Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 12:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64100a940c045dbcbae134154d17c670N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
64100a940c045dbcbae134154d17c670N.exe
-
Size
132KB
-
MD5
64100a940c045dbcbae134154d17c670
-
SHA1
dfd946b5b88ae5c767149e8fcc20712cdf779a59
-
SHA256
dfad95858bb5b3bef2649ff094d5f60fcaa51a9c5a8207a8db2bf036eb90b833
-
SHA512
de7e7bb81c03e889a763e3595d9d3e72702c42018fd76c8e82928cfbb8b72e92e7ea5d21e1170535ac9c71bed3581dcd3afd1efe42e67b370439cef9af27bc97
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73tvn+Yp9gFb8kSv3v1Jgs7hMw8s5bBZfn:n3C9BRo7tvnJ9oLSvv1FhMVIfn
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2740-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1608-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2556-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3004-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2868-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1532-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3068-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/928-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1508-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1188-256-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/888-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-284-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1608-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1608 llrlrrx.exe 2752 frfllrr.exe 2664 7ttbbb.exe 2812 9jvpp.exe 2864 dvjvj.exe 2556 7rfxffx.exe 3004 htbbbb.exe 872 pdpvd.exe 2424 9lrxlrx.exe 2780 rlfxrxx.exe 2868 hbhnbb.exe 1992 pdvdd.exe 2888 dpdjj.exe 2184 frxffll.exe 2244 frfflrr.exe 1532 htbhnt.exe 3068 9httbt.exe 3064 dvdjv.exe 628 rlrrffx.exe 3052 bnbtnh.exe 2596 hnttbb.exe 928 dpppp.exe 1508 jvdjp.exe 2948 lxlffrr.exe 844 3rfffxx.exe 1188 httbhb.exe 2940 5tbbnb.exe 888 pjpvd.exe 2256 7fllfxf.exe 2648 3hnhhb.exe 1608 nttnnn.exe 2688 jvdpj.exe 2716 vjjjd.exe 2172 xrlrrfl.exe 1008 9llrxlr.exe 2724 bhbtbb.exe 2612 7thttb.exe 2600 htthbt.exe 2560 pjddv.exe 2440 1vdpp.exe 1528 7xllxrr.exe 1868 rrlxxlr.exe 2356 bhbbhb.exe 2260 bnhbbb.exe 1492 pjjvj.exe 2784 9rfxrxr.exe 1300 xrxxxrx.exe 2888 7lxxfll.exe 2000 hthbnh.exe 1364 vdjdj.exe 2272 pdvjv.exe 2168 9vvpp.exe 1888 9lrfxll.exe 1920 btbbnn.exe 2220 nbbnht.exe 2964 dpvvp.exe 1368 vjdpj.exe 2112 frrfxrx.exe 928 xrrflrr.exe 1956 9btnhb.exe 2060 nbhbbb.exe 2236 jpppv.exe 572 pdvpd.exe 2936 1rxrllx.exe -
resource yara_rule behavioral1/memory/2740-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1608-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1532-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/928-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1188-256-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/888-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-284-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1608-301-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxlrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rlflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1608 2740 64100a940c045dbcbae134154d17c670N.exe 30 PID 2740 wrote to memory of 1608 2740 64100a940c045dbcbae134154d17c670N.exe 30 PID 2740 wrote to memory of 1608 2740 64100a940c045dbcbae134154d17c670N.exe 30 PID 2740 wrote to memory of 1608 2740 64100a940c045dbcbae134154d17c670N.exe 30 PID 1608 wrote to memory of 2752 1608 llrlrrx.exe 31 PID 1608 wrote to memory of 2752 1608 llrlrrx.exe 31 PID 1608 wrote to memory of 2752 1608 llrlrrx.exe 31 PID 1608 wrote to memory of 2752 1608 llrlrrx.exe 31 PID 2752 wrote to memory of 2664 2752 frfllrr.exe 32 PID 2752 wrote to memory of 2664 2752 frfllrr.exe 32 PID 2752 wrote to memory of 2664 2752 frfllrr.exe 32 PID 2752 wrote to memory of 2664 2752 frfllrr.exe 32 PID 2664 wrote to memory of 2812 2664 7ttbbb.exe 33 PID 2664 wrote to memory of 2812 2664 7ttbbb.exe 33 PID 2664 wrote to memory of 2812 2664 7ttbbb.exe 33 PID 2664 wrote to memory of 2812 2664 7ttbbb.exe 33 PID 2812 wrote to memory of 2864 2812 9jvpp.exe 34 PID 2812 wrote to memory of 2864 2812 9jvpp.exe 34 PID 2812 wrote to memory of 2864 2812 9jvpp.exe 34 PID 2812 wrote to memory of 2864 2812 9jvpp.exe 34 PID 2864 wrote to memory of 2556 2864 dvjvj.exe 35 PID 2864 wrote to memory of 2556 2864 dvjvj.exe 35 PID 2864 wrote to memory of 2556 2864 dvjvj.exe 35 PID 2864 wrote to memory of 2556 2864 dvjvj.exe 35 PID 2556 wrote to memory of 3004 2556 7rfxffx.exe 36 PID 2556 wrote to memory of 3004 2556 7rfxffx.exe 36 PID 2556 wrote to memory of 3004 2556 7rfxffx.exe 36 PID 2556 wrote to memory of 3004 2556 7rfxffx.exe 36 PID 3004 wrote to memory of 872 3004 htbbbb.exe 37 PID 3004 wrote to memory of 872 3004 htbbbb.exe 37 PID 3004 wrote to memory of 872 3004 htbbbb.exe 37 PID 3004 wrote to memory of 872 3004 htbbbb.exe 37 PID 872 wrote to memory of 2424 872 pdpvd.exe 38 PID 872 wrote to memory of 2424 872 pdpvd.exe 38 PID 872 wrote to memory of 2424 872 pdpvd.exe 38 PID 872 wrote to memory of 2424 872 pdpvd.exe 38 PID 2424 wrote to memory of 2780 2424 9lrxlrx.exe 39 PID 2424 wrote to memory of 2780 2424 9lrxlrx.exe 39 PID 2424 wrote to memory of 2780 2424 9lrxlrx.exe 39 PID 2424 wrote to memory of 2780 2424 9lrxlrx.exe 39 PID 2780 wrote to memory of 2868 2780 rlfxrxx.exe 40 PID 2780 wrote to memory of 2868 2780 rlfxrxx.exe 40 PID 2780 wrote to memory of 2868 2780 rlfxrxx.exe 40 PID 2780 wrote to memory of 2868 2780 rlfxrxx.exe 40 PID 2868 wrote to memory of 1992 2868 hbhnbb.exe 41 PID 2868 wrote to memory of 1992 2868 hbhnbb.exe 41 PID 2868 wrote to memory of 1992 2868 hbhnbb.exe 41 PID 2868 wrote to memory of 1992 2868 hbhnbb.exe 41 PID 1992 wrote to memory of 2888 1992 pdvdd.exe 42 PID 1992 wrote to memory of 2888 1992 pdvdd.exe 42 PID 1992 wrote to memory of 2888 1992 pdvdd.exe 42 PID 1992 wrote to memory of 2888 1992 pdvdd.exe 42 PID 2888 wrote to memory of 2184 2888 dpdjj.exe 43 PID 2888 wrote to memory of 2184 2888 dpdjj.exe 43 PID 2888 wrote to memory of 2184 2888 dpdjj.exe 43 PID 2888 wrote to memory of 2184 2888 dpdjj.exe 43 PID 2184 wrote to memory of 2244 2184 frxffll.exe 44 PID 2184 wrote to memory of 2244 2184 frxffll.exe 44 PID 2184 wrote to memory of 2244 2184 frxffll.exe 44 PID 2184 wrote to memory of 2244 2184 frxffll.exe 44 PID 2244 wrote to memory of 1532 2244 frfflrr.exe 45 PID 2244 wrote to memory of 1532 2244 frfflrr.exe 45 PID 2244 wrote to memory of 1532 2244 frfflrr.exe 45 PID 2244 wrote to memory of 1532 2244 frfflrr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\64100a940c045dbcbae134154d17c670N.exe"C:\Users\Admin\AppData\Local\Temp\64100a940c045dbcbae134154d17c670N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\llrlrrx.exec:\llrlrrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
\??\c:\frfllrr.exec:\frfllrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\7ttbbb.exec:\7ttbbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\9jvpp.exec:\9jvpp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\dvjvj.exec:\dvjvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\7rfxffx.exec:\7rfxffx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\htbbbb.exec:\htbbbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\pdpvd.exec:\pdpvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\9lrxlrx.exec:\9lrxlrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\rlfxrxx.exec:\rlfxrxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\hbhnbb.exec:\hbhnbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\pdvdd.exec:\pdvdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\dpdjj.exec:\dpdjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\frxffll.exec:\frxffll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\frfflrr.exec:\frfflrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\htbhnt.exec:\htbhnt.exe17⤵
- Executes dropped EXE
PID:1532 -
\??\c:\9httbt.exec:\9httbt.exe18⤵
- Executes dropped EXE
PID:3068 -
\??\c:\dvdjv.exec:\dvdjv.exe19⤵
- Executes dropped EXE
PID:3064 -
\??\c:\rlrrffx.exec:\rlrrffx.exe20⤵
- Executes dropped EXE
PID:628 -
\??\c:\bnbtnh.exec:\bnbtnh.exe21⤵
- Executes dropped EXE
PID:3052 -
\??\c:\hnttbb.exec:\hnttbb.exe22⤵
- Executes dropped EXE
PID:2596 -
\??\c:\dpppp.exec:\dpppp.exe23⤵
- Executes dropped EXE
PID:928 -
\??\c:\jvdjp.exec:\jvdjp.exe24⤵
- Executes dropped EXE
PID:1508 -
\??\c:\lxlffrr.exec:\lxlffrr.exe25⤵
- Executes dropped EXE
PID:2948 -
\??\c:\3rfffxx.exec:\3rfffxx.exe26⤵
- Executes dropped EXE
PID:844 -
\??\c:\httbhb.exec:\httbhb.exe27⤵
- Executes dropped EXE
PID:1188 -
\??\c:\5tbbnb.exec:\5tbbnb.exe28⤵
- Executes dropped EXE
PID:2940 -
\??\c:\pjpvd.exec:\pjpvd.exe29⤵
- Executes dropped EXE
PID:888 -
\??\c:\7fllfxf.exec:\7fllfxf.exe30⤵
- Executes dropped EXE
PID:2256 -
\??\c:\3hnhhb.exec:\3hnhhb.exe31⤵
- Executes dropped EXE
PID:2648 -
\??\c:\nttnnn.exec:\nttnnn.exe32⤵
- Executes dropped EXE
PID:1608 -
\??\c:\jvdpj.exec:\jvdpj.exe33⤵
- Executes dropped EXE
PID:2688 -
\??\c:\vjjjd.exec:\vjjjd.exe34⤵
- Executes dropped EXE
PID:2716 -
\??\c:\xrlrrfl.exec:\xrlrrfl.exe35⤵
- Executes dropped EXE
PID:2172 -
\??\c:\9llrxlr.exec:\9llrxlr.exe36⤵
- Executes dropped EXE
PID:1008 -
\??\c:\bhbtbb.exec:\bhbtbb.exe37⤵
- Executes dropped EXE
PID:2724 -
\??\c:\7thttb.exec:\7thttb.exe38⤵
- Executes dropped EXE
PID:2612 -
\??\c:\htthbt.exec:\htthbt.exe39⤵
- Executes dropped EXE
PID:2600 -
\??\c:\pjddv.exec:\pjddv.exe40⤵
- Executes dropped EXE
PID:2560 -
\??\c:\1vdpp.exec:\1vdpp.exe41⤵
- Executes dropped EXE
PID:2440 -
\??\c:\7xllxrr.exec:\7xllxrr.exe42⤵
- Executes dropped EXE
PID:1528 -
\??\c:\rrlxxlr.exec:\rrlxxlr.exe43⤵
- Executes dropped EXE
PID:1868 -
\??\c:\bhbbhb.exec:\bhbbhb.exe44⤵
- Executes dropped EXE
PID:2356 -
\??\c:\bnhbbb.exec:\bnhbbb.exe45⤵
- Executes dropped EXE
PID:2260 -
\??\c:\pjjvj.exec:\pjjvj.exe46⤵
- Executes dropped EXE
PID:1492 -
\??\c:\9rfxrxr.exec:\9rfxrxr.exe47⤵
- Executes dropped EXE
PID:2784 -
\??\c:\xrxxxrx.exec:\xrxxxrx.exe48⤵
- Executes dropped EXE
PID:1300 -
\??\c:\7lxxfll.exec:\7lxxfll.exe49⤵
- Executes dropped EXE
PID:2888 -
\??\c:\hthbnh.exec:\hthbnh.exe50⤵
- Executes dropped EXE
PID:2000 -
\??\c:\vdjdj.exec:\vdjdj.exe51⤵
- Executes dropped EXE
PID:1364 -
\??\c:\pdvjv.exec:\pdvjv.exe52⤵
- Executes dropped EXE
PID:2272 -
\??\c:\9vvpp.exec:\9vvpp.exe53⤵
- Executes dropped EXE
PID:2168 -
\??\c:\9lrfxll.exec:\9lrfxll.exe54⤵
- Executes dropped EXE
PID:1888 -
\??\c:\btbbnn.exec:\btbbnn.exe55⤵
- Executes dropped EXE
PID:1920 -
\??\c:\nbbnht.exec:\nbbnht.exe56⤵
- Executes dropped EXE
PID:2220 -
\??\c:\dpvvp.exec:\dpvvp.exe57⤵
- Executes dropped EXE
PID:2964 -
\??\c:\vjdpj.exec:\vjdpj.exe58⤵
- Executes dropped EXE
PID:1368 -
\??\c:\frrfxrx.exec:\frrfxrx.exe59⤵
- Executes dropped EXE
PID:2112 -
\??\c:\xrrflrr.exec:\xrrflrr.exe60⤵
- Executes dropped EXE
PID:928 -
\??\c:\9btnhb.exec:\9btnhb.exe61⤵
- Executes dropped EXE
PID:1956 -
\??\c:\nbhbbb.exec:\nbhbbb.exe62⤵
- Executes dropped EXE
PID:2060 -
\??\c:\jpppv.exec:\jpppv.exe63⤵
- Executes dropped EXE
PID:2236 -
\??\c:\pdvpd.exec:\pdvpd.exe64⤵
- Executes dropped EXE
PID:572 -
\??\c:\1rxrllx.exec:\1rxrllx.exe65⤵
- Executes dropped EXE
PID:2936 -
\??\c:\xffxffr.exec:\xffxffr.exe66⤵PID:1028
-
\??\c:\btnhtn.exec:\btnhtn.exe67⤵PID:840
-
\??\c:\nbhhth.exec:\nbhhth.exe68⤵PID:1908
-
\??\c:\9pddd.exec:\9pddd.exe69⤵PID:2256
-
\??\c:\dvddj.exec:\dvddj.exe70⤵PID:2768
-
\??\c:\9ffrlxx.exec:\9ffrlxx.exe71⤵PID:1608
-
\??\c:\3frxfff.exec:\3frxfff.exe72⤵PID:2688
-
\??\c:\bnbhnn.exec:\bnbhnn.exe73⤵PID:2932
-
\??\c:\jvppj.exec:\jvppj.exe74⤵PID:2736
-
\??\c:\9llfrll.exec:\9llfrll.exe75⤵PID:2824
-
\??\c:\3hhtnh.exec:\3hhtnh.exe76⤵PID:3060
-
\??\c:\hbhhnt.exec:\hbhhnt.exe77⤵PID:2588
-
\??\c:\9pddv.exec:\9pddv.exe78⤵PID:2840
-
\??\c:\jvppv.exec:\jvppv.exe79⤵PID:236
-
\??\c:\5rxllff.exec:\5rxllff.exe80⤵PID:1252
-
\??\c:\9xrrrlr.exec:\9xrrrlr.exe81⤵PID:796
-
\??\c:\thhbbt.exec:\thhbbt.exe82⤵PID:2292
-
\??\c:\hbttbb.exec:\hbttbb.exe83⤵PID:2300
-
\??\c:\3nntnh.exec:\3nntnh.exe84⤵PID:1756
-
\??\c:\jvppv.exec:\jvppv.exe85⤵PID:2624
-
\??\c:\7rrfxrr.exec:\7rrfxrr.exe86⤵PID:1308
-
\??\c:\9rxrlll.exec:\9rxrlll.exe87⤵PID:2872
-
\??\c:\bttttn.exec:\bttttn.exe88⤵PID:880
-
\??\c:\bnnnhh.exec:\bnnnhh.exe89⤵PID:776
-
\??\c:\pdpjv.exec:\pdpjv.exe90⤵PID:2084
-
\??\c:\vvdjp.exec:\vvdjp.exe91⤵PID:1532
-
\??\c:\rflxlfr.exec:\rflxlfr.exe92⤵PID:3068
-
\??\c:\rfxrxff.exec:\rfxrxff.exe93⤵PID:2176
-
\??\c:\hbbbbb.exec:\hbbbbb.exe94⤵PID:2988
-
\??\c:\hthhhb.exec:\hthhhb.exe95⤵PID:444
-
\??\c:\pdpjd.exec:\pdpjd.exe96⤵PID:1348
-
\??\c:\3vpdd.exec:\3vpdd.exe97⤵PID:1936
-
\??\c:\lrrlxrr.exec:\lrrlxrr.exe98⤵PID:948
-
\??\c:\xfrfxrr.exec:\xfrfxrr.exe99⤵PID:1696
-
\??\c:\bnnnnn.exec:\bnnnnn.exe100⤵PID:2240
-
\??\c:\7vjpp.exec:\7vjpp.exe101⤵PID:2064
-
\??\c:\5pdvp.exec:\5pdvp.exe102⤵PID:2248
-
\??\c:\pdjvp.exec:\pdjvp.exe103⤵PID:2344
-
\??\c:\9xfffff.exec:\9xfffff.exe104⤵PID:3040
-
\??\c:\7rfffrr.exec:\7rfffrr.exe105⤵PID:1260
-
\??\c:\thnttt.exec:\thnttt.exe106⤵PID:2460
-
\??\c:\3btnhb.exec:\3btnhb.exe107⤵PID:2476
-
\??\c:\jdppj.exec:\jdppj.exe108⤵PID:2764
-
\??\c:\jvdvd.exec:\jvdvd.exe109⤵PID:2756
-
\??\c:\7xrffxx.exec:\7xrffxx.exe110⤵PID:2744
-
\??\c:\5frrxxx.exec:\5frrxxx.exe111⤵PID:2844
-
\??\c:\ntttnn.exec:\ntttnn.exe112⤵PID:2928
-
\??\c:\thhhbt.exec:\thhhbt.exe113⤵PID:2696
-
\??\c:\dpvvd.exec:\dpvvd.exe114⤵PID:2584
-
\??\c:\3vdvp.exec:\3vdvp.exe115⤵PID:2864
-
\??\c:\frrrxxf.exec:\frrrxxf.exe116⤵PID:2576
-
\??\c:\xxxxllr.exec:\xxxxllr.exe117⤵PID:3020
-
\??\c:\tnhhbb.exec:\tnhhbb.exe118⤵
- System Location Discovery: System Language Discovery
PID:3004 -
\??\c:\3nthbb.exec:\3nthbb.exe119⤵PID:2396
-
\??\c:\vjppd.exec:\vjppd.exe120⤵PID:1868
-
\??\c:\pdjdd.exec:\pdjdd.exe121⤵PID:2520
-
\??\c:\lxlxffx.exec:\lxlxffx.exe122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-