Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 09:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d5408d82467fd3c5b2b262d81cea5950N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
d5408d82467fd3c5b2b262d81cea5950N.exe
-
Size
843KB
-
MD5
d5408d82467fd3c5b2b262d81cea5950
-
SHA1
a1881c33889c68f3ce15a20ac20bb312b5a68a5b
-
SHA256
62f421b3bb6e359eeeeee791fcf770c83202e9388834b0102702aa9629f7f70a
-
SHA512
4c0fc5f8b9e49a6b16547325fd639b1d09da5d8a85bbc8e785ee0a667bf23f136a3f2187a4bf3d43a3031bc4036f95de682b8e9e37e67e8be8a29eb47e3068a7
-
SSDEEP
24576:Sgdn8whSenedn8whhdn76gdn8whSfgdn8whSzF:TFyVPfe
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2280-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2132-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1996-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1776-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1028-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1316-225-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/828-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1116-278-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2132 pvjjj.exe 2568 vvjpv.exe 2128 rlxlrlr.exe 2428 ddpvd.exe 1996 ffxfflx.exe 2580 tnbbtb.exe 2696 btbbhn.exe 2592 lxffffl.exe 2844 btnttt.exe 2680 3xlfxff.exe 2544 vpvvd.exe 2552 xrfflfl.exe 2068 vvpvv.exe 1928 flrrrxf.exe 2288 9jpvv.exe 2020 xxlrrlr.exe 1776 pdppv.exe 2312 rlfflrx.exe 1028 rxxxrlx.exe 2356 3hhthh.exe 2812 3frfllr.exe 1316 nttbbb.exe 264 rlxrxfl.exe 1256 bbnbbh.exe 828 dpvvp.exe 616 nbtbhn.exe 904 xrlllxl.exe 1116 hbbbbh.exe 2228 1lxfxxf.exe 2148 9jvdv.exe 892 nbntnn.exe 1580 dvppv.exe 1564 tnhhtb.exe 2736 vjvjj.exe 2144 rlllffx.exe 1720 htbttt.exe 1368 3pvpp.exe 2892 rfrxxlr.exe 2960 tnhtbt.exe 2116 tnhbbt.exe 2628 jdjjp.exe 2712 lfrxxxf.exe 2644 nhbhnt.exe 2688 9vvpd.exe 2632 5rxfrfl.exe 2516 hbhbtt.exe 2532 pjvdj.exe 2508 fxlrlll.exe 2936 tnttbt.exe 2560 5bnnhh.exe 2016 dpvvv.exe 1636 9lrrrll.exe 1784 1ntntn.exe 1964 1vddp.exe 1760 rfrrrxf.exe 956 1xrxffl.exe 1212 hbnntb.exe 2924 pdvvd.exe 2220 fxfflrx.exe 1140 3htnnn.exe 2864 vpppd.exe 2044 rlxxffr.exe 1336 thbhnn.exe 988 thbbhb.exe -
resource yara_rule behavioral1/memory/2280-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2132-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1028-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1316-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/828-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1116-278-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rllflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrflrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrxxf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2132 2280 d5408d82467fd3c5b2b262d81cea5950N.exe 28 PID 2280 wrote to memory of 2132 2280 d5408d82467fd3c5b2b262d81cea5950N.exe 28 PID 2280 wrote to memory of 2132 2280 d5408d82467fd3c5b2b262d81cea5950N.exe 28 PID 2280 wrote to memory of 2132 2280 d5408d82467fd3c5b2b262d81cea5950N.exe 28 PID 2132 wrote to memory of 2568 2132 pvjjj.exe 29 PID 2132 wrote to memory of 2568 2132 pvjjj.exe 29 PID 2132 wrote to memory of 2568 2132 pvjjj.exe 29 PID 2132 wrote to memory of 2568 2132 pvjjj.exe 29 PID 2568 wrote to memory of 2128 2568 vvjpv.exe 30 PID 2568 wrote to memory of 2128 2568 vvjpv.exe 30 PID 2568 wrote to memory of 2128 2568 vvjpv.exe 30 PID 2568 wrote to memory of 2128 2568 vvjpv.exe 30 PID 2128 wrote to memory of 2428 2128 rlxlrlr.exe 31 PID 2128 wrote to memory of 2428 2128 rlxlrlr.exe 31 PID 2128 wrote to memory of 2428 2128 rlxlrlr.exe 31 PID 2128 wrote to memory of 2428 2128 rlxlrlr.exe 31 PID 2428 wrote to memory of 1996 2428 ddpvd.exe 32 PID 2428 wrote to memory of 1996 2428 ddpvd.exe 32 PID 2428 wrote to memory of 1996 2428 ddpvd.exe 32 PID 2428 wrote to memory of 1996 2428 ddpvd.exe 32 PID 1996 wrote to memory of 2580 1996 ffxfflx.exe 33 PID 1996 wrote to memory of 2580 1996 ffxfflx.exe 33 PID 1996 wrote to memory of 2580 1996 ffxfflx.exe 33 PID 1996 wrote to memory of 2580 1996 ffxfflx.exe 33 PID 2580 wrote to memory of 2696 2580 tnbbtb.exe 34 PID 2580 wrote to memory of 2696 2580 tnbbtb.exe 34 PID 2580 wrote to memory of 2696 2580 tnbbtb.exe 34 PID 2580 wrote to memory of 2696 2580 tnbbtb.exe 34 PID 2696 wrote to memory of 2592 2696 btbbhn.exe 35 PID 2696 wrote to memory of 2592 2696 btbbhn.exe 35 PID 2696 wrote to memory of 2592 2696 btbbhn.exe 35 PID 2696 wrote to memory of 2592 2696 btbbhn.exe 35 PID 2592 wrote to memory of 2844 2592 lxffffl.exe 36 PID 2592 wrote to memory of 2844 2592 lxffffl.exe 36 PID 2592 wrote to memory of 2844 2592 lxffffl.exe 36 PID 2592 wrote to memory of 2844 2592 lxffffl.exe 36 PID 2844 wrote to memory of 2680 2844 btnttt.exe 37 PID 2844 wrote to memory of 2680 2844 btnttt.exe 37 PID 2844 wrote to memory of 2680 2844 btnttt.exe 37 PID 2844 wrote to memory of 2680 2844 btnttt.exe 37 PID 2680 wrote to memory of 2544 2680 3xlfxff.exe 38 PID 2680 wrote to memory of 2544 2680 3xlfxff.exe 38 PID 2680 wrote to memory of 2544 2680 3xlfxff.exe 38 PID 2680 wrote to memory of 2544 2680 3xlfxff.exe 38 PID 2544 wrote to memory of 2552 2544 vpvvd.exe 39 PID 2544 wrote to memory of 2552 2544 vpvvd.exe 39 PID 2544 wrote to memory of 2552 2544 vpvvd.exe 39 PID 2544 wrote to memory of 2552 2544 vpvvd.exe 39 PID 2552 wrote to memory of 2068 2552 xrfflfl.exe 40 PID 2552 wrote to memory of 2068 2552 xrfflfl.exe 40 PID 2552 wrote to memory of 2068 2552 xrfflfl.exe 40 PID 2552 wrote to memory of 2068 2552 xrfflfl.exe 40 PID 2068 wrote to memory of 1928 2068 vvpvv.exe 41 PID 2068 wrote to memory of 1928 2068 vvpvv.exe 41 PID 2068 wrote to memory of 1928 2068 vvpvv.exe 41 PID 2068 wrote to memory of 1928 2068 vvpvv.exe 41 PID 1928 wrote to memory of 2288 1928 flrrrxf.exe 42 PID 1928 wrote to memory of 2288 1928 flrrrxf.exe 42 PID 1928 wrote to memory of 2288 1928 flrrrxf.exe 42 PID 1928 wrote to memory of 2288 1928 flrrrxf.exe 42 PID 2288 wrote to memory of 2020 2288 9jpvv.exe 43 PID 2288 wrote to memory of 2020 2288 9jpvv.exe 43 PID 2288 wrote to memory of 2020 2288 9jpvv.exe 43 PID 2288 wrote to memory of 2020 2288 9jpvv.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5408d82467fd3c5b2b262d81cea5950N.exe"C:\Users\Admin\AppData\Local\Temp\d5408d82467fd3c5b2b262d81cea5950N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\pvjjj.exec:\pvjjj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\vvjpv.exec:\vvjpv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\rlxlrlr.exec:\rlxlrlr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\ddpvd.exec:\ddpvd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\ffxfflx.exec:\ffxfflx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\tnbbtb.exec:\tnbbtb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\btbbhn.exec:\btbbhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\lxffffl.exec:\lxffffl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\btnttt.exec:\btnttt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\3xlfxff.exec:\3xlfxff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\vpvvd.exec:\vpvvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\xrfflfl.exec:\xrfflfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\vvpvv.exec:\vvpvv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\flrrrxf.exec:\flrrrxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\9jpvv.exec:\9jpvv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\xxlrrlr.exec:\xxlrrlr.exe17⤵
- Executes dropped EXE
PID:2020 -
\??\c:\pdppv.exec:\pdppv.exe18⤵
- Executes dropped EXE
PID:1776 -
\??\c:\rlfflrx.exec:\rlfflrx.exe19⤵
- Executes dropped EXE
PID:2312 -
\??\c:\rxxxrlx.exec:\rxxxrlx.exe20⤵
- Executes dropped EXE
PID:1028 -
\??\c:\3hhthh.exec:\3hhthh.exe21⤵
- Executes dropped EXE
PID:2356 -
\??\c:\3frfllr.exec:\3frfllr.exe22⤵
- Executes dropped EXE
PID:2812 -
\??\c:\nttbbb.exec:\nttbbb.exe23⤵
- Executes dropped EXE
PID:1316 -
\??\c:\rlxrxfl.exec:\rlxrxfl.exe24⤵
- Executes dropped EXE
PID:264 -
\??\c:\bbnbbh.exec:\bbnbbh.exe25⤵
- Executes dropped EXE
PID:1256 -
\??\c:\dpvvp.exec:\dpvvp.exe26⤵
- Executes dropped EXE
PID:828 -
\??\c:\nbtbhn.exec:\nbtbhn.exe27⤵
- Executes dropped EXE
PID:616 -
\??\c:\xrlllxl.exec:\xrlllxl.exe28⤵
- Executes dropped EXE
PID:904 -
\??\c:\hbbbbh.exec:\hbbbbh.exe29⤵
- Executes dropped EXE
PID:1116 -
\??\c:\1lxfxxf.exec:\1lxfxxf.exe30⤵
- Executes dropped EXE
PID:2228 -
\??\c:\9jvdv.exec:\9jvdv.exe31⤵
- Executes dropped EXE
PID:2148 -
\??\c:\nbntnn.exec:\nbntnn.exe32⤵
- Executes dropped EXE
PID:892 -
\??\c:\dvppv.exec:\dvppv.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580 -
\??\c:\tnhhtb.exec:\tnhhtb.exe34⤵
- Executes dropped EXE
PID:1564 -
\??\c:\vjvjj.exec:\vjvjj.exe35⤵
- Executes dropped EXE
PID:2736 -
\??\c:\rlllffx.exec:\rlllffx.exe36⤵
- Executes dropped EXE
PID:2144 -
\??\c:\htbttt.exec:\htbttt.exe37⤵
- Executes dropped EXE
PID:1720 -
\??\c:\3pvpp.exec:\3pvpp.exe38⤵
- Executes dropped EXE
PID:1368 -
\??\c:\rfrxxlr.exec:\rfrxxlr.exe39⤵
- Executes dropped EXE
PID:2892 -
\??\c:\tnhtbt.exec:\tnhtbt.exe40⤵
- Executes dropped EXE
PID:2960 -
\??\c:\tnhbbt.exec:\tnhbbt.exe41⤵
- Executes dropped EXE
PID:2116 -
\??\c:\jdjjp.exec:\jdjjp.exe42⤵
- Executes dropped EXE
PID:2628 -
\??\c:\lfrxxxf.exec:\lfrxxxf.exe43⤵
- Executes dropped EXE
PID:2712 -
\??\c:\nhbhnt.exec:\nhbhnt.exe44⤵
- Executes dropped EXE
PID:2644 -
\??\c:\9vvpd.exec:\9vvpd.exe45⤵
- Executes dropped EXE
PID:2688 -
\??\c:\5rxfrfl.exec:\5rxfrfl.exe46⤵
- Executes dropped EXE
PID:2632 -
\??\c:\hbhbtt.exec:\hbhbtt.exe47⤵
- Executes dropped EXE
PID:2516 -
\??\c:\pjvdj.exec:\pjvdj.exe48⤵
- Executes dropped EXE
PID:2532 -
\??\c:\fxlrlll.exec:\fxlrlll.exe49⤵
- Executes dropped EXE
PID:2508 -
\??\c:\tnttbt.exec:\tnttbt.exe50⤵
- Executes dropped EXE
PID:2936 -
\??\c:\5bnnhh.exec:\5bnnhh.exe51⤵
- Executes dropped EXE
PID:2560 -
\??\c:\dpvvv.exec:\dpvvv.exe52⤵
- Executes dropped EXE
PID:2016 -
\??\c:\9lrrrll.exec:\9lrrrll.exe53⤵
- Executes dropped EXE
PID:1636 -
\??\c:\1ntntn.exec:\1ntntn.exe54⤵
- Executes dropped EXE
PID:1784 -
\??\c:\1vddp.exec:\1vddp.exe55⤵
- Executes dropped EXE
PID:1964 -
\??\c:\rfrrrxf.exec:\rfrrrxf.exe56⤵
- Executes dropped EXE
PID:1760 -
\??\c:\1xrxffl.exec:\1xrxffl.exe57⤵
- Executes dropped EXE
PID:956 -
\??\c:\hbnntb.exec:\hbnntb.exe58⤵
- Executes dropped EXE
PID:1212 -
\??\c:\pdvvd.exec:\pdvvd.exe59⤵
- Executes dropped EXE
PID:2924 -
\??\c:\fxfflrx.exec:\fxfflrx.exe60⤵
- Executes dropped EXE
PID:2220 -
\??\c:\3htnnn.exec:\3htnnn.exe61⤵
- Executes dropped EXE
PID:1140 -
\??\c:\vpppd.exec:\vpppd.exe62⤵
- Executes dropped EXE
PID:2864 -
\??\c:\rlxxffr.exec:\rlxxffr.exe63⤵
- Executes dropped EXE
PID:2044 -
\??\c:\thbhnn.exec:\thbhnn.exe64⤵
- Executes dropped EXE
PID:1336 -
\??\c:\thbbhb.exec:\thbbhb.exe65⤵
- Executes dropped EXE
PID:988 -
\??\c:\pjdvj.exec:\pjdvj.exe66⤵PID:1524
-
\??\c:\3rffxfx.exec:\3rffxfx.exe67⤵PID:3044
-
\??\c:\7httbb.exec:\7httbb.exe68⤵PID:876
-
\??\c:\7vddp.exec:\7vddp.exe69⤵PID:904
-
\??\c:\xlxxrxx.exec:\xlxxrxx.exe70⤵PID:2236
-
\??\c:\fxrxlfx.exec:\fxrxlfx.exe71⤵PID:2372
-
\??\c:\hbnhnn.exec:\hbnhnn.exe72⤵PID:1696
-
\??\c:\dpvjj.exec:\dpvjj.exe73⤵PID:2364
-
\??\c:\rfrllfl.exec:\rfrllfl.exe74⤵PID:1592
-
\??\c:\tnhnnn.exec:\tnhnnn.exe75⤵PID:1660
-
\??\c:\dpjjj.exec:\dpjjj.exe76⤵PID:2280
-
\??\c:\fxlfffx.exec:\fxlfffx.exe77⤵PID:2164
-
\??\c:\rllfffr.exec:\rllfffr.exe78⤵PID:2316
-
\??\c:\3thbnh.exec:\3thbnh.exe79⤵PID:1808
-
\??\c:\pjdjp.exec:\pjdjp.exe80⤵PID:2128
-
\??\c:\fxrrxxf.exec:\fxrrxxf.exe81⤵PID:2076
-
\??\c:\rlxxlfl.exec:\rlxxlfl.exe82⤵PID:2668
-
\??\c:\bnnttt.exec:\bnnttt.exe83⤵PID:2996
-
\??\c:\pjvvv.exec:\pjvvv.exe84⤵PID:2708
-
\??\c:\xxfflxx.exec:\xxfflxx.exe85⤵PID:2700
-
\??\c:\5btbtb.exec:\5btbtb.exe86⤵PID:2848
-
\??\c:\vvpvj.exec:\vvpvj.exe87⤵PID:2756
-
\??\c:\lxllrxx.exec:\lxllrxx.exe88⤵PID:2800
-
\??\c:\5bttbb.exec:\5bttbb.exe89⤵PID:2652
-
\??\c:\vdpdj.exec:\vdpdj.exe90⤵PID:2484
-
\??\c:\rrlrflr.exec:\rrlrflr.exe91⤵PID:2608
-
\??\c:\tnbhnn.exec:\tnbhnn.exe92⤵PID:2152
-
\??\c:\jdpvd.exec:\jdpvd.exe93⤵PID:2068
-
\??\c:\jvjpv.exec:\jvjpv.exe94⤵PID:1740
-
\??\c:\llrlxlx.exec:\llrlxlx.exe95⤵PID:1928
-
\??\c:\9tnnbt.exec:\9tnnbt.exe96⤵PID:2004
-
\??\c:\9pddj.exec:\9pddj.exe97⤵PID:1508
-
\??\c:\lxllrxf.exec:\lxllrxf.exe98⤵PID:1772
-
\??\c:\7htbnn.exec:\7htbnn.exe99⤵PID:1732
-
\??\c:\pdvdd.exec:\pdvdd.exe100⤵PID:2796
-
\??\c:\bbbbht.exec:\bbbbht.exe101⤵
- System Location Discovery: System Language Discovery
PID:2320 -
\??\c:\nhttbb.exec:\nhttbb.exe102⤵PID:2664
-
\??\c:\7jjdv.exec:\7jjdv.exe103⤵PID:2788
-
\??\c:\rlrxfll.exec:\rlrxfll.exe104⤵PID:2768
-
\??\c:\bnntbh.exec:\bnntbh.exe105⤵PID:2352
-
\??\c:\nnbntn.exec:\nnbntn.exe106⤵PID:1600
-
\??\c:\vpvvj.exec:\vpvvj.exe107⤵PID:952
-
\??\c:\1flrxll.exec:\1flrxll.exe108⤵PID:2276
-
\??\c:\hhtntt.exec:\hhtntt.exe109⤵
- System Location Discovery: System Language Discovery
PID:1540 -
\??\c:\jdpjj.exec:\jdpjj.exe110⤵PID:932
-
\??\c:\pdjpp.exec:\pdjpp.exe111⤵PID:3012
-
\??\c:\xrlxflr.exec:\xrlxflr.exe112⤵PID:2216
-
\??\c:\nbhthh.exec:\nbhthh.exe113⤵PID:1676
-
\??\c:\jvvvd.exec:\jvvvd.exe114⤵PID:896
-
\??\c:\frxrrrr.exec:\frxrrrr.exe115⤵PID:2448
-
\??\c:\htbhtb.exec:\htbhtb.exe116⤵PID:1716
-
\??\c:\httnhb.exec:\httnhb.exe117⤵PID:1612
-
\??\c:\pppjd.exec:\pppjd.exe118⤵PID:1564
-
\??\c:\frxxxxx.exec:\frxxxxx.exe119⤵PID:2400
-
\??\c:\nbnntb.exec:\nbnntb.exe120⤵PID:2404
-
\??\c:\pjvdj.exec:\pjvdj.exe121⤵PID:1720
-
\??\c:\rllrrxl.exec:\rllrrxl.exe122⤵PID:2912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-