Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 10:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
94fbc3ddbf6c2cd6ef7333579a6d1790N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
94fbc3ddbf6c2cd6ef7333579a6d1790N.exe
-
Size
128KB
-
MD5
94fbc3ddbf6c2cd6ef7333579a6d1790
-
SHA1
45e8647df106bc336dd7bc0d3636c5ecb7e4370d
-
SHA256
fe74b93f780343e1656d7f29469a3da36086bc48c4ed1ca7a245202904e6a002
-
SHA512
5888268fa3d2be9826c45e8753d2159d8f3b8f032c91b86d09713c5d5e287e0403519c29c539fda14fc5ae467fae722e20befa667743a94e9d66783c60074968
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73tvn+Yp9gFbctg0IyAyhZvjDUC:n3C9BRo7tvnJ9oH0IRgZvjDB
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2784-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2144-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1968-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2280-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1860-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/636-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/772-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1808-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1268-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2304-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1900-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1892-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-4017-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2840 nhthhh.exe 2716 7htbnt.exe 2612 lflrxxf.exe 2632 hbtbtt.exe 2616 bnbhnt.exe 3048 vpdjv.exe 2672 lfrflrf.exe 2144 nhbnbn.exe 1968 btbhnt.exe 2280 7dvvp.exe 1860 9vdjp.exe 2432 xrflxxl.exe 1324 nbhthh.exe 636 vvddp.exe 2184 vjddj.exe 772 fxxfrxl.exe 1808 1tnbnh.exe 2208 dvjdv.exe 1268 jdpvp.exe 2376 9xflxxf.exe 2304 fxrrllf.exe 1900 nnhntb.exe 1984 1dvjd.exe 1892 lfrxrxl.exe 1140 llxxrxl.exe 2900 nhnntb.exe 576 hbhnbn.exe 2328 fxfflrf.exe 3028 xrxxffr.exe 2668 hbntnb.exe 2864 ddpdv.exe 1704 jdvdp.exe 2700 frlxfrf.exe 2608 htnbnn.exe 2920 bbnthn.exe 2632 3htnth.exe 2556 vpdjp.exe 2160 dvpjv.exe 2380 xxrfrxl.exe 1776 fxlrxfr.exe 2996 bbtnhh.exe 2812 1hbnnn.exe 2544 vpddd.exe 1920 9pdjv.exe 2100 9rlffff.exe 2088 9fllrfr.exe 1044 bbbnht.exe 1412 hhhthn.exe 636 ddpvd.exe 2232 vvjpd.exe 1656 rfxxllx.exe 2128 bnnnbh.exe 2236 nnbbnn.exe 2372 jjdjp.exe 2416 ppddv.exe 2116 1lxflrf.exe 2080 rrlxrfl.exe 2092 tnbhbh.exe 580 7thntb.exe 2680 ddpdp.exe 1800 1vvjd.exe 700 llxxlrx.exe 3036 fxfflrr.exe 352 nhbhtt.exe -
resource yara_rule behavioral1/memory/2784-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2144-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1968-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1860-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/636-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/772-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1808-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1268-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2304-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1892-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-267-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-276-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-4017-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btntbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frffllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrxrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lllxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2840 2784 94fbc3ddbf6c2cd6ef7333579a6d1790N.exe 30 PID 2784 wrote to memory of 2840 2784 94fbc3ddbf6c2cd6ef7333579a6d1790N.exe 30 PID 2784 wrote to memory of 2840 2784 94fbc3ddbf6c2cd6ef7333579a6d1790N.exe 30 PID 2784 wrote to memory of 2840 2784 94fbc3ddbf6c2cd6ef7333579a6d1790N.exe 30 PID 2840 wrote to memory of 2716 2840 nhthhh.exe 31 PID 2840 wrote to memory of 2716 2840 nhthhh.exe 31 PID 2840 wrote to memory of 2716 2840 nhthhh.exe 31 PID 2840 wrote to memory of 2716 2840 nhthhh.exe 31 PID 2716 wrote to memory of 2612 2716 7htbnt.exe 32 PID 2716 wrote to memory of 2612 2716 7htbnt.exe 32 PID 2716 wrote to memory of 2612 2716 7htbnt.exe 32 PID 2716 wrote to memory of 2612 2716 7htbnt.exe 32 PID 2612 wrote to memory of 2632 2612 lflrxxf.exe 33 PID 2612 wrote to memory of 2632 2612 lflrxxf.exe 33 PID 2612 wrote to memory of 2632 2612 lflrxxf.exe 33 PID 2612 wrote to memory of 2632 2612 lflrxxf.exe 33 PID 2632 wrote to memory of 2616 2632 hbtbtt.exe 34 PID 2632 wrote to memory of 2616 2632 hbtbtt.exe 34 PID 2632 wrote to memory of 2616 2632 hbtbtt.exe 34 PID 2632 wrote to memory of 2616 2632 hbtbtt.exe 34 PID 2616 wrote to memory of 3048 2616 bnbhnt.exe 35 PID 2616 wrote to memory of 3048 2616 bnbhnt.exe 35 PID 2616 wrote to memory of 3048 2616 bnbhnt.exe 35 PID 2616 wrote to memory of 3048 2616 bnbhnt.exe 35 PID 3048 wrote to memory of 2672 3048 vpdjv.exe 36 PID 3048 wrote to memory of 2672 3048 vpdjv.exe 36 PID 3048 wrote to memory of 2672 3048 vpdjv.exe 36 PID 3048 wrote to memory of 2672 3048 vpdjv.exe 36 PID 2672 wrote to memory of 2144 2672 lfrflrf.exe 37 PID 2672 wrote to memory of 2144 2672 lfrflrf.exe 37 PID 2672 wrote to memory of 2144 2672 lfrflrf.exe 37 PID 2672 wrote to memory of 2144 2672 lfrflrf.exe 37 PID 2144 wrote to memory of 1968 2144 nhbnbn.exe 38 PID 2144 wrote to memory of 1968 2144 nhbnbn.exe 38 PID 2144 wrote to memory of 1968 2144 nhbnbn.exe 38 PID 2144 wrote to memory of 1968 2144 nhbnbn.exe 38 PID 1968 wrote to memory of 2280 1968 btbhnt.exe 39 PID 1968 wrote to memory of 2280 1968 btbhnt.exe 39 PID 1968 wrote to memory of 2280 1968 btbhnt.exe 39 PID 1968 wrote to memory of 2280 1968 btbhnt.exe 39 PID 2280 wrote to memory of 1860 2280 7dvvp.exe 40 PID 2280 wrote to memory of 1860 2280 7dvvp.exe 40 PID 2280 wrote to memory of 1860 2280 7dvvp.exe 40 PID 2280 wrote to memory of 1860 2280 7dvvp.exe 40 PID 1860 wrote to memory of 2432 1860 9vdjp.exe 41 PID 1860 wrote to memory of 2432 1860 9vdjp.exe 41 PID 1860 wrote to memory of 2432 1860 9vdjp.exe 41 PID 1860 wrote to memory of 2432 1860 9vdjp.exe 41 PID 2432 wrote to memory of 1324 2432 xrflxxl.exe 42 PID 2432 wrote to memory of 1324 2432 xrflxxl.exe 42 PID 2432 wrote to memory of 1324 2432 xrflxxl.exe 42 PID 2432 wrote to memory of 1324 2432 xrflxxl.exe 42 PID 1324 wrote to memory of 636 1324 nbhthh.exe 43 PID 1324 wrote to memory of 636 1324 nbhthh.exe 43 PID 1324 wrote to memory of 636 1324 nbhthh.exe 43 PID 1324 wrote to memory of 636 1324 nbhthh.exe 43 PID 636 wrote to memory of 2184 636 vvddp.exe 44 PID 636 wrote to memory of 2184 636 vvddp.exe 44 PID 636 wrote to memory of 2184 636 vvddp.exe 44 PID 636 wrote to memory of 2184 636 vvddp.exe 44 PID 2184 wrote to memory of 772 2184 vjddj.exe 45 PID 2184 wrote to memory of 772 2184 vjddj.exe 45 PID 2184 wrote to memory of 772 2184 vjddj.exe 45 PID 2184 wrote to memory of 772 2184 vjddj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\94fbc3ddbf6c2cd6ef7333579a6d1790N.exe"C:\Users\Admin\AppData\Local\Temp\94fbc3ddbf6c2cd6ef7333579a6d1790N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\nhthhh.exec:\nhthhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\7htbnt.exec:\7htbnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\lflrxxf.exec:\lflrxxf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\hbtbtt.exec:\hbtbtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\bnbhnt.exec:\bnbhnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\vpdjv.exec:\vpdjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\lfrflrf.exec:\lfrflrf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\nhbnbn.exec:\nhbnbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\btbhnt.exec:\btbhnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\7dvvp.exec:\7dvvp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\9vdjp.exec:\9vdjp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\xrflxxl.exec:\xrflxxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\nbhthh.exec:\nbhthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\vvddp.exec:\vvddp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
\??\c:\vjddj.exec:\vjddj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\fxxfrxl.exec:\fxxfrxl.exe17⤵
- Executes dropped EXE
PID:772 -
\??\c:\1tnbnh.exec:\1tnbnh.exe18⤵
- Executes dropped EXE
PID:1808 -
\??\c:\dvjdv.exec:\dvjdv.exe19⤵
- Executes dropped EXE
PID:2208 -
\??\c:\jdpvp.exec:\jdpvp.exe20⤵
- Executes dropped EXE
PID:1268 -
\??\c:\9xflxxf.exec:\9xflxxf.exe21⤵
- Executes dropped EXE
PID:2376 -
\??\c:\fxrrllf.exec:\fxrrllf.exe22⤵
- Executes dropped EXE
PID:2304 -
\??\c:\nnhntb.exec:\nnhntb.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
\??\c:\1dvjd.exec:\1dvjd.exe24⤵
- Executes dropped EXE
PID:1984 -
\??\c:\lfrxrxl.exec:\lfrxrxl.exe25⤵
- Executes dropped EXE
PID:1892 -
\??\c:\llxxrxl.exec:\llxxrxl.exe26⤵
- Executes dropped EXE
PID:1140 -
\??\c:\nhnntb.exec:\nhnntb.exe27⤵
- Executes dropped EXE
PID:2900 -
\??\c:\hbhnbn.exec:\hbhnbn.exe28⤵
- Executes dropped EXE
PID:576 -
\??\c:\fxfflrf.exec:\fxfflrf.exe29⤵
- Executes dropped EXE
PID:2328 -
\??\c:\xrxxffr.exec:\xrxxffr.exe30⤵
- Executes dropped EXE
PID:3028 -
\??\c:\hbntnb.exec:\hbntnb.exe31⤵
- Executes dropped EXE
PID:2668 -
\??\c:\ddpdv.exec:\ddpdv.exe32⤵
- Executes dropped EXE
PID:2864 -
\??\c:\jdvdp.exec:\jdvdp.exe33⤵
- Executes dropped EXE
PID:1704 -
\??\c:\frlxfrf.exec:\frlxfrf.exe34⤵
- Executes dropped EXE
PID:2700 -
\??\c:\htnbnn.exec:\htnbnn.exe35⤵
- Executes dropped EXE
PID:2608 -
\??\c:\bbnthn.exec:\bbnthn.exe36⤵
- Executes dropped EXE
PID:2920 -
\??\c:\3htnth.exec:\3htnth.exe37⤵
- Executes dropped EXE
PID:2632 -
\??\c:\vpdjp.exec:\vpdjp.exe38⤵
- Executes dropped EXE
PID:2556 -
\??\c:\dvpjv.exec:\dvpjv.exe39⤵
- Executes dropped EXE
PID:2160 -
\??\c:\xxrfrxl.exec:\xxrfrxl.exe40⤵
- Executes dropped EXE
PID:2380 -
\??\c:\fxlrxfr.exec:\fxlrxfr.exe41⤵
- Executes dropped EXE
PID:1776 -
\??\c:\bbtnhh.exec:\bbtnhh.exe42⤵
- Executes dropped EXE
PID:2996 -
\??\c:\1hbnnn.exec:\1hbnnn.exe43⤵
- Executes dropped EXE
PID:2812 -
\??\c:\vpddd.exec:\vpddd.exe44⤵
- Executes dropped EXE
PID:2544 -
\??\c:\9pdjv.exec:\9pdjv.exe45⤵
- Executes dropped EXE
PID:1920 -
\??\c:\9rlffff.exec:\9rlffff.exe46⤵
- Executes dropped EXE
PID:2100 -
\??\c:\9fllrfr.exec:\9fllrfr.exe47⤵
- Executes dropped EXE
PID:2088 -
\??\c:\bbbnht.exec:\bbbnht.exe48⤵
- Executes dropped EXE
PID:1044 -
\??\c:\hhhthn.exec:\hhhthn.exe49⤵
- Executes dropped EXE
PID:1412 -
\??\c:\ddpvd.exec:\ddpvd.exe50⤵
- Executes dropped EXE
PID:636 -
\??\c:\vvjpd.exec:\vvjpd.exe51⤵
- Executes dropped EXE
PID:2232 -
\??\c:\rfxxllx.exec:\rfxxllx.exe52⤵
- Executes dropped EXE
PID:1656 -
\??\c:\bnnnbh.exec:\bnnnbh.exe53⤵
- Executes dropped EXE
PID:2128 -
\??\c:\nnbbnn.exec:\nnbbnn.exe54⤵
- Executes dropped EXE
PID:2236 -
\??\c:\jjdjp.exec:\jjdjp.exe55⤵
- Executes dropped EXE
PID:2372 -
\??\c:\ppddv.exec:\ppddv.exe56⤵
- Executes dropped EXE
PID:2416 -
\??\c:\1lxflrf.exec:\1lxflrf.exe57⤵
- Executes dropped EXE
PID:2116 -
\??\c:\rrlxrfl.exec:\rrlxrfl.exe58⤵
- Executes dropped EXE
PID:2080 -
\??\c:\tnbhbh.exec:\tnbhbh.exe59⤵
- Executes dropped EXE
PID:2092 -
\??\c:\7thntb.exec:\7thntb.exe60⤵
- Executes dropped EXE
PID:580 -
\??\c:\ddpdp.exec:\ddpdp.exe61⤵
- Executes dropped EXE
PID:2680 -
\??\c:\1vvjd.exec:\1vvjd.exe62⤵
- Executes dropped EXE
PID:1800 -
\??\c:\llxxlrx.exec:\llxxlrx.exe63⤵
- Executes dropped EXE
PID:700 -
\??\c:\fxfflrr.exec:\fxfflrr.exe64⤵
- Executes dropped EXE
PID:3036 -
\??\c:\nhbhtt.exec:\nhbhtt.exe65⤵
- Executes dropped EXE
PID:352 -
\??\c:\thhbnn.exec:\thhbnn.exe66⤵PID:1556
-
\??\c:\vpdpd.exec:\vpdpd.exe67⤵PID:3024
-
\??\c:\7llrlxf.exec:\7llrlxf.exe68⤵PID:1088
-
\??\c:\xrfxrfr.exec:\xrfxrfr.exe69⤵PID:1484
-
\??\c:\tbthtt.exec:\tbthtt.exe70⤵PID:1576
-
\??\c:\ddppj.exec:\ddppj.exe71⤵PID:1608
-
\??\c:\dvddj.exec:\dvddj.exe72⤵PID:1704
-
\??\c:\frxxlxf.exec:\frxxlxf.exe73⤵PID:2764
-
\??\c:\xrxxllr.exec:\xrxxllr.exe74⤵PID:2880
-
\??\c:\nnhhhh.exec:\nnhhhh.exe75⤵PID:2588
-
\??\c:\nhntnt.exec:\nhntnt.exe76⤵PID:2648
-
\??\c:\9ddjd.exec:\9ddjd.exe77⤵PID:1652
-
\??\c:\5ddpp.exec:\5ddpp.exe78⤵PID:2628
-
\??\c:\xxrrffr.exec:\xxrrffr.exe79⤵PID:1096
-
\??\c:\lflxlfr.exec:\lflxlfr.exe80⤵PID:1680
-
\??\c:\hbhbht.exec:\hbhbht.exe81⤵PID:2252
-
\??\c:\3jdpp.exec:\3jdpp.exe82⤵PID:2988
-
\??\c:\3pjpp.exec:\3pjpp.exe83⤵PID:1232
-
\??\c:\ffxfrxr.exec:\ffxfrxr.exe84⤵PID:2296
-
\??\c:\9rlfffr.exec:\9rlfffr.exe85⤵PID:592
-
\??\c:\bthhbh.exec:\bthhbh.exe86⤵PID:2388
-
\??\c:\nnhhbb.exec:\nnhhbb.exe87⤵PID:3032
-
\??\c:\vpjpp.exec:\vpjpp.exe88⤵PID:2292
-
\??\c:\vpdjj.exec:\vpdjj.exe89⤵PID:804
-
\??\c:\lfrrrlr.exec:\lfrrrlr.exe90⤵PID:2196
-
\??\c:\xlxflrf.exec:\xlxflrf.exe91⤵PID:2120
-
\??\c:\btnbnn.exec:\btnbnn.exe92⤵PID:2200
-
\??\c:\bbnbbh.exec:\bbnbbh.exe93⤵PID:2212
-
\??\c:\ddjdj.exec:\ddjdj.exe94⤵PID:2264
-
\??\c:\pdvpj.exec:\pdvpj.exe95⤵PID:2428
-
\??\c:\5xrlrrx.exec:\5xrlrrx.exe96⤵PID:1164
-
\??\c:\lfrxflr.exec:\lfrxflr.exe97⤵PID:2300
-
\??\c:\hbhhbb.exec:\hbhhbb.exe98⤵PID:928
-
\??\c:\hbtttb.exec:\hbtttb.exe99⤵PID:1116
-
\??\c:\ddpvj.exec:\ddpvj.exe100⤵PID:1080
-
\??\c:\pjppd.exec:\pjppd.exe101⤵PID:1804
-
\??\c:\1lxlxfl.exec:\1lxlxfl.exe102⤵PID:2288
-
\??\c:\rlxlflr.exec:\rlxlflr.exe103⤵PID:1152
-
\??\c:\btttnt.exec:\btttnt.exe104⤵PID:2452
-
\??\c:\nhhnbh.exec:\nhhnbh.exe105⤵PID:1068
-
\??\c:\dvddj.exec:\dvddj.exe106⤵PID:1480
-
\??\c:\fxflxfr.exec:\fxflxfr.exe107⤵PID:2796
-
\??\c:\lxlxrrf.exec:\lxlxrrf.exe108⤵PID:1600
-
\??\c:\9rrfrfx.exec:\9rrfrfx.exe109⤵PID:3020
-
\??\c:\nhtbht.exec:\nhtbht.exe110⤵PID:2712
-
\??\c:\9jdjv.exec:\9jdjv.exe111⤵PID:2592
-
\??\c:\dvpvp.exec:\dvpvp.exe112⤵PID:2700
-
\??\c:\rlflxxf.exec:\rlflxxf.exe113⤵PID:2904
-
\??\c:\1rlrlrx.exec:\1rlrlrx.exe114⤵PID:2656
-
\??\c:\tnhnth.exec:\tnhnth.exe115⤵PID:2604
-
\??\c:\nhbbbb.exec:\nhbbbb.exe116⤵PID:2596
-
\??\c:\pjpjd.exec:\pjpjd.exe117⤵PID:2336
-
\??\c:\vpjdv.exec:\vpjdv.exe118⤵PID:1240
-
\??\c:\ffllxfl.exec:\ffllxfl.exe119⤵PID:1776
-
\??\c:\rrxlflr.exec:\rrxlflr.exe120⤵PID:2404
-
\??\c:\ttbthn.exec:\ttbthn.exe121⤵PID:1460
-
\??\c:\9hbnbn.exec:\9hbnbn.exe122⤵PID:2544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-