Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 01:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe
-
Size
72KB
-
MD5
2e6639661b8e824117bd9f263ec9d950
-
SHA1
c4b64cdbb148111b0b3c5b8afae2118d6b22a5de
-
SHA256
2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90
-
SHA512
22afcb9367f2324ff708309f3499783663dc31f5ba64add9f8931c1773fd6fb7e2d0d10aba1f0948df0d902effb565418bcb57a0999bc6f2f57eee3d4e0d6c21
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjX:ymb3NkkiQ3mdBjFI4Vn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/1352-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1988-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1988-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1804-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3040-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1948-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1280-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2360-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1928 xrflxfl.exe 2996 tbhtbb.exe 2692 nnbhnn.exe 2748 vdddp.exe 2752 xrllxfl.exe 2792 3hbbnb.exe 2960 pdpjv.exe 1988 ffrlrrl.exe 2720 htnthn.exe 2524 djjvv.exe 2972 7ppvp.exe 1396 rlxfxfl.exe 2588 ttthbn.exe 2332 nbnthb.exe 2928 jppdd.exe 1816 fxlfrrx.exe 1804 xrxrxxf.exe 2516 bbntnb.exe 876 bbnbhb.exe 2580 vjppp.exe 3040 3lxrxxx.exe 2020 tnhntb.exe 1092 hbnnbt.exe 1948 ddvdp.exe 1280 9xrflll.exe 2272 xxrxffl.exe 1888 bttbnt.exe 2528 vvjvp.exe 2564 dvpvp.exe 2360 7lxxffr.exe 2384 hbthnt.exe 1652 7vvdp.exe 1992 dvjdd.exe 2996 jdpvj.exe 1812 lxxxrxr.exe 2828 fffrllx.exe 1624 9tnhtb.exe 2864 tnbntt.exe 2820 7vjpd.exe 2752 3vppd.exe 2812 1jvdd.exe 2604 xllfffl.exe 2600 fxrflrf.exe 2664 nhntbh.exe 1760 nbbtbt.exe 1140 vpjjv.exe 1232 vpddp.exe 2152 ffrxffl.exe 2776 9lxfllr.exe 2784 hbntnt.exe 2700 1bnnnn.exe 2908 7jpjj.exe 2000 jddvd.exe 2108 fflxxfr.exe 2320 rrlfrrf.exe 584 lllxxxl.exe 952 thnhnt.exe 980 7thhnb.exe 2696 jdvdd.exe 444 7vjjp.exe 2276 5rffxxf.exe 1092 rlrxfff.exe 956 nnnbnt.exe 776 1bbtbb.exe -
resource yara_rule behavioral1/memory/1352-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1988-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1988-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1804-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1948-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1280-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2360-287-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5htbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ppjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfllrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hbbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1928 1352 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 30 PID 1352 wrote to memory of 1928 1352 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 30 PID 1352 wrote to memory of 1928 1352 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 30 PID 1352 wrote to memory of 1928 1352 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 30 PID 1928 wrote to memory of 2996 1928 xrflxfl.exe 31 PID 1928 wrote to memory of 2996 1928 xrflxfl.exe 31 PID 1928 wrote to memory of 2996 1928 xrflxfl.exe 31 PID 1928 wrote to memory of 2996 1928 xrflxfl.exe 31 PID 2996 wrote to memory of 2692 2996 tbhtbb.exe 32 PID 2996 wrote to memory of 2692 2996 tbhtbb.exe 32 PID 2996 wrote to memory of 2692 2996 tbhtbb.exe 32 PID 2996 wrote to memory of 2692 2996 tbhtbb.exe 32 PID 2692 wrote to memory of 2748 2692 nnbhnn.exe 33 PID 2692 wrote to memory of 2748 2692 nnbhnn.exe 33 PID 2692 wrote to memory of 2748 2692 nnbhnn.exe 33 PID 2692 wrote to memory of 2748 2692 nnbhnn.exe 33 PID 2748 wrote to memory of 2752 2748 vdddp.exe 34 PID 2748 wrote to memory of 2752 2748 vdddp.exe 34 PID 2748 wrote to memory of 2752 2748 vdddp.exe 34 PID 2748 wrote to memory of 2752 2748 vdddp.exe 34 PID 2752 wrote to memory of 2792 2752 xrllxfl.exe 35 PID 2752 wrote to memory of 2792 2752 xrllxfl.exe 35 PID 2752 wrote to memory of 2792 2752 xrllxfl.exe 35 PID 2752 wrote to memory of 2792 2752 xrllxfl.exe 35 PID 2792 wrote to memory of 2960 2792 3hbbnb.exe 36 PID 2792 wrote to memory of 2960 2792 3hbbnb.exe 36 PID 2792 wrote to memory of 2960 2792 3hbbnb.exe 36 PID 2792 wrote to memory of 2960 2792 3hbbnb.exe 36 PID 2960 wrote to memory of 1988 2960 pdpjv.exe 37 PID 2960 wrote to memory of 1988 2960 pdpjv.exe 37 PID 2960 wrote to memory of 1988 2960 pdpjv.exe 37 PID 2960 wrote to memory of 1988 2960 pdpjv.exe 37 PID 1988 wrote to memory of 2720 1988 ffrlrrl.exe 38 PID 1988 wrote to memory of 2720 1988 ffrlrrl.exe 38 PID 1988 wrote to memory of 2720 1988 ffrlrrl.exe 38 PID 1988 wrote to memory of 2720 1988 ffrlrrl.exe 38 PID 2720 wrote to memory of 2524 2720 htnthn.exe 39 PID 2720 wrote to memory of 2524 2720 htnthn.exe 39 PID 2720 wrote to memory of 2524 2720 htnthn.exe 39 PID 2720 wrote to memory of 2524 2720 htnthn.exe 39 PID 2524 wrote to memory of 2972 2524 djjvv.exe 40 PID 2524 wrote to memory of 2972 2524 djjvv.exe 40 PID 2524 wrote to memory of 2972 2524 djjvv.exe 40 PID 2524 wrote to memory of 2972 2524 djjvv.exe 40 PID 2972 wrote to memory of 1396 2972 7ppvp.exe 41 PID 2972 wrote to memory of 1396 2972 7ppvp.exe 41 PID 2972 wrote to memory of 1396 2972 7ppvp.exe 41 PID 2972 wrote to memory of 1396 2972 7ppvp.exe 41 PID 1396 wrote to memory of 2588 1396 rlxfxfl.exe 42 PID 1396 wrote to memory of 2588 1396 rlxfxfl.exe 42 PID 1396 wrote to memory of 2588 1396 rlxfxfl.exe 42 PID 1396 wrote to memory of 2588 1396 rlxfxfl.exe 42 PID 2588 wrote to memory of 2332 2588 ttthbn.exe 43 PID 2588 wrote to memory of 2332 2588 ttthbn.exe 43 PID 2588 wrote to memory of 2332 2588 ttthbn.exe 43 PID 2588 wrote to memory of 2332 2588 ttthbn.exe 43 PID 2332 wrote to memory of 2928 2332 nbnthb.exe 44 PID 2332 wrote to memory of 2928 2332 nbnthb.exe 44 PID 2332 wrote to memory of 2928 2332 nbnthb.exe 44 PID 2332 wrote to memory of 2928 2332 nbnthb.exe 44 PID 2928 wrote to memory of 1816 2928 jppdd.exe 45 PID 2928 wrote to memory of 1816 2928 jppdd.exe 45 PID 2928 wrote to memory of 1816 2928 jppdd.exe 45 PID 2928 wrote to memory of 1816 2928 jppdd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe"C:\Users\Admin\AppData\Local\Temp\2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\xrflxfl.exec:\xrflxfl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\tbhtbb.exec:\tbhtbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\nnbhnn.exec:\nnbhnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\vdddp.exec:\vdddp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\xrllxfl.exec:\xrllxfl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\3hbbnb.exec:\3hbbnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\pdpjv.exec:\pdpjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\ffrlrrl.exec:\ffrlrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\htnthn.exec:\htnthn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\djjvv.exec:\djjvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\7ppvp.exec:\7ppvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\rlxfxfl.exec:\rlxfxfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
\??\c:\ttthbn.exec:\ttthbn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\nbnthb.exec:\nbnthb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\jppdd.exec:\jppdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\fxlfrrx.exec:\fxlfrrx.exe17⤵
- Executes dropped EXE
PID:1816 -
\??\c:\xrxrxxf.exec:\xrxrxxf.exe18⤵
- Executes dropped EXE
PID:1804 -
\??\c:\bbntnb.exec:\bbntnb.exe19⤵
- Executes dropped EXE
PID:2516 -
\??\c:\bbnbhb.exec:\bbnbhb.exe20⤵
- Executes dropped EXE
PID:876 -
\??\c:\vjppp.exec:\vjppp.exe21⤵
- Executes dropped EXE
PID:2580 -
\??\c:\3lxrxxx.exec:\3lxrxxx.exe22⤵
- Executes dropped EXE
PID:3040 -
\??\c:\tnhntb.exec:\tnhntb.exe23⤵
- Executes dropped EXE
PID:2020 -
\??\c:\hbnnbt.exec:\hbnnbt.exe24⤵
- Executes dropped EXE
PID:1092 -
\??\c:\ddvdp.exec:\ddvdp.exe25⤵
- Executes dropped EXE
PID:1948 -
\??\c:\9xrflll.exec:\9xrflll.exe26⤵
- Executes dropped EXE
PID:1280 -
\??\c:\xxrxffl.exec:\xxrxffl.exe27⤵
- Executes dropped EXE
PID:2272 -
\??\c:\bttbnt.exec:\bttbnt.exe28⤵
- Executes dropped EXE
PID:1888 -
\??\c:\vvjvp.exec:\vvjvp.exe29⤵
- Executes dropped EXE
PID:2528 -
\??\c:\dvpvp.exec:\dvpvp.exe30⤵
- Executes dropped EXE
PID:2564 -
\??\c:\7lxxffr.exec:\7lxxffr.exe31⤵
- Executes dropped EXE
PID:2360 -
\??\c:\hbthnt.exec:\hbthnt.exe32⤵
- Executes dropped EXE
PID:2384 -
\??\c:\7vvdp.exec:\7vvdp.exe33⤵
- Executes dropped EXE
PID:1652 -
\??\c:\dvjdd.exec:\dvjdd.exe34⤵
- Executes dropped EXE
PID:1992 -
\??\c:\jdpvj.exec:\jdpvj.exe35⤵
- Executes dropped EXE
PID:2996 -
\??\c:\lxxxrxr.exec:\lxxxrxr.exe36⤵
- Executes dropped EXE
PID:1812 -
\??\c:\fffrllx.exec:\fffrllx.exe37⤵
- Executes dropped EXE
PID:2828 -
\??\c:\9tnhtb.exec:\9tnhtb.exe38⤵
- Executes dropped EXE
PID:1624 -
\??\c:\tnbntt.exec:\tnbntt.exe39⤵
- Executes dropped EXE
PID:2864 -
\??\c:\7vjpd.exec:\7vjpd.exe40⤵
- Executes dropped EXE
PID:2820 -
\??\c:\3vppd.exec:\3vppd.exe41⤵
- Executes dropped EXE
PID:2752 -
\??\c:\1jvdd.exec:\1jvdd.exe42⤵
- Executes dropped EXE
PID:2812 -
\??\c:\xllfffl.exec:\xllfffl.exe43⤵
- Executes dropped EXE
PID:2604 -
\??\c:\fxrflrf.exec:\fxrflrf.exe44⤵
- Executes dropped EXE
PID:2600 -
\??\c:\nhntbh.exec:\nhntbh.exe45⤵
- Executes dropped EXE
PID:2664 -
\??\c:\nbbtbt.exec:\nbbtbt.exe46⤵
- Executes dropped EXE
PID:1760 -
\??\c:\vpjjv.exec:\vpjjv.exe47⤵
- Executes dropped EXE
PID:1140 -
\??\c:\vpddp.exec:\vpddp.exe48⤵
- Executes dropped EXE
PID:1232 -
\??\c:\ffrxffl.exec:\ffrxffl.exe49⤵
- Executes dropped EXE
PID:2152 -
\??\c:\9lxfllr.exec:\9lxfllr.exe50⤵
- Executes dropped EXE
PID:2776 -
\??\c:\hbntnt.exec:\hbntnt.exe51⤵
- Executes dropped EXE
PID:2784 -
\??\c:\1bnnnn.exec:\1bnnnn.exe52⤵
- Executes dropped EXE
PID:2700 -
\??\c:\7jpjj.exec:\7jpjj.exe53⤵
- Executes dropped EXE
PID:2908 -
\??\c:\jddvd.exec:\jddvd.exe54⤵
- Executes dropped EXE
PID:2000 -
\??\c:\fflxxfr.exec:\fflxxfr.exe55⤵
- Executes dropped EXE
PID:2108 -
\??\c:\rrlfrrf.exec:\rrlfrrf.exe56⤵
- Executes dropped EXE
PID:2320 -
\??\c:\lllxxxl.exec:\lllxxxl.exe57⤵
- Executes dropped EXE
PID:584 -
\??\c:\thnhnt.exec:\thnhnt.exe58⤵
- Executes dropped EXE
PID:952 -
\??\c:\7thhnb.exec:\7thhnb.exe59⤵
- Executes dropped EXE
PID:980 -
\??\c:\jdvdd.exec:\jdvdd.exe60⤵
- Executes dropped EXE
PID:2696 -
\??\c:\7vjjp.exec:\7vjjp.exe61⤵
- Executes dropped EXE
PID:444 -
\??\c:\5rffxxf.exec:\5rffxxf.exe62⤵
- Executes dropped EXE
PID:2276 -
\??\c:\rlrxfff.exec:\rlrxfff.exe63⤵
- Executes dropped EXE
PID:1092 -
\??\c:\nnnbnt.exec:\nnnbnt.exe64⤵
- Executes dropped EXE
PID:956 -
\??\c:\1bbtbb.exec:\1bbtbb.exe65⤵
- Executes dropped EXE
PID:776 -
\??\c:\jvddd.exec:\jvddd.exe66⤵PID:552
-
\??\c:\jdppd.exec:\jdppd.exe67⤵PID:1656
-
\??\c:\xrxrxrf.exec:\xrxrxrf.exe68⤵PID:1912
-
\??\c:\lfflxfr.exec:\lfflxfr.exe69⤵PID:2528
-
\??\c:\tnbhhh.exec:\tnbhhh.exe70⤵PID:900
-
\??\c:\tnbtbb.exec:\tnbtbb.exe71⤵PID:896
-
\??\c:\jjdpd.exec:\jjdpd.exe72⤵PID:2540
-
\??\c:\9rrlrfl.exec:\9rrlrfl.exe73⤵PID:2384
-
\??\c:\1hthnt.exec:\1hthnt.exe74⤵PID:2420
-
\??\c:\hhnntt.exec:\hhnntt.exe75⤵PID:2192
-
\??\c:\dvjdp.exec:\dvjdp.exe76⤵PID:2680
-
\??\c:\7jjvd.exec:\7jjvd.exe77⤵PID:2832
-
\??\c:\3rlflxx.exec:\3rlflxx.exe78⤵PID:2824
-
\??\c:\3fxfrfl.exec:\3fxfrfl.exe79⤵PID:2728
-
\??\c:\tnbthh.exec:\tnbthh.exe80⤵PID:3016
-
\??\c:\ntnhnt.exec:\ntnhnt.exe81⤵PID:2628
-
\??\c:\jdvdp.exec:\jdvdp.exe82⤵PID:1904
-
\??\c:\5ppjp.exec:\5ppjp.exe83⤵PID:2936
-
\??\c:\7rlxrfl.exec:\7rlxrfl.exe84⤵PID:2676
-
\??\c:\1frrffx.exec:\1frrffx.exe85⤵PID:2652
-
\??\c:\hbbnbn.exec:\hbbnbn.exe86⤵PID:1828
-
\??\c:\hbntbt.exec:\hbntbt.exe87⤵PID:1552
-
\??\c:\pjvjv.exec:\pjvjv.exe88⤵PID:300
-
\??\c:\9pjdp.exec:\9pjdp.exe89⤵PID:1232
-
\??\c:\ffxrflr.exec:\ffxrflr.exe90⤵PID:2900
-
\??\c:\rrrfrfr.exec:\rrrfrfr.exe91⤵PID:2956
-
\??\c:\nnbtnn.exec:\nnbtnn.exe92⤵PID:2332
-
\??\c:\nbnbhb.exec:\nbnbhb.exe93⤵PID:2928
-
\??\c:\vvpvj.exec:\vvpvj.exe94⤵PID:2016
-
\??\c:\rlxrflr.exec:\rlxrflr.exe95⤵PID:2532
-
\??\c:\xlfrrrx.exec:\xlfrrrx.exe96⤵PID:1676
-
\??\c:\xllrflx.exec:\xllrflx.exe97⤵PID:2080
-
\??\c:\5htthn.exec:\5htthn.exe98⤵PID:1404
-
\??\c:\ttbntb.exec:\ttbntb.exe99⤵PID:264
-
\??\c:\9ddjp.exec:\9ddjp.exe100⤵PID:1016
-
\??\c:\pjjvd.exec:\pjjvd.exe101⤵PID:2024
-
\??\c:\xrlflfr.exec:\xrlflfr.exe102⤵PID:2240
-
\??\c:\ffllrrf.exec:\ffllrrf.exe103⤵PID:1176
-
\??\c:\nhnhht.exec:\nhnhht.exe104⤵PID:1008
-
\??\c:\5btbhb.exec:\5btbhb.exe105⤵PID:1136
-
\??\c:\1vpdv.exec:\1vpdv.exe106⤵PID:2264
-
\??\c:\jdvvj.exec:\jdvvj.exe107⤵PID:2412
-
\??\c:\lllxlrl.exec:\lllxlrl.exe108⤵PID:2368
-
\??\c:\5fxflxl.exec:\5fxflxl.exe109⤵PID:3008
-
\??\c:\5bthnn.exec:\5bthnn.exe110⤵PID:1776
-
\??\c:\btbbnn.exec:\btbbnn.exe111⤵PID:2476
-
\??\c:\ddvpv.exec:\ddvpv.exe112⤵PID:896
-
\??\c:\7jdjv.exec:\7jdjv.exe113⤵PID:1976
-
\??\c:\fxxxflx.exec:\fxxxflx.exe114⤵PID:1956
-
\??\c:\rrfrlrx.exec:\rrfrlrx.exe115⤵PID:1820
-
\??\c:\7hbbhh.exec:\7hbbhh.exe116⤵PID:2256
-
\??\c:\nntbbn.exec:\nntbbn.exe117⤵PID:1812
-
\??\c:\9jddp.exec:\9jddp.exe118⤵PID:2292
-
\??\c:\dpvdp.exec:\dpvdp.exe119⤵PID:2804
-
\??\c:\xrlrxfl.exec:\xrlrxfl.exe120⤵PID:2724
-
\??\c:\9xlxlrf.exec:\9xlxlrf.exe121⤵PID:2820
-
\??\c:\ffxfrxr.exec:\ffxfrxr.exe122⤵PID:1340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-