Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe
Resource
win7-20240419-en
windows7-x64
6 signatures
150 seconds
General
-
Target
fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe
-
Size
83KB
-
MD5
b4ddb46d8100bdd11086cf319575e052
-
SHA1
2e2efa2b35941ef212d7a320b60c92fe7fa414bd
-
SHA256
fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367
-
SHA512
65bb03a75d317aac20bfc1ac0d919289dc145659fc697967e5c2871d03bf71b83064e63cc3342ce9f0f96a567e05d4179a832ff7dd9eada5585b3823102eb0fa
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIJSLCBCO+HlMO7s0yLP:ymb3NkkiQ3mdBjFIwLMoHW8yLP
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/2260-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1724-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1560-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2704-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3032-21-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3032-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4496-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4116-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2400-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4164-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2852-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2224-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3160-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4788-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5044-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1640-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4068-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2284-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3548-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2420-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/452-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3748-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 27 IoCs
Processes:
resource yara_rule behavioral2/memory/2260-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1724-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1560-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2704-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5012-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3032-20-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4496-48-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4116-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5012-41-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1660-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4004-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2400-84-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4164-90-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2852-102-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2224-108-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3160-114-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4788-120-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5044-133-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1640-138-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4068-144-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2284-150-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3548-156-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4736-174-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4000-180-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2420-185-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/452-198-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3748-204-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
pvjpp.exellfxrrl.exetbbhbh.exetnttnt.exevppjj.exebhnhbt.exe5thntt.exevjvpp.exe3lxxrxx.exe7tttnn.exepdjpj.exejddpj.exe9xfrlfr.exe5hnbtt.exevdpjp.exe5rxrlfx.exe9nbthh.exe9dvvp.exejdvjv.exefxrlfxx.exetnhbtt.exetnbhth.exedvpjd.exerlfxrlx.exethbntt.exe1tbttt.exejdvpj.exefflxrlx.exe7fllrrr.exehtbbhn.exevpvpj.exeppvjd.exelrfrrff.exenhhtht.exehbttnh.exedddvd.exexxxlffx.exe1jvvd.exexllfxrr.exe7xrxrrr.exe3httnt.exenhbtnn.exeppdvj.exeppvpd.exe1lrlxll.exehnnnhh.exenhhbtt.exexlllfff.exetnnnhh.exenthhtt.exedvvpp.exexfxrlff.exelllxllr.exe5nhbtt.exepjvpj.exedvdvj.exerrrfrlf.exehnnnhh.exenhhbtt.exe7jdvd.exerrlffxx.exebnhhbn.exe3tnhtt.exejpvpj.exepid process 1724 pvjpp.exe 3032 llfxrrl.exe 1560 tbbhbh.exe 2704 tnttnt.exe 5012 vppjj.exe 4496 bhnhbt.exe 4116 5thntt.exe 1908 vjvpp.exe 1660 3lxxrxx.exe 4004 7tttnn.exe 2400 pdjpj.exe 4164 jddpj.exe 3972 9xfrlfr.exe 2852 5hnbtt.exe 2224 vdpjp.exe 3160 5rxrlfx.exe 4788 9nbthh.exe 4732 9dvvp.exe 5044 jdvjv.exe 1640 fxrlfxx.exe 4068 tnhbtt.exe 2284 tnbhth.exe 3548 dvpjd.exe 3996 rlfxrlx.exe 944 thbntt.exe 4736 1tbttt.exe 4000 jdvpj.exe 2420 fflxrlx.exe 1868 7fllrrr.exe 452 htbbhn.exe 3748 vpvpj.exe 1852 ppvjd.exe 2872 lrfrrff.exe 2004 nhhtht.exe 3284 hbttnh.exe 2672 dddvd.exe 3724 xxxlffx.exe 4080 1jvvd.exe 4304 xllfxrr.exe 2964 7xrxrrr.exe 4628 3httnt.exe 3068 nhbtnn.exe 2408 ppdvj.exe 2340 ppvpd.exe 4552 1lrlxll.exe 5064 hnnnhh.exe 3900 nhhbtt.exe 388 xlllfff.exe 1896 tnnnhh.exe 3160 nthhtt.exe 4788 dvvpp.exe 4912 xfxrlff.exe 400 lllxllr.exe 1564 5nhbtt.exe 4576 pjvpj.exe 2368 dvdvj.exe 3964 rrrfrlf.exe 3556 hnnnhh.exe 4168 nhhbtt.exe 3996 7jdvd.exe 1420 rrlffxx.exe 4528 bnhhbn.exe 3980 3tnhtt.exe 2424 jpvpj.exe -
Processes:
resource yara_rule behavioral2/memory/2260-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1724-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1560-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2704-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3032-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4116-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4164-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2852-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2224-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3160-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4788-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5044-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1640-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4068-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2284-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3548-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2420-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/452-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3748-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exepvjpp.exellfxrrl.exetbbhbh.exetnttnt.exevppjj.exebhnhbt.exe5thntt.exevjvpp.exe3lxxrxx.exe7tttnn.exepdjpj.exejddpj.exe9xfrlfr.exe5hnbtt.exevdpjp.exe5rxrlfx.exe9nbthh.exe9dvvp.exejdvjv.exefxrlfxx.exetnhbtt.exedescription pid process target process PID 2260 wrote to memory of 1724 2260 fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe pvjpp.exe PID 2260 wrote to memory of 1724 2260 fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe pvjpp.exe PID 2260 wrote to memory of 1724 2260 fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe pvjpp.exe PID 1724 wrote to memory of 3032 1724 pvjpp.exe llfxrrl.exe PID 1724 wrote to memory of 3032 1724 pvjpp.exe llfxrrl.exe PID 1724 wrote to memory of 3032 1724 pvjpp.exe llfxrrl.exe PID 3032 wrote to memory of 1560 3032 llfxrrl.exe tbbhbh.exe PID 3032 wrote to memory of 1560 3032 llfxrrl.exe tbbhbh.exe PID 3032 wrote to memory of 1560 3032 llfxrrl.exe tbbhbh.exe PID 1560 wrote to memory of 2704 1560 tbbhbh.exe tnttnt.exe PID 1560 wrote to memory of 2704 1560 tbbhbh.exe tnttnt.exe PID 1560 wrote to memory of 2704 1560 tbbhbh.exe tnttnt.exe PID 2704 wrote to memory of 5012 2704 tnttnt.exe vppjj.exe PID 2704 wrote to memory of 5012 2704 tnttnt.exe vppjj.exe PID 2704 wrote to memory of 5012 2704 tnttnt.exe vppjj.exe PID 5012 wrote to memory of 4496 5012 vppjj.exe bhnhbt.exe PID 5012 wrote to memory of 4496 5012 vppjj.exe bhnhbt.exe PID 5012 wrote to memory of 4496 5012 vppjj.exe bhnhbt.exe PID 4496 wrote to memory of 4116 4496 bhnhbt.exe 5thntt.exe PID 4496 wrote to memory of 4116 4496 bhnhbt.exe 5thntt.exe PID 4496 wrote to memory of 4116 4496 bhnhbt.exe 5thntt.exe PID 4116 wrote to memory of 1908 4116 5thntt.exe vjvpp.exe PID 4116 wrote to memory of 1908 4116 5thntt.exe vjvpp.exe PID 4116 wrote to memory of 1908 4116 5thntt.exe vjvpp.exe PID 1908 wrote to memory of 1660 1908 vjvpp.exe 3lxxrxx.exe PID 1908 wrote to memory of 1660 1908 vjvpp.exe 3lxxrxx.exe PID 1908 wrote to memory of 1660 1908 vjvpp.exe 3lxxrxx.exe PID 1660 wrote to memory of 4004 1660 3lxxrxx.exe 7tttnn.exe PID 1660 wrote to memory of 4004 1660 3lxxrxx.exe 7tttnn.exe PID 1660 wrote to memory of 4004 1660 3lxxrxx.exe 7tttnn.exe PID 4004 wrote to memory of 2400 4004 7tttnn.exe pdjpj.exe PID 4004 wrote to memory of 2400 4004 7tttnn.exe pdjpj.exe PID 4004 wrote to memory of 2400 4004 7tttnn.exe pdjpj.exe PID 2400 wrote to memory of 4164 2400 pdjpj.exe jddpj.exe PID 2400 wrote to memory of 4164 2400 pdjpj.exe jddpj.exe PID 2400 wrote to memory of 4164 2400 pdjpj.exe jddpj.exe PID 4164 wrote to memory of 3972 4164 jddpj.exe 9xfrlfr.exe PID 4164 wrote to memory of 3972 4164 jddpj.exe 9xfrlfr.exe PID 4164 wrote to memory of 3972 4164 jddpj.exe 9xfrlfr.exe PID 3972 wrote to memory of 2852 3972 9xfrlfr.exe 5hnbtt.exe PID 3972 wrote to memory of 2852 3972 9xfrlfr.exe 5hnbtt.exe PID 3972 wrote to memory of 2852 3972 9xfrlfr.exe 5hnbtt.exe PID 2852 wrote to memory of 2224 2852 5hnbtt.exe vdpjp.exe PID 2852 wrote to memory of 2224 2852 5hnbtt.exe vdpjp.exe PID 2852 wrote to memory of 2224 2852 5hnbtt.exe vdpjp.exe PID 2224 wrote to memory of 3160 2224 vdpjp.exe 5rxrlfx.exe PID 2224 wrote to memory of 3160 2224 vdpjp.exe 5rxrlfx.exe PID 2224 wrote to memory of 3160 2224 vdpjp.exe 5rxrlfx.exe PID 3160 wrote to memory of 4788 3160 5rxrlfx.exe 9nbthh.exe PID 3160 wrote to memory of 4788 3160 5rxrlfx.exe 9nbthh.exe PID 3160 wrote to memory of 4788 3160 5rxrlfx.exe 9nbthh.exe PID 4788 wrote to memory of 4732 4788 9nbthh.exe 9dvvp.exe PID 4788 wrote to memory of 4732 4788 9nbthh.exe 9dvvp.exe PID 4788 wrote to memory of 4732 4788 9nbthh.exe 9dvvp.exe PID 4732 wrote to memory of 5044 4732 9dvvp.exe jdvjv.exe PID 4732 wrote to memory of 5044 4732 9dvvp.exe jdvjv.exe PID 4732 wrote to memory of 5044 4732 9dvvp.exe jdvjv.exe PID 5044 wrote to memory of 1640 5044 jdvjv.exe fxrlfxx.exe PID 5044 wrote to memory of 1640 5044 jdvjv.exe fxrlfxx.exe PID 5044 wrote to memory of 1640 5044 jdvjv.exe fxrlfxx.exe PID 1640 wrote to memory of 4068 1640 fxrlfxx.exe tnhbtt.exe PID 1640 wrote to memory of 4068 1640 fxrlfxx.exe tnhbtt.exe PID 1640 wrote to memory of 4068 1640 fxrlfxx.exe tnhbtt.exe PID 4068 wrote to memory of 2284 4068 tnhbtt.exe tnbhth.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe"C:\Users\Admin\AppData\Local\Temp\fa87a83fda00f092e04ed9dcfcf2ea1581cf5531ed1cc1b91a604929d842c367.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\pvjpp.exec:\pvjpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\llfxrrl.exec:\llfxrrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\tbbhbh.exec:\tbbhbh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\tnttnt.exec:\tnttnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\vppjj.exec:\vppjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\bhnhbt.exec:\bhnhbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\5thntt.exec:\5thntt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
\??\c:\vjvpp.exec:\vjvpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\3lxxrxx.exec:\3lxxrxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\7tttnn.exec:\7tttnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\pdjpj.exec:\pdjpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\jddpj.exec:\jddpj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\9xfrlfr.exec:\9xfrlfr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\5hnbtt.exec:\5hnbtt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\vdpjp.exec:\vdpjp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\5rxrlfx.exec:\5rxrlfx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\9nbthh.exec:\9nbthh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\9dvvp.exec:\9dvvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\jdvjv.exec:\jdvjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\fxrlfxx.exec:\fxrlfxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\tnhbtt.exec:\tnhbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\tnbhth.exec:\tnbhth.exe23⤵
- Executes dropped EXE
PID:2284 -
\??\c:\dvpjd.exec:\dvpjd.exe24⤵
- Executes dropped EXE
PID:3548 -
\??\c:\rlfxrlx.exec:\rlfxrlx.exe25⤵
- Executes dropped EXE
PID:3996 -
\??\c:\thbntt.exec:\thbntt.exe26⤵
- Executes dropped EXE
PID:944 -
\??\c:\1tbttt.exec:\1tbttt.exe27⤵
- Executes dropped EXE
PID:4736 -
\??\c:\jdvpj.exec:\jdvpj.exe28⤵
- Executes dropped EXE
PID:4000 -
\??\c:\fflxrlx.exec:\fflxrlx.exe29⤵
- Executes dropped EXE
PID:2420 -
\??\c:\7fllrrr.exec:\7fllrrr.exe30⤵
- Executes dropped EXE
PID:1868 -
\??\c:\htbbhn.exec:\htbbhn.exe31⤵
- Executes dropped EXE
PID:452 -
\??\c:\vpvpj.exec:\vpvpj.exe32⤵
- Executes dropped EXE
PID:3748 -
\??\c:\ppvjd.exec:\ppvjd.exe33⤵
- Executes dropped EXE
PID:1852 -
\??\c:\lrfrrff.exec:\lrfrrff.exe34⤵
- Executes dropped EXE
PID:2872 -
\??\c:\nhhtht.exec:\nhhtht.exe35⤵
- Executes dropped EXE
PID:2004 -
\??\c:\hbttnh.exec:\hbttnh.exe36⤵
- Executes dropped EXE
PID:3284 -
\??\c:\dddvd.exec:\dddvd.exe37⤵
- Executes dropped EXE
PID:2672 -
\??\c:\xxxlffx.exec:\xxxlffx.exe38⤵
- Executes dropped EXE
PID:3724 -
\??\c:\1jvvd.exec:\1jvvd.exe39⤵
- Executes dropped EXE
PID:4080 -
\??\c:\xllfxrr.exec:\xllfxrr.exe40⤵
- Executes dropped EXE
PID:4304 -
\??\c:\7xrxrrr.exec:\7xrxrrr.exe41⤵
- Executes dropped EXE
PID:2964 -
\??\c:\3httnt.exec:\3httnt.exe42⤵
- Executes dropped EXE
PID:4628 -
\??\c:\nhbtnn.exec:\nhbtnn.exe43⤵
- Executes dropped EXE
PID:3068 -
\??\c:\ppdvj.exec:\ppdvj.exe44⤵
- Executes dropped EXE
PID:2408 -
\??\c:\ppvpd.exec:\ppvpd.exe45⤵
- Executes dropped EXE
PID:2340 -
\??\c:\1lrlxll.exec:\1lrlxll.exe46⤵
- Executes dropped EXE
PID:4552 -
\??\c:\hnnnhh.exec:\hnnnhh.exe47⤵
- Executes dropped EXE
PID:5064 -
\??\c:\nhhbtt.exec:\nhhbtt.exe48⤵
- Executes dropped EXE
PID:3900 -
\??\c:\xlllfff.exec:\xlllfff.exe49⤵
- Executes dropped EXE
PID:388 -
\??\c:\tnnnhh.exec:\tnnnhh.exe50⤵
- Executes dropped EXE
PID:1896 -
\??\c:\nthhtt.exec:\nthhtt.exe51⤵
- Executes dropped EXE
PID:3160 -
\??\c:\dvvpp.exec:\dvvpp.exe52⤵
- Executes dropped EXE
PID:4788 -
\??\c:\xfxrlff.exec:\xfxrlff.exe53⤵
- Executes dropped EXE
PID:4912 -
\??\c:\lllxllr.exec:\lllxllr.exe54⤵
- Executes dropped EXE
PID:400 -
\??\c:\5nhbtt.exec:\5nhbtt.exe55⤵
- Executes dropped EXE
PID:1564 -
\??\c:\pjvpj.exec:\pjvpj.exe56⤵
- Executes dropped EXE
PID:4576 -
\??\c:\dvdvj.exec:\dvdvj.exe57⤵
- Executes dropped EXE
PID:2368 -
\??\c:\rrrfrlf.exec:\rrrfrlf.exe58⤵
- Executes dropped EXE
PID:3964 -
\??\c:\hnnnhh.exec:\hnnnhh.exe59⤵
- Executes dropped EXE
PID:3556 -
\??\c:\nhhbtt.exec:\nhhbtt.exe60⤵
- Executes dropped EXE
PID:4168 -
\??\c:\7jdvd.exec:\7jdvd.exe61⤵
- Executes dropped EXE
PID:3996 -
\??\c:\rrlffxx.exec:\rrlffxx.exe62⤵
- Executes dropped EXE
PID:1420 -
\??\c:\bnhhbn.exec:\bnhhbn.exe63⤵
- Executes dropped EXE
PID:4528 -
\??\c:\3tnhtt.exec:\3tnhtt.exe64⤵
- Executes dropped EXE
PID:3980 -
\??\c:\jpvpj.exec:\jpvpj.exe65⤵
- Executes dropped EXE
PID:2424 -
\??\c:\jvddd.exec:\jvddd.exe66⤵PID:2420
-
\??\c:\rrfxllf.exec:\rrfxllf.exe67⤵PID:4312
-
\??\c:\1bhbhb.exec:\1bhbhb.exe68⤵PID:3720
-
\??\c:\thbtnn.exec:\thbtnn.exe69⤵PID:4924
-
\??\c:\vpjdv.exec:\vpjdv.exe70⤵PID:2260
-
\??\c:\lflfrrf.exec:\lflfrrf.exe71⤵PID:4844
-
\??\c:\1nhbtb.exec:\1nhbtb.exe72⤵PID:4160
-
\??\c:\5dvpd.exec:\5dvpd.exe73⤵PID:2492
-
\??\c:\xlfrlfx.exec:\xlfrlfx.exe74⤵PID:3136
-
\??\c:\1xxlfxx.exec:\1xxlfxx.exe75⤵PID:3960
-
\??\c:\htnhtn.exec:\htnhtn.exe76⤵PID:3932
-
\??\c:\vddvp.exec:\vddvp.exe77⤵PID:4496
-
\??\c:\ddddv.exec:\ddddv.exe78⤵PID:2916
-
\??\c:\fxfffff.exec:\fxfffff.exe79⤵PID:3672
-
\??\c:\nnbtnn.exec:\nnbtnn.exe80⤵PID:5020
-
\??\c:\tbnhbt.exec:\tbnhbt.exe81⤵PID:2400
-
\??\c:\1pvpd.exec:\1pvpd.exe82⤵PID:4856
-
\??\c:\fxfxxxr.exec:\fxfxxxr.exe83⤵PID:4132
-
\??\c:\ntbnnh.exec:\ntbnnh.exe84⤵PID:4760
-
\??\c:\1jdjv.exec:\1jdjv.exe85⤵PID:388
-
\??\c:\xllxxrr.exec:\xllxxrr.exe86⤵PID:1896
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe87⤵PID:1904
-
\??\c:\tbhbtt.exec:\tbhbtt.exe88⤵PID:3084
-
\??\c:\ddvdp.exec:\ddvdp.exe89⤵PID:2352
-
\??\c:\frrfxrx.exec:\frrfxrx.exe90⤵PID:2980
-
\??\c:\bbnnhb.exec:\bbnnhb.exe91⤵PID:4108
-
\??\c:\nnnhtt.exec:\nnnhtt.exe92⤵PID:3248
-
\??\c:\jjjjd.exec:\jjjjd.exe93⤵PID:4576
-
\??\c:\jdjdv.exec:\jdjdv.exe94⤵PID:3988
-
\??\c:\lfrlrll.exec:\lfrlrll.exe95⤵PID:3552
-
\??\c:\bhnbhn.exec:\bhnbhn.exe96⤵PID:4952
-
\??\c:\1tnnhb.exec:\1tnnhb.exe97⤵PID:3400
-
\??\c:\pjjjd.exec:\pjjjd.exe98⤵PID:3584
-
\??\c:\vppjv.exec:\vppjv.exe99⤵PID:4364
-
\??\c:\btnnnn.exec:\btnnnn.exe100⤵PID:5056
-
\??\c:\7hnnhn.exec:\7hnnhn.exe101⤵PID:3456
-
\??\c:\ppdjd.exec:\ppdjd.exe102⤵PID:4332
-
\??\c:\fxrrfll.exec:\fxrrfll.exe103⤵PID:3936
-
\??\c:\flrrxxx.exec:\flrrxxx.exe104⤵PID:1724
-
\??\c:\bbhnbn.exec:\bbhnbn.exe105⤵PID:560
-
\??\c:\7hnhnn.exec:\7hnhnn.exe106⤵PID:1556
-
\??\c:\dpdvv.exec:\dpdvv.exe107⤵PID:516
-
\??\c:\lxrrxfl.exec:\lxrrxfl.exe108⤵PID:1084
-
\??\c:\tnnhht.exec:\tnnhht.exe109⤵PID:3724
-
\??\c:\7bhbnt.exec:\7bhbnt.exe110⤵PID:3960
-
\??\c:\btbbht.exec:\btbbht.exe111⤵PID:4896
-
\??\c:\pjppp.exec:\pjppp.exe112⤵PID:3784
-
\??\c:\pjvvj.exec:\pjvvj.exe113⤵PID:4004
-
\??\c:\ffxxrll.exec:\ffxxrll.exe114⤵PID:2612
-
\??\c:\xrrrlll.exec:\xrrrlll.exe115⤵PID:4428
-
\??\c:\nbnhhh.exec:\nbnhhh.exe116⤵PID:1544
-
\??\c:\bbnhbh.exec:\bbnhbh.exe117⤵PID:3972
-
\??\c:\pvjjv.exec:\pvjjv.exe118⤵PID:3220
-
\??\c:\ddddv.exec:\ddddv.exe119⤵PID:5092
-
\??\c:\7tbbbh.exec:\7tbbbh.exe120⤵PID:1640
-
\??\c:\jpjdj.exec:\jpjdj.exe121⤵PID:1564
-
\??\c:\pjpjd.exec:\pjpjd.exe122⤵PID:4108
-
\??\c:\lrrlllf.exec:\lrrlllf.exe123⤵PID:4508
-
\??\c:\hhtthh.exec:\hhtthh.exe124⤵PID:3548
-
\??\c:\9dppj.exec:\9dppj.exe125⤵PID:5116
-
\??\c:\lxlfxxl.exec:\lxlfxxl.exe126⤵PID:1884
-
\??\c:\fxrllll.exec:\fxrllll.exe127⤵PID:4864
-
\??\c:\3tbbtt.exec:\3tbbtt.exe128⤵PID:4736
-
\??\c:\vvvvd.exec:\vvvvd.exe129⤵PID:4036
-
\??\c:\dddvp.exec:\dddvp.exe130⤵PID:4400
-
\??\c:\xllfxxr.exec:\xllfxxr.exe131⤵PID:2908
-
\??\c:\fflfllx.exec:\fflfllx.exe132⤵PID:2420
-
\??\c:\ttbtnn.exec:\ttbtnn.exe133⤵PID:3032
-
\??\c:\hbttnt.exec:\hbttnt.exe134⤵PID:3976
-
\??\c:\pvjjv.exec:\pvjjv.exe135⤵PID:4408
-
\??\c:\fflrxfl.exec:\fflrxfl.exe136⤵PID:1560
-
\??\c:\tntttb.exec:\tntttb.exe137⤵PID:1948
-
\??\c:\vpddd.exec:\vpddd.exe138⤵PID:2972
-
\??\c:\frxrlff.exec:\frxrlff.exe139⤵PID:4116
-
\??\c:\bntnbt.exec:\bntnbt.exe140⤵PID:2604
-
\??\c:\hnthhh.exec:\hnthhh.exe141⤵PID:3928
-
\??\c:\dpppj.exec:\dpppj.exe142⤵PID:3580
-
\??\c:\fxfxrrx.exec:\fxfxrrx.exe143⤵PID:764
-
\??\c:\hbnhhh.exec:\hbnhhh.exe144⤵PID:2612
-
\??\c:\vjpjd.exec:\vjpjd.exe145⤵PID:4996
-
\??\c:\rllfrrl.exec:\rllfrrl.exe146⤵PID:1400
-
\??\c:\ttnttt.exec:\ttnttt.exe147⤵PID:4376
-
\??\c:\nbttnn.exec:\nbttnn.exe148⤵PID:3220
-
\??\c:\jvddv.exec:\jvddv.exe149⤵PID:5092
-
\??\c:\rllfrrr.exec:\rllfrrr.exe150⤵PID:4832
-
\??\c:\nbhntb.exec:\nbhntb.exe151⤵PID:1564
-
\??\c:\jjpvp.exec:\jjpvp.exe152⤵PID:3788
-
\??\c:\ttttnn.exec:\ttttnn.exe153⤵PID:4576
-
\??\c:\tnhbtt.exec:\tnhbtt.exe154⤵PID:3548
-
\??\c:\ddppj.exec:\ddppj.exe155⤵PID:4168
-
\??\c:\lrfxxrx.exec:\lrfxxrx.exe156⤵PID:2812
-
\??\c:\lflfxrl.exec:\lflfxrl.exe157⤵PID:4544
-
\??\c:\7llllll.exec:\7llllll.exe158⤵PID:4364
-
\??\c:\tbhhhh.exec:\tbhhhh.exe159⤵PID:4056
-
\??\c:\bbbbtb.exec:\bbbbtb.exe160⤵PID:4564
-
\??\c:\9jjdv.exec:\9jjdv.exe161⤵PID:2376
-
\??\c:\pdjdv.exec:\pdjdv.exe162⤵PID:2420
-
\??\c:\lffxrrl.exec:\lffxrrl.exe163⤵PID:2336
-
\??\c:\lfffxxx.exec:\lfffxxx.exe164⤵PID:1408
-
\??\c:\tnbtbb.exec:\tnbtbb.exe165⤵PID:4408
-
\??\c:\tnnhbh.exec:\tnnhbh.exe166⤵PID:2952
-
\??\c:\9ddvv.exec:\9ddvv.exe167⤵PID:4304
-
\??\c:\pdjdd.exec:\pdjdd.exe168⤵PID:3068
-
\??\c:\lrlxxxx.exec:\lrlxxxx.exe169⤵PID:5100
-
\??\c:\3lrfxxr.exec:\3lrfxxr.exe170⤵PID:3672
-
\??\c:\7ntttb.exec:\7ntttb.exe171⤵PID:3636
-
\??\c:\nthtnn.exec:\nthtnn.exe172⤵PID:924
-
\??\c:\vvdjd.exec:\vvdjd.exe173⤵PID:3536
-
\??\c:\9dddp.exec:\9dddp.exe174⤵PID:3064
-
\??\c:\frrllll.exec:\frrllll.exe175⤵PID:4732
-
\??\c:\xflffff.exec:\xflffff.exe176⤵PID:4500
-
\??\c:\btbhtt.exec:\btbhtt.exe177⤵PID:2100
-
\??\c:\hhnhtt.exec:\hhnhtt.exe178⤵PID:3192
-
\??\c:\djppj.exec:\djppj.exe179⤵PID:3556
-
\??\c:\pvjdv.exec:\pvjdv.exe180⤵PID:3276
-
\??\c:\frrrlll.exec:\frrrlll.exe181⤵PID:3548
-
\??\c:\rrrlffx.exec:\rrrlffx.exe182⤵PID:2728
-
\??\c:\tnhhhh.exec:\tnhhhh.exe183⤵PID:5032
-
\??\c:\nttnnb.exec:\nttnnb.exe184⤵PID:396
-
\??\c:\pjjdv.exec:\pjjdv.exe185⤵PID:4036
-
\??\c:\dpjjj.exec:\dpjjj.exe186⤵PID:4412
-
\??\c:\xrfrflx.exec:\xrfrflx.exe187⤵PID:3720
-
\??\c:\bntnhh.exec:\bntnhh.exe188⤵PID:4924
-
\??\c:\jpvvp.exec:\jpvvp.exe189⤵PID:3032
-
\??\c:\jvvpp.exec:\jvvpp.exe190⤵PID:2872
-
\??\c:\9lffxxf.exec:\9lffxxf.exe191⤵PID:5000
-
\??\c:\nnnnnh.exec:\nnnnnh.exe192⤵PID:440
-
\??\c:\7djjv.exec:\7djjv.exe193⤵PID:3968
-
\??\c:\frlllff.exec:\frlllff.exe194⤵PID:4496
-
\??\c:\xrfllll.exec:\xrfllll.exe195⤵PID:3068
-
\??\c:\bnbttt.exec:\bnbttt.exe196⤵PID:1524
-
\??\c:\pjvvj.exec:\pjvvj.exe197⤵PID:4936
-
\??\c:\1frfffx.exec:\1frfffx.exe198⤵PID:4252
-
\??\c:\7hhbtt.exec:\7hhbtt.exe199⤵PID:924
-
\??\c:\1tbtbb.exec:\1tbtbb.exe200⤵PID:3536
-
\??\c:\ddjjv.exec:\ddjjv.exe201⤵PID:5012
-
\??\c:\lrrlfff.exec:\lrrlfff.exe202⤵PID:4844
-
\??\c:\3tttnn.exec:\3tttnn.exe203⤵PID:3196
-
\??\c:\djjdv.exec:\djjdv.exe204⤵PID:4244
-
\??\c:\lrflrlx.exec:\lrflrlx.exe205⤵PID:4744
-
\??\c:\btbhnh.exec:\btbhnh.exe206⤵PID:3680
-
\??\c:\bhhhtb.exec:\bhhhtb.exe207⤵PID:4952
-
\??\c:\jdjjj.exec:\jdjjj.exe208⤵PID:4240
-
\??\c:\jddjj.exec:\jddjj.exe209⤵PID:3452
-
\??\c:\llfxrrl.exec:\llfxrrl.exe210⤵PID:2016
-
\??\c:\xrxxxxx.exec:\xrxxxxx.exe211⤵PID:5032
-
\??\c:\5thhbb.exec:\5thhbb.exe212⤵PID:2424
-
\??\c:\nhbbbb.exec:\nhbbbb.exe213⤵PID:3936
-
\??\c:\1vddv.exec:\1vddv.exe214⤵PID:3120
-
\??\c:\dvjdj.exec:\dvjdj.exe215⤵PID:4160
-
\??\c:\xrrrlrr.exec:\xrrrlrr.exe216⤵PID:4016
-
\??\c:\frrrlll.exec:\frrrlll.exe217⤵PID:1560
-
\??\c:\rrllffx.exec:\rrllffx.exe218⤵PID:4828
-
\??\c:\bttnhh.exec:\bttnhh.exe219⤵PID:2916
-
\??\c:\9vjdd.exec:\9vjdd.exe220⤵PID:4868
-
\??\c:\3jppp.exec:\3jppp.exe221⤵PID:4496
-
\??\c:\dvvpp.exec:\dvvpp.exe222⤵PID:1880
-
\??\c:\rlrxrrx.exec:\rlrxrrx.exe223⤵PID:4960
-
\??\c:\xlfxxlf.exec:\xlfxxlf.exe224⤵PID:2612
-
\??\c:\ttnbbb.exec:\ttnbbb.exe225⤵PID:4996
-
\??\c:\ntbttn.exec:\ntbttn.exe226⤵PID:2352
-
\??\c:\5jjjv.exec:\5jjjv.exe227⤵PID:1508
-
\??\c:\jjddv.exec:\jjddv.exe228⤵PID:2828
-
\??\c:\1rrxrrr.exec:\1rrxrrr.exe229⤵PID:3196
-
\??\c:\xrrrlxx.exec:\xrrrlxx.exe230⤵PID:4244
-
\??\c:\xrrrlxx.exec:\xrrrlxx.exe231⤵PID:4508
-
\??\c:\bbhbnn.exec:\bbhbnn.exe232⤵PID:3680
-
\??\c:\tbbbtb.exec:\tbbbtb.exe233⤵PID:4112
-
\??\c:\ddjjd.exec:\ddjjd.exe234⤵PID:4240
-
\??\c:\ddvpp.exec:\ddvpp.exe235⤵PID:2276
-
\??\c:\fxrlllf.exec:\fxrlllf.exe236⤵PID:396
-
\??\c:\fxxrxxx.exec:\fxxrxxx.exe237⤵PID:2580
-
\??\c:\3tthnn.exec:\3tthnn.exe238⤵PID:2192
-
\??\c:\tttthb.exec:\tttthb.exe239⤵PID:2244
-
\??\c:\nnnntt.exec:\nnnntt.exe240⤵PID:2336
-
\??\c:\9djdd.exec:\9djdd.exe241⤵PID:4160
-
\??\c:\jjjjj.exec:\jjjjj.exe242⤵PID:3724