Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 11:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe
-
Size
66KB
-
MD5
7dc2efe69bce3e7b63a16301849e3114
-
SHA1
ae2ba113fca0dfab484e570cb7f6682aff94846f
-
SHA256
f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72
-
SHA512
66a36f6ea9106c5aa220f78b3da9dcc535f6f351364b8275c898ffe17d4b984736ffd065977ef79ad8ccd3ebf994bba8b75782808f10870ee5cd4c3f7704d55f
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzkzNM+:ymb3NkkiQ3mdBjFIvlpM+
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/1904-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/352-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1004-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1012-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1468-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/668-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2204-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1188-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1576-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2268-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1836-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2436-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1212-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 352 ttnnht.exe 1004 vpdpj.exe 1012 5ppvd.exe 2148 rfxlrrx.exe 2856 bnbhbb.exe 2392 jvpvv.exe 2672 5frflfl.exe 1468 tbnhnh.exe 2708 1jvpv.exe 2192 3lxfrrf.exe 668 bthntb.exe 2204 1tnhnh.exe 2868 ppvjd.exe 3048 9rllrxl.exe 3032 fxxflrf.exe 2696 bthhhh.exe 2020 dvpjj.exe 2084 jdvdj.exe 808 9xxxxlx.exe 1188 5btntt.exe 656 tbnbnb.exe 1576 jjdvj.exe 2268 jvdpd.exe 2344 flxrfxx.exe 600 tnbhnt.exe 2352 nbnbhb.exe 1836 3rlrfrx.exe 2436 xrxflrx.exe 1800 5hthnt.exe 1212 jdpvp.exe 1984 pjjpv.exe 3064 rllrxlf.exe 2076 tntbhh.exe 1012 1nbntt.exe 2844 7vjpv.exe 1532 dpddj.exe 2792 3rlxlrf.exe 2864 hthhhn.exe 2996 hbnbhh.exe 2808 3nnbhh.exe 2632 pjvvv.exe 1924 jdjjp.exe 2912 fxrrfxf.exe 2960 rlrrxfl.exe 1560 tnbhtt.exe 2500 nnntbn.exe 2736 vdvdd.exe 1920 jdppj.exe 3012 lxrrffl.exe 2880 rllrllf.exe 2016 9xxflfx.exe 1452 hbnthn.exe 1812 9nbtth.exe 2408 rrrlrxl.exe 1444 frrrffl.exe 2380 nhtbht.exe 2420 3ntnnt.exe 656 vppdp.exe 1576 vpdvd.exe 1584 3rrxllx.exe 348 fxlxrrx.exe 1552 3nhnbb.exe 2364 tttnhh.exe 2352 3ppdv.exe -
resource yara_rule behavioral1/memory/1904-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/352-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1004-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1012-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1468-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1468-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/668-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1188-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1576-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2268-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1836-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-273-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1212-291-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ffxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frlrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llflxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxfxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nhbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 352 1904 f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe 30 PID 1904 wrote to memory of 352 1904 f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe 30 PID 1904 wrote to memory of 352 1904 f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe 30 PID 1904 wrote to memory of 352 1904 f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe 30 PID 352 wrote to memory of 1004 352 ttnnht.exe 31 PID 352 wrote to memory of 1004 352 ttnnht.exe 31 PID 352 wrote to memory of 1004 352 ttnnht.exe 31 PID 352 wrote to memory of 1004 352 ttnnht.exe 31 PID 1004 wrote to memory of 1012 1004 vpdpj.exe 32 PID 1004 wrote to memory of 1012 1004 vpdpj.exe 32 PID 1004 wrote to memory of 1012 1004 vpdpj.exe 32 PID 1004 wrote to memory of 1012 1004 vpdpj.exe 32 PID 1012 wrote to memory of 2148 1012 5ppvd.exe 33 PID 1012 wrote to memory of 2148 1012 5ppvd.exe 33 PID 1012 wrote to memory of 2148 1012 5ppvd.exe 33 PID 1012 wrote to memory of 2148 1012 5ppvd.exe 33 PID 2148 wrote to memory of 2856 2148 rfxlrrx.exe 34 PID 2148 wrote to memory of 2856 2148 rfxlrrx.exe 34 PID 2148 wrote to memory of 2856 2148 rfxlrrx.exe 34 PID 2148 wrote to memory of 2856 2148 rfxlrrx.exe 34 PID 2856 wrote to memory of 2392 2856 bnbhbb.exe 35 PID 2856 wrote to memory of 2392 2856 bnbhbb.exe 35 PID 2856 wrote to memory of 2392 2856 bnbhbb.exe 35 PID 2856 wrote to memory of 2392 2856 bnbhbb.exe 35 PID 2392 wrote to memory of 2672 2392 jvpvv.exe 36 PID 2392 wrote to memory of 2672 2392 jvpvv.exe 36 PID 2392 wrote to memory of 2672 2392 jvpvv.exe 36 PID 2392 wrote to memory of 2672 2392 jvpvv.exe 36 PID 2672 wrote to memory of 1468 2672 5frflfl.exe 37 PID 2672 wrote to memory of 1468 2672 5frflfl.exe 37 PID 2672 wrote to memory of 1468 2672 5frflfl.exe 37 PID 2672 wrote to memory of 1468 2672 5frflfl.exe 37 PID 1468 wrote to memory of 2708 1468 tbnhnh.exe 38 PID 1468 wrote to memory of 2708 1468 tbnhnh.exe 38 PID 1468 wrote to memory of 2708 1468 tbnhnh.exe 38 PID 1468 wrote to memory of 2708 1468 tbnhnh.exe 38 PID 2708 wrote to memory of 2192 2708 1jvpv.exe 39 PID 2708 wrote to memory of 2192 2708 1jvpv.exe 39 PID 2708 wrote to memory of 2192 2708 1jvpv.exe 39 PID 2708 wrote to memory of 2192 2708 1jvpv.exe 39 PID 2192 wrote to memory of 668 2192 3lxfrrf.exe 40 PID 2192 wrote to memory of 668 2192 3lxfrrf.exe 40 PID 2192 wrote to memory of 668 2192 3lxfrrf.exe 40 PID 2192 wrote to memory of 668 2192 3lxfrrf.exe 40 PID 668 wrote to memory of 2204 668 bthntb.exe 41 PID 668 wrote to memory of 2204 668 bthntb.exe 41 PID 668 wrote to memory of 2204 668 bthntb.exe 41 PID 668 wrote to memory of 2204 668 bthntb.exe 41 PID 2204 wrote to memory of 2868 2204 1tnhnh.exe 42 PID 2204 wrote to memory of 2868 2204 1tnhnh.exe 42 PID 2204 wrote to memory of 2868 2204 1tnhnh.exe 42 PID 2204 wrote to memory of 2868 2204 1tnhnh.exe 42 PID 2868 wrote to memory of 3048 2868 ppvjd.exe 43 PID 2868 wrote to memory of 3048 2868 ppvjd.exe 43 PID 2868 wrote to memory of 3048 2868 ppvjd.exe 43 PID 2868 wrote to memory of 3048 2868 ppvjd.exe 43 PID 3048 wrote to memory of 3032 3048 9rllrxl.exe 44 PID 3048 wrote to memory of 3032 3048 9rllrxl.exe 44 PID 3048 wrote to memory of 3032 3048 9rllrxl.exe 44 PID 3048 wrote to memory of 3032 3048 9rllrxl.exe 44 PID 3032 wrote to memory of 2696 3032 fxxflrf.exe 45 PID 3032 wrote to memory of 2696 3032 fxxflrf.exe 45 PID 3032 wrote to memory of 2696 3032 fxxflrf.exe 45 PID 3032 wrote to memory of 2696 3032 fxxflrf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe"C:\Users\Admin\AppData\Local\Temp\f9df4404b6cd8faebba99cf1987fc0c3ab737078018d6deccceea2fcde774f72.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\ttnnht.exec:\ttnnht.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\vpdpj.exec:\vpdpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\5ppvd.exec:\5ppvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\rfxlrrx.exec:\rfxlrrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\bnbhbb.exec:\bnbhbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\jvpvv.exec:\jvpvv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\5frflfl.exec:\5frflfl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\tbnhnh.exec:\tbnhnh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
\??\c:\1jvpv.exec:\1jvpv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\3lxfrrf.exec:\3lxfrrf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\bthntb.exec:\bthntb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\1tnhnh.exec:\1tnhnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\ppvjd.exec:\ppvjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\9rllrxl.exec:\9rllrxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\fxxflrf.exec:\fxxflrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\bthhhh.exec:\bthhhh.exe17⤵
- Executes dropped EXE
PID:2696 -
\??\c:\dvpjj.exec:\dvpjj.exe18⤵
- Executes dropped EXE
PID:2020 -
\??\c:\jdvdj.exec:\jdvdj.exe19⤵
- Executes dropped EXE
PID:2084 -
\??\c:\9xxxxlx.exec:\9xxxxlx.exe20⤵
- Executes dropped EXE
PID:808 -
\??\c:\5btntt.exec:\5btntt.exe21⤵
- Executes dropped EXE
PID:1188 -
\??\c:\tbnbnb.exec:\tbnbnb.exe22⤵
- Executes dropped EXE
PID:656 -
\??\c:\jjdvj.exec:\jjdvj.exe23⤵
- Executes dropped EXE
PID:1576 -
\??\c:\jvdpd.exec:\jvdpd.exe24⤵
- Executes dropped EXE
PID:2268 -
\??\c:\flxrfxx.exec:\flxrfxx.exe25⤵
- Executes dropped EXE
PID:2344 -
\??\c:\tnbhnt.exec:\tnbhnt.exe26⤵
- Executes dropped EXE
PID:600 -
\??\c:\nbnbhb.exec:\nbnbhb.exe27⤵
- Executes dropped EXE
PID:2352 -
\??\c:\3rlrfrx.exec:\3rlrfrx.exe28⤵
- Executes dropped EXE
PID:1836 -
\??\c:\xrxflrx.exec:\xrxflrx.exe29⤵
- Executes dropped EXE
PID:2436 -
\??\c:\5hthnt.exec:\5hthnt.exe30⤵
- Executes dropped EXE
PID:1800 -
\??\c:\jdpvp.exec:\jdpvp.exe31⤵
- Executes dropped EXE
PID:1212 -
\??\c:\pjjpv.exec:\pjjpv.exe32⤵
- Executes dropped EXE
PID:1984 -
\??\c:\rllrxlf.exec:\rllrxlf.exe33⤵
- Executes dropped EXE
PID:3064 -
\??\c:\tntbhh.exec:\tntbhh.exe34⤵
- Executes dropped EXE
PID:2076 -
\??\c:\1nbntt.exec:\1nbntt.exe35⤵
- Executes dropped EXE
PID:1012 -
\??\c:\7vjpv.exec:\7vjpv.exe36⤵
- Executes dropped EXE
PID:2844 -
\??\c:\dpddj.exec:\dpddj.exe37⤵
- Executes dropped EXE
PID:1532 -
\??\c:\3rlxlrf.exec:\3rlxlrf.exe38⤵
- Executes dropped EXE
PID:2792 -
\??\c:\hthhhn.exec:\hthhhn.exe39⤵
- Executes dropped EXE
PID:2864 -
\??\c:\hbnbhh.exec:\hbnbhh.exe40⤵
- Executes dropped EXE
PID:2996 -
\??\c:\3nnbhh.exec:\3nnbhh.exe41⤵
- Executes dropped EXE
PID:2808 -
\??\c:\pjvvv.exec:\pjvvv.exe42⤵
- Executes dropped EXE
PID:2632 -
\??\c:\jdjjp.exec:\jdjjp.exe43⤵
- Executes dropped EXE
PID:1924 -
\??\c:\fxrrfxf.exec:\fxrrfxf.exe44⤵
- Executes dropped EXE
PID:2912 -
\??\c:\rlrrxfl.exec:\rlrrxfl.exe45⤵
- Executes dropped EXE
PID:2960 -
\??\c:\tnbhtt.exec:\tnbhtt.exe46⤵
- Executes dropped EXE
PID:1560 -
\??\c:\nnntbn.exec:\nnntbn.exe47⤵
- Executes dropped EXE
PID:2500 -
\??\c:\vdvdd.exec:\vdvdd.exe48⤵
- Executes dropped EXE
PID:2736 -
\??\c:\jdppj.exec:\jdppj.exe49⤵
- Executes dropped EXE
PID:1920 -
\??\c:\lxrrffl.exec:\lxrrffl.exe50⤵
- Executes dropped EXE
PID:3012 -
\??\c:\rllrllf.exec:\rllrllf.exe51⤵
- Executes dropped EXE
PID:2880 -
\??\c:\9xxflfx.exec:\9xxflfx.exe52⤵
- Executes dropped EXE
PID:2016 -
\??\c:\hbnthn.exec:\hbnthn.exe53⤵
- Executes dropped EXE
PID:1452 -
\??\c:\9nbtth.exec:\9nbtth.exe54⤵
- Executes dropped EXE
PID:1812 -
\??\c:\rrrlrxl.exec:\rrrlrxl.exe55⤵
- Executes dropped EXE
PID:2408 -
\??\c:\frrrffl.exec:\frrrffl.exe56⤵
- Executes dropped EXE
PID:1444 -
\??\c:\nhtbht.exec:\nhtbht.exe57⤵
- Executes dropped EXE
PID:2380 -
\??\c:\3ntnnt.exec:\3ntnnt.exe58⤵
- Executes dropped EXE
PID:2420 -
\??\c:\vppdp.exec:\vppdp.exe59⤵
- Executes dropped EXE
PID:656 -
\??\c:\vpdvd.exec:\vpdvd.exe60⤵
- Executes dropped EXE
PID:1576 -
\??\c:\3rrxllx.exec:\3rrxllx.exe61⤵
- Executes dropped EXE
PID:1584 -
\??\c:\fxlxrrx.exec:\fxlxrrx.exe62⤵
- Executes dropped EXE
PID:348 -
\??\c:\3nhnbb.exec:\3nhnbb.exe63⤵
- Executes dropped EXE
PID:1552 -
\??\c:\tttnhh.exec:\tttnhh.exe64⤵
- Executes dropped EXE
PID:2364 -
\??\c:\3ppdv.exec:\3ppdv.exe65⤵
- Executes dropped EXE
PID:2352 -
\??\c:\9jvpv.exec:\9jvpv.exe66⤵PID:2400
-
\??\c:\5djvj.exec:\5djvj.exe67⤵PID:1816
-
\??\c:\7fxxflr.exec:\7fxxflr.exe68⤵PID:2372
-
\??\c:\rllrffr.exec:\rllrffr.exe69⤵PID:352
-
\??\c:\5nhbth.exec:\5nhbth.exe70⤵
- System Location Discovery: System Language Discovery
PID:2720 -
\??\c:\ththtb.exec:\ththtb.exe71⤵PID:1100
-
\??\c:\pjjjp.exec:\pjjjp.exe72⤵PID:1652
-
\??\c:\vpjpd.exec:\vpjpd.exe73⤵PID:2508
-
\??\c:\9xfxlxf.exec:\9xfxlxf.exe74⤵PID:2780
-
\??\c:\xrflxxf.exec:\xrflxxf.exe75⤵PID:2860
-
\??\c:\nhnbhb.exec:\nhnbhb.exe76⤵PID:1540
-
\??\c:\ttnhth.exec:\ttnhth.exe77⤵PID:2340
-
\??\c:\vjjvp.exec:\vjjvp.exe78⤵PID:2856
-
\??\c:\3pvjp.exec:\3pvjp.exe79⤵PID:2676
-
\??\c:\xxfrffl.exec:\xxfrffl.exe80⤵PID:2672
-
\??\c:\llxfrxl.exec:\llxfrxl.exe81⤵PID:2700
-
\??\c:\9hbnbb.exec:\9hbnbb.exe82⤵PID:2680
-
\??\c:\7djdv.exec:\7djdv.exe83⤵PID:2708
-
\??\c:\3jvpp.exec:\3jvpp.exe84⤵PID:2200
-
\??\c:\frxflrf.exec:\frxflrf.exe85⤵PID:2940
-
\??\c:\fflflxx.exec:\fflflxx.exe86⤵PID:2896
-
\??\c:\tthhnb.exec:\tthhnb.exe87⤵PID:2412
-
\??\c:\ttnhtb.exec:\ttnhtb.exe88⤵PID:2724
-
\??\c:\jvjpv.exec:\jvjpv.exe89⤵PID:3048
-
\??\c:\xrrfrxr.exec:\xrrfrxr.exe90⤵PID:2384
-
\??\c:\llxlffr.exec:\llxlffr.exe91⤵PID:2036
-
\??\c:\5lfrxxr.exec:\5lfrxxr.exe92⤵PID:2428
-
\??\c:\ttnbtb.exec:\ttnbtb.exe93⤵PID:536
-
\??\c:\nnhntt.exec:\nnhntt.exe94⤵PID:484
-
\??\c:\pdpvv.exec:\pdpvv.exe95⤵PID:576
-
\??\c:\jvvpp.exec:\jvvpp.exe96⤵PID:1580
-
\??\c:\1ffrxfr.exec:\1ffrxfr.exe97⤵PID:1124
-
\??\c:\rlxffrx.exec:\rlxffrx.exe98⤵PID:408
-
\??\c:\thhthn.exec:\thhthn.exe99⤵PID:2168
-
\??\c:\vjddj.exec:\vjddj.exe100⤵PID:2268
-
\??\c:\vvpjd.exec:\vvpjd.exe101⤵PID:680
-
\??\c:\lxllrrl.exec:\lxllrrl.exe102⤵PID:600
-
\??\c:\xflrlff.exec:\xflrlff.exe103⤵PID:1912
-
\??\c:\hbhnbb.exec:\hbhnbb.exe104⤵PID:2472
-
\??\c:\tntntt.exec:\tntntt.exe105⤵PID:2348
-
\??\c:\jpvpp.exec:\jpvpp.exe106⤵PID:2436
-
\??\c:\pdjjd.exec:\pdjjd.exe107⤵PID:1904
-
\??\c:\5rffrxr.exec:\5rffrxr.exe108⤵PID:1680
-
\??\c:\xrlrflr.exec:\xrlrflr.exe109⤵PID:1624
-
\??\c:\1hnttb.exec:\1hnttb.exe110⤵PID:2484
-
\??\c:\hbbhnb.exec:\hbbhnb.exe111⤵PID:316
-
\??\c:\jdvdp.exec:\jdvdp.exe112⤵PID:2076
-
\??\c:\vjdvd.exec:\vjdvd.exe113⤵PID:1012
-
\??\c:\xlxfxfr.exec:\xlxfxfr.exe114⤵
- System Location Discovery: System Language Discovery
PID:2844 -
\??\c:\rlfxffl.exec:\rlfxffl.exe115⤵PID:1532
-
\??\c:\9nhntn.exec:\9nhntn.exe116⤵PID:2760
-
\??\c:\5nnnbh.exec:\5nnnbh.exe117⤵PID:2360
-
\??\c:\vvpvv.exec:\vvpvv.exe118⤵PID:3056
-
\??\c:\fxffllf.exec:\fxffllf.exe119⤵PID:2800
-
\??\c:\rlrxllr.exec:\rlrxllr.exe120⤵PID:2652
-
\??\c:\hbbnbn.exec:\hbbnbn.exe121⤵PID:1924
-
\??\c:\5bntbh.exec:\5bntbh.exe122⤵PID:3004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-