Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 05:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe
-
Size
230KB
-
MD5
3a03bfb307412678a42bf2f212534f30
-
SHA1
30aabe93d127ae7e4505ab0084d55170e36454e4
-
SHA256
030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597
-
SHA512
73dc41108453acad827bddf39188d73d0d291885b115adb4b2c93a114fe2eb3a4ed1d102e495cbc0996ed734d51b5e5e901dc666c1ad4eab5832327e20b31e9f
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1f7:n3C9BRo7MlrWKo+lxKk1f7
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/2168-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2400-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2712-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/524-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1788-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1268-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1168-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1376-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/376-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/940-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1820-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-298-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2400 jdpvd.exe 2396 1nntbb.exe 2140 7pjjp.exe 2712 jdpdd.exe 2828 tnbtth.exe 2976 pdjdj.exe 2952 rrfrfrx.exe 2716 1rlrxxx.exe 2668 vpdjj.exe 2252 lfxfllr.exe 680 bhnbbn.exe 524 vjpjp.exe 1788 fxfflxl.exe 1268 btthnt.exe 1168 pvddp.exe 1832 frffffl.exe 1376 nhtbbt.exe 1324 pjdvd.exe 2700 vpdvd.exe 2200 btnntt.exe 2432 bbntnn.exe 376 xlllllr.exe 2080 rxxfxrr.exe 1520 bthntb.exe 940 9pddp.exe 2984 rrlfxxl.exe 1820 lxflfll.exe 2456 djddp.exe 1664 pdppp.exe 2980 htbtbb.exe 1784 nbhhhh.exe 2508 xffrxxl.exe 2408 7xffrrr.exe 1592 hbhbhn.exe 1164 7rfflrx.exe 2800 rlfrlxr.exe 2448 bttntt.exe 2836 hthhnt.exe 2612 jdpdp.exe 2976 3rlfllx.exe 2312 5fffxxl.exe 2620 ththnt.exe 1976 bttbhh.exe 2676 vpjvd.exe 2252 9lfrxxf.exe 784 llflxfr.exe 1116 nhtbnt.exe 1076 tntnnh.exe 596 pjpjp.exe 2504 vppvj.exe 600 rfllrrf.exe 1224 ffxxflr.exe 1760 tnbhtt.exe 832 hbtbnn.exe 2084 ppvvd.exe 2000 pjddp.exe 1488 5lflxll.exe 1644 hbtbbb.exe 2072 nhnnhn.exe 1704 jdppv.exe 1568 5djjj.exe 684 lffllll.exe 920 1lllflx.exe 2412 3nbbnh.exe -
resource yara_rule behavioral1/memory/2168-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/524-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1788-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1268-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1168-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1376-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-209-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/376-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/940-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1820-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-298-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrflrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xllrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lxflrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xxxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2400 2168 030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe 30 PID 2168 wrote to memory of 2400 2168 030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe 30 PID 2168 wrote to memory of 2400 2168 030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe 30 PID 2168 wrote to memory of 2400 2168 030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe 30 PID 2400 wrote to memory of 2396 2400 jdpvd.exe 31 PID 2400 wrote to memory of 2396 2400 jdpvd.exe 31 PID 2400 wrote to memory of 2396 2400 jdpvd.exe 31 PID 2400 wrote to memory of 2396 2400 jdpvd.exe 31 PID 2396 wrote to memory of 2140 2396 1nntbb.exe 32 PID 2396 wrote to memory of 2140 2396 1nntbb.exe 32 PID 2396 wrote to memory of 2140 2396 1nntbb.exe 32 PID 2396 wrote to memory of 2140 2396 1nntbb.exe 32 PID 2140 wrote to memory of 2712 2140 7pjjp.exe 33 PID 2140 wrote to memory of 2712 2140 7pjjp.exe 33 PID 2140 wrote to memory of 2712 2140 7pjjp.exe 33 PID 2140 wrote to memory of 2712 2140 7pjjp.exe 33 PID 2712 wrote to memory of 2828 2712 jdpdd.exe 34 PID 2712 wrote to memory of 2828 2712 jdpdd.exe 34 PID 2712 wrote to memory of 2828 2712 jdpdd.exe 34 PID 2712 wrote to memory of 2828 2712 jdpdd.exe 34 PID 2828 wrote to memory of 2976 2828 tnbtth.exe 35 PID 2828 wrote to memory of 2976 2828 tnbtth.exe 35 PID 2828 wrote to memory of 2976 2828 tnbtth.exe 35 PID 2828 wrote to memory of 2976 2828 tnbtth.exe 35 PID 2976 wrote to memory of 2952 2976 pdjdj.exe 36 PID 2976 wrote to memory of 2952 2976 pdjdj.exe 36 PID 2976 wrote to memory of 2952 2976 pdjdj.exe 36 PID 2976 wrote to memory of 2952 2976 pdjdj.exe 36 PID 2952 wrote to memory of 2716 2952 rrfrfrx.exe 37 PID 2952 wrote to memory of 2716 2952 rrfrfrx.exe 37 PID 2952 wrote to memory of 2716 2952 rrfrfrx.exe 37 PID 2952 wrote to memory of 2716 2952 rrfrfrx.exe 37 PID 2716 wrote to memory of 2668 2716 1rlrxxx.exe 38 PID 2716 wrote to memory of 2668 2716 1rlrxxx.exe 38 PID 2716 wrote to memory of 2668 2716 1rlrxxx.exe 38 PID 2716 wrote to memory of 2668 2716 1rlrxxx.exe 38 PID 2668 wrote to memory of 2252 2668 vpdjj.exe 39 PID 2668 wrote to memory of 2252 2668 vpdjj.exe 39 PID 2668 wrote to memory of 2252 2668 vpdjj.exe 39 PID 2668 wrote to memory of 2252 2668 vpdjj.exe 39 PID 2252 wrote to memory of 680 2252 lfxfllr.exe 40 PID 2252 wrote to memory of 680 2252 lfxfllr.exe 40 PID 2252 wrote to memory of 680 2252 lfxfllr.exe 40 PID 2252 wrote to memory of 680 2252 lfxfllr.exe 40 PID 680 wrote to memory of 524 680 bhnbbn.exe 41 PID 680 wrote to memory of 524 680 bhnbbn.exe 41 PID 680 wrote to memory of 524 680 bhnbbn.exe 41 PID 680 wrote to memory of 524 680 bhnbbn.exe 41 PID 524 wrote to memory of 1788 524 vjpjp.exe 42 PID 524 wrote to memory of 1788 524 vjpjp.exe 42 PID 524 wrote to memory of 1788 524 vjpjp.exe 42 PID 524 wrote to memory of 1788 524 vjpjp.exe 42 PID 1788 wrote to memory of 1268 1788 fxfflxl.exe 43 PID 1788 wrote to memory of 1268 1788 fxfflxl.exe 43 PID 1788 wrote to memory of 1268 1788 fxfflxl.exe 43 PID 1788 wrote to memory of 1268 1788 fxfflxl.exe 43 PID 1268 wrote to memory of 1168 1268 btthnt.exe 44 PID 1268 wrote to memory of 1168 1268 btthnt.exe 44 PID 1268 wrote to memory of 1168 1268 btthnt.exe 44 PID 1268 wrote to memory of 1168 1268 btthnt.exe 44 PID 1168 wrote to memory of 1832 1168 pvddp.exe 45 PID 1168 wrote to memory of 1832 1168 pvddp.exe 45 PID 1168 wrote to memory of 1832 1168 pvddp.exe 45 PID 1168 wrote to memory of 1832 1168 pvddp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe"C:\Users\Admin\AppData\Local\Temp\030fb7428718f9a4169468ee9aabd9ec2a6514b57ecf202c7b9840a57b034597N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\jdpvd.exec:\jdpvd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\1nntbb.exec:\1nntbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\7pjjp.exec:\7pjjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\jdpdd.exec:\jdpdd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\tnbtth.exec:\tnbtth.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\pdjdj.exec:\pdjdj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\rrfrfrx.exec:\rrfrfrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\1rlrxxx.exec:\1rlrxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\vpdjj.exec:\vpdjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\lfxfllr.exec:\lfxfllr.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\bhnbbn.exec:\bhnbbn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\vjpjp.exec:\vjpjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\fxfflxl.exec:\fxfflxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\btthnt.exec:\btthnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\pvddp.exec:\pvddp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\frffffl.exec:\frffffl.exe17⤵
- Executes dropped EXE
PID:1832 -
\??\c:\nhtbbt.exec:\nhtbbt.exe18⤵
- Executes dropped EXE
PID:1376 -
\??\c:\pjdvd.exec:\pjdvd.exe19⤵
- Executes dropped EXE
PID:1324 -
\??\c:\vpdvd.exec:\vpdvd.exe20⤵
- Executes dropped EXE
PID:2700 -
\??\c:\btnntt.exec:\btnntt.exe21⤵
- Executes dropped EXE
PID:2200 -
\??\c:\bbntnn.exec:\bbntnn.exe22⤵
- Executes dropped EXE
PID:2432 -
\??\c:\xlllllr.exec:\xlllllr.exe23⤵
- Executes dropped EXE
PID:376 -
\??\c:\rxxfxrr.exec:\rxxfxrr.exe24⤵
- Executes dropped EXE
PID:2080 -
\??\c:\bthntb.exec:\bthntb.exe25⤵
- Executes dropped EXE
PID:1520 -
\??\c:\9pddp.exec:\9pddp.exe26⤵
- Executes dropped EXE
PID:940 -
\??\c:\rrlfxxl.exec:\rrlfxxl.exe27⤵
- Executes dropped EXE
PID:2984 -
\??\c:\lxflfll.exec:\lxflfll.exe28⤵
- Executes dropped EXE
PID:1820 -
\??\c:\djddp.exec:\djddp.exe29⤵
- Executes dropped EXE
PID:2456 -
\??\c:\pdppp.exec:\pdppp.exe30⤵
- Executes dropped EXE
PID:1664 -
\??\c:\htbtbb.exec:\htbtbb.exe31⤵
- Executes dropped EXE
PID:2980 -
\??\c:\nbhhhh.exec:\nbhhhh.exe32⤵
- Executes dropped EXE
PID:1784 -
\??\c:\xffrxxl.exec:\xffrxxl.exe33⤵
- Executes dropped EXE
PID:2508 -
\??\c:\7xffrrr.exec:\7xffrrr.exe34⤵
- Executes dropped EXE
PID:2408 -
\??\c:\hbhbhn.exec:\hbhbhn.exe35⤵
- Executes dropped EXE
PID:1592 -
\??\c:\7rfflrx.exec:\7rfflrx.exe36⤵
- Executes dropped EXE
PID:1164 -
\??\c:\rlfrlxr.exec:\rlfrlxr.exe37⤵
- Executes dropped EXE
PID:2800 -
\??\c:\bttntt.exec:\bttntt.exe38⤵
- Executes dropped EXE
PID:2448 -
\??\c:\hthhnt.exec:\hthhnt.exe39⤵
- Executes dropped EXE
PID:2836 -
\??\c:\jdpdp.exec:\jdpdp.exe40⤵
- Executes dropped EXE
PID:2612 -
\??\c:\3rlfllx.exec:\3rlfllx.exe41⤵
- Executes dropped EXE
PID:2976 -
\??\c:\5fffxxl.exec:\5fffxxl.exe42⤵
- Executes dropped EXE
PID:2312 -
\??\c:\ththnt.exec:\ththnt.exe43⤵
- Executes dropped EXE
PID:2620 -
\??\c:\bttbhh.exec:\bttbhh.exe44⤵
- Executes dropped EXE
PID:1976 -
\??\c:\vpjvd.exec:\vpjvd.exe45⤵
- Executes dropped EXE
PID:2676 -
\??\c:\9lfrxxf.exec:\9lfrxxf.exe46⤵
- Executes dropped EXE
PID:2252 -
\??\c:\llflxfr.exec:\llflxfr.exe47⤵
- Executes dropped EXE
PID:784 -
\??\c:\nhtbnt.exec:\nhtbnt.exe48⤵
- Executes dropped EXE
PID:1116 -
\??\c:\tntnnh.exec:\tntnnh.exe49⤵
- Executes dropped EXE
PID:1076 -
\??\c:\pjpjp.exec:\pjpjp.exe50⤵
- Executes dropped EXE
PID:596 -
\??\c:\vppvj.exec:\vppvj.exe51⤵
- Executes dropped EXE
PID:2504 -
\??\c:\rfllrrf.exec:\rfllrrf.exe52⤵
- Executes dropped EXE
PID:600 -
\??\c:\ffxxflr.exec:\ffxxflr.exe53⤵
- Executes dropped EXE
PID:1224 -
\??\c:\tnbhtt.exec:\tnbhtt.exe54⤵
- Executes dropped EXE
PID:1760 -
\??\c:\hbtbnn.exec:\hbtbnn.exe55⤵
- Executes dropped EXE
PID:832 -
\??\c:\ppvvd.exec:\ppvvd.exe56⤵
- Executes dropped EXE
PID:2084 -
\??\c:\pjddp.exec:\pjddp.exe57⤵
- Executes dropped EXE
PID:2000 -
\??\c:\5lflxll.exec:\5lflxll.exe58⤵
- Executes dropped EXE
PID:1488 -
\??\c:\hbtbbb.exec:\hbtbbb.exe59⤵
- Executes dropped EXE
PID:1644 -
\??\c:\nhnnhn.exec:\nhnnhn.exe60⤵
- Executes dropped EXE
PID:2072 -
\??\c:\jdppv.exec:\jdppv.exe61⤵
- Executes dropped EXE
PID:1704 -
\??\c:\5djjj.exec:\5djjj.exe62⤵
- Executes dropped EXE
PID:1568 -
\??\c:\lffllll.exec:\lffllll.exe63⤵
- Executes dropped EXE
PID:684 -
\??\c:\1lllflx.exec:\1lllflx.exe64⤵
- Executes dropped EXE
PID:920 -
\??\c:\3nbbnh.exec:\3nbbnh.exe65⤵
- Executes dropped EXE
PID:2412 -
\??\c:\9nbhth.exec:\9nbhth.exe66⤵PID:2644
-
\??\c:\jdvdv.exec:\jdvdv.exe67⤵PID:2172
-
\??\c:\jdpjp.exec:\jdpjp.exe68⤵PID:2216
-
\??\c:\rllrflr.exec:\rllrflr.exe69⤵PID:660
-
\??\c:\xrflflf.exec:\xrflflf.exe70⤵PID:2168
-
\??\c:\thtbhn.exec:\thtbhn.exe71⤵PID:2980
-
\??\c:\7ntttt.exec:\7ntttt.exe72⤵PID:772
-
\??\c:\jdvvd.exec:\jdvvd.exe73⤵PID:2508
-
\??\c:\jdjjp.exec:\jdjjp.exe74⤵PID:2416
-
\??\c:\llxxxfl.exec:\llxxxfl.exe75⤵PID:2956
-
\??\c:\3frxflr.exec:\3frxflr.exe76⤵PID:2752
-
\??\c:\hbhthn.exec:\hbhthn.exe77⤵PID:2708
-
\??\c:\dvdjv.exec:\dvdjv.exe78⤵PID:2812
-
\??\c:\dvjjp.exec:\dvjjp.exe79⤵PID:2728
-
\??\c:\lfrxlrf.exec:\lfrxlrf.exe80⤵PID:2920
-
\??\c:\fxffllr.exec:\fxffllr.exe81⤵PID:2608
-
\??\c:\tnnttb.exec:\tnnttb.exe82⤵PID:2972
-
\??\c:\bnhnhh.exec:\bnhnhh.exe83⤵PID:2768
-
\??\c:\9jjdv.exec:\9jjdv.exe84⤵PID:3056
-
\??\c:\5vjdd.exec:\5vjdd.exe85⤵PID:2096
-
\??\c:\rfrxllr.exec:\rfrxllr.exe86⤵PID:1728
-
\??\c:\llrlllr.exec:\llrlllr.exe87⤵PID:852
-
\??\c:\9nhbnn.exec:\9nhbnn.exe88⤵PID:1652
-
\??\c:\vppdp.exec:\vppdp.exe89⤵PID:1320
-
\??\c:\pjvdj.exec:\pjvdj.exe90⤵PID:1412
-
\??\c:\lfrrrxf.exec:\lfrrrxf.exe91⤵PID:592
-
\??\c:\lfrfxfl.exec:\lfrfxfl.exe92⤵PID:2936
-
\??\c:\3tbhtt.exec:\3tbhtt.exe93⤵
- System Location Discovery: System Language Discovery
PID:1948 -
\??\c:\hbnbhh.exec:\hbnbhh.exe94⤵PID:2944
-
\??\c:\dpdjj.exec:\dpdjj.exe95⤵PID:1324
-
\??\c:\rfrrxfl.exec:\rfrrxfl.exe96⤵PID:2932
-
\??\c:\rlxfrrx.exec:\rlxfrrx.exe97⤵PID:2424
-
\??\c:\hbthbn.exec:\hbthbn.exe98⤵PID:3044
-
\??\c:\bbntth.exec:\bbntth.exe99⤵PID:1004
-
\??\c:\dpvpp.exec:\dpvpp.exe100⤵PID:376
-
\??\c:\9pdvd.exec:\9pdvd.exe101⤵PID:2220
-
\??\c:\lflfflr.exec:\lflfflr.exe102⤵PID:960
-
\??\c:\5xfffff.exec:\5xfffff.exe103⤵PID:2560
-
\??\c:\thbbhn.exec:\thbbhn.exe104⤵PID:1364
-
\??\c:\btnthh.exec:\btnthh.exe105⤵PID:2984
-
\??\c:\3jdpd.exec:\3jdpd.exe106⤵PID:2540
-
\??\c:\rlrxrrx.exec:\rlrxrrx.exe107⤵PID:2156
-
\??\c:\9xlrflr.exec:\9xlrflr.exe108⤵PID:1648
-
\??\c:\7ththh.exec:\7ththh.exe109⤵PID:1740
-
\??\c:\5tnnbh.exec:\5tnnbh.exe110⤵PID:2016
-
\??\c:\9jvdv.exec:\9jvdv.exe111⤵PID:2052
-
\??\c:\dvvdj.exec:\dvvdj.exe112⤵PID:2400
-
\??\c:\rlrlfxf.exec:\rlrlfxf.exe113⤵PID:2900
-
\??\c:\btnnbb.exec:\btnnbb.exe114⤵PID:2408
-
\??\c:\nhtbnt.exec:\nhtbnt.exe115⤵PID:1592
-
\??\c:\dvdvj.exec:\dvdvj.exe116⤵PID:1164
-
\??\c:\5pddp.exec:\5pddp.exe117⤵PID:2988
-
\??\c:\5llllrx.exec:\5llllrx.exe118⤵PID:2448
-
\??\c:\httntt.exec:\httntt.exe119⤵PID:2720
-
\??\c:\nbhbhh.exec:\nbhbhh.exe120⤵
- System Location Discovery: System Language Discovery
PID:2604 -
\??\c:\vjvvj.exec:\vjvvj.exe121⤵PID:2976
-
\??\c:\vvpvd.exec:\vvpvd.exe122⤵PID:2616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-