Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 07:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d48e11bbb9d8187950283a8748ce0160N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
d48e11bbb9d8187950283a8748ce0160N.exe
-
Size
68KB
-
MD5
d48e11bbb9d8187950283a8748ce0160
-
SHA1
f936ef3b0b9d7985024a620ec36b70ea0a2ab44a
-
SHA256
80f1b80e9ee6c176147ca89404c98e26b2f0039562ac3a36b78bf3448c429900
-
SHA512
73fe1df58b0ad0a7f34ab56a6d487e29bd7703aa0749cb37fb2b2c13a0472df717311a1ea1e4a487de524e0d59d24bbd16c7f1d83f6c9baf1574e4b0f4c3cc17
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6Mu/ePS3AL:ymb3NkkiQ3mdBjFI46TQL
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2120-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2120-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1892-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/356-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2256-49-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2256-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3024-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2012-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2360-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1712-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1892 hbttbh.exe 356 nbbntn.exe 2876 9pvvd.exe 2256 lxlrrxr.exe 2836 llrxrxr.exe 2848 bnhhhh.exe 2948 7jddj.exe 2772 fxrrxfl.exe 2676 ntbnbt.exe 2144 pdpvj.exe 1056 3rfxxrr.exe 3000 9lffflx.exe 1932 tnbhtt.exe 2372 pjpdp.exe 2796 jdjpp.exe 3024 3xlrxxf.exe 2012 xrlrxlr.exe 3020 7nntbh.exe 2108 1dppj.exe 2196 vdjjj.exe 2360 xrflrxl.exe 3068 tbtnnn.exe 1492 thhhhb.exe 1968 7pppp.exe 1832 1pjdd.exe 344 frffrlr.exe 584 rflrxxf.exe 1040 nhtntt.exe 1732 jvpvv.exe 3036 pjvdj.exe 1712 frlxfxf.exe 2452 frflrrr.exe 2128 hntnnb.exe 444 3hhtbh.exe 1588 jvjjj.exe 2756 7dvjp.exe 3048 3ppdv.exe 2612 3lfxllx.exe 2704 3btbbb.exe 2652 btbbhn.exe 2052 dvddd.exe 2648 pjppj.exe 2352 llxllrr.exe 2664 xrlrflx.exe 1440 bhtbnn.exe 2140 bnbnhh.exe 1288 dpvpp.exe 1688 3xlfffl.exe 2900 9fxxrrx.exe 2576 hbhhnn.exe 1840 nbbtbn.exe 2356 vjvvj.exe 2012 pvjdv.exe 2064 5rffffx.exe 2072 fxlxfll.exe 872 nhhtbb.exe 2240 1bntbt.exe 816 jdpjv.exe 1372 vjdvv.exe 1112 1xrrrrf.exe 2132 tntthh.exe 1256 thhhhh.exe 760 5pddv.exe 696 xfllrxf.exe -
resource yara_rule behavioral1/memory/2120-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1892-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/356-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3024-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2012-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2360-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1712-304-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hhtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1892 2120 d48e11bbb9d8187950283a8748ce0160N.exe 30 PID 2120 wrote to memory of 1892 2120 d48e11bbb9d8187950283a8748ce0160N.exe 30 PID 2120 wrote to memory of 1892 2120 d48e11bbb9d8187950283a8748ce0160N.exe 30 PID 2120 wrote to memory of 1892 2120 d48e11bbb9d8187950283a8748ce0160N.exe 30 PID 1892 wrote to memory of 356 1892 hbttbh.exe 31 PID 1892 wrote to memory of 356 1892 hbttbh.exe 31 PID 1892 wrote to memory of 356 1892 hbttbh.exe 31 PID 1892 wrote to memory of 356 1892 hbttbh.exe 31 PID 356 wrote to memory of 2876 356 nbbntn.exe 32 PID 356 wrote to memory of 2876 356 nbbntn.exe 32 PID 356 wrote to memory of 2876 356 nbbntn.exe 32 PID 356 wrote to memory of 2876 356 nbbntn.exe 32 PID 2876 wrote to memory of 2256 2876 9pvvd.exe 33 PID 2876 wrote to memory of 2256 2876 9pvvd.exe 33 PID 2876 wrote to memory of 2256 2876 9pvvd.exe 33 PID 2876 wrote to memory of 2256 2876 9pvvd.exe 33 PID 2256 wrote to memory of 2836 2256 lxlrrxr.exe 34 PID 2256 wrote to memory of 2836 2256 lxlrrxr.exe 34 PID 2256 wrote to memory of 2836 2256 lxlrrxr.exe 34 PID 2256 wrote to memory of 2836 2256 lxlrrxr.exe 34 PID 2836 wrote to memory of 2848 2836 llrxrxr.exe 35 PID 2836 wrote to memory of 2848 2836 llrxrxr.exe 35 PID 2836 wrote to memory of 2848 2836 llrxrxr.exe 35 PID 2836 wrote to memory of 2848 2836 llrxrxr.exe 35 PID 2848 wrote to memory of 2948 2848 bnhhhh.exe 36 PID 2848 wrote to memory of 2948 2848 bnhhhh.exe 36 PID 2848 wrote to memory of 2948 2848 bnhhhh.exe 36 PID 2848 wrote to memory of 2948 2848 bnhhhh.exe 36 PID 2948 wrote to memory of 2772 2948 7jddj.exe 37 PID 2948 wrote to memory of 2772 2948 7jddj.exe 37 PID 2948 wrote to memory of 2772 2948 7jddj.exe 37 PID 2948 wrote to memory of 2772 2948 7jddj.exe 37 PID 2772 wrote to memory of 2676 2772 fxrrxfl.exe 38 PID 2772 wrote to memory of 2676 2772 fxrrxfl.exe 38 PID 2772 wrote to memory of 2676 2772 fxrrxfl.exe 38 PID 2772 wrote to memory of 2676 2772 fxrrxfl.exe 38 PID 2676 wrote to memory of 2144 2676 ntbnbt.exe 39 PID 2676 wrote to memory of 2144 2676 ntbnbt.exe 39 PID 2676 wrote to memory of 2144 2676 ntbnbt.exe 39 PID 2676 wrote to memory of 2144 2676 ntbnbt.exe 39 PID 2144 wrote to memory of 1056 2144 pdpvj.exe 40 PID 2144 wrote to memory of 1056 2144 pdpvj.exe 40 PID 2144 wrote to memory of 1056 2144 pdpvj.exe 40 PID 2144 wrote to memory of 1056 2144 pdpvj.exe 40 PID 1056 wrote to memory of 3000 1056 3rfxxrr.exe 41 PID 1056 wrote to memory of 3000 1056 3rfxxrr.exe 41 PID 1056 wrote to memory of 3000 1056 3rfxxrr.exe 41 PID 1056 wrote to memory of 3000 1056 3rfxxrr.exe 41 PID 3000 wrote to memory of 1932 3000 9lffflx.exe 42 PID 3000 wrote to memory of 1932 3000 9lffflx.exe 42 PID 3000 wrote to memory of 1932 3000 9lffflx.exe 42 PID 3000 wrote to memory of 1932 3000 9lffflx.exe 42 PID 1932 wrote to memory of 2372 1932 tnbhtt.exe 43 PID 1932 wrote to memory of 2372 1932 tnbhtt.exe 43 PID 1932 wrote to memory of 2372 1932 tnbhtt.exe 43 PID 1932 wrote to memory of 2372 1932 tnbhtt.exe 43 PID 2372 wrote to memory of 2796 2372 pjpdp.exe 44 PID 2372 wrote to memory of 2796 2372 pjpdp.exe 44 PID 2372 wrote to memory of 2796 2372 pjpdp.exe 44 PID 2372 wrote to memory of 2796 2372 pjpdp.exe 44 PID 2796 wrote to memory of 3024 2796 jdjpp.exe 45 PID 2796 wrote to memory of 3024 2796 jdjpp.exe 45 PID 2796 wrote to memory of 3024 2796 jdjpp.exe 45 PID 2796 wrote to memory of 3024 2796 jdjpp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48e11bbb9d8187950283a8748ce0160N.exe"C:\Users\Admin\AppData\Local\Temp\d48e11bbb9d8187950283a8748ce0160N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
\??\c:\hbttbh.exec:\hbttbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\nbbntn.exec:\nbbntn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:356 -
\??\c:\9pvvd.exec:\9pvvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\lxlrrxr.exec:\lxlrrxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\llrxrxr.exec:\llrxrxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\bnhhhh.exec:\bnhhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\7jddj.exec:\7jddj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\fxrrxfl.exec:\fxrrxfl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\ntbnbt.exec:\ntbnbt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\pdpvj.exec:\pdpvj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\3rfxxrr.exec:\3rfxxrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\9lffflx.exec:\9lffflx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\tnbhtt.exec:\tnbhtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\pjpdp.exec:\pjpdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\jdjpp.exec:\jdjpp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\3xlrxxf.exec:\3xlrxxf.exe17⤵
- Executes dropped EXE
PID:3024 -
\??\c:\xrlrxlr.exec:\xrlrxlr.exe18⤵
- Executes dropped EXE
PID:2012 -
\??\c:\7nntbh.exec:\7nntbh.exe19⤵
- Executes dropped EXE
PID:3020 -
\??\c:\1dppj.exec:\1dppj.exe20⤵
- Executes dropped EXE
PID:2108 -
\??\c:\vdjjj.exec:\vdjjj.exe21⤵
- Executes dropped EXE
PID:2196 -
\??\c:\xrflrxl.exec:\xrflrxl.exe22⤵
- Executes dropped EXE
PID:2360 -
\??\c:\tbtnnn.exec:\tbtnnn.exe23⤵
- Executes dropped EXE
PID:3068 -
\??\c:\thhhhb.exec:\thhhhb.exe24⤵
- Executes dropped EXE
PID:1492 -
\??\c:\7pppp.exec:\7pppp.exe25⤵
- Executes dropped EXE
PID:1968 -
\??\c:\1pjdd.exec:\1pjdd.exe26⤵
- Executes dropped EXE
PID:1832 -
\??\c:\frffrlr.exec:\frffrlr.exe27⤵
- Executes dropped EXE
PID:344 -
\??\c:\rflrxxf.exec:\rflrxxf.exe28⤵
- Executes dropped EXE
PID:584 -
\??\c:\nhtntt.exec:\nhtntt.exe29⤵
- Executes dropped EXE
PID:1040 -
\??\c:\jvpvv.exec:\jvpvv.exe30⤵
- Executes dropped EXE
PID:1732 -
\??\c:\pjvdj.exec:\pjvdj.exe31⤵
- Executes dropped EXE
PID:3036 -
\??\c:\frlxfxf.exec:\frlxfxf.exe32⤵
- Executes dropped EXE
PID:1712 -
\??\c:\frflrrr.exec:\frflrrr.exe33⤵
- Executes dropped EXE
PID:2452 -
\??\c:\hntnnb.exec:\hntnnb.exe34⤵
- Executes dropped EXE
PID:2128 -
\??\c:\3hhtbh.exec:\3hhtbh.exe35⤵
- Executes dropped EXE
PID:444 -
\??\c:\jvjjj.exec:\jvjjj.exe36⤵
- Executes dropped EXE
PID:1588 -
\??\c:\7dvjp.exec:\7dvjp.exe37⤵
- Executes dropped EXE
PID:2756 -
\??\c:\3ppdv.exec:\3ppdv.exe38⤵
- Executes dropped EXE
PID:3048 -
\??\c:\3lfxllx.exec:\3lfxllx.exe39⤵
- Executes dropped EXE
PID:2612 -
\??\c:\3btbbb.exec:\3btbbb.exe40⤵
- Executes dropped EXE
PID:2704 -
\??\c:\btbbhn.exec:\btbbhn.exe41⤵
- Executes dropped EXE
PID:2652 -
\??\c:\dvddd.exec:\dvddd.exe42⤵
- Executes dropped EXE
PID:2052 -
\??\c:\pjppj.exec:\pjppj.exe43⤵
- Executes dropped EXE
PID:2648 -
\??\c:\llxllrr.exec:\llxllrr.exe44⤵
- Executes dropped EXE
PID:2352 -
\??\c:\xrlrflx.exec:\xrlrflx.exe45⤵
- Executes dropped EXE
PID:2664 -
\??\c:\bhtbnn.exec:\bhtbnn.exe46⤵
- Executes dropped EXE
PID:1440 -
\??\c:\bnbnhh.exec:\bnbnhh.exe47⤵
- Executes dropped EXE
PID:2140 -
\??\c:\dpvpp.exec:\dpvpp.exe48⤵
- Executes dropped EXE
PID:1288 -
\??\c:\3xlfffl.exec:\3xlfffl.exe49⤵
- Executes dropped EXE
PID:1688 -
\??\c:\9fxxrrx.exec:\9fxxrrx.exe50⤵
- Executes dropped EXE
PID:2900 -
\??\c:\hbhhnn.exec:\hbhhnn.exe51⤵
- Executes dropped EXE
PID:2576 -
\??\c:\nbbtbn.exec:\nbbtbn.exe52⤵
- Executes dropped EXE
PID:1840 -
\??\c:\vjvvj.exec:\vjvvj.exe53⤵
- Executes dropped EXE
PID:2356 -
\??\c:\pvjdv.exec:\pvjdv.exe54⤵
- Executes dropped EXE
PID:2012 -
\??\c:\5rffffx.exec:\5rffffx.exe55⤵
- Executes dropped EXE
PID:2064 -
\??\c:\fxlxfll.exec:\fxlxfll.exe56⤵
- Executes dropped EXE
PID:2072 -
\??\c:\nhhtbb.exec:\nhhtbb.exe57⤵
- Executes dropped EXE
PID:872 -
\??\c:\1bntbt.exec:\1bntbt.exe58⤵
- Executes dropped EXE
PID:2240 -
\??\c:\jdpjv.exec:\jdpjv.exe59⤵
- Executes dropped EXE
PID:816 -
\??\c:\vjdvv.exec:\vjdvv.exe60⤵
- Executes dropped EXE
PID:1372 -
\??\c:\1xrrrrf.exec:\1xrrrrf.exe61⤵
- Executes dropped EXE
PID:1112 -
\??\c:\tntthh.exec:\tntthh.exe62⤵
- Executes dropped EXE
PID:2132 -
\??\c:\thhhhh.exec:\thhhhh.exe63⤵
- Executes dropped EXE
PID:1256 -
\??\c:\5pddv.exec:\5pddv.exe64⤵
- Executes dropped EXE
PID:760 -
\??\c:\xfllrxf.exec:\xfllrxf.exe65⤵
- Executes dropped EXE
PID:696 -
\??\c:\7tbbbb.exec:\7tbbbb.exe66⤵PID:1876
-
\??\c:\tnnttt.exec:\tnnttt.exe67⤵PID:1740
-
\??\c:\dvppd.exec:\dvppd.exe68⤵PID:1668
-
\??\c:\dvpvv.exec:\dvpvv.exe69⤵PID:2396
-
\??\c:\pjppv.exec:\pjppv.exe70⤵PID:3036
-
\??\c:\xrxrxfl.exec:\xrxrxfl.exe71⤵PID:1892
-
\??\c:\lflrrxl.exec:\lflrrxl.exe72⤵PID:1624
-
\??\c:\rlrrfxf.exec:\rlrrfxf.exe73⤵PID:2816
-
\??\c:\nhhntb.exec:\nhhntb.exe74⤵PID:1724
-
\??\c:\1hhhnn.exec:\1hhhnn.exe75⤵PID:3052
-
\??\c:\1pdvp.exec:\1pdvp.exe76⤵PID:2736
-
\??\c:\ppjvp.exec:\ppjvp.exe77⤵PID:3044
-
\??\c:\llrrfxf.exec:\llrrfxf.exe78⤵PID:2944
-
\??\c:\rxrlrrf.exec:\rxrlrrf.exe79⤵PID:2740
-
\??\c:\nttntb.exec:\nttntb.exe80⤵PID:2788
-
\??\c:\1bbbhh.exec:\1bbbhh.exe81⤵PID:2100
-
\??\c:\nhnthh.exec:\nhnthh.exe82⤵PID:2792
-
\??\c:\jddjv.exec:\jddjv.exe83⤵PID:1272
-
\??\c:\vvvdp.exec:\vvvdp.exe84⤵PID:1872
-
\??\c:\lflflxf.exec:\lflflxf.exe85⤵PID:1056
-
\??\c:\5fxfllx.exec:\5fxfllx.exe86⤵PID:1640
-
\??\c:\9frfffr.exec:\9frfffr.exe87⤵PID:2692
-
\??\c:\1nnntt.exec:\1nnntt.exe88⤵PID:2844
-
\??\c:\vpjvd.exec:\vpjvd.exe89⤵PID:1748
-
\??\c:\9vvvd.exec:\9vvvd.exe90⤵PID:2796
-
\??\c:\rrllrxl.exec:\rrllrxl.exe91⤵PID:3024
-
\??\c:\llflxxf.exec:\llflxxf.exe92⤵PID:2996
-
\??\c:\tnbhhh.exec:\tnbhhh.exe93⤵PID:2124
-
\??\c:\tntttt.exec:\tntttt.exe94⤵PID:2288
-
\??\c:\nnbbtn.exec:\nnbbtn.exe95⤵PID:1508
-
\??\c:\jjvvd.exec:\jjvvd.exe96⤵PID:2076
-
\??\c:\pddvd.exec:\pddvd.exe97⤵PID:1144
-
\??\c:\fxllrrx.exec:\fxllrrx.exe98⤵PID:1472
-
\??\c:\xxrllrl.exec:\xxrllrl.exe99⤵PID:1600
-
\??\c:\7bnnbh.exec:\7bnnbh.exe100⤵PID:1604
-
\??\c:\hhhbhb.exec:\hhhbhb.exe101⤵PID:1764
-
\??\c:\vpjvd.exec:\vpjvd.exe102⤵PID:2096
-
\??\c:\jpdjp.exec:\jpdjp.exe103⤵PID:1620
-
\??\c:\rrrxfrx.exec:\rrrxfrx.exe104⤵PID:692
-
\??\c:\rrffflr.exec:\rrffflr.exe105⤵PID:584
-
\??\c:\5btttt.exec:\5btttt.exe106⤵PID:2176
-
\??\c:\bntthh.exec:\bntthh.exe107⤵PID:2308
-
\??\c:\1jdjj.exec:\1jdjj.exe108⤵PID:2408
-
\??\c:\rrrxxfr.exec:\rrrxxfr.exe109⤵PID:2092
-
\??\c:\lfxlflr.exec:\lfxlflr.exe110⤵
- System Location Discovery: System Language Discovery
PID:2876 -
\??\c:\hbnbhh.exec:\hbnbhh.exe111⤵PID:2732
-
\??\c:\hhbhnn.exec:\hhbhnn.exe112⤵PID:2412
-
\??\c:\thbhbh.exec:\thbhbh.exe113⤵PID:444
-
\??\c:\vpjpp.exec:\vpjpp.exe114⤵PID:2752
-
\??\c:\jjdjv.exec:\jjdjv.exe115⤵PID:2836
-
\??\c:\fxffffr.exec:\fxffffr.exe116⤵PID:1592
-
\??\c:\hhhntb.exec:\hhhntb.exe117⤵PID:2840
-
\??\c:\ttbtbh.exec:\ttbtbh.exe118⤵PID:2608
-
\??\c:\nhnntn.exec:\nhnntn.exe119⤵PID:2904
-
\??\c:\vvpvv.exec:\vvpvv.exe120⤵PID:2624
-
\??\c:\lxxrrlx.exec:\lxxrrlx.exe121⤵PID:1800
-
\??\c:\fxfrxlr.exec:\fxfrxlr.exe122⤵PID:2680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-