Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe
-
Size
590KB
-
MD5
01335addfaf7aa894ec94da566e642e0
-
SHA1
768a88b356d32849adc5c5c3c17321efc09e1762
-
SHA256
f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6
-
SHA512
b239ae933557748e19127b19b31f26cfde33b29f1d9104175f94be317971178bf33a2e515a3e61b2ddd50865c1378c48c8e24ec352c427ab8b1ef5790365e10b
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayh:n3C9Lebz+xt4vFeFmgayh
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2388-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2004-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/668-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1352-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1116-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2340-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1916-238-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2960 1nbhnt.exe 2028 dvjpv.exe 2496 9hbhth.exe 2972 lflxlrx.exe 2816 ttnhtb.exe 2640 rlfrlrf.exe 2764 tnttnn.exe 2656 fxlxflr.exe 2004 vvpvd.exe 668 rxlxrll.exe 1412 tbntbn.exe 2440 lxrfrrf.exe 2672 hhbhhh.exe 1056 rlxrxff.exe 1116 ntbtnh.exe 1352 xrxfffl.exe 1952 bbthbh.exe 2172 ddpvp.exe 1708 llfxlfr.exe 1616 7tnhnh.exe 1284 xxlrxfr.exe 2584 djvjj.exe 1916 5dvvv.exe 272 hbtbhb.exe 1268 fxxfrfr.exe 2148 rxrxllx.exe 2360 9rrxfrr.exe 1960 tnbbhb.exe 2340 5tnbnb.exe 2528 fffrflx.exe 2088 hnthth.exe 2684 dvjdj.exe 2028 7flrrff.exe 352 fxlrxxl.exe 2828 thhnbt.exe 2972 dpdjp.exe 2900 xxrflxl.exe 2776 nhnntn.exe 2912 jpjpd.exe 2608 3lrlrrr.exe 2620 frrxrff.exe 2324 hbntht.exe 2116 jjdjd.exe 540 jjpdd.exe 2848 xxxlflx.exe 1992 rrfrxxl.exe 1448 nththt.exe 2592 5vpdj.exe 908 dvjjj.exe 1696 fxfrxrf.exe 1236 7thbbb.exe 1680 nhthtt.exe 1936 jjvdp.exe 1372 7jdpv.exe 2936 llxfrfx.exe 2208 hbbbhn.exe 1432 hthtbh.exe 1284 vdpjj.exe 1908 9dppd.exe 564 9rflrxf.exe 1592 tttbnb.exe 2112 tnhthn.exe 324 vpvvd.exe 1944 vpjvj.exe -
resource yara_rule behavioral1/memory/2388-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/668-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1352-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1116-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-238-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxrflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xffrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrfxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frxfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtbhn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2960 2388 f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe 30 PID 2388 wrote to memory of 2960 2388 f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe 30 PID 2388 wrote to memory of 2960 2388 f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe 30 PID 2388 wrote to memory of 2960 2388 f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe 30 PID 2960 wrote to memory of 2028 2960 1nbhnt.exe 31 PID 2960 wrote to memory of 2028 2960 1nbhnt.exe 31 PID 2960 wrote to memory of 2028 2960 1nbhnt.exe 31 PID 2960 wrote to memory of 2028 2960 1nbhnt.exe 31 PID 2028 wrote to memory of 2496 2028 dvjpv.exe 32 PID 2028 wrote to memory of 2496 2028 dvjpv.exe 32 PID 2028 wrote to memory of 2496 2028 dvjpv.exe 32 PID 2028 wrote to memory of 2496 2028 dvjpv.exe 32 PID 2496 wrote to memory of 2972 2496 9hbhth.exe 33 PID 2496 wrote to memory of 2972 2496 9hbhth.exe 33 PID 2496 wrote to memory of 2972 2496 9hbhth.exe 33 PID 2496 wrote to memory of 2972 2496 9hbhth.exe 33 PID 2972 wrote to memory of 2816 2972 lflxlrx.exe 34 PID 2972 wrote to memory of 2816 2972 lflxlrx.exe 34 PID 2972 wrote to memory of 2816 2972 lflxlrx.exe 34 PID 2972 wrote to memory of 2816 2972 lflxlrx.exe 34 PID 2816 wrote to memory of 2640 2816 ttnhtb.exe 35 PID 2816 wrote to memory of 2640 2816 ttnhtb.exe 35 PID 2816 wrote to memory of 2640 2816 ttnhtb.exe 35 PID 2816 wrote to memory of 2640 2816 ttnhtb.exe 35 PID 2640 wrote to memory of 2764 2640 rlfrlrf.exe 36 PID 2640 wrote to memory of 2764 2640 rlfrlrf.exe 36 PID 2640 wrote to memory of 2764 2640 rlfrlrf.exe 36 PID 2640 wrote to memory of 2764 2640 rlfrlrf.exe 36 PID 2764 wrote to memory of 2656 2764 tnttnn.exe 37 PID 2764 wrote to memory of 2656 2764 tnttnn.exe 37 PID 2764 wrote to memory of 2656 2764 tnttnn.exe 37 PID 2764 wrote to memory of 2656 2764 tnttnn.exe 37 PID 2656 wrote to memory of 2004 2656 fxlxflr.exe 38 PID 2656 wrote to memory of 2004 2656 fxlxflr.exe 38 PID 2656 wrote to memory of 2004 2656 fxlxflr.exe 38 PID 2656 wrote to memory of 2004 2656 fxlxflr.exe 38 PID 2004 wrote to memory of 668 2004 vvpvd.exe 39 PID 2004 wrote to memory of 668 2004 vvpvd.exe 39 PID 2004 wrote to memory of 668 2004 vvpvd.exe 39 PID 2004 wrote to memory of 668 2004 vvpvd.exe 39 PID 668 wrote to memory of 1412 668 rxlxrll.exe 114 PID 668 wrote to memory of 1412 668 rxlxrll.exe 114 PID 668 wrote to memory of 1412 668 rxlxrll.exe 114 PID 668 wrote to memory of 1412 668 rxlxrll.exe 114 PID 1412 wrote to memory of 2440 1412 tbntbn.exe 41 PID 1412 wrote to memory of 2440 1412 tbntbn.exe 41 PID 1412 wrote to memory of 2440 1412 tbntbn.exe 41 PID 1412 wrote to memory of 2440 1412 tbntbn.exe 41 PID 2440 wrote to memory of 2672 2440 lxrfrrf.exe 42 PID 2440 wrote to memory of 2672 2440 lxrfrrf.exe 42 PID 2440 wrote to memory of 2672 2440 lxrfrrf.exe 42 PID 2440 wrote to memory of 2672 2440 lxrfrrf.exe 42 PID 2672 wrote to memory of 1056 2672 hhbhhh.exe 43 PID 2672 wrote to memory of 1056 2672 hhbhhh.exe 43 PID 2672 wrote to memory of 1056 2672 hhbhhh.exe 43 PID 2672 wrote to memory of 1056 2672 hhbhhh.exe 43 PID 1056 wrote to memory of 1116 1056 rlxrxff.exe 44 PID 1056 wrote to memory of 1116 1056 rlxrxff.exe 44 PID 1056 wrote to memory of 1116 1056 rlxrxff.exe 44 PID 1056 wrote to memory of 1116 1056 rlxrxff.exe 44 PID 1116 wrote to memory of 1352 1116 ntbtnh.exe 45 PID 1116 wrote to memory of 1352 1116 ntbtnh.exe 45 PID 1116 wrote to memory of 1352 1116 ntbtnh.exe 45 PID 1116 wrote to memory of 1352 1116 ntbtnh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe"C:\Users\Admin\AppData\Local\Temp\f8c64946fe4314a2ef35fc5f10f6a09cfc30895768aa6ff6d4b966205abb42f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\1nbhnt.exec:\1nbhnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\dvjpv.exec:\dvjpv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\9hbhth.exec:\9hbhth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\lflxlrx.exec:\lflxlrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\ttnhtb.exec:\ttnhtb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\rlfrlrf.exec:\rlfrlrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\tnttnn.exec:\tnttnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\fxlxflr.exec:\fxlxflr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\vvpvd.exec:\vvpvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\rxlxrll.exec:\rxlxrll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\tbntbn.exec:\tbntbn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
\??\c:\lxrfrrf.exec:\lxrfrrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\hhbhhh.exec:\hhbhhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\rlxrxff.exec:\rlxrxff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\ntbtnh.exec:\ntbtnh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\xrxfffl.exec:\xrxfffl.exe17⤵
- Executes dropped EXE
PID:1352 -
\??\c:\bbthbh.exec:\bbthbh.exe18⤵
- Executes dropped EXE
PID:1952 -
\??\c:\ddpvp.exec:\ddpvp.exe19⤵
- Executes dropped EXE
PID:2172 -
\??\c:\llfxlfr.exec:\llfxlfr.exe20⤵
- Executes dropped EXE
PID:1708 -
\??\c:\7tnhnh.exec:\7tnhnh.exe21⤵
- Executes dropped EXE
PID:1616 -
\??\c:\xxlrxfr.exec:\xxlrxfr.exe22⤵
- Executes dropped EXE
PID:1284 -
\??\c:\djvjj.exec:\djvjj.exe23⤵
- Executes dropped EXE
PID:2584 -
\??\c:\5dvvv.exec:\5dvvv.exe24⤵
- Executes dropped EXE
PID:1916 -
\??\c:\hbtbhb.exec:\hbtbhb.exe25⤵
- Executes dropped EXE
PID:272 -
\??\c:\fxxfrfr.exec:\fxxfrfr.exe26⤵
- Executes dropped EXE
PID:1268 -
\??\c:\rxrxllx.exec:\rxrxllx.exe27⤵
- Executes dropped EXE
PID:2148 -
\??\c:\9rrxfrr.exec:\9rrxfrr.exe28⤵
- Executes dropped EXE
PID:2360 -
\??\c:\tnbbhb.exec:\tnbbhb.exe29⤵
- Executes dropped EXE
PID:1960 -
\??\c:\5tnbnb.exec:\5tnbnb.exe30⤵
- Executes dropped EXE
PID:2340 -
\??\c:\fffrflx.exec:\fffrflx.exe31⤵
- Executes dropped EXE
PID:2528 -
\??\c:\hnthth.exec:\hnthth.exe32⤵
- Executes dropped EXE
PID:2088 -
\??\c:\dvjdj.exec:\dvjdj.exe33⤵
- Executes dropped EXE
PID:2684 -
\??\c:\7flrrff.exec:\7flrrff.exe34⤵
- Executes dropped EXE
PID:2028 -
\??\c:\fxlrxxl.exec:\fxlrxxl.exe35⤵
- Executes dropped EXE
PID:352 -
\??\c:\thhnbt.exec:\thhnbt.exe36⤵
- Executes dropped EXE
PID:2828 -
\??\c:\dpdjp.exec:\dpdjp.exe37⤵
- Executes dropped EXE
PID:2972 -
\??\c:\xxrflxl.exec:\xxrflxl.exe38⤵
- Executes dropped EXE
PID:2900 -
\??\c:\nhnntn.exec:\nhnntn.exe39⤵
- Executes dropped EXE
PID:2776 -
\??\c:\jpjpd.exec:\jpjpd.exe40⤵
- Executes dropped EXE
PID:2912 -
\??\c:\3lrlrrr.exec:\3lrlrrr.exe41⤵
- Executes dropped EXE
PID:2608 -
\??\c:\frrxrff.exec:\frrxrff.exe42⤵
- Executes dropped EXE
PID:2620 -
\??\c:\hbntht.exec:\hbntht.exe43⤵
- Executes dropped EXE
PID:2324 -
\??\c:\jjdjd.exec:\jjdjd.exe44⤵
- Executes dropped EXE
PID:2116 -
\??\c:\jjpdd.exec:\jjpdd.exe45⤵
- Executes dropped EXE
PID:540 -
\??\c:\xxxlflx.exec:\xxxlflx.exe46⤵
- Executes dropped EXE
PID:2848 -
\??\c:\rrfrxxl.exec:\rrfrxxl.exe47⤵
- Executes dropped EXE
PID:1992 -
\??\c:\nththt.exec:\nththt.exe48⤵
- Executes dropped EXE
PID:1448 -
\??\c:\5vpdj.exec:\5vpdj.exe49⤵
- Executes dropped EXE
PID:2592 -
\??\c:\dvjjj.exec:\dvjjj.exe50⤵
- Executes dropped EXE
PID:908 -
\??\c:\fxfrxrf.exec:\fxfrxrf.exe51⤵
- Executes dropped EXE
PID:1696 -
\??\c:\7thbbb.exec:\7thbbb.exe52⤵
- Executes dropped EXE
PID:1236 -
\??\c:\nhthtt.exec:\nhthtt.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680 -
\??\c:\jjvdp.exec:\jjvdp.exe54⤵
- Executes dropped EXE
PID:1936 -
\??\c:\7jdpv.exec:\7jdpv.exe55⤵
- Executes dropped EXE
PID:1372 -
\??\c:\llxfrfx.exec:\llxfrfx.exe56⤵
- Executes dropped EXE
PID:2936 -
\??\c:\hbbbhn.exec:\hbbbhn.exe57⤵
- Executes dropped EXE
PID:2208 -
\??\c:\hthtbh.exec:\hthtbh.exe58⤵
- Executes dropped EXE
PID:1432 -
\??\c:\vdpjj.exec:\vdpjj.exe59⤵
- Executes dropped EXE
PID:1284 -
\??\c:\9dppd.exec:\9dppd.exe60⤵
- Executes dropped EXE
PID:1908 -
\??\c:\9rflrxf.exec:\9rflrxf.exe61⤵
- Executes dropped EXE
PID:564 -
\??\c:\tttbnb.exec:\tttbnb.exe62⤵
- Executes dropped EXE
PID:1592 -
\??\c:\tnhthn.exec:\tnhthn.exe63⤵
- Executes dropped EXE
PID:2112 -
\??\c:\vpvvd.exec:\vpvvd.exe64⤵
- Executes dropped EXE
PID:324 -
\??\c:\vpjvj.exec:\vpjvj.exe65⤵
- Executes dropped EXE
PID:1944 -
\??\c:\ffrxrlr.exec:\ffrxrlr.exe66⤵PID:2360
-
\??\c:\htbbbh.exec:\htbbbh.exe67⤵PID:3036
-
\??\c:\dddjj.exec:\dddjj.exe68⤵PID:2404
-
\??\c:\jddpv.exec:\jddpv.exe69⤵PID:1528
-
\??\c:\rlfrxfr.exec:\rlfrxfr.exe70⤵PID:2572
-
\??\c:\rrffllr.exec:\rrffllr.exe71⤵PID:2392
-
\??\c:\hhhbtn.exec:\hhhbtn.exe72⤵PID:2684
-
\??\c:\vvdjd.exec:\vvdjd.exe73⤵PID:2696
-
\??\c:\lffflfr.exec:\lffflfr.exe74⤵PID:1972
-
\??\c:\1rrlflx.exec:\1rrlflx.exe75⤵PID:2740
-
\??\c:\btnnbb.exec:\btnnbb.exe76⤵PID:2840
-
\??\c:\hbtbhb.exec:\hbtbhb.exe77⤵PID:2628
-
\??\c:\dvjjv.exec:\dvjjv.exe78⤵PID:2772
-
\??\c:\vpjdv.exec:\vpjdv.exe79⤵PID:1932
-
\??\c:\rrflrxf.exec:\rrflrxf.exe80⤵PID:2640
-
\??\c:\bnnbbn.exec:\bnnbbn.exe81⤵PID:2904
-
\??\c:\1vjvd.exec:\1vjvd.exe82⤵PID:2652
-
\??\c:\5djpd.exec:\5djpd.exe83⤵PID:2460
-
\??\c:\3fxfrxl.exec:\3fxfrxl.exe84⤵PID:2648
-
\??\c:\3rflrrr.exec:\3rflrrr.exe85⤵PID:1888
-
\??\c:\bnnbtt.exec:\bnnbtt.exe86⤵PID:1412
-
\??\c:\pdjpv.exec:\pdjpv.exe87⤵PID:2440
-
\??\c:\frfflxx.exec:\frfflxx.exe88⤵PID:772
-
\??\c:\nnbntb.exec:\nnbntb.exe89⤵PID:684
-
\??\c:\bhbbbb.exec:\bhbbbb.exe90⤵
- System Location Discovery: System Language Discovery
PID:1980 -
\??\c:\3fxlrlr.exec:\3fxlrlr.exe91⤵PID:1964
-
\??\c:\3rlflll.exec:\3rlflll.exe92⤵PID:2128
-
\??\c:\bbthth.exec:\bbthth.exe93⤵PID:2952
-
\??\c:\ppjvp.exec:\ppjvp.exe94⤵PID:640
-
\??\c:\3ppdv.exec:\3ppdv.exe95⤵PID:2252
-
\??\c:\9hbhnb.exec:\9hbhnb.exe96⤵PID:844
-
\??\c:\5dpvd.exec:\5dpvd.exe97⤵PID:784
-
\??\c:\5xrffrl.exec:\5xrffrl.exe98⤵PID:1356
-
\??\c:\fxrfxlf.exec:\fxrfxlf.exe99⤵PID:1480
-
\??\c:\pjdpd.exec:\pjdpd.exe100⤵PID:1916
-
\??\c:\lrlxxll.exec:\lrlxxll.exe101⤵PID:940
-
\??\c:\1tbhnb.exec:\1tbhnb.exe102⤵PID:2308
-
\??\c:\3jddj.exec:\3jddj.exe103⤵PID:912
-
\??\c:\dvjpv.exec:\dvjpv.exe104⤵PID:2224
-
\??\c:\llflfrx.exec:\llflfrx.exe105⤵PID:900
-
\??\c:\tbnntn.exec:\tbnntn.exe106⤵PID:1624
-
\??\c:\7vpdp.exec:\7vpdp.exe107⤵PID:2424
-
\??\c:\rflflxf.exec:\rflflxf.exe108⤵PID:2332
-
\??\c:\9rlrflx.exec:\9rlrflx.exe109⤵PID:1664
-
\??\c:\7btbbb.exec:\7btbbb.exe110⤵PID:2412
-
\??\c:\jdvdj.exec:\jdvdj.exe111⤵PID:2920
-
\??\c:\lxrfrrf.exec:\lxrfrrf.exe112⤵PID:2928
-
\??\c:\vpjpv.exec:\vpjpv.exe113⤵PID:2980
-
\??\c:\llxrflr.exec:\llxrflr.exe114⤵
- System Location Discovery: System Language Discovery
PID:2880 -
\??\c:\nhtthn.exec:\nhtthn.exe115⤵PID:2336
-
\??\c:\ddvvv.exec:\ddvvv.exe116⤵PID:2816
-
\??\c:\3xlrrlf.exec:\3xlrrlf.exe117⤵PID:2716
-
\??\c:\3xxxlff.exec:\3xxxlff.exe118⤵PID:2776
-
\??\c:\nnhthh.exec:\nnhthh.exe119⤵PID:2908
-
\??\c:\7xffrfl.exec:\7xffrfl.exe120⤵
- System Location Discovery: System Language Discovery
PID:2680 -
\??\c:\hnhtht.exec:\hnhtht.exe121⤵PID:2068
-
\??\c:\dvjvd.exec:\dvjvd.exe122⤵PID:3068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-