Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 23:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
281d087b05f9761db056db86c4a0d570N.exe
Resource
win7-20240729-en
6 signatures
120 seconds
General
-
Target
281d087b05f9761db056db86c4a0d570N.exe
-
Size
457KB
-
MD5
281d087b05f9761db056db86c4a0d570
-
SHA1
88e985c5551149782837f6b113c7ebe4f8677dc2
-
SHA256
09d9e3fb5d4c7f847ae8c39e266a154eaff18d1c0ff40384bddce848513e87e6
-
SHA512
665ac7701badf1abbe5d0c26dd591131a27593f3bb9dd4df4d7c043fb7796de17ecb28e7dd5c24c763f34a1db7eaa682b4089583c9f8ace07f38c9e4e60caffe
-
SSDEEP
6144:n3C9BRo7MlrWKo+lS0Le4xRSAoq78yoyfx93sEqkeGLWQMW4:n3C9yMo+S0L9xRnoq7H9xqYLzk
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2316-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1340-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1092-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2892-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1944-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2260-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2056-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2104-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/572-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3012-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2112-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1816-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1056-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1340 xrllxfr.exe 1092 ppppd.exe 2892 vvjvv.exe 3064 lflxlxf.exe 2852 bnhhnn.exe 1944 3xxfrfr.exe 2688 3vpdp.exe 1700 rrrllxr.exe 2260 bhnbhn.exe 2056 fxxfrxr.exe 2104 nhhtbh.exe 2340 5vpdp.exe 2980 9bbhbh.exe 572 bbhbnt.exe 3012 vvpdd.exe 1576 9tttnh.exe 840 xffrxlf.exe 2088 hhtbth.exe 2112 rrrfxfx.exe 2024 tbhtnb.exe 2216 hhthtt.exe 1932 rxflxlx.exe 832 httthn.exe 484 lrlfrfx.exe 1816 5tnnnh.exe 2300 3jvvd.exe 2584 bbhbth.exe 1000 9ddpv.exe 1516 nnnbth.exe 1056 3djdd.exe 692 ffxxllr.exe 2600 pjdpd.exe 1132 ffxfxlx.exe 2188 nththh.exe 1608 jvjdd.exe 2784 5lfrxfr.exe 2916 rxrxfrf.exe 2236 nbbtnb.exe 2724 5pjpd.exe 3060 xflrlrx.exe 2856 hbbhtb.exe 2708 ntnhtb.exe 1732 vddpd.exe 2368 xffrflf.exe 1336 5thbhh.exe 2192 hbbhbn.exe 2056 5jvvj.exe 2444 lfxxflx.exe 1068 9nntbh.exe 2032 dppvp.exe 1012 9rxlrlx.exe 3040 5hnntb.exe 3012 hbbhnt.exe 2664 jjddp.exe 2128 1lflllr.exe 2124 tnbhnt.exe 2088 nnnhbt.exe 788 pvvjv.exe 2144 rrlxrfr.exe 336 tntbnb.exe 2076 jpvdj.exe 2120 3dvjp.exe 832 5xrxxxf.exe 1556 1hhhhh.exe -
resource yara_rule behavioral1/memory/2316-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1340-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1092-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2104-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/572-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3012-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1816-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1056-287-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrlrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7btntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fxfxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtnt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1340 2316 281d087b05f9761db056db86c4a0d570N.exe 30 PID 2316 wrote to memory of 1340 2316 281d087b05f9761db056db86c4a0d570N.exe 30 PID 2316 wrote to memory of 1340 2316 281d087b05f9761db056db86c4a0d570N.exe 30 PID 2316 wrote to memory of 1340 2316 281d087b05f9761db056db86c4a0d570N.exe 30 PID 1340 wrote to memory of 1092 1340 xrllxfr.exe 31 PID 1340 wrote to memory of 1092 1340 xrllxfr.exe 31 PID 1340 wrote to memory of 1092 1340 xrllxfr.exe 31 PID 1340 wrote to memory of 1092 1340 xrllxfr.exe 31 PID 1092 wrote to memory of 2892 1092 ppppd.exe 32 PID 1092 wrote to memory of 2892 1092 ppppd.exe 32 PID 1092 wrote to memory of 2892 1092 ppppd.exe 32 PID 1092 wrote to memory of 2892 1092 ppppd.exe 32 PID 2892 wrote to memory of 3064 2892 vvjvv.exe 33 PID 2892 wrote to memory of 3064 2892 vvjvv.exe 33 PID 2892 wrote to memory of 3064 2892 vvjvv.exe 33 PID 2892 wrote to memory of 3064 2892 vvjvv.exe 33 PID 3064 wrote to memory of 2852 3064 lflxlxf.exe 34 PID 3064 wrote to memory of 2852 3064 lflxlxf.exe 34 PID 3064 wrote to memory of 2852 3064 lflxlxf.exe 34 PID 3064 wrote to memory of 2852 3064 lflxlxf.exe 34 PID 2852 wrote to memory of 1944 2852 bnhhnn.exe 35 PID 2852 wrote to memory of 1944 2852 bnhhnn.exe 35 PID 2852 wrote to memory of 1944 2852 bnhhnn.exe 35 PID 2852 wrote to memory of 1944 2852 bnhhnn.exe 35 PID 1944 wrote to memory of 2688 1944 3xxfrfr.exe 36 PID 1944 wrote to memory of 2688 1944 3xxfrfr.exe 36 PID 1944 wrote to memory of 2688 1944 3xxfrfr.exe 36 PID 1944 wrote to memory of 2688 1944 3xxfrfr.exe 36 PID 2688 wrote to memory of 1700 2688 3vpdp.exe 37 PID 2688 wrote to memory of 1700 2688 3vpdp.exe 37 PID 2688 wrote to memory of 1700 2688 3vpdp.exe 37 PID 2688 wrote to memory of 1700 2688 3vpdp.exe 37 PID 1700 wrote to memory of 2260 1700 rrrllxr.exe 38 PID 1700 wrote to memory of 2260 1700 rrrllxr.exe 38 PID 1700 wrote to memory of 2260 1700 rrrllxr.exe 38 PID 1700 wrote to memory of 2260 1700 rrrllxr.exe 38 PID 2260 wrote to memory of 2056 2260 bhnbhn.exe 39 PID 2260 wrote to memory of 2056 2260 bhnbhn.exe 39 PID 2260 wrote to memory of 2056 2260 bhnbhn.exe 39 PID 2260 wrote to memory of 2056 2260 bhnbhn.exe 39 PID 2056 wrote to memory of 2104 2056 fxxfrxr.exe 40 PID 2056 wrote to memory of 2104 2056 fxxfrxr.exe 40 PID 2056 wrote to memory of 2104 2056 fxxfrxr.exe 40 PID 2056 wrote to memory of 2104 2056 fxxfrxr.exe 40 PID 2104 wrote to memory of 2340 2104 nhhtbh.exe 41 PID 2104 wrote to memory of 2340 2104 nhhtbh.exe 41 PID 2104 wrote to memory of 2340 2104 nhhtbh.exe 41 PID 2104 wrote to memory of 2340 2104 nhhtbh.exe 41 PID 2340 wrote to memory of 2980 2340 5vpdp.exe 42 PID 2340 wrote to memory of 2980 2340 5vpdp.exe 42 PID 2340 wrote to memory of 2980 2340 5vpdp.exe 42 PID 2340 wrote to memory of 2980 2340 5vpdp.exe 42 PID 2980 wrote to memory of 572 2980 9bbhbh.exe 43 PID 2980 wrote to memory of 572 2980 9bbhbh.exe 43 PID 2980 wrote to memory of 572 2980 9bbhbh.exe 43 PID 2980 wrote to memory of 572 2980 9bbhbh.exe 43 PID 572 wrote to memory of 3012 572 bbhbnt.exe 44 PID 572 wrote to memory of 3012 572 bbhbnt.exe 44 PID 572 wrote to memory of 3012 572 bbhbnt.exe 44 PID 572 wrote to memory of 3012 572 bbhbnt.exe 44 PID 3012 wrote to memory of 1576 3012 vvpdd.exe 45 PID 3012 wrote to memory of 1576 3012 vvpdd.exe 45 PID 3012 wrote to memory of 1576 3012 vvpdd.exe 45 PID 3012 wrote to memory of 1576 3012 vvpdd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\281d087b05f9761db056db86c4a0d570N.exe"C:\Users\Admin\AppData\Local\Temp\281d087b05f9761db056db86c4a0d570N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\xrllxfr.exec:\xrllxfr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
\??\c:\ppppd.exec:\ppppd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
\??\c:\vvjvv.exec:\vvjvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\lflxlxf.exec:\lflxlxf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\bnhhnn.exec:\bnhhnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\3xxfrfr.exec:\3xxfrfr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\3vpdp.exec:\3vpdp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\rrrllxr.exec:\rrrllxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\bhnbhn.exec:\bhnbhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\fxxfrxr.exec:\fxxfrxr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\nhhtbh.exec:\nhhtbh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\5vpdp.exec:\5vpdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\9bbhbh.exec:\9bbhbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\bbhbnt.exec:\bbhbnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\vvpdd.exec:\vvpdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\9tttnh.exec:\9tttnh.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576 -
\??\c:\xffrxlf.exec:\xffrxlf.exe18⤵
- Executes dropped EXE
PID:840 -
\??\c:\hhtbth.exec:\hhtbth.exe19⤵
- Executes dropped EXE
PID:2088 -
\??\c:\rrrfxfx.exec:\rrrfxfx.exe20⤵
- Executes dropped EXE
PID:2112 -
\??\c:\tbhtnb.exec:\tbhtnb.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2024 -
\??\c:\hhthtt.exec:\hhthtt.exe22⤵
- Executes dropped EXE
PID:2216 -
\??\c:\rxflxlx.exec:\rxflxlx.exe23⤵
- Executes dropped EXE
PID:1932 -
\??\c:\httthn.exec:\httthn.exe24⤵
- Executes dropped EXE
PID:832 -
\??\c:\lrlfrfx.exec:\lrlfrfx.exe25⤵
- Executes dropped EXE
PID:484 -
\??\c:\5tnnnh.exec:\5tnnnh.exe26⤵
- Executes dropped EXE
PID:1816 -
\??\c:\3jvvd.exec:\3jvvd.exe27⤵
- Executes dropped EXE
PID:2300 -
\??\c:\bbhbth.exec:\bbhbth.exe28⤵
- Executes dropped EXE
PID:2584 -
\??\c:\9ddpv.exec:\9ddpv.exe29⤵
- Executes dropped EXE
PID:1000 -
\??\c:\nnnbth.exec:\nnnbth.exe30⤵
- Executes dropped EXE
PID:1516 -
\??\c:\3djdd.exec:\3djdd.exe31⤵
- Executes dropped EXE
PID:1056 -
\??\c:\ffxxllr.exec:\ffxxllr.exe32⤵
- Executes dropped EXE
PID:692 -
\??\c:\pjdpd.exec:\pjdpd.exe33⤵
- Executes dropped EXE
PID:2600 -
\??\c:\ffxfxlx.exec:\ffxfxlx.exe34⤵
- Executes dropped EXE
PID:1132 -
\??\c:\nththh.exec:\nththh.exe35⤵
- Executes dropped EXE
PID:2188 -
\??\c:\jvjdd.exec:\jvjdd.exe36⤵
- Executes dropped EXE
PID:1608 -
\??\c:\5lfrxfr.exec:\5lfrxfr.exe37⤵
- Executes dropped EXE
PID:2784 -
\??\c:\rxrxfrf.exec:\rxrxfrf.exe38⤵
- Executes dropped EXE
PID:2916 -
\??\c:\nbbtnb.exec:\nbbtnb.exe39⤵
- Executes dropped EXE
PID:2236 -
\??\c:\5pjpd.exec:\5pjpd.exe40⤵
- Executes dropped EXE
PID:2724 -
\??\c:\xflrlrx.exec:\xflrlrx.exe41⤵
- Executes dropped EXE
PID:3060 -
\??\c:\hbbhtb.exec:\hbbhtb.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
\??\c:\ntnhtb.exec:\ntnhtb.exe43⤵
- Executes dropped EXE
PID:2708 -
\??\c:\vddpd.exec:\vddpd.exe44⤵
- Executes dropped EXE
PID:1732 -
\??\c:\xffrflf.exec:\xffrflf.exe45⤵
- Executes dropped EXE
PID:2368 -
\??\c:\5thbhh.exec:\5thbhh.exe46⤵
- Executes dropped EXE
PID:1336 -
\??\c:\hbbhbn.exec:\hbbhbn.exe47⤵
- Executes dropped EXE
PID:2192 -
\??\c:\5jvvj.exec:\5jvvj.exe48⤵
- Executes dropped EXE
PID:2056 -
\??\c:\lfxxflx.exec:\lfxxflx.exe49⤵
- Executes dropped EXE
PID:2444 -
\??\c:\9nntbh.exec:\9nntbh.exe50⤵
- Executes dropped EXE
PID:1068 -
\??\c:\dppvp.exec:\dppvp.exe51⤵
- Executes dropped EXE
PID:2032 -
\??\c:\9rxlrlx.exec:\9rxlrlx.exe52⤵
- Executes dropped EXE
PID:1012 -
\??\c:\5hnntb.exec:\5hnntb.exe53⤵
- Executes dropped EXE
PID:3040 -
\??\c:\hbbhnt.exec:\hbbhnt.exe54⤵
- Executes dropped EXE
PID:3012 -
\??\c:\jjddp.exec:\jjddp.exe55⤵
- Executes dropped EXE
PID:2664 -
\??\c:\1lflllr.exec:\1lflllr.exe56⤵
- Executes dropped EXE
PID:2128 -
\??\c:\tnbhnt.exec:\tnbhnt.exe57⤵
- Executes dropped EXE
PID:2124 -
\??\c:\nnnhbt.exec:\nnnhbt.exe58⤵
- Executes dropped EXE
PID:2088 -
\??\c:\pvvjv.exec:\pvvjv.exe59⤵
- Executes dropped EXE
PID:788 -
\??\c:\rrlxrfr.exec:\rrlxrfr.exe60⤵
- Executes dropped EXE
PID:2144 -
\??\c:\tntbnb.exec:\tntbnb.exe61⤵
- Executes dropped EXE
PID:336 -
\??\c:\jpvdj.exec:\jpvdj.exe62⤵
- Executes dropped EXE
PID:2076 -
\??\c:\3dvjp.exec:\3dvjp.exe63⤵
- Executes dropped EXE
PID:2120 -
\??\c:\5xrxxxf.exec:\5xrxxxf.exe64⤵
- Executes dropped EXE
PID:832 -
\??\c:\1hhhhh.exec:\1hhhhh.exe65⤵
- Executes dropped EXE
PID:1556 -
\??\c:\7vppv.exec:\7vppv.exe66⤵PID:1760
-
\??\c:\3jvvj.exec:\3jvvj.exe67⤵PID:2656
-
\??\c:\llfrlrl.exec:\llfrlrl.exe68⤵PID:1676
-
\??\c:\hhthnn.exec:\hhthnn.exe69⤵PID:2304
-
\??\c:\tnnnbh.exec:\tnnnbh.exe70⤵PID:2660
-
\??\c:\jjdpv.exec:\jjdpv.exe71⤵PID:2572
-
\??\c:\llfrflx.exec:\llfrflx.exe72⤵PID:2364
-
\??\c:\bhhtbb.exec:\bhhtbb.exe73⤵PID:1528
-
\??\c:\pjvvj.exec:\pjvvj.exe74⤵PID:2308
-
\??\c:\pjjjj.exec:\pjjjj.exe75⤵PID:2312
-
\??\c:\lxrfxlx.exec:\lxrfxlx.exe76⤵PID:2904
-
\??\c:\9flfrlr.exec:\9flfrlr.exe77⤵PID:1604
-
\??\c:\nhbhtt.exec:\nhbhtt.exe78⤵PID:2884
-
\??\c:\pjvpp.exec:\pjvpp.exe79⤵PID:2212
-
\??\c:\ddvdj.exec:\ddvdj.exe80⤵PID:2952
-
\??\c:\rlxrfrx.exec:\rlxrfrx.exe81⤵PID:3024
-
\??\c:\3hnttb.exec:\3hnttb.exe82⤵PID:3020
-
\??\c:\hbnttn.exec:\hbnttn.exe83⤵PID:3008
-
\??\c:\1vvvj.exec:\1vvvj.exe84⤵PID:2712
-
\??\c:\7flrrfr.exec:\7flrrfr.exe85⤵PID:2688
-
\??\c:\btbhnt.exec:\btbhnt.exe86⤵PID:1348
-
\??\c:\nhhnhn.exec:\nhhnhn.exe87⤵PID:2276
-
\??\c:\jdvvv.exec:\jdvvv.exe88⤵PID:956
-
\??\c:\rrlxfrl.exec:\rrlxfrl.exe89⤵PID:2060
-
\??\c:\xxrxxfr.exec:\xxrxxfr.exe90⤵PID:2176
-
\??\c:\ttnnbh.exec:\ttnnbh.exe91⤵PID:3016
-
\??\c:\pjdvd.exec:\pjdvd.exe92⤵PID:1964
-
\??\c:\9vpdj.exec:\9vpdj.exe93⤵PID:1108
-
\??\c:\ffxrrfr.exec:\ffxrrfr.exe94⤵PID:1960
-
\??\c:\ntthtb.exec:\ntthtb.exe95⤵PID:848
-
\??\c:\jjjpd.exec:\jjjpd.exe96⤵PID:2296
-
\??\c:\jjdjj.exec:\jjdjj.exe97⤵PID:1744
-
\??\c:\7ffllrl.exec:\7ffllrl.exe98⤵PID:2128
-
\??\c:\5hhttt.exec:\5hhttt.exe99⤵PID:2096
-
\??\c:\5hbhtn.exec:\5hbhtn.exe100⤵PID:2088
-
\??\c:\vvvjd.exec:\vvvjd.exe101⤵PID:1728
-
\??\c:\9lfrrxl.exec:\9lfrrxl.exe102⤵PID:2144
-
\??\c:\lfxflxl.exec:\lfxflxl.exe103⤵PID:916
-
\??\c:\9bttht.exec:\9bttht.exe104⤵PID:2076
-
\??\c:\pjvjv.exec:\pjvjv.exe105⤵PID:2512
-
\??\c:\vpjpd.exec:\vpjpd.exe106⤵PID:832
-
\??\c:\9ffrlxr.exec:\9ffrlxr.exe107⤵PID:1692
-
\??\c:\nnnbnt.exec:\nnnbnt.exe108⤵PID:1760
-
\??\c:\htnhnn.exec:\htnhnn.exe109⤵PID:2556
-
\??\c:\7vvvj.exec:\7vvvj.exe110⤵PID:1676
-
\??\c:\frfflff.exec:\frfflff.exe111⤵PID:1788
-
\??\c:\bhhnnt.exec:\bhhnnt.exe112⤵PID:632
-
\??\c:\htnthn.exec:\htnthn.exe113⤵PID:1156
-
\??\c:\3pjdd.exec:\3pjdd.exe114⤵PID:2364
-
\??\c:\pppjd.exec:\pppjd.exe115⤵PID:1244
-
\??\c:\rrlxffx.exec:\rrlxffx.exe116⤵PID:2652
-
\??\c:\9btttb.exec:\9btttb.exe117⤵PID:2380
-
\??\c:\ttntbb.exec:\ttntbb.exe118⤵PID:2044
-
\??\c:\ppvjv.exec:\ppvjv.exe119⤵PID:1596
-
\??\c:\lllrflf.exec:\lllrflf.exe120⤵PID:1092
-
\??\c:\7nbbbb.exec:\7nbbbb.exe121⤵PID:2936
-
\??\c:\vpddp.exec:\vpddp.exe122⤵PID:2968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-