Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 01:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe
-
Size
64KB
-
MD5
74c2e1e5c5f6b7a3dd16d54f5b3e5a60
-
SHA1
922973d3cc5037f098a71aa6e4cb1e610682f3af
-
SHA256
56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38eb
-
SHA512
a51aca76ac6bc0a1bb703efe1f226a5f060229e7e84c0bb5318c042f08960950b3097128a7b56defc2129183adfabe378bfe96c9d93117185bbef56f5f833eb0
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxio:ymb3NkkiQ3mdBjF0y7kbH
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2364-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/836-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2868-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2800-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1664-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/704-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1588-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1896-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/960-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1520-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2364-297-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-306-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1600 1xrrxfl.exe 836 lxxffrf.exe 2552 3tnbhn.exe 2500 bttbnb.exe 2868 dvddd.exe 2628 1bnttt.exe 2800 7tbbbb.exe 2668 pdvdv.exe 2700 lfllrrf.exe 1664 nbttbb.exe 1556 hbnhtn.exe 704 ddvdp.exe 1588 rrrrfll.exe 2952 lfflflx.exe 1324 nhnttb.exe 1896 btbbnh.exe 1480 ppjvd.exe 1704 rfrxflx.exe 3008 lfllrrx.exe 2416 nhbnht.exe 2480 9hbttb.exe 960 djjpd.exe 2332 xxrxlfx.exe 1552 xrffrxf.exe 616 nhtbhh.exe 2496 5dvjj.exe 2108 ppjpd.exe 1884 xrflrrf.exe 1520 hnhtnn.exe 2364 tnntbh.exe 2476 dvvdp.exe 1252 7jvpp.exe 2732 lxfxxrx.exe 2716 rrxfffl.exe 2540 thnhbt.exe 2500 nbhhnh.exe 2776 pdvpp.exe 2876 pjdjj.exe 2628 jpdpp.exe 2908 fxrlxlx.exe 2736 xlrrllr.exe 2896 btnttb.exe 2356 7bthnn.exe 2340 pdvvv.exe 632 3vddv.exe 2808 1xffxfl.exe 2916 lxlfrrx.exe 2680 thnttb.exe 1636 nhnnnb.exe 580 pvdvv.exe 1220 dvjdj.exe 2040 rfrlllr.exe 2004 5xrrrlr.exe 1480 3nnntt.exe 2200 9bnntn.exe 2148 jvjpv.exe 1188 vdppj.exe 2208 frlfffl.exe 708 xlrxfrx.exe 3048 hthttt.exe 1808 1bbtbb.exe 1264 pdjjp.exe 1712 3vddd.exe 3060 7xlrrrx.exe -
resource yara_rule behavioral1/memory/2364-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/836-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1664-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/704-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1588-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1896-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/960-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1520-288-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2364-297-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-306-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rffxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrflxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffllrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrflxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1600 2364 56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe 30 PID 2364 wrote to memory of 1600 2364 56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe 30 PID 2364 wrote to memory of 1600 2364 56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe 30 PID 2364 wrote to memory of 1600 2364 56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe 30 PID 1600 wrote to memory of 836 1600 1xrrxfl.exe 31 PID 1600 wrote to memory of 836 1600 1xrrxfl.exe 31 PID 1600 wrote to memory of 836 1600 1xrrxfl.exe 31 PID 1600 wrote to memory of 836 1600 1xrrxfl.exe 31 PID 836 wrote to memory of 2552 836 lxxffrf.exe 32 PID 836 wrote to memory of 2552 836 lxxffrf.exe 32 PID 836 wrote to memory of 2552 836 lxxffrf.exe 32 PID 836 wrote to memory of 2552 836 lxxffrf.exe 32 PID 2552 wrote to memory of 2500 2552 3tnbhn.exe 33 PID 2552 wrote to memory of 2500 2552 3tnbhn.exe 33 PID 2552 wrote to memory of 2500 2552 3tnbhn.exe 33 PID 2552 wrote to memory of 2500 2552 3tnbhn.exe 33 PID 2500 wrote to memory of 2868 2500 bttbnb.exe 34 PID 2500 wrote to memory of 2868 2500 bttbnb.exe 34 PID 2500 wrote to memory of 2868 2500 bttbnb.exe 34 PID 2500 wrote to memory of 2868 2500 bttbnb.exe 34 PID 2868 wrote to memory of 2628 2868 dvddd.exe 35 PID 2868 wrote to memory of 2628 2868 dvddd.exe 35 PID 2868 wrote to memory of 2628 2868 dvddd.exe 35 PID 2868 wrote to memory of 2628 2868 dvddd.exe 35 PID 2628 wrote to memory of 2800 2628 1bnttt.exe 36 PID 2628 wrote to memory of 2800 2628 1bnttt.exe 36 PID 2628 wrote to memory of 2800 2628 1bnttt.exe 36 PID 2628 wrote to memory of 2800 2628 1bnttt.exe 36 PID 2800 wrote to memory of 2668 2800 7tbbbb.exe 37 PID 2800 wrote to memory of 2668 2800 7tbbbb.exe 37 PID 2800 wrote to memory of 2668 2800 7tbbbb.exe 37 PID 2800 wrote to memory of 2668 2800 7tbbbb.exe 37 PID 2668 wrote to memory of 2700 2668 pdvdv.exe 38 PID 2668 wrote to memory of 2700 2668 pdvdv.exe 38 PID 2668 wrote to memory of 2700 2668 pdvdv.exe 38 PID 2668 wrote to memory of 2700 2668 pdvdv.exe 38 PID 2700 wrote to memory of 1664 2700 lfllrrf.exe 39 PID 2700 wrote to memory of 1664 2700 lfllrrf.exe 39 PID 2700 wrote to memory of 1664 2700 lfllrrf.exe 39 PID 2700 wrote to memory of 1664 2700 lfllrrf.exe 39 PID 1664 wrote to memory of 1556 1664 nbttbb.exe 40 PID 1664 wrote to memory of 1556 1664 nbttbb.exe 40 PID 1664 wrote to memory of 1556 1664 nbttbb.exe 40 PID 1664 wrote to memory of 1556 1664 nbttbb.exe 40 PID 1556 wrote to memory of 704 1556 hbnhtn.exe 41 PID 1556 wrote to memory of 704 1556 hbnhtn.exe 41 PID 1556 wrote to memory of 704 1556 hbnhtn.exe 41 PID 1556 wrote to memory of 704 1556 hbnhtn.exe 41 PID 704 wrote to memory of 1588 704 ddvdp.exe 42 PID 704 wrote to memory of 1588 704 ddvdp.exe 42 PID 704 wrote to memory of 1588 704 ddvdp.exe 42 PID 704 wrote to memory of 1588 704 ddvdp.exe 42 PID 1588 wrote to memory of 2952 1588 rrrrfll.exe 43 PID 1588 wrote to memory of 2952 1588 rrrrfll.exe 43 PID 1588 wrote to memory of 2952 1588 rrrrfll.exe 43 PID 1588 wrote to memory of 2952 1588 rrrrfll.exe 43 PID 2952 wrote to memory of 1324 2952 lfflflx.exe 44 PID 2952 wrote to memory of 1324 2952 lfflflx.exe 44 PID 2952 wrote to memory of 1324 2952 lfflflx.exe 44 PID 2952 wrote to memory of 1324 2952 lfflflx.exe 44 PID 1324 wrote to memory of 1896 1324 nhnttb.exe 45 PID 1324 wrote to memory of 1896 1324 nhnttb.exe 45 PID 1324 wrote to memory of 1896 1324 nhnttb.exe 45 PID 1324 wrote to memory of 1896 1324 nhnttb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe"C:\Users\Admin\AppData\Local\Temp\56ed6c73ccaabb0482bfdcd7ef257a6e44fb9785f9a46ee4e4ff59760f3e38ebN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\1xrrxfl.exec:\1xrrxfl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\lxxffrf.exec:\lxxffrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
\??\c:\3tnbhn.exec:\3tnbhn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\bttbnb.exec:\bttbnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\dvddd.exec:\dvddd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\1bnttt.exec:\1bnttt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\7tbbbb.exec:\7tbbbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\pdvdv.exec:\pdvdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\lfllrrf.exec:\lfllrrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\nbttbb.exec:\nbttbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\hbnhtn.exec:\hbnhtn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\ddvdp.exec:\ddvdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
\??\c:\rrrrfll.exec:\rrrrfll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\lfflflx.exec:\lfflflx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\nhnttb.exec:\nhnttb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\btbbnh.exec:\btbbnh.exe17⤵
- Executes dropped EXE
PID:1896 -
\??\c:\ppjvd.exec:\ppjvd.exe18⤵
- Executes dropped EXE
PID:1480 -
\??\c:\rfrxflx.exec:\rfrxflx.exe19⤵
- Executes dropped EXE
PID:1704 -
\??\c:\lfllrrx.exec:\lfllrrx.exe20⤵
- Executes dropped EXE
PID:3008 -
\??\c:\nhbnht.exec:\nhbnht.exe21⤵
- Executes dropped EXE
PID:2416 -
\??\c:\9hbttb.exec:\9hbttb.exe22⤵
- Executes dropped EXE
PID:2480 -
\??\c:\djjpd.exec:\djjpd.exe23⤵
- Executes dropped EXE
PID:960 -
\??\c:\xxrxlfx.exec:\xxrxlfx.exe24⤵
- Executes dropped EXE
PID:2332 -
\??\c:\xrffrxf.exec:\xrffrxf.exe25⤵
- Executes dropped EXE
PID:1552 -
\??\c:\nhtbhh.exec:\nhtbhh.exe26⤵
- Executes dropped EXE
PID:616 -
\??\c:\5dvjj.exec:\5dvjj.exe27⤵
- Executes dropped EXE
PID:2496 -
\??\c:\ppjpd.exec:\ppjpd.exe28⤵
- Executes dropped EXE
PID:2108 -
\??\c:\xrflrrf.exec:\xrflrrf.exe29⤵
- Executes dropped EXE
PID:1884 -
\??\c:\hnhtnn.exec:\hnhtnn.exe30⤵
- Executes dropped EXE
PID:1520 -
\??\c:\tnntbh.exec:\tnntbh.exe31⤵
- Executes dropped EXE
PID:2364 -
\??\c:\dvvdp.exec:\dvvdp.exe32⤵
- Executes dropped EXE
PID:2476 -
\??\c:\7jvpp.exec:\7jvpp.exe33⤵
- Executes dropped EXE
PID:1252 -
\??\c:\lxfxxrx.exec:\lxfxxrx.exe34⤵
- Executes dropped EXE
PID:2732 -
\??\c:\rrxfffl.exec:\rrxfffl.exe35⤵
- Executes dropped EXE
PID:2716 -
\??\c:\thnhbt.exec:\thnhbt.exe36⤵
- Executes dropped EXE
PID:2540 -
\??\c:\nbhhnh.exec:\nbhhnh.exe37⤵
- Executes dropped EXE
PID:2500 -
\??\c:\pdvpp.exec:\pdvpp.exe38⤵
- Executes dropped EXE
PID:2776 -
\??\c:\pjdjj.exec:\pjdjj.exe39⤵
- Executes dropped EXE
PID:2876 -
\??\c:\jpdpp.exec:\jpdpp.exe40⤵
- Executes dropped EXE
PID:2628 -
\??\c:\fxrlxlx.exec:\fxrlxlx.exe41⤵
- Executes dropped EXE
PID:2908 -
\??\c:\xlrrllr.exec:\xlrrllr.exe42⤵
- Executes dropped EXE
PID:2736 -
\??\c:\btnttb.exec:\btnttb.exe43⤵
- Executes dropped EXE
PID:2896 -
\??\c:\7bthnn.exec:\7bthnn.exe44⤵
- Executes dropped EXE
PID:2356 -
\??\c:\pdvvv.exec:\pdvvv.exe45⤵
- Executes dropped EXE
PID:2340 -
\??\c:\3vddv.exec:\3vddv.exe46⤵
- Executes dropped EXE
PID:632 -
\??\c:\1xffxfl.exec:\1xffxfl.exe47⤵
- Executes dropped EXE
PID:2808 -
\??\c:\lxlfrrx.exec:\lxlfrrx.exe48⤵
- Executes dropped EXE
PID:2916 -
\??\c:\thnttb.exec:\thnttb.exe49⤵
- Executes dropped EXE
PID:2680 -
\??\c:\nhnnnb.exec:\nhnnnb.exe50⤵
- Executes dropped EXE
PID:1636 -
\??\c:\pvdvv.exec:\pvdvv.exe51⤵
- Executes dropped EXE
PID:580 -
\??\c:\dvjdj.exec:\dvjdj.exe52⤵
- Executes dropped EXE
PID:1220 -
\??\c:\rfrlllr.exec:\rfrlllr.exe53⤵
- Executes dropped EXE
PID:2040 -
\??\c:\5xrrrlr.exec:\5xrrrlr.exe54⤵
- Executes dropped EXE
PID:2004 -
\??\c:\3nnntt.exec:\3nnntt.exe55⤵
- Executes dropped EXE
PID:1480 -
\??\c:\9bnntn.exec:\9bnntn.exe56⤵
- Executes dropped EXE
PID:2200 -
\??\c:\jvjpv.exec:\jvjpv.exe57⤵
- Executes dropped EXE
PID:2148 -
\??\c:\vdppj.exec:\vdppj.exe58⤵
- Executes dropped EXE
PID:1188 -
\??\c:\frlfffl.exec:\frlfffl.exe59⤵
- Executes dropped EXE
PID:2208 -
\??\c:\xlrxfrx.exec:\xlrxfrx.exe60⤵
- Executes dropped EXE
PID:708 -
\??\c:\hthttt.exec:\hthttt.exe61⤵
- Executes dropped EXE
PID:3048 -
\??\c:\1bbtbb.exec:\1bbtbb.exe62⤵
- Executes dropped EXE
PID:1808 -
\??\c:\pdjjp.exec:\pdjjp.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1264 -
\??\c:\3vddd.exec:\3vddd.exe64⤵
- Executes dropped EXE
PID:1712 -
\??\c:\7xlrrrx.exec:\7xlrrrx.exe65⤵
- Executes dropped EXE
PID:3060 -
\??\c:\lrlllll.exec:\lrlllll.exe66⤵PID:688
-
\??\c:\1htbbt.exec:\1htbbt.exe67⤵PID:2508
-
\??\c:\btnntt.exec:\btnntt.exe68⤵PID:1804
-
\??\c:\vvdjd.exec:\vvdjd.exe69⤵PID:1964
-
\??\c:\dpvpp.exec:\dpvpp.exe70⤵PID:1956
-
\??\c:\fxllxrf.exec:\fxllxrf.exe71⤵PID:1752
-
\??\c:\vjjpj.exec:\vjjpj.exe72⤵PID:1728
-
\??\c:\jpvjp.exec:\jpvjp.exe73⤵PID:2160
-
\??\c:\vjvpd.exec:\vjvpd.exe74⤵PID:2244
-
\??\c:\rrxxfrl.exec:\rrxxfrl.exe75⤵PID:1532
-
\??\c:\lfffllr.exec:\lfffllr.exe76⤵PID:2728
-
\??\c:\hnhnbh.exec:\hnhnbh.exe77⤵PID:2864
-
\??\c:\bthttb.exec:\bthttb.exe78⤵PID:3024
-
\??\c:\jjddj.exec:\jjddj.exe79⤵PID:3020
-
\??\c:\dvjpv.exec:\dvjpv.exe80⤵
- System Location Discovery: System Language Discovery
PID:2948 -
\??\c:\rllrxxl.exec:\rllrxxl.exe81⤵PID:2788
-
\??\c:\ffxffff.exec:\ffxffff.exe82⤵PID:2632
-
\??\c:\5httbb.exec:\5httbb.exe83⤵PID:1668
-
\??\c:\bhtbnt.exec:\bhtbnt.exe84⤵PID:2088
-
\??\c:\1vjpp.exec:\1vjpp.exe85⤵PID:552
-
\??\c:\1xflllr.exec:\1xflllr.exe86⤵PID:812
-
\??\c:\lfrxxxr.exec:\lfrxxxr.exe87⤵PID:2964
-
\??\c:\bnhnnn.exec:\bnhnnn.exe88⤵PID:2928
-
\??\c:\pjjvj.exec:\pjjvj.exe89⤵PID:1064
-
\??\c:\dvjjp.exec:\dvjjp.exe90⤵PID:752
-
\??\c:\xrfflfr.exec:\xrfflfr.exe91⤵PID:596
-
\??\c:\rfrrxxf.exec:\rfrrxxf.exe92⤵PID:1324
-
\??\c:\ttntht.exec:\ttntht.exe93⤵PID:1164
-
\??\c:\bhnnbh.exec:\bhnnbh.exe94⤵PID:1120
-
\??\c:\5jjpp.exec:\5jjpp.exe95⤵PID:2096
-
\??\c:\lfllxfr.exec:\lfllxfr.exe96⤵PID:2420
-
\??\c:\fxlrxlx.exec:\fxlrxlx.exe97⤵PID:2412
-
\??\c:\btnnht.exec:\btnnht.exe98⤵PID:2416
-
\??\c:\hhttnb.exec:\hhttnb.exe99⤵PID:2236
-
\??\c:\1pvdj.exec:\1pvdj.exe100⤵PID:3052
-
\??\c:\3pjjj.exec:\3pjjj.exe101⤵PID:1920
-
\??\c:\1rfflrf.exec:\1rfflrf.exe102⤵PID:936
-
\??\c:\fxflrrf.exec:\fxflrrf.exe103⤵PID:1016
-
\??\c:\3hbtbh.exec:\3hbtbh.exe104⤵PID:744
-
\??\c:\nhnttb.exec:\nhnttb.exe105⤵PID:1308
-
\??\c:\vpvdp.exec:\vpvdp.exe106⤵PID:3028
-
\??\c:\vdpjv.exec:\vdpjv.exe107⤵PID:892
-
\??\c:\lxlxlff.exec:\lxlxlff.exe108⤵PID:884
-
\??\c:\rrflrfr.exec:\rrflrfr.exe109⤵PID:2008
-
\??\c:\bthhbt.exec:\bthhbt.exe110⤵PID:2516
-
\??\c:\3ttnth.exec:\3ttnth.exe111⤵PID:1960
-
\??\c:\dpdvd.exec:\dpdvd.exe112⤵PID:1212
-
\??\c:\jdvvd.exec:\jdvvd.exe113⤵PID:2708
-
\??\c:\1jddd.exec:\1jddd.exe114⤵PID:1528
-
\??\c:\1xxxlxx.exec:\1xxxlxx.exe115⤵PID:1992
-
\??\c:\fxrfrrf.exec:\fxrfrrf.exe116⤵PID:2752
-
\??\c:\9thhhh.exec:\9thhhh.exe117⤵PID:2780
-
\??\c:\3hnnhh.exec:\3hnnhh.exe118⤵PID:2776
-
\??\c:\pvddp.exec:\pvddp.exe119⤵PID:2868
-
\??\c:\ddjpv.exec:\ddjpv.exe120⤵PID:2628
-
\??\c:\lflxxfr.exec:\lflxxfr.exe121⤵PID:2800
-
\??\c:\xrlxffl.exec:\xrlxffl.exe122⤵PID:2736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-