Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 20:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe
-
Size
141KB
-
MD5
131be6b60e6a34bfdc0e14302fe1cb60
-
SHA1
c63d1d03908f85c6ade50cefec36e585b6670d38
-
SHA256
86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257
-
SHA512
04ecf5fdc84ab024e27eb99addec43c3a2cf25b41287f6839648287dc53233d79ff18700128b53d77f26b0d766cc631531b201271df659d324d07355d4f3d95b
-
SSDEEP
3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmm8mzuFli55p15k:n3C9BRIG0asYFm71mm8fliC
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/4236-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2656-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3020-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4548-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1564-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4604-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4740-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4284-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5112-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4056-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2904-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1944-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2116-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2368-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3008-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1056-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4144-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ppdvp.exe3frlrfx.exe1thhbb.exevddvj.exefffxllf.exe3ffxxxr.exetntnnn.exepvddv.exelrrlffx.exe7llfxfx.exehntnhh.exenbhhhh.exepvppj.exepddvp.exerxrllll.exebnbtnn.exennhttt.exe1vvpj.exefxfrrrx.exebbnhnh.exetnnhbt.exevdjdd.exe5pvpd.exefxfxxrr.exelllllll.exenhhhbb.exejdjdv.exepjjdv.exefxrlfxr.exexlrrxxr.exehhtntt.exe5thnbh.exedpdpp.exelxfxrrr.exexlrrrrr.exennnhhh.exedjpjj.exevddvp.exexllfxxr.exetnbbbh.exebtnhhh.exe9vppj.exe1ppjv.exexrlfxxx.exehttbtb.exentthbt.exe9vddv.exepdjdd.exe9fllxxf.exehbttnn.exebtnnhh.exe9ddvd.exeddppj.exerfrlrrx.exelllffff.exe1xfxxxr.exenhbbbh.exeddvvp.exevjdpj.exerrffrrf.exefrfxfxf.exennnnnn.exebtnhhb.exejjjdd.exepid process 2656 ppdvp.exe 4964 3frlrfx.exe 3020 1thhbb.exe 4548 vddvj.exe 1564 fffxllf.exe 4752 3ffxxxr.exe 4604 tntnnn.exe 2888 pvddv.exe 4740 lrrlffx.exe 4144 7llfxfx.exe 4644 hntnhh.exe 1252 nbhhhh.exe 1056 pvppj.exe 4748 pddvp.exe 3008 rxrllll.exe 3408 bnbtnn.exe 1616 nnhttt.exe 4952 1vvpj.exe 4336 fxfrrrx.exe 2348 bbnhnh.exe 2368 tnnhbt.exe 2116 vdjdd.exe 1944 5pvpd.exe 4668 fxfxxrr.exe 2904 lllllll.exe 1184 nhhhbb.exe 4056 jdjdv.exe 5112 pjjdv.exe 1152 fxrlfxr.exe 4284 xlrrxxr.exe 1892 hhtntt.exe 4428 5thnbh.exe 3356 dpdpp.exe 548 lxfxrrr.exe 1176 xlrrrrr.exe 2988 nnnhhh.exe 3052 djpjj.exe 688 vddvp.exe 2648 xllfxxr.exe 884 tnbbbh.exe 4540 btnhhh.exe 3320 9vppj.exe 4684 1ppjv.exe 2888 xrlfxxx.exe 372 httbtb.exe 2332 ntthbt.exe 5088 9vddv.exe 3872 pdjdd.exe 2524 9fllxxf.exe 380 hbttnn.exe 1684 btnnhh.exe 2872 9ddvd.exe 1512 ddppj.exe 412 rfrlrrx.exe 2320 lllffff.exe 632 1xfxxxr.exe 2384 nhbbbh.exe 4736 ddvvp.exe 4648 vjdpj.exe 3704 rrffrrf.exe 3488 frfxfxf.exe 4064 nnnnnn.exe 4804 btnhhb.exe 888 jjjdd.exe -
Processes:
resource yara_rule behavioral2/memory/4236-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2656-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3020-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1564-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1564-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1564-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4740-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1616-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5112-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2904-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1944-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2116-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3008-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1056-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4144-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-49-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exeppdvp.exe3frlrfx.exe1thhbb.exevddvj.exefffxllf.exe3ffxxxr.exetntnnn.exepvddv.exelrrlffx.exe7llfxfx.exehntnhh.exenbhhhh.exepvppj.exepddvp.exerxrllll.exebnbtnn.exennhttt.exe1vvpj.exefxfrrrx.exebbnhnh.exetnnhbt.exedescription pid process target process PID 4236 wrote to memory of 2656 4236 86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe ppdvp.exe PID 4236 wrote to memory of 2656 4236 86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe ppdvp.exe PID 4236 wrote to memory of 2656 4236 86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe ppdvp.exe PID 2656 wrote to memory of 4964 2656 ppdvp.exe 3frlrfx.exe PID 2656 wrote to memory of 4964 2656 ppdvp.exe 3frlrfx.exe PID 2656 wrote to memory of 4964 2656 ppdvp.exe 3frlrfx.exe PID 4964 wrote to memory of 3020 4964 3frlrfx.exe 1thhbb.exe PID 4964 wrote to memory of 3020 4964 3frlrfx.exe 1thhbb.exe PID 4964 wrote to memory of 3020 4964 3frlrfx.exe 1thhbb.exe PID 3020 wrote to memory of 4548 3020 1thhbb.exe vddvj.exe PID 3020 wrote to memory of 4548 3020 1thhbb.exe vddvj.exe PID 3020 wrote to memory of 4548 3020 1thhbb.exe vddvj.exe PID 4548 wrote to memory of 1564 4548 vddvj.exe fffxllf.exe PID 4548 wrote to memory of 1564 4548 vddvj.exe fffxllf.exe PID 4548 wrote to memory of 1564 4548 vddvj.exe fffxllf.exe PID 1564 wrote to memory of 4752 1564 fffxllf.exe 3ffxxxr.exe PID 1564 wrote to memory of 4752 1564 fffxllf.exe 3ffxxxr.exe PID 1564 wrote to memory of 4752 1564 fffxllf.exe 3ffxxxr.exe PID 4752 wrote to memory of 4604 4752 3ffxxxr.exe tntnnn.exe PID 4752 wrote to memory of 4604 4752 3ffxxxr.exe tntnnn.exe PID 4752 wrote to memory of 4604 4752 3ffxxxr.exe tntnnn.exe PID 4604 wrote to memory of 2888 4604 tntnnn.exe xrlfxxx.exe PID 4604 wrote to memory of 2888 4604 tntnnn.exe xrlfxxx.exe PID 4604 wrote to memory of 2888 4604 tntnnn.exe xrlfxxx.exe PID 2888 wrote to memory of 4740 2888 pvddv.exe lrrlffx.exe PID 2888 wrote to memory of 4740 2888 pvddv.exe lrrlffx.exe PID 2888 wrote to memory of 4740 2888 pvddv.exe lrrlffx.exe PID 4740 wrote to memory of 4144 4740 lrrlffx.exe 7llfxfx.exe PID 4740 wrote to memory of 4144 4740 lrrlffx.exe 7llfxfx.exe PID 4740 wrote to memory of 4144 4740 lrrlffx.exe 7llfxfx.exe PID 4144 wrote to memory of 4644 4144 7llfxfx.exe hntnhh.exe PID 4144 wrote to memory of 4644 4144 7llfxfx.exe hntnhh.exe PID 4144 wrote to memory of 4644 4144 7llfxfx.exe hntnhh.exe PID 4644 wrote to memory of 1252 4644 hntnhh.exe nbhhhh.exe PID 4644 wrote to memory of 1252 4644 hntnhh.exe nbhhhh.exe PID 4644 wrote to memory of 1252 4644 hntnhh.exe nbhhhh.exe PID 1252 wrote to memory of 1056 1252 nbhhhh.exe pvppj.exe PID 1252 wrote to memory of 1056 1252 nbhhhh.exe pvppj.exe PID 1252 wrote to memory of 1056 1252 nbhhhh.exe pvppj.exe PID 1056 wrote to memory of 4748 1056 pvppj.exe pddvp.exe PID 1056 wrote to memory of 4748 1056 pvppj.exe pddvp.exe PID 1056 wrote to memory of 4748 1056 pvppj.exe pddvp.exe PID 4748 wrote to memory of 3008 4748 pddvp.exe rxrllll.exe PID 4748 wrote to memory of 3008 4748 pddvp.exe rxrllll.exe PID 4748 wrote to memory of 3008 4748 pddvp.exe rxrllll.exe PID 3008 wrote to memory of 3408 3008 rxrllll.exe bnbtnn.exe PID 3008 wrote to memory of 3408 3008 rxrllll.exe bnbtnn.exe PID 3008 wrote to memory of 3408 3008 rxrllll.exe bnbtnn.exe PID 3408 wrote to memory of 1616 3408 bnbtnn.exe nnhttt.exe PID 3408 wrote to memory of 1616 3408 bnbtnn.exe nnhttt.exe PID 3408 wrote to memory of 1616 3408 bnbtnn.exe nnhttt.exe PID 1616 wrote to memory of 4952 1616 nnhttt.exe 1vvpj.exe PID 1616 wrote to memory of 4952 1616 nnhttt.exe 1vvpj.exe PID 1616 wrote to memory of 4952 1616 nnhttt.exe 1vvpj.exe PID 4952 wrote to memory of 4336 4952 1vvpj.exe fxfrrrx.exe PID 4952 wrote to memory of 4336 4952 1vvpj.exe fxfrrrx.exe PID 4952 wrote to memory of 4336 4952 1vvpj.exe fxfrrrx.exe PID 4336 wrote to memory of 2348 4336 fxfrrrx.exe bbnhnh.exe PID 4336 wrote to memory of 2348 4336 fxfrrrx.exe bbnhnh.exe PID 4336 wrote to memory of 2348 4336 fxfrrrx.exe bbnhnh.exe PID 2348 wrote to memory of 2368 2348 bbnhnh.exe tnnhbt.exe PID 2348 wrote to memory of 2368 2348 bbnhnh.exe tnnhbt.exe PID 2348 wrote to memory of 2368 2348 bbnhnh.exe tnnhbt.exe PID 2368 wrote to memory of 2116 2368 tnnhbt.exe vdjdd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe"C:\Users\Admin\AppData\Local\Temp\86f7c829b03e67e1bed8f6c77c37047000b99893be5fb1d36b8481417d680257.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\ppdvp.exec:\ppdvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\3frlrfx.exec:\3frlrfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
\??\c:\1thhbb.exec:\1thhbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vddvj.exec:\vddvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\fffxllf.exec:\fffxllf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\3ffxxxr.exec:\3ffxxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\tntnnn.exec:\tntnnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
\??\c:\pvddv.exec:\pvddv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\lrrlffx.exec:\lrrlffx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
\??\c:\7llfxfx.exec:\7llfxfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\hntnhh.exec:\hntnhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\nbhhhh.exec:\nbhhhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\pvppj.exec:\pvppj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\pddvp.exec:\pddvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\rxrllll.exec:\rxrllll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\bnbtnn.exec:\bnbtnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\nnhttt.exec:\nnhttt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\1vvpj.exec:\1vvpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\fxfrrrx.exec:\fxfrrrx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
\??\c:\bbnhnh.exec:\bbnhnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\tnnhbt.exec:\tnnhbt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\vdjdd.exec:\vdjdd.exe23⤵
- Executes dropped EXE
PID:2116 -
\??\c:\5pvpd.exec:\5pvpd.exe24⤵
- Executes dropped EXE
PID:1944 -
\??\c:\fxfxxrr.exec:\fxfxxrr.exe25⤵
- Executes dropped EXE
PID:4668 -
\??\c:\lllllll.exec:\lllllll.exe26⤵
- Executes dropped EXE
PID:2904 -
\??\c:\nhhhbb.exec:\nhhhbb.exe27⤵
- Executes dropped EXE
PID:1184 -
\??\c:\jdjdv.exec:\jdjdv.exe28⤵
- Executes dropped EXE
PID:4056 -
\??\c:\pjjdv.exec:\pjjdv.exe29⤵
- Executes dropped EXE
PID:5112 -
\??\c:\fxrlfxr.exec:\fxrlfxr.exe30⤵
- Executes dropped EXE
PID:1152 -
\??\c:\xlrrxxr.exec:\xlrrxxr.exe31⤵
- Executes dropped EXE
PID:4284 -
\??\c:\hhtntt.exec:\hhtntt.exe32⤵
- Executes dropped EXE
PID:1892 -
\??\c:\5thnbh.exec:\5thnbh.exe33⤵
- Executes dropped EXE
PID:4428 -
\??\c:\dpdpp.exec:\dpdpp.exe34⤵
- Executes dropped EXE
PID:3356 -
\??\c:\3ppdd.exec:\3ppdd.exe35⤵PID:4576
-
\??\c:\lxfxrrr.exec:\lxfxrrr.exe36⤵
- Executes dropped EXE
PID:548 -
\??\c:\xlrrrrr.exec:\xlrrrrr.exe37⤵
- Executes dropped EXE
PID:1176 -
\??\c:\nnnhhh.exec:\nnnhhh.exe38⤵
- Executes dropped EXE
PID:2988 -
\??\c:\djpjj.exec:\djpjj.exe39⤵
- Executes dropped EXE
PID:3052 -
\??\c:\vddvp.exec:\vddvp.exe40⤵
- Executes dropped EXE
PID:688 -
\??\c:\xllfxxr.exec:\xllfxxr.exe41⤵
- Executes dropped EXE
PID:2648 -
\??\c:\tnbbbh.exec:\tnbbbh.exe42⤵
- Executes dropped EXE
PID:884 -
\??\c:\btnhhh.exec:\btnhhh.exe43⤵
- Executes dropped EXE
PID:4540 -
\??\c:\9vppj.exec:\9vppj.exe44⤵
- Executes dropped EXE
PID:3320 -
\??\c:\1ppjv.exec:\1ppjv.exe45⤵
- Executes dropped EXE
PID:4684 -
\??\c:\xrlfxxx.exec:\xrlfxxx.exe46⤵
- Executes dropped EXE
PID:2888 -
\??\c:\httbtb.exec:\httbtb.exe47⤵
- Executes dropped EXE
PID:372 -
\??\c:\ntthbt.exec:\ntthbt.exe48⤵
- Executes dropped EXE
PID:2332 -
\??\c:\9vddv.exec:\9vddv.exe49⤵
- Executes dropped EXE
PID:5088 -
\??\c:\pdjdd.exec:\pdjdd.exe50⤵
- Executes dropped EXE
PID:3872 -
\??\c:\9fllxxf.exec:\9fllxxf.exe51⤵
- Executes dropped EXE
PID:2524 -
\??\c:\hbttnn.exec:\hbttnn.exe52⤵
- Executes dropped EXE
PID:380 -
\??\c:\btnnhh.exec:\btnnhh.exe53⤵
- Executes dropped EXE
PID:1684 -
\??\c:\9ddvd.exec:\9ddvd.exe54⤵
- Executes dropped EXE
PID:2872 -
\??\c:\ddppj.exec:\ddppj.exe55⤵
- Executes dropped EXE
PID:1512 -
\??\c:\rfrlrrx.exec:\rfrlrrx.exe56⤵
- Executes dropped EXE
PID:412 -
\??\c:\lllffff.exec:\lllffff.exe57⤵
- Executes dropped EXE
PID:2320 -
\??\c:\1xfxxxr.exec:\1xfxxxr.exe58⤵
- Executes dropped EXE
PID:632 -
\??\c:\nhbbbh.exec:\nhbbbh.exe59⤵
- Executes dropped EXE
PID:2384 -
\??\c:\ddvvp.exec:\ddvvp.exe60⤵
- Executes dropped EXE
PID:4736 -
\??\c:\vjdpj.exec:\vjdpj.exe61⤵
- Executes dropped EXE
PID:4648 -
\??\c:\rrffrrf.exec:\rrffrrf.exe62⤵
- Executes dropped EXE
PID:3704 -
\??\c:\frfxfxf.exec:\frfxfxf.exe63⤵
- Executes dropped EXE
PID:3488 -
\??\c:\nnnnnn.exec:\nnnnnn.exe64⤵
- Executes dropped EXE
PID:4064 -
\??\c:\btnhhb.exec:\btnhhb.exe65⤵
- Executes dropped EXE
PID:4804 -
\??\c:\jjjdd.exec:\jjjdd.exe66⤵
- Executes dropped EXE
PID:888 -
\??\c:\7dvvp.exec:\7dvvp.exe67⤵PID:2304
-
\??\c:\pjpjd.exec:\pjpjd.exe68⤵PID:464
-
\??\c:\rxrrllx.exec:\rxrrllx.exe69⤵PID:376
-
\??\c:\lfxlxlf.exec:\lfxlxlf.exe70⤵PID:3932
-
\??\c:\hbbbbb.exec:\hbbbbb.exe71⤵PID:4204
-
\??\c:\tbhnhh.exec:\tbhnhh.exe72⤵PID:4196
-
\??\c:\5vdvv.exec:\5vdvv.exe73⤵PID:4188
-
\??\c:\xlllxfx.exec:\xlllxfx.exe74⤵PID:3116
-
\??\c:\xxlfxff.exec:\xxlfxff.exe75⤵PID:1396
-
\??\c:\htnttt.exec:\htnttt.exe76⤵PID:4412
-
\??\c:\pvdvd.exec:\pvdvd.exe77⤵PID:3356
-
\??\c:\pdjvv.exec:\pdjvv.exe78⤵PID:2724
-
\??\c:\rxllfff.exec:\rxllfff.exe79⤵PID:3792
-
\??\c:\tnhbbb.exec:\tnhbbb.exe80⤵PID:548
-
\??\c:\ttbtth.exec:\ttbtth.exe81⤵PID:4836
-
\??\c:\pppjd.exec:\pppjd.exe82⤵PID:3928
-
\??\c:\9ppdp.exec:\9ppdp.exe83⤵PID:4320
-
\??\c:\frxlrlf.exec:\frxlrlf.exe84⤵PID:640
-
\??\c:\nbhthb.exec:\nbhthb.exe85⤵PID:720
-
\??\c:\ppdvp.exec:\ppdvp.exe86⤵PID:2648
-
\??\c:\dvdvj.exec:\dvdvj.exe87⤵PID:4752
-
\??\c:\7lfrfxr.exec:\7lfrfxr.exe88⤵PID:2420
-
\??\c:\7thtnh.exec:\7thtnh.exe89⤵PID:3372
-
\??\c:\bthtnh.exec:\bthtnh.exe90⤵PID:4900
-
\??\c:\thhbnn.exec:\thhbnn.exe91⤵PID:4108
-
\??\c:\5hbnbb.exec:\5hbnbb.exe92⤵PID:372
-
\??\c:\vdddp.exec:\vdddp.exe93⤵PID:4644
-
\??\c:\3llxllf.exec:\3llxllf.exe94⤵PID:2176
-
\??\c:\5lrlxxr.exec:\5lrlxxr.exe95⤵PID:3872
-
\??\c:\3pvvd.exec:\3pvvd.exe96⤵PID:4960
-
\??\c:\djjdd.exec:\djjdd.exe97⤵PID:4296
-
\??\c:\lxlfllr.exec:\lxlfllr.exe98⤵PID:5096
-
\??\c:\htbnhb.exec:\htbnhb.exe99⤵PID:3388
-
\??\c:\bbbbtn.exec:\bbbbtn.exe100⤵PID:1596
-
\??\c:\vvvpp.exec:\vvvpp.exe101⤵PID:3540
-
\??\c:\rxrflrr.exec:\rxrflrr.exe102⤵PID:3264
-
\??\c:\1rfxflr.exec:\1rfxflr.exe103⤵PID:2052
-
\??\c:\bttnnn.exec:\bttnnn.exe104⤵PID:3864
-
\??\c:\vjpjp.exec:\vjpjp.exe105⤵PID:4440
-
\??\c:\vddpj.exec:\vddpj.exe106⤵PID:2348
-
\??\c:\xrlfrff.exec:\xrlfrff.exe107⤵PID:432
-
\??\c:\rxlxrlf.exec:\rxlxrlf.exe108⤵PID:1852
-
\??\c:\5nbtnh.exec:\5nbtnh.exe109⤵PID:624
-
\??\c:\vjvjd.exec:\vjvjd.exe110⤵PID:1144
-
\??\c:\xfrfxrl.exec:\xfrfxrl.exe111⤵PID:1552
-
\??\c:\nbbthn.exec:\nbbthn.exe112⤵PID:1104
-
\??\c:\dpvdp.exec:\dpvdp.exe113⤵PID:376
-
\??\c:\xrxflxr.exec:\xrxflxr.exe114⤵PID:4692
-
\??\c:\tnnhhb.exec:\tnnhhb.exe115⤵PID:3444
-
\??\c:\bhtthh.exec:\bhtthh.exe116⤵PID:3592
-
\??\c:\jvvpv.exec:\jvvpv.exe117⤵PID:2900
-
\??\c:\xlfrxrl.exec:\xlfrxrl.exe118⤵PID:5016
-
\??\c:\nntnbt.exec:\nntnbt.exe119⤵PID:4428
-
\??\c:\1tbnhb.exec:\1tbnhb.exe120⤵PID:4412
-
\??\c:\dvjdj.exec:\dvjdj.exe121⤵PID:4860
-
\??\c:\lxxxrrl.exec:\lxxxrrl.exe122⤵PID:4552
-
\??\c:\lfrfrrr.exec:\lfrfrrr.exe123⤵PID:3820
-
\??\c:\hnnhnh.exec:\hnnhnh.exe124⤵PID:2268
-
\??\c:\tnhbnh.exec:\tnhbnh.exe125⤵PID:2024
-
\??\c:\dvddd.exec:\dvddd.exe126⤵PID:1516
-
\??\c:\vpvpd.exec:\vpvpd.exe127⤵PID:688
-
\??\c:\lllflxl.exec:\lllflxl.exe128⤵PID:1564
-
\??\c:\llrlxrl.exec:\llrlxrl.exe129⤵PID:2780
-
\??\c:\3ttnhh.exec:\3ttnhh.exe130⤵PID:2420
-
\??\c:\hhtnbt.exec:\hhtnbt.exe131⤵PID:1424
-
\??\c:\dvpjd.exec:\dvpjd.exe132⤵PID:4888
-
\??\c:\9vvpd.exec:\9vvpd.exe133⤵PID:4868
-
\??\c:\rxllrxl.exec:\rxllrxl.exe134⤵PID:3284
-
\??\c:\tntnhb.exec:\tntnhb.exe135⤵PID:4980
-
\??\c:\bnnhnb.exec:\bnnhnb.exe136⤵PID:1748
-
\??\c:\1rxllfx.exec:\1rxllfx.exe137⤵PID:4748
-
\??\c:\btbtbt.exec:\btbtbt.exe138⤵PID:3588
-
\??\c:\1bbbtn.exec:\1bbbtn.exe139⤵PID:4296
-
\??\c:\jdvvv.exec:\jdvvv.exe140⤵PID:5096
-
\??\c:\ppjdp.exec:\ppjdp.exe141⤵PID:3752
-
\??\c:\xrlfxlf.exec:\xrlfxlf.exe142⤵PID:4760
-
\??\c:\frrrfxr.exec:\frrrfxr.exe143⤵PID:3264
-
\??\c:\7nhhth.exec:\7nhhth.exe144⤵PID:1156
-
\??\c:\djpdp.exec:\djpdp.exe145⤵PID:3456
-
\??\c:\7jvjv.exec:\7jvjv.exe146⤵PID:432
-
\??\c:\rxxfxrr.exec:\rxxfxrr.exe147⤵PID:4068
-
\??\c:\nhnnhb.exec:\nhnnhb.exe148⤵PID:1184
-
\??\c:\bnnntn.exec:\bnnntn.exe149⤵PID:464
-
\??\c:\7bbthn.exec:\7bbthn.exe150⤵PID:1192
-
\??\c:\3ppdp.exec:\3ppdp.exe151⤵PID:1152
-
\??\c:\1xxllll.exec:\1xxllll.exe152⤵PID:1436
-
\??\c:\5ffxrrf.exec:\5ffxrrf.exe153⤵PID:832
-
\??\c:\nbbtnh.exec:\nbbtnh.exe154⤵PID:1340
-
\??\c:\hbntbb.exec:\hbntbb.exe155⤵PID:5016
-
\??\c:\jvpdv.exec:\jvpdv.exe156⤵PID:3356
-
\??\c:\3fffrrr.exec:\3fffrrr.exe157⤵PID:3848
-
\??\c:\rxrfrlx.exec:\rxrfrlx.exe158⤵PID:4840
-
\??\c:\nhthbt.exec:\nhthbt.exe159⤵PID:4552
-
\??\c:\fxfxrff.exec:\fxfxrff.exe160⤵PID:3152
-
\??\c:\rlfxfrx.exec:\rlfxfrx.exe161⤵PID:2988
-
\??\c:\nbbthn.exec:\nbbthn.exe162⤵PID:3928
-
\??\c:\1ddvv.exec:\1ddvv.exe163⤵PID:3672
-
\??\c:\ffxlxrl.exec:\ffxlxrl.exe164⤵PID:3680
-
\??\c:\tbbnhb.exec:\tbbnhb.exe165⤵PID:3452
-
\??\c:\vdvvp.exec:\vdvvp.exe166⤵PID:1160
-
\??\c:\rxfxllf.exec:\rxfxllf.exe167⤵PID:3372
-
\??\c:\1bthnh.exec:\1bthnh.exe168⤵PID:1808
-
\??\c:\dvpjv.exec:\dvpjv.exe169⤵PID:3712
-
\??\c:\lfxlxrf.exec:\lfxlxrf.exe170⤵PID:2332
-
\??\c:\pjddv.exec:\pjddv.exe171⤵PID:5088
-
\??\c:\3lfxrfx.exec:\3lfxrfx.exe172⤵PID:2228
-
\??\c:\hthhbn.exec:\hthhbn.exe173⤵PID:2392
-
\??\c:\jvvjd.exec:\jvvjd.exe174⤵PID:3156
-
\??\c:\lxfrfxr.exec:\lxfrfxr.exe175⤵PID:3404
-
\??\c:\xxxxlfx.exec:\xxxxlfx.exe176⤵PID:3408
-
\??\c:\7htnbt.exec:\7htnbt.exe177⤵PID:1512
-
\??\c:\5jvpd.exec:\5jvpd.exe178⤵PID:936
-
\??\c:\jpjvv.exec:\jpjvv.exe179⤵PID:4060
-
\??\c:\lfrfxrf.exec:\lfrfxrf.exe180⤵PID:2052
-
\??\c:\tthbht.exec:\tthbht.exe181⤵PID:1996
-
\??\c:\hhttnh.exec:\hhttnh.exe182⤵PID:3456
-
\??\c:\jpjdp.exec:\jpjdp.exe183⤵PID:4668
-
\??\c:\rrrrffx.exec:\rrrrffx.exe184⤵PID:2364
-
\??\c:\5lfxrrl.exec:\5lfxrrl.exe185⤵PID:1104
-
\??\c:\btnbtn.exec:\btnbtn.exe186⤵PID:376
-
\??\c:\nbbtbb.exec:\nbbtbb.exe187⤵PID:4204
-
\??\c:\dvpdj.exec:\dvpdj.exe188⤵PID:740
-
\??\c:\dvpdv.exec:\dvpdv.exe189⤵PID:1436
-
\??\c:\5fxrxxf.exec:\5fxrxxf.exe190⤵PID:832
-
\??\c:\tntnhb.exec:\tntnhb.exe191⤵PID:4388
-
\??\c:\3bbbnh.exec:\3bbbnh.exe192⤵PID:4576
-
\??\c:\nbnhtn.exec:\nbnhtn.exe193⤵PID:3792
-
\??\c:\3jjvj.exec:\3jjvj.exe194⤵PID:4328
-
\??\c:\xllfrlf.exec:\xllfrlf.exe195⤵PID:2544
-
\??\c:\frxxxrx.exec:\frxxxrx.exe196⤵PID:3152
-
\??\c:\7nnbtn.exec:\7nnbtn.exe197⤵PID:1288
-
\??\c:\vddjd.exec:\vddjd.exe198⤵PID:4340
-
\??\c:\vvppp.exec:\vvppp.exe199⤵PID:688
-
\??\c:\5rxlrlr.exec:\5rxlrlr.exe200⤵PID:2780
-
\??\c:\fffxrlf.exec:\fffxrlf.exe201⤵PID:2420
-
\??\c:\htnhtn.exec:\htnhtn.exe202⤵PID:3372
-
\??\c:\htnnhb.exec:\htnnhb.exe203⤵PID:2860
-
\??\c:\vvvpj.exec:\vvvpj.exe204⤵PID:3944
-
\??\c:\9ttnhh.exec:\9ttnhh.exe205⤵PID:4644
-
\??\c:\7ttnbt.exec:\7ttnbt.exe206⤵PID:60
-
\??\c:\pjdpd.exec:\pjdpd.exe207⤵PID:4304
-
\??\c:\rlllxfr.exec:\rlllxfr.exe208⤵PID:1644
-
\??\c:\1flxxrl.exec:\1flxxrl.exe209⤵PID:4920
-
\??\c:\1bthht.exec:\1bthht.exe210⤵PID:4984
-
\??\c:\5bhbbb.exec:\5bhbbb.exe211⤵PID:3540
-
\??\c:\vjpdd.exec:\vjpdd.exe212⤵PID:1596
-
\??\c:\1lxxrrf.exec:\1lxxrrf.exe213⤵PID:3660
-
\??\c:\rlxfflx.exec:\rlxfflx.exe214⤵PID:3264
-
\??\c:\htttht.exec:\htttht.exe215⤵PID:1156
-
\??\c:\bthhhb.exec:\bthhhb.exe216⤵PID:3304
-
\??\c:\pvjdp.exec:\pvjdp.exe217⤵PID:748
-
\??\c:\rxxrxrf.exec:\rxxrxrf.exe218⤵PID:4884
-
\??\c:\llfxxxr.exec:\llfxxxr.exe219⤵PID:1212
-
\??\c:\hhbbtb.exec:\hhbbtb.exe220⤵PID:3180
-
\??\c:\nbhhtt.exec:\nbhhtt.exe221⤵PID:1412
-
\??\c:\dpdjj.exec:\dpdjj.exe222⤵PID:3932
-
\??\c:\vpvpj.exec:\vpvpj.exe223⤵PID:4284
-
\??\c:\lxlxlrx.exec:\lxlxlrx.exe224⤵PID:64
-
\??\c:\xxfflrx.exec:\xxfflrx.exe225⤵PID:4588
-
\??\c:\bnhbbb.exec:\bnhbbb.exe226⤵PID:1068
-
\??\c:\vvpjv.exec:\vvpjv.exe227⤵PID:2336
-
\??\c:\vppjv.exec:\vppjv.exe228⤵PID:2464
-
\??\c:\xlfxrrl.exec:\xlfxrrl.exe229⤵PID:4224
-
\??\c:\1xffxxx.exec:\1xffxxx.exe230⤵PID:4280
-
\??\c:\7nnttt.exec:\7nnttt.exe231⤵PID:4560
-
\??\c:\3hbttn.exec:\3hbttn.exe232⤵PID:4964
-
\??\c:\pjppp.exec:\pjppp.exe233⤵PID:5016
-
\??\c:\1rxrffx.exec:\1rxrffx.exe234⤵PID:3332
-
\??\c:\xlfrfrl.exec:\xlfrfrl.exe235⤵PID:3232
-
\??\c:\bbtnnn.exec:\bbtnnn.exe236⤵PID:3452
-
\??\c:\9tnhbb.exec:\9tnhbb.exe237⤵PID:2172
-
\??\c:\jvdvj.exec:\jvdvj.exe238⤵PID:644
-
\??\c:\1lrlxxx.exec:\1lrlxxx.exe239⤵PID:4352
-
\??\c:\llxlxlf.exec:\llxlxlf.exe240⤵PID:3712
-
\??\c:\nhhbhn.exec:\nhhbhn.exe241⤵PID:1056
-
\??\c:\nhtnhh.exec:\nhtnhh.exe242⤵PID:2176