Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 23:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cf00bf7ded8a1e34a18867749f85329b.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
cf00bf7ded8a1e34a18867749f85329b.exe
-
Size
120KB
-
MD5
cf00bf7ded8a1e34a18867749f85329b
-
SHA1
95b4db4480f36eb2b4d76aa6f150667710d3e41e
-
SHA256
c511a4a16b6c27c8194d5440a99c99339a0541b32c098f6d9fb59632b1cad4f3
-
SHA512
1548bea4cca4c3407d596a360fe62552214756939e37f6b39f9ae38d66077eab1d734c764602889fa08ae1f2f8740aa5caa2b9341972ca43e4113d01bd174e6f
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LAIRUohDLSULrCimBaH8UH30T+:n3C9BRo/AIuunSppaH8m3F
Malware Config
Signatures
-
Detect Blackmoon payload 33 IoCs
resource yara_rule behavioral1/memory/3024-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/820-497-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-483-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1920-452-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-380-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2488-351-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-342-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1220-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/292-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-589-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-708-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2036-852-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-1179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-954-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1752-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2076-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1636 hhtbhh.exe 3024 1frrffl.exe 2664 nhbhbb.exe 2600 lfrxllf.exe 2672 9tntnn.exe 2476 vpjjd.exe 2512 hbnhnt.exe 2532 bthnbt.exe 2076 jjjvv.exe 2832 rfrrfxf.exe 2280 3bnnbh.exe 2748 9ffrffr.exe 1940 ttbhhh.exe 1932 frflrxl.exe 2780 tntbnn.exe 2332 jjpvp.exe 2252 btnthn.exe 1752 5pjpv.exe 1008 bnhhbb.exe 1584 ppvdj.exe 1832 nhhtnn.exe 472 7vvvd.exe 2404 nhtbnn.exe 1784 hhbthb.exe 644 7xlrxfx.exe 292 bbnbhn.exe 2860 1rrrrll.exe 1220 5thhht.exe 3048 ddvdj.exe 1956 7nhbbh.exe 1616 3nbnht.exe 2540 ddppd.exe 2992 fxrfxxl.exe 2652 pdjpj.exe 2564 3lrrflx.exe 2488 9lffxlr.exe 2672 hnthbn.exe 2464 9vpdv.exe 2948 tnttbh.exe 2588 5vjjp.exe 2716 tnnnhh.exe 2076 1dddv.exe 1768 lrrlrlf.exe 1540 pjdjp.exe 2968 fxrxllr.exe 1536 1thntb.exe 1940 llxrxxl.exe 1932 3ththb.exe 1920 hhbnnb.exe 2800 lfxrxxl.exe 2272 3frrxxx.exe 1248 9vdpv.exe 2688 bnbnbt.exe 2228 xrlfflx.exe 820 ddppd.exe 2328 vpppj.exe 2376 btnttn.exe 2276 7dvpd.exe 1596 vpjpv.exe 1332 hbbhtb.exe 1988 1fxlxrl.exe 908 1xlxrxf.exe 2284 7vpjj.exe 1232 lllxffx.exe -
resource yara_rule behavioral1/memory/3024-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/820-497-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-483-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-452-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-424-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2076-395-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-380-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-351-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-350-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-342-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-326-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-288-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1220-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/292-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-589-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-708-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-852-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-1114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-1201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-1273-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-1179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-1129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1876-1099-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-1084-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-1055-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-1012-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/556-983-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-954-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-953-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-938-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1428-909-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-894-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1616-879-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/880-853-0x0000000000220000-0x000000000022C000-memory.dmp upx behavioral1/memory/912-823-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1752-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2076-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-3-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1636 2932 cf00bf7ded8a1e34a18867749f85329b.exe 28 PID 2932 wrote to memory of 1636 2932 cf00bf7ded8a1e34a18867749f85329b.exe 28 PID 2932 wrote to memory of 1636 2932 cf00bf7ded8a1e34a18867749f85329b.exe 28 PID 2932 wrote to memory of 1636 2932 cf00bf7ded8a1e34a18867749f85329b.exe 28 PID 1636 wrote to memory of 3024 1636 hhtbhh.exe 29 PID 1636 wrote to memory of 3024 1636 hhtbhh.exe 29 PID 1636 wrote to memory of 3024 1636 hhtbhh.exe 29 PID 1636 wrote to memory of 3024 1636 hhtbhh.exe 29 PID 3024 wrote to memory of 2664 3024 1frrffl.exe 30 PID 3024 wrote to memory of 2664 3024 1frrffl.exe 30 PID 3024 wrote to memory of 2664 3024 1frrffl.exe 30 PID 3024 wrote to memory of 2664 3024 1frrffl.exe 30 PID 2664 wrote to memory of 2600 2664 nhbhbb.exe 31 PID 2664 wrote to memory of 2600 2664 nhbhbb.exe 31 PID 2664 wrote to memory of 2600 2664 nhbhbb.exe 31 PID 2664 wrote to memory of 2600 2664 nhbhbb.exe 31 PID 2600 wrote to memory of 2672 2600 lfrxllf.exe 32 PID 2600 wrote to memory of 2672 2600 lfrxllf.exe 32 PID 2600 wrote to memory of 2672 2600 lfrxllf.exe 32 PID 2600 wrote to memory of 2672 2600 lfrxllf.exe 32 PID 2672 wrote to memory of 2476 2672 9tntnn.exe 33 PID 2672 wrote to memory of 2476 2672 9tntnn.exe 33 PID 2672 wrote to memory of 2476 2672 9tntnn.exe 33 PID 2672 wrote to memory of 2476 2672 9tntnn.exe 33 PID 2476 wrote to memory of 2512 2476 vpjjd.exe 34 PID 2476 wrote to memory of 2512 2476 vpjjd.exe 34 PID 2476 wrote to memory of 2512 2476 vpjjd.exe 34 PID 2476 wrote to memory of 2512 2476 vpjjd.exe 34 PID 2512 wrote to memory of 2532 2512 hbnhnt.exe 35 PID 2512 wrote to memory of 2532 2512 hbnhnt.exe 35 PID 2512 wrote to memory of 2532 2512 hbnhnt.exe 35 PID 2512 wrote to memory of 2532 2512 hbnhnt.exe 35 PID 2532 wrote to memory of 2076 2532 bthnbt.exe 36 PID 2532 wrote to memory of 2076 2532 bthnbt.exe 36 PID 2532 wrote to memory of 2076 2532 bthnbt.exe 36 PID 2532 wrote to memory of 2076 2532 bthnbt.exe 36 PID 2076 wrote to memory of 2832 2076 jjjvv.exe 37 PID 2076 wrote to memory of 2832 2076 jjjvv.exe 37 PID 2076 wrote to memory of 2832 2076 jjjvv.exe 37 PID 2076 wrote to memory of 2832 2076 jjjvv.exe 37 PID 2832 wrote to memory of 2280 2832 rfrrfxf.exe 38 PID 2832 wrote to memory of 2280 2832 rfrrfxf.exe 38 PID 2832 wrote to memory of 2280 2832 rfrrfxf.exe 38 PID 2832 wrote to memory of 2280 2832 rfrrfxf.exe 38 PID 2280 wrote to memory of 2748 2280 3bnnbh.exe 39 PID 2280 wrote to memory of 2748 2280 3bnnbh.exe 39 PID 2280 wrote to memory of 2748 2280 3bnnbh.exe 39 PID 2280 wrote to memory of 2748 2280 3bnnbh.exe 39 PID 2748 wrote to memory of 1940 2748 9ffrffr.exe 40 PID 2748 wrote to memory of 1940 2748 9ffrffr.exe 40 PID 2748 wrote to memory of 1940 2748 9ffrffr.exe 40 PID 2748 wrote to memory of 1940 2748 9ffrffr.exe 40 PID 1940 wrote to memory of 1932 1940 ttbhhh.exe 41 PID 1940 wrote to memory of 1932 1940 ttbhhh.exe 41 PID 1940 wrote to memory of 1932 1940 ttbhhh.exe 41 PID 1940 wrote to memory of 1932 1940 ttbhhh.exe 41 PID 1932 wrote to memory of 2780 1932 frflrxl.exe 42 PID 1932 wrote to memory of 2780 1932 frflrxl.exe 42 PID 1932 wrote to memory of 2780 1932 frflrxl.exe 42 PID 1932 wrote to memory of 2780 1932 frflrxl.exe 42 PID 2780 wrote to memory of 2332 2780 tntbnn.exe 43 PID 2780 wrote to memory of 2332 2780 tntbnn.exe 43 PID 2780 wrote to memory of 2332 2780 tntbnn.exe 43 PID 2780 wrote to memory of 2332 2780 tntbnn.exe 43
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\3896071666\zmstage.exeC:\Users\Admin\AppData\Local\Temp\3896071666\zmstage.exe1⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\cf00bf7ded8a1e34a18867749f85329b.exe"C:\Users\Admin\AppData\Local\Temp\cf00bf7ded8a1e34a18867749f85329b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\hhtbhh.exec:\hhtbhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\1frrffl.exec:\1frrffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\nhbhbb.exec:\nhbhbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\lfrxllf.exec:\lfrxllf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\9tntnn.exec:\9tntnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\vpjjd.exec:\vpjjd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\hbnhnt.exec:\hbnhnt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\bthnbt.exec:\bthnbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\jjjvv.exec:\jjjvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\rfrrfxf.exec:\rfrrfxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\3bnnbh.exec:\3bnnbh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\9ffrffr.exec:\9ffrffr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\ttbhhh.exec:\ttbhhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\frflrxl.exec:\frflrxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\tntbnn.exec:\tntbnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\jjpvp.exec:\jjpvp.exe17⤵
- Executes dropped EXE
PID:2332 -
\??\c:\btnthn.exec:\btnthn.exe18⤵
- Executes dropped EXE
PID:2252 -
\??\c:\5pjpv.exec:\5pjpv.exe19⤵
- Executes dropped EXE
PID:1752 -
\??\c:\bnhhbb.exec:\bnhhbb.exe20⤵
- Executes dropped EXE
PID:1008 -
\??\c:\ppvdj.exec:\ppvdj.exe21⤵
- Executes dropped EXE
PID:1584 -
\??\c:\nhhtnn.exec:\nhhtnn.exe22⤵
- Executes dropped EXE
PID:1832 -
\??\c:\7vvvd.exec:\7vvvd.exe23⤵
- Executes dropped EXE
PID:472 -
\??\c:\nhtbnn.exec:\nhtbnn.exe24⤵
- Executes dropped EXE
PID:2404 -
\??\c:\hhbthb.exec:\hhbthb.exe25⤵
- Executes dropped EXE
PID:1784 -
\??\c:\7xlrxfx.exec:\7xlrxfx.exe26⤵
- Executes dropped EXE
PID:644 -
\??\c:\bbnbhn.exec:\bbnbhn.exe27⤵
- Executes dropped EXE
PID:292 -
\??\c:\1rrrrll.exec:\1rrrrll.exe28⤵
- Executes dropped EXE
PID:2860 -
\??\c:\5thhht.exec:\5thhht.exe29⤵
- Executes dropped EXE
PID:1220 -
\??\c:\ddvdj.exec:\ddvdj.exe30⤵
- Executes dropped EXE
PID:3048 -
\??\c:\7nhbbh.exec:\7nhbbh.exe31⤵
- Executes dropped EXE
PID:1956 -
\??\c:\3nbnht.exec:\3nbnht.exe32⤵
- Executes dropped EXE
PID:1616 -
\??\c:\ddppd.exec:\ddppd.exe33⤵
- Executes dropped EXE
PID:2540 -
\??\c:\fxrfxxl.exec:\fxrfxxl.exe34⤵
- Executes dropped EXE
PID:2992 -
\??\c:\pdjpj.exec:\pdjpj.exe35⤵
- Executes dropped EXE
PID:2652 -
\??\c:\3lrrflx.exec:\3lrrflx.exe36⤵
- Executes dropped EXE
PID:2564 -
\??\c:\9lffxlr.exec:\9lffxlr.exe37⤵
- Executes dropped EXE
PID:2488 -
\??\c:\hnthbn.exec:\hnthbn.exe38⤵
- Executes dropped EXE
PID:2672 -
\??\c:\9vpdv.exec:\9vpdv.exe39⤵
- Executes dropped EXE
PID:2464 -
\??\c:\tnttbh.exec:\tnttbh.exe40⤵
- Executes dropped EXE
PID:2948 -
\??\c:\5vjjp.exec:\5vjjp.exe41⤵
- Executes dropped EXE
PID:2588 -
\??\c:\tnnnhh.exec:\tnnnhh.exe42⤵
- Executes dropped EXE
PID:2716 -
\??\c:\1dddv.exec:\1dddv.exe43⤵
- Executes dropped EXE
PID:2076 -
\??\c:\lrrlrlf.exec:\lrrlrlf.exe44⤵
- Executes dropped EXE
PID:1768 -
\??\c:\pjdjp.exec:\pjdjp.exe45⤵
- Executes dropped EXE
PID:1540 -
\??\c:\fxrxllr.exec:\fxrxllr.exe46⤵
- Executes dropped EXE
PID:2968 -
\??\c:\1thntb.exec:\1thntb.exe47⤵
- Executes dropped EXE
PID:1536 -
\??\c:\llxrxxl.exec:\llxrxxl.exe48⤵
- Executes dropped EXE
PID:1940 -
\??\c:\3ththb.exec:\3ththb.exe49⤵
- Executes dropped EXE
PID:1932 -
\??\c:\hhbnnb.exec:\hhbnnb.exe50⤵
- Executes dropped EXE
PID:1920 -
\??\c:\lfxrxxl.exec:\lfxrxxl.exe51⤵
- Executes dropped EXE
PID:2800 -
\??\c:\3frrxxx.exec:\3frrxxx.exe52⤵
- Executes dropped EXE
PID:2272 -
\??\c:\9vdpv.exec:\9vdpv.exe53⤵
- Executes dropped EXE
PID:1248 -
\??\c:\bnbnbt.exec:\bnbnbt.exe54⤵
- Executes dropped EXE
PID:2688 -
\??\c:\xrlfflx.exec:\xrlfflx.exe55⤵
- Executes dropped EXE
PID:2228 -
\??\c:\ddppd.exec:\ddppd.exe56⤵
- Executes dropped EXE
PID:820 -
\??\c:\vpppj.exec:\vpppj.exe57⤵
- Executes dropped EXE
PID:2328 -
\??\c:\btnttn.exec:\btnttn.exe58⤵
- Executes dropped EXE
PID:2376 -
\??\c:\7dvpd.exec:\7dvpd.exe59⤵
- Executes dropped EXE
PID:2276 -
\??\c:\vpjpv.exec:\vpjpv.exe60⤵
- Executes dropped EXE
PID:1596 -
\??\c:\hbbhtb.exec:\hbbhtb.exe61⤵
- Executes dropped EXE
PID:1332 -
\??\c:\1fxlxrl.exec:\1fxlxrl.exe62⤵
- Executes dropped EXE
PID:1988 -
\??\c:\1xlxrxf.exec:\1xlxrxf.exe63⤵
- Executes dropped EXE
PID:908 -
\??\c:\7vpjj.exec:\7vpjj.exe64⤵
- Executes dropped EXE
PID:2284 -
\??\c:\lllxffx.exec:\lllxffx.exe65⤵
- Executes dropped EXE
PID:1232 -
\??\c:\ttnthn.exec:\ttnthn.exe66⤵PID:612
-
\??\c:\tnhnhn.exec:\tnhnhn.exe67⤵PID:2032
-
\??\c:\jdpdp.exec:\jdpdp.exe68⤵PID:2152
-
\??\c:\9lflxfr.exec:\9lflxfr.exe69⤵PID:1512
-
\??\c:\fxflxxl.exec:\fxflxxl.exe70⤵PID:2548
-
\??\c:\1jjvj.exec:\1jjvj.exe71⤵PID:2712
-
\??\c:\djppv.exec:\djppv.exe72⤵PID:2880
-
\??\c:\9dvjv.exec:\9dvjv.exe73⤵PID:2664
-
\??\c:\nbtbhb.exec:\nbtbhb.exe74⤵PID:2580
-
\??\c:\3hbhnt.exec:\3hbhnt.exe75⤵PID:2996
-
\??\c:\3rfrlrx.exec:\3rfrlrx.exe76⤵PID:2592
-
\??\c:\vjdvv.exec:\vjdvv.exe77⤵PID:2468
-
\??\c:\nhbbht.exec:\nhbbht.exe78⤵PID:2672
-
\??\c:\7xrfrrf.exec:\7xrfrrf.exe79⤵PID:2512
-
\??\c:\vpvjd.exec:\vpvjd.exe80⤵PID:2844
-
\??\c:\bthhbb.exec:\bthhbb.exe81⤵PID:2676
-
\??\c:\7rrxfxx.exec:\7rrxfxx.exe82⤵PID:2984
-
\??\c:\pjdjd.exec:\pjdjd.exe83⤵PID:1336
-
\??\c:\1thnbb.exec:\1thnbb.exe84⤵PID:1152
-
\??\c:\1hnnht.exec:\1hnnht.exe85⤵PID:1768
-
\??\c:\rlfflxx.exec:\rlfflxx.exe86⤵PID:2692
-
\??\c:\1vjvj.exec:\1vjvj.exe87⤵PID:2832
-
\??\c:\btnttb.exec:\btnttb.exe88⤵PID:2428
-
\??\c:\1pddj.exec:\1pddj.exe89⤵PID:2344
-
\??\c:\5rflfrx.exec:\5rflfrx.exe90⤵PID:768
-
\??\c:\thnnbb.exec:\thnnbb.exe91⤵PID:1920
-
\??\c:\pdjpv.exec:\pdjpv.exe92⤵PID:1712
-
\??\c:\rlflrfl.exec:\rlflrfl.exe93⤵PID:336
-
\??\c:\vvjpd.exec:\vvjpd.exe94⤵PID:1660
-
\??\c:\1lfrxrf.exec:\1lfrxrf.exe95⤵PID:1040
-
\??\c:\nhhhtn.exec:\nhhhtn.exe96⤵PID:356
-
\??\c:\9fxfxff.exec:\9fxfxff.exe97⤵PID:2328
-
\??\c:\hbhnhn.exec:\hbhnhn.exe98⤵PID:1092
-
\??\c:\3vppd.exec:\3vppd.exe99⤵PID:852
-
\??\c:\1xxfrrx.exec:\1xxfrrx.exe100⤵PID:1644
-
\??\c:\thbhbb.exec:\thbhbb.exe101⤵PID:320
-
\??\c:\xxrxrrx.exec:\xxrxrrx.exe102⤵PID:992
-
\??\c:\5tntbb.exec:\5tntbb.exe103⤵PID:912
-
\??\c:\5dvvj.exec:\5dvvj.exe104⤵PID:292
-
\??\c:\rlxrlxl.exec:\rlxrlxl.exe105⤵PID:1320
-
\??\c:\tntbtb.exec:\tntbtb.exe106⤵PID:2036
-
\??\c:\vpddj.exec:\vpddj.exe107⤵PID:880
-
\??\c:\hnhhtt.exec:\hnhhtt.exe108⤵PID:2192
-
\??\c:\vvppp.exec:\vvppp.exe109⤵PID:2372
-
\??\c:\pdppv.exec:\pdppv.exe110⤵PID:2988
-
\??\c:\thtbtt.exec:\thtbtt.exe111⤵PID:1616
-
\??\c:\jdvjd.exec:\jdvjd.exe112⤵PID:1736
-
\??\c:\hbntbh.exec:\hbntbh.exe113⤵PID:2992
-
\??\c:\vpvpj.exec:\vpvpj.exe114⤵PID:2868
-
\??\c:\fxrrlxl.exec:\fxrrlxl.exe115⤵PID:1428
-
\??\c:\nnhnhh.exec:\nnhnhh.exe116⤵PID:2580
-
\??\c:\dvpvj.exec:\dvpvj.exe117⤵PID:2616
-
\??\c:\rlrrxfr.exec:\rlrrxfr.exe118⤵PID:2592
-
\??\c:\thnhtt.exec:\thnhtt.exe119⤵PID:2484
-
\??\c:\9dppv.exec:\9dppv.exe120⤵PID:1948
-
\??\c:\9rffflr.exec:\9rffflr.exe121⤵PID:2948
-
\??\c:\nhbhhh.exec:\nhbhhh.exe122⤵PID:2732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-