Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 02:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe
Resource
win7-20240729-en
6 signatures
150 seconds
General
-
Target
d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe
-
Size
69KB
-
MD5
403b38f01975cfdf435bb3fd78401e0f
-
SHA1
f19e634522705e9af1cbfc8ca917be32436607cf
-
SHA256
d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9
-
SHA512
842198cbc6bc377f56be6688ea7e55b1436e60f88107df80318684429853ba30caf79c19d08fb7661948d936653c76c0432c61657b586e6d38a7fa79712904dd
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjI:ymb3NkkiQ3mdBjFI4VY
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2240-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/848-8-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/848-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2436-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2988-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-65-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2888-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2400-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/588-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/648-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/332-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1548-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2072-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2240 1nbhbb.exe 2588 nhbbbh.exe 2436 vpvjd.exe 2988 pjpjd.exe 3036 rfxfffl.exe 2652 5ththn.exe 2748 vpvjd.exe 2888 jpvvd.exe 2780 1xxxflr.exe 2864 7htbnt.exe 2676 dpppp.exe 2580 xrlrxlr.exe 2068 tnnntt.exe 1644 tntbhh.exe 1624 pjjdj.exe 2400 jdpvj.exe 588 lxlfllr.exe 2028 btnthh.exe 2792 9hbntb.exe 1784 jvjpj.exe 648 1lxrxfl.exe 2132 1xxflrx.exe 332 hhbtbn.exe 1592 dvpjv.exe 1956 9vvpj.exe 1548 9lfrflr.exe 1928 fllxxrr.exe 1652 bbbbnt.exe 2072 pdpdd.exe 3064 7lflfrr.exe 876 rrlffrr.exe 2468 hhtthn.exe 2232 hthntt.exe 444 dvjjd.exe 1816 frflrlx.exe 2220 fxrrffr.exe 1588 hhthtb.exe 2992 bthnhh.exe 2788 ddjpd.exe 2716 djpdd.exe 2720 xlxxflr.exe 3048 rfrlrxf.exe 2744 hbhntb.exe 2528 btttbb.exe 2864 dvjpd.exe 2560 vjppp.exe 2672 xrxflfl.exe 1796 xrrrxxf.exe 1632 tntbnt.exe 1984 nbhhnt.exe 2808 5ppdj.exe 1876 dvjjd.exe 1776 1lrxxfl.exe 1336 ffrxrrx.exe 2564 hbbhnt.exe 2040 dvddp.exe 1016 5pdjv.exe 2872 xlrrlrf.exe 648 xrlrxrl.exe 2304 btbntb.exe 2836 tbhtth.exe 2156 lfxlflr.exe 996 3rxlrrf.exe 1684 nhhttt.exe -
resource yara_rule behavioral1/memory/2240-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/588-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/648-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/332-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1548-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2072-274-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlflxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3btbnt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 2240 848 d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe 28 PID 848 wrote to memory of 2240 848 d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe 28 PID 848 wrote to memory of 2240 848 d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe 28 PID 848 wrote to memory of 2240 848 d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe 28 PID 2240 wrote to memory of 2588 2240 1nbhbb.exe 29 PID 2240 wrote to memory of 2588 2240 1nbhbb.exe 29 PID 2240 wrote to memory of 2588 2240 1nbhbb.exe 29 PID 2240 wrote to memory of 2588 2240 1nbhbb.exe 29 PID 2588 wrote to memory of 2436 2588 nhbbbh.exe 30 PID 2588 wrote to memory of 2436 2588 nhbbbh.exe 30 PID 2588 wrote to memory of 2436 2588 nhbbbh.exe 30 PID 2588 wrote to memory of 2436 2588 nhbbbh.exe 30 PID 2436 wrote to memory of 2988 2436 vpvjd.exe 31 PID 2436 wrote to memory of 2988 2436 vpvjd.exe 31 PID 2436 wrote to memory of 2988 2436 vpvjd.exe 31 PID 2436 wrote to memory of 2988 2436 vpvjd.exe 31 PID 2988 wrote to memory of 3036 2988 pjpjd.exe 32 PID 2988 wrote to memory of 3036 2988 pjpjd.exe 32 PID 2988 wrote to memory of 3036 2988 pjpjd.exe 32 PID 2988 wrote to memory of 3036 2988 pjpjd.exe 32 PID 3036 wrote to memory of 2652 3036 rfxfffl.exe 33 PID 3036 wrote to memory of 2652 3036 rfxfffl.exe 33 PID 3036 wrote to memory of 2652 3036 rfxfffl.exe 33 PID 3036 wrote to memory of 2652 3036 rfxfffl.exe 33 PID 2652 wrote to memory of 2748 2652 5ththn.exe 34 PID 2652 wrote to memory of 2748 2652 5ththn.exe 34 PID 2652 wrote to memory of 2748 2652 5ththn.exe 34 PID 2652 wrote to memory of 2748 2652 5ththn.exe 34 PID 2748 wrote to memory of 2888 2748 vpvjd.exe 35 PID 2748 wrote to memory of 2888 2748 vpvjd.exe 35 PID 2748 wrote to memory of 2888 2748 vpvjd.exe 35 PID 2748 wrote to memory of 2888 2748 vpvjd.exe 35 PID 2888 wrote to memory of 2780 2888 jpvvd.exe 36 PID 2888 wrote to memory of 2780 2888 jpvvd.exe 36 PID 2888 wrote to memory of 2780 2888 jpvvd.exe 36 PID 2888 wrote to memory of 2780 2888 jpvvd.exe 36 PID 2780 wrote to memory of 2864 2780 1xxxflr.exe 37 PID 2780 wrote to memory of 2864 2780 1xxxflr.exe 37 PID 2780 wrote to memory of 2864 2780 1xxxflr.exe 37 PID 2780 wrote to memory of 2864 2780 1xxxflr.exe 37 PID 2864 wrote to memory of 2676 2864 7htbnt.exe 38 PID 2864 wrote to memory of 2676 2864 7htbnt.exe 38 PID 2864 wrote to memory of 2676 2864 7htbnt.exe 38 PID 2864 wrote to memory of 2676 2864 7htbnt.exe 38 PID 2676 wrote to memory of 2580 2676 dpppp.exe 39 PID 2676 wrote to memory of 2580 2676 dpppp.exe 39 PID 2676 wrote to memory of 2580 2676 dpppp.exe 39 PID 2676 wrote to memory of 2580 2676 dpppp.exe 39 PID 2580 wrote to memory of 2068 2580 xrlrxlr.exe 40 PID 2580 wrote to memory of 2068 2580 xrlrxlr.exe 40 PID 2580 wrote to memory of 2068 2580 xrlrxlr.exe 40 PID 2580 wrote to memory of 2068 2580 xrlrxlr.exe 40 PID 2068 wrote to memory of 1644 2068 tnnntt.exe 41 PID 2068 wrote to memory of 1644 2068 tnnntt.exe 41 PID 2068 wrote to memory of 1644 2068 tnnntt.exe 41 PID 2068 wrote to memory of 1644 2068 tnnntt.exe 41 PID 1644 wrote to memory of 1624 1644 tntbhh.exe 42 PID 1644 wrote to memory of 1624 1644 tntbhh.exe 42 PID 1644 wrote to memory of 1624 1644 tntbhh.exe 42 PID 1644 wrote to memory of 1624 1644 tntbhh.exe 42 PID 1624 wrote to memory of 2400 1624 pjjdj.exe 43 PID 1624 wrote to memory of 2400 1624 pjjdj.exe 43 PID 1624 wrote to memory of 2400 1624 pjjdj.exe 43 PID 1624 wrote to memory of 2400 1624 pjjdj.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe"C:\Users\Admin\AppData\Local\Temp\d3eaa85f7250ecd299e03d4c48a6e703550ab96480f610b0baede0ff908c46e9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\1nbhbb.exec:\1nbhbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\nhbbbh.exec:\nhbbbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\vpvjd.exec:\vpvjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\pjpjd.exec:\pjpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\rfxfffl.exec:\rfxfffl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\5ththn.exec:\5ththn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\vpvjd.exec:\vpvjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\jpvvd.exec:\jpvvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\1xxxflr.exec:\1xxxflr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\7htbnt.exec:\7htbnt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\dpppp.exec:\dpppp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\xrlrxlr.exec:\xrlrxlr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\tnnntt.exec:\tnnntt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\tntbhh.exec:\tntbhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\pjjdj.exec:\pjjdj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\jdpvj.exec:\jdpvj.exe17⤵
- Executes dropped EXE
PID:2400 -
\??\c:\lxlfllr.exec:\lxlfllr.exe18⤵
- Executes dropped EXE
PID:588 -
\??\c:\btnthh.exec:\btnthh.exe19⤵
- Executes dropped EXE
PID:2028 -
\??\c:\9hbntb.exec:\9hbntb.exe20⤵
- Executes dropped EXE
PID:2792 -
\??\c:\jvjpj.exec:\jvjpj.exe21⤵
- Executes dropped EXE
PID:1784 -
\??\c:\1lxrxfl.exec:\1lxrxfl.exe22⤵
- Executes dropped EXE
PID:648 -
\??\c:\1xxflrx.exec:\1xxflrx.exe23⤵
- Executes dropped EXE
PID:2132 -
\??\c:\hhbtbn.exec:\hhbtbn.exe24⤵
- Executes dropped EXE
PID:332 -
\??\c:\dvpjv.exec:\dvpjv.exe25⤵
- Executes dropped EXE
PID:1592 -
\??\c:\9vvpj.exec:\9vvpj.exe26⤵
- Executes dropped EXE
PID:1956 -
\??\c:\9lfrflr.exec:\9lfrflr.exe27⤵
- Executes dropped EXE
PID:1548 -
\??\c:\fllxxrr.exec:\fllxxrr.exe28⤵
- Executes dropped EXE
PID:1928 -
\??\c:\bbbbnt.exec:\bbbbnt.exe29⤵
- Executes dropped EXE
PID:1652 -
\??\c:\pdpdd.exec:\pdpdd.exe30⤵
- Executes dropped EXE
PID:2072 -
\??\c:\7lflfrr.exec:\7lflfrr.exe31⤵
- Executes dropped EXE
PID:3064 -
\??\c:\rrlffrr.exec:\rrlffrr.exe32⤵
- Executes dropped EXE
PID:876 -
\??\c:\hhtthn.exec:\hhtthn.exe33⤵
- Executes dropped EXE
PID:2468 -
\??\c:\hthntt.exec:\hthntt.exe34⤵
- Executes dropped EXE
PID:2232 -
\??\c:\dvjjd.exec:\dvjjd.exe35⤵
- Executes dropped EXE
PID:444 -
\??\c:\frflrlx.exec:\frflrlx.exe36⤵
- Executes dropped EXE
PID:1816 -
\??\c:\fxrrffr.exec:\fxrrffr.exe37⤵
- Executes dropped EXE
PID:2220 -
\??\c:\hhthtb.exec:\hhthtb.exe38⤵
- Executes dropped EXE
PID:1588 -
\??\c:\bthnhh.exec:\bthnhh.exe39⤵
- Executes dropped EXE
PID:2992 -
\??\c:\ddjpd.exec:\ddjpd.exe40⤵
- Executes dropped EXE
PID:2788 -
\??\c:\djpdd.exec:\djpdd.exe41⤵
- Executes dropped EXE
PID:2716 -
\??\c:\xlxxflr.exec:\xlxxflr.exe42⤵
- Executes dropped EXE
PID:2720 -
\??\c:\rfrlrxf.exec:\rfrlrxf.exe43⤵
- Executes dropped EXE
PID:3048 -
\??\c:\hbhntb.exec:\hbhntb.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2744 -
\??\c:\btttbb.exec:\btttbb.exe45⤵
- Executes dropped EXE
PID:2528 -
\??\c:\dvjpd.exec:\dvjpd.exe46⤵
- Executes dropped EXE
PID:2864 -
\??\c:\vjppp.exec:\vjppp.exe47⤵
- Executes dropped EXE
PID:2560 -
\??\c:\xrxflfl.exec:\xrxflfl.exe48⤵
- Executes dropped EXE
PID:2672 -
\??\c:\xrrrxxf.exec:\xrrrxxf.exe49⤵
- Executes dropped EXE
PID:1796 -
\??\c:\tntbnt.exec:\tntbnt.exe50⤵
- Executes dropped EXE
PID:1632 -
\??\c:\nbhhnt.exec:\nbhhnt.exe51⤵
- Executes dropped EXE
PID:1984 -
\??\c:\5ppdj.exec:\5ppdj.exe52⤵
- Executes dropped EXE
PID:2808 -
\??\c:\dvjjd.exec:\dvjjd.exe53⤵
- Executes dropped EXE
PID:1876 -
\??\c:\1lrxxfl.exec:\1lrxxfl.exe54⤵
- Executes dropped EXE
PID:1776 -
\??\c:\ffrxrrx.exec:\ffrxrrx.exe55⤵
- Executes dropped EXE
PID:1336 -
\??\c:\hbbhnt.exec:\hbbhnt.exe56⤵
- Executes dropped EXE
PID:2564 -
\??\c:\dvddp.exec:\dvddp.exe57⤵
- Executes dropped EXE
PID:2040 -
\??\c:\5pdjv.exec:\5pdjv.exe58⤵
- Executes dropped EXE
PID:1016 -
\??\c:\xlrrlrf.exec:\xlrrlrf.exe59⤵
- Executes dropped EXE
PID:2872 -
\??\c:\xrlrxrl.exec:\xrlrxrl.exe60⤵
- Executes dropped EXE
PID:648 -
\??\c:\btbntb.exec:\btbntb.exe61⤵
- Executes dropped EXE
PID:2304 -
\??\c:\tbhtth.exec:\tbhtth.exe62⤵
- Executes dropped EXE
PID:2836 -
\??\c:\lfxlflr.exec:\lfxlflr.exe63⤵
- Executes dropped EXE
PID:2156 -
\??\c:\3rxlrrf.exec:\3rxlrrf.exe64⤵
- Executes dropped EXE
PID:996 -
\??\c:\nhhttt.exec:\nhhttt.exe65⤵
- Executes dropped EXE
PID:1684 -
\??\c:\9hthbh.exec:\9hthbh.exe66⤵PID:560
-
\??\c:\jdjvp.exec:\jdjvp.exe67⤵PID:880
-
\??\c:\jpdvd.exec:\jpdvd.exe68⤵PID:1780
-
\??\c:\3lfxlxl.exec:\3lfxlxl.exe69⤵PID:1036
-
\??\c:\9rrflrr.exec:\9rrflrr.exe70⤵PID:2072
-
\??\c:\thbhtt.exec:\thbhtt.exe71⤵PID:1272
-
\??\c:\hbthht.exec:\hbthht.exe72⤵PID:2256
-
\??\c:\jddpp.exec:\jddpp.exe73⤵PID:2584
-
\??\c:\dvpvd.exec:\dvpvd.exe74⤵PID:2260
-
\??\c:\xrlrrxr.exec:\xrlrrxr.exe75⤵
- System Location Discovery: System Language Discovery
PID:2436 -
\??\c:\1rfflxl.exec:\1rfflxl.exe76⤵PID:2932
-
\??\c:\9nbtnh.exec:\9nbtnh.exe77⤵PID:2456
-
\??\c:\7thnhh.exec:\7thnhh.exe78⤵PID:1740
-
\??\c:\jppvd.exec:\jppvd.exe79⤵PID:1968
-
\??\c:\dvvjv.exec:\dvvjv.exe80⤵PID:2984
-
\??\c:\llxfllx.exec:\llxfllx.exe81⤵PID:2308
-
\??\c:\9ffxlxl.exec:\9ffxlxl.exe82⤵PID:2752
-
\??\c:\bhhttt.exec:\bhhttt.exe83⤵PID:2628
-
\??\c:\3bbtnt.exec:\3bbtnt.exe84⤵PID:2796
-
\??\c:\3dddj.exec:\3dddj.exe85⤵PID:2780
-
\??\c:\ddpvd.exec:\ddpvd.exe86⤵PID:2508
-
\??\c:\fxflrxl.exec:\fxflrxl.exe87⤵PID:2012
-
\??\c:\7xlrfrf.exec:\7xlrfrf.exe88⤵PID:2580
-
\??\c:\btntbh.exec:\btntbh.exe89⤵PID:2412
-
\??\c:\9tttnb.exec:\9tttnb.exe90⤵PID:2804
-
\??\c:\jdjpv.exec:\jdjpv.exe91⤵PID:1460
-
\??\c:\fffxlxr.exec:\fffxlxr.exe92⤵PID:1072
-
\??\c:\lfrrffl.exec:\lfrrffl.exe93⤵PID:980
-
\??\c:\nbtbth.exec:\nbtbth.exe94⤵PID:2036
-
\??\c:\tttnbn.exec:\tttnbn.exe95⤵PID:2768
-
\??\c:\1jpdp.exec:\1jpdp.exe96⤵PID:900
-
\??\c:\ddvjd.exec:\ddvjd.exe97⤵PID:1496
-
\??\c:\3xflrfl.exec:\3xflrfl.exe98⤵PID:1000
-
\??\c:\1ffrlxl.exec:\1ffrlxl.exe99⤵PID:2944
-
\??\c:\nnhtth.exec:\nnhtth.exe100⤵PID:2544
-
\??\c:\3hhtbh.exec:\3hhtbh.exe101⤵PID:2064
-
\??\c:\3dvjv.exec:\3dvjv.exe102⤵PID:2164
-
\??\c:\5dvjp.exec:\5dvjp.exe103⤵PID:2908
-
\??\c:\lllrfrf.exec:\lllrfrf.exe104⤵PID:2484
-
\??\c:\llrfrlf.exec:\llrfrlf.exe105⤵PID:1288
-
\??\c:\nhthbb.exec:\nhthbb.exe106⤵PID:928
-
\??\c:\1tnthh.exec:\1tnthh.exe107⤵PID:2296
-
\??\c:\dvpdp.exec:\dvpdp.exe108⤵PID:2916
-
\??\c:\pvvpd.exec:\pvvpd.exe109⤵PID:2292
-
\??\c:\lfffrfl.exec:\lfffrfl.exe110⤵PID:888
-
\??\c:\xxxrlxl.exec:\xxxrlxl.exe111⤵PID:2380
-
\??\c:\nnbbhh.exec:\nnbbhh.exe112⤵PID:2432
-
\??\c:\nhnhbh.exec:\nhnhbh.exe113⤵PID:1296
-
\??\c:\ddjpj.exec:\ddjpj.exe114⤵PID:2340
-
\??\c:\dvvjd.exec:\dvvjd.exe115⤵PID:3004
-
\??\c:\pjpjj.exec:\pjpjj.exe116⤵PID:2996
-
\??\c:\1xxfrrf.exec:\1xxfrrf.exe117⤵PID:1688
-
\??\c:\7ffrxfx.exec:\7ffrxfx.exe118⤵PID:2876
-
\??\c:\hbnttn.exec:\hbnttn.exe119⤵PID:2948
-
\??\c:\jdjdj.exec:\jdjdj.exe120⤵PID:2712
-
\??\c:\jjdpd.exec:\jjdpd.exe121⤵PID:2632
-
\??\c:\dvvvd.exec:\dvvvd.exe122⤵PID:2512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-