Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 16:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2e40b953d59b8804763e679e05ee0df0N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
2e40b953d59b8804763e679e05ee0df0N.exe
-
Size
64KB
-
MD5
2e40b953d59b8804763e679e05ee0df0
-
SHA1
3f57054f718861883b2ba0dc8ac2de949fc51549
-
SHA256
08cc0842f6ae02434a696c78b43eac6963d74b913993a3b86fb8348ac410b126
-
SHA512
9543a3afd140d5406d0b97c559feab89946666d5da9f06372439c83ed09109289b3d1ca938809069eaab8afa5d451003da237767937ffc2dc3918ef58f87c181
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L279:ymb3NkkiQ3mdBjFI9m
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2072-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/572-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1524-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1044-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2120-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1580-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1764-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2352-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2104-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/760-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1756-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2708 jpdjd.exe 2920 frfrrrx.exe 2720 lxfxlll.exe 2824 ppjpd.exe 2860 5flfxrx.exe 2912 nhtbhb.exe 2652 dvpvj.exe 2644 lflxxfl.exe 572 thttth.exe 1524 nhbhnt.exe 1044 vjjvd.exe 2940 3llxlrl.exe 2896 5bnbhb.exe 2120 hbbhtb.exe 3000 jdjpp.exe 1580 rxfxfff.exe 1764 bthhnn.exe 2352 7bnntb.exe 2104 dvdvj.exe 2132 3xflxxr.exe 760 btnthh.exe 2284 nhtbtn.exe 1856 jdvdj.exe 900 rrlflfx.exe 1644 1lxflrx.exe 1756 bbhhtb.exe 1184 ttbnnh.exe 1908 jvjpv.exe 2520 lxfxfxf.exe 2072 7frrrrr.exe 3044 9tnhnn.exe 1808 hbnnbh.exe 2604 pppjp.exe 2736 pjddv.exe 2844 7xlrrrr.exe 2904 frllrrx.exe 2780 tthhtt.exe 2800 bbtbhh.exe 3056 tbnthh.exe 2740 vdjjd.exe 2692 pdppj.exe 2584 7fflfxl.exe 2632 xflrxlx.exe 2040 tnbhtt.exe 1140 thnnhb.exe 2972 thnbtb.exe 2696 jjpvj.exe 2956 dvdjp.exe 1616 lxfflfl.exe 2932 7btttt.exe 1964 1hbbbt.exe 2004 ppdpp.exe 2360 vjdvp.exe 2164 7lfxffl.exe 2424 1bnhnn.exe 2024 vpdjd.exe 2348 jdpjj.exe 1628 1rxxxrr.exe 848 3xrllfl.exe 1356 tbbhtb.exe 2356 htbttn.exe 1868 pjpdj.exe 1884 djpvd.exe 2236 frfxfxf.exe -
resource yara_rule behavioral1/memory/2072-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/572-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1524-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2120-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1580-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1764-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2352-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2104-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1756-261-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3thnbh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2708 2072 2e40b953d59b8804763e679e05ee0df0N.exe 30 PID 2072 wrote to memory of 2708 2072 2e40b953d59b8804763e679e05ee0df0N.exe 30 PID 2072 wrote to memory of 2708 2072 2e40b953d59b8804763e679e05ee0df0N.exe 30 PID 2072 wrote to memory of 2708 2072 2e40b953d59b8804763e679e05ee0df0N.exe 30 PID 2708 wrote to memory of 2920 2708 jpdjd.exe 31 PID 2708 wrote to memory of 2920 2708 jpdjd.exe 31 PID 2708 wrote to memory of 2920 2708 jpdjd.exe 31 PID 2708 wrote to memory of 2920 2708 jpdjd.exe 31 PID 2920 wrote to memory of 2720 2920 frfrrrx.exe 32 PID 2920 wrote to memory of 2720 2920 frfrrrx.exe 32 PID 2920 wrote to memory of 2720 2920 frfrrrx.exe 32 PID 2920 wrote to memory of 2720 2920 frfrrrx.exe 32 PID 2720 wrote to memory of 2824 2720 lxfxlll.exe 33 PID 2720 wrote to memory of 2824 2720 lxfxlll.exe 33 PID 2720 wrote to memory of 2824 2720 lxfxlll.exe 33 PID 2720 wrote to memory of 2824 2720 lxfxlll.exe 33 PID 2824 wrote to memory of 2860 2824 ppjpd.exe 34 PID 2824 wrote to memory of 2860 2824 ppjpd.exe 34 PID 2824 wrote to memory of 2860 2824 ppjpd.exe 34 PID 2824 wrote to memory of 2860 2824 ppjpd.exe 34 PID 2860 wrote to memory of 2912 2860 5flfxrx.exe 35 PID 2860 wrote to memory of 2912 2860 5flfxrx.exe 35 PID 2860 wrote to memory of 2912 2860 5flfxrx.exe 35 PID 2860 wrote to memory of 2912 2860 5flfxrx.exe 35 PID 2912 wrote to memory of 2652 2912 nhtbhb.exe 36 PID 2912 wrote to memory of 2652 2912 nhtbhb.exe 36 PID 2912 wrote to memory of 2652 2912 nhtbhb.exe 36 PID 2912 wrote to memory of 2652 2912 nhtbhb.exe 36 PID 2652 wrote to memory of 2644 2652 dvpvj.exe 37 PID 2652 wrote to memory of 2644 2652 dvpvj.exe 37 PID 2652 wrote to memory of 2644 2652 dvpvj.exe 37 PID 2652 wrote to memory of 2644 2652 dvpvj.exe 37 PID 2644 wrote to memory of 572 2644 lflxxfl.exe 38 PID 2644 wrote to memory of 572 2644 lflxxfl.exe 38 PID 2644 wrote to memory of 572 2644 lflxxfl.exe 38 PID 2644 wrote to memory of 572 2644 lflxxfl.exe 38 PID 572 wrote to memory of 1524 572 thttth.exe 39 PID 572 wrote to memory of 1524 572 thttth.exe 39 PID 572 wrote to memory of 1524 572 thttth.exe 39 PID 572 wrote to memory of 1524 572 thttth.exe 39 PID 1524 wrote to memory of 1044 1524 nhbhnt.exe 40 PID 1524 wrote to memory of 1044 1524 nhbhnt.exe 40 PID 1524 wrote to memory of 1044 1524 nhbhnt.exe 40 PID 1524 wrote to memory of 1044 1524 nhbhnt.exe 40 PID 1044 wrote to memory of 2940 1044 vjjvd.exe 41 PID 1044 wrote to memory of 2940 1044 vjjvd.exe 41 PID 1044 wrote to memory of 2940 1044 vjjvd.exe 41 PID 1044 wrote to memory of 2940 1044 vjjvd.exe 41 PID 2940 wrote to memory of 2896 2940 3llxlrl.exe 42 PID 2940 wrote to memory of 2896 2940 3llxlrl.exe 42 PID 2940 wrote to memory of 2896 2940 3llxlrl.exe 42 PID 2940 wrote to memory of 2896 2940 3llxlrl.exe 42 PID 2896 wrote to memory of 2120 2896 5bnbhb.exe 43 PID 2896 wrote to memory of 2120 2896 5bnbhb.exe 43 PID 2896 wrote to memory of 2120 2896 5bnbhb.exe 43 PID 2896 wrote to memory of 2120 2896 5bnbhb.exe 43 PID 2120 wrote to memory of 3000 2120 hbbhtb.exe 44 PID 2120 wrote to memory of 3000 2120 hbbhtb.exe 44 PID 2120 wrote to memory of 3000 2120 hbbhtb.exe 44 PID 2120 wrote to memory of 3000 2120 hbbhtb.exe 44 PID 3000 wrote to memory of 1580 3000 jdjpp.exe 45 PID 3000 wrote to memory of 1580 3000 jdjpp.exe 45 PID 3000 wrote to memory of 1580 3000 jdjpp.exe 45 PID 3000 wrote to memory of 1580 3000 jdjpp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e40b953d59b8804763e679e05ee0df0N.exe"C:\Users\Admin\AppData\Local\Temp\2e40b953d59b8804763e679e05ee0df0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\jpdjd.exec:\jpdjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\frfrrrx.exec:\frfrrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\lxfxlll.exec:\lxfxlll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\ppjpd.exec:\ppjpd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\5flfxrx.exec:\5flfxrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\nhtbhb.exec:\nhtbhb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\dvpvj.exec:\dvpvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\lflxxfl.exec:\lflxxfl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\thttth.exec:\thttth.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\nhbhnt.exec:\nhbhnt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\vjjvd.exec:\vjjvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\3llxlrl.exec:\3llxlrl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\5bnbhb.exec:\5bnbhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\hbbhtb.exec:\hbbhtb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
\??\c:\jdjpp.exec:\jdjpp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\rxfxfff.exec:\rxfxfff.exe17⤵
- Executes dropped EXE
PID:1580 -
\??\c:\bthhnn.exec:\bthhnn.exe18⤵
- Executes dropped EXE
PID:1764 -
\??\c:\7bnntb.exec:\7bnntb.exe19⤵
- Executes dropped EXE
PID:2352 -
\??\c:\dvdvj.exec:\dvdvj.exe20⤵
- Executes dropped EXE
PID:2104 -
\??\c:\3xflxxr.exec:\3xflxxr.exe21⤵
- Executes dropped EXE
PID:2132 -
\??\c:\btnthh.exec:\btnthh.exe22⤵
- Executes dropped EXE
PID:760 -
\??\c:\nhtbtn.exec:\nhtbtn.exe23⤵
- Executes dropped EXE
PID:2284 -
\??\c:\jdvdj.exec:\jdvdj.exe24⤵
- Executes dropped EXE
PID:1856 -
\??\c:\rrlflfx.exec:\rrlflfx.exe25⤵
- Executes dropped EXE
PID:900 -
\??\c:\1lxflrx.exec:\1lxflrx.exe26⤵
- Executes dropped EXE
PID:1644 -
\??\c:\bbhhtb.exec:\bbhhtb.exe27⤵
- Executes dropped EXE
PID:1756 -
\??\c:\ttbnnh.exec:\ttbnnh.exe28⤵
- Executes dropped EXE
PID:1184 -
\??\c:\jvjpv.exec:\jvjpv.exe29⤵
- Executes dropped EXE
PID:1908 -
\??\c:\lxfxfxf.exec:\lxfxfxf.exe30⤵
- Executes dropped EXE
PID:2520 -
\??\c:\7frrrrr.exec:\7frrrrr.exe31⤵
- Executes dropped EXE
PID:2072 -
\??\c:\9tnhnn.exec:\9tnhnn.exe32⤵
- Executes dropped EXE
PID:3044 -
\??\c:\hbnnbh.exec:\hbnnbh.exe33⤵
- Executes dropped EXE
PID:1808 -
\??\c:\pppjp.exec:\pppjp.exe34⤵
- Executes dropped EXE
PID:2604 -
\??\c:\pjddv.exec:\pjddv.exe35⤵
- Executes dropped EXE
PID:2736 -
\??\c:\7xlrrrr.exec:\7xlrrrr.exe36⤵
- Executes dropped EXE
PID:2844 -
\??\c:\frllrrx.exec:\frllrrx.exe37⤵
- Executes dropped EXE
PID:2904 -
\??\c:\tthhtt.exec:\tthhtt.exe38⤵
- Executes dropped EXE
PID:2780 -
\??\c:\bbtbhh.exec:\bbtbhh.exe39⤵
- Executes dropped EXE
PID:2800 -
\??\c:\tbnthh.exec:\tbnthh.exe40⤵
- Executes dropped EXE
PID:3056 -
\??\c:\vdjjd.exec:\vdjjd.exe41⤵
- Executes dropped EXE
PID:2740 -
\??\c:\pdppj.exec:\pdppj.exe42⤵
- Executes dropped EXE
PID:2692 -
\??\c:\7fflfxl.exec:\7fflfxl.exe43⤵
- Executes dropped EXE
PID:2584 -
\??\c:\xflrxlx.exec:\xflrxlx.exe44⤵
- Executes dropped EXE
PID:2632 -
\??\c:\tnbhtt.exec:\tnbhtt.exe45⤵
- Executes dropped EXE
PID:2040 -
\??\c:\thnnhb.exec:\thnnhb.exe46⤵
- Executes dropped EXE
PID:1140 -
\??\c:\thnbtb.exec:\thnbtb.exe47⤵
- Executes dropped EXE
PID:2972 -
\??\c:\jjpvj.exec:\jjpvj.exe48⤵
- Executes dropped EXE
PID:2696 -
\??\c:\dvdjp.exec:\dvdjp.exe49⤵
- Executes dropped EXE
PID:2956 -
\??\c:\lxfflfl.exec:\lxfflfl.exe50⤵
- Executes dropped EXE
PID:1616 -
\??\c:\7btttt.exec:\7btttt.exe51⤵
- Executes dropped EXE
PID:2932 -
\??\c:\1hbbbt.exec:\1hbbbt.exe52⤵
- Executes dropped EXE
PID:1964 -
\??\c:\ppdpp.exec:\ppdpp.exe53⤵
- Executes dropped EXE
PID:2004 -
\??\c:\vjdvp.exec:\vjdvp.exe54⤵
- Executes dropped EXE
PID:2360 -
\??\c:\7lfxffl.exec:\7lfxffl.exe55⤵
- Executes dropped EXE
PID:2164 -
\??\c:\1bnhnn.exec:\1bnhnn.exe56⤵
- Executes dropped EXE
PID:2424 -
\??\c:\vpdjd.exec:\vpdjd.exe57⤵
- Executes dropped EXE
PID:2024 -
\??\c:\jdpjj.exec:\jdpjj.exe58⤵
- Executes dropped EXE
PID:2348 -
\??\c:\1rxxxrr.exec:\1rxxxrr.exe59⤵
- Executes dropped EXE
PID:1628 -
\??\c:\3xrllfl.exec:\3xrllfl.exe60⤵
- Executes dropped EXE
PID:848 -
\??\c:\tbbhtb.exec:\tbbhtb.exe61⤵
- Executes dropped EXE
PID:1356 -
\??\c:\htbttn.exec:\htbttn.exe62⤵
- Executes dropped EXE
PID:2356 -
\??\c:\pjpdj.exec:\pjpdj.exe63⤵
- Executes dropped EXE
PID:1868 -
\??\c:\djpvd.exec:\djpvd.exe64⤵
- Executes dropped EXE
PID:1884 -
\??\c:\frfxfxf.exec:\frfxfxf.exe65⤵
- Executes dropped EXE
PID:2236 -
\??\c:\bnnnbb.exec:\bnnnbb.exe66⤵PID:3064
-
\??\c:\nhnnbn.exec:\nhnnbn.exe67⤵PID:1184
-
\??\c:\pjvvd.exec:\pjvvd.exe68⤵PID:1912
-
\??\c:\9vjjv.exec:\9vjjv.exe69⤵PID:2060
-
\??\c:\jdvjp.exec:\jdvjp.exe70⤵PID:1732
-
\??\c:\xflxlxf.exec:\xflxlxf.exe71⤵PID:2076
-
\??\c:\rfllrrx.exec:\rfllrrx.exe72⤵PID:3044
-
\??\c:\5btttn.exec:\5btttn.exe73⤵PID:624
-
\??\c:\htbhhb.exec:\htbhhb.exe74⤵PID:2768
-
\??\c:\3jpvj.exec:\3jpvj.exe75⤵PID:2720
-
\??\c:\5dpjp.exec:\5dpjp.exe76⤵PID:2820
-
\??\c:\dpjpp.exec:\dpjpp.exe77⤵PID:2096
-
\??\c:\7xllrrf.exec:\7xllrrf.exe78⤵PID:2864
-
\??\c:\rfllfff.exec:\rfllfff.exe79⤵PID:2808
-
\??\c:\3nhnbt.exec:\3nhnbt.exe80⤵PID:2684
-
\??\c:\nbhhbt.exec:\nbhhbt.exe81⤵PID:2908
-
\??\c:\jvvpp.exec:\jvvpp.exe82⤵PID:2680
-
\??\c:\djjvp.exec:\djjvp.exe83⤵PID:2008
-
\??\c:\7llrfrr.exec:\7llrfrr.exe84⤵PID:1200
-
\??\c:\9hbbbb.exec:\9hbbbb.exe85⤵PID:992
-
\??\c:\thttbt.exec:\thttbt.exe86⤵PID:1520
-
\??\c:\vppvd.exec:\vppvd.exe87⤵PID:2888
-
\??\c:\3pvvd.exec:\3pvvd.exe88⤵PID:2984
-
\??\c:\frxrlll.exec:\frxrlll.exe89⤵PID:2976
-
\??\c:\frxfllf.exec:\frxfllf.exe90⤵PID:1100
-
\??\c:\hthhtn.exec:\hthhtn.exe91⤵PID:1316
-
\??\c:\htbhtb.exec:\htbhtb.exe92⤵PID:2804
-
\??\c:\dvjjj.exec:\dvjjj.exe93⤵PID:3040
-
\??\c:\jvjpv.exec:\jvjpv.exe94⤵PID:3036
-
\??\c:\lxxfrlf.exec:\lxxfrlf.exe95⤵PID:2164
-
\??\c:\9xrxxxf.exec:\9xrxxxf.exe96⤵PID:1656
-
\??\c:\bthbhh.exec:\bthbhh.exe97⤵PID:444
-
\??\c:\7thnbh.exec:\7thnbh.exe98⤵PID:2184
-
\??\c:\5dvvj.exec:\5dvvj.exe99⤵PID:844
-
\??\c:\9jvdj.exec:\9jvdj.exe100⤵PID:1612
-
\??\c:\7xxlfxx.exec:\7xxlfxx.exe101⤵PID:1408
-
\??\c:\fxfflxl.exec:\fxfflxl.exe102⤵PID:1920
-
\??\c:\9thntn.exec:\9thntn.exe103⤵PID:1848
-
\??\c:\dvdjv.exec:\dvdjv.exe104⤵PID:1756
-
\??\c:\jpvvd.exec:\jpvvd.exe105⤵PID:380
-
\??\c:\5rllrll.exec:\5rllrll.exe106⤵PID:896
-
\??\c:\7frxxrr.exec:\7frxxrr.exe107⤵PID:2420
-
\??\c:\1frflff.exec:\1frflff.exe108⤵PID:2552
-
\??\c:\nbnbbb.exec:\nbnbbb.exe109⤵PID:2540
-
\??\c:\9vppj.exec:\9vppj.exe110⤵PID:1136
-
\??\c:\vjddj.exec:\vjddj.exe111⤵PID:2560
-
\??\c:\jvddj.exec:\jvddj.exe112⤵PID:2020
-
\??\c:\flllfrr.exec:\flllfrr.exe113⤵PID:2604
-
\??\c:\rflffxl.exec:\rflffxl.exe114⤵PID:2736
-
\??\c:\tnnbtn.exec:\tnnbtn.exe115⤵PID:336
-
\??\c:\bntbhh.exec:\bntbhh.exe116⤵PID:2260
-
\??\c:\1vdvd.exec:\1vdvd.exe117⤵PID:2784
-
\??\c:\1dvdj.exec:\1dvdj.exe118⤵
- System Location Discovery: System Language Discovery
PID:2800 -
\??\c:\1lfrxfl.exec:\1lfrxfl.exe119⤵PID:3056
-
\??\c:\fxxrxrr.exec:\fxxrxrr.exe120⤵PID:2652
-
\??\c:\nbbbbb.exec:\nbbbbb.exe121⤵PID:2740
-
\??\c:\hhbhhh.exec:\hhbhhh.exe122⤵PID:2584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-