Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe
-
Size
95KB
-
MD5
0561b040dd41cc3c0b9cdcd76f4e9480
-
SHA1
cc5478471a7d59bd13f31a91e91a0609123c23ae
-
SHA256
0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d
-
SHA512
1d9aa186bde5ef5c7b8e1876902639ede51b83b4a0c64f7799fe5c04dfef0ff144364c0033fee125178025c75a2401af7f3747de68ca1c9b8385330e09a3d578
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qP1hvZo66Ox4oq2SQwfTQt:ymb3NkkiQ3mdBjFIj+qNhvZuHQY0t
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/1892-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3692-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/876-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2796-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4988-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/676-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5112-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2932-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/380-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2592-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2432-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4800-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4260-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2480-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2976-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1604-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3328-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2412-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1740-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bhhtnn.exejpvpp.exejjpjd.exe7bhbnt.exepvppv.exellffxxx.exebttnbb.exe1bhbtt.exejjpdv.exelxlfxxr.exetnbnth.exedvjdd.exerllfxff.exettbhnh.exefxxrlfx.exetnhbtt.exejvvvd.exetbhnhh.exedvvvj.exepvjvd.exerfffxxx.exenhhhbb.exetthtth.exelrxrllf.exe1rxxffl.exebhhbtn.exe9jdvp.exelffxrff.exettbhbb.exe9hbtnn.exevjdvd.exe5llfxxx.exe1thbtt.exethbhbt.exedjjdd.exedvpvj.exerlrllll.exexrrlxxf.exetbbhhn.exedddjd.exefxlrrxx.exelffxrrl.exe5bbbbb.exe3vddp.exeppdvp.exelllrrll.exe7rxrxxx.exebnbbbt.exepjdvp.exe7flfxlf.exerfxxlfr.exetbtnhb.exevpvpp.exevpvpp.exevvdvj.exefxxrlll.exentnthb.exetnntnn.exeddjdv.exepppjv.exe7lfxxxx.exe7lrrllf.exehbbnhn.exenbhbtb.exepid process 876 bhhtnn.exe 3692 jpvpp.exe 2144 jjpjd.exe 2796 7bhbnt.exe 4988 pvppv.exe 676 llffxxx.exe 5112 bttnbb.exe 2672 1bhbtt.exe 2932 jjpdv.exe 3344 lxlfxxr.exe 380 tnbnth.exe 2492 dvjdd.exe 2592 rllfxff.exe 2432 ttbhnh.exe 4800 fxxrlfx.exe 4028 tnhbtt.exe 4260 jvvvd.exe 2480 tbhnhh.exe 4024 dvvvj.exe 1076 pvjvd.exe 1576 rfffxxx.exe 784 nhhhbb.exe 2976 tthtth.exe 3432 lrxrllf.exe 3548 1rxxffl.exe 1604 bhhbtn.exe 3328 9jdvp.exe 2412 lffxrff.exe 2388 ttbhbb.exe 1740 9hbtnn.exe 4436 vjdvd.exe 4336 5llfxxx.exe 628 1thbtt.exe 1412 thbhbt.exe 4180 djjdd.exe 1520 dvpvj.exe 1160 rlrllll.exe 4428 xrrlxxf.exe 2056 tbbhhn.exe 4996 dddjd.exe 2536 fxlrrxx.exe 4960 lffxrrl.exe 1504 5bbbbb.exe 3012 3vddp.exe 660 ppdvp.exe 2068 lllrrll.exe 4648 7rxrxxx.exe 3016 bnbbbt.exe 380 pjdvp.exe 2112 7flfxlf.exe 4408 rfxxlfr.exe 788 tbtnhb.exe 1608 vpvpp.exe 644 vpvpp.exe 2064 vvdvj.exe 4728 fxxrlll.exe 2456 ntnthb.exe 4924 tnntnn.exe 2984 ddjdv.exe 4024 pppjv.exe 1364 7lfxxxx.exe 3976 7lrrllf.exe 4536 hbbnhn.exe 468 nbhbtb.exe -
Processes:
resource yara_rule behavioral2/memory/1892-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/876-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2796-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4988-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/676-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/676-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/676-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/676-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5112-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/380-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2592-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4800-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4260-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2976-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1604-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3328-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2412-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exebhhtnn.exejpvpp.exejjpjd.exe7bhbnt.exepvppv.exellffxxx.exebttnbb.exe1bhbtt.exejjpdv.exelxlfxxr.exetnbnth.exedvjdd.exerllfxff.exettbhnh.exefxxrlfx.exetnhbtt.exejvvvd.exetbhnhh.exedvvvj.exepvjvd.exerfffxxx.exedescription pid process target process PID 1892 wrote to memory of 876 1892 0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe bhhtnn.exe PID 1892 wrote to memory of 876 1892 0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe bhhtnn.exe PID 1892 wrote to memory of 876 1892 0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe bhhtnn.exe PID 876 wrote to memory of 3692 876 bhhtnn.exe jpvpp.exe PID 876 wrote to memory of 3692 876 bhhtnn.exe jpvpp.exe PID 876 wrote to memory of 3692 876 bhhtnn.exe jpvpp.exe PID 3692 wrote to memory of 2144 3692 jpvpp.exe jjpjd.exe PID 3692 wrote to memory of 2144 3692 jpvpp.exe jjpjd.exe PID 3692 wrote to memory of 2144 3692 jpvpp.exe jjpjd.exe PID 2144 wrote to memory of 2796 2144 jjpjd.exe 7bhbnt.exe PID 2144 wrote to memory of 2796 2144 jjpjd.exe 7bhbnt.exe PID 2144 wrote to memory of 2796 2144 jjpjd.exe 7bhbnt.exe PID 2796 wrote to memory of 4988 2796 7bhbnt.exe pvppv.exe PID 2796 wrote to memory of 4988 2796 7bhbnt.exe pvppv.exe PID 2796 wrote to memory of 4988 2796 7bhbnt.exe pvppv.exe PID 4988 wrote to memory of 676 4988 pvppv.exe llffxxx.exe PID 4988 wrote to memory of 676 4988 pvppv.exe llffxxx.exe PID 4988 wrote to memory of 676 4988 pvppv.exe llffxxx.exe PID 676 wrote to memory of 5112 676 llffxxx.exe bttnbb.exe PID 676 wrote to memory of 5112 676 llffxxx.exe bttnbb.exe PID 676 wrote to memory of 5112 676 llffxxx.exe bttnbb.exe PID 5112 wrote to memory of 2672 5112 bttnbb.exe 1bhbtt.exe PID 5112 wrote to memory of 2672 5112 bttnbb.exe 1bhbtt.exe PID 5112 wrote to memory of 2672 5112 bttnbb.exe 1bhbtt.exe PID 2672 wrote to memory of 2932 2672 1bhbtt.exe jjpdv.exe PID 2672 wrote to memory of 2932 2672 1bhbtt.exe jjpdv.exe PID 2672 wrote to memory of 2932 2672 1bhbtt.exe jjpdv.exe PID 2932 wrote to memory of 3344 2932 jjpdv.exe lxlfxxr.exe PID 2932 wrote to memory of 3344 2932 jjpdv.exe lxlfxxr.exe PID 2932 wrote to memory of 3344 2932 jjpdv.exe lxlfxxr.exe PID 3344 wrote to memory of 380 3344 lxlfxxr.exe tnbnth.exe PID 3344 wrote to memory of 380 3344 lxlfxxr.exe tnbnth.exe PID 3344 wrote to memory of 380 3344 lxlfxxr.exe tnbnth.exe PID 380 wrote to memory of 2492 380 tnbnth.exe dvjdd.exe PID 380 wrote to memory of 2492 380 tnbnth.exe dvjdd.exe PID 380 wrote to memory of 2492 380 tnbnth.exe dvjdd.exe PID 2492 wrote to memory of 2592 2492 dvjdd.exe rllfxff.exe PID 2492 wrote to memory of 2592 2492 dvjdd.exe rllfxff.exe PID 2492 wrote to memory of 2592 2492 dvjdd.exe rllfxff.exe PID 2592 wrote to memory of 2432 2592 rllfxff.exe ttbhnh.exe PID 2592 wrote to memory of 2432 2592 rllfxff.exe ttbhnh.exe PID 2592 wrote to memory of 2432 2592 rllfxff.exe ttbhnh.exe PID 2432 wrote to memory of 4800 2432 ttbhnh.exe fxxrlfx.exe PID 2432 wrote to memory of 4800 2432 ttbhnh.exe fxxrlfx.exe PID 2432 wrote to memory of 4800 2432 ttbhnh.exe fxxrlfx.exe PID 4800 wrote to memory of 4028 4800 fxxrlfx.exe tnhbtt.exe PID 4800 wrote to memory of 4028 4800 fxxrlfx.exe tnhbtt.exe PID 4800 wrote to memory of 4028 4800 fxxrlfx.exe tnhbtt.exe PID 4028 wrote to memory of 4260 4028 tnhbtt.exe jvvvd.exe PID 4028 wrote to memory of 4260 4028 tnhbtt.exe jvvvd.exe PID 4028 wrote to memory of 4260 4028 tnhbtt.exe jvvvd.exe PID 4260 wrote to memory of 2480 4260 jvvvd.exe tbhnhh.exe PID 4260 wrote to memory of 2480 4260 jvvvd.exe tbhnhh.exe PID 4260 wrote to memory of 2480 4260 jvvvd.exe tbhnhh.exe PID 2480 wrote to memory of 4024 2480 tbhnhh.exe dvvvj.exe PID 2480 wrote to memory of 4024 2480 tbhnhh.exe dvvvj.exe PID 2480 wrote to memory of 4024 2480 tbhnhh.exe dvvvj.exe PID 4024 wrote to memory of 1076 4024 dvvvj.exe pvjvd.exe PID 4024 wrote to memory of 1076 4024 dvvvj.exe pvjvd.exe PID 4024 wrote to memory of 1076 4024 dvvvj.exe pvjvd.exe PID 1076 wrote to memory of 1576 1076 pvjvd.exe rfffxxx.exe PID 1076 wrote to memory of 1576 1076 pvjvd.exe rfffxxx.exe PID 1076 wrote to memory of 1576 1076 pvjvd.exe rfffxxx.exe PID 1576 wrote to memory of 784 1576 rfffxxx.exe nhhhbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe"C:\Users\Admin\AppData\Local\Temp\0177b60e823930550139e4ff628363c035a1e144592f780b97a30ee8b932078d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\bhhtnn.exec:\bhhtnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\jpvpp.exec:\jpvpp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\jjpjd.exec:\jjpjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\7bhbnt.exec:\7bhbnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\pvppv.exec:\pvppv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
\??\c:\llffxxx.exec:\llffxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\bttnbb.exec:\bttnbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\1bhbtt.exec:\1bhbtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\jjpdv.exec:\jjpdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\lxlfxxr.exec:\lxlfxxr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\tnbnth.exec:\tnbnth.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
\??\c:\dvjdd.exec:\dvjdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\rllfxff.exec:\rllfxff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\ttbhnh.exec:\ttbhnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\fxxrlfx.exec:\fxxrlfx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\tnhbtt.exec:\tnhbtt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\jvvvd.exec:\jvvvd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\tbhnhh.exec:\tbhnhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\dvvvj.exec:\dvvvj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\pvjvd.exec:\pvjvd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\rfffxxx.exec:\rfffxxx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\nhhhbb.exec:\nhhhbb.exe23⤵
- Executes dropped EXE
PID:784 -
\??\c:\tthtth.exec:\tthtth.exe24⤵
- Executes dropped EXE
PID:2976 -
\??\c:\lrxrllf.exec:\lrxrllf.exe25⤵
- Executes dropped EXE
PID:3432 -
\??\c:\1rxxffl.exec:\1rxxffl.exe26⤵
- Executes dropped EXE
PID:3548 -
\??\c:\bhhbtn.exec:\bhhbtn.exe27⤵
- Executes dropped EXE
PID:1604 -
\??\c:\9jdvp.exec:\9jdvp.exe28⤵
- Executes dropped EXE
PID:3328 -
\??\c:\lffxrff.exec:\lffxrff.exe29⤵
- Executes dropped EXE
PID:2412 -
\??\c:\ttbhbb.exec:\ttbhbb.exe30⤵
- Executes dropped EXE
PID:2388 -
\??\c:\9hbtnn.exec:\9hbtnn.exe31⤵
- Executes dropped EXE
PID:1740 -
\??\c:\vjdvd.exec:\vjdvd.exe32⤵
- Executes dropped EXE
PID:4436 -
\??\c:\5llfxxx.exec:\5llfxxx.exe33⤵
- Executes dropped EXE
PID:4336 -
\??\c:\1thbtt.exec:\1thbtt.exe34⤵
- Executes dropped EXE
PID:628 -
\??\c:\thbhbt.exec:\thbhbt.exe35⤵
- Executes dropped EXE
PID:1412 -
\??\c:\djjdd.exec:\djjdd.exe36⤵
- Executes dropped EXE
PID:4180 -
\??\c:\dvpvj.exec:\dvpvj.exe37⤵
- Executes dropped EXE
PID:1520 -
\??\c:\rlrllll.exec:\rlrllll.exe38⤵
- Executes dropped EXE
PID:1160 -
\??\c:\xrrlxxf.exec:\xrrlxxf.exe39⤵
- Executes dropped EXE
PID:4428 -
\??\c:\tbbhhn.exec:\tbbhhn.exe40⤵
- Executes dropped EXE
PID:2056 -
\??\c:\dddjd.exec:\dddjd.exe41⤵
- Executes dropped EXE
PID:4996 -
\??\c:\fxlrrxx.exec:\fxlrrxx.exe42⤵
- Executes dropped EXE
PID:2536 -
\??\c:\lffxrrl.exec:\lffxrrl.exe43⤵
- Executes dropped EXE
PID:4960 -
\??\c:\5bbbbb.exec:\5bbbbb.exe44⤵
- Executes dropped EXE
PID:1504 -
\??\c:\3vddp.exec:\3vddp.exe45⤵
- Executes dropped EXE
PID:3012 -
\??\c:\ppdvp.exec:\ppdvp.exe46⤵
- Executes dropped EXE
PID:660 -
\??\c:\lllrrll.exec:\lllrrll.exe47⤵
- Executes dropped EXE
PID:2068 -
\??\c:\7rxrxxx.exec:\7rxrxxx.exe48⤵
- Executes dropped EXE
PID:4648 -
\??\c:\bnbbbt.exec:\bnbbbt.exe49⤵
- Executes dropped EXE
PID:3016 -
\??\c:\pjdvp.exec:\pjdvp.exe50⤵
- Executes dropped EXE
PID:380 -
\??\c:\7flfxlf.exec:\7flfxlf.exe51⤵
- Executes dropped EXE
PID:2112 -
\??\c:\rfxxlfr.exec:\rfxxlfr.exe52⤵
- Executes dropped EXE
PID:4408 -
\??\c:\tbtnhb.exec:\tbtnhb.exe53⤵
- Executes dropped EXE
PID:788 -
\??\c:\vpvpp.exec:\vpvpp.exe54⤵
- Executes dropped EXE
PID:1608 -
\??\c:\vpvpp.exec:\vpvpp.exe55⤵
- Executes dropped EXE
PID:644 -
\??\c:\vvdvj.exec:\vvdvj.exe56⤵
- Executes dropped EXE
PID:2064 -
\??\c:\fxxrlll.exec:\fxxrlll.exe57⤵
- Executes dropped EXE
PID:4728 -
\??\c:\ntnthb.exec:\ntnthb.exe58⤵
- Executes dropped EXE
PID:2456 -
\??\c:\tnntnn.exec:\tnntnn.exe59⤵
- Executes dropped EXE
PID:4924 -
\??\c:\ddjdv.exec:\ddjdv.exe60⤵
- Executes dropped EXE
PID:2984 -
\??\c:\pppjv.exec:\pppjv.exe61⤵
- Executes dropped EXE
PID:4024 -
\??\c:\7lfxxxx.exec:\7lfxxxx.exe62⤵
- Executes dropped EXE
PID:1364 -
\??\c:\7lrrllf.exec:\7lrrllf.exe63⤵
- Executes dropped EXE
PID:3976 -
\??\c:\hbbnhn.exec:\hbbnhn.exe64⤵
- Executes dropped EXE
PID:4536 -
\??\c:\nbhbtb.exec:\nbhbtb.exe65⤵
- Executes dropped EXE
PID:468 -
\??\c:\djvdp.exec:\djvdp.exe66⤵PID:2976
-
\??\c:\vppjd.exec:\vppjd.exe67⤵PID:776
-
\??\c:\pdjdp.exec:\pdjdp.exe68⤵PID:2436
-
\??\c:\9rlffxx.exec:\9rlffxx.exe69⤵PID:3532
-
\??\c:\flfxrlf.exec:\flfxrlf.exe70⤵PID:4280
-
\??\c:\nthbth.exec:\nthbth.exe71⤵PID:2248
-
\??\c:\vvppj.exec:\vvppj.exe72⤵PID:1248
-
\??\c:\ppvpj.exec:\ppvpj.exe73⤵PID:1356
-
\??\c:\1rrllrl.exec:\1rrllrl.exe74⤵PID:3828
-
\??\c:\frxrfll.exec:\frxrfll.exe75⤵PID:748
-
\??\c:\bhnnnt.exec:\bhnnnt.exe76⤵PID:1740
-
\??\c:\jjjjp.exec:\jjjjp.exe77⤵PID:4852
-
\??\c:\dvvjj.exec:\dvvjj.exe78⤵PID:3760
-
\??\c:\lrrllrr.exec:\lrrllrr.exe79⤵PID:2936
-
\??\c:\lfffffl.exec:\lfffffl.exe80⤵PID:3484
-
\??\c:\nhtntt.exec:\nhtntt.exe81⤵PID:4860
-
\??\c:\dvdvv.exec:\dvdvv.exe82⤵PID:3972
-
\??\c:\jjjdv.exec:\jjjdv.exe83⤵PID:3340
-
\??\c:\jdjdj.exec:\jdjdj.exe84⤵PID:2840
-
\??\c:\1rxrllf.exec:\1rxrllf.exe85⤵PID:4892
-
\??\c:\rflflff.exec:\rflflff.exe86⤵PID:2056
-
\??\c:\jdddj.exec:\jdddj.exe87⤵PID:1640
-
\??\c:\jdvpp.exec:\jdvpp.exe88⤵PID:4544
-
\??\c:\3lrrfrr.exec:\3lrrfrr.exe89⤵PID:2824
-
\??\c:\nhttnn.exec:\nhttnn.exe90⤵PID:3128
-
\??\c:\dvvdj.exec:\dvvdj.exe91⤵PID:760
-
\??\c:\dvvpj.exec:\dvvpj.exe92⤵PID:3344
-
\??\c:\9lfxrrl.exec:\9lfxrrl.exe93⤵PID:636
-
\??\c:\tnbbbt.exec:\tnbbbt.exe94⤵PID:312
-
\??\c:\nhhbtt.exec:\nhhbtt.exe95⤵PID:1172
-
\??\c:\3dddp.exec:\3dddp.exe96⤵PID:4388
-
\??\c:\jdvdv.exec:\jdvdv.exe97⤵PID:548
-
\??\c:\3lrllrr.exec:\3lrllrr.exe98⤵PID:4820
-
\??\c:\5nnhbn.exec:\5nnhbn.exe99⤵PID:4240
-
\??\c:\ththhh.exec:\ththhh.exe100⤵PID:1048
-
\??\c:\ddvvp.exec:\ddvvp.exe101⤵PID:2064
-
\??\c:\xllfrrr.exec:\xllfrrr.exe102⤵PID:1456
-
\??\c:\lflfllf.exec:\lflfllf.exe103⤵PID:4124
-
\??\c:\btnnbb.exec:\btnnbb.exe104⤵PID:384
-
\??\c:\thhbbh.exec:\thhbbh.exe105⤵PID:3684
-
\??\c:\pvpjj.exec:\pvpjj.exe106⤵PID:1904
-
\??\c:\rrlflxx.exec:\rrlflxx.exe107⤵PID:1576
-
\??\c:\lfrlllr.exec:\lfrlllr.exe108⤵PID:4012
-
\??\c:\3bnnhh.exec:\3bnnhh.exe109⤵PID:456
-
\??\c:\hnntnn.exec:\hnntnn.exe110⤵PID:2600
-
\??\c:\dpvpj.exec:\dpvpj.exe111⤵PID:2996
-
\??\c:\ddvpp.exec:\ddvpp.exe112⤵PID:5048
-
\??\c:\frlfxxr.exec:\frlfxxr.exe113⤵PID:2784
-
\??\c:\tnnhnn.exec:\tnnhnn.exe114⤵PID:2364
-
\??\c:\htbtnh.exec:\htbtnh.exe115⤵PID:3752
-
\??\c:\jdjjv.exec:\jdjjv.exe116⤵PID:1156
-
\??\c:\jdvpv.exec:\jdvpv.exe117⤵PID:1572
-
\??\c:\lfrlxxf.exec:\lfrlxxf.exe118⤵PID:3068
-
\??\c:\9vddj.exec:\9vddj.exe119⤵PID:4328
-
\??\c:\xxxrflf.exec:\xxxrflf.exe120⤵PID:4508
-
\??\c:\lfxxfxf.exec:\lfxxfxf.exe121⤵PID:4852
-
\??\c:\bnttbt.exec:\bnttbt.exe122⤵PID:4336
-
\??\c:\dppjv.exec:\dppjv.exe123⤵PID:4660
-
\??\c:\5lrfflf.exec:\5lrfflf.exe124⤵PID:4180
-
\??\c:\3rflxlx.exec:\3rflxlx.exe125⤵PID:1520
-
\??\c:\tnnbnh.exec:\tnnbnh.exe126⤵PID:3972
-
\??\c:\jvddd.exec:\jvddd.exe127⤵PID:4428
-
\??\c:\fffrlfx.exec:\fffrlfx.exe128⤵PID:2840
-
\??\c:\nnnbnb.exec:\nnnbnb.exe129⤵PID:676
-
\??\c:\ttbttn.exec:\ttbttn.exe130⤵PID:2700
-
\??\c:\1pdpp.exec:\1pdpp.exe131⤵PID:3268
-
\??\c:\dddvp.exec:\dddvp.exe132⤵PID:4928
-
\??\c:\lflfxlf.exec:\lflfxlf.exe133⤵PID:4380
-
\??\c:\xxfrlfx.exec:\xxfrlfx.exe134⤵PID:2932
-
\??\c:\btnhbt.exec:\btnhbt.exe135⤵PID:4612
-
\??\c:\vpddv.exec:\vpddv.exe136⤵PID:3700
-
\??\c:\rlxflll.exec:\rlxflll.exe137⤵PID:3416
-
\??\c:\nnbtht.exec:\nnbtht.exe138⤵PID:3780
-
\??\c:\nbhhbb.exec:\nbhhbb.exe139⤵PID:4872
-
\??\c:\pjpjj.exec:\pjpjj.exe140⤵PID:3260
-
\??\c:\dvvdp.exec:\dvvdp.exe141⤵PID:644
-
\??\c:\xlrfxxr.exec:\xlrfxxr.exe142⤵PID:1932
-
\??\c:\lxlxrfx.exec:\lxlxrfx.exe143⤵PID:532
-
\??\c:\btbhtb.exec:\btbhtb.exe144⤵PID:460
-
\??\c:\9bnbtt.exec:\9bnbtt.exe145⤵PID:4124
-
\??\c:\pddvv.exec:\pddvv.exe146⤵PID:384
-
\??\c:\3pvpj.exec:\3pvpj.exe147⤵PID:116
-
\??\c:\llrlfff.exec:\llrlfff.exe148⤵PID:1364
-
\??\c:\bhhthn.exec:\bhhthn.exe149⤵PID:1028
-
\??\c:\pjdpj.exec:\pjdpj.exe150⤵PID:4536
-
\??\c:\dpvpj.exec:\dpvpj.exe151⤵PID:1944
-
\??\c:\rrrrlrr.exec:\rrrrlrr.exe152⤵PID:456
-
\??\c:\xrrlffx.exec:\xrrlffx.exe153⤵PID:440
-
\??\c:\7nnhbb.exec:\7nnhbb.exe154⤵PID:4084
-
\??\c:\tnnhhb.exec:\tnnhhb.exe155⤵PID:5048
-
\??\c:\5jjdv.exec:\5jjdv.exe156⤵PID:452
-
\??\c:\vpvpv.exec:\vpvpv.exe157⤵PID:2364
-
\??\c:\xxxfflr.exec:\xxxfflr.exe158⤵PID:3752
-
\??\c:\nhnbtt.exec:\nhnbtt.exe159⤵PID:3868
-
\??\c:\fxxrrrl.exec:\fxxrrrl.exe160⤵PID:2368
-
\??\c:\frfxfll.exec:\frfxfll.exe161⤵PID:1104
-
\??\c:\hnhbtt.exec:\hnhbtt.exe162⤵PID:4312
-
\??\c:\dpvjp.exec:\dpvjp.exe163⤵PID:4464
-
\??\c:\dddvp.exec:\dddvp.exe164⤵PID:2744
-
\??\c:\rxfxxll.exec:\rxfxxll.exe165⤵PID:3484
-
\??\c:\nhhhhh.exec:\nhhhhh.exe166⤵PID:1552
-
\??\c:\nbbthn.exec:\nbbthn.exe167⤵PID:4664
-
\??\c:\dvpjd.exec:\dvpjd.exe168⤵PID:2684
-
\??\c:\9rxllfx.exec:\9rxllfx.exe169⤵PID:1536
-
\??\c:\hbnnhh.exec:\hbnnhh.exe170⤵PID:2252
-
\??\c:\jdvpv.exec:\jdvpv.exe171⤵PID:4892
-
\??\c:\llrlxrl.exec:\llrlxrl.exe172⤵PID:1504
-
\??\c:\7lrlffx.exec:\7lrlffx.exe173⤵PID:2672
-
\??\c:\tthhnn.exec:\tthhnn.exe174⤵PID:1704
-
\??\c:\3vddv.exec:\3vddv.exe175⤵PID:2932
-
\??\c:\dvvvj.exec:\dvvvj.exe176⤵PID:636
-
\??\c:\fxxxlrr.exec:\fxxxlrr.exe177⤵PID:212
-
\??\c:\rrffxrr.exec:\rrffxrr.exe178⤵PID:3688
-
\??\c:\hnnnhh.exec:\hnnnhh.exe179⤵PID:3100
-
\??\c:\1bbbtt.exec:\1bbbtt.exe180⤵PID:4028
-
\??\c:\vpdvv.exec:\vpdvv.exe181⤵PID:4644
-
\??\c:\pddvj.exec:\pddvj.exe182⤵PID:532
-
\??\c:\5frlrrl.exec:\5frlrrl.exe183⤵PID:2984
-
\??\c:\bbtnnt.exec:\bbtnnt.exe184⤵PID:4672
-
\??\c:\ththtn.exec:\ththtn.exe185⤵PID:2084
-
\??\c:\djjdd.exec:\djjdd.exe186⤵PID:3976
-
\??\c:\jjvvj.exec:\jjvvj.exe187⤵PID:1284
-
\??\c:\lxfrrrl.exec:\lxfrrrl.exe188⤵PID:1148
-
\??\c:\nttnhh.exec:\nttnhh.exe189⤵PID:1944
-
\??\c:\btnhbb.exec:\btnhbb.exe190⤵PID:4636
-
\??\c:\5vjdv.exec:\5vjdv.exe191⤵PID:2868
-
\??\c:\1flfxxr.exec:\1flfxxr.exe192⤵PID:5024
-
\??\c:\bnttnn.exec:\bnttnn.exe193⤵PID:4808
-
\??\c:\9tbtnn.exec:\9tbtnn.exe194⤵PID:4732
-
\??\c:\1pdvp.exec:\1pdvp.exe195⤵PID:3828
-
\??\c:\jppdv.exec:\jppdv.exe196⤵PID:1572
-
\??\c:\rllfrrx.exec:\rllfrrx.exe197⤵PID:2768
-
\??\c:\flrlllf.exec:\flrlllf.exe198⤵PID:552
-
\??\c:\htnnht.exec:\htnnht.exe199⤵PID:244
-
\??\c:\hnnnnn.exec:\hnnnnn.exe200⤵PID:4852
-
\??\c:\jpppj.exec:\jpppj.exe201⤵PID:2040
-
\??\c:\vvpjj.exec:\vvpjj.exe202⤵PID:1952
-
\??\c:\lflflfl.exec:\lflflfl.exe203⤵PID:3168
-
\??\c:\3xlflfl.exec:\3xlflfl.exe204⤵PID:1032
-
\??\c:\bbnbnh.exec:\bbnbnh.exe205⤵PID:3972
-
\??\c:\3ntnnb.exec:\3ntnnb.exe206⤵PID:4996
-
\??\c:\vvjjp.exec:\vvjjp.exe207⤵PID:2840
-
\??\c:\xxflfxf.exec:\xxflfxf.exe208⤵PID:2700
-
\??\c:\xrrlllf.exec:\xrrlllf.exe209⤵PID:4544
-
\??\c:\5bhbhh.exec:\5bhbhh.exe210⤵PID:3012
-
\??\c:\tbhbbb.exec:\tbhbbb.exe211⤵PID:3016
-
\??\c:\ddvdj.exec:\ddvdj.exe212⤵PID:2060
-
\??\c:\3vdvj.exec:\3vdvj.exe213⤵PID:380
-
\??\c:\xrxxlrx.exec:\xrxxlrx.exe214⤵PID:548
-
\??\c:\5htbtt.exec:\5htbtt.exe215⤵PID:4468
-
\??\c:\btnhbt.exec:\btnhbt.exe216⤵PID:4872
-
\??\c:\vppjd.exec:\vppjd.exe217⤵PID:4028
-
\??\c:\vjvvd.exec:\vjvvd.exe218⤵PID:1456
-
\??\c:\fxrlrrf.exec:\fxrlrrf.exe219⤵PID:4124
-
\??\c:\3flfxll.exec:\3flfxll.exe220⤵PID:1076
-
\??\c:\7djjj.exec:\7djjj.exe221⤵PID:4900
-
\??\c:\1fffllf.exec:\1fffllf.exe222⤵PID:2084
-
\??\c:\nthbtt.exec:\nthbtt.exe223⤵PID:4600
-
\??\c:\nhtbhb.exec:\nhtbhb.exe224⤵PID:1284
-
\??\c:\3jjdd.exec:\3jjdd.exe225⤵PID:2976
-
\??\c:\xlrlfxx.exec:\xlrlfxx.exe226⤵PID:1292
-
\??\c:\lffxrrl.exec:\lffxrrl.exe227⤵PID:4636
-
\??\c:\ntnttb.exec:\ntnttb.exe228⤵PID:2868
-
\??\c:\5jpjd.exec:\5jpjd.exe229⤵PID:5024
-
\??\c:\rffxxfl.exec:\rffxxfl.exe230⤵PID:4808
-
\??\c:\xrrrllf.exec:\xrrrllf.exe231⤵PID:4480
-
\??\c:\hnnhbt.exec:\hnnhbt.exe232⤵PID:1516
-
\??\c:\bnbhbb.exec:\bnbhbb.exe233⤵PID:4328
-
\??\c:\vdpvp.exec:\vdpvp.exe234⤵PID:3872
-
\??\c:\dpvpv.exec:\dpvpv.exe235⤵PID:2864
-
\??\c:\fxxfxrr.exec:\fxxfxrr.exe236⤵PID:1412
-
\??\c:\hhhhbb.exec:\hhhhbb.exe237⤵PID:3608
-
\??\c:\7btnhh.exec:\7btnhh.exe238⤵PID:408
-
\??\c:\jdvpv.exec:\jdvpv.exe239⤵PID:1160
-
\??\c:\dvvvv.exec:\dvvvv.exe240⤵PID:2896
-
\??\c:\rlffxrr.exec:\rlffxrr.exe241⤵PID:4700
-