Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 03:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe
-
Size
249KB
-
MD5
977911e4ef768c58c6b7001d425548c4
-
SHA1
95c8d45a2f2a5fdc76da6ad3b1dea07a74a4290a
-
SHA256
e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8
-
SHA512
896cd9defcd11a818d65d262041ef2e09981e7aa575e8e0dd88e71b503922da271e67b755d1a39ae12ee74d0129931b2debc666a259fd7012c1c4ef63c295d26
-
SSDEEP
6144:n3C9BRo/AIX27NHWpU00VIxas1oa3YiFRlitB:n3C9uD6AUDCa4NYmRMj
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/268-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2420-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/396-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/856-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1972-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1040-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1516-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1188-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2308-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-2371-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2876 3nhhbb.exe 2420 pppvj.exe 2604 vvdvj.exe 2660 llfrxfx.exe 2748 nnhhtt.exe 3020 9dvvd.exe 2540 bhnhnh.exe 2524 lrxrxll.exe 2992 hbttnh.exe 324 vpddp.exe 396 lrrlxrx.exe 2720 nnnbht.exe 2000 pvpjp.exe 856 5lrlfll.exe 2716 7ppvd.exe 1972 dppvd.exe 1040 lfrrxfl.exe 2688 pvjjj.exe 2240 flflxxr.exe 2192 bbntbh.exe 448 nhbhnb.exe 2944 vdjvp.exe 1516 nthhnh.exe 1968 xfrffxx.exe 992 tbhtnn.exe 1188 9hhtbn.exe 2920 jvdpv.exe 2948 btnbht.exe 2316 hbthtb.exe 2488 1vppd.exe 2308 1xxflrx.exe 2696 dpjpv.exe 896 tbhbbb.exe 2772 vvjvd.exe 2660 pvvvj.exe 2520 fxllxff.exe 2352 bbnbhn.exe 3020 nnbhhh.exe 2624 vjdvp.exe 2512 rrrlxll.exe 2524 rflxxll.exe 1792 bbnnbt.exe 1324 1jddp.exe 1772 ffxfxlx.exe 2416 fllxrlr.exe 2828 tbhhtn.exe 1400 pppvj.exe 2708 xfxrxxx.exe 624 fxrxlrx.exe 1608 nnbhtb.exe 2248 djjjd.exe 1920 dddjj.exe 1160 lxfxrll.exe 2160 nhbtnh.exe 2144 tttbth.exe 2372 vpjvp.exe 956 rxrfxrr.exe 1096 ttttnn.exe 2196 7tbnhb.exe 1876 ppjpj.exe 988 xffxxrr.exe 3048 3nnthn.exe 2364 hththn.exe 2920 vpdjj.exe -
resource yara_rule behavioral1/memory/268-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/396-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/856-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1040-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1516-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1188-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-303-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-2371-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfflxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxffffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hhhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbthh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 268 wrote to memory of 2876 268 e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe 31 PID 268 wrote to memory of 2876 268 e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe 31 PID 268 wrote to memory of 2876 268 e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe 31 PID 268 wrote to memory of 2876 268 e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe 31 PID 2876 wrote to memory of 2420 2876 3nhhbb.exe 32 PID 2876 wrote to memory of 2420 2876 3nhhbb.exe 32 PID 2876 wrote to memory of 2420 2876 3nhhbb.exe 32 PID 2876 wrote to memory of 2420 2876 3nhhbb.exe 32 PID 2420 wrote to memory of 2604 2420 pppvj.exe 33 PID 2420 wrote to memory of 2604 2420 pppvj.exe 33 PID 2420 wrote to memory of 2604 2420 pppvj.exe 33 PID 2420 wrote to memory of 2604 2420 pppvj.exe 33 PID 2604 wrote to memory of 2660 2604 vvdvj.exe 34 PID 2604 wrote to memory of 2660 2604 vvdvj.exe 34 PID 2604 wrote to memory of 2660 2604 vvdvj.exe 34 PID 2604 wrote to memory of 2660 2604 vvdvj.exe 34 PID 2660 wrote to memory of 2748 2660 llfrxfx.exe 35 PID 2660 wrote to memory of 2748 2660 llfrxfx.exe 35 PID 2660 wrote to memory of 2748 2660 llfrxfx.exe 35 PID 2660 wrote to memory of 2748 2660 llfrxfx.exe 35 PID 2748 wrote to memory of 3020 2748 nnhhtt.exe 36 PID 2748 wrote to memory of 3020 2748 nnhhtt.exe 36 PID 2748 wrote to memory of 3020 2748 nnhhtt.exe 36 PID 2748 wrote to memory of 3020 2748 nnhhtt.exe 36 PID 3020 wrote to memory of 2540 3020 9dvvd.exe 37 PID 3020 wrote to memory of 2540 3020 9dvvd.exe 37 PID 3020 wrote to memory of 2540 3020 9dvvd.exe 37 PID 3020 wrote to memory of 2540 3020 9dvvd.exe 37 PID 2540 wrote to memory of 2524 2540 bhnhnh.exe 38 PID 2540 wrote to memory of 2524 2540 bhnhnh.exe 38 PID 2540 wrote to memory of 2524 2540 bhnhnh.exe 38 PID 2540 wrote to memory of 2524 2540 bhnhnh.exe 38 PID 2524 wrote to memory of 2992 2524 lrxrxll.exe 39 PID 2524 wrote to memory of 2992 2524 lrxrxll.exe 39 PID 2524 wrote to memory of 2992 2524 lrxrxll.exe 39 PID 2524 wrote to memory of 2992 2524 lrxrxll.exe 39 PID 2992 wrote to memory of 324 2992 hbttnh.exe 40 PID 2992 wrote to memory of 324 2992 hbttnh.exe 40 PID 2992 wrote to memory of 324 2992 hbttnh.exe 40 PID 2992 wrote to memory of 324 2992 hbttnh.exe 40 PID 324 wrote to memory of 396 324 vpddp.exe 41 PID 324 wrote to memory of 396 324 vpddp.exe 41 PID 324 wrote to memory of 396 324 vpddp.exe 41 PID 324 wrote to memory of 396 324 vpddp.exe 41 PID 396 wrote to memory of 2720 396 lrrlxrx.exe 42 PID 396 wrote to memory of 2720 396 lrrlxrx.exe 42 PID 396 wrote to memory of 2720 396 lrrlxrx.exe 42 PID 396 wrote to memory of 2720 396 lrrlxrx.exe 42 PID 2720 wrote to memory of 2000 2720 nnnbht.exe 43 PID 2720 wrote to memory of 2000 2720 nnnbht.exe 43 PID 2720 wrote to memory of 2000 2720 nnnbht.exe 43 PID 2720 wrote to memory of 2000 2720 nnnbht.exe 43 PID 2000 wrote to memory of 856 2000 pvpjp.exe 44 PID 2000 wrote to memory of 856 2000 pvpjp.exe 44 PID 2000 wrote to memory of 856 2000 pvpjp.exe 44 PID 2000 wrote to memory of 856 2000 pvpjp.exe 44 PID 856 wrote to memory of 2716 856 5lrlfll.exe 45 PID 856 wrote to memory of 2716 856 5lrlfll.exe 45 PID 856 wrote to memory of 2716 856 5lrlfll.exe 45 PID 856 wrote to memory of 2716 856 5lrlfll.exe 45 PID 2716 wrote to memory of 1972 2716 7ppvd.exe 46 PID 2716 wrote to memory of 1972 2716 7ppvd.exe 46 PID 2716 wrote to memory of 1972 2716 7ppvd.exe 46 PID 2716 wrote to memory of 1972 2716 7ppvd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe"C:\Users\Admin\AppData\Local\Temp\e49bf9cce2b81bd69e0d8ff004817a6c86fa0fe838bdd571cd747b93cb7c35f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:268 -
\??\c:\3nhhbb.exec:\3nhhbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\pppvj.exec:\pppvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\vvdvj.exec:\vvdvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\llfrxfx.exec:\llfrxfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\nnhhtt.exec:\nnhhtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\9dvvd.exec:\9dvvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\bhnhnh.exec:\bhnhnh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\lrxrxll.exec:\lrxrxll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\hbttnh.exec:\hbttnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\vpddp.exec:\vpddp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
\??\c:\lrrlxrx.exec:\lrrlxrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\nnnbht.exec:\nnnbht.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\pvpjp.exec:\pvpjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\5lrlfll.exec:\5lrlfll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\7ppvd.exec:\7ppvd.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\dppvd.exec:\dppvd.exe17⤵
- Executes dropped EXE
PID:1972 -
\??\c:\lfrrxfl.exec:\lfrrxfl.exe18⤵
- Executes dropped EXE
PID:1040 -
\??\c:\pvjjj.exec:\pvjjj.exe19⤵
- Executes dropped EXE
PID:2688 -
\??\c:\flflxxr.exec:\flflxxr.exe20⤵
- Executes dropped EXE
PID:2240 -
\??\c:\bbntbh.exec:\bbntbh.exe21⤵
- Executes dropped EXE
PID:2192 -
\??\c:\nhbhnb.exec:\nhbhnb.exe22⤵
- Executes dropped EXE
PID:448 -
\??\c:\vdjvp.exec:\vdjvp.exe23⤵
- Executes dropped EXE
PID:2944 -
\??\c:\nthhnh.exec:\nthhnh.exe24⤵
- Executes dropped EXE
PID:1516 -
\??\c:\xfrffxx.exec:\xfrffxx.exe25⤵
- Executes dropped EXE
PID:1968 -
\??\c:\tbhtnn.exec:\tbhtnn.exe26⤵
- Executes dropped EXE
PID:992 -
\??\c:\9hhtbn.exec:\9hhtbn.exe27⤵
- Executes dropped EXE
PID:1188 -
\??\c:\jvdpv.exec:\jvdpv.exe28⤵
- Executes dropped EXE
PID:2920 -
\??\c:\btnbht.exec:\btnbht.exe29⤵
- Executes dropped EXE
PID:2948 -
\??\c:\hbthtb.exec:\hbthtb.exe30⤵
- Executes dropped EXE
PID:2316 -
\??\c:\1vppd.exec:\1vppd.exe31⤵
- Executes dropped EXE
PID:2488 -
\??\c:\1xxflrx.exec:\1xxflrx.exe32⤵
- Executes dropped EXE
PID:2308 -
\??\c:\dpjpv.exec:\dpjpv.exe33⤵
- Executes dropped EXE
PID:2696 -
\??\c:\tbhbbb.exec:\tbhbbb.exe34⤵
- Executes dropped EXE
PID:896 -
\??\c:\vvjvd.exec:\vvjvd.exe35⤵
- Executes dropped EXE
PID:2772 -
\??\c:\pvvvj.exec:\pvvvj.exe36⤵
- Executes dropped EXE
PID:2660 -
\??\c:\fxllxff.exec:\fxllxff.exe37⤵
- Executes dropped EXE
PID:2520 -
\??\c:\bbnbhn.exec:\bbnbhn.exe38⤵
- Executes dropped EXE
PID:2352 -
\??\c:\nnbhhh.exec:\nnbhhh.exe39⤵
- Executes dropped EXE
PID:3020 -
\??\c:\vjdvp.exec:\vjdvp.exe40⤵
- Executes dropped EXE
PID:2624 -
\??\c:\rrrlxll.exec:\rrrlxll.exe41⤵
- Executes dropped EXE
PID:2512 -
\??\c:\rflxxll.exec:\rflxxll.exe42⤵
- Executes dropped EXE
PID:2524 -
\??\c:\bbnnbt.exec:\bbnnbt.exe43⤵
- Executes dropped EXE
PID:1792 -
\??\c:\1jddp.exec:\1jddp.exe44⤵
- Executes dropped EXE
PID:1324 -
\??\c:\ffxfxlx.exec:\ffxfxlx.exe45⤵
- Executes dropped EXE
PID:1772 -
\??\c:\fllxrlr.exec:\fllxrlr.exe46⤵
- Executes dropped EXE
PID:2416 -
\??\c:\tbhhtn.exec:\tbhhtn.exe47⤵
- Executes dropped EXE
PID:2828 -
\??\c:\pppvj.exec:\pppvj.exe48⤵
- Executes dropped EXE
PID:1400 -
\??\c:\xfxrxxx.exec:\xfxrxxx.exe49⤵
- Executes dropped EXE
PID:2708 -
\??\c:\fxrxlrx.exec:\fxrxlrx.exe50⤵
- Executes dropped EXE
PID:624 -
\??\c:\nnbhtb.exec:\nnbhtb.exe51⤵
- Executes dropped EXE
PID:1608 -
\??\c:\djjjd.exec:\djjjd.exe52⤵
- Executes dropped EXE
PID:2248 -
\??\c:\dddjj.exec:\dddjj.exe53⤵
- Executes dropped EXE
PID:1920 -
\??\c:\lxfxrll.exec:\lxfxrll.exe54⤵
- Executes dropped EXE
PID:1160 -
\??\c:\nhbtnh.exec:\nhbtnh.exe55⤵
- Executes dropped EXE
PID:2160 -
\??\c:\tttbth.exec:\tttbth.exe56⤵
- Executes dropped EXE
PID:2144 -
\??\c:\vpjvp.exec:\vpjvp.exe57⤵
- Executes dropped EXE
PID:2372 -
\??\c:\rxrfxrr.exec:\rxrfxrr.exe58⤵
- Executes dropped EXE
PID:956 -
\??\c:\ttttnn.exec:\ttttnn.exe59⤵
- Executes dropped EXE
PID:1096 -
\??\c:\7tbnhb.exec:\7tbnhb.exe60⤵
- Executes dropped EXE
PID:2196 -
\??\c:\ppjpj.exec:\ppjpj.exe61⤵
- Executes dropped EXE
PID:1876 -
\??\c:\xffxxrr.exec:\xffxxrr.exe62⤵
- Executes dropped EXE
PID:988 -
\??\c:\3nnthn.exec:\3nnthn.exe63⤵
- Executes dropped EXE
PID:3048 -
\??\c:\hththn.exec:\hththn.exe64⤵
- Executes dropped EXE
PID:2364 -
\??\c:\vpdjj.exec:\vpdjj.exe65⤵
- Executes dropped EXE
PID:2920 -
\??\c:\rlrfrfr.exec:\rlrfrfr.exe66⤵PID:2436
-
\??\c:\lfrxffx.exec:\lfrxffx.exe67⤵PID:1748
-
\??\c:\bbtthh.exec:\bbtthh.exe68⤵PID:2268
-
\??\c:\pdpjj.exec:\pdpjj.exe69⤵PID:1716
-
\??\c:\fllxlxf.exec:\fllxlxf.exe70⤵PID:1588
-
\??\c:\7tttbn.exec:\7tttbn.exe71⤵PID:2420
-
\??\c:\hhtnbb.exec:\hhtnbb.exe72⤵PID:2764
-
\??\c:\vdpjp.exec:\vdpjp.exe73⤵PID:2796
-
\??\c:\fxxfflf.exec:\fxxfflf.exe74⤵PID:2824
-
\??\c:\xxllrxf.exec:\xxllrxf.exe75⤵PID:2548
-
\??\c:\tthbnt.exec:\tthbnt.exe76⤵PID:2536
-
\??\c:\pjvvj.exec:\pjvvj.exe77⤵PID:2560
-
\??\c:\jdvvj.exec:\jdvvj.exe78⤵PID:2544
-
\??\c:\5ffrllx.exec:\5ffrllx.exe79⤵PID:2976
-
\??\c:\nttbhb.exec:\nttbhb.exe80⤵PID:2968
-
\??\c:\bbtnhn.exec:\bbtnhn.exe81⤵PID:2524
-
\??\c:\jdvdv.exec:\jdvdv.exe82⤵PID:1500
-
\??\c:\rlxfxxl.exec:\rlxfxxl.exe83⤵PID:2500
-
\??\c:\bhbbbn.exec:\bhbbbn.exe84⤵PID:1776
-
\??\c:\5tbhtn.exec:\5tbhtn.exe85⤵PID:1996
-
\??\c:\jjdpd.exec:\jjdpd.exe86⤵PID:2828
-
\??\c:\flrlfrr.exec:\flrlfrr.exe87⤵PID:952
-
\??\c:\lrlxrff.exec:\lrlxrff.exe88⤵PID:1616
-
\??\c:\tnthhb.exec:\tnthhb.exe89⤵PID:2964
-
\??\c:\djpjj.exec:\djpjj.exe90⤵PID:2552
-
\??\c:\rrlxfxr.exec:\rrlxfxr.exe91⤵PID:2872
-
\??\c:\rrlxlxr.exec:\rrlxlxr.exe92⤵PID:2380
-
\??\c:\hhbnbh.exec:\hhbnbh.exe93⤵PID:1532
-
\??\c:\jppdp.exec:\jppdp.exe94⤵PID:1100
-
\??\c:\5ddvv.exec:\5ddvv.exe95⤵PID:3040
-
\??\c:\rrrfxrf.exec:\rrrfxrf.exe96⤵PID:748
-
\??\c:\tbbtnb.exec:\tbbtnb.exe97⤵PID:1620
-
\??\c:\nttnht.exec:\nttnht.exe98⤵PID:1516
-
\??\c:\5jjdv.exec:\5jjdv.exe99⤵PID:1736
-
\??\c:\9xxfxrf.exec:\9xxfxrf.exe100⤵PID:2264
-
\??\c:\9xxfrfl.exec:\9xxfrfl.exe101⤵PID:2212
-
\??\c:\3bbnbn.exec:\3bbnbn.exe102⤵PID:1236
-
\??\c:\7dvvd.exec:\7dvvd.exe103⤵PID:2228
-
\??\c:\7jjvp.exec:\7jjvp.exe104⤵PID:2596
-
\??\c:\llrxlrf.exec:\llrxlrf.exe105⤵PID:2060
-
\??\c:\nhthht.exec:\nhthht.exe106⤵PID:2320
-
\??\c:\bbbhbh.exec:\bbbhbh.exe107⤵PID:1812
-
\??\c:\3jpvv.exec:\3jpvv.exe108⤵PID:2332
-
\??\c:\llxffrl.exec:\llxffrl.exe109⤵PID:1944
-
\??\c:\xrlxrxf.exec:\xrlxrxf.exe110⤵PID:2760
-
\??\c:\7nhtnt.exec:\7nhtnt.exe111⤵PID:3044
-
\??\c:\7pjpj.exec:\7pjpj.exe112⤵PID:2660
-
\??\c:\7djpj.exec:\7djpj.exe113⤵PID:2868
-
\??\c:\1fxfxfr.exec:\1fxfxfr.exe114⤵PID:2676
-
\??\c:\7hhnbt.exec:\7hhnbt.exe115⤵PID:2776
-
\??\c:\1vpvj.exec:\1vpvj.exe116⤵PID:2508
-
\??\c:\5vvdd.exec:\5vvdd.exe117⤵PID:2516
-
\??\c:\xflxfxx.exec:\xflxfxx.exe118⤵PID:308
-
\??\c:\xrrllrx.exec:\xrrllrx.exe119⤵PID:1488
-
\??\c:\hhtnnh.exec:\hhtnnh.exe120⤵PID:1752
-
\??\c:\7vdvp.exec:\7vdvp.exe121⤵PID:2024
-
\??\c:\xxrllrf.exec:\xxrllrf.exe122⤵PID:2416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-