Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe
Resource
win7-20240708-en
General
-
Target
dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe
-
Size
82KB
-
MD5
bea7a34f32f0930bcff895e355cd3431
-
SHA1
cff2023cbcc339b57ff92ab146f5b2987b504aed
-
SHA256
dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420
-
SHA512
1f7bc16379384148e99bb69abf8ea0da60ee9d815e551f1c95740bfe3b05313488b0369df0992379708c4069a39c880b8f1ee4e9145e682ae88274ec61226351
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q3:ymb3NkkiQ3mdBjFIIp9L9QrrA8e
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2676-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2076-69-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2952-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1464-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2100-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/660-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1972-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2156-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1052-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1696-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/888-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1076-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2796 rfxxllx.exe 2692 frflrfr.exe 2728 nntnth.exe 2732 vpjjd.exe 2584 1rxfrrf.exe 2076 tnbntt.exe 1464 pjpdj.exe 2952 5xlflfr.exe 2100 tbbnhh.exe 2180 btbtbb.exe 660 vpjpj.exe 1460 xllrfrf.exe 2824 xrlrllr.exe 1972 nbnnbh.exe 2496 pjpjv.exe 1032 pjvjj.exe 2156 lfrxrxf.exe 1052 hbbhhh.exe 2428 1tnhth.exe 2988 9jpjp.exe 2168 9pdvd.exe 1696 rlxxffr.exe 924 htnnnn.exe 888 nhbbhh.exe 1076 3djjj.exe 2304 ppvvd.exe 2280 lxfxfrl.exe 1832 3bnhbh.exe 1556 jvpvj.exe 1448 lfxlflx.exe 2204 9xxrffl.exe 2700 7ntnbb.exe 2852 3hhnnn.exe 2604 7ddpv.exe 2684 dpddj.exe 1608 3rllflx.exe 2564 rrfflrf.exe 2580 rlfflll.exe 2068 1tnthn.exe 1684 7dvjj.exe 3012 vppjv.exe 2092 fxxrffr.exe 2144 xxrlflf.exe 2184 fxxxlrx.exe 1220 tntnbb.exe 1504 5hbtht.exe 760 pdvvj.exe 1460 vpdjp.exe 2968 xflflfr.exe 1820 5xrfllr.exe 876 thtthh.exe 2108 btnbhn.exe 344 7btbhn.exe 2156 7dpvd.exe 2244 3jvvv.exe 1720 rlfrxlx.exe 3036 7rlrlff.exe 1912 bnhtbh.exe 2168 9thnnb.exe 1108 1bbntt.exe 296 jdjdj.exe 2384 jjdpj.exe 844 fxllffl.exe 2276 lxrfrxl.exe -
resource yara_rule behavioral1/memory/2676-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1464-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1464-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1464-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2100-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/660-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1052-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1696-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/888-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1076-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-273-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffrflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lrxrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrlxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2796 2676 dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe 30 PID 2676 wrote to memory of 2796 2676 dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe 30 PID 2676 wrote to memory of 2796 2676 dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe 30 PID 2676 wrote to memory of 2796 2676 dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe 30 PID 2796 wrote to memory of 2692 2796 rfxxllx.exe 31 PID 2796 wrote to memory of 2692 2796 rfxxllx.exe 31 PID 2796 wrote to memory of 2692 2796 rfxxllx.exe 31 PID 2796 wrote to memory of 2692 2796 rfxxllx.exe 31 PID 2692 wrote to memory of 2728 2692 frflrfr.exe 32 PID 2692 wrote to memory of 2728 2692 frflrfr.exe 32 PID 2692 wrote to memory of 2728 2692 frflrfr.exe 32 PID 2692 wrote to memory of 2728 2692 frflrfr.exe 32 PID 2728 wrote to memory of 2732 2728 nntnth.exe 33 PID 2728 wrote to memory of 2732 2728 nntnth.exe 33 PID 2728 wrote to memory of 2732 2728 nntnth.exe 33 PID 2728 wrote to memory of 2732 2728 nntnth.exe 33 PID 2732 wrote to memory of 2584 2732 vpjjd.exe 34 PID 2732 wrote to memory of 2584 2732 vpjjd.exe 34 PID 2732 wrote to memory of 2584 2732 vpjjd.exe 34 PID 2732 wrote to memory of 2584 2732 vpjjd.exe 34 PID 2584 wrote to memory of 2076 2584 1rxfrrf.exe 35 PID 2584 wrote to memory of 2076 2584 1rxfrrf.exe 35 PID 2584 wrote to memory of 2076 2584 1rxfrrf.exe 35 PID 2584 wrote to memory of 2076 2584 1rxfrrf.exe 35 PID 2076 wrote to memory of 1464 2076 tnbntt.exe 36 PID 2076 wrote to memory of 1464 2076 tnbntt.exe 36 PID 2076 wrote to memory of 1464 2076 tnbntt.exe 36 PID 2076 wrote to memory of 1464 2076 tnbntt.exe 36 PID 1464 wrote to memory of 2952 1464 pjpdj.exe 37 PID 1464 wrote to memory of 2952 1464 pjpdj.exe 37 PID 1464 wrote to memory of 2952 1464 pjpdj.exe 37 PID 1464 wrote to memory of 2952 1464 pjpdj.exe 37 PID 2952 wrote to memory of 2100 2952 5xlflfr.exe 38 PID 2952 wrote to memory of 2100 2952 5xlflfr.exe 38 PID 2952 wrote to memory of 2100 2952 5xlflfr.exe 38 PID 2952 wrote to memory of 2100 2952 5xlflfr.exe 38 PID 2100 wrote to memory of 2180 2100 tbbnhh.exe 39 PID 2100 wrote to memory of 2180 2100 tbbnhh.exe 39 PID 2100 wrote to memory of 2180 2100 tbbnhh.exe 39 PID 2100 wrote to memory of 2180 2100 tbbnhh.exe 39 PID 2180 wrote to memory of 660 2180 btbtbb.exe 40 PID 2180 wrote to memory of 660 2180 btbtbb.exe 40 PID 2180 wrote to memory of 660 2180 btbtbb.exe 40 PID 2180 wrote to memory of 660 2180 btbtbb.exe 40 PID 660 wrote to memory of 1460 660 vpjpj.exe 41 PID 660 wrote to memory of 1460 660 vpjpj.exe 41 PID 660 wrote to memory of 1460 660 vpjpj.exe 41 PID 660 wrote to memory of 1460 660 vpjpj.exe 41 PID 1460 wrote to memory of 2824 1460 xllrfrf.exe 42 PID 1460 wrote to memory of 2824 1460 xllrfrf.exe 42 PID 1460 wrote to memory of 2824 1460 xllrfrf.exe 42 PID 1460 wrote to memory of 2824 1460 xllrfrf.exe 42 PID 2824 wrote to memory of 1972 2824 xrlrllr.exe 43 PID 2824 wrote to memory of 1972 2824 xrlrllr.exe 43 PID 2824 wrote to memory of 1972 2824 xrlrllr.exe 43 PID 2824 wrote to memory of 1972 2824 xrlrllr.exe 43 PID 1972 wrote to memory of 2496 1972 nbnnbh.exe 44 PID 1972 wrote to memory of 2496 1972 nbnnbh.exe 44 PID 1972 wrote to memory of 2496 1972 nbnnbh.exe 44 PID 1972 wrote to memory of 2496 1972 nbnnbh.exe 44 PID 2496 wrote to memory of 1032 2496 pjpjv.exe 45 PID 2496 wrote to memory of 1032 2496 pjpjv.exe 45 PID 2496 wrote to memory of 1032 2496 pjpjv.exe 45 PID 2496 wrote to memory of 1032 2496 pjpjv.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe"C:\Users\Admin\AppData\Local\Temp\dcebb2e1ea4c0d7c5bb706d6120f27089f8e9318fe3a7aedf603d5bef0a43420.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\rfxxllx.exec:\rfxxllx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\frflrfr.exec:\frflrfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\nntnth.exec:\nntnth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\vpjjd.exec:\vpjjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\1rxfrrf.exec:\1rxfrrf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\tnbntt.exec:\tnbntt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\pjpdj.exec:\pjpdj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\5xlflfr.exec:\5xlflfr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\tbbnhh.exec:\tbbnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\btbtbb.exec:\btbtbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\vpjpj.exec:\vpjpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
\??\c:\xllrfrf.exec:\xllrfrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\xrlrllr.exec:\xrlrllr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\nbnnbh.exec:\nbnnbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\pjpjv.exec:\pjpjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\pjvjj.exec:\pjvjj.exe17⤵
- Executes dropped EXE
PID:1032 -
\??\c:\lfrxrxf.exec:\lfrxrxf.exe18⤵
- Executes dropped EXE
PID:2156 -
\??\c:\hbbhhh.exec:\hbbhhh.exe19⤵
- Executes dropped EXE
PID:1052 -
\??\c:\1tnhth.exec:\1tnhth.exe20⤵
- Executes dropped EXE
PID:2428 -
\??\c:\9jpjp.exec:\9jpjp.exe21⤵
- Executes dropped EXE
PID:2988 -
\??\c:\9pdvd.exec:\9pdvd.exe22⤵
- Executes dropped EXE
PID:2168 -
\??\c:\rlxxffr.exec:\rlxxffr.exe23⤵
- Executes dropped EXE
PID:1696 -
\??\c:\htnnnn.exec:\htnnnn.exe24⤵
- Executes dropped EXE
PID:924 -
\??\c:\nhbbhh.exec:\nhbbhh.exe25⤵
- Executes dropped EXE
PID:888 -
\??\c:\3djjj.exec:\3djjj.exe26⤵
- Executes dropped EXE
PID:1076 -
\??\c:\ppvvd.exec:\ppvvd.exe27⤵
- Executes dropped EXE
PID:2304 -
\??\c:\lxfxfrl.exec:\lxfxfrl.exe28⤵
- Executes dropped EXE
PID:2280 -
\??\c:\3bnhbh.exec:\3bnhbh.exe29⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jvpvj.exec:\jvpvj.exe30⤵
- Executes dropped EXE
PID:1556 -
\??\c:\lfxlflx.exec:\lfxlflx.exe31⤵
- Executes dropped EXE
PID:1448 -
\??\c:\9xxrffl.exec:\9xxrffl.exe32⤵
- Executes dropped EXE
PID:2204 -
\??\c:\7ntnbb.exec:\7ntnbb.exe33⤵
- Executes dropped EXE
PID:2700 -
\??\c:\3hhnnn.exec:\3hhnnn.exe34⤵
- Executes dropped EXE
PID:2852 -
\??\c:\7ddpv.exec:\7ddpv.exe35⤵
- Executes dropped EXE
PID:2604 -
\??\c:\dpddj.exec:\dpddj.exe36⤵
- Executes dropped EXE
PID:2684 -
\??\c:\3rllflx.exec:\3rllflx.exe37⤵
- Executes dropped EXE
PID:1608 -
\??\c:\rrfflrf.exec:\rrfflrf.exe38⤵
- Executes dropped EXE
PID:2564 -
\??\c:\rlfflll.exec:\rlfflll.exe39⤵
- Executes dropped EXE
PID:2580 -
\??\c:\1tnthn.exec:\1tnthn.exe40⤵
- Executes dropped EXE
PID:2068 -
\??\c:\7dvjj.exec:\7dvjj.exe41⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vppjv.exec:\vppjv.exe42⤵
- Executes dropped EXE
PID:3012 -
\??\c:\fxxrffr.exec:\fxxrffr.exe43⤵
- Executes dropped EXE
PID:2092 -
\??\c:\xxrlflf.exec:\xxrlflf.exe44⤵
- Executes dropped EXE
PID:2144 -
\??\c:\fxxxlrx.exec:\fxxxlrx.exe45⤵
- Executes dropped EXE
PID:2184 -
\??\c:\tntnbb.exec:\tntnbb.exe46⤵
- Executes dropped EXE
PID:1220 -
\??\c:\5hbtht.exec:\5hbtht.exe47⤵
- Executes dropped EXE
PID:1504 -
\??\c:\pdvvj.exec:\pdvvj.exe48⤵
- Executes dropped EXE
PID:760 -
\??\c:\vpdjp.exec:\vpdjp.exe49⤵
- Executes dropped EXE
PID:1460 -
\??\c:\xflflfr.exec:\xflflfr.exe50⤵
- Executes dropped EXE
PID:2968 -
\??\c:\5xrfllr.exec:\5xrfllr.exe51⤵
- Executes dropped EXE
PID:1820 -
\??\c:\thtthh.exec:\thtthh.exe52⤵
- Executes dropped EXE
PID:876 -
\??\c:\btnbhn.exec:\btnbhn.exe53⤵
- Executes dropped EXE
PID:2108 -
\??\c:\7btbhn.exec:\7btbhn.exe54⤵
- Executes dropped EXE
PID:344 -
\??\c:\7dpvd.exec:\7dpvd.exe55⤵
- Executes dropped EXE
PID:2156 -
\??\c:\3jvvv.exec:\3jvvv.exe56⤵
- Executes dropped EXE
PID:2244 -
\??\c:\rlfrxlx.exec:\rlfrxlx.exe57⤵
- Executes dropped EXE
PID:1720 -
\??\c:\7rlrlff.exec:\7rlrlff.exe58⤵
- Executes dropped EXE
PID:3036 -
\??\c:\bnhtbh.exec:\bnhtbh.exe59⤵
- Executes dropped EXE
PID:1912 -
\??\c:\9thnnb.exec:\9thnnb.exe60⤵
- Executes dropped EXE
PID:2168 -
\??\c:\1bbntt.exec:\1bbntt.exe61⤵
- Executes dropped EXE
PID:1108 -
\??\c:\jdjdj.exec:\jdjdj.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:296 -
\??\c:\jjdpj.exec:\jjdpj.exe63⤵
- Executes dropped EXE
PID:2384 -
\??\c:\fxllffl.exec:\fxllffl.exe64⤵
- Executes dropped EXE
PID:844 -
\??\c:\lxrfrxl.exec:\lxrfrxl.exe65⤵
- Executes dropped EXE
PID:2276 -
\??\c:\hhbthn.exec:\hhbthn.exe66⤵PID:2488
-
\??\c:\hbtbbb.exec:\hbtbbb.exe67⤵PID:996
-
\??\c:\dvvjp.exec:\dvvjp.exe68⤵PID:2652
-
\??\c:\vvpvp.exec:\vvpvp.exe69⤵PID:1084
-
\??\c:\ddpvp.exec:\ddpvp.exe70⤵PID:2980
-
\??\c:\1fxxflf.exec:\1fxxflf.exe71⤵PID:2872
-
\??\c:\3llxlrf.exec:\3llxlrf.exe72⤵PID:2868
-
\??\c:\tnhnbh.exec:\tnhnbh.exe73⤵PID:2692
-
\??\c:\nhhnbb.exec:\nhhnbb.exe74⤵PID:2944
-
\??\c:\vpvjd.exec:\vpvjd.exe75⤵PID:2728
-
\??\c:\1vddj.exec:\1vddj.exe76⤵PID:2568
-
\??\c:\rfrxllx.exec:\rfrxllx.exe77⤵PID:2592
-
\??\c:\xlfllrr.exec:\xlfllrr.exe78⤵PID:2640
-
\??\c:\7bbhnt.exec:\7bbhnt.exe79⤵PID:2224
-
\??\c:\bthttb.exec:\bthttb.exe80⤵PID:2208
-
\??\c:\dvpjp.exec:\dvpjp.exe81⤵PID:2068
-
\??\c:\jdpdp.exec:\jdpdp.exe82⤵PID:2508
-
\??\c:\fxrrfrr.exec:\fxrrfrr.exe83⤵PID:2092
-
\??\c:\xxflxlx.exec:\xxflxlx.exe84⤵PID:2100
-
\??\c:\hbhnnb.exec:\hbhnnb.exe85⤵PID:2144
-
\??\c:\1pdvp.exec:\1pdvp.exe86⤵PID:2848
-
\??\c:\vpdjv.exec:\vpdjv.exe87⤵PID:2976
-
\??\c:\rrlrllr.exec:\rrlrllr.exe88⤵PID:1504
-
\??\c:\xxfxxrf.exec:\xxfxxrf.exe89⤵PID:2836
-
\??\c:\bbnntt.exec:\bbnntt.exe90⤵PID:2036
-
\??\c:\hbthtt.exec:\hbthtt.exe91⤵PID:2140
-
\??\c:\7vjdj.exec:\7vjdj.exe92⤵PID:2332
-
\??\c:\pjjpv.exec:\pjjpv.exe93⤵PID:1216
-
\??\c:\xxrxrll.exec:\xxrxrll.exe94⤵PID:332
-
\??\c:\fxrlrlr.exec:\fxrlrlr.exe95⤵PID:2392
-
\??\c:\9tnhbn.exec:\9tnhbn.exe96⤵PID:1368
-
\??\c:\bbthhn.exec:\bbthhn.exe97⤵PID:2428
-
\??\c:\pdvdj.exec:\pdvdj.exe98⤵PID:2988
-
\??\c:\jvvdj.exec:\jvvdj.exe99⤵PID:3032
-
\??\c:\rlxlllx.exec:\rlxlllx.exe100⤵PID:676
-
\??\c:\3lffflf.exec:\3lffflf.exe101⤵PID:348
-
\??\c:\nhttbb.exec:\nhttbb.exe102⤵PID:924
-
\??\c:\9nttbh.exec:\9nttbh.exe103⤵PID:1892
-
\??\c:\hhthht.exec:\hhthht.exe104⤵PID:1076
-
\??\c:\dvvjv.exec:\dvvjv.exe105⤵PID:2252
-
\??\c:\pjdvj.exec:\pjdvj.exe106⤵PID:2492
-
\??\c:\rrflxxf.exec:\rrflxxf.exe107⤵PID:2300
-
\??\c:\xrxxllr.exec:\xrxxllr.exe108⤵PID:2284
-
\??\c:\tnbnhb.exec:\tnbnhb.exe109⤵PID:2652
-
\??\c:\tbthnt.exec:\tbthnt.exe110⤵PID:1776
-
\??\c:\bnbhhn.exec:\bnbhhn.exe111⤵PID:2764
-
\??\c:\vpvjd.exec:\vpvjd.exe112⤵PID:2272
-
\??\c:\pdppd.exec:\pdppd.exe113⤵PID:2892
-
\??\c:\xrrrxfr.exec:\xrrrxfr.exe114⤵PID:2788
-
\??\c:\3fflxxx.exec:\3fflxxx.exe115⤵PID:2936
-
\??\c:\bthtnb.exec:\bthtnb.exe116⤵
- System Location Discovery: System Language Discovery
PID:2728 -
\??\c:\bthhtb.exec:\bthhtb.exe117⤵PID:2596
-
\??\c:\vvpdv.exec:\vvpdv.exe118⤵PID:2592
-
\??\c:\jdpvd.exec:\jdpvd.exe119⤵PID:2600
-
\??\c:\llfrrfr.exec:\llfrrfr.exe120⤵PID:2224
-
\??\c:\rlrlrrx.exec:\rlrlrrx.exe121⤵PID:2208
-
\??\c:\3bbbtt.exec:\3bbbtt.exe122⤵PID:2068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-