Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 12:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9c3f6b198e0362a1c73f041b50565030N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
9c3f6b198e0362a1c73f041b50565030N.exe
-
Size
96KB
-
MD5
9c3f6b198e0362a1c73f041b50565030
-
SHA1
df690c8d53bfe5f6b9b3419f2048bd10a8580bed
-
SHA256
938d9f906fa02949ec97347eb374efa9e93dcf9add37b28f934112198e4e37cc
-
SHA512
bb758cd1638e922260130e532a9c6c2d8d6f2d35c4fdebafe59df39934862843561fb70b6292df7fda909a7b58457d68fd484817dba884ec5e2e730089ad54fb
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qP1hvZo66Ox4oq2SQwfTrs:ymb3NkkiQ3mdBjFIj+qNhvZuHQYfw4jy
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2676-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1388-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1388-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2892-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2776-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1132-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1564-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/700-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-3974-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2140 tnbbhh.exe 1388 pjdpd.exe 2244 7llflrx.exe 1964 7ntntb.exe 2892 1pvvd.exe 2980 9tbbnn.exe 2864 nhttnn.exe 2776 jjpvd.exe 2616 9vdpv.exe 2408 rrrlxxl.exe 1132 xrlxrrf.exe 1300 jddpd.exe 1564 jddpp.exe 1784 xxlrxfr.exe 1912 bthntb.exe 1772 dpvpv.exe 316 dpvjp.exe 2828 1xflxrf.exe 2780 9xxlxff.exe 644 1hhhhb.exe 2684 thnthb.exe 1680 dvjjv.exe 2844 3fxflfl.exe 1676 lfflxxl.exe 1028 htbhhn.exe 1944 ppdjp.exe 868 xrflxxf.exe 700 7rxflfr.exe 876 bthtnb.exe 2924 7jdpj.exe 2532 rlxxfxf.exe 2412 lxfxxrx.exe 2104 7bbthh.exe 2080 ttbhbb.exe 2704 9pppj.exe 2868 7vjpp.exe 2724 xrxflfl.exe 2348 fllffrr.exe 2796 hbnnnh.exe 2568 9pjjj.exe 2660 jpddv.exe 2848 xlrrrrx.exe 2628 lrfxxxl.exe 860 htbtbh.exe 1100 bnbhbn.exe 1472 9jjvj.exe 1040 jjjvv.exe 1788 nbthtb.exe 1804 bththh.exe 1792 jjvjj.exe 1648 pjvpv.exe 1844 fxrrxff.exe 2020 5rllrxl.exe 2828 tnnttt.exe 2204 nbbbbt.exe 2184 9ppjp.exe 584 3vvdd.exe 2804 frffxrx.exe 2004 xrlrxff.exe 1864 1btttt.exe 1608 thttbh.exe 3000 dddvv.exe 2188 3pdpp.exe 2328 frfxfxx.exe -
resource yara_rule behavioral1/memory/2676-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1388-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1564-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/700-273-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-3974-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tbnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2140 2676 9c3f6b198e0362a1c73f041b50565030N.exe 30 PID 2676 wrote to memory of 2140 2676 9c3f6b198e0362a1c73f041b50565030N.exe 30 PID 2676 wrote to memory of 2140 2676 9c3f6b198e0362a1c73f041b50565030N.exe 30 PID 2676 wrote to memory of 2140 2676 9c3f6b198e0362a1c73f041b50565030N.exe 30 PID 2140 wrote to memory of 1388 2140 tnbbhh.exe 31 PID 2140 wrote to memory of 1388 2140 tnbbhh.exe 31 PID 2140 wrote to memory of 1388 2140 tnbbhh.exe 31 PID 2140 wrote to memory of 1388 2140 tnbbhh.exe 31 PID 1388 wrote to memory of 2244 1388 pjdpd.exe 32 PID 1388 wrote to memory of 2244 1388 pjdpd.exe 32 PID 1388 wrote to memory of 2244 1388 pjdpd.exe 32 PID 1388 wrote to memory of 2244 1388 pjdpd.exe 32 PID 2244 wrote to memory of 1964 2244 7llflrx.exe 33 PID 2244 wrote to memory of 1964 2244 7llflrx.exe 33 PID 2244 wrote to memory of 1964 2244 7llflrx.exe 33 PID 2244 wrote to memory of 1964 2244 7llflrx.exe 33 PID 1964 wrote to memory of 2892 1964 7ntntb.exe 34 PID 1964 wrote to memory of 2892 1964 7ntntb.exe 34 PID 1964 wrote to memory of 2892 1964 7ntntb.exe 34 PID 1964 wrote to memory of 2892 1964 7ntntb.exe 34 PID 2892 wrote to memory of 2980 2892 1pvvd.exe 35 PID 2892 wrote to memory of 2980 2892 1pvvd.exe 35 PID 2892 wrote to memory of 2980 2892 1pvvd.exe 35 PID 2892 wrote to memory of 2980 2892 1pvvd.exe 35 PID 2980 wrote to memory of 2864 2980 9tbbnn.exe 36 PID 2980 wrote to memory of 2864 2980 9tbbnn.exe 36 PID 2980 wrote to memory of 2864 2980 9tbbnn.exe 36 PID 2980 wrote to memory of 2864 2980 9tbbnn.exe 36 PID 2864 wrote to memory of 2776 2864 nhttnn.exe 37 PID 2864 wrote to memory of 2776 2864 nhttnn.exe 37 PID 2864 wrote to memory of 2776 2864 nhttnn.exe 37 PID 2864 wrote to memory of 2776 2864 nhttnn.exe 37 PID 2776 wrote to memory of 2616 2776 jjpvd.exe 38 PID 2776 wrote to memory of 2616 2776 jjpvd.exe 38 PID 2776 wrote to memory of 2616 2776 jjpvd.exe 38 PID 2776 wrote to memory of 2616 2776 jjpvd.exe 38 PID 2616 wrote to memory of 2408 2616 9vdpv.exe 39 PID 2616 wrote to memory of 2408 2616 9vdpv.exe 39 PID 2616 wrote to memory of 2408 2616 9vdpv.exe 39 PID 2616 wrote to memory of 2408 2616 9vdpv.exe 39 PID 2408 wrote to memory of 1132 2408 rrrlxxl.exe 40 PID 2408 wrote to memory of 1132 2408 rrrlxxl.exe 40 PID 2408 wrote to memory of 1132 2408 rrrlxxl.exe 40 PID 2408 wrote to memory of 1132 2408 rrrlxxl.exe 40 PID 1132 wrote to memory of 1300 1132 xrlxrrf.exe 41 PID 1132 wrote to memory of 1300 1132 xrlxrrf.exe 41 PID 1132 wrote to memory of 1300 1132 xrlxrrf.exe 41 PID 1132 wrote to memory of 1300 1132 xrlxrrf.exe 41 PID 1300 wrote to memory of 1564 1300 jddpd.exe 42 PID 1300 wrote to memory of 1564 1300 jddpd.exe 42 PID 1300 wrote to memory of 1564 1300 jddpd.exe 42 PID 1300 wrote to memory of 1564 1300 jddpd.exe 42 PID 1564 wrote to memory of 1784 1564 jddpp.exe 43 PID 1564 wrote to memory of 1784 1564 jddpp.exe 43 PID 1564 wrote to memory of 1784 1564 jddpp.exe 43 PID 1564 wrote to memory of 1784 1564 jddpp.exe 43 PID 1784 wrote to memory of 1912 1784 xxlrxfr.exe 44 PID 1784 wrote to memory of 1912 1784 xxlrxfr.exe 44 PID 1784 wrote to memory of 1912 1784 xxlrxfr.exe 44 PID 1784 wrote to memory of 1912 1784 xxlrxfr.exe 44 PID 1912 wrote to memory of 1772 1912 bthntb.exe 45 PID 1912 wrote to memory of 1772 1912 bthntb.exe 45 PID 1912 wrote to memory of 1772 1912 bthntb.exe 45 PID 1912 wrote to memory of 1772 1912 bthntb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c3f6b198e0362a1c73f041b50565030N.exe"C:\Users\Admin\AppData\Local\Temp\9c3f6b198e0362a1c73f041b50565030N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\tnbbhh.exec:\tnbbhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\pjdpd.exec:\pjdpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\7llflrx.exec:\7llflrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\7ntntb.exec:\7ntntb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
\??\c:\1pvvd.exec:\1pvvd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\9tbbnn.exec:\9tbbnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\nhttnn.exec:\nhttnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\jjpvd.exec:\jjpvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\9vdpv.exec:\9vdpv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\rrrlxxl.exec:\rrrlxxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\xrlxrrf.exec:\xrlxrrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\jddpd.exec:\jddpd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\jddpp.exec:\jddpp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\xxlrxfr.exec:\xxlrxfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\bthntb.exec:\bthntb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\dpvpv.exec:\dpvpv.exe17⤵
- Executes dropped EXE
PID:1772 -
\??\c:\dpvjp.exec:\dpvjp.exe18⤵
- Executes dropped EXE
PID:316 -
\??\c:\1xflxrf.exec:\1xflxrf.exe19⤵
- Executes dropped EXE
PID:2828 -
\??\c:\9xxlxff.exec:\9xxlxff.exe20⤵
- Executes dropped EXE
PID:2780 -
\??\c:\1hhhhb.exec:\1hhhhb.exe21⤵
- Executes dropped EXE
PID:644 -
\??\c:\thnthb.exec:\thnthb.exe22⤵
- Executes dropped EXE
PID:2684 -
\??\c:\dvjjv.exec:\dvjjv.exe23⤵
- Executes dropped EXE
PID:1680 -
\??\c:\3fxflfl.exec:\3fxflfl.exe24⤵
- Executes dropped EXE
PID:2844 -
\??\c:\lfflxxl.exec:\lfflxxl.exe25⤵
- Executes dropped EXE
PID:1676 -
\??\c:\htbhhn.exec:\htbhhn.exe26⤵
- Executes dropped EXE
PID:1028 -
\??\c:\ppdjp.exec:\ppdjp.exe27⤵
- Executes dropped EXE
PID:1944 -
\??\c:\xrflxxf.exec:\xrflxxf.exe28⤵
- Executes dropped EXE
PID:868 -
\??\c:\7rxflfr.exec:\7rxflfr.exe29⤵
- Executes dropped EXE
PID:700 -
\??\c:\bthtnb.exec:\bthtnb.exe30⤵
- Executes dropped EXE
PID:876 -
\??\c:\7jdpj.exec:\7jdpj.exe31⤵
- Executes dropped EXE
PID:2924 -
\??\c:\rlxxfxf.exec:\rlxxfxf.exe32⤵
- Executes dropped EXE
PID:2532 -
\??\c:\lxfxxrx.exec:\lxfxxrx.exe33⤵
- Executes dropped EXE
PID:2412 -
\??\c:\7bbthh.exec:\7bbthh.exe34⤵
- Executes dropped EXE
PID:2104 -
\??\c:\ttbhbb.exec:\ttbhbb.exe35⤵
- Executes dropped EXE
PID:2080 -
\??\c:\9pppj.exec:\9pppj.exe36⤵
- Executes dropped EXE
PID:2704 -
\??\c:\7vjpp.exec:\7vjpp.exe37⤵
- Executes dropped EXE
PID:2868 -
\??\c:\xrxflfl.exec:\xrxflfl.exe38⤵
- Executes dropped EXE
PID:2724 -
\??\c:\fllffrr.exec:\fllffrr.exe39⤵
- Executes dropped EXE
PID:2348 -
\??\c:\hbnnnh.exec:\hbnnnh.exe40⤵
- Executes dropped EXE
PID:2796 -
\??\c:\9pjjj.exec:\9pjjj.exe41⤵
- Executes dropped EXE
PID:2568 -
\??\c:\jpddv.exec:\jpddv.exe42⤵
- Executes dropped EXE
PID:2660 -
\??\c:\xlrrrrx.exec:\xlrrrrx.exe43⤵
- Executes dropped EXE
PID:2848 -
\??\c:\lrfxxxl.exec:\lrfxxxl.exe44⤵
- Executes dropped EXE
PID:2628 -
\??\c:\htbtbh.exec:\htbtbh.exe45⤵
- Executes dropped EXE
PID:860 -
\??\c:\bnbhbn.exec:\bnbhbn.exe46⤵
- Executes dropped EXE
PID:1100 -
\??\c:\9jjvj.exec:\9jjvj.exe47⤵
- Executes dropped EXE
PID:1472 -
\??\c:\jjjvv.exec:\jjjvv.exe48⤵
- Executes dropped EXE
PID:1040 -
\??\c:\nbthtb.exec:\nbthtb.exe49⤵
- Executes dropped EXE
PID:1788 -
\??\c:\bththh.exec:\bththh.exe50⤵
- Executes dropped EXE
PID:1804 -
\??\c:\jjvjj.exec:\jjvjj.exe51⤵
- Executes dropped EXE
PID:1792 -
\??\c:\pjvpv.exec:\pjvpv.exe52⤵
- Executes dropped EXE
PID:1648 -
\??\c:\fxrrxff.exec:\fxrrxff.exe53⤵
- Executes dropped EXE
PID:1844 -
\??\c:\5rllrxl.exec:\5rllrxl.exe54⤵
- Executes dropped EXE
PID:2020 -
\??\c:\tnnttt.exec:\tnnttt.exe55⤵
- Executes dropped EXE
PID:2828 -
\??\c:\nbbbbt.exec:\nbbbbt.exe56⤵
- Executes dropped EXE
PID:2204 -
\??\c:\9ppjp.exec:\9ppjp.exe57⤵
- Executes dropped EXE
PID:2184 -
\??\c:\3vvdd.exec:\3vvdd.exe58⤵
- Executes dropped EXE
PID:584 -
\??\c:\frffxrx.exec:\frffxrx.exe59⤵
- Executes dropped EXE
PID:2804 -
\??\c:\xrlrxff.exec:\xrlrxff.exe60⤵
- Executes dropped EXE
PID:2004 -
\??\c:\1btttt.exec:\1btttt.exe61⤵
- Executes dropped EXE
PID:1864 -
\??\c:\thttbh.exec:\thttbh.exe62⤵
- Executes dropped EXE
PID:1608 -
\??\c:\dddvv.exec:\dddvv.exe63⤵
- Executes dropped EXE
PID:3000 -
\??\c:\3pdpp.exec:\3pdpp.exe64⤵
- Executes dropped EXE
PID:2188 -
\??\c:\frfxfxx.exec:\frfxfxx.exe65⤵
- Executes dropped EXE
PID:2328 -
\??\c:\lxxxxff.exec:\lxxxxff.exe66⤵PID:984
-
\??\c:\rflxxrr.exec:\rflxxrr.exe67⤵PID:880
-
\??\c:\btnnnh.exec:\btnnnh.exe68⤵PID:1692
-
\??\c:\nhhtbh.exec:\nhhtbh.exe69⤵PID:2140
-
\??\c:\1pppv.exec:\1pppv.exe70⤵PID:2536
-
\??\c:\vjpvv.exec:\vjpvv.exe71⤵PID:2128
-
\??\c:\fxrrxlx.exec:\fxrrxlx.exe72⤵PID:2400
-
\??\c:\xlfffll.exec:\xlfffll.exe73⤵PID:2052
-
\??\c:\9tbnbb.exec:\9tbnbb.exe74⤵PID:2244
-
\??\c:\1nnthn.exec:\1nnthn.exe75⤵PID:2964
-
\??\c:\dpvdp.exec:\dpvdp.exe76⤵PID:2744
-
\??\c:\pjpjj.exec:\pjpjj.exe77⤵PID:2756
-
\??\c:\rlrrxxl.exec:\rlrrxxl.exe78⤵PID:2864
-
\??\c:\frxlxrf.exec:\frxlxrf.exe79⤵PID:2712
-
\??\c:\bnthnn.exec:\bnthnn.exe80⤵PID:2772
-
\??\c:\tntntt.exec:\tntntt.exe81⤵PID:2720
-
\??\c:\7vjvp.exec:\7vjvp.exe82⤵PID:2596
-
\??\c:\dvddd.exec:\dvddd.exe83⤵PID:2768
-
\??\c:\rlflxrr.exec:\rlflxrr.exe84⤵PID:2408
-
\??\c:\lxffxff.exec:\lxffxff.exe85⤵PID:2356
-
\??\c:\hbhhhh.exec:\hbhhhh.exe86⤵PID:1756
-
\??\c:\bthhnh.exec:\bthhnh.exe87⤵PID:1744
-
\??\c:\thnhhb.exec:\thnhhb.exe88⤵PID:1304
-
\??\c:\pjpvv.exec:\pjpvv.exe89⤵PID:2420
-
\??\c:\pjdpd.exec:\pjdpd.exe90⤵PID:1512
-
\??\c:\xlxrlff.exec:\xlxrlff.exe91⤵PID:1772
-
\??\c:\5lflrxf.exec:\5lflrxf.exe92⤵PID:2820
-
\??\c:\thbbht.exec:\thbbht.exe93⤵PID:1652
-
\??\c:\tnttnt.exec:\tnttnt.exe94⤵PID:2952
-
\??\c:\ddjjp.exec:\ddjjp.exe95⤵PID:2088
-
\??\c:\vjvvd.exec:\vjvvd.exe96⤵PID:1612
-
\??\c:\1jjdd.exec:\1jjdd.exe97⤵PID:2936
-
\??\c:\lxffxxl.exec:\lxffxxl.exe98⤵PID:2580
-
\??\c:\xxrflxl.exec:\xxrflxl.exe99⤵PID:1364
-
\??\c:\bbtnth.exec:\bbtnth.exe100⤵PID:2800
-
\??\c:\ttnhbb.exec:\ttnhbb.exe101⤵PID:1236
-
\??\c:\ddvdp.exec:\ddvdp.exe102⤵PID:2240
-
\??\c:\dvppv.exec:\dvppv.exe103⤵PID:2996
-
\??\c:\llxrffl.exec:\llxrffl.exe104⤵PID:804
-
\??\c:\ffrfxfl.exec:\ffrfxfl.exe105⤵PID:1688
-
\??\c:\9bbbhn.exec:\9bbbhn.exe106⤵PID:700
-
\??\c:\3tbnnh.exec:\3tbnnh.exe107⤵
- System Location Discovery: System Language Discovery
PID:688 -
\??\c:\vjddj.exec:\vjddj.exe108⤵PID:2064
-
\??\c:\jvjpp.exec:\jvjpp.exe109⤵PID:1388
-
\??\c:\xrlrflx.exec:\xrlrflx.exe110⤵PID:1588
-
\??\c:\rlrrffr.exec:\rlrrffr.exe111⤵PID:2688
-
\??\c:\bthnhh.exec:\bthnhh.exe112⤵PID:2104
-
\??\c:\bnthnh.exec:\bnthnh.exe113⤵PID:2340
-
\??\c:\1jdpv.exec:\1jdpv.exe114⤵PID:2888
-
\??\c:\3vjdd.exec:\3vjdd.exe115⤵PID:2868
-
\??\c:\xrxrxlx.exec:\xrxrxlx.exe116⤵PID:2860
-
\??\c:\xlxxffl.exec:\xlxxffl.exe117⤵PID:2932
-
\??\c:\nhnthb.exec:\nhnthb.exe118⤵
- System Location Discovery: System Language Discovery
PID:2396 -
\??\c:\5dvjv.exec:\5dvjv.exe119⤵PID:2904
-
\??\c:\vpvdp.exec:\vpvdp.exe120⤵PID:2216
-
\??\c:\5rffxxx.exec:\5rffxxx.exe121⤵PID:2848
-
\??\c:\frlflff.exec:\frlflff.exe122⤵PID:3052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-