Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 09:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
736a73aa85054b11a5f52ab365705b80N.exe
Resource
win7-20240705-en
6 signatures
120 seconds
General
-
Target
736a73aa85054b11a5f52ab365705b80N.exe
-
Size
225KB
-
MD5
736a73aa85054b11a5f52ab365705b80
-
SHA1
6475ba7cfec5ccf10c02a396375bf7fe7437b436
-
SHA256
47515ceed1617cbf96364188b450e3ebab2058110736a6cfc5013339cf0d3521
-
SHA512
728defb4534e20c6cc6e0be000663225458eac6efe26104aa2f2d1cf966a9c32820b0bc18010a9cbef32d2c02ce22e0ff6598eb1be05e9f9a3e6e1d388eb60a9
-
SSDEEP
6144:n3C9BRo7tvnJ9oEz2Eu9XgcVyDOoZU0wGy:n3C9ytvnV2NQAo20wGy
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2536-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2248-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1544-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1916-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1536-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2152-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/784-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2016-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2556-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2276-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2552 xxrxflx.exe 2248 tbnnnb.exe 2220 ddpdv.exe 2516 rrfrfrf.exe 1544 hhbthh.exe 2912 dddjj.exe 2780 9xlflll.exe 2976 nnnbbb.exe 2660 nnhnhh.exe 2896 ppvdd.exe 2708 7rrfrxr.exe 2284 7ttnnt.exe 1916 3hbhth.exe 2736 pppdp.exe 1536 llrflxf.exe 2604 xxflrfl.exe 1364 ttbnbh.exe 1256 dddpj.exe 3016 fffflrf.exe 2152 flllrrf.exe 2296 9vvdp.exe 784 jjjvp.exe 296 lfxflrl.exe 2016 5tthtb.exe 2324 vdjpv.exe 2556 jjdpj.exe 2316 5rrxrfl.exe 1892 tnhtht.exe 1764 vvvdj.exe 2584 dpvjd.exe 2276 rlllxfl.exe 2248 nnnbhh.exe 1500 lrrxllx.exe 2968 rrfxlxl.exe 2728 bbtttb.exe 2448 hhbhtb.exe 1076 3ppjv.exe 2928 jjjjd.exe 3036 7lflxfx.exe 2952 5xrfrfr.exe 2976 tbbnbh.exe 2392 5thhtb.exe 2668 ppjjv.exe 1936 9dpvd.exe 1328 fxxlxlr.exe 1860 rrfxlxl.exe 2004 1nhthn.exe 2704 dddvp.exe 1612 5vvdp.exe 2000 jpdvj.exe 1704 lrffffr.exe 1708 ttntnt.exe 2980 1hbthn.exe 2868 ppvjj.exe 1552 jjdpp.exe 2336 3flxrfr.exe 1976 xxlrllf.exe 2224 hbnhbb.exe 296 nhtnth.exe 1512 jjdjv.exe 1508 1jdvd.exe 1884 llxfxfr.exe 1896 xffllfx.exe 2316 bhtnht.exe -
resource yara_rule behavioral1/memory/2536-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2248-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1544-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2152-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/784-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2016-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2276-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btthtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1flxfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9btnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2552 2536 736a73aa85054b11a5f52ab365705b80N.exe 30 PID 2536 wrote to memory of 2552 2536 736a73aa85054b11a5f52ab365705b80N.exe 30 PID 2536 wrote to memory of 2552 2536 736a73aa85054b11a5f52ab365705b80N.exe 30 PID 2536 wrote to memory of 2552 2536 736a73aa85054b11a5f52ab365705b80N.exe 30 PID 2552 wrote to memory of 2248 2552 xxrxflx.exe 31 PID 2552 wrote to memory of 2248 2552 xxrxflx.exe 31 PID 2552 wrote to memory of 2248 2552 xxrxflx.exe 31 PID 2552 wrote to memory of 2248 2552 xxrxflx.exe 31 PID 2248 wrote to memory of 2220 2248 tbnnnb.exe 32 PID 2248 wrote to memory of 2220 2248 tbnnnb.exe 32 PID 2248 wrote to memory of 2220 2248 tbnnnb.exe 32 PID 2248 wrote to memory of 2220 2248 tbnnnb.exe 32 PID 2220 wrote to memory of 2516 2220 ddpdv.exe 33 PID 2220 wrote to memory of 2516 2220 ddpdv.exe 33 PID 2220 wrote to memory of 2516 2220 ddpdv.exe 33 PID 2220 wrote to memory of 2516 2220 ddpdv.exe 33 PID 2516 wrote to memory of 1544 2516 rrfrfrf.exe 34 PID 2516 wrote to memory of 1544 2516 rrfrfrf.exe 34 PID 2516 wrote to memory of 1544 2516 rrfrfrf.exe 34 PID 2516 wrote to memory of 1544 2516 rrfrfrf.exe 34 PID 1544 wrote to memory of 2912 1544 hhbthh.exe 35 PID 1544 wrote to memory of 2912 1544 hhbthh.exe 35 PID 1544 wrote to memory of 2912 1544 hhbthh.exe 35 PID 1544 wrote to memory of 2912 1544 hhbthh.exe 35 PID 2912 wrote to memory of 2780 2912 dddjj.exe 36 PID 2912 wrote to memory of 2780 2912 dddjj.exe 36 PID 2912 wrote to memory of 2780 2912 dddjj.exe 36 PID 2912 wrote to memory of 2780 2912 dddjj.exe 36 PID 2780 wrote to memory of 2976 2780 9xlflll.exe 37 PID 2780 wrote to memory of 2976 2780 9xlflll.exe 37 PID 2780 wrote to memory of 2976 2780 9xlflll.exe 37 PID 2780 wrote to memory of 2976 2780 9xlflll.exe 37 PID 2976 wrote to memory of 2660 2976 nnnbbb.exe 38 PID 2976 wrote to memory of 2660 2976 nnnbbb.exe 38 PID 2976 wrote to memory of 2660 2976 nnnbbb.exe 38 PID 2976 wrote to memory of 2660 2976 nnnbbb.exe 38 PID 2660 wrote to memory of 2896 2660 nnhnhh.exe 39 PID 2660 wrote to memory of 2896 2660 nnhnhh.exe 39 PID 2660 wrote to memory of 2896 2660 nnhnhh.exe 39 PID 2660 wrote to memory of 2896 2660 nnhnhh.exe 39 PID 2896 wrote to memory of 2708 2896 ppvdd.exe 40 PID 2896 wrote to memory of 2708 2896 ppvdd.exe 40 PID 2896 wrote to memory of 2708 2896 ppvdd.exe 40 PID 2896 wrote to memory of 2708 2896 ppvdd.exe 40 PID 2708 wrote to memory of 2284 2708 7rrfrxr.exe 41 PID 2708 wrote to memory of 2284 2708 7rrfrxr.exe 41 PID 2708 wrote to memory of 2284 2708 7rrfrxr.exe 41 PID 2708 wrote to memory of 2284 2708 7rrfrxr.exe 41 PID 2284 wrote to memory of 1916 2284 7ttnnt.exe 42 PID 2284 wrote to memory of 1916 2284 7ttnnt.exe 42 PID 2284 wrote to memory of 1916 2284 7ttnnt.exe 42 PID 2284 wrote to memory of 1916 2284 7ttnnt.exe 42 PID 1916 wrote to memory of 2736 1916 3hbhth.exe 43 PID 1916 wrote to memory of 2736 1916 3hbhth.exe 43 PID 1916 wrote to memory of 2736 1916 3hbhth.exe 43 PID 1916 wrote to memory of 2736 1916 3hbhth.exe 43 PID 2736 wrote to memory of 1536 2736 pppdp.exe 45 PID 2736 wrote to memory of 1536 2736 pppdp.exe 45 PID 2736 wrote to memory of 1536 2736 pppdp.exe 45 PID 2736 wrote to memory of 1536 2736 pppdp.exe 45 PID 1536 wrote to memory of 2604 1536 llrflxf.exe 46 PID 1536 wrote to memory of 2604 1536 llrflxf.exe 46 PID 1536 wrote to memory of 2604 1536 llrflxf.exe 46 PID 1536 wrote to memory of 2604 1536 llrflxf.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\736a73aa85054b11a5f52ab365705b80N.exe"C:\Users\Admin\AppData\Local\Temp\736a73aa85054b11a5f52ab365705b80N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\xxrxflx.exec:\xxrxflx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\tbnnnb.exec:\tbnnnb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\ddpdv.exec:\ddpdv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\rrfrfrf.exec:\rrfrfrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\hhbthh.exec:\hhbthh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\dddjj.exec:\dddjj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\9xlflll.exec:\9xlflll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\nnnbbb.exec:\nnnbbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\nnhnhh.exec:\nnhnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\ppvdd.exec:\ppvdd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\7rrfrxr.exec:\7rrfrxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\7ttnnt.exec:\7ttnnt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\3hbhth.exec:\3hbhth.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\pppdp.exec:\pppdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\llrflxf.exec:\llrflxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\xxflrfl.exec:\xxflrfl.exe17⤵
- Executes dropped EXE
PID:2604 -
\??\c:\ttbnbh.exec:\ttbnbh.exe18⤵
- Executes dropped EXE
PID:1364 -
\??\c:\dddpj.exec:\dddpj.exe19⤵
- Executes dropped EXE
PID:1256 -
\??\c:\fffflrf.exec:\fffflrf.exe20⤵
- Executes dropped EXE
PID:3016 -
\??\c:\flllrrf.exec:\flllrrf.exe21⤵
- Executes dropped EXE
PID:2152 -
\??\c:\9vvdp.exec:\9vvdp.exe22⤵
- Executes dropped EXE
PID:2296 -
\??\c:\jjjvp.exec:\jjjvp.exe23⤵
- Executes dropped EXE
PID:784 -
\??\c:\lfxflrl.exec:\lfxflrl.exe24⤵
- Executes dropped EXE
PID:296 -
\??\c:\5tthtb.exec:\5tthtb.exe25⤵
- Executes dropped EXE
PID:2016 -
\??\c:\vdjpv.exec:\vdjpv.exe26⤵
- Executes dropped EXE
PID:2324 -
\??\c:\jjdpj.exec:\jjdpj.exe27⤵
- Executes dropped EXE
PID:2556 -
\??\c:\5rrxrfl.exec:\5rrxrfl.exe28⤵
- Executes dropped EXE
PID:2316 -
\??\c:\tnhtht.exec:\tnhtht.exe29⤵
- Executes dropped EXE
PID:1892 -
\??\c:\vvvdj.exec:\vvvdj.exe30⤵
- Executes dropped EXE
PID:1764 -
\??\c:\dpvjd.exec:\dpvjd.exe31⤵
- Executes dropped EXE
PID:2584 -
\??\c:\rlllxfl.exec:\rlllxfl.exe32⤵
- Executes dropped EXE
PID:2276 -
\??\c:\nnnbhh.exec:\nnnbhh.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248 -
\??\c:\lrrxllx.exec:\lrrxllx.exe34⤵
- Executes dropped EXE
PID:1500 -
\??\c:\rrfxlxl.exec:\rrfxlxl.exe35⤵
- Executes dropped EXE
PID:2968 -
\??\c:\bbtttb.exec:\bbtttb.exe36⤵
- Executes dropped EXE
PID:2728 -
\??\c:\hhbhtb.exec:\hhbhtb.exe37⤵
- Executes dropped EXE
PID:2448 -
\??\c:\3ppjv.exec:\3ppjv.exe38⤵
- Executes dropped EXE
PID:1076 -
\??\c:\jjjjd.exec:\jjjjd.exe39⤵
- Executes dropped EXE
PID:2928 -
\??\c:\7lflxfx.exec:\7lflxfx.exe40⤵
- Executes dropped EXE
PID:3036 -
\??\c:\5xrfrfr.exec:\5xrfrfr.exe41⤵
- Executes dropped EXE
PID:2952 -
\??\c:\tbbnbh.exec:\tbbnbh.exe42⤵
- Executes dropped EXE
PID:2976 -
\??\c:\5thhtb.exec:\5thhtb.exe43⤵
- Executes dropped EXE
PID:2392 -
\??\c:\ppjjv.exec:\ppjjv.exe44⤵
- Executes dropped EXE
PID:2668 -
\??\c:\9dpvd.exec:\9dpvd.exe45⤵
- Executes dropped EXE
PID:1936 -
\??\c:\fxxlxlr.exec:\fxxlxlr.exe46⤵
- Executes dropped EXE
PID:1328 -
\??\c:\rrfxlxl.exec:\rrfxlxl.exe47⤵
- Executes dropped EXE
PID:1860 -
\??\c:\1nhthn.exec:\1nhthn.exe48⤵
- Executes dropped EXE
PID:2004 -
\??\c:\dddvp.exec:\dddvp.exe49⤵
- Executes dropped EXE
PID:2704 -
\??\c:\5vvdp.exec:\5vvdp.exe50⤵
- Executes dropped EXE
PID:1612 -
\??\c:\jpdvj.exec:\jpdvj.exe51⤵
- Executes dropped EXE
PID:2000 -
\??\c:\lrffffr.exec:\lrffffr.exe52⤵
- Executes dropped EXE
PID:1704 -
\??\c:\ttntnt.exec:\ttntnt.exe53⤵
- Executes dropped EXE
PID:1708 -
\??\c:\1hbthn.exec:\1hbthn.exe54⤵
- Executes dropped EXE
PID:2980 -
\??\c:\ppvjj.exec:\ppvjj.exe55⤵
- Executes dropped EXE
PID:2868 -
\??\c:\jjdpp.exec:\jjdpp.exe56⤵
- Executes dropped EXE
PID:1552 -
\??\c:\3flxrfr.exec:\3flxrfr.exe57⤵
- Executes dropped EXE
PID:2336 -
\??\c:\xxlrllf.exec:\xxlrllf.exe58⤵
- Executes dropped EXE
PID:1976 -
\??\c:\hbnhbb.exec:\hbnhbb.exe59⤵
- Executes dropped EXE
PID:2224 -
\??\c:\nhtnth.exec:\nhtnth.exe60⤵
- Executes dropped EXE
PID:296 -
\??\c:\jjdjv.exec:\jjdjv.exe61⤵
- Executes dropped EXE
PID:1512 -
\??\c:\1jdvd.exec:\1jdvd.exe62⤵
- Executes dropped EXE
PID:1508 -
\??\c:\llxfxfr.exec:\llxfxfr.exe63⤵
- Executes dropped EXE
PID:1884 -
\??\c:\xffllfx.exec:\xffllfx.exe64⤵
- Executes dropped EXE
PID:1896 -
\??\c:\bhtnht.exec:\bhtnht.exe65⤵
- Executes dropped EXE
PID:2316 -
\??\c:\bbhthb.exec:\bbhthb.exe66⤵PID:2600
-
\??\c:\vvjvp.exec:\vvjvp.exe67⤵
- System Location Discovery: System Language Discovery
PID:1640 -
\??\c:\9dddj.exec:\9dddj.exe68⤵PID:2564
-
\??\c:\rrfflrl.exec:\rrfflrl.exe69⤵PID:2060
-
\??\c:\9fxfffx.exec:\9fxfffx.exe70⤵PID:2504
-
\??\c:\hnhbnb.exec:\hnhbnb.exe71⤵
- System Location Discovery: System Language Discovery
PID:2492 -
\??\c:\bhhtth.exec:\bhhtth.exe72⤵PID:2076
-
\??\c:\5dvpj.exec:\5dvpj.exe73⤵PID:2820
-
\??\c:\7vpvd.exec:\7vpvd.exe74⤵PID:1984
-
\??\c:\3rlrllx.exec:\3rlrllx.exe75⤵PID:2788
-
\??\c:\rfrxflr.exec:\rfrxflr.exe76⤵PID:3044
-
\??\c:\5bbtnt.exec:\5bbtnt.exe77⤵PID:2644
-
\??\c:\tnhhnb.exec:\tnhhnb.exe78⤵PID:2756
-
\??\c:\vpdpd.exec:\vpdpd.exe79⤵PID:3004
-
\??\c:\9ppvj.exec:\9ppvj.exe80⤵PID:2920
-
\??\c:\7rlrxlx.exec:\7rlrxlx.exe81⤵PID:2648
-
\??\c:\xrlrlrf.exec:\xrlrlrf.exe82⤵PID:2700
-
\??\c:\nhhtnb.exec:\nhhtnb.exe83⤵PID:2688
-
\??\c:\1nnnbn.exec:\1nnnbn.exe84⤵PID:2284
-
\??\c:\vppjd.exec:\vppjd.exe85⤵PID:2872
-
\??\c:\djjpv.exec:\djjpv.exe86⤵PID:1744
-
\??\c:\lllxflx.exec:\lllxflx.exe87⤵PID:2464
-
\??\c:\fflrrfr.exec:\fflrrfr.exe88⤵PID:2168
-
\??\c:\3bhnbh.exec:\3bhnbh.exe89⤵PID:2828
-
\??\c:\3dpvj.exec:\3dpvj.exe90⤵PID:1904
-
\??\c:\pjpvj.exec:\pjpvj.exe91⤵PID:1484
-
\??\c:\pjdpv.exec:\pjdpv.exe92⤵PID:2724
-
\??\c:\llxfllr.exec:\llxfllr.exe93⤵PID:2852
-
\??\c:\xrfxrxr.exec:\xrfxrxr.exe94⤵PID:2292
-
\??\c:\hbbbnn.exec:\hbbbnn.exe95⤵PID:2236
-
\??\c:\vpddp.exec:\vpddp.exe96⤵PID:1912
-
\??\c:\3dvdd.exec:\3dvdd.exe97⤵PID:572
-
\??\c:\rlffxxl.exec:\rlffxxl.exe98⤵PID:852
-
\??\c:\5llxrrl.exec:\5llxrrl.exe99⤵PID:2856
-
\??\c:\nhnhbt.exec:\nhnhbt.exe100⤵PID:1548
-
\??\c:\hnhthh.exec:\hnhthh.exe101⤵PID:2840
-
\??\c:\jvjjv.exec:\jvjjv.exe102⤵PID:2244
-
\??\c:\dvjvj.exec:\dvjvj.exe103⤵
- System Location Discovery: System Language Discovery
PID:2388 -
\??\c:\lxfrxrx.exec:\lxfrxrx.exe104⤵PID:1900
-
\??\c:\fllxlxx.exec:\fllxlxx.exe105⤵PID:2344
-
\??\c:\bbntbt.exec:\bbntbt.exe106⤵PID:2124
-
\??\c:\hhhthn.exec:\hhhthn.exe107⤵PID:2552
-
\??\c:\pjppj.exec:\pjppj.exe108⤵PID:2576
-
\??\c:\9vppj.exec:\9vppj.exe109⤵PID:2248
-
\??\c:\fxrxlrf.exec:\fxrxlrf.exe110⤵PID:1604
-
\??\c:\fxrxxxl.exec:\fxrxxxl.exe111⤵PID:2520
-
\??\c:\ttnbnt.exec:\ttnbnt.exe112⤵PID:2784
-
\??\c:\bhthbh.exec:\bhthbh.exe113⤵PID:2264
-
\??\c:\3dppd.exec:\3dppd.exe114⤵PID:1544
-
\??\c:\vvjpj.exec:\vvjpj.exe115⤵PID:2792
-
\??\c:\ffllxxl.exec:\ffllxxl.exe116⤵PID:2996
-
\??\c:\1xlrxfr.exec:\1xlrxfr.exe117⤵PID:2832
-
\??\c:\ntthtn.exec:\ntthtn.exe118⤵PID:2632
-
\??\c:\hbntbb.exec:\hbntbb.exe119⤵PID:2392
-
\??\c:\vpjjp.exec:\vpjjp.exe120⤵PID:792
-
\??\c:\jjvdv.exec:\jjvdv.exe121⤵PID:2364
-
\??\c:\fflrflr.exec:\fflrflr.exe122⤵PID:1328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-