Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 22:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5dff1f9213d36b3d18184aff20a62f10N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
5dff1f9213d36b3d18184aff20a62f10N.exe
-
Size
66KB
-
MD5
5dff1f9213d36b3d18184aff20a62f10
-
SHA1
8fc877dc0dc9760d0f0c9481ea2889b50023a864
-
SHA256
84aeac416aa10e32f95e9ffb24b6e245b510fb947cd5686bc4ac7a126825d804
-
SHA512
ce4f1b0c12a6f9924a031deefd36f8c989086ab175a319da0517d339a3e5ebddf9393fecc2ab39e6907a22bfe8924c77e18f7560520800b936861ed15ad571c4
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27BqfR:ymb3NkkiQ3mdBjFI9cqfR
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2516-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2088-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2800-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2844-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-60-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2760-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1664-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1664-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1608-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2032-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1896-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1696-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3032-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/832-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2800-892-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2088 lxflrxr.exe 1600 1nttnt.exe 1664 jdjvd.exe 2800 5pddv.exe 2760 1xxfflf.exe 2844 hnntbt.exe 2616 1nntbh.exe 2868 jjdpd.exe 2816 vpjvv.exe 2660 llrrflx.exe 1768 rfxfrxf.exe 1608 hbnthh.exe 2960 jddpd.exe 2032 3bbtbh.exe 1776 3hthnb.exe 1932 rrlfrxf.exe 1928 1lxlxlx.exe 1896 hhtbnt.exe 2992 ppjdv.exe 2480 dvpvd.exe 2160 3xxrlfx.exe 1696 7tbhnt.exe 3032 pjdvj.exe 832 rlxrffr.exe 1016 rllxflx.exe 1644 1bnhtt.exe 2276 7nhthn.exe 344 vvpvp.exe 2216 pppjd.exe 884 xrlrffr.exe 2376 btthnt.exe 2088 vvppv.exe 2520 5lxrxrx.exe 484 9lfrflx.exe 2704 tntbbh.exe 2024 vppjv.exe 1532 frlrlrx.exe 2768 1xlrfxx.exe 2500 nnbnbh.exe 2776 ttnbbn.exe 2644 5jdpv.exe 2608 vpjvj.exe 2688 1xxxffl.exe 2640 1ffxrfx.exe 2780 nhbbhh.exe 2900 jjdvp.exe 1768 5jdvj.exe 2008 3rrrxfr.exe 2860 rrlxlxl.exe 1576 tnbhbb.exe 1940 btnthh.exe 1612 pjdjp.exe 2968 rfrxflx.exe 3008 5nhnhh.exe 3036 bttbht.exe 2648 vjdvd.exe 2172 rflrxxl.exe 2484 1frlrll.exe 2876 tthnbh.exe 836 9pjjj.exe 1312 xlflrxf.exe 1736 hnhhth.exe 1548 pjvdj.exe 2468 jddjv.exe -
resource yara_rule behavioral1/memory/2516-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1664-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1608-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1896-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1696-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3032-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/832-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-282-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrfrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2088 2516 5dff1f9213d36b3d18184aff20a62f10N.exe 30 PID 2516 wrote to memory of 2088 2516 5dff1f9213d36b3d18184aff20a62f10N.exe 30 PID 2516 wrote to memory of 2088 2516 5dff1f9213d36b3d18184aff20a62f10N.exe 30 PID 2516 wrote to memory of 2088 2516 5dff1f9213d36b3d18184aff20a62f10N.exe 30 PID 2088 wrote to memory of 1600 2088 lxflrxr.exe 31 PID 2088 wrote to memory of 1600 2088 lxflrxr.exe 31 PID 2088 wrote to memory of 1600 2088 lxflrxr.exe 31 PID 2088 wrote to memory of 1600 2088 lxflrxr.exe 31 PID 1600 wrote to memory of 1664 1600 1nttnt.exe 32 PID 1600 wrote to memory of 1664 1600 1nttnt.exe 32 PID 1600 wrote to memory of 1664 1600 1nttnt.exe 32 PID 1600 wrote to memory of 1664 1600 1nttnt.exe 32 PID 1664 wrote to memory of 2800 1664 jdjvd.exe 33 PID 1664 wrote to memory of 2800 1664 jdjvd.exe 33 PID 1664 wrote to memory of 2800 1664 jdjvd.exe 33 PID 1664 wrote to memory of 2800 1664 jdjvd.exe 33 PID 2800 wrote to memory of 2760 2800 5pddv.exe 34 PID 2800 wrote to memory of 2760 2800 5pddv.exe 34 PID 2800 wrote to memory of 2760 2800 5pddv.exe 34 PID 2800 wrote to memory of 2760 2800 5pddv.exe 34 PID 2760 wrote to memory of 2844 2760 1xxfflf.exe 35 PID 2760 wrote to memory of 2844 2760 1xxfflf.exe 35 PID 2760 wrote to memory of 2844 2760 1xxfflf.exe 35 PID 2760 wrote to memory of 2844 2760 1xxfflf.exe 35 PID 2844 wrote to memory of 2616 2844 hnntbt.exe 36 PID 2844 wrote to memory of 2616 2844 hnntbt.exe 36 PID 2844 wrote to memory of 2616 2844 hnntbt.exe 36 PID 2844 wrote to memory of 2616 2844 hnntbt.exe 36 PID 2616 wrote to memory of 2868 2616 1nntbh.exe 37 PID 2616 wrote to memory of 2868 2616 1nntbh.exe 37 PID 2616 wrote to memory of 2868 2616 1nntbh.exe 37 PID 2616 wrote to memory of 2868 2616 1nntbh.exe 37 PID 2868 wrote to memory of 2816 2868 jjdpd.exe 38 PID 2868 wrote to memory of 2816 2868 jjdpd.exe 38 PID 2868 wrote to memory of 2816 2868 jjdpd.exe 38 PID 2868 wrote to memory of 2816 2868 jjdpd.exe 38 PID 2816 wrote to memory of 2660 2816 vpjvv.exe 39 PID 2816 wrote to memory of 2660 2816 vpjvv.exe 39 PID 2816 wrote to memory of 2660 2816 vpjvv.exe 39 PID 2816 wrote to memory of 2660 2816 vpjvv.exe 39 PID 2660 wrote to memory of 1768 2660 llrrflx.exe 40 PID 2660 wrote to memory of 1768 2660 llrrflx.exe 40 PID 2660 wrote to memory of 1768 2660 llrrflx.exe 40 PID 2660 wrote to memory of 1768 2660 llrrflx.exe 40 PID 1768 wrote to memory of 1608 1768 rfxfrxf.exe 41 PID 1768 wrote to memory of 1608 1768 rfxfrxf.exe 41 PID 1768 wrote to memory of 1608 1768 rfxfrxf.exe 41 PID 1768 wrote to memory of 1608 1768 rfxfrxf.exe 41 PID 1608 wrote to memory of 2960 1608 hbnthh.exe 42 PID 1608 wrote to memory of 2960 1608 hbnthh.exe 42 PID 1608 wrote to memory of 2960 1608 hbnthh.exe 42 PID 1608 wrote to memory of 2960 1608 hbnthh.exe 42 PID 2960 wrote to memory of 2032 2960 jddpd.exe 43 PID 2960 wrote to memory of 2032 2960 jddpd.exe 43 PID 2960 wrote to memory of 2032 2960 jddpd.exe 43 PID 2960 wrote to memory of 2032 2960 jddpd.exe 43 PID 2032 wrote to memory of 1776 2032 3bbtbh.exe 44 PID 2032 wrote to memory of 1776 2032 3bbtbh.exe 44 PID 2032 wrote to memory of 1776 2032 3bbtbh.exe 44 PID 2032 wrote to memory of 1776 2032 3bbtbh.exe 44 PID 1776 wrote to memory of 1932 1776 3hthnb.exe 45 PID 1776 wrote to memory of 1932 1776 3hthnb.exe 45 PID 1776 wrote to memory of 1932 1776 3hthnb.exe 45 PID 1776 wrote to memory of 1932 1776 3hthnb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dff1f9213d36b3d18184aff20a62f10N.exe"C:\Users\Admin\AppData\Local\Temp\5dff1f9213d36b3d18184aff20a62f10N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\lxflrxr.exec:\lxflrxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\1nttnt.exec:\1nttnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\jdjvd.exec:\jdjvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\5pddv.exec:\5pddv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\1xxfflf.exec:\1xxfflf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\hnntbt.exec:\hnntbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\1nntbh.exec:\1nntbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\jjdpd.exec:\jjdpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\vpjvv.exec:\vpjvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\llrrflx.exec:\llrrflx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\rfxfrxf.exec:\rfxfrxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\hbnthh.exec:\hbnthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1608 -
\??\c:\jddpd.exec:\jddpd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\3bbtbh.exec:\3bbtbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\3hthnb.exec:\3hthnb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\rrlfrxf.exec:\rrlfrxf.exe17⤵
- Executes dropped EXE
PID:1932 -
\??\c:\1lxlxlx.exec:\1lxlxlx.exe18⤵
- Executes dropped EXE
PID:1928 -
\??\c:\hhtbnt.exec:\hhtbnt.exe19⤵
- Executes dropped EXE
PID:1896 -
\??\c:\ppjdv.exec:\ppjdv.exe20⤵
- Executes dropped EXE
PID:2992 -
\??\c:\dvpvd.exec:\dvpvd.exe21⤵
- Executes dropped EXE
PID:2480 -
\??\c:\3xxrlfx.exec:\3xxrlfx.exe22⤵
- Executes dropped EXE
PID:2160 -
\??\c:\7tbhnt.exec:\7tbhnt.exe23⤵
- Executes dropped EXE
PID:1696 -
\??\c:\pjdvj.exec:\pjdvj.exe24⤵
- Executes dropped EXE
PID:3032 -
\??\c:\rlxrffr.exec:\rlxrffr.exe25⤵
- Executes dropped EXE
PID:832 -
\??\c:\rllxflx.exec:\rllxflx.exe26⤵
- Executes dropped EXE
PID:1016 -
\??\c:\1bnhtt.exec:\1bnhtt.exe27⤵
- Executes dropped EXE
PID:1644 -
\??\c:\7nhthn.exec:\7nhthn.exe28⤵
- Executes dropped EXE
PID:2276 -
\??\c:\vvpvp.exec:\vvpvp.exe29⤵
- Executes dropped EXE
PID:344 -
\??\c:\pppjd.exec:\pppjd.exe30⤵
- Executes dropped EXE
PID:2216 -
\??\c:\xrlrffr.exec:\xrlrffr.exe31⤵
- Executes dropped EXE
PID:884 -
\??\c:\btthnt.exec:\btthnt.exe32⤵
- Executes dropped EXE
PID:2376 -
\??\c:\vvppv.exec:\vvppv.exe33⤵
- Executes dropped EXE
PID:2088 -
\??\c:\5lxrxrx.exec:\5lxrxrx.exe34⤵
- Executes dropped EXE
PID:2520 -
\??\c:\9lfrflx.exec:\9lfrflx.exe35⤵
- Executes dropped EXE
PID:484 -
\??\c:\tntbbh.exec:\tntbbh.exe36⤵
- Executes dropped EXE
PID:2704 -
\??\c:\vppjv.exec:\vppjv.exe37⤵
- Executes dropped EXE
PID:2024 -
\??\c:\frlrlrx.exec:\frlrlrx.exe38⤵
- Executes dropped EXE
PID:1532 -
\??\c:\1xlrfxx.exec:\1xlrfxx.exe39⤵
- Executes dropped EXE
PID:2768 -
\??\c:\nnbnbh.exec:\nnbnbh.exe40⤵
- Executes dropped EXE
PID:2500 -
\??\c:\ttnbbn.exec:\ttnbbn.exe41⤵
- Executes dropped EXE
PID:2776 -
\??\c:\5jdpv.exec:\5jdpv.exe42⤵
- Executes dropped EXE
PID:2644 -
\??\c:\vpjvj.exec:\vpjvj.exe43⤵
- Executes dropped EXE
PID:2608 -
\??\c:\1xxxffl.exec:\1xxxffl.exe44⤵
- Executes dropped EXE
PID:2688 -
\??\c:\1ffxrfx.exec:\1ffxrfx.exe45⤵
- Executes dropped EXE
PID:2640 -
\??\c:\nhbbhh.exec:\nhbbhh.exe46⤵
- Executes dropped EXE
PID:2780 -
\??\c:\jjdvp.exec:\jjdvp.exe47⤵
- Executes dropped EXE
PID:2900 -
\??\c:\5jdvj.exec:\5jdvj.exe48⤵
- Executes dropped EXE
PID:1768 -
\??\c:\3rrrxfr.exec:\3rrrxfr.exe49⤵
- Executes dropped EXE
PID:2008 -
\??\c:\rrlxlxl.exec:\rrlxlxl.exe50⤵
- Executes dropped EXE
PID:2860 -
\??\c:\tnbhbb.exec:\tnbhbb.exe51⤵
- Executes dropped EXE
PID:1576 -
\??\c:\btnthh.exec:\btnthh.exe52⤵
- Executes dropped EXE
PID:1940 -
\??\c:\pjdjp.exec:\pjdjp.exe53⤵
- Executes dropped EXE
PID:1612 -
\??\c:\rfrxflx.exec:\rfrxflx.exe54⤵
- Executes dropped EXE
PID:2968 -
\??\c:\5nhnhh.exec:\5nhnhh.exe55⤵
- Executes dropped EXE
PID:3008 -
\??\c:\bttbht.exec:\bttbht.exe56⤵
- Executes dropped EXE
PID:3036 -
\??\c:\vjdvd.exec:\vjdvd.exe57⤵
- Executes dropped EXE
PID:2648 -
\??\c:\rflrxxl.exec:\rflrxxl.exe58⤵
- Executes dropped EXE
PID:2172 -
\??\c:\1frlrll.exec:\1frlrll.exe59⤵
- Executes dropped EXE
PID:2484 -
\??\c:\tthnbh.exec:\tthnbh.exe60⤵
- Executes dropped EXE
PID:2876 -
\??\c:\9pjjj.exec:\9pjjj.exe61⤵
- Executes dropped EXE
PID:836 -
\??\c:\xlflrxf.exec:\xlflrxf.exe62⤵
- Executes dropped EXE
PID:1312 -
\??\c:\hnhhth.exec:\hnhhth.exe63⤵
- Executes dropped EXE
PID:1736 -
\??\c:\pjvdj.exec:\pjvdj.exe64⤵
- Executes dropped EXE
PID:1548 -
\??\c:\jddjv.exec:\jddjv.exe65⤵
- Executes dropped EXE
PID:2468 -
\??\c:\xlxrrxx.exec:\xlxrrxx.exe66⤵PID:300
-
\??\c:\hhttbt.exec:\hhttbt.exe67⤵PID:2464
-
\??\c:\ttnthh.exec:\ttnthh.exe68⤵PID:2432
-
\??\c:\pdpdj.exec:\pdpdj.exe69⤵PID:876
-
\??\c:\xrxflxl.exec:\xrxflxl.exe70⤵PID:2516
-
\??\c:\fxlrxxf.exec:\fxlrxxf.exe71⤵PID:1604
-
\??\c:\5bbbhh.exec:\5bbbhh.exe72⤵PID:2052
-
\??\c:\ntnhhb.exec:\ntnhhb.exe73⤵PID:320
-
\??\c:\pjppd.exec:\pjppd.exe74⤵PID:496
-
\??\c:\lflxxxl.exec:\lflxxxl.exe75⤵PID:2424
-
\??\c:\rfrxxrf.exec:\rfrxxrf.exe76⤵PID:2704
-
\??\c:\hbntbh.exec:\hbntbh.exe77⤵PID:2200
-
\??\c:\btnbbt.exec:\btnbbt.exe78⤵PID:1532
-
\??\c:\3ddvv.exec:\3ddvv.exe79⤵PID:2204
-
\??\c:\vjdjp.exec:\vjdjp.exe80⤵PID:2500
-
\??\c:\lfxlllx.exec:\lfxlllx.exe81⤵PID:2784
-
\??\c:\fxffffl.exec:\fxffffl.exe82⤵PID:2644
-
\??\c:\nbnhtb.exec:\nbnhtb.exe83⤵PID:1200
-
\??\c:\1jpjv.exec:\1jpjv.exe84⤵PID:2688
-
\??\c:\jvvpv.exec:\jvvpv.exe85⤵PID:2292
-
\??\c:\rllrxfl.exec:\rllrxfl.exe86⤵PID:556
-
\??\c:\7lfrxxr.exec:\7lfrxxr.exe87⤵PID:1452
-
\??\c:\bbbhbh.exec:\bbbhbh.exe88⤵PID:1768
-
\??\c:\hbhnnn.exec:\hbhnnn.exe89⤵PID:1828
-
\??\c:\1pjvd.exec:\1pjvd.exe90⤵PID:2860
-
\??\c:\jvvvd.exec:\jvvvd.exe91⤵PID:2924
-
\??\c:\lxrrrrx.exec:\lxrrrrx.exe92⤵PID:1996
-
\??\c:\7lflrlx.exec:\7lflrlx.exe93⤵PID:1612
-
\??\c:\tnhhtb.exec:\tnhhtb.exe94⤵PID:1852
-
\??\c:\hbnbbh.exec:\hbnbbh.exe95⤵PID:2976
-
\??\c:\5jvdd.exec:\5jvdd.exe96⤵PID:2536
-
\??\c:\7vjpv.exec:\7vjpv.exe97⤵PID:1836
-
\??\c:\9xrlrrx.exec:\9xrlrrx.exe98⤵PID:2116
-
\??\c:\xrlrxfl.exec:\xrlrxfl.exe99⤵PID:2484
-
\??\c:\nnbhtt.exec:\nnbhtt.exe100⤵PID:1304
-
\??\c:\bthhhh.exec:\bthhhh.exe101⤵PID:1176
-
\??\c:\dvjdd.exec:\dvjdd.exe102⤵PID:1312
-
\??\c:\fxlrllr.exec:\fxlrllr.exe103⤵PID:1736
-
\??\c:\7fxffrx.exec:\7fxffrx.exe104⤵PID:784
-
\??\c:\7bhbbn.exec:\7bhbbn.exe105⤵PID:2468
-
\??\c:\hhhhnn.exec:\hhhhnn.exe106⤵PID:2180
-
\??\c:\ppdpd.exec:\ppdpd.exe107⤵PID:2464
-
\??\c:\pjdvd.exec:\pjdvd.exe108⤵PID:828
-
\??\c:\5rflxfl.exec:\5rflxfl.exe109⤵PID:2328
-
\??\c:\3lxlrrx.exec:\3lxlrrx.exe110⤵PID:2240
-
\??\c:\3hhbhn.exec:\3hhbhn.exe111⤵PID:2088
-
\??\c:\bbtnhb.exec:\bbtnhb.exe112⤵PID:1004
-
\??\c:\pdvjd.exec:\pdvjd.exe113⤵PID:320
-
\??\c:\jdpvj.exec:\jdpvj.exe114⤵PID:1640
-
\??\c:\lffllfr.exec:\lffllfr.exe115⤵PID:2424
-
\??\c:\5lxfrrx.exec:\5lxfrrx.exe116⤵PID:2764
-
\??\c:\tnhtbh.exec:\tnhtbh.exe117⤵PID:2832
-
\??\c:\httbhh.exec:\httbhh.exe118⤵
- System Location Discovery: System Language Discovery
PID:804 -
\??\c:\3pdpv.exec:\3pdpv.exe119⤵PID:788
-
\??\c:\vjdjv.exec:\vjdjv.exe120⤵PID:2728
-
\??\c:\lflflrf.exec:\lflflrf.exe121⤵PID:2888
-
\??\c:\7lxxfxf.exec:\7lxxfxf.exe122⤵PID:2664
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-