Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ee1f72111c0cedfbd9c336326b09a7a0N.exe
Resource
win7-20240729-en
windows7-x64
6 signatures
120 seconds
General
-
Target
ee1f72111c0cedfbd9c336326b09a7a0N.exe
-
Size
64KB
-
MD5
ee1f72111c0cedfbd9c336326b09a7a0
-
SHA1
39c552d056486d65884f18b575e80002f4febf55
-
SHA256
b0c0ff30c0e52ec86e184ca94f809557a39ae9837d57d107dc3d9533f98c541f
-
SHA512
17f47863480fadd4afbaacc2065bbba5d52cdb75969eacc6228e6395895d9ebe3f0be73f6cfff9226b955c4fd140e131d2d055b5c8cf769db9f09509c92148e8
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qPt31:ymb3NkkiQ3mdBjFIj+qX
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2264-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2376-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2808-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2260-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/296-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1568-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1756-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1012-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/880-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2376 ddjjv.exe 2856 ffflfrf.exe 2392 nhbbht.exe 2808 jdppv.exe 2764 vvjvj.exe 2596 xxxflxl.exe 2260 btnbtb.exe 2648 rxxrfrr.exe 2564 rrlxlxl.exe 1680 nnnbnt.exe 2052 ppvdv.exe 296 rlxrlrf.exe 2820 llrxllr.exe 1916 5hnbnt.exe 2060 1bbnbh.exe 2852 vppjp.exe 1528 vpdvp.exe 1688 3xxfrrl.exe 2420 7ttbnb.exe 1568 5hbhnb.exe 2372 dvjpp.exe 1756 jjjvp.exe 1012 xrlrlfx.exe 3016 hhtnbn.exe 828 7tbthn.exe 2272 jjdjp.exe 2492 7fflxlx.exe 2300 rxxrrrl.exe 880 bntbbh.exe 2408 9vjvj.exe 2232 ppjdp.exe 2712 rrffrxr.exe 2376 nnhtnb.exe 2800 hhbnbh.exe 2740 jjjjp.exe 2392 vvjjp.exe 2756 rlrrrrx.exe 2888 ffrlrfr.exe 2612 nhhnnt.exe 1776 hbtbbh.exe 2752 5ppjv.exe 2440 jjvpv.exe 2080 9xrfrxf.exe 2324 ffflllx.exe 1032 tbthht.exe 1520 hhhhnt.exe 2816 5jdvp.exe 296 jvdvv.exe 1104 rrlfrxr.exe 2364 xxrflrf.exe 2844 hbhbhn.exe 1548 9thhnn.exe 1392 ddvjp.exe 484 3vvjj.exe 2336 9fxlffr.exe 324 lfxlfxf.exe 2024 tnbbnn.exe 1752 1bbtnn.exe 2016 jjdpp.exe 1756 3pvvd.exe 972 xxxlrxf.exe 600 rlxflfx.exe 828 tthnbh.exe 2284 hhbbnt.exe -
resource yara_rule behavioral1/memory/2264-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2376-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/296-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1568-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1756-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1012-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/880-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-303-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xxflfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffflllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2376 2264 ee1f72111c0cedfbd9c336326b09a7a0N.exe 30 PID 2264 wrote to memory of 2376 2264 ee1f72111c0cedfbd9c336326b09a7a0N.exe 30 PID 2264 wrote to memory of 2376 2264 ee1f72111c0cedfbd9c336326b09a7a0N.exe 30 PID 2264 wrote to memory of 2376 2264 ee1f72111c0cedfbd9c336326b09a7a0N.exe 30 PID 2376 wrote to memory of 2856 2376 ddjjv.exe 31 PID 2376 wrote to memory of 2856 2376 ddjjv.exe 31 PID 2376 wrote to memory of 2856 2376 ddjjv.exe 31 PID 2376 wrote to memory of 2856 2376 ddjjv.exe 31 PID 2856 wrote to memory of 2392 2856 ffflfrf.exe 32 PID 2856 wrote to memory of 2392 2856 ffflfrf.exe 32 PID 2856 wrote to memory of 2392 2856 ffflfrf.exe 32 PID 2856 wrote to memory of 2392 2856 ffflfrf.exe 32 PID 2392 wrote to memory of 2808 2392 nhbbht.exe 33 PID 2392 wrote to memory of 2808 2392 nhbbht.exe 33 PID 2392 wrote to memory of 2808 2392 nhbbht.exe 33 PID 2392 wrote to memory of 2808 2392 nhbbht.exe 33 PID 2808 wrote to memory of 2764 2808 jdppv.exe 34 PID 2808 wrote to memory of 2764 2808 jdppv.exe 34 PID 2808 wrote to memory of 2764 2808 jdppv.exe 34 PID 2808 wrote to memory of 2764 2808 jdppv.exe 34 PID 2764 wrote to memory of 2596 2764 vvjvj.exe 35 PID 2764 wrote to memory of 2596 2764 vvjvj.exe 35 PID 2764 wrote to memory of 2596 2764 vvjvj.exe 35 PID 2764 wrote to memory of 2596 2764 vvjvj.exe 35 PID 2596 wrote to memory of 2260 2596 xxxflxl.exe 36 PID 2596 wrote to memory of 2260 2596 xxxflxl.exe 36 PID 2596 wrote to memory of 2260 2596 xxxflxl.exe 36 PID 2596 wrote to memory of 2260 2596 xxxflxl.exe 36 PID 2260 wrote to memory of 2648 2260 btnbtb.exe 37 PID 2260 wrote to memory of 2648 2260 btnbtb.exe 37 PID 2260 wrote to memory of 2648 2260 btnbtb.exe 37 PID 2260 wrote to memory of 2648 2260 btnbtb.exe 37 PID 2648 wrote to memory of 2564 2648 rxxrfrr.exe 38 PID 2648 wrote to memory of 2564 2648 rxxrfrr.exe 38 PID 2648 wrote to memory of 2564 2648 rxxrfrr.exe 38 PID 2648 wrote to memory of 2564 2648 rxxrfrr.exe 38 PID 2564 wrote to memory of 1680 2564 rrlxlxl.exe 39 PID 2564 wrote to memory of 1680 2564 rrlxlxl.exe 39 PID 2564 wrote to memory of 1680 2564 rrlxlxl.exe 39 PID 2564 wrote to memory of 1680 2564 rrlxlxl.exe 39 PID 1680 wrote to memory of 2052 1680 nnnbnt.exe 40 PID 1680 wrote to memory of 2052 1680 nnnbnt.exe 40 PID 1680 wrote to memory of 2052 1680 nnnbnt.exe 40 PID 1680 wrote to memory of 2052 1680 nnnbnt.exe 40 PID 2052 wrote to memory of 296 2052 ppvdv.exe 41 PID 2052 wrote to memory of 296 2052 ppvdv.exe 41 PID 2052 wrote to memory of 296 2052 ppvdv.exe 41 PID 2052 wrote to memory of 296 2052 ppvdv.exe 41 PID 296 wrote to memory of 2820 296 rlxrlrf.exe 42 PID 296 wrote to memory of 2820 296 rlxrlrf.exe 42 PID 296 wrote to memory of 2820 296 rlxrlrf.exe 42 PID 296 wrote to memory of 2820 296 rlxrlrf.exe 42 PID 2820 wrote to memory of 1916 2820 llrxllr.exe 43 PID 2820 wrote to memory of 1916 2820 llrxllr.exe 43 PID 2820 wrote to memory of 1916 2820 llrxllr.exe 43 PID 2820 wrote to memory of 1916 2820 llrxllr.exe 43 PID 1916 wrote to memory of 2060 1916 5hnbnt.exe 44 PID 1916 wrote to memory of 2060 1916 5hnbnt.exe 44 PID 1916 wrote to memory of 2060 1916 5hnbnt.exe 44 PID 1916 wrote to memory of 2060 1916 5hnbnt.exe 44 PID 2060 wrote to memory of 2852 2060 1bbnbh.exe 45 PID 2060 wrote to memory of 2852 2060 1bbnbh.exe 45 PID 2060 wrote to memory of 2852 2060 1bbnbh.exe 45 PID 2060 wrote to memory of 2852 2060 1bbnbh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee1f72111c0cedfbd9c336326b09a7a0N.exe"C:\Users\Admin\AppData\Local\Temp\ee1f72111c0cedfbd9c336326b09a7a0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\ddjjv.exec:\ddjjv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\ffflfrf.exec:\ffflfrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\nhbbht.exec:\nhbbht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\jdppv.exec:\jdppv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\vvjvj.exec:\vvjvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\xxxflxl.exec:\xxxflxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\btnbtb.exec:\btnbtb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\rxxrfrr.exec:\rxxrfrr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\rrlxlxl.exec:\rrlxlxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\nnnbnt.exec:\nnnbnt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\ppvdv.exec:\ppvdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\rlxrlrf.exec:\rlxrlrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:296 -
\??\c:\llrxllr.exec:\llrxllr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\5hnbnt.exec:\5hnbnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\1bbnbh.exec:\1bbnbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\vppjp.exec:\vppjp.exe17⤵
- Executes dropped EXE
PID:2852 -
\??\c:\vpdvp.exec:\vpdvp.exe18⤵
- Executes dropped EXE
PID:1528 -
\??\c:\3xxfrrl.exec:\3xxfrrl.exe19⤵
- Executes dropped EXE
PID:1688 -
\??\c:\7ttbnb.exec:\7ttbnb.exe20⤵
- Executes dropped EXE
PID:2420 -
\??\c:\5hbhnb.exec:\5hbhnb.exe21⤵
- Executes dropped EXE
PID:1568 -
\??\c:\dvjpp.exec:\dvjpp.exe22⤵
- Executes dropped EXE
PID:2372 -
\??\c:\jjjvp.exec:\jjjvp.exe23⤵
- Executes dropped EXE
PID:1756 -
\??\c:\xrlrlfx.exec:\xrlrlfx.exe24⤵
- Executes dropped EXE
PID:1012 -
\??\c:\hhtnbn.exec:\hhtnbn.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016 -
\??\c:\7tbthn.exec:\7tbthn.exe26⤵
- Executes dropped EXE
PID:828 -
\??\c:\jjdjp.exec:\jjdjp.exe27⤵
- Executes dropped EXE
PID:2272 -
\??\c:\7fflxlx.exec:\7fflxlx.exe28⤵
- Executes dropped EXE
PID:2492 -
\??\c:\rxxrrrl.exec:\rxxrrrl.exe29⤵
- Executes dropped EXE
PID:2300 -
\??\c:\bntbbh.exec:\bntbbh.exe30⤵
- Executes dropped EXE
PID:880 -
\??\c:\9vjvj.exec:\9vjvj.exe31⤵
- Executes dropped EXE
PID:2408 -
\??\c:\ppjdp.exec:\ppjdp.exe32⤵
- Executes dropped EXE
PID:2232 -
\??\c:\rrffrxr.exec:\rrffrxr.exe33⤵
- Executes dropped EXE
PID:2712 -
\??\c:\nnhtnb.exec:\nnhtnb.exe34⤵
- Executes dropped EXE
PID:2376 -
\??\c:\hhbnbh.exec:\hhbnbh.exe35⤵
- Executes dropped EXE
PID:2800 -
\??\c:\jjjjp.exec:\jjjjp.exe36⤵
- Executes dropped EXE
PID:2740 -
\??\c:\vvjjp.exec:\vvjjp.exe37⤵
- Executes dropped EXE
PID:2392 -
\??\c:\rlrrrrx.exec:\rlrrrrx.exe38⤵
- Executes dropped EXE
PID:2756 -
\??\c:\ffrlrfr.exec:\ffrlrfr.exe39⤵
- Executes dropped EXE
PID:2888 -
\??\c:\nhhnnt.exec:\nhhnnt.exe40⤵
- Executes dropped EXE
PID:2612 -
\??\c:\hbtbbh.exec:\hbtbbh.exe41⤵
- Executes dropped EXE
PID:1776 -
\??\c:\5ppjv.exec:\5ppjv.exe42⤵
- Executes dropped EXE
PID:2752 -
\??\c:\jjvpv.exec:\jjvpv.exe43⤵
- Executes dropped EXE
PID:2440 -
\??\c:\9xrfrxf.exec:\9xrfrxf.exe44⤵
- Executes dropped EXE
PID:2080 -
\??\c:\ffflllx.exec:\ffflllx.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324 -
\??\c:\tbthht.exec:\tbthht.exe46⤵
- Executes dropped EXE
PID:1032 -
\??\c:\hhhhnt.exec:\hhhhnt.exe47⤵
- Executes dropped EXE
PID:1520 -
\??\c:\5jdvp.exec:\5jdvp.exe48⤵
- Executes dropped EXE
PID:2816 -
\??\c:\jvdvv.exec:\jvdvv.exe49⤵
- Executes dropped EXE
PID:296 -
\??\c:\rrlfrxr.exec:\rrlfrxr.exe50⤵
- Executes dropped EXE
PID:1104 -
\??\c:\xxrflrf.exec:\xxrflrf.exe51⤵
- Executes dropped EXE
PID:2364 -
\??\c:\hbhbhn.exec:\hbhbhn.exe52⤵
- Executes dropped EXE
PID:2844 -
\??\c:\9thhnn.exec:\9thhnn.exe53⤵
- Executes dropped EXE
PID:1548 -
\??\c:\ddvjp.exec:\ddvjp.exe54⤵
- Executes dropped EXE
PID:1392 -
\??\c:\3vvjj.exec:\3vvjj.exe55⤵
- Executes dropped EXE
PID:484 -
\??\c:\9fxlffr.exec:\9fxlffr.exe56⤵
- Executes dropped EXE
PID:2336 -
\??\c:\lfxlfxf.exec:\lfxlfxf.exe57⤵
- Executes dropped EXE
PID:324 -
\??\c:\tnbbnn.exec:\tnbbnn.exe58⤵
- Executes dropped EXE
PID:2024 -
\??\c:\1bbtnn.exec:\1bbtnn.exe59⤵
- Executes dropped EXE
PID:1752 -
\??\c:\jjdpp.exec:\jjdpp.exe60⤵
- Executes dropped EXE
PID:2016 -
\??\c:\3pvvd.exec:\3pvvd.exe61⤵
- Executes dropped EXE
PID:1756 -
\??\c:\xxxlrxf.exec:\xxxlrxf.exe62⤵
- Executes dropped EXE
PID:972 -
\??\c:\rlxflfx.exec:\rlxflfx.exe63⤵
- Executes dropped EXE
PID:600 -
\??\c:\tthnbh.exec:\tthnbh.exe64⤵
- Executes dropped EXE
PID:828 -
\??\c:\hhbbnt.exec:\hhbbnt.exe65⤵
- Executes dropped EXE
PID:2284 -
\??\c:\vvvvp.exec:\vvvvp.exe66⤵PID:1152
-
\??\c:\pvjdv.exec:\pvjdv.exe67⤵PID:1284
-
\??\c:\fffrfxl.exec:\fffrfxl.exe68⤵PID:3012
-
\??\c:\rflrxxx.exec:\rflrxxx.exe69⤵PID:1712
-
\??\c:\7tbnnb.exec:\7tbnnb.exe70⤵PID:2172
-
\??\c:\hbbthn.exec:\hbbthn.exe71⤵PID:2408
-
\??\c:\vvvvj.exec:\vvvvj.exe72⤵PID:2532
-
\??\c:\jjjvj.exec:\jjjvj.exe73⤵PID:1488
-
\??\c:\7lflxxl.exec:\7lflxxl.exe74⤵PID:2860
-
\??\c:\1frfrfx.exec:\1frfrfx.exe75⤵PID:2376
-
\??\c:\rlxrrfr.exec:\rlxrrfr.exe76⤵PID:1364
-
\??\c:\tnhhth.exec:\tnhhth.exe77⤵PID:2972
-
\??\c:\bbnttb.exec:\bbnttb.exe78⤵PID:1940
-
\??\c:\vvpdp.exec:\vvpdp.exe79⤵PID:2576
-
\??\c:\ddvjd.exec:\ddvjd.exe80⤵PID:2704
-
\??\c:\9lrfflx.exec:\9lrfflx.exe81⤵PID:1876
-
\??\c:\rlxlxlr.exec:\rlxlxlr.exe82⤵PID:2360
-
\??\c:\bhtttt.exec:\bhtttt.exe83⤵PID:1872
-
\??\c:\nhthbh.exec:\nhthbh.exe84⤵PID:3056
-
\??\c:\dvdjv.exec:\dvdjv.exe85⤵PID:2064
-
\??\c:\3dvpj.exec:\3dvpj.exe86⤵PID:1680
-
\??\c:\fxflflx.exec:\fxflflx.exe87⤵PID:584
-
\??\c:\lrxlffr.exec:\lrxlffr.exe88⤵PID:1588
-
\??\c:\hbbnnt.exec:\hbbnnt.exe89⤵PID:1000
-
\??\c:\hhhnht.exec:\hhhnht.exe90⤵PID:2820
-
\??\c:\ppdjp.exec:\ppdjp.exe91⤵PID:1916
-
\??\c:\jjjdp.exec:\jjjdp.exe92⤵PID:2168
-
\??\c:\rrlrxlf.exec:\rrlrxlf.exe93⤵PID:2140
-
\??\c:\rrrfxlx.exec:\rrrfxlx.exe94⤵PID:332
-
\??\c:\btnhbb.exec:\btnhbb.exe95⤵PID:1528
-
\??\c:\hnttnb.exec:\hnttnb.exe96⤵PID:536
-
\??\c:\vvjvd.exec:\vvjvd.exe97⤵PID:2012
-
\??\c:\pppjd.exec:\pppjd.exe98⤵PID:848
-
\??\c:\fxxxfrf.exec:\fxxxfrf.exe99⤵PID:2024
-
\??\c:\xrflflf.exec:\xrflflf.exe100⤵PID:1276
-
\??\c:\frlxfrf.exec:\frlxfrf.exe101⤵PID:832
-
\??\c:\7tnnhn.exec:\7tnnhn.exe102⤵PID:924
-
\??\c:\hnhttt.exec:\hnhttt.exe103⤵PID:1016
-
\??\c:\dvddv.exec:\dvddv.exe104⤵PID:1204
-
\??\c:\vpjdj.exec:\vpjdj.exe105⤵PID:3052
-
\??\c:\lxrfrxf.exec:\lxrfrxf.exe106⤵PID:1424
-
\??\c:\7ffrrfx.exec:\7ffrrfx.exe107⤵PID:2508
-
\??\c:\nnbtnb.exec:\nnbtnb.exe108⤵PID:988
-
\??\c:\bbhtht.exec:\bbhtht.exe109⤵PID:1720
-
\??\c:\ddpvj.exec:\ddpvj.exe110⤵PID:2148
-
\??\c:\jpdjv.exec:\jpdjv.exe111⤵PID:1880
-
\??\c:\rxrxrfl.exec:\rxrxrfl.exe112⤵PID:2692
-
\??\c:\llfxrfr.exec:\llfxrfr.exe113⤵PID:2780
-
\??\c:\hbbnht.exec:\hbbnht.exe114⤵PID:2380
-
\??\c:\nnntbh.exec:\nnntbh.exe115⤵PID:2796
-
\??\c:\vvjvp.exec:\vvjvp.exe116⤵PID:2608
-
\??\c:\vjvjj.exec:\vjvjj.exe117⤵PID:2604
-
\??\c:\xfffrlf.exec:\xfffrlf.exe118⤵PID:2988
-
\??\c:\xrrxlxf.exec:\xrrxlxf.exe119⤵PID:2868
-
\??\c:\bttnbh.exec:\bttnbh.exe120⤵PID:2596
-
\??\c:\tnhbhh.exec:\tnhbhh.exe121⤵PID:2256
-
\??\c:\7jjpj.exec:\7jjpj.exe122⤵PID:1228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-