Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 21:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
585a998d119dd1130129cca5be7993b0N.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
120 seconds
General
-
Target
585a998d119dd1130129cca5be7993b0N.exe
-
Size
73KB
-
MD5
585a998d119dd1130129cca5be7993b0
-
SHA1
fccfd93f0f70d78f8306a0012091860d247350a8
-
SHA256
c724adf1366e2ca6ad9212f7273a8755472d5df5a9e43d302dd31eaccaa7cbfa
-
SHA512
46d86e90e147822d1760e5395e9bd1307e42611a36298dd910f1033094851556724fee2197c7819449bb6b9feee5186f6e8cbcf64cfec1fec4b4ff763b65dae1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUwcsbYsRgVK3G/w:ymb3NkkiQ3mdBjF0yjcsMsRH/
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2976-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2312-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-72-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1136-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2388-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/352-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/484-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1120-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1104-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1860-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1856-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3052 ttnnnh.exe 2780 9pjpd.exe 2756 3pdvj.exe 2312 nhnbnt.exe 2572 pdvdd.exe 2584 lffrlrf.exe 2208 5frxffr.exe 2856 1dvjj.exe 1136 jvjvd.exe 2388 htbbhb.exe 2912 tntnht.exe 3048 lffrxxl.exe 2840 lrflxff.exe 352 5btthb.exe 2816 djpdp.exe 2292 flrxrll.exe 484 9nnnbh.exe 1120 jdpdj.exe 2020 ffxxxff.exe 2168 tbbtth.exe 1104 jjvpd.exe 2936 jvjpj.exe 2296 fllffxx.exe 2308 hhhtbn.exe 1976 vjvdp.exe 976 xfrlfrx.exe 1860 nhntbb.exe 1856 pvjdd.exe 1808 xfffrlf.exe 1252 tnbtbb.exe 2708 vpjvd.exe 3052 lffxrfr.exe 2132 nttnbh.exe 2672 pvppv.exe 1600 lrrxrrf.exe 2756 lxfxlrf.exe 2312 bbhbnn.exe 2684 dvjvd.exe 2752 fxlrflx.exe 2688 rxxllxf.exe 1208 bthbnn.exe 2452 pjppj.exe 1072 3pppj.exe 2060 lffxlrf.exe 1380 tbhnnn.exe 2704 tnhbbn.exe 2908 djjdv.exe 3048 lrxflrl.exe 2728 rlfxllr.exe 836 tnntbn.exe 1792 vvpdj.exe 1376 xlrffll.exe 788 flfxrxl.exe 528 hhbtbn.exe 892 bnnbbt.exe 2244 djjpv.exe 2140 frfxlrx.exe 2108 nnhnhh.exe 1288 ppdvd.exe 1804 7vjvv.exe 1956 rxxlxfx.exe 2296 frrlxrx.exe 1508 nhbbhh.exe 2072 jvppv.exe -
resource yara_rule behavioral1/memory/2976-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2388-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/352-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/484-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1120-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1104-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1860-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-299-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tbhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfrxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrfxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbthbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nhtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhntnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnntht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxlxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3052 2976 585a998d119dd1130129cca5be7993b0N.exe 30 PID 2976 wrote to memory of 3052 2976 585a998d119dd1130129cca5be7993b0N.exe 30 PID 2976 wrote to memory of 3052 2976 585a998d119dd1130129cca5be7993b0N.exe 30 PID 2976 wrote to memory of 3052 2976 585a998d119dd1130129cca5be7993b0N.exe 30 PID 3052 wrote to memory of 2780 3052 ttnnnh.exe 31 PID 3052 wrote to memory of 2780 3052 ttnnnh.exe 31 PID 3052 wrote to memory of 2780 3052 ttnnnh.exe 31 PID 3052 wrote to memory of 2780 3052 ttnnnh.exe 31 PID 2780 wrote to memory of 2756 2780 9pjpd.exe 32 PID 2780 wrote to memory of 2756 2780 9pjpd.exe 32 PID 2780 wrote to memory of 2756 2780 9pjpd.exe 32 PID 2780 wrote to memory of 2756 2780 9pjpd.exe 32 PID 2756 wrote to memory of 2312 2756 3pdvj.exe 33 PID 2756 wrote to memory of 2312 2756 3pdvj.exe 33 PID 2756 wrote to memory of 2312 2756 3pdvj.exe 33 PID 2756 wrote to memory of 2312 2756 3pdvj.exe 33 PID 2312 wrote to memory of 2572 2312 nhnbnt.exe 34 PID 2312 wrote to memory of 2572 2312 nhnbnt.exe 34 PID 2312 wrote to memory of 2572 2312 nhnbnt.exe 34 PID 2312 wrote to memory of 2572 2312 nhnbnt.exe 34 PID 2572 wrote to memory of 2584 2572 pdvdd.exe 35 PID 2572 wrote to memory of 2584 2572 pdvdd.exe 35 PID 2572 wrote to memory of 2584 2572 pdvdd.exe 35 PID 2572 wrote to memory of 2584 2572 pdvdd.exe 35 PID 2584 wrote to memory of 2208 2584 lffrlrf.exe 36 PID 2584 wrote to memory of 2208 2584 lffrlrf.exe 36 PID 2584 wrote to memory of 2208 2584 lffrlrf.exe 36 PID 2584 wrote to memory of 2208 2584 lffrlrf.exe 36 PID 2208 wrote to memory of 2856 2208 5frxffr.exe 37 PID 2208 wrote to memory of 2856 2208 5frxffr.exe 37 PID 2208 wrote to memory of 2856 2208 5frxffr.exe 37 PID 2208 wrote to memory of 2856 2208 5frxffr.exe 37 PID 2856 wrote to memory of 1136 2856 1dvjj.exe 38 PID 2856 wrote to memory of 1136 2856 1dvjj.exe 38 PID 2856 wrote to memory of 1136 2856 1dvjj.exe 38 PID 2856 wrote to memory of 1136 2856 1dvjj.exe 38 PID 1136 wrote to memory of 2388 1136 jvjvd.exe 39 PID 1136 wrote to memory of 2388 1136 jvjvd.exe 39 PID 1136 wrote to memory of 2388 1136 jvjvd.exe 39 PID 1136 wrote to memory of 2388 1136 jvjvd.exe 39 PID 2388 wrote to memory of 2912 2388 htbbhb.exe 40 PID 2388 wrote to memory of 2912 2388 htbbhb.exe 40 PID 2388 wrote to memory of 2912 2388 htbbhb.exe 40 PID 2388 wrote to memory of 2912 2388 htbbhb.exe 40 PID 2912 wrote to memory of 3048 2912 tntnht.exe 41 PID 2912 wrote to memory of 3048 2912 tntnht.exe 41 PID 2912 wrote to memory of 3048 2912 tntnht.exe 41 PID 2912 wrote to memory of 3048 2912 tntnht.exe 41 PID 3048 wrote to memory of 2840 3048 lffrxxl.exe 42 PID 3048 wrote to memory of 2840 3048 lffrxxl.exe 42 PID 3048 wrote to memory of 2840 3048 lffrxxl.exe 42 PID 3048 wrote to memory of 2840 3048 lffrxxl.exe 42 PID 2840 wrote to memory of 352 2840 lrflxff.exe 43 PID 2840 wrote to memory of 352 2840 lrflxff.exe 43 PID 2840 wrote to memory of 352 2840 lrflxff.exe 43 PID 2840 wrote to memory of 352 2840 lrflxff.exe 43 PID 352 wrote to memory of 2816 352 5btthb.exe 44 PID 352 wrote to memory of 2816 352 5btthb.exe 44 PID 352 wrote to memory of 2816 352 5btthb.exe 44 PID 352 wrote to memory of 2816 352 5btthb.exe 44 PID 2816 wrote to memory of 2292 2816 djpdp.exe 45 PID 2816 wrote to memory of 2292 2816 djpdp.exe 45 PID 2816 wrote to memory of 2292 2816 djpdp.exe 45 PID 2816 wrote to memory of 2292 2816 djpdp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\585a998d119dd1130129cca5be7993b0N.exe"C:\Users\Admin\AppData\Local\Temp\585a998d119dd1130129cca5be7993b0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\ttnnnh.exec:\ttnnnh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\9pjpd.exec:\9pjpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\3pdvj.exec:\3pdvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\nhnbnt.exec:\nhnbnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\pdvdd.exec:\pdvdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\lffrlrf.exec:\lffrlrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\5frxffr.exec:\5frxffr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\1dvjj.exec:\1dvjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\jvjvd.exec:\jvjvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\htbbhb.exec:\htbbhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\tntnht.exec:\tntnht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\lffrxxl.exec:\lffrxxl.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\lrflxff.exec:\lrflxff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\5btthb.exec:\5btthb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\djpdp.exec:\djpdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\flrxrll.exec:\flrxrll.exe17⤵
- Executes dropped EXE
PID:2292 -
\??\c:\9nnnbh.exec:\9nnnbh.exe18⤵
- Executes dropped EXE
PID:484 -
\??\c:\jdpdj.exec:\jdpdj.exe19⤵
- Executes dropped EXE
PID:1120 -
\??\c:\ffxxxff.exec:\ffxxxff.exe20⤵
- Executes dropped EXE
PID:2020 -
\??\c:\tbbtth.exec:\tbbtth.exe21⤵
- Executes dropped EXE
PID:2168 -
\??\c:\jjvpd.exec:\jjvpd.exe22⤵
- Executes dropped EXE
PID:1104 -
\??\c:\jvjpj.exec:\jvjpj.exe23⤵
- Executes dropped EXE
PID:2936 -
\??\c:\fllffxx.exec:\fllffxx.exe24⤵
- Executes dropped EXE
PID:2296 -
\??\c:\hhhtbn.exec:\hhhtbn.exe25⤵
- Executes dropped EXE
PID:2308 -
\??\c:\vjvdp.exec:\vjvdp.exe26⤵
- Executes dropped EXE
PID:1976 -
\??\c:\xfrlfrx.exec:\xfrlfrx.exe27⤵
- Executes dropped EXE
PID:976 -
\??\c:\nhntbb.exec:\nhntbb.exe28⤵
- Executes dropped EXE
PID:1860 -
\??\c:\pvjdd.exec:\pvjdd.exe29⤵
- Executes dropped EXE
PID:1856 -
\??\c:\xfffrlf.exec:\xfffrlf.exe30⤵
- Executes dropped EXE
PID:1808 -
\??\c:\tnbtbb.exec:\tnbtbb.exe31⤵
- Executes dropped EXE
PID:1252 -
\??\c:\vpjvd.exec:\vpjvd.exe32⤵
- Executes dropped EXE
PID:2708 -
\??\c:\lffxrfr.exec:\lffxrfr.exe33⤵
- Executes dropped EXE
PID:3052 -
\??\c:\nttnbh.exec:\nttnbh.exe34⤵
- Executes dropped EXE
PID:2132 -
\??\c:\pvppv.exec:\pvppv.exe35⤵
- Executes dropped EXE
PID:2672 -
\??\c:\lrrxrrf.exec:\lrrxrrf.exe36⤵
- Executes dropped EXE
PID:1600 -
\??\c:\lxfxlrf.exec:\lxfxlrf.exe37⤵
- Executes dropped EXE
PID:2756 -
\??\c:\bbhbnn.exec:\bbhbnn.exe38⤵
- Executes dropped EXE
PID:2312 -
\??\c:\dvjvd.exec:\dvjvd.exe39⤵
- Executes dropped EXE
PID:2684 -
\??\c:\fxlrflx.exec:\fxlrflx.exe40⤵
- Executes dropped EXE
PID:2752 -
\??\c:\rxxllxf.exec:\rxxllxf.exe41⤵
- Executes dropped EXE
PID:2688 -
\??\c:\bthbnn.exec:\bthbnn.exe42⤵
- Executes dropped EXE
PID:1208 -
\??\c:\pjppj.exec:\pjppj.exe43⤵
- Executes dropped EXE
PID:2452 -
\??\c:\3pppj.exec:\3pppj.exe44⤵
- Executes dropped EXE
PID:1072 -
\??\c:\lffxlrf.exec:\lffxlrf.exe45⤵
- Executes dropped EXE
PID:2060 -
\??\c:\tbhnnn.exec:\tbhnnn.exe46⤵
- Executes dropped EXE
PID:1380 -
\??\c:\tnhbbn.exec:\tnhbbn.exe47⤵
- Executes dropped EXE
PID:2704 -
\??\c:\djjdv.exec:\djjdv.exe48⤵
- Executes dropped EXE
PID:2908 -
\??\c:\lrxflrl.exec:\lrxflrl.exe49⤵
- Executes dropped EXE
PID:3048 -
\??\c:\rlfxllr.exec:\rlfxllr.exe50⤵
- Executes dropped EXE
PID:2728 -
\??\c:\tnntbn.exec:\tnntbn.exe51⤵
- Executes dropped EXE
PID:836 -
\??\c:\vvpdj.exec:\vvpdj.exe52⤵
- Executes dropped EXE
PID:1792 -
\??\c:\xlrffll.exec:\xlrffll.exe53⤵
- Executes dropped EXE
PID:1376 -
\??\c:\flfxrxl.exec:\flfxrxl.exe54⤵
- Executes dropped EXE
PID:788 -
\??\c:\hhbtbn.exec:\hhbtbn.exe55⤵
- Executes dropped EXE
PID:528 -
\??\c:\bnnbbt.exec:\bnnbbt.exe56⤵
- Executes dropped EXE
PID:892 -
\??\c:\djjpv.exec:\djjpv.exe57⤵
- Executes dropped EXE
PID:2244 -
\??\c:\frfxlrx.exec:\frfxlrx.exe58⤵
- Executes dropped EXE
PID:2140 -
\??\c:\nnhnhh.exec:\nnhnhh.exe59⤵
- Executes dropped EXE
PID:2108 -
\??\c:\ppdvd.exec:\ppdvd.exe60⤵
- Executes dropped EXE
PID:1288 -
\??\c:\7vjvv.exec:\7vjvv.exe61⤵
- Executes dropped EXE
PID:1804 -
\??\c:\rxxlxfx.exec:\rxxlxfx.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1956 -
\??\c:\frrlxrx.exec:\frrlxrx.exe63⤵
- Executes dropped EXE
PID:2296 -
\??\c:\nhbbhh.exec:\nhbbhh.exe64⤵
- Executes dropped EXE
PID:1508 -
\??\c:\jvppv.exec:\jvppv.exe65⤵
- Executes dropped EXE
PID:2072 -
\??\c:\ffflrlf.exec:\ffflrlf.exe66⤵PID:1796
-
\??\c:\ntnnnh.exec:\ntnnnh.exe67⤵PID:1884
-
\??\c:\httnth.exec:\httnth.exe68⤵PID:708
-
\??\c:\pdvvv.exec:\pdvvv.exe69⤵PID:1744
-
\??\c:\rrfxflr.exec:\rrfxflr.exe70⤵PID:884
-
\??\c:\9hbnht.exec:\9hbnht.exe71⤵PID:1712
-
\??\c:\1tbtnn.exec:\1tbtnn.exe72⤵PID:2224
-
\??\c:\jdjjj.exec:\jdjjj.exe73⤵PID:2900
-
\??\c:\lflrrxr.exec:\lflrrxr.exe74⤵PID:2780
-
\??\c:\nnthbh.exec:\nnthbh.exe75⤵PID:2200
-
\??\c:\ttthhh.exec:\ttthhh.exe76⤵PID:2668
-
\??\c:\7pjpj.exec:\7pjpj.exe77⤵PID:1700
-
\??\c:\jdvjd.exec:\jdvjd.exe78⤵PID:2632
-
\??\c:\flffrll.exec:\flffrll.exe79⤵PID:1708
-
\??\c:\hnnnth.exec:\hnnnth.exe80⤵PID:2684
-
\??\c:\5dvjv.exec:\5dvjv.exe81⤵PID:2680
-
\??\c:\vvvdd.exec:\vvvdd.exe82⤵PID:1080
-
\??\c:\7ffxxrr.exec:\7ffxxrr.exe83⤵PID:2136
-
\??\c:\hnbhhb.exec:\hnbhhb.exe84⤵PID:2452
-
\??\c:\ttnntb.exec:\ttnntb.exe85⤵PID:624
-
\??\c:\pjdpj.exec:\pjdpj.exe86⤵PID:2916
-
\??\c:\fxllrrf.exec:\fxllrrf.exe87⤵PID:1380
-
\??\c:\rlllxlx.exec:\rlllxlx.exe88⤵PID:2704
-
\??\c:\nnhhth.exec:\nnhhth.exe89⤵PID:2912
-
\??\c:\bbthbt.exec:\bbthbt.exe90⤵PID:2848
-
\??\c:\vvppp.exec:\vvppp.exe91⤵
- System Location Discovery: System Language Discovery
PID:1704 -
\??\c:\xxffxll.exec:\xxffxll.exe92⤵PID:836
-
\??\c:\thhtnt.exec:\thhtnt.exe93⤵PID:1792
-
\??\c:\thttnn.exec:\thttnn.exe94⤵PID:632
-
\??\c:\vpdpj.exec:\vpdpj.exe95⤵PID:548
-
\??\c:\lfxxxxr.exec:\lfxxxxr.exe96⤵PID:1876
-
\??\c:\bnbhnb.exec:\bnbhnb.exe97⤵PID:892
-
\??\c:\hnhnnn.exec:\hnhnnn.exe98⤵PID:2164
-
\??\c:\vjddp.exec:\vjddp.exe99⤵PID:2040
-
\??\c:\lxxrrlr.exec:\lxxrrlr.exe100⤵PID:2144
-
\??\c:\bhnntt.exec:\bhnntt.exe101⤵PID:1484
-
\??\c:\ttbhbn.exec:\ttbhbn.exe102⤵PID:840
-
\??\c:\vvpvp.exec:\vvpvp.exe103⤵PID:2000
-
\??\c:\lllfflr.exec:\lllfflr.exe104⤵PID:580
-
\??\c:\frlffrr.exec:\frlffrr.exe105⤵PID:1492
-
\??\c:\hhhthb.exec:\hhhthb.exe106⤵PID:544
-
\??\c:\vvvdp.exec:\vvvdp.exe107⤵PID:2272
-
\??\c:\3pvpj.exec:\3pvpj.exe108⤵PID:1160
-
\??\c:\rfflrlf.exec:\rfflrlf.exe109⤵PID:1292
-
\??\c:\3lxlxlx.exec:\3lxlxlx.exe110⤵PID:1856
-
\??\c:\jjjdd.exec:\jjjdd.exe111⤵PID:1928
-
\??\c:\ppddv.exec:\ppddv.exe112⤵PID:2624
-
\??\c:\lllrxxf.exec:\lllrxxf.exe113⤵PID:2320
-
\??\c:\hbttnt.exec:\hbttnt.exe114⤵PID:2900
-
\??\c:\nbnntt.exec:\nbnntt.exe115⤵PID:2780
-
\??\c:\pjjjv.exec:\pjjjv.exe116⤵PID:2200
-
\??\c:\ddjpv.exec:\ddjpv.exe117⤵PID:2672
-
\??\c:\fffxxrx.exec:\fffxxrx.exe118⤵PID:1600
-
\??\c:\thttbb.exec:\thttbb.exe119⤵PID:2556
-
\??\c:\pvppv.exec:\pvppv.exe120⤵PID:2524
-
\??\c:\pvdvv.exec:\pvdvv.exe121⤵PID:2684
-
\??\c:\llrfrfx.exec:\llrfrfx.exe122⤵PID:2688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-