Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 08:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e46dabac27499cf1feeee9245b19d470N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
e46dabac27499cf1feeee9245b19d470N.exe
-
Size
453KB
-
MD5
e46dabac27499cf1feeee9245b19d470
-
SHA1
1362e3146be3dc78dce7f2e42090fa4b841bd635
-
SHA256
59442b9ccc0711cb132e1cd178fad01e842cccc093025ae58f203dd35d2b3bcd
-
SHA512
0d203359407239b2545f1806cc2e6830e33f3f627e7fdd380377b6f080054d8bc651a0c84212d25ecc3aeb77a65df801a8860ed9e5ce80a20471c19c22c7a810
-
SSDEEP
12288:n3C9uDIPh2kkkkK4kXkkkkkkkkl888888888888888888nu:ShPh2kkkkK4kXkkkkkkkkA
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
resource yara_rule behavioral1/memory/2672-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2324-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1900-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3004-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2412-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1692-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1348-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1252-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2056-293-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2304-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2324 bhhbtb.exe 1900 xrffxlr.exe 3004 bttbtb.exe 2700 rxrfxrf.exe 3020 tnnnht.exe 2780 3xlfrrx.exe 2964 ttnnbh.exe 2640 bbbnhh.exe 2656 jjdpd.exe 2568 ffxxfxl.exe 2412 vpjjp.exe 1504 9httbt.exe 1740 rrffxfr.exe 1928 1bnbnt.exe 1692 dpdpd.exe 1348 9llflrl.exe 1744 ttnbtb.exe 2824 pvpdj.exe 644 fxlrffx.exe 2160 vjvvd.exe 1716 xrlrxrr.exe 1392 frfxxfx.exe 2784 1pvdd.exe 1316 jddjd.exe 1252 nhhnth.exe 1544 jjdpd.exe 2256 xllrxfr.exe 2100 pdvdp.exe 1892 rlrxlrx.exe 2056 xffxfxr.exe 2304 nnnhht.exe 1628 thttnn.exe 532 ppddj.exe 2428 xrfrllx.exe 2364 frflffr.exe 2848 btttbh.exe 2700 1vppj.exe 2724 ththhh.exe 2780 jjvjd.exe 2752 xxlllrl.exe 2896 ffxxrxl.exe 2668 thbhbh.exe 2760 9vvpd.exe 2124 rlffxxr.exe 2568 ttthbh.exe 1820 1jddj.exe 376 3jpvd.exe 2128 xxrflxl.exe 1540 nhhbhh.exe 1968 nttbht.exe 1636 ppjvd.exe 872 xxlrffr.exe 1768 xxxfrfr.exe 2788 ttnbtb.exe 2164 pppvp.exe 2208 llfrxfr.exe 2812 xfxlrxr.exe 1884 ththnt.exe 448 5djpd.exe 2924 rxxrlxx.exe 1176 fxlrxfl.exe 636 nhhnbh.exe 2920 dvvpd.exe 688 lfrlxfr.exe -
resource yara_rule behavioral1/memory/2672-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2324-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1348-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1252-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-293-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2304-302-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxfffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbthbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xfrxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lxrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxrxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrflxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2324 2672 e46dabac27499cf1feeee9245b19d470N.exe 30 PID 2672 wrote to memory of 2324 2672 e46dabac27499cf1feeee9245b19d470N.exe 30 PID 2672 wrote to memory of 2324 2672 e46dabac27499cf1feeee9245b19d470N.exe 30 PID 2672 wrote to memory of 2324 2672 e46dabac27499cf1feeee9245b19d470N.exe 30 PID 2324 wrote to memory of 1900 2324 bhhbtb.exe 31 PID 2324 wrote to memory of 1900 2324 bhhbtb.exe 31 PID 2324 wrote to memory of 1900 2324 bhhbtb.exe 31 PID 2324 wrote to memory of 1900 2324 bhhbtb.exe 31 PID 1900 wrote to memory of 3004 1900 xrffxlr.exe 32 PID 1900 wrote to memory of 3004 1900 xrffxlr.exe 32 PID 1900 wrote to memory of 3004 1900 xrffxlr.exe 32 PID 1900 wrote to memory of 3004 1900 xrffxlr.exe 32 PID 3004 wrote to memory of 2700 3004 bttbtb.exe 33 PID 3004 wrote to memory of 2700 3004 bttbtb.exe 33 PID 3004 wrote to memory of 2700 3004 bttbtb.exe 33 PID 3004 wrote to memory of 2700 3004 bttbtb.exe 33 PID 2700 wrote to memory of 3020 2700 rxrfxrf.exe 34 PID 2700 wrote to memory of 3020 2700 rxrfxrf.exe 34 PID 2700 wrote to memory of 3020 2700 rxrfxrf.exe 34 PID 2700 wrote to memory of 3020 2700 rxrfxrf.exe 34 PID 3020 wrote to memory of 2780 3020 tnnnht.exe 35 PID 3020 wrote to memory of 2780 3020 tnnnht.exe 35 PID 3020 wrote to memory of 2780 3020 tnnnht.exe 35 PID 3020 wrote to memory of 2780 3020 tnnnht.exe 35 PID 2780 wrote to memory of 2964 2780 3xlfrrx.exe 36 PID 2780 wrote to memory of 2964 2780 3xlfrrx.exe 36 PID 2780 wrote to memory of 2964 2780 3xlfrrx.exe 36 PID 2780 wrote to memory of 2964 2780 3xlfrrx.exe 36 PID 2964 wrote to memory of 2640 2964 ttnnbh.exe 37 PID 2964 wrote to memory of 2640 2964 ttnnbh.exe 37 PID 2964 wrote to memory of 2640 2964 ttnnbh.exe 37 PID 2964 wrote to memory of 2640 2964 ttnnbh.exe 37 PID 2640 wrote to memory of 2656 2640 bbbnhh.exe 38 PID 2640 wrote to memory of 2656 2640 bbbnhh.exe 38 PID 2640 wrote to memory of 2656 2640 bbbnhh.exe 38 PID 2640 wrote to memory of 2656 2640 bbbnhh.exe 38 PID 2656 wrote to memory of 2568 2656 jjdpd.exe 39 PID 2656 wrote to memory of 2568 2656 jjdpd.exe 39 PID 2656 wrote to memory of 2568 2656 jjdpd.exe 39 PID 2656 wrote to memory of 2568 2656 jjdpd.exe 39 PID 2568 wrote to memory of 2412 2568 ffxxfxl.exe 40 PID 2568 wrote to memory of 2412 2568 ffxxfxl.exe 40 PID 2568 wrote to memory of 2412 2568 ffxxfxl.exe 40 PID 2568 wrote to memory of 2412 2568 ffxxfxl.exe 40 PID 2412 wrote to memory of 1504 2412 vpjjp.exe 41 PID 2412 wrote to memory of 1504 2412 vpjjp.exe 41 PID 2412 wrote to memory of 1504 2412 vpjjp.exe 41 PID 2412 wrote to memory of 1504 2412 vpjjp.exe 41 PID 1504 wrote to memory of 1740 1504 9httbt.exe 42 PID 1504 wrote to memory of 1740 1504 9httbt.exe 42 PID 1504 wrote to memory of 1740 1504 9httbt.exe 42 PID 1504 wrote to memory of 1740 1504 9httbt.exe 42 PID 1740 wrote to memory of 1928 1740 rrffxfr.exe 43 PID 1740 wrote to memory of 1928 1740 rrffxfr.exe 43 PID 1740 wrote to memory of 1928 1740 rrffxfr.exe 43 PID 1740 wrote to memory of 1928 1740 rrffxfr.exe 43 PID 1928 wrote to memory of 1692 1928 1bnbnt.exe 44 PID 1928 wrote to memory of 1692 1928 1bnbnt.exe 44 PID 1928 wrote to memory of 1692 1928 1bnbnt.exe 44 PID 1928 wrote to memory of 1692 1928 1bnbnt.exe 44 PID 1692 wrote to memory of 1348 1692 dpdpd.exe 45 PID 1692 wrote to memory of 1348 1692 dpdpd.exe 45 PID 1692 wrote to memory of 1348 1692 dpdpd.exe 45 PID 1692 wrote to memory of 1348 1692 dpdpd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e46dabac27499cf1feeee9245b19d470N.exe"C:\Users\Admin\AppData\Local\Temp\e46dabac27499cf1feeee9245b19d470N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\bhhbtb.exec:\bhhbtb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\xrffxlr.exec:\xrffxlr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
\??\c:\bttbtb.exec:\bttbtb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\rxrfxrf.exec:\rxrfxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\tnnnht.exec:\tnnnht.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\3xlfrrx.exec:\3xlfrrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\ttnnbh.exec:\ttnnbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\bbbnhh.exec:\bbbnhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\jjdpd.exec:\jjdpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\ffxxfxl.exec:\ffxxfxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\vpjjp.exec:\vpjjp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\9httbt.exec:\9httbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\rrffxfr.exec:\rrffxfr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\1bnbnt.exec:\1bnbnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\dpdpd.exec:\dpdpd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\9llflrl.exec:\9llflrl.exe17⤵
- Executes dropped EXE
PID:1348 -
\??\c:\ttnbtb.exec:\ttnbtb.exe18⤵
- Executes dropped EXE
PID:1744 -
\??\c:\pvpdj.exec:\pvpdj.exe19⤵
- Executes dropped EXE
PID:2824 -
\??\c:\fxlrffx.exec:\fxlrffx.exe20⤵
- Executes dropped EXE
PID:644 -
\??\c:\vjvvd.exec:\vjvvd.exe21⤵
- Executes dropped EXE
PID:2160 -
\??\c:\xrlrxrr.exec:\xrlrxrr.exe22⤵
- Executes dropped EXE
PID:1716 -
\??\c:\frfxxfx.exec:\frfxxfx.exe23⤵
- Executes dropped EXE
PID:1392 -
\??\c:\1pvdd.exec:\1pvdd.exe24⤵
- Executes dropped EXE
PID:2784 -
\??\c:\jddjd.exec:\jddjd.exe25⤵
- Executes dropped EXE
PID:1316 -
\??\c:\nhhnth.exec:\nhhnth.exe26⤵
- Executes dropped EXE
PID:1252 -
\??\c:\jjdpd.exec:\jjdpd.exe27⤵
- Executes dropped EXE
PID:1544 -
\??\c:\xllrxfr.exec:\xllrxfr.exe28⤵
- Executes dropped EXE
PID:2256 -
\??\c:\pdvdp.exec:\pdvdp.exe29⤵
- Executes dropped EXE
PID:2100 -
\??\c:\rlrxlrx.exec:\rlrxlrx.exe30⤵
- Executes dropped EXE
PID:1892 -
\??\c:\xffxfxr.exec:\xffxfxr.exe31⤵
- Executes dropped EXE
PID:2056 -
\??\c:\nnnhht.exec:\nnnhht.exe32⤵
- Executes dropped EXE
PID:2304 -
\??\c:\thttnn.exec:\thttnn.exe33⤵
- Executes dropped EXE
PID:1628 -
\??\c:\ppddj.exec:\ppddj.exe34⤵
- Executes dropped EXE
PID:532 -
\??\c:\xrfrllx.exec:\xrfrllx.exe35⤵
- Executes dropped EXE
PID:2428 -
\??\c:\frflffr.exec:\frflffr.exe36⤵
- Executes dropped EXE
PID:2364 -
\??\c:\btttbh.exec:\btttbh.exe37⤵
- Executes dropped EXE
PID:2848 -
\??\c:\1vppj.exec:\1vppj.exe38⤵
- Executes dropped EXE
PID:2700 -
\??\c:\ththhh.exec:\ththhh.exe39⤵
- Executes dropped EXE
PID:2724 -
\??\c:\jjvjd.exec:\jjvjd.exe40⤵
- Executes dropped EXE
PID:2780 -
\??\c:\xxlllrl.exec:\xxlllrl.exe41⤵
- Executes dropped EXE
PID:2752 -
\??\c:\ffxxrxl.exec:\ffxxrxl.exe42⤵
- Executes dropped EXE
PID:2896 -
\??\c:\thbhbh.exec:\thbhbh.exe43⤵
- Executes dropped EXE
PID:2668 -
\??\c:\9vvpd.exec:\9vvpd.exe44⤵
- Executes dropped EXE
PID:2760 -
\??\c:\rlffxxr.exec:\rlffxxr.exe45⤵
- Executes dropped EXE
PID:2124 -
\??\c:\ttthbh.exec:\ttthbh.exe46⤵
- Executes dropped EXE
PID:2568 -
\??\c:\1jddj.exec:\1jddj.exe47⤵
- Executes dropped EXE
PID:1820 -
\??\c:\3jpvd.exec:\3jpvd.exe48⤵
- Executes dropped EXE
PID:376 -
\??\c:\xxrflxl.exec:\xxrflxl.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128 -
\??\c:\nhhbhh.exec:\nhhbhh.exe50⤵
- Executes dropped EXE
PID:1540 -
\??\c:\nttbht.exec:\nttbht.exe51⤵
- Executes dropped EXE
PID:1968 -
\??\c:\ppjvd.exec:\ppjvd.exe52⤵
- Executes dropped EXE
PID:1636 -
\??\c:\xxlrffr.exec:\xxlrffr.exe53⤵
- Executes dropped EXE
PID:872 -
\??\c:\xxxfrfr.exec:\xxxfrfr.exe54⤵
- Executes dropped EXE
PID:1768 -
\??\c:\ttnbtb.exec:\ttnbtb.exe55⤵
- Executes dropped EXE
PID:2788 -
\??\c:\pppvp.exec:\pppvp.exe56⤵
- Executes dropped EXE
PID:2164 -
\??\c:\llfrxfr.exec:\llfrxfr.exe57⤵
- Executes dropped EXE
PID:2208 -
\??\c:\xfxlrxr.exec:\xfxlrxr.exe58⤵
- Executes dropped EXE
PID:2812 -
\??\c:\ththnt.exec:\ththnt.exe59⤵
- Executes dropped EXE
PID:1884 -
\??\c:\5djpd.exec:\5djpd.exe60⤵
- Executes dropped EXE
PID:448 -
\??\c:\rxxrlxx.exec:\rxxrlxx.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
\??\c:\fxlrxfl.exec:\fxlrxfl.exe62⤵
- Executes dropped EXE
PID:1176 -
\??\c:\nhhnbh.exec:\nhhnbh.exe63⤵
- Executes dropped EXE
PID:636 -
\??\c:\dvvpd.exec:\dvvpd.exe64⤵
- Executes dropped EXE
PID:2920 -
\??\c:\lfrlxfr.exec:\lfrlxfr.exe65⤵
- Executes dropped EXE
PID:688 -
\??\c:\9lffrlr.exec:\9lffrlr.exe66⤵PID:1460
-
\??\c:\nnnbnb.exec:\nnnbnb.exe67⤵PID:2084
-
\??\c:\9jvpv.exec:\9jvpv.exe68⤵PID:1020
-
\??\c:\pdvvv.exec:\pdvvv.exe69⤵PID:1828
-
\??\c:\ffxlflf.exec:\ffxlflf.exe70⤵PID:2028
-
\??\c:\bthtbh.exec:\bthtbh.exe71⤵PID:2176
-
\??\c:\3hnhnn.exec:\3hnhnn.exe72⤵PID:1520
-
\??\c:\pvpjv.exec:\pvpjv.exe73⤵PID:1524
-
\??\c:\fxlflxl.exec:\fxlflxl.exe74⤵PID:2328
-
\??\c:\lxxlffx.exec:\lxxlffx.exe75⤵PID:2772
-
\??\c:\hhbnhh.exec:\hhbnhh.exe76⤵PID:3004
-
\??\c:\pvppd.exec:\pvppd.exe77⤵PID:2748
-
\??\c:\7fxflrx.exec:\7fxflrx.exe78⤵PID:748
-
\??\c:\rxxrfrf.exec:\rxxrfrf.exe79⤵PID:2844
-
\??\c:\3btbnb.exec:\3btbnb.exe80⤵PID:2852
-
\??\c:\3hnthn.exec:\3hnthn.exe81⤵PID:2276
-
\??\c:\pjdpv.exec:\pjdpv.exe82⤵PID:1952
-
\??\c:\rlfrfrl.exec:\rlfrfrl.exe83⤵PID:2156
-
\??\c:\frflxfl.exec:\frflxfl.exe84⤵PID:2712
-
\??\c:\tbnnnt.exec:\tbnnnt.exe85⤵PID:676
-
\??\c:\jddvv.exec:\jddvv.exe86⤵PID:692
-
\??\c:\lfflrxr.exec:\lfflrxr.exe87⤵PID:840
-
\??\c:\flllxxl.exec:\flllxxl.exe88⤵PID:1616
-
\??\c:\nnnbht.exec:\nnnbht.exe89⤵PID:2332
-
\??\c:\ddvjd.exec:\ddvjd.exe90⤵PID:2340
-
\??\c:\9vpjv.exec:\9vpjv.exe91⤵PID:800
-
\??\c:\7fllxfl.exec:\7fllxfl.exe92⤵PID:1888
-
\??\c:\hhthbn.exec:\hhthbn.exe93⤵PID:3060
-
\??\c:\bhthtb.exec:\bhthtb.exe94⤵PID:2828
-
\??\c:\ppdpd.exec:\ppdpd.exe95⤵PID:2076
-
\??\c:\rfxlxrf.exec:\rfxlxrf.exe96⤵PID:1672
-
\??\c:\7ntnbn.exec:\7ntnbn.exe97⤵PID:2980
-
\??\c:\hbnhbt.exec:\hbnhbt.exe98⤵PID:1412
-
\??\c:\1pddv.exec:\1pddv.exe99⤵PID:796
-
\??\c:\fxrxlrf.exec:\fxrxlrf.exe100⤵PID:948
-
\??\c:\rllxflf.exec:\rllxflf.exe101⤵PID:348
-
\??\c:\bttbnt.exec:\bttbnt.exe102⤵PID:2316
-
\??\c:\jdpjv.exec:\jdpjv.exe103⤵PID:1472
-
\??\c:\dpvdd.exec:\dpvdd.exe104⤵PID:1252
-
\??\c:\xrrxrxl.exec:\xrrxrxl.exe105⤵PID:2220
-
\??\c:\ththht.exec:\ththht.exe106⤵PID:2196
-
\??\c:\nhhnnt.exec:\nhhnnt.exe107⤵PID:2256
-
\??\c:\vvpdd.exec:\vvpdd.exe108⤵PID:1424
-
\??\c:\rrrxlrl.exec:\rrrxlrl.exe109⤵PID:1804
-
\??\c:\xrrxlxr.exec:\xrrxlxr.exe110⤵PID:2056
-
\??\c:\hbthbb.exec:\hbthbb.exe111⤵PID:1496
-
\??\c:\5hnntb.exec:\5hnntb.exe112⤵PID:2300
-
\??\c:\7vpdp.exec:\7vpdp.exe113⤵PID:596
-
\??\c:\rrrlflr.exec:\rrrlflr.exe114⤵PID:2248
-
\??\c:\hbttbb.exec:\hbttbb.exe115⤵PID:2424
-
\??\c:\httbnt.exec:\httbnt.exe116⤵PID:2720
-
\??\c:\1vpdp.exec:\1vpdp.exe117⤵PID:2716
-
\??\c:\ffxflrx.exec:\ffxflrx.exe118⤵PID:3012
-
\??\c:\flxrllx.exec:\flxrllx.exe119⤵PID:2708
-
\??\c:\nhbhtt.exec:\nhbhtt.exe120⤵PID:2780
-
\??\c:\nnhhhh.exec:\nnhhhh.exe121⤵PID:2692
-
\??\c:\vvvpj.exec:\vvvpj.exe122⤵PID:2896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-