Analysis
-
max time kernel
119s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 11:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8ac1ad16495beda8738c4b9a5938e2a0N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
120 seconds
General
-
Target
8ac1ad16495beda8738c4b9a5938e2a0N.exe
-
Size
58KB
-
MD5
8ac1ad16495beda8738c4b9a5938e2a0
-
SHA1
4e95a7e3bdc33b21b3bffe176e31dea163f26b29
-
SHA256
f6dde091806c8e2c73bd1fb198615c6cb9fb1ab46668d9f4147d2256baa0eace
-
SHA512
2c313950783354f30399e3151949a22711981d9ffee467a530ade6de35351339b9cf6201830b97605e3948de1a984bd95912fb38eb19f5cac6e8f415ef9ef22e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAw:ymb3NkkiQ3mdBjFoh
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral2/memory/3608-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1956-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3524-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3524-28-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3280-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1940-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1932-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4980-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4272-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2692-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2036-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2544-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/944-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5036-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3608 vvjdd.exe 3280 ffrrfrl.exe 3524 xrxxxxx.exe 1956 ntnbhh.exe 4944 hnnhtb.exe 1940 dvjpj.exe 3000 flxxfxf.exe 3940 vjppp.exe 4980 jjpjj.exe 4636 frfflrx.exe 4272 tthnnt.exe 392 bttbbh.exe 532 ppdjp.exe 4952 xxfffll.exe 2692 3thntt.exe 3960 7httbh.exe 5080 1jvvd.exe 4324 xxlllrr.exe 4400 hhhnbh.exe 1752 ttnntb.exe 2036 dddpv.exe 2544 lxllffl.exe 3224 9bbbbh.exe 3276 bnbbhn.exe 3432 ppddv.exe 944 xfffrxx.exe 1704 hnhhhh.exe 1560 nhnnhb.exe 5036 ppdpd.exe 2212 rfrxfrr.exe 4476 lrxlrff.exe 3092 nhthnb.exe 2532 ppjvv.exe 5012 xxxflxr.exe 3104 lllflll.exe 1076 btnnnt.exe 4016 hhbbtt.exe 2184 jpddj.exe 2504 fxlffll.exe 3336 rrxflrr.exe 3688 nthtbh.exe 1932 jpvdd.exe 3928 jvddd.exe 1488 9xffllf.exe 4144 rfllrxx.exe 3876 ttbntb.exe 2588 jpjjj.exe 1528 ddjdv.exe 4928 rrxxfrr.exe 2900 frxflxf.exe 3940 bhhnhn.exe 4088 pjvdd.exe 316 3dppv.exe 3424 rfxrrxr.exe 3736 hhnhbb.exe 2580 hntbhn.exe 1096 pjjvj.exe 4976 pjppp.exe 2636 flrxfrf.exe 2936 1lfllrr.exe 4048 hbhntb.exe 2924 bbtnht.exe 2608 ppddd.exe 4668 ppjvd.exe -
resource yara_rule behavioral2/memory/1932-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3608-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1956-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3524-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3280-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1940-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1932-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4980-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4272-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2692-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2036-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2544-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/944-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-199-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrflflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1djvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7flfrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bhbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffxxf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 3608 1932 8ac1ad16495beda8738c4b9a5938e2a0N.exe 84 PID 1932 wrote to memory of 3608 1932 8ac1ad16495beda8738c4b9a5938e2a0N.exe 84 PID 1932 wrote to memory of 3608 1932 8ac1ad16495beda8738c4b9a5938e2a0N.exe 84 PID 3608 wrote to memory of 3280 3608 vvjdd.exe 85 PID 3608 wrote to memory of 3280 3608 vvjdd.exe 85 PID 3608 wrote to memory of 3280 3608 vvjdd.exe 85 PID 3280 wrote to memory of 3524 3280 ffrrfrl.exe 86 PID 3280 wrote to memory of 3524 3280 ffrrfrl.exe 86 PID 3280 wrote to memory of 3524 3280 ffrrfrl.exe 86 PID 3524 wrote to memory of 1956 3524 xrxxxxx.exe 87 PID 3524 wrote to memory of 1956 3524 xrxxxxx.exe 87 PID 3524 wrote to memory of 1956 3524 xrxxxxx.exe 87 PID 1956 wrote to memory of 4944 1956 ntnbhh.exe 88 PID 1956 wrote to memory of 4944 1956 ntnbhh.exe 88 PID 1956 wrote to memory of 4944 1956 ntnbhh.exe 88 PID 4944 wrote to memory of 1940 4944 hnnhtb.exe 89 PID 4944 wrote to memory of 1940 4944 hnnhtb.exe 89 PID 4944 wrote to memory of 1940 4944 hnnhtb.exe 89 PID 1940 wrote to memory of 3000 1940 dvjpj.exe 90 PID 1940 wrote to memory of 3000 1940 dvjpj.exe 90 PID 1940 wrote to memory of 3000 1940 dvjpj.exe 90 PID 3000 wrote to memory of 3940 3000 flxxfxf.exe 91 PID 3000 wrote to memory of 3940 3000 flxxfxf.exe 91 PID 3000 wrote to memory of 3940 3000 flxxfxf.exe 91 PID 3940 wrote to memory of 4980 3940 vjppp.exe 92 PID 3940 wrote to memory of 4980 3940 vjppp.exe 92 PID 3940 wrote to memory of 4980 3940 vjppp.exe 92 PID 4980 wrote to memory of 4636 4980 jjpjj.exe 93 PID 4980 wrote to memory of 4636 4980 jjpjj.exe 93 PID 4980 wrote to memory of 4636 4980 jjpjj.exe 93 PID 4636 wrote to memory of 4272 4636 frfflrx.exe 94 PID 4636 wrote to memory of 4272 4636 frfflrx.exe 94 PID 4636 wrote to memory of 4272 4636 frfflrx.exe 94 PID 4272 wrote to memory of 392 4272 tthnnt.exe 95 PID 4272 wrote to memory of 392 4272 tthnnt.exe 95 PID 4272 wrote to memory of 392 4272 tthnnt.exe 95 PID 392 wrote to memory of 532 392 bttbbh.exe 96 PID 392 wrote to memory of 532 392 bttbbh.exe 96 PID 392 wrote to memory of 532 392 bttbbh.exe 96 PID 532 wrote to memory of 4952 532 ppdjp.exe 97 PID 532 wrote to memory of 4952 532 ppdjp.exe 97 PID 532 wrote to memory of 4952 532 ppdjp.exe 97 PID 4952 wrote to memory of 2692 4952 xxfffll.exe 98 PID 4952 wrote to memory of 2692 4952 xxfffll.exe 98 PID 4952 wrote to memory of 2692 4952 xxfffll.exe 98 PID 2692 wrote to memory of 3960 2692 3thntt.exe 99 PID 2692 wrote to memory of 3960 2692 3thntt.exe 99 PID 2692 wrote to memory of 3960 2692 3thntt.exe 99 PID 3960 wrote to memory of 5080 3960 7httbh.exe 100 PID 3960 wrote to memory of 5080 3960 7httbh.exe 100 PID 3960 wrote to memory of 5080 3960 7httbh.exe 100 PID 5080 wrote to memory of 4324 5080 1jvvd.exe 101 PID 5080 wrote to memory of 4324 5080 1jvvd.exe 101 PID 5080 wrote to memory of 4324 5080 1jvvd.exe 101 PID 4324 wrote to memory of 4400 4324 xxlllrr.exe 102 PID 4324 wrote to memory of 4400 4324 xxlllrr.exe 102 PID 4324 wrote to memory of 4400 4324 xxlllrr.exe 102 PID 4400 wrote to memory of 1752 4400 hhhnbh.exe 104 PID 4400 wrote to memory of 1752 4400 hhhnbh.exe 104 PID 4400 wrote to memory of 1752 4400 hhhnbh.exe 104 PID 1752 wrote to memory of 2036 1752 ttnntb.exe 105 PID 1752 wrote to memory of 2036 1752 ttnntb.exe 105 PID 1752 wrote to memory of 2036 1752 ttnntb.exe 105 PID 2036 wrote to memory of 2544 2036 dddpv.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac1ad16495beda8738c4b9a5938e2a0N.exe"C:\Users\Admin\AppData\Local\Temp\8ac1ad16495beda8738c4b9a5938e2a0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\vvjdd.exec:\vvjdd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
\??\c:\ffrrfrl.exec:\ffrrfrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\xrxxxxx.exec:\xrxxxxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
\??\c:\ntnbhh.exec:\ntnbhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\hnnhtb.exec:\hnnhtb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\dvjpj.exec:\dvjpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\flxxfxf.exec:\flxxfxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\vjppp.exec:\vjppp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
\??\c:\jjpjj.exec:\jjpjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\frfflrx.exec:\frfflrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\tthnnt.exec:\tthnnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\bttbbh.exec:\bttbbh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
\??\c:\ppdjp.exec:\ppdjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\xxfffll.exec:\xxfffll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\3thntt.exec:\3thntt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\7httbh.exec:\7httbh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\1jvvd.exec:\1jvvd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\xxlllrr.exec:\xxlllrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\hhhnbh.exec:\hhhnbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
\??\c:\ttnntb.exec:\ttnntb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1752 -
\??\c:\dddpv.exec:\dddpv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\lxllffl.exec:\lxllffl.exe23⤵
- Executes dropped EXE
PID:2544 -
\??\c:\9bbbbh.exec:\9bbbbh.exe24⤵
- Executes dropped EXE
PID:3224 -
\??\c:\bnbbhn.exec:\bnbbhn.exe25⤵
- Executes dropped EXE
PID:3276 -
\??\c:\ppddv.exec:\ppddv.exe26⤵
- Executes dropped EXE
PID:3432 -
\??\c:\xfffrxx.exec:\xfffrxx.exe27⤵
- Executes dropped EXE
PID:944 -
\??\c:\hnhhhh.exec:\hnhhhh.exe28⤵
- Executes dropped EXE
PID:1704 -
\??\c:\nhnnhb.exec:\nhnnhb.exe29⤵
- Executes dropped EXE
PID:1560 -
\??\c:\ppdpd.exec:\ppdpd.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036 -
\??\c:\rfrxfrr.exec:\rfrxfrr.exe31⤵
- Executes dropped EXE
PID:2212 -
\??\c:\lrxlrff.exec:\lrxlrff.exe32⤵
- Executes dropped EXE
PID:4476 -
\??\c:\nhthnb.exec:\nhthnb.exe33⤵
- Executes dropped EXE
PID:3092 -
\??\c:\ppjvv.exec:\ppjvv.exe34⤵
- Executes dropped EXE
PID:2532 -
\??\c:\xxxflxr.exec:\xxxflxr.exe35⤵
- Executes dropped EXE
PID:5012 -
\??\c:\lllflll.exec:\lllflll.exe36⤵
- Executes dropped EXE
PID:3104 -
\??\c:\btnnnt.exec:\btnnnt.exe37⤵
- Executes dropped EXE
PID:1076 -
\??\c:\hhbbtt.exec:\hhbbtt.exe38⤵
- Executes dropped EXE
PID:4016 -
\??\c:\jpddj.exec:\jpddj.exe39⤵
- Executes dropped EXE
PID:2184 -
\??\c:\fxlffll.exec:\fxlffll.exe40⤵
- Executes dropped EXE
PID:2504 -
\??\c:\rrxflrr.exec:\rrxflrr.exe41⤵
- Executes dropped EXE
PID:3336 -
\??\c:\nthtbh.exec:\nthtbh.exe42⤵
- Executes dropped EXE
PID:3688 -
\??\c:\jpvdd.exec:\jpvdd.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932 -
\??\c:\jvddd.exec:\jvddd.exe44⤵
- Executes dropped EXE
PID:3928 -
\??\c:\9xffllf.exec:\9xffllf.exe45⤵
- Executes dropped EXE
PID:1488 -
\??\c:\rfllrxx.exec:\rfllrxx.exe46⤵
- Executes dropped EXE
PID:4144 -
\??\c:\ttbntb.exec:\ttbntb.exe47⤵
- Executes dropped EXE
PID:3876 -
\??\c:\jpjjj.exec:\jpjjj.exe48⤵
- Executes dropped EXE
PID:2588 -
\??\c:\ddjdv.exec:\ddjdv.exe49⤵
- Executes dropped EXE
PID:1528 -
\??\c:\rrxxfrr.exec:\rrxxfrr.exe50⤵
- Executes dropped EXE
PID:4928 -
\??\c:\frxflxf.exec:\frxflxf.exe51⤵
- Executes dropped EXE
PID:2900 -
\??\c:\bhhnhn.exec:\bhhnhn.exe52⤵
- Executes dropped EXE
PID:3940 -
\??\c:\pjvdd.exec:\pjvdd.exe53⤵
- Executes dropped EXE
PID:4088 -
\??\c:\3dppv.exec:\3dppv.exe54⤵
- Executes dropped EXE
PID:316 -
\??\c:\rfxrrxr.exec:\rfxrrxr.exe55⤵
- Executes dropped EXE
PID:3424 -
\??\c:\hhnhbb.exec:\hhnhbb.exe56⤵
- Executes dropped EXE
PID:3736 -
\??\c:\hntbhn.exec:\hntbhn.exe57⤵
- Executes dropped EXE
PID:2580 -
\??\c:\pjjvj.exec:\pjjvj.exe58⤵
- Executes dropped EXE
PID:1096 -
\??\c:\pjppp.exec:\pjppp.exe59⤵
- Executes dropped EXE
PID:4976 -
\??\c:\flrxfrf.exec:\flrxfrf.exe60⤵
- Executes dropped EXE
PID:2636 -
\??\c:\1lfllrr.exec:\1lfllrr.exe61⤵
- Executes dropped EXE
PID:2936 -
\??\c:\hbhntb.exec:\hbhntb.exe62⤵
- Executes dropped EXE
PID:4048 -
\??\c:\bbtnht.exec:\bbtnht.exe63⤵
- Executes dropped EXE
PID:2924 -
\??\c:\ppddd.exec:\ppddd.exe64⤵
- Executes dropped EXE
PID:2608 -
\??\c:\ppjvd.exec:\ppjvd.exe65⤵
- Executes dropped EXE
PID:4668 -
\??\c:\llffxff.exec:\llffxff.exe66⤵PID:1260
-
\??\c:\xfrrlrr.exec:\xfrrlrr.exe67⤵PID:4284
-
\??\c:\nntttn.exec:\nntttn.exe68⤵PID:4840
-
\??\c:\bnntnn.exec:\bnntnn.exe69⤵PID:2892
-
\??\c:\ddddj.exec:\ddddj.exe70⤵PID:536
-
\??\c:\ppppd.exec:\ppppd.exe71⤵PID:4036
-
\??\c:\flrfrfr.exec:\flrfrfr.exe72⤵PID:3436
-
\??\c:\lrffrff.exec:\lrffrff.exe73⤵PID:1224
-
\??\c:\bhbbbb.exec:\bhbbbb.exe74⤵PID:4896
-
\??\c:\ttttbb.exec:\ttttbb.exe75⤵PID:2912
-
\??\c:\pjjdd.exec:\pjjdd.exe76⤵PID:1072
-
\??\c:\vjpvv.exec:\vjpvv.exe77⤵PID:1560
-
\??\c:\rlrrrll.exec:\rlrrrll.exe78⤵PID:4428
-
\??\c:\fffxxxx.exec:\fffxxxx.exe79⤵PID:4888
-
\??\c:\hbhbbb.exec:\hbhbbb.exe80⤵PID:4384
-
\??\c:\nhnttt.exec:\nhnttt.exe81⤵PID:3852
-
\??\c:\jdppp.exec:\jdppp.exe82⤵PID:2200
-
\??\c:\vvjjp.exec:\vvjjp.exe83⤵PID:436
-
\??\c:\xfxxxfx.exec:\xfxxxfx.exe84⤵PID:1012
-
\??\c:\fxllllr.exec:\fxllllr.exe85⤵PID:3552
-
\??\c:\nbhbbb.exec:\nbhbbb.exe86⤵PID:808
-
\??\c:\nnbtbb.exec:\nnbtbb.exe87⤵PID:3272
-
\??\c:\1rllrxl.exec:\1rllrxl.exe88⤵PID:4508
-
\??\c:\xrrfxll.exec:\xrrfxll.exe89⤵PID:4608
-
\??\c:\lrrxrxl.exec:\lrrxrxl.exe90⤵PID:1776
-
\??\c:\nthnbb.exec:\nthnbb.exe91⤵PID:2716
-
\??\c:\htnhhb.exec:\htnhhb.exe92⤵PID:2712
-
\??\c:\dvjjj.exec:\dvjjj.exe93⤵PID:4504
-
\??\c:\lfrrxrx.exec:\lfrrxrx.exe94⤵PID:3896
-
\??\c:\llllxxl.exec:\llllxxl.exe95⤵PID:312
-
\??\c:\bbbnhn.exec:\bbbnhn.exe96⤵PID:4944
-
\??\c:\pjjdv.exec:\pjjdv.exe97⤵PID:3148
-
\??\c:\vpjdv.exec:\vpjdv.exe98⤵PID:1436
-
\??\c:\rrlfxrx.exec:\rrlfxrx.exe99⤵PID:3000
-
\??\c:\ntnthn.exec:\ntnthn.exe100⤵PID:3572
-
\??\c:\bnttth.exec:\bnttth.exe101⤵PID:2900
-
\??\c:\vpdvv.exec:\vpdvv.exe102⤵PID:3940
-
\??\c:\vdjvv.exec:\vdjvv.exe103⤵PID:3216
-
\??\c:\xxflrff.exec:\xxflrff.exe104⤵PID:4712
-
\??\c:\hnntbh.exec:\hnntbh.exe105⤵PID:4500
-
\??\c:\vdjvv.exec:\vdjvv.exe106⤵
- System Location Discovery: System Language Discovery
PID:3100 -
\??\c:\xflrflr.exec:\xflrflr.exe107⤵PID:5096
-
\??\c:\rrxlxxx.exec:\rrxlxxx.exe108⤵PID:4976
-
\??\c:\ntbttt.exec:\ntbttt.exe109⤵PID:4488
-
\??\c:\3pjdp.exec:\3pjdp.exe110⤵PID:4048
-
\??\c:\vvvjv.exec:\vvvjv.exe111⤵PID:1636
-
\??\c:\rrfrxff.exec:\rrfrxff.exe112⤵PID:2608
-
\??\c:\hhnnhn.exec:\hhnnhn.exe113⤵PID:4668
-
\??\c:\hthbtb.exec:\hthbtb.exe114⤵PID:1332
-
\??\c:\vvdvv.exec:\vvdvv.exe115⤵PID:1008
-
\??\c:\jpvvv.exec:\jpvvv.exe116⤵PID:4020
-
\??\c:\fffffff.exec:\fffffff.exe117⤵PID:2704
-
\??\c:\llxxllf.exec:\llxxllf.exe118⤵PID:3556
-
\??\c:\3ttttb.exec:\3ttttb.exe119⤵PID:3748
-
\??\c:\tthhhn.exec:\tthhhn.exe120⤵PID:2344
-
\??\c:\thbbhh.exec:\thbbhh.exe121⤵PID:4884
-
\??\c:\vvvvp.exec:\vvvvp.exe122⤵PID:4652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-