Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe
Resource
win7-20240903-en
General
-
Target
354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe
-
Size
82KB
-
MD5
7b9f0a7b90de77b4940357127d5be098
-
SHA1
95c14897730771404ce4afe3748ff5ac5341fb61
-
SHA256
354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c
-
SHA512
a4d1e321aa4caedda459290e7ed690c45db5bd141bf565732a70231ec5669fd6ee6a2d64c13e2bc9d89b3886d5472ab244767180424610fe709c4781fd8d4548
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIpWCz+FR4RzWqC5rINFE4yeqB:ymb3NkkiQ3mdBjFIsIpZ+R4RzWqCu4rJ
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2388-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2388-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1628-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/352-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/268-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2860-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2276-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1432-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1628 rlrrxxl.exe 2028 tnbbhn.exe 352 dpjdp.exe 2228 pjpvp.exe 2840 lfrlrrf.exe 2024 nhbnbn.exe 2776 hbnnbb.exe 1932 pppdv.exe 2676 xrxllrx.exe 2124 lrllxxl.exe 268 nhthtb.exe 2860 hnnnnb.exe 1636 3jjpj.exe 2592 lfxlrxf.exe 1300 xflrrrl.exe 1964 bthntt.exe 2128 9nhhnb.exe 1936 jjjpv.exe 2276 vjjjp.exe 2108 fxfxxrx.exe 2700 lrrfrrx.exe 3060 5ttnht.exe 2800 btnnbb.exe 1988 jvvpp.exe 1432 lfxxffl.exe 1832 fffxrxl.exe 1780 nnnntb.exe 2264 7pjjj.exe 2312 7jdpd.exe 2468 xxllxlf.exe 1640 xrrlrrx.exe 1520 nhtthb.exe 2688 htnntb.exe 2524 jjddp.exe 1972 3vvvj.exe 2748 xxrrxfl.exe 2896 xrxrfxf.exe 2968 hbntnb.exe 2420 hbtbbh.exe 2736 ppjjv.exe 2808 3ddvd.exe 2652 dvjpj.exe 2768 ffllrxf.exe 3064 rrflrrr.exe 316 hbthtb.exe 580 btntbh.exe 2856 dvjjv.exe 2836 dvjjp.exe 592 fxlrffl.exe 2592 xfflrlr.exe 1560 3nhnhn.exe 908 djjvv.exe 2936 7djjd.exe 2160 frfrrlf.exe 2952 tnhntt.exe 3048 nbhbbb.exe 2364 pvjdj.exe 2532 vpdjp.exe 1464 7fxfllx.exe 1700 9xrxxfr.exe 2996 5nhtnt.exe 956 bthnbh.exe 1432 7dddj.exe 2484 jvvpp.exe -
resource yara_rule behavioral1/memory/2388-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/352-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-63-0x00000000001B0000-0x00000000001BC000-memory.dmp upx behavioral1/memory/2776-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/268-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2276-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1432-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrffflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rllrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrllfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1628 2388 354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe 30 PID 2388 wrote to memory of 1628 2388 354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe 30 PID 2388 wrote to memory of 1628 2388 354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe 30 PID 2388 wrote to memory of 1628 2388 354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe 30 PID 1628 wrote to memory of 2028 1628 rlrrxxl.exe 31 PID 1628 wrote to memory of 2028 1628 rlrrxxl.exe 31 PID 1628 wrote to memory of 2028 1628 rlrrxxl.exe 31 PID 1628 wrote to memory of 2028 1628 rlrrxxl.exe 31 PID 2028 wrote to memory of 352 2028 tnbbhn.exe 32 PID 2028 wrote to memory of 352 2028 tnbbhn.exe 32 PID 2028 wrote to memory of 352 2028 tnbbhn.exe 32 PID 2028 wrote to memory of 352 2028 tnbbhn.exe 32 PID 352 wrote to memory of 2228 352 dpjdp.exe 33 PID 352 wrote to memory of 2228 352 dpjdp.exe 33 PID 352 wrote to memory of 2228 352 dpjdp.exe 33 PID 352 wrote to memory of 2228 352 dpjdp.exe 33 PID 2228 wrote to memory of 2840 2228 pjpvp.exe 34 PID 2228 wrote to memory of 2840 2228 pjpvp.exe 34 PID 2228 wrote to memory of 2840 2228 pjpvp.exe 34 PID 2228 wrote to memory of 2840 2228 pjpvp.exe 34 PID 2840 wrote to memory of 2024 2840 lfrlrrf.exe 35 PID 2840 wrote to memory of 2024 2840 lfrlrrf.exe 35 PID 2840 wrote to memory of 2024 2840 lfrlrrf.exe 35 PID 2840 wrote to memory of 2024 2840 lfrlrrf.exe 35 PID 2024 wrote to memory of 2776 2024 nhbnbn.exe 36 PID 2024 wrote to memory of 2776 2024 nhbnbn.exe 36 PID 2024 wrote to memory of 2776 2024 nhbnbn.exe 36 PID 2024 wrote to memory of 2776 2024 nhbnbn.exe 36 PID 2776 wrote to memory of 1932 2776 hbnnbb.exe 37 PID 2776 wrote to memory of 1932 2776 hbnnbb.exe 37 PID 2776 wrote to memory of 1932 2776 hbnnbb.exe 37 PID 2776 wrote to memory of 1932 2776 hbnnbb.exe 37 PID 1932 wrote to memory of 2676 1932 pppdv.exe 38 PID 1932 wrote to memory of 2676 1932 pppdv.exe 38 PID 1932 wrote to memory of 2676 1932 pppdv.exe 38 PID 1932 wrote to memory of 2676 1932 pppdv.exe 38 PID 2676 wrote to memory of 2124 2676 xrxllrx.exe 39 PID 2676 wrote to memory of 2124 2676 xrxllrx.exe 39 PID 2676 wrote to memory of 2124 2676 xrxllrx.exe 39 PID 2676 wrote to memory of 2124 2676 xrxllrx.exe 39 PID 2124 wrote to memory of 268 2124 lrllxxl.exe 40 PID 2124 wrote to memory of 268 2124 lrllxxl.exe 40 PID 2124 wrote to memory of 268 2124 lrllxxl.exe 40 PID 2124 wrote to memory of 268 2124 lrllxxl.exe 40 PID 268 wrote to memory of 2860 268 nhthtb.exe 41 PID 268 wrote to memory of 2860 268 nhthtb.exe 41 PID 268 wrote to memory of 2860 268 nhthtb.exe 41 PID 268 wrote to memory of 2860 268 nhthtb.exe 41 PID 2860 wrote to memory of 1636 2860 hnnnnb.exe 42 PID 2860 wrote to memory of 1636 2860 hnnnnb.exe 42 PID 2860 wrote to memory of 1636 2860 hnnnnb.exe 42 PID 2860 wrote to memory of 1636 2860 hnnnnb.exe 42 PID 1636 wrote to memory of 2592 1636 3jjpj.exe 43 PID 1636 wrote to memory of 2592 1636 3jjpj.exe 43 PID 1636 wrote to memory of 2592 1636 3jjpj.exe 43 PID 1636 wrote to memory of 2592 1636 3jjpj.exe 43 PID 2592 wrote to memory of 1300 2592 lfxlrxf.exe 44 PID 2592 wrote to memory of 1300 2592 lfxlrxf.exe 44 PID 2592 wrote to memory of 1300 2592 lfxlrxf.exe 44 PID 2592 wrote to memory of 1300 2592 lfxlrxf.exe 44 PID 1300 wrote to memory of 1964 1300 xflrrrl.exe 45 PID 1300 wrote to memory of 1964 1300 xflrrrl.exe 45 PID 1300 wrote to memory of 1964 1300 xflrrrl.exe 45 PID 1300 wrote to memory of 1964 1300 xflrrrl.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe"C:\Users\Admin\AppData\Local\Temp\354031771af37f4cfe7d31435341e5c8e420f1479edb343476681c4c82029e4c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\rlrrxxl.exec:\rlrrxxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\tnbbhn.exec:\tnbbhn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\dpjdp.exec:\dpjdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\pjpvp.exec:\pjpvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\lfrlrrf.exec:\lfrlrrf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\nhbnbn.exec:\nhbnbn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\hbnnbb.exec:\hbnnbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\pppdv.exec:\pppdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\xrxllrx.exec:\xrxllrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\lrllxxl.exec:\lrllxxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\nhthtb.exec:\nhthtb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
\??\c:\hnnnnb.exec:\hnnnnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\3jjpj.exec:\3jjpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\lfxlrxf.exec:\lfxlrxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\xflrrrl.exec:\xflrrrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\bthntt.exec:\bthntt.exe17⤵
- Executes dropped EXE
PID:1964 -
\??\c:\9nhhnb.exec:\9nhhnb.exe18⤵
- Executes dropped EXE
PID:2128 -
\??\c:\jjjpv.exec:\jjjpv.exe19⤵
- Executes dropped EXE
PID:1936 -
\??\c:\vjjjp.exec:\vjjjp.exe20⤵
- Executes dropped EXE
PID:2276 -
\??\c:\fxfxxrx.exec:\fxfxxrx.exe21⤵
- Executes dropped EXE
PID:2108 -
\??\c:\lrrfrrx.exec:\lrrfrrx.exe22⤵
- Executes dropped EXE
PID:2700 -
\??\c:\5ttnht.exec:\5ttnht.exe23⤵
- Executes dropped EXE
PID:3060 -
\??\c:\btnnbb.exec:\btnnbb.exe24⤵
- Executes dropped EXE
PID:2800 -
\??\c:\jvvpp.exec:\jvvpp.exe25⤵
- Executes dropped EXE
PID:1988 -
\??\c:\lfxxffl.exec:\lfxxffl.exe26⤵
- Executes dropped EXE
PID:1432 -
\??\c:\fffxrxl.exec:\fffxrxl.exe27⤵
- Executes dropped EXE
PID:1832 -
\??\c:\nnnntb.exec:\nnnntb.exe28⤵
- Executes dropped EXE
PID:1780 -
\??\c:\7pjjj.exec:\7pjjj.exe29⤵
- Executes dropped EXE
PID:2264 -
\??\c:\7jdpd.exec:\7jdpd.exe30⤵
- Executes dropped EXE
PID:2312 -
\??\c:\xxllxlf.exec:\xxllxlf.exe31⤵
- Executes dropped EXE
PID:2468 -
\??\c:\xrrlrrx.exec:\xrrlrrx.exe32⤵
- Executes dropped EXE
PID:1640 -
\??\c:\nhtthb.exec:\nhtthb.exe33⤵
- Executes dropped EXE
PID:1520 -
\??\c:\htnntb.exec:\htnntb.exe34⤵
- Executes dropped EXE
PID:2688 -
\??\c:\jjddp.exec:\jjddp.exe35⤵
- Executes dropped EXE
PID:2524 -
\??\c:\3vvvj.exec:\3vvvj.exe36⤵
- Executes dropped EXE
PID:1972 -
\??\c:\xxrrxfl.exec:\xxrrxfl.exe37⤵
- Executes dropped EXE
PID:2748 -
\??\c:\xrxrfxf.exec:\xrxrfxf.exe38⤵
- Executes dropped EXE
PID:2896 -
\??\c:\hbntnb.exec:\hbntnb.exe39⤵
- Executes dropped EXE
PID:2968 -
\??\c:\hbtbbh.exec:\hbtbbh.exe40⤵
- Executes dropped EXE
PID:2420 -
\??\c:\ppjjv.exec:\ppjjv.exe41⤵
- Executes dropped EXE
PID:2736 -
\??\c:\3ddvd.exec:\3ddvd.exe42⤵
- Executes dropped EXE
PID:2808 -
\??\c:\dvjpj.exec:\dvjpj.exe43⤵
- Executes dropped EXE
PID:2652 -
\??\c:\ffllrxf.exec:\ffllrxf.exe44⤵
- Executes dropped EXE
PID:2768 -
\??\c:\rrflrrr.exec:\rrflrrr.exe45⤵
- Executes dropped EXE
PID:3064 -
\??\c:\hbthtb.exec:\hbthtb.exe46⤵
- Executes dropped EXE
PID:316 -
\??\c:\btntbh.exec:\btntbh.exe47⤵
- Executes dropped EXE
PID:580 -
\??\c:\dvjjv.exec:\dvjjv.exe48⤵
- Executes dropped EXE
PID:2856 -
\??\c:\dvjjp.exec:\dvjjp.exe49⤵
- Executes dropped EXE
PID:2836 -
\??\c:\fxlrffl.exec:\fxlrffl.exe50⤵
- Executes dropped EXE
PID:592 -
\??\c:\xfflrlr.exec:\xfflrlr.exe51⤵
- Executes dropped EXE
PID:2592 -
\??\c:\3nhnhn.exec:\3nhnhn.exe52⤵
- Executes dropped EXE
PID:1560 -
\??\c:\djjvv.exec:\djjvv.exe53⤵
- Executes dropped EXE
PID:908 -
\??\c:\7djjd.exec:\7djjd.exe54⤵
- Executes dropped EXE
PID:2936 -
\??\c:\frfrrlf.exec:\frfrrlf.exe55⤵
- Executes dropped EXE
PID:2160 -
\??\c:\tnhntt.exec:\tnhntt.exe56⤵
- Executes dropped EXE
PID:2952 -
\??\c:\nbhbbb.exec:\nbhbbb.exe57⤵
- Executes dropped EXE
PID:3048 -
\??\c:\pvjdj.exec:\pvjdj.exe58⤵
- Executes dropped EXE
PID:2364 -
\??\c:\vpdjp.exec:\vpdjp.exe59⤵
- Executes dropped EXE
PID:2532 -
\??\c:\7fxfllx.exec:\7fxfllx.exe60⤵
- Executes dropped EXE
PID:1464 -
\??\c:\9xrxxfr.exec:\9xrxxfr.exe61⤵
- Executes dropped EXE
PID:1700 -
\??\c:\5nhtnt.exec:\5nhtnt.exe62⤵
- Executes dropped EXE
PID:2996 -
\??\c:\bthnbh.exec:\bthnbh.exe63⤵
- Executes dropped EXE
PID:956 -
\??\c:\7dddj.exec:\7dddj.exe64⤵
- Executes dropped EXE
PID:1432 -
\??\c:\jvvpp.exec:\jvvpp.exe65⤵
- Executes dropped EXE
PID:2484 -
\??\c:\9fxxxxf.exec:\9fxxxxf.exe66⤵PID:2224
-
\??\c:\nbthhn.exec:\nbthhn.exe67⤵PID:344
-
\??\c:\1bbbhh.exec:\1bbbhh.exe68⤵PID:896
-
\??\c:\nbnttb.exec:\nbnttb.exe69⤵PID:900
-
\??\c:\pdpvp.exec:\pdpvp.exe70⤵PID:2468
-
\??\c:\pvdvv.exec:\pvdvv.exe71⤵PID:1628
-
\??\c:\1xrllxf.exec:\1xrllxf.exe72⤵PID:1640
-
\??\c:\tnthnb.exec:\tnthnb.exe73⤵PID:2096
-
\??\c:\7nttbt.exec:\7nttbt.exe74⤵PID:2072
-
\??\c:\7pjvv.exec:\7pjvv.exe75⤵PID:2920
-
\??\c:\ddppd.exec:\ddppd.exe76⤵PID:2696
-
\??\c:\xrflrxf.exec:\xrflrxf.exe77⤵PID:2812
-
\??\c:\fxrxxfl.exec:\fxrxxfl.exe78⤵PID:2840
-
\??\c:\nhbhhn.exec:\nhbhhn.exe79⤵PID:2880
-
\??\c:\ttntht.exec:\ttntht.exe80⤵PID:2632
-
\??\c:\dpvvp.exec:\dpvvp.exe81⤵PID:2888
-
\??\c:\3pjjp.exec:\3pjjp.exe82⤵PID:2624
-
\??\c:\llllrxf.exec:\llllrxf.exe83⤵PID:2656
-
\??\c:\xxfxffl.exec:\xxfxffl.exe84⤵PID:2676
-
\??\c:\thbbbt.exec:\thbbbt.exe85⤵PID:2356
-
\??\c:\bbntbh.exec:\bbntbh.exe86⤵PID:1412
-
\??\c:\dpjjd.exec:\dpjjd.exe87⤵PID:532
-
\??\c:\vjjjp.exec:\vjjjp.exe88⤵PID:2804
-
\??\c:\xrflfxf.exec:\xrflfxf.exe89⤵PID:320
-
\??\c:\rrxxlrf.exec:\rrxxlrf.exe90⤵PID:1652
-
\??\c:\5bbbhb.exec:\5bbbhb.exe91⤵PID:1100
-
\??\c:\tnhbbh.exec:\tnhbbh.exe92⤵PID:1900
-
\??\c:\9dpdj.exec:\9dpdj.exe93⤵PID:1488
-
\??\c:\fxfxrxx.exec:\fxfxrxx.exe94⤵PID:3052
-
\??\c:\rlxlrrf.exec:\rlxlrrf.exe95⤵PID:3040
-
\??\c:\ttbbnn.exec:\ttbbnn.exe96⤵PID:2168
-
\??\c:\nhbhhn.exec:\nhbhhn.exe97⤵PID:348
-
\??\c:\9pddp.exec:\9pddp.exe98⤵PID:2520
-
\??\c:\jdjjp.exec:\jdjjp.exe99⤵PID:3060
-
\??\c:\rfrrxxl.exec:\rfrrxxl.exe100⤵PID:2984
-
\??\c:\xlrlllf.exec:\xlrlllf.exe101⤵PID:3000
-
\??\c:\hhbhhn.exec:\hhbhhn.exe102⤵PID:2216
-
\??\c:\htbnnh.exec:\htbnnh.exe103⤵PID:2188
-
\??\c:\7vdjp.exec:\7vdjp.exe104⤵PID:1268
-
\??\c:\1lfrxll.exec:\1lfrxll.exe105⤵PID:2480
-
\??\c:\5rrfrrf.exec:\5rrfrrf.exe106⤵PID:1204
-
\??\c:\tnbhth.exec:\tnbhth.exe107⤵PID:2264
-
\??\c:\3hbnnt.exec:\3hbnnt.exe108⤵PID:992
-
\??\c:\nbnhnb.exec:\nbnhnb.exe109⤵PID:3012
-
\??\c:\dvdjd.exec:\dvdjd.exe110⤵PID:2320
-
\??\c:\vpdjd.exec:\vpdjd.exe111⤵PID:2572
-
\??\c:\rfrfrrl.exec:\rfrfrrl.exe112⤵PID:2956
-
\??\c:\rllfflr.exec:\rllfflr.exe113⤵PID:2684
-
\??\c:\bnbbhh.exec:\bnbbhh.exe114⤵PID:1184
-
\??\c:\thhnbt.exec:\thhnbt.exe115⤵PID:1200
-
\??\c:\7jdjv.exec:\7jdjv.exe116⤵PID:2040
-
\??\c:\vjvvv.exec:\vjvvv.exe117⤵PID:2612
-
\??\c:\rrflrxf.exec:\rrflrxf.exe118⤵PID:2640
-
\??\c:\xrlxrlf.exec:\xrlxrlf.exe119⤵PID:2904
-
\??\c:\1tnthh.exec:\1tnthh.exe120⤵PID:2628
-
\??\c:\nbnnnt.exec:\nbnnnt.exe121⤵PID:2764
-
\??\c:\1nhhhh.exec:\1nhhhh.exe122⤵PID:1548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-