Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 09:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f8bada5cec555b89b501558e4b1806d0N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
f8bada5cec555b89b501558e4b1806d0N.exe
-
Size
228KB
-
MD5
f8bada5cec555b89b501558e4b1806d0
-
SHA1
0894b6439db785689ac11d354b809fe440d1e642
-
SHA256
5917ef2041dba11a95169a46f3c42bb765914da3d384f1228cdb4cb398075331
-
SHA512
3df56ada561d3e64ddd9a737de69fa5325173e551630b53ba2b4c1ee38bac573f364c4c0cbc9f8cf838785557f484bf98a6941d44312f33bd08bd8b98bad371c
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeGdr:n3C9BRo7MlrWKo+lxK/
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2968-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-30-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2736-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2124-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/848-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1404-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1920-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2916-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2008-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/344-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-293-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2864 jdvpv.exe 2684 lfrxfrf.exe 2752 lxrxfll.exe 2736 tttnnh.exe 2600 xfllrrx.exe 2888 hhtntb.exe 848 dpvpv.exe 2124 7xxxrxr.exe 1852 5xfxxxl.exe 2548 ddpvd.exe 1404 jpvpd.exe 1920 hnhtnb.exe 2440 nbhtnh.exe 2916 dpjpj.exe 776 xllflrf.exe 1892 1ntbhh.exe 2008 pdjvv.exe 344 9rrlrlx.exe 2500 lfflrfl.exe 864 ntbtbn.exe 3016 pjjpv.exe 2464 1fffllf.exe 852 tbhbhn.exe 992 tthnnh.exe 1456 3vpvp.exe 2420 xffxffx.exe 2320 hbhnth.exe 2312 jvdvv.exe 340 xxlrrxf.exe 2652 flrrxlr.exe 2832 tbhbhh.exe 2700 5jpjp.exe 2964 lxfflfl.exe 2940 btnthh.exe 2876 btbtnt.exe 2564 vjvdv.exe 540 lfllxfl.exe 2632 ffxlrfl.exe 1460 tnthth.exe 2912 3tnntt.exe 2332 jdpvd.exe 2124 xrllrxf.exe 300 ffrfxrf.exe 1852 5nhnbh.exe 2548 jjjdp.exe 2424 jjvdj.exe 2448 rxrfxfr.exe 2920 5lffflr.exe 2440 hththt.exe 1076 bnnbbt.exe 552 vvjvp.exe 2400 xllrxxr.exe 1352 ffllxfr.exe 3000 hbbbnt.exe 2228 hbtbht.exe 2172 jjjjd.exe 864 pdppj.exe 956 rlrxffr.exe 2516 fxrxflr.exe 1856 ttbntb.exe 872 jdpvv.exe 1696 7pvpd.exe 2212 rffrrrf.exe 2896 fxrflxl.exe -
resource yara_rule behavioral1/memory/2968-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1404-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2008-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/344-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-293-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xrxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxlxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ppdp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2864 2968 f8bada5cec555b89b501558e4b1806d0N.exe 30 PID 2968 wrote to memory of 2864 2968 f8bada5cec555b89b501558e4b1806d0N.exe 30 PID 2968 wrote to memory of 2864 2968 f8bada5cec555b89b501558e4b1806d0N.exe 30 PID 2968 wrote to memory of 2864 2968 f8bada5cec555b89b501558e4b1806d0N.exe 30 PID 2864 wrote to memory of 2684 2864 jdvpv.exe 31 PID 2864 wrote to memory of 2684 2864 jdvpv.exe 31 PID 2864 wrote to memory of 2684 2864 jdvpv.exe 31 PID 2864 wrote to memory of 2684 2864 jdvpv.exe 31 PID 2684 wrote to memory of 2752 2684 lfrxfrf.exe 32 PID 2684 wrote to memory of 2752 2684 lfrxfrf.exe 32 PID 2684 wrote to memory of 2752 2684 lfrxfrf.exe 32 PID 2684 wrote to memory of 2752 2684 lfrxfrf.exe 32 PID 2752 wrote to memory of 2736 2752 lxrxfll.exe 33 PID 2752 wrote to memory of 2736 2752 lxrxfll.exe 33 PID 2752 wrote to memory of 2736 2752 lxrxfll.exe 33 PID 2752 wrote to memory of 2736 2752 lxrxfll.exe 33 PID 2736 wrote to memory of 2600 2736 tttnnh.exe 34 PID 2736 wrote to memory of 2600 2736 tttnnh.exe 34 PID 2736 wrote to memory of 2600 2736 tttnnh.exe 34 PID 2736 wrote to memory of 2600 2736 tttnnh.exe 34 PID 2600 wrote to memory of 2888 2600 xfllrrx.exe 35 PID 2600 wrote to memory of 2888 2600 xfllrrx.exe 35 PID 2600 wrote to memory of 2888 2600 xfllrrx.exe 35 PID 2600 wrote to memory of 2888 2600 xfllrrx.exe 35 PID 2888 wrote to memory of 848 2888 hhtntb.exe 36 PID 2888 wrote to memory of 848 2888 hhtntb.exe 36 PID 2888 wrote to memory of 848 2888 hhtntb.exe 36 PID 2888 wrote to memory of 848 2888 hhtntb.exe 36 PID 848 wrote to memory of 2124 848 dpvpv.exe 37 PID 848 wrote to memory of 2124 848 dpvpv.exe 37 PID 848 wrote to memory of 2124 848 dpvpv.exe 37 PID 848 wrote to memory of 2124 848 dpvpv.exe 37 PID 2124 wrote to memory of 1852 2124 7xxxrxr.exe 38 PID 2124 wrote to memory of 1852 2124 7xxxrxr.exe 38 PID 2124 wrote to memory of 1852 2124 7xxxrxr.exe 38 PID 2124 wrote to memory of 1852 2124 7xxxrxr.exe 38 PID 1852 wrote to memory of 2548 1852 5xfxxxl.exe 39 PID 1852 wrote to memory of 2548 1852 5xfxxxl.exe 39 PID 1852 wrote to memory of 2548 1852 5xfxxxl.exe 39 PID 1852 wrote to memory of 2548 1852 5xfxxxl.exe 39 PID 2548 wrote to memory of 1404 2548 ddpvd.exe 40 PID 2548 wrote to memory of 1404 2548 ddpvd.exe 40 PID 2548 wrote to memory of 1404 2548 ddpvd.exe 40 PID 2548 wrote to memory of 1404 2548 ddpvd.exe 40 PID 1404 wrote to memory of 1920 1404 jpvpd.exe 41 PID 1404 wrote to memory of 1920 1404 jpvpd.exe 41 PID 1404 wrote to memory of 1920 1404 jpvpd.exe 41 PID 1404 wrote to memory of 1920 1404 jpvpd.exe 41 PID 1920 wrote to memory of 2440 1920 hnhtnb.exe 42 PID 1920 wrote to memory of 2440 1920 hnhtnb.exe 42 PID 1920 wrote to memory of 2440 1920 hnhtnb.exe 42 PID 1920 wrote to memory of 2440 1920 hnhtnb.exe 42 PID 2440 wrote to memory of 2916 2440 nbhtnh.exe 43 PID 2440 wrote to memory of 2916 2440 nbhtnh.exe 43 PID 2440 wrote to memory of 2916 2440 nbhtnh.exe 43 PID 2440 wrote to memory of 2916 2440 nbhtnh.exe 43 PID 2916 wrote to memory of 776 2916 dpjpj.exe 44 PID 2916 wrote to memory of 776 2916 dpjpj.exe 44 PID 2916 wrote to memory of 776 2916 dpjpj.exe 44 PID 2916 wrote to memory of 776 2916 dpjpj.exe 44 PID 776 wrote to memory of 1892 776 xllflrf.exe 45 PID 776 wrote to memory of 1892 776 xllflrf.exe 45 PID 776 wrote to memory of 1892 776 xllflrf.exe 45 PID 776 wrote to memory of 1892 776 xllflrf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8bada5cec555b89b501558e4b1806d0N.exe"C:\Users\Admin\AppData\Local\Temp\f8bada5cec555b89b501558e4b1806d0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\jdvpv.exec:\jdvpv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\lfrxfrf.exec:\lfrxfrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\lxrxfll.exec:\lxrxfll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\tttnnh.exec:\tttnnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\xfllrrx.exec:\xfllrrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\hhtntb.exec:\hhtntb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\dpvpv.exec:\dpvpv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\7xxxrxr.exec:\7xxxrxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\5xfxxxl.exec:\5xfxxxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\ddpvd.exec:\ddpvd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\jpvpd.exec:\jpvpd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\hnhtnb.exec:\hnhtnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\nbhtnh.exec:\nbhtnh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\dpjpj.exec:\dpjpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\xllflrf.exec:\xllflrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\1ntbhh.exec:\1ntbhh.exe17⤵
- Executes dropped EXE
PID:1892 -
\??\c:\pdjvv.exec:\pdjvv.exe18⤵
- Executes dropped EXE
PID:2008 -
\??\c:\9rrlrlx.exec:\9rrlrlx.exe19⤵
- Executes dropped EXE
PID:344 -
\??\c:\lfflrfl.exec:\lfflrfl.exe20⤵
- Executes dropped EXE
PID:2500 -
\??\c:\ntbtbn.exec:\ntbtbn.exe21⤵
- Executes dropped EXE
PID:864 -
\??\c:\pjjpv.exec:\pjjpv.exe22⤵
- Executes dropped EXE
PID:3016 -
\??\c:\1fffllf.exec:\1fffllf.exe23⤵
- Executes dropped EXE
PID:2464 -
\??\c:\tbhbhn.exec:\tbhbhn.exe24⤵
- Executes dropped EXE
PID:852 -
\??\c:\tthnnh.exec:\tthnnh.exe25⤵
- Executes dropped EXE
PID:992 -
\??\c:\3vpvp.exec:\3vpvp.exe26⤵
- Executes dropped EXE
PID:1456 -
\??\c:\xffxffx.exec:\xffxffx.exe27⤵
- Executes dropped EXE
PID:2420 -
\??\c:\hbhnth.exec:\hbhnth.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
\??\c:\jvdvv.exec:\jvdvv.exe29⤵
- Executes dropped EXE
PID:2312 -
\??\c:\xxlrrxf.exec:\xxlrrxf.exe30⤵
- Executes dropped EXE
PID:340 -
\??\c:\flrrxlr.exec:\flrrxlr.exe31⤵
- Executes dropped EXE
PID:2652 -
\??\c:\tbhbhh.exec:\tbhbhh.exe32⤵
- Executes dropped EXE
PID:2832 -
\??\c:\5jpjp.exec:\5jpjp.exe33⤵
- Executes dropped EXE
PID:2700 -
\??\c:\lxfflfl.exec:\lxfflfl.exe34⤵
- Executes dropped EXE
PID:2964 -
\??\c:\btnthh.exec:\btnthh.exe35⤵
- Executes dropped EXE
PID:2940 -
\??\c:\btbtnt.exec:\btbtnt.exe36⤵
- Executes dropped EXE
PID:2876 -
\??\c:\vjvdv.exec:\vjvdv.exe37⤵
- Executes dropped EXE
PID:2564 -
\??\c:\lfllxfl.exec:\lfllxfl.exe38⤵
- Executes dropped EXE
PID:540 -
\??\c:\ffxlrfl.exec:\ffxlrfl.exe39⤵
- Executes dropped EXE
PID:2632 -
\??\c:\tnthth.exec:\tnthth.exe40⤵
- Executes dropped EXE
PID:1460 -
\??\c:\3tnntt.exec:\3tnntt.exe41⤵
- Executes dropped EXE
PID:2912 -
\??\c:\jdpvd.exec:\jdpvd.exe42⤵
- Executes dropped EXE
PID:2332 -
\??\c:\xrllrxf.exec:\xrllrxf.exe43⤵
- Executes dropped EXE
PID:2124 -
\??\c:\ffrfxrf.exec:\ffrfxrf.exe44⤵
- Executes dropped EXE
PID:300 -
\??\c:\5nhnbh.exec:\5nhnbh.exe45⤵
- Executes dropped EXE
PID:1852 -
\??\c:\jjjdp.exec:\jjjdp.exe46⤵
- Executes dropped EXE
PID:2548 -
\??\c:\jjvdj.exec:\jjvdj.exe47⤵
- Executes dropped EXE
PID:2424 -
\??\c:\rxrfxfr.exec:\rxrfxfr.exe48⤵
- Executes dropped EXE
PID:2448 -
\??\c:\5lffflr.exec:\5lffflr.exe49⤵
- Executes dropped EXE
PID:2920 -
\??\c:\hththt.exec:\hththt.exe50⤵
- Executes dropped EXE
PID:2440 -
\??\c:\bnnbbt.exec:\bnnbbt.exe51⤵
- Executes dropped EXE
PID:1076 -
\??\c:\vvjvp.exec:\vvjvp.exe52⤵
- Executes dropped EXE
PID:552 -
\??\c:\xllrxxr.exec:\xllrxxr.exe53⤵
- Executes dropped EXE
PID:2400 -
\??\c:\ffllxfr.exec:\ffllxfr.exe54⤵
- Executes dropped EXE
PID:1352 -
\??\c:\hbbbnt.exec:\hbbbnt.exe55⤵
- Executes dropped EXE
PID:3000 -
\??\c:\hbtbht.exec:\hbtbht.exe56⤵
- Executes dropped EXE
PID:2228 -
\??\c:\jjjjd.exec:\jjjjd.exe57⤵
- Executes dropped EXE
PID:2172 -
\??\c:\pdppj.exec:\pdppj.exe58⤵
- Executes dropped EXE
PID:864 -
\??\c:\rlrxffr.exec:\rlrxffr.exe59⤵
- Executes dropped EXE
PID:956 -
\??\c:\fxrxflr.exec:\fxrxflr.exe60⤵
- Executes dropped EXE
PID:2516 -
\??\c:\ttbntb.exec:\ttbntb.exe61⤵
- Executes dropped EXE
PID:1856 -
\??\c:\jdpvv.exec:\jdpvv.exe62⤵
- Executes dropped EXE
PID:872 -
\??\c:\7pvpd.exec:\7pvpd.exe63⤵
- Executes dropped EXE
PID:1696 -
\??\c:\rffrrrf.exec:\rffrrrf.exe64⤵
- Executes dropped EXE
PID:2212 -
\??\c:\fxrflxl.exec:\fxrflxl.exe65⤵
- Executes dropped EXE
PID:2896 -
\??\c:\bhbntt.exec:\bhbntt.exe66⤵PID:3012
-
\??\c:\tbbnbn.exec:\tbbnbn.exe67⤵PID:2320
-
\??\c:\vpvpv.exec:\vpvpv.exe68⤵PID:844
-
\??\c:\pjvjv.exec:\pjvjv.exe69⤵PID:1924
-
\??\c:\lxlrxll.exec:\lxlrxll.exe70⤵PID:2968
-
\??\c:\5tnhth.exec:\5tnhth.exe71⤵PID:2144
-
\??\c:\nnhhtb.exec:\nnhhtb.exe72⤵PID:2756
-
\??\c:\djpdv.exec:\djpdv.exe73⤵PID:2700
-
\??\c:\jdpvv.exec:\jdpvv.exe74⤵PID:1556
-
\??\c:\llxxxxr.exec:\llxxxxr.exe75⤵PID:2740
-
\??\c:\9nbhth.exec:\9nbhth.exe76⤵PID:2616
-
\??\c:\htbtnb.exec:\htbtnb.exe77⤵PID:2572
-
\??\c:\pdvvj.exec:\pdvvj.exe78⤵PID:3048
-
\??\c:\jddjv.exec:\jddjv.exe79⤵PID:2600
-
\??\c:\1frxrfr.exec:\1frxrfr.exe80⤵PID:2224
-
\??\c:\9hnttb.exec:\9hnttb.exe81⤵PID:848
-
\??\c:\hbtntt.exec:\hbtntt.exe82⤵PID:1096
-
\??\c:\djdjd.exec:\djdjd.exe83⤵PID:1240
-
\??\c:\pvdpv.exec:\pvdpv.exe84⤵PID:1664
-
\??\c:\xrxflxl.exec:\xrxflxl.exe85⤵PID:1956
-
\??\c:\xlrxlrf.exec:\xlrxlrf.exe86⤵PID:2296
-
\??\c:\tttnhn.exec:\tttnhn.exe87⤵PID:1920
-
\??\c:\nnhtbn.exec:\nnhtbn.exe88⤵PID:2668
-
\??\c:\jdpvp.exec:\jdpvp.exe89⤵PID:1580
-
\??\c:\xrfflrx.exec:\xrfflrx.exe90⤵PID:944
-
\??\c:\xxrfxxf.exec:\xxrfxxf.exe91⤵PID:692
-
\??\c:\nhtbhn.exec:\nhtbhn.exe92⤵PID:2072
-
\??\c:\ppddd.exec:\ppddd.exe93⤵PID:1892
-
\??\c:\dvppd.exec:\dvppd.exe94⤵PID:2972
-
\??\c:\xrxxxxr.exec:\xrxxxxr.exe95⤵PID:1832
-
\??\c:\xxflxxf.exec:\xxflxxf.exe96⤵PID:2244
-
\??\c:\nbhntb.exec:\nbhntb.exe97⤵PID:2512
-
\??\c:\9bttbb.exec:\9bttbb.exe98⤵PID:1300
-
\??\c:\9jpjd.exec:\9jpjd.exe99⤵PID:1308
-
\??\c:\rlxflff.exec:\rlxflff.exe100⤵PID:1616
-
\??\c:\lfllflr.exec:\lfllflr.exe101⤵PID:2540
-
\??\c:\nhntbn.exec:\nhntbn.exe102⤵PID:852
-
\??\c:\5bhhhn.exec:\5bhhhn.exe103⤵PID:1256
-
\??\c:\dpvjp.exec:\dpvjp.exe104⤵PID:1020
-
\??\c:\pjjvd.exec:\pjjvd.exe105⤵PID:2044
-
\??\c:\lrxrrll.exec:\lrxrrll.exe106⤵PID:2404
-
\??\c:\hbbnbn.exec:\hbbnbn.exe107⤵PID:3056
-
\??\c:\hnnnbt.exec:\hnnnbt.exe108⤵PID:556
-
\??\c:\jdddp.exec:\jdddp.exe109⤵PID:2648
-
\??\c:\3jddj.exec:\3jddj.exe110⤵PID:2652
-
\??\c:\5lxxllr.exec:\5lxxllr.exe111⤵PID:2864
-
\??\c:\tnbhnt.exec:\tnbhnt.exe112⤵PID:2324
-
\??\c:\hhhtnb.exec:\hhhtnb.exe113⤵PID:764
-
\??\c:\1jvdj.exec:\1jvdj.exe114⤵PID:2680
-
\??\c:\jdpdv.exec:\jdpdv.exe115⤵PID:2704
-
\??\c:\xrlxffr.exec:\xrlxffr.exe116⤵PID:2736
-
\??\c:\nhhhhn.exec:\nhhhhn.exe117⤵PID:3040
-
\??\c:\nhhnbb.exec:\nhhnbb.exe118⤵
- System Location Discovery: System Language Discovery
PID:3052 -
\??\c:\5vjjp.exec:\5vjjp.exe119⤵PID:1636
-
\??\c:\9ddpp.exec:\9ddpp.exe120⤵PID:2236
-
\??\c:\lfrflxx.exec:\lfrflxx.exe121⤵PID:1992
-
\??\c:\fxrxffl.exec:\fxrxffl.exe122⤵PID:1056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-