Analysis
-
max time kernel
150s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 21:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe
Resource
win7-20240419-en
windows7-x64
6 signatures
150 seconds
General
-
Target
477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe
-
Size
75KB
-
MD5
01a7ecd015482a7aeac6aacc76e1957a
-
SHA1
550d7b996f3ed32f2b38210d6e1f04cda13e2360
-
SHA256
477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c
-
SHA512
229bb7a66b1556fdffdff9c280825935a2f48b6a4c93c205428c42354c46fdb7b17f39a949561abd172f71a80526122a3726dce399a4977ae229ce68333de522
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIpWCz+FR4RzWqC5O:ymb3NkkiQ3mdBjFIsIpZ+R4RzWqCM
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/4388-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1444-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3452-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/880-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2516-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3776-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2560-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5036-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2588-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1860-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/844-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2816-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3736-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4468-64-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5008-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1104-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1104-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/720-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4544-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral2/memory/4388-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1444-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4616-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4616-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3452-98-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/880-158-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4912-208-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1960-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2516-194-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3776-182-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2560-178-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5036-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/464-164-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2588-152-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1860-146-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/844-140-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/696-110-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5032-92-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2816-86-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2816-81-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2816-80-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2816-79-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3736-69-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5008-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1104-49-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1104-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1104-43-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1104-42-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/720-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/720-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/720-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/720-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4544-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
5dpdp.exefrxllff.exexllfxxl.exennhtnb.exe9tnhtn.exeppjdv.exepvdjp.exerffrfxr.exexrfxfxr.exe3nhbhb.exedjdpd.exejpjdp.exepvvjv.exerrxllfx.exefxrfrll.exetttnhb.exennhhnn.exejvpjv.exedvvjp.exejdjvp.exellxrffx.exexxxflrx.exetnnthh.exepvpjv.exevppdv.exefxxrfxr.exe1rllllf.exe7hbthh.exetbtnhb.exedppjd.exevppdp.exexfxrfxr.exe1rxrxrl.exefrlffxr.exehnnbnh.exehbnbbt.exe3vpjv.exevjvpp.exe3flxlfx.exefxrfxrl.exetbtbnh.exethbnhh.exevjdvv.exedpvjd.exe7xrfxrl.exexlfxfxr.exe3llxrlx.exenhhbbb.exenhhthh.exe9vdvp.exepvpvj.exefxrxxxl.exexllxfff.exe1flfxrf.exenhhbth.exebtbtbb.exehhbthh.exedpvpv.exevvvjp.exe9ffrfxl.exexxrfxrf.exenbbtnh.exebtthnn.exevpddp.exepid process 1444 5dpdp.exe 4544 frxllff.exe 4616 xllfxxl.exe 720 nnhtnb.exe 1104 9tnhtn.exe 5008 ppjdv.exe 4468 pvdjp.exe 3736 rffrfxr.exe 4356 xrfxfxr.exe 2816 3nhbhb.exe 5032 djdpd.exe 3452 jpjdp.exe 3112 pvvjv.exe 696 rrxllfx.exe 2500 fxrfrll.exe 4380 tttnhb.exe 2772 nnhhnn.exe 4580 jvpjv.exe 844 dvvjp.exe 1860 jdjvp.exe 2588 llxrffx.exe 880 xxxflrx.exe 464 tnnthh.exe 5036 pvpjv.exe 2560 vppdv.exe 3776 fxxrfxr.exe 3504 1rllllf.exe 2516 7hbthh.exe 1960 tbtnhb.exe 4912 dppjd.exe 3108 vppdp.exe 4480 xfxrfxr.exe 216 1rxrxrl.exe 4304 frlffxr.exe 4752 hnnbnh.exe 1444 hbnbbt.exe 4056 3vpjv.exe 1448 vjvpp.exe 3368 3flxlfx.exe 208 fxrfxrl.exe 2660 tbtbnh.exe 4468 thbnhh.exe 3040 vjdvv.exe 2028 dpvjd.exe 4148 7xrfxrl.exe 2860 xlfxfxr.exe 4768 3llxrlx.exe 3124 nhhbbb.exe 4776 nhhthh.exe 4712 9vdvp.exe 4548 pvpvj.exe 4564 fxrxxxl.exe 3204 xllxfff.exe 4408 1flfxrf.exe 2512 nhhbth.exe 4580 btbtbb.exe 1952 hhbthh.exe 620 dpvpv.exe 4256 vvvjp.exe 1536 9ffrfxl.exe 824 xxrfxrf.exe 1588 nbbtnh.exe 5020 btthnn.exe 4396 vpddp.exe -
Processes:
resource yara_rule behavioral2/memory/4388-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1444-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3452-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/880-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2516-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3776-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2560-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/464-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2588-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1860-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2816-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2816-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2816-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2816-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3736-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5008-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/720-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/720-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/720-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/720-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4544-17-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe5dpdp.exefrxllff.exexllfxxl.exennhtnb.exe9tnhtn.exeppjdv.exepvdjp.exerffrfxr.exexrfxfxr.exe3nhbhb.exedjdpd.exejpjdp.exepvvjv.exerrxllfx.exefxrfrll.exetttnhb.exennhhnn.exejvpjv.exedvvjp.exejdjvp.exellxrffx.exedescription pid process target process PID 4388 wrote to memory of 1444 4388 477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe hbnbbt.exe PID 4388 wrote to memory of 1444 4388 477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe hbnbbt.exe PID 4388 wrote to memory of 1444 4388 477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe hbnbbt.exe PID 1444 wrote to memory of 4544 1444 5dpdp.exe frxllff.exe PID 1444 wrote to memory of 4544 1444 5dpdp.exe frxllff.exe PID 1444 wrote to memory of 4544 1444 5dpdp.exe frxllff.exe PID 4544 wrote to memory of 4616 4544 frxllff.exe xllfxxl.exe PID 4544 wrote to memory of 4616 4544 frxllff.exe xllfxxl.exe PID 4544 wrote to memory of 4616 4544 frxllff.exe xllfxxl.exe PID 4616 wrote to memory of 720 4616 xllfxxl.exe nnhtnb.exe PID 4616 wrote to memory of 720 4616 xllfxxl.exe nnhtnb.exe PID 4616 wrote to memory of 720 4616 xllfxxl.exe nnhtnb.exe PID 720 wrote to memory of 1104 720 nnhtnb.exe 9tnhtn.exe PID 720 wrote to memory of 1104 720 nnhtnb.exe 9tnhtn.exe PID 720 wrote to memory of 1104 720 nnhtnb.exe 9tnhtn.exe PID 1104 wrote to memory of 5008 1104 9tnhtn.exe ppjdv.exe PID 1104 wrote to memory of 5008 1104 9tnhtn.exe ppjdv.exe PID 1104 wrote to memory of 5008 1104 9tnhtn.exe ppjdv.exe PID 5008 wrote to memory of 4468 5008 ppjdv.exe pvdjp.exe PID 5008 wrote to memory of 4468 5008 ppjdv.exe pvdjp.exe PID 5008 wrote to memory of 4468 5008 ppjdv.exe pvdjp.exe PID 4468 wrote to memory of 3736 4468 pvdjp.exe rffrfxr.exe PID 4468 wrote to memory of 3736 4468 pvdjp.exe rffrfxr.exe PID 4468 wrote to memory of 3736 4468 pvdjp.exe rffrfxr.exe PID 3736 wrote to memory of 4356 3736 rffrfxr.exe xrfxfxr.exe PID 3736 wrote to memory of 4356 3736 rffrfxr.exe xrfxfxr.exe PID 3736 wrote to memory of 4356 3736 rffrfxr.exe xrfxfxr.exe PID 4356 wrote to memory of 2816 4356 xrfxfxr.exe 3nhbhb.exe PID 4356 wrote to memory of 2816 4356 xrfxfxr.exe 3nhbhb.exe PID 4356 wrote to memory of 2816 4356 xrfxfxr.exe 3nhbhb.exe PID 2816 wrote to memory of 5032 2816 3nhbhb.exe djdpd.exe PID 2816 wrote to memory of 5032 2816 3nhbhb.exe djdpd.exe PID 2816 wrote to memory of 5032 2816 3nhbhb.exe djdpd.exe PID 5032 wrote to memory of 3452 5032 djdpd.exe jpjdp.exe PID 5032 wrote to memory of 3452 5032 djdpd.exe jpjdp.exe PID 5032 wrote to memory of 3452 5032 djdpd.exe jpjdp.exe PID 3452 wrote to memory of 3112 3452 jpjdp.exe pvvjv.exe PID 3452 wrote to memory of 3112 3452 jpjdp.exe pvvjv.exe PID 3452 wrote to memory of 3112 3452 jpjdp.exe pvvjv.exe PID 3112 wrote to memory of 696 3112 pvvjv.exe rrxllfx.exe PID 3112 wrote to memory of 696 3112 pvvjv.exe rrxllfx.exe PID 3112 wrote to memory of 696 3112 pvvjv.exe rrxllfx.exe PID 696 wrote to memory of 2500 696 rrxllfx.exe fxrfrll.exe PID 696 wrote to memory of 2500 696 rrxllfx.exe fxrfrll.exe PID 696 wrote to memory of 2500 696 rrxllfx.exe fxrfrll.exe PID 2500 wrote to memory of 4380 2500 fxrfrll.exe tttnhb.exe PID 2500 wrote to memory of 4380 2500 fxrfrll.exe tttnhb.exe PID 2500 wrote to memory of 4380 2500 fxrfrll.exe tttnhb.exe PID 4380 wrote to memory of 2772 4380 tttnhb.exe nnhhnn.exe PID 4380 wrote to memory of 2772 4380 tttnhb.exe nnhhnn.exe PID 4380 wrote to memory of 2772 4380 tttnhb.exe nnhhnn.exe PID 2772 wrote to memory of 4580 2772 nnhhnn.exe jvpjv.exe PID 2772 wrote to memory of 4580 2772 nnhhnn.exe jvpjv.exe PID 2772 wrote to memory of 4580 2772 nnhhnn.exe jvpjv.exe PID 4580 wrote to memory of 844 4580 jvpjv.exe dvvjp.exe PID 4580 wrote to memory of 844 4580 jvpjv.exe dvvjp.exe PID 4580 wrote to memory of 844 4580 jvpjv.exe dvvjp.exe PID 844 wrote to memory of 1860 844 dvvjp.exe jdjvp.exe PID 844 wrote to memory of 1860 844 dvvjp.exe jdjvp.exe PID 844 wrote to memory of 1860 844 dvvjp.exe jdjvp.exe PID 1860 wrote to memory of 2588 1860 jdjvp.exe llxrffx.exe PID 1860 wrote to memory of 2588 1860 jdjvp.exe llxrffx.exe PID 1860 wrote to memory of 2588 1860 jdjvp.exe llxrffx.exe PID 2588 wrote to memory of 880 2588 llxrffx.exe xxxflrx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe"C:\Users\Admin\AppData\Local\Temp\477387a14485a87d7e23cec854917a6c0701a8465dc7164c87f9846ed9a20f4c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
\??\c:\5dpdp.exec:\5dpdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
\??\c:\frxllff.exec:\frxllff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\xllfxxl.exec:\xllfxxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\nnhtnb.exec:\nnhtnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:720 -
\??\c:\9tnhtn.exec:\9tnhtn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\ppjdv.exec:\ppjdv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\pvdjp.exec:\pvdjp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
\??\c:\rffrfxr.exec:\rffrfxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\xrfxfxr.exec:\xrfxfxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\3nhbhb.exec:\3nhbhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\djdpd.exec:\djdpd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\jpjdp.exec:\jpjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
\??\c:\pvvjv.exec:\pvvjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
\??\c:\rrxllfx.exec:\rrxllfx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\fxrfrll.exec:\fxrfrll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\tttnhb.exec:\tttnhb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
\??\c:\nnhhnn.exec:\nnhhnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\jvpjv.exec:\jvpjv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\dvvjp.exec:\dvvjp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
\??\c:\jdjvp.exec:\jdjvp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\llxrffx.exec:\llxrffx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\xxxflrx.exec:\xxxflrx.exe23⤵
- Executes dropped EXE
PID:880 -
\??\c:\tnnthh.exec:\tnnthh.exe24⤵
- Executes dropped EXE
PID:464 -
\??\c:\pvpjv.exec:\pvpjv.exe25⤵
- Executes dropped EXE
PID:5036 -
\??\c:\vppdv.exec:\vppdv.exe26⤵
- Executes dropped EXE
PID:2560 -
\??\c:\fxxrfxr.exec:\fxxrfxr.exe27⤵
- Executes dropped EXE
PID:3776 -
\??\c:\1rllllf.exec:\1rllllf.exe28⤵
- Executes dropped EXE
PID:3504 -
\??\c:\7hbthh.exec:\7hbthh.exe29⤵
- Executes dropped EXE
PID:2516 -
\??\c:\tbtnhb.exec:\tbtnhb.exe30⤵
- Executes dropped EXE
PID:1960 -
\??\c:\dppjd.exec:\dppjd.exe31⤵
- Executes dropped EXE
PID:4912 -
\??\c:\vppdp.exec:\vppdp.exe32⤵
- Executes dropped EXE
PID:3108 -
\??\c:\xfxrfxr.exec:\xfxrfxr.exe33⤵
- Executes dropped EXE
PID:4480 -
\??\c:\1rxrxrl.exec:\1rxrxrl.exe34⤵
- Executes dropped EXE
PID:216 -
\??\c:\frlffxr.exec:\frlffxr.exe35⤵
- Executes dropped EXE
PID:4304 -
\??\c:\hnnbnh.exec:\hnnbnh.exe36⤵
- Executes dropped EXE
PID:4752 -
\??\c:\hbnbbt.exec:\hbnbbt.exe37⤵
- Executes dropped EXE
PID:1444 -
\??\c:\3vpjv.exec:\3vpjv.exe38⤵
- Executes dropped EXE
PID:4056 -
\??\c:\vjvpp.exec:\vjvpp.exe39⤵
- Executes dropped EXE
PID:1448 -
\??\c:\3flxlfx.exec:\3flxlfx.exe40⤵
- Executes dropped EXE
PID:3368 -
\??\c:\fxrfxrl.exec:\fxrfxrl.exe41⤵
- Executes dropped EXE
PID:208 -
\??\c:\tbtbnh.exec:\tbtbnh.exe42⤵
- Executes dropped EXE
PID:2660 -
\??\c:\thbnhh.exec:\thbnhh.exe43⤵
- Executes dropped EXE
PID:4468 -
\??\c:\vjdvv.exec:\vjdvv.exe44⤵
- Executes dropped EXE
PID:3040 -
\??\c:\dpvjd.exec:\dpvjd.exe45⤵
- Executes dropped EXE
PID:2028 -
\??\c:\7xrfxrl.exec:\7xrfxrl.exe46⤵
- Executes dropped EXE
PID:4148 -
\??\c:\xlfxfxr.exec:\xlfxfxr.exe47⤵
- Executes dropped EXE
PID:2860 -
\??\c:\3llxrlx.exec:\3llxrlx.exe48⤵
- Executes dropped EXE
PID:4768 -
\??\c:\nhhbbb.exec:\nhhbbb.exe49⤵
- Executes dropped EXE
PID:3124 -
\??\c:\nhhthh.exec:\nhhthh.exe50⤵
- Executes dropped EXE
PID:4776 -
\??\c:\9vdvp.exec:\9vdvp.exe51⤵
- Executes dropped EXE
PID:4712 -
\??\c:\pvpvj.exec:\pvpvj.exe52⤵
- Executes dropped EXE
PID:4548 -
\??\c:\fxrxxxl.exec:\fxrxxxl.exe53⤵
- Executes dropped EXE
PID:4564 -
\??\c:\xllxfff.exec:\xllxfff.exe54⤵
- Executes dropped EXE
PID:3204 -
\??\c:\1flfxrf.exec:\1flfxrf.exe55⤵
- Executes dropped EXE
PID:4408 -
\??\c:\nhhbth.exec:\nhhbth.exe56⤵
- Executes dropped EXE
PID:2512 -
\??\c:\btbtbb.exec:\btbtbb.exe57⤵
- Executes dropped EXE
PID:4580 -
\??\c:\hhbthh.exec:\hhbthh.exe58⤵
- Executes dropped EXE
PID:1952 -
\??\c:\dpvpv.exec:\dpvpv.exe59⤵
- Executes dropped EXE
PID:620 -
\??\c:\vvvjp.exec:\vvvjp.exe60⤵
- Executes dropped EXE
PID:4256 -
\??\c:\9ffrfxl.exec:\9ffrfxl.exe61⤵
- Executes dropped EXE
PID:1536 -
\??\c:\xxrfxrf.exec:\xxrfxrf.exe62⤵
- Executes dropped EXE
PID:824 -
\??\c:\nbbtnh.exec:\nbbtnh.exe63⤵
- Executes dropped EXE
PID:1588 -
\??\c:\btthnn.exec:\btthnn.exe64⤵
- Executes dropped EXE
PID:5020 -
\??\c:\vpddp.exec:\vpddp.exe65⤵
- Executes dropped EXE
PID:4396 -
\??\c:\9vpdj.exec:\9vpdj.exe66⤵PID:4604
-
\??\c:\3fxrlrf.exec:\3fxrlrf.exe67⤵PID:4352
-
\??\c:\3rlxrrx.exec:\3rlxrrx.exe68⤵PID:1912
-
\??\c:\1xrlxrl.exec:\1xrlxrl.exe69⤵PID:4736
-
\??\c:\nbhbtn.exec:\nbhbtn.exe70⤵PID:4100
-
\??\c:\nbhbbt.exec:\nbhbbt.exe71⤵PID:2304
-
\??\c:\jddvd.exec:\jddvd.exe72⤵PID:1896
-
\??\c:\dppdv.exec:\dppdv.exe73⤵PID:640
-
\??\c:\pjdpd.exec:\pjdpd.exe74⤵PID:3424
-
\??\c:\xllxlfx.exec:\xllxlfx.exe75⤵PID:332
-
\??\c:\frxlxrx.exec:\frxlxrx.exe76⤵PID:1620
-
\??\c:\hbbttn.exec:\hbbttn.exe77⤵PID:2164
-
\??\c:\ttbbtn.exec:\ttbbtn.exe78⤵PID:4752
-
\??\c:\jddpd.exec:\jddpd.exe79⤵PID:8
-
\??\c:\jdjvd.exec:\jdjvd.exe80⤵PID:1576
-
\??\c:\3fxrflx.exec:\3fxrflx.exe81⤵PID:3264
-
\??\c:\lxrllfl.exec:\lxrllfl.exe82⤵PID:2392
-
\??\c:\frrfrlx.exec:\frrfrlx.exe83⤵PID:3468
-
\??\c:\nhbnhh.exec:\nhbnhh.exe84⤵PID:4840
-
\??\c:\tttnbb.exec:\tttnbb.exe85⤵PID:1828
-
\??\c:\tbbbtt.exec:\tbbbtt.exe86⤵PID:4236
-
\??\c:\vvjdp.exec:\vvjdp.exe87⤵PID:2028
-
\??\c:\7vvdd.exec:\7vvdd.exe88⤵PID:2400
-
\??\c:\rfrlxxl.exec:\rfrlxxl.exe89⤵PID:3656
-
\??\c:\lffxrrr.exec:\lffxrrr.exe90⤵PID:5032
-
\??\c:\nbbtnh.exec:\nbbtnh.exe91⤵PID:3528
-
\??\c:\bnhhhn.exec:\bnhhhn.exe92⤵PID:4716
-
\??\c:\nhhbnh.exec:\nhhbnh.exe93⤵PID:696
-
\??\c:\jjpdp.exec:\jjpdp.exe94⤵PID:3516
-
\??\c:\1vdpd.exec:\1vdpd.exe95⤵PID:2780
-
\??\c:\pjjvj.exec:\pjjvj.exe96⤵PID:2008
-
\??\c:\rrfrlfx.exec:\rrfrlfx.exe97⤵PID:1036
-
\??\c:\rrrlllf.exec:\rrrlllf.exe98⤵PID:4600
-
\??\c:\llfffrl.exec:\llfffrl.exe99⤵PID:3684
-
\??\c:\hnbbtt.exec:\hnbbtt.exe100⤵PID:3064
-
\??\c:\9htnnh.exec:\9htnnh.exe101⤵PID:2732
-
\??\c:\pjjvp.exec:\pjjvp.exe102⤵PID:1932
-
\??\c:\ppjvp.exec:\ppjvp.exe103⤵PID:2556
-
\??\c:\vdvvp.exec:\vdvvp.exe104⤵PID:880
-
\??\c:\3jjdj.exec:\3jjdj.exe105⤵PID:824
-
\??\c:\xrrlxrx.exec:\xrrlxrx.exe106⤵PID:4500
-
\??\c:\llllffx.exec:\llllffx.exe107⤵PID:2152
-
\??\c:\9lrlrrr.exec:\9lrlrrr.exe108⤵PID:2560
-
\??\c:\bntnbt.exec:\bntnbt.exe109⤵PID:3776
-
\??\c:\bbtnhb.exec:\bbtnhb.exe110⤵PID:3572
-
\??\c:\htnbnh.exec:\htnbnh.exe111⤵PID:3768
-
\??\c:\pvpvp.exec:\pvpvp.exe112⤵PID:4316
-
\??\c:\vvdvp.exec:\vvdvp.exe113⤵PID:3888
-
\??\c:\fxrlxxl.exec:\fxrlxxl.exe114⤵PID:1340
-
\??\c:\frfxffr.exec:\frfxffr.exe115⤵PID:4912
-
\??\c:\xxxxxxr.exec:\xxxxxxr.exe116⤵PID:2592
-
\??\c:\ttnhtt.exec:\ttnhtt.exe117⤵PID:4384
-
\??\c:\tnhhbn.exec:\tnhhbn.exe118⤵PID:2160
-
\??\c:\tbnhtn.exec:\tbnhtn.exe119⤵PID:4180
-
\??\c:\vvvvp.exec:\vvvvp.exe120⤵PID:2332
-
\??\c:\dvjvp.exec:\dvjvp.exe121⤵PID:2164
-
\??\c:\flfrfxr.exec:\flfrfxr.exe122⤵PID:3724
-
\??\c:\frrllff.exec:\frrllff.exe123⤵PID:1848
-
\??\c:\xfxlxxr.exec:\xfxlxxr.exe124⤵PID:3368
-
\??\c:\nttnhb.exec:\nttnhb.exe125⤵PID:5008
-
\??\c:\tbttbb.exec:\tbttbb.exe126⤵PID:3056
-
\??\c:\nbhhbb.exec:\nbhhbb.exe127⤵PID:4704
-
\??\c:\dvvjp.exec:\dvvjp.exe128⤵PID:2064
-
\??\c:\vjjdj.exec:\vjjdj.exe129⤵PID:3232
-
\??\c:\pjdpd.exec:\pjdpd.exe130⤵PID:4248
-
\??\c:\rlrlrrr.exec:\rlrlrrr.exe131⤵PID:2644
-
\??\c:\xrfxrrf.exec:\xrfxrrf.exe132⤵PID:3764
-
\??\c:\rfffflf.exec:\rfffflf.exe133⤵PID:660
-
\??\c:\djjvp.exec:\djjvp.exe134⤵PID:5032
-
\??\c:\lxxrfxr.exec:\lxxrfxr.exe135⤵PID:4888
-
\??\c:\xxrllfx.exec:\xxrllfx.exe136⤵PID:1012
-
\??\c:\tntnnn.exec:\tntnnn.exe137⤵PID:4472
-
\??\c:\9hhbbb.exec:\9hhbbb.exe138⤵PID:2376
-
\??\c:\hnnhbb.exec:\hnnhbb.exe139⤵PID:4380
-
\??\c:\djvpp.exec:\djvpp.exe140⤵PID:2772
-
\??\c:\vpppv.exec:\vpppv.exe141⤵PID:4408
-
\??\c:\xrlrlfx.exec:\xrlrlfx.exe142⤵PID:4488
-
\??\c:\fxlffxr.exec:\fxlffxr.exe143⤵PID:2572
-
\??\c:\fxxxffx.exec:\fxxxffx.exe144⤵PID:4132
-
\??\c:\7hnhtn.exec:\7hnhtn.exe145⤵PID:3252
-
\??\c:\bhhbhh.exec:\bhhbhh.exe146⤵PID:2720
-
\??\c:\nbhbnn.exec:\nbhbnn.exe147⤵PID:1668
-
\??\c:\5vvpd.exec:\5vvpd.exe148⤵PID:880
-
\??\c:\djpdp.exec:\djpdp.exe149⤵PID:4500
-
\??\c:\1frlfxr.exec:\1frlfxr.exe150⤵PID:3024
-
\??\c:\lrfxrfx.exec:\lrfxrfx.exe151⤵PID:3320
-
\??\c:\btnhbt.exec:\btnhbt.exe152⤵PID:3776
-
\??\c:\9nhbnb.exec:\9nhbnb.exe153⤵PID:2516
-
\??\c:\nnbnnh.exec:\nnbnnh.exe154⤵PID:4868
-
\??\c:\ppvvp.exec:\ppvvp.exe155⤵PID:1960
-
\??\c:\vddpj.exec:\vddpj.exe156⤵PID:4412
-
\??\c:\5ffrfxl.exec:\5ffrfxl.exe157⤵PID:1380
-
\??\c:\lxfxrlf.exec:\lxfxrlf.exe158⤵PID:3392
-
\??\c:\7hnbnh.exec:\7hnbnh.exe159⤵PID:4312
-
\??\c:\nnhbth.exec:\nnhbth.exe160⤵PID:3844
-
\??\c:\thhhtt.exec:\thhhtt.exe161⤵PID:3600
-
\??\c:\jvppj.exec:\jvppj.exe162⤵PID:4004
-
\??\c:\vppjv.exec:\vppjv.exe163⤵PID:3240
-
\??\c:\xrlxlfr.exec:\xrlxlfr.exe164⤵PID:4752
-
\??\c:\9nbbbb.exec:\9nbbbb.exe165⤵PID:4996
-
\??\c:\1nhbtn.exec:\1nhbtn.exe166⤵PID:1752
-
\??\c:\7pjdp.exec:\7pjdp.exe167⤵PID:1848
-
\??\c:\xlrfrlx.exec:\xlrfrlx.exe168⤵PID:3368
-
\??\c:\hhbbnt.exec:\hhbbnt.exe169⤵PID:4524
-
\??\c:\hbthbt.exec:\hbthbt.exe170⤵PID:3056
-
\??\c:\ddvpd.exec:\ddvpd.exe171⤵PID:4080
-
\??\c:\xrxrxrx.exec:\xrxrxrx.exe172⤵PID:4948
-
\??\c:\llfxxrl.exec:\llfxxrl.exe173⤵PID:2880
-
\??\c:\tnbttb.exec:\tnbttb.exe174⤵PID:2876
-
\??\c:\7tbbhh.exec:\7tbbhh.exe175⤵PID:4772
-
\??\c:\pdjvj.exec:\pdjvj.exe176⤵PID:4924
-
\??\c:\jjjvd.exec:\jjjvd.exe177⤵PID:3452
-
\??\c:\xrlxxxx.exec:\xrlxxxx.exe178⤵PID:3112
-
\??\c:\5ffxrrx.exec:\5ffxrrx.exe179⤵PID:2824
-
\??\c:\bttbth.exec:\bttbth.exe180⤵PID:1012
-
\??\c:\hbtthb.exec:\hbtthb.exe181⤵PID:2208
-
\??\c:\djjdd.exec:\djjdd.exe182⤵PID:2444
-
\??\c:\dppvp.exec:\dppvp.exe183⤵PID:3924
-
\??\c:\frrllfl.exec:\frrllfl.exe184⤵PID:3036
-
\??\c:\fllxllx.exec:\fllxllx.exe185⤵PID:3004
-
\??\c:\bhnnbb.exec:\bhnnbb.exe186⤵PID:2540
-
\??\c:\ttnhbb.exec:\ttnhbb.exe187⤵PID:4816
-
\??\c:\1jjdp.exec:\1jjdp.exe188⤵PID:1932
-
\??\c:\1jjdv.exec:\1jjdv.exe189⤵PID:2148
-
\??\c:\dvddd.exec:\dvddd.exe190⤵PID:5036
-
\??\c:\lflflfr.exec:\lflflfr.exe191⤵PID:4396
-
\??\c:\xlfxflr.exec:\xlfxflr.exe192⤵PID:3024
-
\??\c:\nhnhbt.exec:\nhnhbt.exe193⤵PID:4340
-
\??\c:\tttnhn.exec:\tttnhn.exe194⤵PID:2172
-
\??\c:\jjjdp.exec:\jjjdp.exe195⤵PID:2516
-
\??\c:\7vdvp.exec:\7vdvp.exe196⤵PID:2352
-
\??\c:\lxflfrr.exec:\lxflfrr.exe197⤵PID:4224
-
\??\c:\7fxxxfx.exec:\7fxxxfx.exe198⤵PID:4064
-
\??\c:\lfxxxfx.exec:\lfxxxfx.exe199⤵PID:3424
-
\??\c:\nbhbbb.exec:\nbhbbb.exe200⤵PID:3936
-
\??\c:\rlrrrrx.exec:\rlrrrrx.exe201⤵PID:2260
-
\??\c:\rlrrlll.exec:\rlrrlll.exe202⤵PID:4180
-
\??\c:\tbhhhh.exec:\tbhhhh.exe203⤵PID:3240
-
\??\c:\nhbbtb.exec:\nhbbtb.exe204⤵PID:1928
-
\??\c:\5vvdp.exec:\5vvdp.exe205⤵PID:5088
-
\??\c:\1vvjv.exec:\1vvjv.exe206⤵PID:3264
-
\??\c:\3rlfrll.exec:\3rlfrll.exe207⤵PID:208
-
\??\c:\llflrxx.exec:\llflrxx.exe208⤵PID:3608
-
\??\c:\bbhhnn.exec:\bbhhnn.exe209⤵PID:2064
-
\??\c:\5bbbnt.exec:\5bbbnt.exe210⤵PID:3300
-
\??\c:\hhnbth.exec:\hhnbth.exe211⤵PID:404
-
\??\c:\dvvvj.exec:\dvvvj.exe212⤵PID:3656
-
\??\c:\pddvp.exec:\pddvp.exe213⤵PID:2284
-
\??\c:\5lrlfff.exec:\5lrlfff.exe214⤵PID:1772
-
\??\c:\xrrrrrx.exec:\xrrrrrx.exe215⤵PID:636
-
\??\c:\rxfllll.exec:\rxfllll.exe216⤵PID:2236
-
\??\c:\bnnnhh.exec:\bnnnhh.exe217⤵PID:4472
-
\??\c:\ddvvp.exec:\ddvvp.exe218⤵PID:624
-
\??\c:\dvpjj.exec:\dvpjj.exe219⤵PID:1036
-
\??\c:\hbbttt.exec:\hbbttt.exe220⤵PID:4488
-
\??\c:\bttnhh.exec:\bttnhh.exe221⤵PID:2904
-
\??\c:\jpvpp.exec:\jpvpp.exe222⤵PID:1536
-
\??\c:\dvpjv.exec:\dvpjv.exe223⤵PID:2540
-
\??\c:\xlxxrxx.exec:\xlxxrxx.exe224⤵PID:4816
-
\??\c:\7rrllll.exec:\7rrllll.exe225⤵PID:3720
-
\??\c:\jvpjj.exec:\jvpjj.exe226⤵PID:4088
-
\??\c:\btttnb.exec:\btttnb.exe227⤵PID:5036
-
\??\c:\xxfxffl.exec:\xxfxffl.exe228⤵PID:3032
-
\??\c:\jpddv.exec:\jpddv.exe229⤵PID:3024
-
\??\c:\7vvpp.exec:\7vvpp.exe230⤵PID:4520
-
\??\c:\xrlxffr.exec:\xrlxffr.exe231⤵PID:2172
-
\??\c:\nnthnt.exec:\nnthnt.exe232⤵PID:4360
-
\??\c:\tnnbbh.exec:\tnnbbh.exe233⤵PID:3888
-
\??\c:\vddvp.exec:\vddvp.exe234⤵PID:1340
-
\??\c:\3llfxxr.exec:\3llfxxr.exe235⤵PID:972
-
\??\c:\lxrrlrf.exec:\lxrrlrf.exe236⤵PID:712
-
\??\c:\ntthnh.exec:\ntthnh.exe237⤵PID:2260
-
\??\c:\vdvjj.exec:\vdvjj.exe238⤵PID:3688
-
\??\c:\rrxrxxf.exec:\rrxrxxf.exe239⤵PID:4932
-
\??\c:\lllrlrx.exec:\lllrlrx.exe240⤵PID:220
-
\??\c:\hnhbhh.exec:\hnhbhh.exe241⤵PID:2800
-
\??\c:\hbttbn.exec:\hbttbn.exe242⤵PID:4828