnn.exe 3892 nhnhtt.exe 1736 ppppd.exe -
Processes:
resource yara_rule behavioral2/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4820-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2760-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2760-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1800-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1436-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/512-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1112-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/448-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3064-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3492-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/64-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3956-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4376-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-202-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exethnnnh.exedjjjj.exelfffffl.exenbbbth.exenhtnbb.exedvddp.exevpvpj.exefrxrflf.exebthbbb.exetnttnn.exedvdvp.exexlrlffl.exebtttht.exehbtnhh.exevvpjd.exexxffxxx.exelxxxrxr.exehhbnhh.exepjjdj.exe5rrllrr.exexfrrrxr.exedescription pid process target process PID 3032 wrote to memory of 2676 3032 8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe thnnnh.exe PID 3032 wrote to memory of 2676 3032 8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe thnnnh.exe PID 3032 wrote to memory of 2676 3032 8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe thnnnh.exe PID 2676 wrote to memory of 4820 2676 thnnnh.exe djjjj.exe PID 2676 wrote to memory of 4820 2676 thnnnh.exe djjjj.exe PID 2676 wrote to memory of 4820 2676 thnnnh.exe djjjj.exe PID 4820 wrote to memory of 4876 4820 djjjj.exe lfffffl.exe PID 4820 wrote to memory of 4876 4820 djjjj.exe lfffffl.exe PID 4820 wrote to memory of 4876 4820 djjjj.exe lfffffl.exe PID 4876 wrote to memory of 3456 4876 lfffffl.exe nbbbth.exe PID 4876 wrote to memory of 3456 4876 lfffffl.exe nbbbth.exe PID 4876 wrote to memory of 3456 4876 lfffffl.exe nbbbth.exe PID 3456 wrote to memory of 4560 3456 nbbbth.exe nhtnbb.exe PID 3456 wrote to memory of 4560 3456 nbbbth.exe nhtnbb.exe PID 3456 wrote to memory of 4560 3456 nbbbth.exe nhtnbb.exe PID 4560 wrote to memory of 2268 4560 nhtnbb.exe dvddp.exe PID 4560 wrote to memory of 2268 4560 nhtnbb.exe dvddp.exe PID 4560 wrote to memory of 2268 4560 nhtnbb.exe dvddp.exe PID 2268 wrote to memory of 3624 2268 dvddp.exe vpvpj.exe PID 2268 wrote to memory of 3624 2268 dvddp.exe vpvpj.exe PID 2268 wrote to memory of 3624 2268 dvddp.exe vpvpj.exe PID 3624 wrote to memory of 1192 3624 vpvpj.exe frxrflf.exe PID 3624 wrote to memory of 1192 3624 vpvpj.exe frxrflf.exe PID 3624 wrote to memory of 1192 3624 vpvpj.exe frxrflf.exe PID 1192 wrote to memory of 2760 1192 frxrflf.exe bthbbb.exe PID 1192 wrote to memory of 2760 1192 frxrflf.exe bthbbb.exe PID 1192 wrote to memory of 2760 1192 frxrflf.exe bthbbb.exe PID 2760 wrote to memory of 2380 2760 bthbbb.exe tnttnn.exe PID 2760 wrote to memory of 2380 2760 bthbbb.exe tnttnn.exe PID 2760 wrote to memory of 2380 2760 bthbbb.exe tnttnn.exe PID 2380 wrote to memory of 2892 2380 tnttnn.exe dvdvp.exe PID 2380 wrote to memory of 2892 2380 tnttnn.exe dvdvp.exe PID 2380 wrote to memory of 2892 2380 tnttnn.exe dvdvp.exe PID 2892 wrote to memory of 5024 2892 dvdvp.exe xlrlffl.exe PID 2892 wrote to memory of 5024 2892 dvdvp.exe xlrlffl.exe PID 2892 wrote to memory of 5024 2892 dvdvp.exe xlrlffl.exe PID 5024 wrote to memory of 4896 5024 xlrlffl.exe btttht.exe PID 5024 wrote to memory of 4896 5024 xlrlffl.exe btttht.exe PID 5024 wrote to memory of 4896 5024 xlrlffl.exe btttht.exe PID 4896 wrote to memory of 1800 4896 btttht.exe hbtnhh.exe PID 4896 wrote to memory of 1800 4896 btttht.exe hbtnhh.exe PID 4896 wrote to memory of 1800 4896 btttht.exe hbtnhh.exe PID 1800 wrote to memory of 1436 1800 hbtnhh.exe vvpjd.exe PID 1800 wrote to memory of 1436 1800 hbtnhh.exe vvpjd.exe PID 1800 wrote to memory of 1436 1800 hbtnhh.exe vvpjd.exe PID 1436 wrote to memory of 512 1436 vvpjd.exe xxffxxx.exe PID 1436 wrote to memory of 512 1436 vvpjd.exe xxffxxx.exe PID 1436 wrote to memory of 512 1436 vvpjd.exe xxffxxx.exe PID 512 wrote to memory of 1540 512 xxffxxx.exe lxxxrxr.exe PID 512 wrote to memory of 1540 512 xxffxxx.exe lxxxrxr.exe PID 512 wrote to memory of 1540 512 xxffxxx.exe lxxxrxr.exe PID 1540 wrote to memory of 4732 1540 lxxxrxr.exe hhbnhh.exe PID 1540 wrote to memory of 4732 1540 lxxxrxr.exe hhbnhh.exe PID 1540 wrote to memory of 4732 1540 lxxxrxr.exe hhbnhh.exe PID 4732 wrote to memory of 3796 4732 hhbnhh.exe pjjdj.exe PID 4732 wrote to memory of 3796 4732 hhbnhh.exe pjjdj.exe PID 4732 wrote to memory of 3796 4732 hhbnhh.exe pjjdj.exe PID 3796 wrote to memory of 1112 3796 pjjdj.exe 5rrllrr.exe PID 3796 wrote to memory of 1112 3796 pjjdj.exe 5rrllrr.exe PID 3796 wrote to memory of 1112 3796 pjjdj.exe 5rrllrr.exe PID 1112 wrote to memory of 448 1112 5rrllrr.exe xfrrrxr.exe PID 1112 wrote to memory of 448 1112 5rrllrr.exe xfrrrxr.exe PID 1112 wrote to memory of 448 1112 5rrllrr.exe xfrrrxr.exe PID 448 wrote to memory of 2908 448 xfrrrxr.exe bhbhnn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe"C:\Users\Admin\AppData\Local\Temp\8a38fc71cbd0e1280cd296d9c67b2220292d4b14dda4d4a475622901573fad2f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\thnnnh.exec:\thnnnh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\djjjj.exec:\djjjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\lfffffl.exec:\lfffffl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\nbbbth.exec:\nbbbth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
\??\c:\nhtnbb.exec:\nhtnbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\dvddp.exec:\dvddp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\vpvpj.exec:\vpvpj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\frxrflf.exec:\frxrflf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\bthbbb.exec:\bthbbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\tnttnn.exec:\tnttnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\dvdvp.exec:\dvdvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\xlrlffl.exec:\xlrlffl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\btttht.exec:\btttht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\hbtnhh.exec:\hbtnhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\vvpjd.exec:\vvpjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\xxffxxx.exec:\xxffxxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
\??\c:\lxxxrxr.exec:\lxxxrxr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\hhbnhh.exec:\hhbnhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\pjjdj.exec:\pjjdj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\5rrllrr.exec:\5rrllrr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
\??\c:\xfrrrxr.exec:\xfrrrxr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
\??\c:\bhbhnn.exec:\bhbhnn.exe23⤵
- Executes dropped EXE
PID:2908 -
\??\c:\ppvpd.exec:\ppvpd.exe24⤵
- Executes dropped EXE
PID:3064 -
\??\c:\fxlflfx.exec:\fxlflfx.exe25⤵
- Executes dropped EXE
PID:3492 -
\??\c:\rfrllll.exec:\rfrllll.exe26⤵
- Executes dropped EXE
PID:64 -
\??\c:\hhtnhh.exec:\hhtnhh.exe27⤵
- Executes dropped EXE
PID:3956 -
\??\c:\thhhbb.exec:\thhhbb.exe28⤵
- Executes dropped EXE
PID:4376 -
\??\c:\pjdvj.exec:\pjdvj.exe29⤵
- Executes dropped EXE
PID:388 -
\??\c:\rlxxlfr.exec:\rlxxlfr.exe30⤵
- Executes dropped EXE
PID:4224 -
\??\c:\bbnbtt.exec:\bbnbtt.exe31⤵
- Executes dropped EXE
PID:5112 -
\??\c:\3bbbtn.exec:\3bbbtn.exe32⤵
- Executes dropped EXE
PID:3616 -
\??\c:\pjpjv.exec:\pjpjv.exe33⤵
- Executes dropped EXE
PID:212 -
\??\c:\lffxrrr.exec:\lffxrrr.exe34⤵
- Executes dropped EXE
PID:3760 -
\??\c:\bbtttt.exec:\bbtttt.exe35⤵
- Executes dropped EXE
PID:3940 -
\??\c:\tntnhh.exec:\tntnhh.exe36⤵
- Executes dropped EXE
PID:4396 -
\??\c:\pdppv.exec:\pdppv.exe37⤵
- Executes dropped EXE
PID:3032 -
\??\c:\dvjdp.exec:\dvjdp.exe38⤵
- Executes dropped EXE
PID:4308 -
\??\c:\7frlxfr.exec:\7frlxfr.exe39⤵
- Executes dropped EXE
PID:4816 -
\??\c:\bbtttt.exec:\bbtttt.exe40⤵
- Executes dropped EXE
PID:4820 -
\??\c:\nntthb.exec:\nntthb.exe41⤵
- Executes dropped EXE
PID:216 -
\??\c:\pjppp.exec:\pjppp.exe42⤵
- Executes dropped EXE
PID:2460 -
\??\c:\vpvvp.exec:\vpvvp.exe43⤵
- Executes dropped EXE
PID:2500 -
\??\c:\jdpjp.exec:\jdpjp.exe44⤵
- Executes dropped EXE
PID:900 -
\??\c:\rllllll.exec:\rllllll.exe45⤵
- Executes dropped EXE
PID:1428 -
\??\c:\rrrrxff.exec:\rrrrxff.exe46⤵
- Executes dropped EXE
PID:3324 -
\??\c:\tbhbbb.exec:\tbhbbb.exe47⤵
- Executes dropped EXE
PID:3212 -
\??\c:\thttbb.exec:\thttbb.exe48⤵
- Executes dropped EXE
PID:1156 -
\??\c:\dpjjd.exec:\dpjjd.exe49⤵
- Executes dropped EXE
PID:3116 -
\??\c:\vvddv.exec:\vvddv.exe50⤵
- Executes dropped EXE
PID:3972 -
\??\c:\rxfxlfx.exec:\rxfxlfx.exe51⤵
- Executes dropped EXE
PID:2664 -
\??\c:\llrlrlx.exec:\llrlrlx.exe52⤵
- Executes dropped EXE
PID:2892 -
\??\c:\ntnhbt.exec:\ntnhbt.exe53⤵
- Executes dropped EXE
PID:5016 -
\??\c:\dvvvj.exec:\dvvvj.exe54⤵
- Executes dropped EXE
PID:768 -
\??\c:\vdjjd.exec:\vdjjd.exe55⤵
- Executes dropped EXE
PID:740 -
\??\c:\ffllllr.exec:\ffllllr.exe56⤵
- Executes dropped EXE
PID:1800 -
\??\c:\rrfxxff.exec:\rrfxxff.exe57⤵
- Executes dropped EXE
PID:3444 -
\??\c:\tbbttt.exec:\tbbttt.exe58⤵
- Executes dropped EXE
PID:1892 -
\??\c:\tbnnnn.exec:\tbnnnn.exe59⤵
- Executes dropped EXE
PID:2772 -
\??\c:\djpjd.exec:\djpjd.exe60⤵
- Executes dropped EXE
PID:2108 -
\??\c:\vppdv.exec:\vppdv.exe61⤵
- Executes dropped EXE
PID:4544 -
\??\c:\rlllfff.exec:\rlllfff.exe62⤵
- Executes dropped EXE
PID:1016 -
\??\c:\hhhtnn.exec:\hhhtnn.exe63⤵
- Executes dropped EXE
PID:2724 -
\??\c:\nhnhtt.exec:\nhnhtt.exe64⤵
- Executes dropped EXE
PID:3892 -
\??\c:\ppppd.exec:\ppppd.exe65⤵
- Executes dropped EXE
PID:1736 -
\??\c:\dpjjd.exec:\dpjjd.exe66⤵PID:1464
-
\??\c:\xxxrlrl.exec:\xxxrlrl.exe67⤵PID:2756
-
\??\c:\rlllxxr.exec:\rlllxxr.exe68⤵PID:3200
-
\??\c:\nhtbhb.exec:\nhtbhb.exe69⤵PID:3492
-
\??\c:\btttbb.exec:\btttbb.exe70⤵PID:4736
-
\??\c:\jvpjv.exec:\jvpjv.exe71⤵PID:436
-
\??\c:\pdjdd.exec:\pdjdd.exe72⤵PID:3936
-
\??\c:\lxxrfrl.exec:\lxxrfrl.exe73⤵PID:3656
-
\??\c:\rxllllf.exec:\rxllllf.exe74⤵PID:388
-
\??\c:\thbtbh.exec:\thbtbh.exe75⤵PID:868
-
\??\c:\hbbtnh.exec:\hbbtnh.exe76⤵PID:988
-
\??\c:\vppvp.exec:\vppvp.exe77⤵PID:4616
-
\??\c:\pppjj.exec:\pppjj.exe78⤵PID:1092
-
\??\c:\ffllxxx.exec:\ffllxxx.exe79⤵PID:1012
-
\??\c:\xrfflxx.exec:\xrfflxx.exe80⤵PID:3928
-
\??\c:\nhhhhh.exec:\nhhhhh.exe81⤵PID:4228
-
\??\c:\hhhthh.exec:\hhhthh.exe82⤵PID:2224
-
\??\c:\jdddd.exec:\jdddd.exe83⤵PID:3260
-
\??\c:\dvdvp.exec:\dvdvp.exe84⤵PID:1100
-
\??\c:\ffllllf.exec:\ffllllf.exe85⤵PID:4852
-
\??\c:\fxrlffx.exec:\fxrlffx.exe86⤵PID:3848
-
\??\c:\bnthnn.exec:\bnthnn.exe87⤵PID:3468
-
\??\c:\nhnhbb.exec:\nhnhbb.exe88⤵PID:4416
-
\??\c:\jdddv.exec:\jdddv.exe89⤵PID:1576
-
\??\c:\vppjv.exec:\vppjv.exe90⤵PID:3456
-
\??\c:\5flflrx.exec:\5flflrx.exe91⤵PID:2268
-
\??\c:\rlrrxlx.exec:\rlrrxlx.exe92⤵PID:3356
-
\??\c:\nhhhnt.exec:\nhhhnt.exe93⤵PID:1468
-
\??\c:\jvjdv.exec:\jvjdv.exe94⤵PID:4992
-
\??\c:\jdjvp.exec:\jdjvp.exe95⤵PID:1156
-
\??\c:\ffrllrr.exec:\ffrllrr.exe96⤵PID:1900
-
\??\c:\xlxrrrx.exec:\xlxrrrx.exe97⤵PID:4492
-
\??\c:\tnhbtt.exec:\tnhbtt.exe98⤵PID:2680
-
\??\c:\hntttb.exec:\hntttb.exe99⤵PID:2892
-
\??\c:\vvdvp.exec:\vvdvp.exe100⤵PID:4588
-
\??\c:\dvdvv.exec:\dvdvv.exe101⤵PID:2504
-
\??\c:\ddjdv.exec:\ddjdv.exe102⤵PID:740
-
\??\c:\lffffff.exec:\lffffff.exe103⤵PID:2836
-
\??\c:\xfrllxx.exec:\xfrllxx.exe104⤵PID:4484
-
\??\c:\nhbttb.exec:\nhbttb.exe105⤵PID:3948
-
\??\c:\nhnnhh.exec:\nhnnhh.exe106⤵PID:2772
-
\??\c:\1jppj.exec:\1jppj.exe107⤵PID:2108
-
\??\c:\djvvp.exec:\djvvp.exe108⤵PID:2336
-
\??\c:\fflrlrr.exec:\fflrlrr.exe109⤵PID:3796
-
\??\c:\frfxrrr.exec:\frfxrrr.exe110⤵PID:5004
-
\??\c:\bnbnnn.exec:\bnbnnn.exe111⤵PID:448
-
\??\c:\nttttb.exec:\nttttb.exe112⤵PID:1372
-
\??\c:\vvppp.exec:\vvppp.exe113⤵PID:4976
-
\??\c:\pvvpv.exec:\pvvpv.exe114⤵PID:4952
-
\??\c:\xxxrrrl.exec:\xxxrrrl.exe115⤵PID:1224
-
\??\c:\htbttt.exec:\htbttt.exe116⤵PID:2176
-
\??\c:\tntthh.exec:\tntthh.exe117⤵PID:5064
-
\??\c:\jdvpj.exec:\jdvpj.exe118⤵PID:3852
-
\??\c:\ddjdv.exec:\ddjdv.exe119⤵PID:5000
-
\??\c:\rllfffx.exec:\rllfffx.exe120⤵PID:4216
-
\??\c:\rlrrrrf.exec:\rlrrrrf.exe121⤵PID:1584
-
\??\c:\bbhtbb.exec:\bbhtbb.exe122⤵PID:2428
-
\??\c:\nbhhtt.exec:\nbhhtt.exe123⤵PID:3616
-
\??\c:\5vvpp.exec:\5vvpp.exe124⤵PID:4596
-
\??\c:\rrlfrxx.exec:\rrlfrxx.exe125⤵PID:2308
-
\??\c:\xxrrrrl.exec:\xxrrrrl.exe126⤵PID:2824
-
\??\c:\nhhhbb.exec:\nhhhbb.exe127⤵PID:3220
-
\??\c:\ntbhbb.exec:\ntbhbb.exe128⤵PID:2192
-
\??\c:\dvppj.exec:\dvppj.exe129⤵PID:2712
-
\??\c:\dvjdv.exec:\dvjdv.exe130⤵PID:3692
-
\??\c:\rlxffll.exec:\rlxffll.exe131⤵PID:4852
-
\??\c:\xrlrxll.exec:\xrlrxll.exe132⤵PID:4820
-
\??\c:\tbhhbt.exec:\tbhhbt.exe133⤵PID:3304
-
\??\c:\thbtnn.exec:\thbtnn.exe134⤵PID:4864
-
\??\c:\bbtnhh.exec:\bbtnhh.exe135⤵PID:552
-
\??\c:\pvjjv.exec:\pvjjv.exe136⤵PID:900
-
\??\c:\jjjjd.exec:\jjjjd.exe137⤵PID:3624
-
\??\c:\rxxrrrl.exec:\rxxrrrl.exe138⤵PID:3356
-
\??\c:\fxxlffr.exec:\fxxlffr.exe139⤵PID:4764
-
\??\c:\nnhhtt.exec:\nnhhtt.exe140⤵PID:2760
-
\??\c:\tnnnhh.exec:\tnnnhh.exe141⤵PID:1928
-
\??\c:\dvjjv.exec:\dvjjv.exe142⤵PID:4364
-
\??\c:\vvddj.exec:\vvddj.exe143⤵PID:1864
-
\??\c:\pjppd.exec:\pjppd.exe144⤵PID:2884
-
\??\c:\rrlfxrr.exec:\rrlfxrr.exe145⤵PID:5092
-
\??\c:\ffxxrrl.exec:\ffxxrrl.exe146⤵PID:4904
-
\??\c:\bntnhh.exec:\bntnhh.exe147⤵PID:4016
-
\??\c:\tthhhb.exec:\tthhhb.exe148⤵PID:740
-
\??\c:\pppdp.exec:\pppdp.exe149⤵PID:2836
-
\??\c:\lxxxxxl.exec:\lxxxxxl.exe150⤵PID:4744
-
\??\c:\hbtttt.exec:\hbtttt.exe151⤵PID:3948
-
\??\c:\ddvpp.exec:\ddvpp.exe152⤵PID:2376
-
\??\c:\ffxrrlr.exec:\ffxrrlr.exe153⤵PID:1016
-
\??\c:\tnbbtt.exec:\tnbbtt.exe154⤵PID:2724
-
\??\c:\bhthbb.exec:\bhthbb.exe155⤵PID:2140
-
\??\c:\lrllrxr.exec:\lrllrxr.exe156⤵PID:2128
-
\??\c:\frffxxx.exec:\frffxxx.exe157⤵PID:4680
-
\??\c:\thnnhn.exec:\thnnhn.exe158⤵PID:2964
-
\??\c:\nbhbnn.exec:\nbhbnn.exe159⤵PID:3492
-
\??\c:\ddjdd.exec:\ddjdd.exe160⤵PID:4736
-
\??\c:\pjjdv.exec:\pjjdv.exe161⤵PID:2984
-
\??\c:\lffxrrl.exec:\lffxrrl.exe162⤵PID:4476
-
\??\c:\fxlfxfl.exec:\fxlfxfl.exe163⤵PID:4592
-
\??\c:\ttnnnn.exec:\ttnnnn.exe164⤵PID:3660
-
\??\c:\tnnhtb.exec:\tnnhtb.exe165⤵PID:3576
-
\??\c:\dpjdv.exec:\dpjdv.exe166⤵PID:1816
-
\??\c:\jdpjv.exec:\jdpjv.exe167⤵PID:4220
-
\??\c:\xxrrrrl.exec:\xxrrrrl.exe168⤵PID:428
-
\??\c:\flxxrxr.exec:\flxxrxr.exe169⤵PID:2372
-
\??\c:\tnnhbb.exec:\tnnhbb.exe170⤵PID:2200
-
\??\c:\tbbbtt.exec:\tbbbtt.exe171⤵PID:1088
-
\??\c:\pddvp.exec:\pddvp.exe172⤵PID:4332
-
\??\c:\vjjdp.exec:\vjjdp.exe173⤵PID:4472
-
\??\c:\pjpjv.exec:\pjpjv.exe174⤵PID:4804
-
\??\c:\3xrrlll.exec:\3xrrlll.exe175⤵PID:3436
-
\??\c:\ffffxlf.exec:\ffffxlf.exe176⤵PID:4820
-
\??\c:\nnbbhn.exec:\nnbbhn.exe177⤵PID:4416
-
\??\c:\hbthhh.exec:\hbthhh.exe178⤵PID:548
-
\??\c:\dvpjd.exec:\dvpjd.exe179⤵PID:1556
-
\??\c:\dpvvp.exec:\dpvvp.exe180⤵PID:2696
-
\??\c:\xlrlffl.exec:\xlrlffl.exe181⤵PID:4740
-
\??\c:\lrffllr.exec:\lrffllr.exe182⤵PID:1292
-
\??\c:\tntttb.exec:\tntttb.exe183⤵PID:1948
-
\??\c:\thtttt.exec:\thtttt.exe184⤵PID:1180
-
\??\c:\nttttb.exec:\nttttb.exe185⤵PID:3060
-
\??\c:\dvddv.exec:\dvddv.exe186⤵PID:5024
-
\??\c:\vpppj.exec:\vpppj.exe187⤵PID:432
-
\??\c:\rxfxxxx.exec:\rxfxxxx.exe188⤵PID:4576
-
\??\c:\rfffxxx.exec:\rfffxxx.exe189⤵PID:2616
-
\??\c:\fxxlffx.exec:\fxxlffx.exe190⤵PID:4016
-
\??\c:\nbhnhh.exec:\nbhnhh.exe191⤵PID:1148
-
\??\c:\hbhbnn.exec:\hbhbnn.exe192⤵PID:5084
-
\??\c:\dvvpp.exec:\dvvpp.exe193⤵PID:5072
-
\??\c:\vdvdj.exec:\vdvdj.exe194⤵PID:3480
-
\??\c:\vppjj.exec:\vppjj.exe195⤵PID:1432
-
\??\c:\rrrffff.exec:\rrrffff.exe196⤵PID:4844
-
\??\c:\fxxxlrl.exec:\fxxxlrl.exe197⤵PID:2724
-
\??\c:\tntntt.exec:\tntntt.exe198⤵PID:3496
-
\??\c:\bnnhbb.exec:\bnnhbb.exe199⤵PID:32
-
\??\c:\pjjjj.exec:\pjjjj.exe200⤵PID:4680
-
\??\c:\dpdvj.exec:\dpdvj.exe201⤵PID:2964
-
\??\c:\pjjdv.exec:\pjjdv.exe202⤵PID:3492
-
\??\c:\lrrrlff.exec:\lrrrlff.exe203⤵PID:4736
-
\??\c:\lrrlrxr.exec:\lrrlrxr.exe204⤵PID:2984
-
\??\c:\hhtttt.exec:\hhtttt.exe205⤵PID:2688
-
\??\c:\nnnnbh.exec:\nnnnbh.exe206⤵PID:4592
-
\??\c:\pjjdd.exec:\pjjdd.exe207⤵PID:5080
-
\??\c:\lfrrxxl.exec:\lfrrxxl.exe208⤵PID:2428
-
\??\c:\lxfxxrl.exec:\lxfxxrl.exe209⤵PID:1424
-
\??\c:\xrxrrrx.exec:\xrxrrrx.exe210⤵PID:2824
-
\??\c:\tbbtnn.exec:\tbbtnn.exe211⤵PID:4228
-
\??\c:\nhhbtt.exec:\nhhbtt.exe212⤵PID:3164
-
\??\c:\dppvv.exec:\dppvv.exe213⤵PID:4328
-
\??\c:\pvvpj.exec:\pvvpj.exe214⤵PID:3088
-
\??\c:\xflllll.exec:\xflllll.exe215⤵PID:4752
-
\??\c:\lxrxrfx.exec:\lxrxrfx.exe216⤵PID:4560
-
\??\c:\rrrrrll.exec:\rrrrrll.exe217⤵PID:552
-
\??\c:\htttbb.exec:\htttbb.exe218⤵PID:1556
-
\??\c:\hnnnhh.exec:\hnnnhh.exe219⤵PID:2596
-
\??\c:\jdvpp.exec:\jdvpp.exe220⤵PID:3972
-
\??\c:\vdjvv.exec:\vdjvv.exe221⤵PID:1512
-
\??\c:\lfxfxll.exec:\lfxfxll.exe222⤵PID:3060
-
\??\c:\xxllrrx.exec:\xxllrrx.exe223⤵PID:5024
-
\??\c:\frffxxr.exec:\frffxxr.exe224⤵PID:1388
-
\??\c:\tbbhhh.exec:\tbbhhh.exe225⤵PID:668
-
\??\c:\btbbnn.exec:\btbbnn.exe226⤵PID:1164
-
\??\c:\pjjjj.exec:\pjjjj.exe227⤵PID:2836
-
\??\c:\jdvpd.exec:\jdvpd.exe228⤵PID:4348
-
\??\c:\vvvvj.exec:\vvvvj.exe229⤵PID:3948
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe230⤵PID:2336
-
\??\c:\rllxxxx.exec:\rllxxxx.exe231⤵PID:4072
-
\??\c:\hhtttt.exec:\hhtttt.exe232⤵PID:1736
-
\??\c:\hbhhth.exec:\hbhhth.exe233⤵PID:2908
-
\??\c:\ddjjv.exec:\ddjjv.exe234⤵PID:4284
-
\??\c:\vpppd.exec:\vpppd.exe235⤵PID:3064
-
\??\c:\rxxxxff.exec:\rxxxxff.exe236⤵PID:4960
-
\??\c:\xlrrllf.exec:\xlrrllf.exe237⤵PID:3956
-
\??\c:\tnnbbn.exec:\tnnbbn.exe238⤵PID:4376
-
\??\c:\hhntnn.exec:\hhntnn.exe239⤵PID:388
-
\??\c:\jdvpj.exec:\jdvpj.exe240⤵PID:4224
-
\??\c:\ddvvp.exec:\ddvvp.exe241⤵PID:4476
-
\??\c:\lffxlrl.exec:\lffxlrl.exe242⤵PID:4916