Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 19:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
afa12aab342eaf22812d241c3d7a8a10N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
afa12aab342eaf22812d241c3d7a8a10N.exe
-
Size
248KB
-
MD5
afa12aab342eaf22812d241c3d7a8a10
-
SHA1
5632f71574ad7487411fe48563f61c4ead050a07
-
SHA256
db6ab0c2fe9acb16fcf217a96619129862e559e0ed5efddeae60506d72683e67
-
SHA512
f5b8fd9aac80b5c6d039284bc26f1a50fe36b542295962649504dc4d9fadd5da65cb4da9c9c2566ca33cddac5453f19a879ffd2989dc674e73337ddeb656dfbf
-
SSDEEP
6144:n3C9BRo/AIX27NHWpU00VIxas1oa3YiFRle:n3C9uD6AUDCa4NYmRQ
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral1/memory/3004-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1884-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2388-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1416-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2040-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2004-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2280-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1896-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/268-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2052-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2284 xffrlfx.exe 1884 bththt.exe 2388 dvdjv.exe 2760 3rxrrrx.exe 2680 nhtbnh.exe 2668 vvvvj.exe 2724 xxlxrxl.exe 2592 nhbbtt.exe 2432 vdddd.exe 1940 1lxxflr.exe 1416 1nbhnb.exe 2040 7jvpv.exe 2004 7xrxffr.exe 2356 btnntb.exe 2280 tnthnt.exe 2612 vvjdv.exe 2880 5rrxxfr.exe 2996 bbbbbb.exe 2428 hnbtbt.exe 1896 llfflfr.exe 408 5xrxflx.exe 2856 btbnbn.exe 1284 vpdpd.exe 2840 xlfrffl.exe 268 fxxfrxr.exe 2052 nhntbn.exe 1428 3vjpd.exe 1744 fxxrffx.exe 2024 hbttnn.exe 2344 5vdpv.exe 2284 lfrxrrx.exe 2276 hbtthh.exe 1528 dvpvd.exe 2656 ddvdj.exe 2816 llllrrx.exe 2792 1fxfxxx.exe 2748 5htttt.exe 2860 vvddd.exe 2820 ddvvp.exe 2564 xrffllr.exe 2608 xrlflfl.exe 2992 3bbbnt.exe 1040 hhbnbh.exe 1940 1nbhnt.exe 1444 jjjvj.exe 1956 5vppd.exe 2032 rrlxxxl.exe 2016 tnhbhn.exe 380 tnttbt.exe 1620 jpppj.exe 1800 jdvjd.exe 2652 xrlxrrx.exe 2420 llffrrf.exe 2084 btbnhn.exe 2232 pppvj.exe 2928 djvdv.exe 688 rlxfllx.exe 1856 rrxfrrf.exe 1540 nhtntt.exe 1644 thhhbt.exe 1988 vpdjp.exe 892 rlfxlxf.exe 2240 3llrflx.exe 372 bbtnbb.exe -
resource yara_rule behavioral1/memory/3004-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1884-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2388-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1416-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1896-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/268-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2052-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-305-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlxlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lfrflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbttht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jvpp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2284 3004 afa12aab342eaf22812d241c3d7a8a10N.exe 31 PID 3004 wrote to memory of 2284 3004 afa12aab342eaf22812d241c3d7a8a10N.exe 31 PID 3004 wrote to memory of 2284 3004 afa12aab342eaf22812d241c3d7a8a10N.exe 31 PID 3004 wrote to memory of 2284 3004 afa12aab342eaf22812d241c3d7a8a10N.exe 31 PID 2284 wrote to memory of 1884 2284 xffrlfx.exe 32 PID 2284 wrote to memory of 1884 2284 xffrlfx.exe 32 PID 2284 wrote to memory of 1884 2284 xffrlfx.exe 32 PID 2284 wrote to memory of 1884 2284 xffrlfx.exe 32 PID 1884 wrote to memory of 2388 1884 bththt.exe 33 PID 1884 wrote to memory of 2388 1884 bththt.exe 33 PID 1884 wrote to memory of 2388 1884 bththt.exe 33 PID 1884 wrote to memory of 2388 1884 bththt.exe 33 PID 2388 wrote to memory of 2760 2388 dvdjv.exe 34 PID 2388 wrote to memory of 2760 2388 dvdjv.exe 34 PID 2388 wrote to memory of 2760 2388 dvdjv.exe 34 PID 2388 wrote to memory of 2760 2388 dvdjv.exe 34 PID 2760 wrote to memory of 2680 2760 3rxrrrx.exe 35 PID 2760 wrote to memory of 2680 2760 3rxrrrx.exe 35 PID 2760 wrote to memory of 2680 2760 3rxrrrx.exe 35 PID 2760 wrote to memory of 2680 2760 3rxrrrx.exe 35 PID 2680 wrote to memory of 2668 2680 nhtbnh.exe 36 PID 2680 wrote to memory of 2668 2680 nhtbnh.exe 36 PID 2680 wrote to memory of 2668 2680 nhtbnh.exe 36 PID 2680 wrote to memory of 2668 2680 nhtbnh.exe 36 PID 2668 wrote to memory of 2724 2668 vvvvj.exe 37 PID 2668 wrote to memory of 2724 2668 vvvvj.exe 37 PID 2668 wrote to memory of 2724 2668 vvvvj.exe 37 PID 2668 wrote to memory of 2724 2668 vvvvj.exe 37 PID 2724 wrote to memory of 2592 2724 xxlxrxl.exe 38 PID 2724 wrote to memory of 2592 2724 xxlxrxl.exe 38 PID 2724 wrote to memory of 2592 2724 xxlxrxl.exe 38 PID 2724 wrote to memory of 2592 2724 xxlxrxl.exe 38 PID 2592 wrote to memory of 2432 2592 nhbbtt.exe 39 PID 2592 wrote to memory of 2432 2592 nhbbtt.exe 39 PID 2592 wrote to memory of 2432 2592 nhbbtt.exe 39 PID 2592 wrote to memory of 2432 2592 nhbbtt.exe 39 PID 2432 wrote to memory of 1940 2432 vdddd.exe 40 PID 2432 wrote to memory of 1940 2432 vdddd.exe 40 PID 2432 wrote to memory of 1940 2432 vdddd.exe 40 PID 2432 wrote to memory of 1940 2432 vdddd.exe 40 PID 1940 wrote to memory of 1416 1940 1lxxflr.exe 41 PID 1940 wrote to memory of 1416 1940 1lxxflr.exe 41 PID 1940 wrote to memory of 1416 1940 1lxxflr.exe 41 PID 1940 wrote to memory of 1416 1940 1lxxflr.exe 41 PID 1416 wrote to memory of 2040 1416 1nbhnb.exe 42 PID 1416 wrote to memory of 2040 1416 1nbhnb.exe 42 PID 1416 wrote to memory of 2040 1416 1nbhnb.exe 42 PID 1416 wrote to memory of 2040 1416 1nbhnb.exe 42 PID 2040 wrote to memory of 2004 2040 7jvpv.exe 43 PID 2040 wrote to memory of 2004 2040 7jvpv.exe 43 PID 2040 wrote to memory of 2004 2040 7jvpv.exe 43 PID 2040 wrote to memory of 2004 2040 7jvpv.exe 43 PID 2004 wrote to memory of 2356 2004 7xrxffr.exe 44 PID 2004 wrote to memory of 2356 2004 7xrxffr.exe 44 PID 2004 wrote to memory of 2356 2004 7xrxffr.exe 44 PID 2004 wrote to memory of 2356 2004 7xrxffr.exe 44 PID 2356 wrote to memory of 2280 2356 btnntb.exe 45 PID 2356 wrote to memory of 2280 2356 btnntb.exe 45 PID 2356 wrote to memory of 2280 2356 btnntb.exe 45 PID 2356 wrote to memory of 2280 2356 btnntb.exe 45 PID 2280 wrote to memory of 2612 2280 tnthnt.exe 46 PID 2280 wrote to memory of 2612 2280 tnthnt.exe 46 PID 2280 wrote to memory of 2612 2280 tnthnt.exe 46 PID 2280 wrote to memory of 2612 2280 tnthnt.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa12aab342eaf22812d241c3d7a8a10N.exe"C:\Users\Admin\AppData\Local\Temp\afa12aab342eaf22812d241c3d7a8a10N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\xffrlfx.exec:\xffrlfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\bththt.exec:\bththt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\dvdjv.exec:\dvdjv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\3rxrrrx.exec:\3rxrrrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\nhtbnh.exec:\nhtbnh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\vvvvj.exec:\vvvvj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\xxlxrxl.exec:\xxlxrxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\nhbbtt.exec:\nhbbtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\vdddd.exec:\vdddd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\1lxxflr.exec:\1lxxflr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\1nbhnb.exec:\1nbhnb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
\??\c:\7jvpv.exec:\7jvpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\7xrxffr.exec:\7xrxffr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\btnntb.exec:\btnntb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\tnthnt.exec:\tnthnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\vvjdv.exec:\vvjdv.exe17⤵
- Executes dropped EXE
PID:2612 -
\??\c:\5rrxxfr.exec:\5rrxxfr.exe18⤵
- Executes dropped EXE
PID:2880 -
\??\c:\bbbbbb.exec:\bbbbbb.exe19⤵
- Executes dropped EXE
PID:2996 -
\??\c:\hnbtbt.exec:\hnbtbt.exe20⤵
- Executes dropped EXE
PID:2428 -
\??\c:\llfflfr.exec:\llfflfr.exe21⤵
- Executes dropped EXE
PID:1896 -
\??\c:\5xrxflx.exec:\5xrxflx.exe22⤵
- Executes dropped EXE
PID:408 -
\??\c:\btbnbn.exec:\btbnbn.exe23⤵
- Executes dropped EXE
PID:2856 -
\??\c:\vpdpd.exec:\vpdpd.exe24⤵
- Executes dropped EXE
PID:1284 -
\??\c:\xlfrffl.exec:\xlfrffl.exe25⤵
- Executes dropped EXE
PID:2840 -
\??\c:\fxxfrxr.exec:\fxxfrxr.exe26⤵
- Executes dropped EXE
PID:268 -
\??\c:\nhntbn.exec:\nhntbn.exe27⤵
- Executes dropped EXE
PID:2052 -
\??\c:\3vjpd.exec:\3vjpd.exe28⤵
- Executes dropped EXE
PID:1428 -
\??\c:\fxxrffx.exec:\fxxrffx.exe29⤵
- Executes dropped EXE
PID:1744 -
\??\c:\hbttnn.exec:\hbttnn.exe30⤵
- Executes dropped EXE
PID:2024 -
\??\c:\5vdpv.exec:\5vdpv.exe31⤵
- Executes dropped EXE
PID:2344 -
\??\c:\lfrxrrx.exec:\lfrxrrx.exe32⤵
- Executes dropped EXE
PID:2284 -
\??\c:\hbtthh.exec:\hbtthh.exe33⤵
- Executes dropped EXE
PID:2276 -
\??\c:\dvpvd.exec:\dvpvd.exe34⤵
- Executes dropped EXE
PID:1528 -
\??\c:\ddvdj.exec:\ddvdj.exe35⤵
- Executes dropped EXE
PID:2656 -
\??\c:\llllrrx.exec:\llllrrx.exe36⤵
- Executes dropped EXE
PID:2816 -
\??\c:\1fxfxxx.exec:\1fxfxxx.exe37⤵
- Executes dropped EXE
PID:2792 -
\??\c:\5htttt.exec:\5htttt.exe38⤵
- Executes dropped EXE
PID:2748 -
\??\c:\vvddd.exec:\vvddd.exe39⤵
- Executes dropped EXE
PID:2860 -
\??\c:\ddvvp.exec:\ddvvp.exe40⤵
- Executes dropped EXE
PID:2820 -
\??\c:\xrffllr.exec:\xrffllr.exe41⤵
- Executes dropped EXE
PID:2564 -
\??\c:\xrlflfl.exec:\xrlflfl.exe42⤵
- Executes dropped EXE
PID:2608 -
\??\c:\3bbbnt.exec:\3bbbnt.exe43⤵
- Executes dropped EXE
PID:2992 -
\??\c:\hhbnbh.exec:\hhbnbh.exe44⤵
- Executes dropped EXE
PID:1040 -
\??\c:\1nbhnt.exec:\1nbhnt.exe45⤵
- Executes dropped EXE
PID:1940 -
\??\c:\jjjvj.exec:\jjjvj.exe46⤵
- Executes dropped EXE
PID:1444 -
\??\c:\5vppd.exec:\5vppd.exe47⤵
- Executes dropped EXE
PID:1956 -
\??\c:\rrlxxxl.exec:\rrlxxxl.exe48⤵
- Executes dropped EXE
PID:2032 -
\??\c:\tnhbhn.exec:\tnhbhn.exe49⤵
- Executes dropped EXE
PID:2016 -
\??\c:\tnttbt.exec:\tnttbt.exe50⤵
- Executes dropped EXE
PID:380 -
\??\c:\jpppj.exec:\jpppj.exe51⤵
- Executes dropped EXE
PID:1620 -
\??\c:\jdvjd.exec:\jdvjd.exe52⤵
- Executes dropped EXE
PID:1800 -
\??\c:\xrlxrrx.exec:\xrlxrrx.exe53⤵
- Executes dropped EXE
PID:2652 -
\??\c:\llffrrf.exec:\llffrrf.exe54⤵
- Executes dropped EXE
PID:2420 -
\??\c:\btbnhn.exec:\btbnhn.exe55⤵
- Executes dropped EXE
PID:2084 -
\??\c:\pppvj.exec:\pppvj.exe56⤵
- Executes dropped EXE
PID:2232 -
\??\c:\djvdv.exec:\djvdv.exe57⤵
- Executes dropped EXE
PID:2928 -
\??\c:\rlxfllx.exec:\rlxfllx.exe58⤵
- Executes dropped EXE
PID:688 -
\??\c:\rrxfrrf.exec:\rrxfrrf.exe59⤵
- Executes dropped EXE
PID:1856 -
\??\c:\nhtntt.exec:\nhtntt.exe60⤵
- Executes dropped EXE
PID:1540 -
\??\c:\thhhbt.exec:\thhhbt.exe61⤵
- Executes dropped EXE
PID:1644 -
\??\c:\vpdjp.exec:\vpdjp.exe62⤵
- Executes dropped EXE
PID:1988 -
\??\c:\rlfxlxf.exec:\rlfxlxf.exe63⤵
- Executes dropped EXE
PID:892 -
\??\c:\3llrflx.exec:\3llrflx.exe64⤵
- Executes dropped EXE
PID:2240 -
\??\c:\bbtnbb.exec:\bbtnbb.exe65⤵
- Executes dropped EXE
PID:372 -
\??\c:\3thbtn.exec:\3thbtn.exe66⤵PID:2508
-
\??\c:\pjpvv.exec:\pjpvv.exe67⤵PID:1680
-
\??\c:\vvjvj.exec:\vvjvj.exe68⤵PID:2336
-
\??\c:\xrffllx.exec:\xrffllx.exe69⤵PID:800
-
\??\c:\1rlxlxf.exec:\1rlxlxf.exe70⤵PID:2320
-
\??\c:\tnbhth.exec:\tnbhth.exe71⤵PID:2128
-
\??\c:\tnthtt.exec:\tnthtt.exe72⤵PID:2264
-
\??\c:\dddjp.exec:\dddjp.exe73⤵PID:1268
-
\??\c:\5djjp.exec:\5djjp.exe74⤵PID:2388
-
\??\c:\1fxrrlr.exec:\1fxrrlr.exe75⤵PID:2908
-
\??\c:\rrflxlr.exec:\rrflxlr.exe76⤵PID:2832
-
\??\c:\tbbttn.exec:\tbbttn.exe77⤵PID:2680
-
\??\c:\bthbtn.exec:\bthbtn.exe78⤵PID:2668
-
\??\c:\ppppd.exec:\ppppd.exe79⤵PID:2548
-
\??\c:\jddpp.exec:\jddpp.exe80⤵PID:2444
-
\??\c:\fxlrxxl.exec:\fxlrxxl.exe81⤵PID:2180
-
\??\c:\xxxrxlf.exec:\xxxrxlf.exe82⤵PID:2976
-
\??\c:\nhhthn.exec:\nhhthn.exe83⤵PID:1088
-
\??\c:\tnbntb.exec:\tnbntb.exe84⤵PID:608
-
\??\c:\vpdjp.exec:\vpdjp.exe85⤵PID:1416
-
\??\c:\vdjvd.exec:\vdjvd.exe86⤵PID:1632
-
\??\c:\rxfrlrx.exec:\rxfrlrx.exe87⤵PID:2352
-
\??\c:\htttbb.exec:\htttbb.exe88⤵PID:2064
-
\??\c:\7nbhnn.exec:\7nbhnn.exe89⤵PID:1512
-
\??\c:\vpjpj.exec:\vpjpj.exe90⤵PID:2280
-
\??\c:\9pjvj.exec:\9pjvj.exe91⤵PID:2872
-
\??\c:\pjdjp.exec:\pjdjp.exe92⤵PID:2796
-
\??\c:\5fflfrx.exec:\5fflfrx.exe93⤵PID:2996
-
\??\c:\fxllffl.exec:\fxllffl.exe94⤵PID:2132
-
\??\c:\tbhbbt.exec:\tbhbbt.exe95⤵PID:2368
-
\??\c:\vvpvp.exec:\vvpvp.exe96⤵PID:2932
-
\??\c:\dvpdp.exec:\dvpdp.exe97⤵PID:824
-
\??\c:\ffllxxl.exec:\ffllxxl.exe98⤵PID:2856
-
\??\c:\lfxlrxr.exec:\lfxlrxr.exe99⤵PID:2152
-
\??\c:\ttbbnb.exec:\ttbbnb.exe100⤵PID:1960
-
\??\c:\tnnbbb.exec:\tnnbbb.exe101⤵PID:1684
-
\??\c:\jjvjd.exec:\jjvjd.exe102⤵PID:2868
-
\??\c:\7pjjp.exec:\7pjjp.exe103⤵PID:2052
-
\??\c:\lfrxffx.exec:\lfrxffx.exe104⤵PID:2200
-
\??\c:\xrflrlx.exec:\xrflrlx.exe105⤵PID:1532
-
\??\c:\1htbnn.exec:\1htbnn.exe106⤵PID:3040
-
\??\c:\5bnnhb.exec:\5bnnhb.exe107⤵PID:3016
-
\??\c:\vvdjv.exec:\vvdjv.exe108⤵PID:2364
-
\??\c:\pvdpv.exec:\pvdpv.exe109⤵PID:2828
-
\??\c:\7lffrrx.exec:\7lffrrx.exe110⤵PID:1496
-
\??\c:\7hhbbh.exec:\7hhbbh.exe111⤵PID:2696
-
\??\c:\7bhhnh.exec:\7bhhnh.exe112⤵PID:2204
-
\??\c:\3jvvv.exec:\3jvvv.exe113⤵PID:2656
-
\??\c:\vjpvd.exec:\vjpvd.exe114⤵PID:2816
-
\??\c:\lxlllrx.exec:\lxlllrx.exe115⤵PID:2792
-
\??\c:\rfxfxfl.exec:\rfxfxfl.exe116⤵PID:2096
-
\??\c:\bthnbb.exec:\bthnbb.exe117⤵PID:2784
-
\??\c:\9bbbbb.exec:\9bbbbb.exe118⤵PID:2820
-
\??\c:\dpvpv.exec:\dpvpv.exe119⤵PID:2672
-
\??\c:\dpddp.exec:\dpddp.exe120⤵
- System Location Discovery: System Language Discovery
PID:1360 -
\??\c:\lxfxxfl.exec:\lxfxxfl.exe121⤵PID:1688
-
\??\c:\7bnnbb.exec:\7bnnbb.exe122⤵PID:1076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-