Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 06:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe
-
Size
64KB
-
MD5
4c195614474608945b8670dd65438890
-
SHA1
c5586d904660809bddae1dc2f49f3daf9b1810f5
-
SHA256
31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4a
-
SHA512
c70322bc2478c2fde29002fb03c053e233316dae4ec182b88fa6f4ae79d54f9787536cc0dd8cc7dff937300daf1707c083827c0946c5e08ae18245cc9cef5f94
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27B12:ymb3NkkiQ3mdBjFI9cg
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2096-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/856-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2016-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2556-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/992-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1944-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1464-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1916-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1496-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1876-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2096 9dvpp.exe 2016 jjpvp.exe 2416 9nhthb.exe 2672 thbthb.exe 2700 rlflxfr.exe 2704 tnbhnt.exe 2680 nntthn.exe 2556 vpddv.exe 2596 xxrxlxl.exe 992 tbthhn.exe 2644 tnhhth.exe 1944 jdpvd.exe 1940 rlfflrf.exe 2864 3llrxxl.exe 1464 1htthn.exe 1916 nbnthb.exe 2720 jjdvp.exe 2424 lfflxxl.exe 2116 rrrxllx.exe 968 ntntnb.exe 868 hhbntb.exe 964 jjvdp.exe 1740 xxlxrxr.exe 1516 fxlrflr.exe 2976 bthbtb.exe 2240 nbnntb.exe 1496 jjdvd.exe 1876 xxrxrfr.exe 2072 lxrlrfr.exe 2900 hhbbnb.exe 1580 tnthhh.exe 2460 jvjvd.exe 1976 lffrfrl.exe 2796 5fxlxfx.exe 2808 tnhtbh.exe 2748 nhhntt.exe 2272 5jddp.exe 2572 dvppd.exe 2716 3fxlrlx.exe 2544 lfrrffl.exe 2620 tnhthn.exe 3064 1nhhtb.exe 1684 vjddv.exe 2852 vdvdp.exe 2728 lfrrxxl.exe 2840 tthnbh.exe 876 nhbbhb.exe 2612 vpjpj.exe 1692 ddvdd.exe 2904 vdpdp.exe 2908 9ffxfll.exe 1460 ththbh.exe 2164 nnbbnt.exe 2456 vjpdd.exe 2148 pdvdd.exe 2116 1rrxrfl.exe 968 lfrlxxl.exe 1400 nhnthn.exe 1592 1hbhnn.exe 2052 ppddd.exe 2504 jjjpd.exe 1680 xxlxffr.exe 2204 7rlrxxl.exe 2188 hhbhhn.exe -
resource yara_rule behavioral1/memory/2096-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2016-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/856-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2016-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2016-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/992-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1464-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1876-283-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrllxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thntnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5htthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 2096 856 31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe 31 PID 856 wrote to memory of 2096 856 31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe 31 PID 856 wrote to memory of 2096 856 31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe 31 PID 856 wrote to memory of 2096 856 31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe 31 PID 2096 wrote to memory of 2016 2096 9dvpp.exe 32 PID 2096 wrote to memory of 2016 2096 9dvpp.exe 32 PID 2096 wrote to memory of 2016 2096 9dvpp.exe 32 PID 2096 wrote to memory of 2016 2096 9dvpp.exe 32 PID 2016 wrote to memory of 2416 2016 jjpvp.exe 33 PID 2016 wrote to memory of 2416 2016 jjpvp.exe 33 PID 2016 wrote to memory of 2416 2016 jjpvp.exe 33 PID 2016 wrote to memory of 2416 2016 jjpvp.exe 33 PID 2416 wrote to memory of 2672 2416 9nhthb.exe 34 PID 2416 wrote to memory of 2672 2416 9nhthb.exe 34 PID 2416 wrote to memory of 2672 2416 9nhthb.exe 34 PID 2416 wrote to memory of 2672 2416 9nhthb.exe 34 PID 2672 wrote to memory of 2700 2672 thbthb.exe 35 PID 2672 wrote to memory of 2700 2672 thbthb.exe 35 PID 2672 wrote to memory of 2700 2672 thbthb.exe 35 PID 2672 wrote to memory of 2700 2672 thbthb.exe 35 PID 2700 wrote to memory of 2704 2700 rlflxfr.exe 36 PID 2700 wrote to memory of 2704 2700 rlflxfr.exe 36 PID 2700 wrote to memory of 2704 2700 rlflxfr.exe 36 PID 2700 wrote to memory of 2704 2700 rlflxfr.exe 36 PID 2704 wrote to memory of 2680 2704 tnbhnt.exe 37 PID 2704 wrote to memory of 2680 2704 tnbhnt.exe 37 PID 2704 wrote to memory of 2680 2704 tnbhnt.exe 37 PID 2704 wrote to memory of 2680 2704 tnbhnt.exe 37 PID 2680 wrote to memory of 2556 2680 nntthn.exe 38 PID 2680 wrote to memory of 2556 2680 nntthn.exe 38 PID 2680 wrote to memory of 2556 2680 nntthn.exe 38 PID 2680 wrote to memory of 2556 2680 nntthn.exe 38 PID 2556 wrote to memory of 2596 2556 vpddv.exe 39 PID 2556 wrote to memory of 2596 2556 vpddv.exe 39 PID 2556 wrote to memory of 2596 2556 vpddv.exe 39 PID 2556 wrote to memory of 2596 2556 vpddv.exe 39 PID 2596 wrote to memory of 992 2596 xxrxlxl.exe 40 PID 2596 wrote to memory of 992 2596 xxrxlxl.exe 40 PID 2596 wrote to memory of 992 2596 xxrxlxl.exe 40 PID 2596 wrote to memory of 992 2596 xxrxlxl.exe 40 PID 992 wrote to memory of 2644 992 tbthhn.exe 41 PID 992 wrote to memory of 2644 992 tbthhn.exe 41 PID 992 wrote to memory of 2644 992 tbthhn.exe 41 PID 992 wrote to memory of 2644 992 tbthhn.exe 41 PID 2644 wrote to memory of 1944 2644 tnhhth.exe 42 PID 2644 wrote to memory of 1944 2644 tnhhth.exe 42 PID 2644 wrote to memory of 1944 2644 tnhhth.exe 42 PID 2644 wrote to memory of 1944 2644 tnhhth.exe 42 PID 1944 wrote to memory of 1940 1944 jdpvd.exe 43 PID 1944 wrote to memory of 1940 1944 jdpvd.exe 43 PID 1944 wrote to memory of 1940 1944 jdpvd.exe 43 PID 1944 wrote to memory of 1940 1944 jdpvd.exe 43 PID 1940 wrote to memory of 2864 1940 rlfflrf.exe 44 PID 1940 wrote to memory of 2864 1940 rlfflrf.exe 44 PID 1940 wrote to memory of 2864 1940 rlfflrf.exe 44 PID 1940 wrote to memory of 2864 1940 rlfflrf.exe 44 PID 2864 wrote to memory of 1464 2864 3llrxxl.exe 45 PID 2864 wrote to memory of 1464 2864 3llrxxl.exe 45 PID 2864 wrote to memory of 1464 2864 3llrxxl.exe 45 PID 2864 wrote to memory of 1464 2864 3llrxxl.exe 45 PID 1464 wrote to memory of 1916 1464 1htthn.exe 46 PID 1464 wrote to memory of 1916 1464 1htthn.exe 46 PID 1464 wrote to memory of 1916 1464 1htthn.exe 46 PID 1464 wrote to memory of 1916 1464 1htthn.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe"C:\Users\Admin\AppData\Local\Temp\31f6cf22a0a9a8fce9a6cc85af4852c2eb22935f50adb02a4c64773611984c4aN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\9dvpp.exec:\9dvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\jjpvp.exec:\jjpvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\9nhthb.exec:\9nhthb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\thbthb.exec:\thbthb.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\rlflxfr.exec:\rlflxfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\tnbhnt.exec:\tnbhnt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\nntthn.exec:\nntthn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\vpddv.exec:\vpddv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\xxrxlxl.exec:\xxrxlxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\tbthhn.exec:\tbthhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
\??\c:\tnhhth.exec:\tnhhth.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\jdpvd.exec:\jdpvd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\rlfflrf.exec:\rlfflrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\3llrxxl.exec:\3llrxxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\1htthn.exec:\1htthn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\nbnthb.exec:\nbnthb.exe17⤵
- Executes dropped EXE
PID:1916 -
\??\c:\jjdvp.exec:\jjdvp.exe18⤵
- Executes dropped EXE
PID:2720 -
\??\c:\lfflxxl.exec:\lfflxxl.exe19⤵
- Executes dropped EXE
PID:2424 -
\??\c:\rrrxllx.exec:\rrrxllx.exe20⤵
- Executes dropped EXE
PID:2116 -
\??\c:\ntntnb.exec:\ntntnb.exe21⤵
- Executes dropped EXE
PID:968 -
\??\c:\hhbntb.exec:\hhbntb.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868 -
\??\c:\jjvdp.exec:\jjvdp.exe23⤵
- Executes dropped EXE
PID:964 -
\??\c:\xxlxrxr.exec:\xxlxrxr.exe24⤵
- Executes dropped EXE
PID:1740 -
\??\c:\fxlrflr.exec:\fxlrflr.exe25⤵
- Executes dropped EXE
PID:1516 -
\??\c:\bthbtb.exec:\bthbtb.exe26⤵
- Executes dropped EXE
PID:2976 -
\??\c:\nbnntb.exec:\nbnntb.exe27⤵
- Executes dropped EXE
PID:2240 -
\??\c:\jjdvd.exec:\jjdvd.exe28⤵
- Executes dropped EXE
PID:1496 -
\??\c:\xxrxrfr.exec:\xxrxrfr.exe29⤵
- Executes dropped EXE
PID:1876 -
\??\c:\lxrlrfr.exec:\lxrlrfr.exe30⤵
- Executes dropped EXE
PID:2072 -
\??\c:\hhbbnb.exec:\hhbbnb.exe31⤵
- Executes dropped EXE
PID:2900 -
\??\c:\tnthhh.exec:\tnthhh.exe32⤵
- Executes dropped EXE
PID:1580 -
\??\c:\jvjvd.exec:\jvjvd.exe33⤵
- Executes dropped EXE
PID:2460 -
\??\c:\lffrfrl.exec:\lffrfrl.exe34⤵
- Executes dropped EXE
PID:1976 -
\??\c:\5fxlxfx.exec:\5fxlxfx.exe35⤵
- Executes dropped EXE
PID:2796 -
\??\c:\tnhtbh.exec:\tnhtbh.exe36⤵
- Executes dropped EXE
PID:2808 -
\??\c:\nhhntt.exec:\nhhntt.exe37⤵
- Executes dropped EXE
PID:2748 -
\??\c:\5jddp.exec:\5jddp.exe38⤵
- Executes dropped EXE
PID:2272 -
\??\c:\dvppd.exec:\dvppd.exe39⤵
- Executes dropped EXE
PID:2572 -
\??\c:\3fxlrlx.exec:\3fxlrlx.exe40⤵
- Executes dropped EXE
PID:2716 -
\??\c:\lfrrffl.exec:\lfrrffl.exe41⤵
- Executes dropped EXE
PID:2544 -
\??\c:\tnhthn.exec:\tnhthn.exe42⤵
- Executes dropped EXE
PID:2620 -
\??\c:\1nhhtb.exec:\1nhhtb.exe43⤵
- Executes dropped EXE
PID:3064 -
\??\c:\vjddv.exec:\vjddv.exe44⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vdvdp.exec:\vdvdp.exe45⤵
- Executes dropped EXE
PID:2852 -
\??\c:\lfrrxxl.exec:\lfrrxxl.exe46⤵
- Executes dropped EXE
PID:2728 -
\??\c:\tthnbh.exec:\tthnbh.exe47⤵
- Executes dropped EXE
PID:2840 -
\??\c:\nhbbhb.exec:\nhbbhb.exe48⤵
- Executes dropped EXE
PID:876 -
\??\c:\vpjpj.exec:\vpjpj.exe49⤵
- Executes dropped EXE
PID:2612 -
\??\c:\ddvdd.exec:\ddvdd.exe50⤵
- Executes dropped EXE
PID:1692 -
\??\c:\vdpdp.exec:\vdpdp.exe51⤵
- Executes dropped EXE
PID:2904 -
\??\c:\9ffxfll.exec:\9ffxfll.exe52⤵
- Executes dropped EXE
PID:2908 -
\??\c:\ththbh.exec:\ththbh.exe53⤵
- Executes dropped EXE
PID:1460 -
\??\c:\nnbbnt.exec:\nnbbnt.exe54⤵
- Executes dropped EXE
PID:2164 -
\??\c:\vjpdd.exec:\vjpdd.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456 -
\??\c:\pdvdd.exec:\pdvdd.exe56⤵
- Executes dropped EXE
PID:2148 -
\??\c:\1rrxrfl.exec:\1rrxrfl.exe57⤵
- Executes dropped EXE
PID:2116 -
\??\c:\lfrlxxl.exec:\lfrlxxl.exe58⤵
- Executes dropped EXE
PID:968 -
\??\c:\nhnthn.exec:\nhnthn.exe59⤵
- Executes dropped EXE
PID:1400 -
\??\c:\1hbhnn.exec:\1hbhnn.exe60⤵
- Executes dropped EXE
PID:1592 -
\??\c:\ppddd.exec:\ppddd.exe61⤵
- Executes dropped EXE
PID:2052 -
\??\c:\jjjpd.exec:\jjjpd.exe62⤵
- Executes dropped EXE
PID:2504 -
\??\c:\xxlxffr.exec:\xxlxffr.exe63⤵
- Executes dropped EXE
PID:1680 -
\??\c:\7rlrxxl.exec:\7rlrxxl.exe64⤵
- Executes dropped EXE
PID:2204 -
\??\c:\hhbhhn.exec:\hhbhhn.exe65⤵
- Executes dropped EXE
PID:2188 -
\??\c:\tntnth.exec:\tntnth.exe66⤵PID:1272
-
\??\c:\jvpjp.exec:\jvpjp.exe67⤵PID:1828
-
\??\c:\vpddj.exec:\vpddj.exe68⤵PID:2944
-
\??\c:\lfflxxf.exec:\lfflxxf.exe69⤵PID:2096
-
\??\c:\frllfrx.exec:\frllfrx.exe70⤵PID:1612
-
\??\c:\1nhnbn.exec:\1nhnbn.exe71⤵PID:2144
-
\??\c:\hthhtt.exec:\hthhtt.exe72⤵PID:2280
-
\??\c:\jjvjd.exec:\jjvjd.exe73⤵PID:2136
-
\??\c:\jdvpd.exec:\jdvpd.exe74⤵PID:2016
-
\??\c:\rrxfllr.exec:\rrxfllr.exe75⤵PID:2828
-
\??\c:\5xflxfr.exec:\5xflxfr.exe76⤵PID:2824
-
\??\c:\7btbtb.exec:\7btbtb.exe77⤵PID:2956
-
\??\c:\hhttbb.exec:\hhttbb.exe78⤵PID:2952
-
\??\c:\vpvvj.exec:\vpvvj.exe79⤵PID:2760
-
\??\c:\ppjpv.exec:\ppjpv.exe80⤵PID:2608
-
\??\c:\3xfrrxl.exec:\3xfrrxl.exe81⤵PID:3048
-
\??\c:\fxxllxl.exec:\fxxllxl.exe82⤵PID:2100
-
\??\c:\xllxlxf.exec:\xllxlxf.exe83⤵PID:2596
-
\??\c:\hhbbnn.exec:\hhbbnn.exe84⤵PID:1972
-
\??\c:\nnbbhn.exec:\nnbbhn.exe85⤵PID:2044
-
\??\c:\9pjdd.exec:\9pjdd.exe86⤵PID:2756
-
\??\c:\jdvjp.exec:\jdvjp.exe87⤵PID:1964
-
\??\c:\fflrfrx.exec:\fflrfrx.exe88⤵PID:496
-
\??\c:\fxrrffl.exec:\fxrrffl.exe89⤵PID:1232
-
\??\c:\hbbhbh.exec:\hbbhbh.exe90⤵PID:1644
-
\??\c:\7btbhn.exec:\7btbhn.exe91⤵PID:3036
-
\??\c:\dvddj.exec:\dvddj.exe92⤵PID:2920
-
\??\c:\pjjpv.exec:\pjjpv.exe93⤵PID:2400
-
\??\c:\7lrxxxf.exec:\7lrxxxf.exe94⤵PID:2208
-
\??\c:\lfxxrxf.exec:\lfxxrxf.exe95⤵PID:1252
-
\??\c:\nhhtht.exec:\nhhtht.exe96⤵PID:3040
-
\??\c:\5thhnh.exec:\5thhnh.exe97⤵PID:840
-
\??\c:\5pvdp.exec:\5pvdp.exe98⤵PID:1628
-
\??\c:\pjpvd.exec:\pjpvd.exe99⤵PID:1756
-
\??\c:\frxfrlr.exec:\frxfrlr.exe100⤵PID:912
-
\??\c:\ffxrffx.exec:\ffxrffx.exe101⤵PID:1560
-
\??\c:\xxrfrfl.exec:\xxrfrfl.exe102⤵PID:3012
-
\??\c:\tntthn.exec:\tntthn.exe103⤵PID:2388
-
\??\c:\hbnnnb.exec:\hbnnnb.exe104⤵PID:2196
-
\??\c:\jdpvj.exec:\jdpvj.exe105⤵PID:1012
-
\??\c:\tnhtbh.exec:\tnhtbh.exe106⤵PID:2324
-
\??\c:\vjdjp.exec:\vjdjp.exe107⤵PID:2348
-
\??\c:\dvjpd.exec:\dvjpd.exe108⤵PID:1488
-
\??\c:\9jddv.exec:\9jddv.exe109⤵PID:2464
-
\??\c:\rrfxxxl.exec:\rrfxxxl.exe110⤵PID:2772
-
\??\c:\5rlrrlf.exec:\5rlrrlf.exe111⤵PID:2192
-
\??\c:\tnttnt.exec:\tnttnt.exe112⤵PID:784
-
\??\c:\ttbtnt.exec:\ttbtnt.exe113⤵PID:2812
-
\??\c:\pjpvd.exec:\pjpvd.exe114⤵PID:2688
-
\??\c:\vdjdd.exec:\vdjdd.exe115⤵PID:2676
-
\??\c:\xrlrrxl.exec:\xrlrrxl.exe116⤵PID:2700
-
\??\c:\rrlxlxf.exec:\rrlxlxf.exe117⤵PID:2744
-
\??\c:\3hhnbb.exec:\3hhnbb.exe118⤵PID:2656
-
\??\c:\nhnntn.exec:\nhnntn.exe119⤵
- System Location Discovery: System Language Discovery
PID:2680 -
\??\c:\vvjvj.exec:\vvjvj.exe120⤵PID:2664
-
\??\c:\pjdvd.exec:\pjdvd.exe121⤵PID:3068
-
\??\c:\dvjvj.exec:\dvjvj.exe122⤵PID:2832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-