Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 14:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac7ae3832310c0ff5c45491ca38510d0N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
ac7ae3832310c0ff5c45491ca38510d0N.exe
-
Size
309KB
-
MD5
ac7ae3832310c0ff5c45491ca38510d0
-
SHA1
2c0e4d51fb03ad5423ec2e858ec001ac4733ee10
-
SHA256
a668c97e8f3aa090553597fa234d4074eee4094f7597ebe1497ff921ab6fdb61
-
SHA512
ca844f2f5fa269ea98e0755ddd8e9da6293d95c55d12a106e5507aa8c7d6422adcfd54e5dd4364ecd91b34a9bef009a693735c18123d6e5a175bc70b7c5e3c25
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LAIRUohDLS0k+sLiiBVS0ILlMcGGW7sRCl9eMMV:n3C9BRo/AIuunS3+sOiBVSXxMxTsm9ex
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2604-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2860-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2988-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/584-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1860-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1528-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3036-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/316-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2648 1tnbbn.exe 2664 vjdpd.exe 2768 fxllrrf.exe 2860 nhhnbn.exe 2696 vvpvj.exe 2572 vpdjv.exe 2988 1lxflrx.exe 1168 ddjpp.exe 2580 1xrfrxf.exe 876 tntthh.exe 2920 dvjpj.exe 584 5frrrxf.exe 1860 hhhnnb.exe 2708 lflrrrf.exe 2740 3bnnbh.exe 2884 9pjpv.exe 1528 1lxrfxf.exe 2184 1thnnn.exe 1188 djddp.exe 3036 rlxxfff.exe 3060 5tbtnb.exe 1332 pjjjv.exe 1608 xllfflf.exe 836 1nhhth.exe 2464 ddvjv.exe 604 lfxflrf.exe 3016 bthhtb.exe 1600 1jjvj.exe 2084 rrffllf.exe 2112 5htthh.exe 316 jdppv.exe 2792 nhtbhn.exe 1588 jdjjv.exe 2904 9fxxfxf.exe 2684 tbthnn.exe 1688 hbttbt.exe 2584 djvdp.exe 2676 rlxlfrx.exe 1080 7fxfllr.exe 2412 ttthtb.exe 1576 bbtbhn.exe 2476 vjvvv.exe 2580 lxlrxxx.exe 2212 rffxxfl.exe 1640 1thhnt.exe 584 7pddj.exe 2736 pdpdp.exe 2728 7frrflr.exe 2888 7nbbhh.exe 780 ppdjp.exe 1632 dpvpv.exe 2304 xlrxlff.exe 2176 7bnnnn.exe 3032 1nbbhh.exe 1188 9jpvd.exe 2096 xrfxfxf.exe 2124 lfllrrx.exe 948 tnhbhh.exe 608 dpdvv.exe 592 pjvjj.exe 1752 9fxxfxf.exe 1960 5xllrlr.exe 2016 tbnntt.exe 2436 pdddv.exe -
resource yara_rule behavioral1/memory/2604-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1168-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/584-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1860-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1528-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3036-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/316-288-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lxrfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttthtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rrxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrffllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlffllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xrflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrlffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xllrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvdd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2648 2604 ac7ae3832310c0ff5c45491ca38510d0N.exe 30 PID 2604 wrote to memory of 2648 2604 ac7ae3832310c0ff5c45491ca38510d0N.exe 30 PID 2604 wrote to memory of 2648 2604 ac7ae3832310c0ff5c45491ca38510d0N.exe 30 PID 2604 wrote to memory of 2648 2604 ac7ae3832310c0ff5c45491ca38510d0N.exe 30 PID 2648 wrote to memory of 2664 2648 1tnbbn.exe 31 PID 2648 wrote to memory of 2664 2648 1tnbbn.exe 31 PID 2648 wrote to memory of 2664 2648 1tnbbn.exe 31 PID 2648 wrote to memory of 2664 2648 1tnbbn.exe 31 PID 2664 wrote to memory of 2768 2664 vjdpd.exe 32 PID 2664 wrote to memory of 2768 2664 vjdpd.exe 32 PID 2664 wrote to memory of 2768 2664 vjdpd.exe 32 PID 2664 wrote to memory of 2768 2664 vjdpd.exe 32 PID 2768 wrote to memory of 2860 2768 fxllrrf.exe 33 PID 2768 wrote to memory of 2860 2768 fxllrrf.exe 33 PID 2768 wrote to memory of 2860 2768 fxllrrf.exe 33 PID 2768 wrote to memory of 2860 2768 fxllrrf.exe 33 PID 2860 wrote to memory of 2696 2860 nhhnbn.exe 34 PID 2860 wrote to memory of 2696 2860 nhhnbn.exe 34 PID 2860 wrote to memory of 2696 2860 nhhnbn.exe 34 PID 2860 wrote to memory of 2696 2860 nhhnbn.exe 34 PID 2696 wrote to memory of 2572 2696 vvpvj.exe 35 PID 2696 wrote to memory of 2572 2696 vvpvj.exe 35 PID 2696 wrote to memory of 2572 2696 vvpvj.exe 35 PID 2696 wrote to memory of 2572 2696 vvpvj.exe 35 PID 2572 wrote to memory of 2988 2572 vpdjv.exe 36 PID 2572 wrote to memory of 2988 2572 vpdjv.exe 36 PID 2572 wrote to memory of 2988 2572 vpdjv.exe 36 PID 2572 wrote to memory of 2988 2572 vpdjv.exe 36 PID 2988 wrote to memory of 1168 2988 1lxflrx.exe 37 PID 2988 wrote to memory of 1168 2988 1lxflrx.exe 37 PID 2988 wrote to memory of 1168 2988 1lxflrx.exe 37 PID 2988 wrote to memory of 1168 2988 1lxflrx.exe 37 PID 1168 wrote to memory of 2580 1168 ddjpp.exe 38 PID 1168 wrote to memory of 2580 1168 ddjpp.exe 38 PID 1168 wrote to memory of 2580 1168 ddjpp.exe 38 PID 1168 wrote to memory of 2580 1168 ddjpp.exe 38 PID 2580 wrote to memory of 876 2580 1xrfrxf.exe 39 PID 2580 wrote to memory of 876 2580 1xrfrxf.exe 39 PID 2580 wrote to memory of 876 2580 1xrfrxf.exe 39 PID 2580 wrote to memory of 876 2580 1xrfrxf.exe 39 PID 876 wrote to memory of 2920 876 tntthh.exe 40 PID 876 wrote to memory of 2920 876 tntthh.exe 40 PID 876 wrote to memory of 2920 876 tntthh.exe 40 PID 876 wrote to memory of 2920 876 tntthh.exe 40 PID 2920 wrote to memory of 584 2920 dvjpj.exe 41 PID 2920 wrote to memory of 584 2920 dvjpj.exe 41 PID 2920 wrote to memory of 584 2920 dvjpj.exe 41 PID 2920 wrote to memory of 584 2920 dvjpj.exe 41 PID 584 wrote to memory of 1860 584 5frrrxf.exe 42 PID 584 wrote to memory of 1860 584 5frrrxf.exe 42 PID 584 wrote to memory of 1860 584 5frrrxf.exe 42 PID 584 wrote to memory of 1860 584 5frrrxf.exe 42 PID 1860 wrote to memory of 2708 1860 hhhnnb.exe 43 PID 1860 wrote to memory of 2708 1860 hhhnnb.exe 43 PID 1860 wrote to memory of 2708 1860 hhhnnb.exe 43 PID 1860 wrote to memory of 2708 1860 hhhnnb.exe 43 PID 2708 wrote to memory of 2740 2708 lflrrrf.exe 44 PID 2708 wrote to memory of 2740 2708 lflrrrf.exe 44 PID 2708 wrote to memory of 2740 2708 lflrrrf.exe 44 PID 2708 wrote to memory of 2740 2708 lflrrrf.exe 44 PID 2740 wrote to memory of 2884 2740 3bnnbh.exe 45 PID 2740 wrote to memory of 2884 2740 3bnnbh.exe 45 PID 2740 wrote to memory of 2884 2740 3bnnbh.exe 45 PID 2740 wrote to memory of 2884 2740 3bnnbh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac7ae3832310c0ff5c45491ca38510d0N.exe"C:\Users\Admin\AppData\Local\Temp\ac7ae3832310c0ff5c45491ca38510d0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\1tnbbn.exec:\1tnbbn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\vjdpd.exec:\vjdpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\fxllrrf.exec:\fxllrrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\nhhnbn.exec:\nhhnbn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\vvpvj.exec:\vvpvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\vpdjv.exec:\vpdjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\1lxflrx.exec:\1lxflrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\ddjpp.exec:\ddjpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\1xrfrxf.exec:\1xrfrxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\tntthh.exec:\tntthh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\dvjpj.exec:\dvjpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\5frrrxf.exec:\5frrrxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
\??\c:\hhhnnb.exec:\hhhnnb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\lflrrrf.exec:\lflrrrf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\3bnnbh.exec:\3bnnbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\9pjpv.exec:\9pjpv.exe17⤵
- Executes dropped EXE
PID:2884 -
\??\c:\1lxrfxf.exec:\1lxrfxf.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1528 -
\??\c:\1thnnn.exec:\1thnnn.exe19⤵
- Executes dropped EXE
PID:2184 -
\??\c:\djddp.exec:\djddp.exe20⤵
- Executes dropped EXE
PID:1188 -
\??\c:\rlxxfff.exec:\rlxxfff.exe21⤵
- Executes dropped EXE
PID:3036 -
\??\c:\5tbtnb.exec:\5tbtnb.exe22⤵
- Executes dropped EXE
PID:3060 -
\??\c:\pjjjv.exec:\pjjjv.exe23⤵
- Executes dropped EXE
PID:1332 -
\??\c:\xllfflf.exec:\xllfflf.exe24⤵
- Executes dropped EXE
PID:1608 -
\??\c:\1nhhth.exec:\1nhhth.exe25⤵
- Executes dropped EXE
PID:836 -
\??\c:\ddvjv.exec:\ddvjv.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2464 -
\??\c:\lfxflrf.exec:\lfxflrf.exe27⤵
- Executes dropped EXE
PID:604 -
\??\c:\bthhtb.exec:\bthhtb.exe28⤵
- Executes dropped EXE
PID:3016 -
\??\c:\1jjvj.exec:\1jjvj.exe29⤵
- Executes dropped EXE
PID:1600 -
\??\c:\rrffllf.exec:\rrffllf.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084 -
\??\c:\5htthh.exec:\5htthh.exe31⤵
- Executes dropped EXE
PID:2112 -
\??\c:\jdppv.exec:\jdppv.exe32⤵
- Executes dropped EXE
PID:316 -
\??\c:\xrrxffl.exec:\xrrxffl.exe33⤵PID:2656
-
\??\c:\nhtbhn.exec:\nhtbhn.exe34⤵
- Executes dropped EXE
PID:2792 -
\??\c:\jdjjv.exec:\jdjjv.exe35⤵
- Executes dropped EXE
PID:1588 -
\??\c:\9fxxfxf.exec:\9fxxfxf.exe36⤵
- Executes dropped EXE
PID:2904 -
\??\c:\tbthnn.exec:\tbthnn.exe37⤵
- Executes dropped EXE
PID:2684 -
\??\c:\hbttbt.exec:\hbttbt.exe38⤵
- Executes dropped EXE
PID:1688 -
\??\c:\djvdp.exec:\djvdp.exe39⤵
- Executes dropped EXE
PID:2584 -
\??\c:\rlxlfrx.exec:\rlxlfrx.exe40⤵
- Executes dropped EXE
PID:2676 -
\??\c:\7fxfllr.exec:\7fxfllr.exe41⤵
- Executes dropped EXE
PID:1080 -
\??\c:\ttthtb.exec:\ttthtb.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
\??\c:\bbtbhn.exec:\bbtbhn.exe43⤵
- Executes dropped EXE
PID:1576 -
\??\c:\vjvvv.exec:\vjvvv.exe44⤵
- Executes dropped EXE
PID:2476 -
\??\c:\lxlrxxx.exec:\lxlrxxx.exe45⤵
- Executes dropped EXE
PID:2580 -
\??\c:\rffxxfl.exec:\rffxxfl.exe46⤵
- Executes dropped EXE
PID:2212 -
\??\c:\1thhnt.exec:\1thhnt.exe47⤵
- Executes dropped EXE
PID:1640 -
\??\c:\7pddj.exec:\7pddj.exe48⤵
- Executes dropped EXE
PID:584 -
\??\c:\pdpdp.exec:\pdpdp.exe49⤵
- Executes dropped EXE
PID:2736 -
\??\c:\7frrflr.exec:\7frrflr.exe50⤵
- Executes dropped EXE
PID:2728 -
\??\c:\7nbbhh.exec:\7nbbhh.exe51⤵
- Executes dropped EXE
PID:2888 -
\??\c:\ppdjp.exec:\ppdjp.exe52⤵
- Executes dropped EXE
PID:780 -
\??\c:\dpvpv.exec:\dpvpv.exe53⤵
- Executes dropped EXE
PID:1632 -
\??\c:\xlrxlff.exec:\xlrxlff.exe54⤵
- Executes dropped EXE
PID:2304 -
\??\c:\7bnnnn.exec:\7bnnnn.exe55⤵
- Executes dropped EXE
PID:2176 -
\??\c:\1nbbhh.exec:\1nbbhh.exe56⤵
- Executes dropped EXE
PID:3032 -
\??\c:\9jpvd.exec:\9jpvd.exe57⤵
- Executes dropped EXE
PID:1188 -
\??\c:\xrfxfxf.exec:\xrfxfxf.exe58⤵
- Executes dropped EXE
PID:2096 -
\??\c:\lfllrrx.exec:\lfllrrx.exe59⤵
- Executes dropped EXE
PID:2124 -
\??\c:\tnhbhh.exec:\tnhbhh.exe60⤵
- Executes dropped EXE
PID:948 -
\??\c:\dpdvv.exec:\dpdvv.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:608 -
\??\c:\pjvjj.exec:\pjvjj.exe62⤵
- Executes dropped EXE
PID:592 -
\??\c:\9fxxfxf.exec:\9fxxfxf.exe63⤵
- Executes dropped EXE
PID:1752 -
\??\c:\5xllrlr.exec:\5xllrlr.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\tbnntt.exec:\tbnntt.exe65⤵
- Executes dropped EXE
PID:2016 -
\??\c:\pdddv.exec:\pdddv.exe66⤵
- Executes dropped EXE
PID:2436 -
\??\c:\pjvdj.exec:\pjvdj.exe67⤵PID:1692
-
\??\c:\xlfrfff.exec:\xlfrfff.exe68⤵PID:560
-
\??\c:\bbttnt.exec:\bbttnt.exe69⤵PID:1028
-
\??\c:\bntnnb.exec:\bntnnb.exe70⤵PID:764
-
\??\c:\dvjjv.exec:\dvjjv.exe71⤵PID:2144
-
\??\c:\9rxrrrl.exec:\9rxrrrl.exe72⤵PID:2648
-
\??\c:\lfxxffr.exec:\lfxxffr.exe73⤵PID:1592
-
\??\c:\1hbhhh.exec:\1hbhhh.exe74⤵PID:2672
-
\??\c:\bntntt.exec:\bntntt.exe75⤵PID:2996
-
\??\c:\pjpjp.exec:\pjpjp.exe76⤵PID:2764
-
\??\c:\xrxrxxx.exec:\xrxrxxx.exe77⤵PID:2504
-
\??\c:\5xllrrx.exec:\5xllrrx.exe78⤵PID:2588
-
\??\c:\3bhhht.exec:\3bhhht.exe79⤵PID:2720
-
\??\c:\pjvpv.exec:\pjvpv.exe80⤵PID:1076
-
\??\c:\pjdjp.exec:\pjdjp.exe81⤵PID:2988
-
\??\c:\lxrxxfl.exec:\lxrxxfl.exe82⤵PID:2148
-
\??\c:\rlxlxfl.exec:\rlxlxfl.exe83⤵PID:2316
-
\??\c:\ntbnhb.exec:\ntbnhb.exe84⤵PID:2932
-
\??\c:\vjpjp.exec:\vjpjp.exe85⤵PID:2928
-
\??\c:\jvppv.exec:\jvppv.exe86⤵PID:552
-
\??\c:\rlrxffl.exec:\rlrxffl.exe87⤵PID:1432
-
\??\c:\9tnnbt.exec:\9tnnbt.exe88⤵PID:2600
-
\??\c:\hhtbhh.exec:\hhtbhh.exe89⤵PID:2744
-
\??\c:\jjvjp.exec:\jjvjp.exe90⤵PID:2880
-
\??\c:\pjvdj.exec:\pjvdj.exe91⤵PID:2964
-
\??\c:\rffllff.exec:\rffllff.exe92⤵PID:320
-
\??\c:\7htnnh.exec:\7htnnh.exe93⤵PID:2336
-
\??\c:\tthntt.exec:\tthntt.exe94⤵PID:2160
-
\??\c:\pdpvd.exec:\pdpvd.exe95⤵PID:356
-
\??\c:\vpdvd.exec:\vpdvd.exe96⤵PID:2432
-
\??\c:\1lxxxxf.exec:\1lxxxxf.exe97⤵PID:3036
-
\??\c:\lfxflrx.exec:\lfxflrx.exe98⤵PID:2136
-
\??\c:\9htttt.exec:\9htttt.exe99⤵PID:1332
-
\??\c:\hbbhbn.exec:\hbbhbn.exe100⤵PID:700
-
\??\c:\ppdpp.exec:\ppdpp.exe101⤵PID:768
-
\??\c:\rfrlrrx.exec:\rfrlrrx.exe102⤵PID:840
-
\??\c:\lfxfllx.exec:\lfxfllx.exe103⤵PID:2464
-
\??\c:\thhhnn.exec:\thhhnn.exe104⤵PID:2404
-
\??\c:\5nbtbb.exec:\5nbtbb.exe105⤵PID:2416
-
\??\c:\dvjjj.exec:\dvjjj.exe106⤵PID:1284
-
\??\c:\9fflrll.exec:\9fflrll.exe107⤵PID:1328
-
\??\c:\1fllrrr.exec:\1fllrrr.exe108⤵PID:560
-
\??\c:\3bnntt.exec:\3bnntt.exe109⤵PID:1384
-
\??\c:\hhbbhn.exec:\hhbbhn.exe110⤵PID:2908
-
\??\c:\7dpvd.exec:\7dpvd.exe111⤵PID:2820
-
\??\c:\dvvvj.exec:\dvvvj.exe112⤵PID:1700
-
\??\c:\3lxxffl.exec:\3lxxffl.exe113⤵PID:2800
-
\??\c:\3ffrrxf.exec:\3ffrrxf.exe114⤵PID:884
-
\??\c:\bbthnt.exec:\bbthnt.exe115⤵PID:2564
-
\??\c:\9ttbtt.exec:\9ttbtt.exe116⤵PID:2560
-
\??\c:\pjpvj.exec:\pjpvj.exe117⤵PID:2544
-
\??\c:\lxrrrlr.exec:\lxrrrlr.exe118⤵PID:444
-
\??\c:\7xrffxf.exec:\7xrffxf.exe119⤵PID:2524
-
\??\c:\1nnbhn.exec:\1nnbhn.exe120⤵PID:1120
-
\??\c:\bhbnbn.exec:\bhbnbn.exe121⤵PID:2340
-
\??\c:\pjdjv.exec:\pjdjv.exe122⤵PID:2488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-