Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 11:08 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
84662193a084a8a84001e14c27b1a600N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
84662193a084a8a84001e14c27b1a600N.exe
-
Size
123KB
-
MD5
84662193a084a8a84001e14c27b1a600
-
SHA1
8f8e0bd0cb951d025dea233a5a318c5eee82811d
-
SHA256
1356da78c06b99468c12625e9468784239787fd3194914ae2448c40cd38f51ab
-
SHA512
77770188215e978842e7cfdd8e82b81092f705d0c6563a01e6b07c731eaf2c4a4fa010c5ca17dad93d21d1aaf07d470ef7c895e41e65a4171d0a7390a4d797ca
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73oYUCD7R2F2UVbyy0NgVyFsJJ:ymb3NkkiQ3mdBjFo73HUoMsAbrxVbV
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4260-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3936-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1688-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1800-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1800-48-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2440-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/820-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1788-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2952-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3488-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1064-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/668-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2708-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1048-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/808-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4956-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1464-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2452-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2212-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3696-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1364-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1516-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3820-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3936 rflffll.exe 696 3ttnhh.exe 1688 vvjdd.exe 820 3jjpv.exe 2440 xrlfrrl.exe 1800 nhhhnn.exe 2952 tbhbbb.exe 1788 fxrlxxx.exe 4724 nbbthh.exe 3488 bnnbnn.exe 1064 pdpdv.exe 908 rffffff.exe 2800 lrlxxxl.exe 3740 bnbtnn.exe 668 pvvpj.exe 2708 1lfxrrl.exe 1048 btbbhh.exe 536 djpjd.exe 808 ffrfrlf.exe 4956 bbhbtn.exe 2156 httnnn.exe 1464 1jpjj.exe 2452 rfrllll.exe 2212 rlxxrlf.exe 3696 5hbtnh.exe 1364 jpvvv.exe 1516 rlrrffx.exe 3324 tnbtbb.exe 3408 nbnhbb.exe 3820 dvjvv.exe 3692 lxxfxxf.exe 1392 nhtthb.exe 1156 jjpjd.exe 4456 xrfffxx.exe 3108 bthbbt.exe 4032 jvpjd.exe 4784 lxxxrfr.exe 2256 nhbthh.exe 1536 hnnbtn.exe 1384 dvjjd.exe 4636 9vvpj.exe 5020 htbttt.exe 4556 pdjjd.exe 3384 lflrlll.exe 4372 fxlfrrl.exe 1948 dvddd.exe 3168 vpvpd.exe 1780 fffxllf.exe 4828 1llfxrl.exe 3268 3ntnnh.exe 228 thnhhh.exe 4292 pjvjj.exe 312 7pppj.exe 3904 fxrrrrl.exe 2168 fxfxxrf.exe 996 bbhbbn.exe 512 bbnbtn.exe 3428 vpdpp.exe 908 dvpjp.exe 3816 xrffxff.exe 4332 1xffxxr.exe 3496 bnttnn.exe 1684 dpvpd.exe 744 3frlllr.exe -
resource yara_rule behavioral2/memory/4260-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3936-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/696-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1800-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/820-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1788-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2952-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3488-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1064-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/668-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2708-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1048-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/808-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4956-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1464-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2452-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2212-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3696-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1364-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3820-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7llfxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9llfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3936 4260 84662193a084a8a84001e14c27b1a600N.exe 84 PID 4260 wrote to memory of 3936 4260 84662193a084a8a84001e14c27b1a600N.exe 84 PID 4260 wrote to memory of 3936 4260 84662193a084a8a84001e14c27b1a600N.exe 84 PID 3936 wrote to memory of 696 3936 rflffll.exe 86 PID 3936 wrote to memory of 696 3936 rflffll.exe 86 PID 3936 wrote to memory of 696 3936 rflffll.exe 86 PID 696 wrote to memory of 1688 696 3ttnhh.exe 87 PID 696 wrote to memory of 1688 696 3ttnhh.exe 87 PID 696 wrote to memory of 1688 696 3ttnhh.exe 87 PID 1688 wrote to memory of 820 1688 vvjdd.exe 88 PID 1688 wrote to memory of 820 1688 vvjdd.exe 88 PID 1688 wrote to memory of 820 1688 vvjdd.exe 88 PID 820 wrote to memory of 2440 820 3jjpv.exe 89 PID 820 wrote to memory of 2440 820 3jjpv.exe 89 PID 820 wrote to memory of 2440 820 3jjpv.exe 89 PID 2440 wrote to memory of 1800 2440 xrlfrrl.exe 90 PID 2440 wrote to memory of 1800 2440 xrlfrrl.exe 90 PID 2440 wrote to memory of 1800 2440 xrlfrrl.exe 90 PID 1800 wrote to memory of 2952 1800 nhhhnn.exe 91 PID 1800 wrote to memory of 2952 1800 nhhhnn.exe 91 PID 1800 wrote to memory of 2952 1800 nhhhnn.exe 91 PID 2952 wrote to memory of 1788 2952 tbhbbb.exe 92 PID 2952 wrote to memory of 1788 2952 tbhbbb.exe 92 PID 2952 wrote to memory of 1788 2952 tbhbbb.exe 92 PID 1788 wrote to memory of 4724 1788 fxrlxxx.exe 93 PID 1788 wrote to memory of 4724 1788 fxrlxxx.exe 93 PID 1788 wrote to memory of 4724 1788 fxrlxxx.exe 93 PID 4724 wrote to memory of 3488 4724 nbbthh.exe 94 PID 4724 wrote to memory of 3488 4724 nbbthh.exe 94 PID 4724 wrote to memory of 3488 4724 nbbthh.exe 94 PID 3488 wrote to memory of 1064 3488 bnnbnn.exe 95 PID 3488 wrote to memory of 1064 3488 bnnbnn.exe 95 PID 3488 wrote to memory of 1064 3488 bnnbnn.exe 95 PID 1064 wrote to memory of 908 1064 pdpdv.exe 96 PID 1064 wrote to memory of 908 1064 pdpdv.exe 96 PID 1064 wrote to memory of 908 1064 pdpdv.exe 96 PID 908 wrote to memory of 2800 908 rffffff.exe 97 PID 908 wrote to memory of 2800 908 rffffff.exe 97 PID 908 wrote to memory of 2800 908 rffffff.exe 97 PID 2800 wrote to memory of 3740 2800 lrlxxxl.exe 98 PID 2800 wrote to memory of 3740 2800 lrlxxxl.exe 98 PID 2800 wrote to memory of 3740 2800 lrlxxxl.exe 98 PID 3740 wrote to memory of 668 3740 bnbtnn.exe 100 PID 3740 wrote to memory of 668 3740 bnbtnn.exe 100 PID 3740 wrote to memory of 668 3740 bnbtnn.exe 100 PID 668 wrote to memory of 2708 668 pvvpj.exe 101 PID 668 wrote to memory of 2708 668 pvvpj.exe 101 PID 668 wrote to memory of 2708 668 pvvpj.exe 101 PID 2708 wrote to memory of 1048 2708 1lfxrrl.exe 102 PID 2708 wrote to memory of 1048 2708 1lfxrrl.exe 102 PID 2708 wrote to memory of 1048 2708 1lfxrrl.exe 102 PID 1048 wrote to memory of 536 1048 btbbhh.exe 103 PID 1048 wrote to memory of 536 1048 btbbhh.exe 103 PID 1048 wrote to memory of 536 1048 btbbhh.exe 103 PID 536 wrote to memory of 808 536 djpjd.exe 104 PID 536 wrote to memory of 808 536 djpjd.exe 104 PID 536 wrote to memory of 808 536 djpjd.exe 104 PID 808 wrote to memory of 4956 808 ffrfrlf.exe 105 PID 808 wrote to memory of 4956 808 ffrfrlf.exe 105 PID 808 wrote to memory of 4956 808 ffrfrlf.exe 105 PID 4956 wrote to memory of 2156 4956 bbhbtn.exe 106 PID 4956 wrote to memory of 2156 4956 bbhbtn.exe 106 PID 4956 wrote to memory of 2156 4956 bbhbtn.exe 106 PID 2156 wrote to memory of 1464 2156 httnnn.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\84662193a084a8a84001e14c27b1a600N.exe"C:\Users\Admin\AppData\Local\Temp\84662193a084a8a84001e14c27b1a600N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\rflffll.exec:\rflffll.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\3ttnhh.exec:\3ttnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\vvjdd.exec:\vvjdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\3jjpv.exec:\3jjpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
\??\c:\xrlfrrl.exec:\xrlfrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\nhhhnn.exec:\nhhhnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\tbhbbb.exec:\tbhbbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\fxrlxxx.exec:\fxrlxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\nbbthh.exec:\nbbthh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
\??\c:\bnnbnn.exec:\bnnbnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\pdpdv.exec:\pdpdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\rffffff.exec:\rffffff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
\??\c:\lrlxxxl.exec:\lrlxxxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\bnbtnn.exec:\bnbtnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740 -
\??\c:\pvvpj.exec:\pvvpj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\1lfxrrl.exec:\1lfxrrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\btbbhh.exec:\btbbhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\djpjd.exec:\djpjd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\ffrfrlf.exec:\ffrfrlf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
\??\c:\bbhbtn.exec:\bbhbtn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\httnnn.exec:\httnnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\1jpjj.exec:\1jpjj.exe23⤵
- Executes dropped EXE
PID:1464 -
\??\c:\rfrllll.exec:\rfrllll.exe24⤵
- Executes dropped EXE
PID:2452 -
\??\c:\rlxxrlf.exec:\rlxxrlf.exe25⤵
- Executes dropped EXE
PID:2212 -
\??\c:\5hbtnh.exec:\5hbtnh.exe26⤵
- Executes dropped EXE
PID:3696 -
\??\c:\jpvvv.exec:\jpvvv.exe27⤵
- Executes dropped EXE
PID:1364 -
\??\c:\rlrrffx.exec:\rlrrffx.exe28⤵
- Executes dropped EXE
PID:1516 -
\??\c:\tnbtbb.exec:\tnbtbb.exe29⤵
- Executes dropped EXE
PID:3324 -
\??\c:\nbnhbb.exec:\nbnhbb.exe30⤵
- Executes dropped EXE
PID:3408 -
\??\c:\dvjvv.exec:\dvjvv.exe31⤵
- Executes dropped EXE
PID:3820 -
\??\c:\lxxfxxf.exec:\lxxfxxf.exe32⤵
- Executes dropped EXE
PID:3692 -
\??\c:\nhtthb.exec:\nhtthb.exe33⤵
- Executes dropped EXE
PID:1392 -
\??\c:\jjpjd.exec:\jjpjd.exe34⤵
- Executes dropped EXE
PID:1156 -
\??\c:\xrfffxx.exec:\xrfffxx.exe35⤵
- Executes dropped EXE
PID:4456 -
\??\c:\bthbbt.exec:\bthbbt.exe36⤵
- Executes dropped EXE
PID:3108 -
\??\c:\jvpjd.exec:\jvpjd.exe37⤵
- Executes dropped EXE
PID:4032 -
\??\c:\lxxxrfr.exec:\lxxxrfr.exe38⤵
- Executes dropped EXE
PID:4784 -
\??\c:\nhbthh.exec:\nhbthh.exe39⤵
- Executes dropped EXE
PID:2256 -
\??\c:\hnnbtn.exec:\hnnbtn.exe40⤵
- Executes dropped EXE
PID:1536 -
\??\c:\dvjjd.exec:\dvjjd.exe41⤵
- Executes dropped EXE
PID:1384 -
\??\c:\9vvpj.exec:\9vvpj.exe42⤵
- Executes dropped EXE
PID:4636 -
\??\c:\htbttt.exec:\htbttt.exe43⤵
- Executes dropped EXE
PID:5020 -
\??\c:\pdjjd.exec:\pdjjd.exe44⤵
- Executes dropped EXE
PID:4556 -
\??\c:\lflrlll.exec:\lflrlll.exe45⤵
- Executes dropped EXE
PID:3384 -
\??\c:\fxlfrrl.exec:\fxlfrrl.exe46⤵
- Executes dropped EXE
PID:4372 -
\??\c:\dvddd.exec:\dvddd.exe47⤵
- Executes dropped EXE
PID:1948 -
\??\c:\vpvpd.exec:\vpvpd.exe48⤵
- Executes dropped EXE
PID:3168 -
\??\c:\fffxllf.exec:\fffxllf.exe49⤵
- Executes dropped EXE
PID:1780 -
\??\c:\1llfxrl.exec:\1llfxrl.exe50⤵
- Executes dropped EXE
PID:4828 -
\??\c:\3ntnnh.exec:\3ntnnh.exe51⤵
- Executes dropped EXE
PID:3268 -
\??\c:\thnhhh.exec:\thnhhh.exe52⤵
- Executes dropped EXE
PID:228 -
\??\c:\pjvjj.exec:\pjvjj.exe53⤵
- Executes dropped EXE
PID:4292 -
\??\c:\7pppj.exec:\7pppj.exe54⤵
- Executes dropped EXE
PID:312 -
\??\c:\fxrrrrl.exec:\fxrrrrl.exe55⤵
- Executes dropped EXE
PID:3904 -
\??\c:\fxfxxrf.exec:\fxfxxrf.exe56⤵
- Executes dropped EXE
PID:2168 -
\??\c:\bbhbbn.exec:\bbhbbn.exe57⤵
- Executes dropped EXE
PID:996 -
\??\c:\bbnbtn.exec:\bbnbtn.exe58⤵
- Executes dropped EXE
PID:512 -
\??\c:\vpdpp.exec:\vpdpp.exe59⤵
- Executes dropped EXE
PID:3428 -
\??\c:\dvpjp.exec:\dvpjp.exe60⤵
- Executes dropped EXE
PID:908 -
\??\c:\xrffxff.exec:\xrffxff.exe61⤵
- Executes dropped EXE
PID:3816 -
\??\c:\1xffxxr.exec:\1xffxxr.exe62⤵
- Executes dropped EXE
PID:4332 -
\??\c:\bnttnn.exec:\bnttnn.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3496 -
\??\c:\dpvpd.exec:\dpvpd.exe64⤵
- Executes dropped EXE
PID:1684 -
\??\c:\3frlllr.exec:\3frlllr.exe65⤵
- Executes dropped EXE
PID:744 -
\??\c:\rllxrrl.exec:\rllxrrl.exe66⤵PID:1668
-
\??\c:\bhhbbb.exec:\bhhbbb.exe67⤵PID:3988
-
\??\c:\nbbtnn.exec:\nbbtnn.exe68⤵PID:2560
-
\??\c:\pvpjd.exec:\pvpjd.exe69⤵
- System Location Discovery: System Language Discovery
PID:2184 -
\??\c:\rxfxrrl.exec:\rxfxrrl.exe70⤵PID:1712
-
\??\c:\9rllllf.exec:\9rllllf.exe71⤵PID:2156
-
\??\c:\5hhhbt.exec:\5hhhbt.exe72⤵PID:3636
-
\??\c:\jpvjj.exec:\jpvjj.exe73⤵PID:3444
-
\??\c:\nhhtbt.exec:\nhhtbt.exe74⤵PID:3748
-
\??\c:\tnnhtt.exec:\tnnhtt.exe75⤵PID:3432
-
\??\c:\djvvp.exec:\djvvp.exe76⤵PID:3012
-
\??\c:\ppppj.exec:\ppppj.exe77⤵PID:3596
-
\??\c:\xrxrrll.exec:\xrxrrll.exe78⤵PID:2608
-
\??\c:\7hnnbh.exec:\7hnnbh.exe79⤵PID:5088
-
\??\c:\thnhbt.exec:\thnhbt.exe80⤵PID:4780
-
\??\c:\xlffxxx.exec:\xlffxxx.exe81⤵PID:2148
-
\??\c:\nnhtht.exec:\nnhtht.exe82⤵PID:1924
-
\??\c:\pdvpd.exec:\pdvpd.exe83⤵PID:1760
-
\??\c:\dvjjv.exec:\dvjjv.exe84⤵PID:1008
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe85⤵PID:1392
-
\??\c:\bnnhhb.exec:\bnnhhb.exe86⤵PID:4932
-
\??\c:\jddvp.exec:\jddvp.exe87⤵PID:2844
-
\??\c:\lfrllrl.exec:\lfrllrl.exe88⤵PID:4076
-
\??\c:\bbhhbh.exec:\bbhhbh.exe89⤵
- System Location Discovery: System Language Discovery
PID:336 -
\??\c:\dvvvd.exec:\dvvvd.exe90⤵PID:2196
-
\??\c:\llrlxxr.exec:\llrlxxr.exe91⤵PID:1324
-
\??\c:\9thbbb.exec:\9thbbb.exe92⤵PID:4328
-
\??\c:\7nnhbt.exec:\7nnhbt.exe93⤵PID:4336
-
\??\c:\dvddp.exec:\dvddp.exe94⤵PID:3856
-
\??\c:\rlffxxx.exec:\rlffxxx.exe95⤵PID:916
-
\??\c:\xrlffrf.exec:\xrlffrf.exe96⤵PID:3852
-
\??\c:\bbhbtt.exec:\bbhbtt.exe97⤵PID:1688
-
\??\c:\hhtnbt.exec:\hhtnbt.exe98⤵PID:820
-
\??\c:\vvjdd.exec:\vvjdd.exe99⤵PID:2568
-
\??\c:\5fllxxx.exec:\5fllxxx.exe100⤵PID:3280
-
\??\c:\llrlffr.exec:\llrlffr.exe101⤵PID:3836
-
\??\c:\9tnhbt.exec:\9tnhbt.exe102⤵PID:4040
-
\??\c:\djpjd.exec:\djpjd.exe103⤵PID:1620
-
\??\c:\dvvvv.exec:\dvvvv.exe104⤵PID:1732
-
\??\c:\frffrrl.exec:\frffrrl.exe105⤵PID:2216
-
\??\c:\9tbthh.exec:\9tbthh.exe106⤵PID:2620
-
\??\c:\tnhhbb.exec:\tnhhbb.exe107⤵PID:4176
-
\??\c:\vvddd.exec:\vvddd.exe108⤵PID:4884
-
\??\c:\rrrlffx.exec:\rrrlffx.exe109⤵PID:3952
-
\??\c:\rlfxllf.exec:\rlfxllf.exe110⤵PID:368
-
\??\c:\tbtthb.exec:\tbtthb.exe111⤵PID:1864
-
\??\c:\ttnnhh.exec:\ttnnhh.exe112⤵PID:908
-
\??\c:\9djjv.exec:\9djjv.exe113⤵PID:2800
-
\??\c:\fxfrlll.exec:\fxfrlll.exe114⤵PID:3380
-
\??\c:\nbbhnh.exec:\nbbhnh.exe115⤵PID:2380
-
\??\c:\pjppd.exec:\pjppd.exe116⤵PID:2948
-
\??\c:\fxllxfx.exec:\fxllxfx.exe117⤵PID:3392
-
\??\c:\rffxrrl.exec:\rffxrrl.exe118⤵PID:3084
-
\??\c:\btbhtb.exec:\btbhtb.exe119⤵PID:4744
-
\??\c:\vpvvp.exec:\vpvvp.exe120⤵PID:776
-
\??\c:\vvppd.exec:\vvppd.exe121⤵PID:3512
-
\??\c:\xxfxlxr.exec:\xxfxlxr.exe122⤵PID:1900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-