Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 08:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe
-
Size
64KB
-
MD5
0e27ecbb18e0117535d284707d2aa900
-
SHA1
cc14e4ec60ca0d8f0cd29398af98a2de9d60b0ca
-
SHA256
5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4
-
SHA512
b3844cd879bd1e9500128534a93a44605a1de6ecfc67cd273654983a507b7fac2cb2be131f26d086c6ffc59ef66771367413b6e698b77817a2af6afb34be84ba
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27i:ymb3NkkiQ3mdBjFI9t
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2668-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2704-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1276-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/588-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2116-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/328-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1616-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1244-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1948-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2704 tnthbh.exe 2824 7vvpv.exe 2228 9jvpv.exe 2764 pdppd.exe 1296 lxxlffr.exe 2648 ttbbbt.exe 2404 pdjjp.exe 2908 lxrrxxr.exe 1276 bthtbn.exe 1648 bnnnnh.exe 2968 jdvjj.exe 2616 jvdjp.exe 2928 frxxxxl.exe 2280 7lxxlff.exe 1392 bbthth.exe 2096 5hbbhh.exe 588 vpvvj.exe 2216 7rlrrxl.exe 1928 rfrfflx.exe 1588 nttbth.exe 2116 9nnnnt.exe 1408 jjjpd.exe 328 xxlllll.exe 1616 fxxlxrl.exe 1664 hbnttt.exe 1244 hhnnbb.exe 2492 jvjdj.exe 2080 rlflxlr.exe 1948 lfxffff.exe 2440 nbtthn.exe 2972 jdjjv.exe 2780 1lflrxr.exe 2840 fxlrfxr.exe 3052 bbnbnb.exe 1608 btnhnb.exe 2576 dvpvj.exe 2740 pdvvv.exe 2820 rrxrrrf.exe 2620 rrrxfxf.exe 1580 9hbhnt.exe 2524 nhttbb.exe 1492 pjdjv.exe 2452 rlrxxfl.exe 2988 xxxxflx.exe 2556 btbhtt.exe 2868 nnnthh.exe 2892 vppdd.exe 2928 ppvjv.exe 1748 lfxrxff.exe 2912 xrxfllf.exe 560 hthnnh.exe 608 tntbnt.exe 2104 jjjpd.exe 2384 ddvdp.exe 1980 lxfxfxl.exe 2344 fffrfxl.exe 2264 hbnhnn.exe 960 nnnbht.exe 280 vjvvv.exe 2316 jdvvp.exe 1876 ffxxlxl.exe 1732 lfrxffx.exe 2460 rlflrrx.exe 1020 hthbhh.exe -
resource yara_rule behavioral1/memory/2668-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1276-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/588-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2116-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/328-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1616-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1244-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1948-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lrxffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2704 2668 5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe 30 PID 2668 wrote to memory of 2704 2668 5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe 30 PID 2668 wrote to memory of 2704 2668 5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe 30 PID 2668 wrote to memory of 2704 2668 5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe 30 PID 2704 wrote to memory of 2824 2704 tnthbh.exe 31 PID 2704 wrote to memory of 2824 2704 tnthbh.exe 31 PID 2704 wrote to memory of 2824 2704 tnthbh.exe 31 PID 2704 wrote to memory of 2824 2704 tnthbh.exe 31 PID 2824 wrote to memory of 2228 2824 7vvpv.exe 32 PID 2824 wrote to memory of 2228 2824 7vvpv.exe 32 PID 2824 wrote to memory of 2228 2824 7vvpv.exe 32 PID 2824 wrote to memory of 2228 2824 7vvpv.exe 32 PID 2228 wrote to memory of 2764 2228 9jvpv.exe 33 PID 2228 wrote to memory of 2764 2228 9jvpv.exe 33 PID 2228 wrote to memory of 2764 2228 9jvpv.exe 33 PID 2228 wrote to memory of 2764 2228 9jvpv.exe 33 PID 2764 wrote to memory of 1296 2764 pdppd.exe 34 PID 2764 wrote to memory of 1296 2764 pdppd.exe 34 PID 2764 wrote to memory of 1296 2764 pdppd.exe 34 PID 2764 wrote to memory of 1296 2764 pdppd.exe 34 PID 1296 wrote to memory of 2648 1296 lxxlffr.exe 35 PID 1296 wrote to memory of 2648 1296 lxxlffr.exe 35 PID 1296 wrote to memory of 2648 1296 lxxlffr.exe 35 PID 1296 wrote to memory of 2648 1296 lxxlffr.exe 35 PID 2648 wrote to memory of 2404 2648 ttbbbt.exe 36 PID 2648 wrote to memory of 2404 2648 ttbbbt.exe 36 PID 2648 wrote to memory of 2404 2648 ttbbbt.exe 36 PID 2648 wrote to memory of 2404 2648 ttbbbt.exe 36 PID 2404 wrote to memory of 2908 2404 pdjjp.exe 37 PID 2404 wrote to memory of 2908 2404 pdjjp.exe 37 PID 2404 wrote to memory of 2908 2404 pdjjp.exe 37 PID 2404 wrote to memory of 2908 2404 pdjjp.exe 37 PID 2908 wrote to memory of 1276 2908 lxrrxxr.exe 38 PID 2908 wrote to memory of 1276 2908 lxrrxxr.exe 38 PID 2908 wrote to memory of 1276 2908 lxrrxxr.exe 38 PID 2908 wrote to memory of 1276 2908 lxrrxxr.exe 38 PID 1276 wrote to memory of 1648 1276 bthtbn.exe 39 PID 1276 wrote to memory of 1648 1276 bthtbn.exe 39 PID 1276 wrote to memory of 1648 1276 bthtbn.exe 39 PID 1276 wrote to memory of 1648 1276 bthtbn.exe 39 PID 1648 wrote to memory of 2968 1648 bnnnnh.exe 40 PID 1648 wrote to memory of 2968 1648 bnnnnh.exe 40 PID 1648 wrote to memory of 2968 1648 bnnnnh.exe 40 PID 1648 wrote to memory of 2968 1648 bnnnnh.exe 40 PID 2968 wrote to memory of 2616 2968 jdvjj.exe 41 PID 2968 wrote to memory of 2616 2968 jdvjj.exe 41 PID 2968 wrote to memory of 2616 2968 jdvjj.exe 41 PID 2968 wrote to memory of 2616 2968 jdvjj.exe 41 PID 2616 wrote to memory of 2928 2616 jvdjp.exe 42 PID 2616 wrote to memory of 2928 2616 jvdjp.exe 42 PID 2616 wrote to memory of 2928 2616 jvdjp.exe 42 PID 2616 wrote to memory of 2928 2616 jvdjp.exe 42 PID 2928 wrote to memory of 2280 2928 frxxxxl.exe 43 PID 2928 wrote to memory of 2280 2928 frxxxxl.exe 43 PID 2928 wrote to memory of 2280 2928 frxxxxl.exe 43 PID 2928 wrote to memory of 2280 2928 frxxxxl.exe 43 PID 2280 wrote to memory of 1392 2280 7lxxlff.exe 44 PID 2280 wrote to memory of 1392 2280 7lxxlff.exe 44 PID 2280 wrote to memory of 1392 2280 7lxxlff.exe 44 PID 2280 wrote to memory of 1392 2280 7lxxlff.exe 44 PID 1392 wrote to memory of 2096 1392 bbthth.exe 45 PID 1392 wrote to memory of 2096 1392 bbthth.exe 45 PID 1392 wrote to memory of 2096 1392 bbthth.exe 45 PID 1392 wrote to memory of 2096 1392 bbthth.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe"C:\Users\Admin\AppData\Local\Temp\5ff125fe3e22ed74e97814b76bf9cb11825bc1054b31eb081b8601971a11cff4N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\tnthbh.exec:\tnthbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\7vvpv.exec:\7vvpv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\9jvpv.exec:\9jvpv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\pdppd.exec:\pdppd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\lxxlffr.exec:\lxxlffr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\ttbbbt.exec:\ttbbbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\pdjjp.exec:\pdjjp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\lxrrxxr.exec:\lxrrxxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\bthtbn.exec:\bthtbn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\bnnnnh.exec:\bnnnnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\jdvjj.exec:\jdvjj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\jvdjp.exec:\jvdjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\frxxxxl.exec:\frxxxxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\7lxxlff.exec:\7lxxlff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\bbthth.exec:\bbthth.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
\??\c:\5hbbhh.exec:\5hbbhh.exe17⤵
- Executes dropped EXE
PID:2096 -
\??\c:\vpvvj.exec:\vpvvj.exe18⤵
- Executes dropped EXE
PID:588 -
\??\c:\7rlrrxl.exec:\7rlrrxl.exe19⤵
- Executes dropped EXE
PID:2216 -
\??\c:\rfrfflx.exec:\rfrfflx.exe20⤵
- Executes dropped EXE
PID:1928 -
\??\c:\nttbth.exec:\nttbth.exe21⤵
- Executes dropped EXE
PID:1588 -
\??\c:\9nnnnt.exec:\9nnnnt.exe22⤵
- Executes dropped EXE
PID:2116 -
\??\c:\jjjpd.exec:\jjjpd.exe23⤵
- Executes dropped EXE
PID:1408 -
\??\c:\xxlllll.exec:\xxlllll.exe24⤵
- Executes dropped EXE
PID:328 -
\??\c:\fxxlxrl.exec:\fxxlxrl.exe25⤵
- Executes dropped EXE
PID:1616 -
\??\c:\hbnttt.exec:\hbnttt.exe26⤵
- Executes dropped EXE
PID:1664 -
\??\c:\hhnnbb.exec:\hhnnbb.exe27⤵
- Executes dropped EXE
PID:1244 -
\??\c:\jvjdj.exec:\jvjdj.exe28⤵
- Executes dropped EXE
PID:2492 -
\??\c:\rlflxlr.exec:\rlflxlr.exe29⤵
- Executes dropped EXE
PID:2080 -
\??\c:\lfxffff.exec:\lfxffff.exe30⤵
- Executes dropped EXE
PID:1948 -
\??\c:\nbtthn.exec:\nbtthn.exe31⤵
- Executes dropped EXE
PID:2440 -
\??\c:\jdjjv.exec:\jdjjv.exe32⤵
- Executes dropped EXE
PID:2972 -
\??\c:\1lflrxr.exec:\1lflrxr.exe33⤵
- Executes dropped EXE
PID:2780 -
\??\c:\fxlrfxr.exec:\fxlrfxr.exe34⤵
- Executes dropped EXE
PID:2840 -
\??\c:\bbnbnb.exec:\bbnbnb.exe35⤵
- Executes dropped EXE
PID:3052 -
\??\c:\btnhnb.exec:\btnhnb.exe36⤵
- Executes dropped EXE
PID:1608 -
\??\c:\dvpvj.exec:\dvpvj.exe37⤵
- Executes dropped EXE
PID:2576 -
\??\c:\pdvvv.exec:\pdvvv.exe38⤵
- Executes dropped EXE
PID:2740 -
\??\c:\rrxrrrf.exec:\rrxrrrf.exe39⤵
- Executes dropped EXE
PID:2820 -
\??\c:\rrrxfxf.exec:\rrrxfxf.exe40⤵
- Executes dropped EXE
PID:2620 -
\??\c:\9hbhnt.exec:\9hbhnt.exe41⤵
- Executes dropped EXE
PID:1580 -
\??\c:\nhttbb.exec:\nhttbb.exe42⤵
- Executes dropped EXE
PID:2524 -
\??\c:\pjdjv.exec:\pjdjv.exe43⤵
- Executes dropped EXE
PID:1492 -
\??\c:\rlrxxfl.exec:\rlrxxfl.exe44⤵
- Executes dropped EXE
PID:2452 -
\??\c:\xxxxflx.exec:\xxxxflx.exe45⤵
- Executes dropped EXE
PID:2988 -
\??\c:\btbhtt.exec:\btbhtt.exe46⤵
- Executes dropped EXE
PID:2556 -
\??\c:\nnnthh.exec:\nnnthh.exe47⤵
- Executes dropped EXE
PID:2868 -
\??\c:\vppdd.exec:\vppdd.exe48⤵
- Executes dropped EXE
PID:2892 -
\??\c:\ppvjv.exec:\ppvjv.exe49⤵
- Executes dropped EXE
PID:2928 -
\??\c:\lfxrxff.exec:\lfxrxff.exe50⤵
- Executes dropped EXE
PID:1748 -
\??\c:\xrxfllf.exec:\xrxfllf.exe51⤵
- Executes dropped EXE
PID:2912 -
\??\c:\hthnnh.exec:\hthnnh.exe52⤵
- Executes dropped EXE
PID:560 -
\??\c:\tntbnt.exec:\tntbnt.exe53⤵
- Executes dropped EXE
PID:608 -
\??\c:\jjjpd.exec:\jjjpd.exe54⤵
- Executes dropped EXE
PID:2104 -
\??\c:\ddvdp.exec:\ddvdp.exe55⤵
- Executes dropped EXE
PID:2384 -
\??\c:\lxfxfxl.exec:\lxfxfxl.exe56⤵
- Executes dropped EXE
PID:1980 -
\??\c:\fffrfxl.exec:\fffrfxl.exe57⤵
- Executes dropped EXE
PID:2344 -
\??\c:\hbnhnn.exec:\hbnhnn.exe58⤵
- Executes dropped EXE
PID:2264 -
\??\c:\nnnbht.exec:\nnnbht.exe59⤵
- Executes dropped EXE
PID:960 -
\??\c:\vjvvv.exec:\vjvvv.exe60⤵
- Executes dropped EXE
PID:280 -
\??\c:\jdvvp.exec:\jdvvp.exe61⤵
- Executes dropped EXE
PID:2316 -
\??\c:\ffxxlxl.exec:\ffxxlxl.exe62⤵
- Executes dropped EXE
PID:1876 -
\??\c:\lfrxffx.exec:\lfrxffx.exe63⤵
- Executes dropped EXE
PID:1732 -
\??\c:\rlflrrx.exec:\rlflrrx.exe64⤵
- Executes dropped EXE
PID:2460 -
\??\c:\hthbhh.exec:\hthbhh.exe65⤵
- Executes dropped EXE
PID:1020 -
\??\c:\bnbhtn.exec:\bnbhtn.exe66⤵PID:2288
-
\??\c:\jjddj.exec:\jjddj.exe67⤵PID:2080
-
\??\c:\dvjpj.exec:\dvjpj.exe68⤵PID:2508
-
\??\c:\1xxflxf.exec:\1xxflxf.exe69⤵PID:2380
-
\??\c:\3lxlrxf.exec:\3lxlrxf.exe70⤵PID:2732
-
\??\c:\1thnth.exec:\1thnth.exe71⤵PID:2972
-
\??\c:\btnbnt.exec:\btnbnt.exe72⤵PID:2728
-
\??\c:\pjjpj.exec:\pjjpj.exe73⤵PID:2776
-
\??\c:\jjjvj.exec:\jjjvj.exe74⤵PID:2008
-
\??\c:\xxrxlll.exec:\xxrxlll.exe75⤵PID:2608
-
\??\c:\lxllrrx.exec:\lxllrrx.exe76⤵PID:1296
-
\??\c:\5tnbnt.exec:\5tnbnt.exe77⤵PID:2832
-
\??\c:\vpdpd.exec:\vpdpd.exe78⤵PID:2744
-
\??\c:\jdddp.exec:\jdddp.exe79⤵PID:2212
-
\??\c:\pddvv.exec:\pddvv.exe80⤵PID:2540
-
\??\c:\fxrlrxl.exec:\fxrlrxl.exe81⤵PID:2340
-
\??\c:\lxrxffl.exec:\lxrxffl.exe82⤵PID:448
-
\??\c:\btthtb.exec:\btthtb.exe83⤵PID:2872
-
\??\c:\9bbhhh.exec:\9bbhhh.exe84⤵PID:1132
-
\??\c:\jdjjd.exec:\jdjjd.exe85⤵PID:2760
-
\??\c:\3vvpv.exec:\3vvpv.exe86⤵
- System Location Discovery: System Language Discovery
PID:3060 -
\??\c:\lrlxrrf.exec:\lrlxrrf.exe87⤵PID:300
-
\??\c:\rlrxllr.exec:\rlrxllr.exe88⤵PID:2280
-
\??\c:\btnbhh.exec:\btnbhh.exe89⤵PID:2084
-
\??\c:\1hthnn.exec:\1hthnn.exe90⤵PID:2564
-
\??\c:\vvvdp.exec:\vvvdp.exe91⤵PID:1012
-
\??\c:\dpvpv.exec:\dpvpv.exe92⤵PID:2208
-
\??\c:\xlrlxxf.exec:\xlrlxxf.exe93⤵PID:2216
-
\??\c:\bnnntn.exec:\bnnntn.exe94⤵PID:2184
-
\??\c:\bbbthn.exec:\bbbthn.exe95⤵PID:2420
-
\??\c:\vpddj.exec:\vpddj.exe96⤵PID:2256
-
\??\c:\jjvdp.exec:\jjvdp.exe97⤵PID:2116
-
\??\c:\1xrrxlr.exec:\1xrrxlr.exe98⤵PID:1408
-
\??\c:\rrrxrlr.exec:\rrrxrlr.exe99⤵PID:2480
-
\??\c:\xlrlrrr.exec:\xlrlrrr.exe100⤵PID:1764
-
\??\c:\nbbnbn.exec:\nbbnbn.exe101⤵PID:1268
-
\??\c:\hbhhhn.exec:\hbhhhn.exe102⤵PID:2952
-
\??\c:\pjjpj.exec:\pjjpj.exe103⤵PID:860
-
\??\c:\vvjjp.exec:\vvjjp.exe104⤵PID:1744
-
\??\c:\rfflrxf.exec:\rfflrxf.exe105⤵PID:1636
-
\??\c:\lxffffr.exec:\lxffffr.exe106⤵PID:2864
-
\??\c:\hnhthh.exec:\hnhthh.exe107⤵PID:1524
-
\??\c:\3bntbh.exec:\3bntbh.exe108⤵PID:2444
-
\??\c:\pdvpd.exec:\pdvpd.exe109⤵PID:2320
-
\??\c:\dvjpv.exec:\dvjpv.exe110⤵PID:2960
-
\??\c:\fxxfllx.exec:\fxxfllx.exe111⤵PID:2228
-
\??\c:\rlxrxxf.exec:\rlxrxxf.exe112⤵PID:2840
-
\??\c:\hbntbh.exec:\hbntbh.exe113⤵PID:2812
-
\??\c:\bthbtn.exec:\bthbtn.exe114⤵PID:2572
-
\??\c:\3pjpd.exec:\3pjpd.exe115⤵PID:2244
-
\??\c:\9jjpp.exec:\9jjpp.exe116⤵PID:1632
-
\??\c:\rrrflxx.exec:\rrrflxx.exe117⤵PID:2820
-
\??\c:\xrflrrf.exec:\xrflrrf.exe118⤵PID:3044
-
\??\c:\nhthnt.exec:\nhthnt.exe119⤵PID:900
-
\??\c:\nbnttn.exec:\nbnttn.exe120⤵
- System Location Discovery: System Language Discovery
PID:1284 -
\??\c:\tnhnnb.exec:\tnhnnb.exe121⤵PID:1496
-
\??\c:\ppdvj.exec:\ppdvj.exe122⤵PID:2408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-