Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 00:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe
-
Size
67KB
-
MD5
b8df8ab5e74c7f3180a39bc20e494500
-
SHA1
7a9c37dd4101eefe5edc6af3555dec1a7e0fd23c
-
SHA256
9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55
-
SHA512
52dce267475be44e7098478ebcfede3420646c780f02886edc5c9125f4e2af1ce919242616a9feef9756e0dbbd1e860a260a4f90c5304559fdf96595d6d94caa
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27B5QcS:ymb3NkkiQ3mdBjFI9c+h
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2340-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2340-8-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2492-28-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2292-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2292-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2492-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1808-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1860-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1240-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1552-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1400-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1076-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2544 3dpvd.exe 2492 vjddj.exe 2292 lxrxxfl.exe 2672 hbtnnt.exe 2784 hbhbbh.exe 2728 dvvjp.exe 2912 1rfrlrr.exe 2604 rfrxllr.exe 2752 bbthbt.exe 2652 1ddjj.exe 1808 fffxxrr.exe 1860 lrrlfxl.exe 1624 pjjvv.exe 2484 7ddpp.exe 1240 lfxxxfr.exe 1552 bthnbb.exe 1400 vpdvd.exe 1076 dvvvd.exe 1684 frffrxf.exe 2876 bnhnnt.exe 2252 7ntbhh.exe 2240 jjdpv.exe 1540 7ppdd.exe 2412 xxfrlxr.exe 1160 1htbbb.exe 2192 5bnhbb.exe 2160 9vpjp.exe 2952 fxlxxxx.exe 2064 lfrrxxl.exe 1736 btnbtb.exe 2084 btnbbh.exe 1856 1thnhh.exe 1536 vjdvv.exe 2152 7lfllll.exe 2456 lrlflff.exe 2720 nbnhnn.exe 2264 hbhhbb.exe 112 3pddj.exe 2588 7jvpv.exe 2764 rllllrx.exe 2384 lffrxfl.exe 2756 xlrflff.exe 2632 bnbhhn.exe 2752 3pvpj.exe 2652 5pjpp.exe 1820 5jddj.exe 1968 rfrxxxx.exe 1720 frrxllr.exe 2360 btbbbb.exe 2336 nbtnnh.exe 864 5pjjp.exe 848 7dpvv.exe 1080 rlfrrrx.exe 756 rlrfrxf.exe 1556 tnnhtb.exe 1588 bnbhhb.exe 1732 dpvdd.exe 2252 1jvpv.exe 812 rlfflrf.exe 2932 9rlxfxf.exe 404 rfffrrx.exe 1512 bbhbnt.exe 1160 7bthtt.exe 1644 1pvvj.exe -
resource yara_rule behavioral1/memory/2340-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1808-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1860-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1240-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1552-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1400-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1076-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-269-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ddjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rflxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1frlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2544 2340 9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe 30 PID 2340 wrote to memory of 2544 2340 9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe 30 PID 2340 wrote to memory of 2544 2340 9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe 30 PID 2340 wrote to memory of 2544 2340 9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe 30 PID 2544 wrote to memory of 2492 2544 3dpvd.exe 31 PID 2544 wrote to memory of 2492 2544 3dpvd.exe 31 PID 2544 wrote to memory of 2492 2544 3dpvd.exe 31 PID 2544 wrote to memory of 2492 2544 3dpvd.exe 31 PID 2492 wrote to memory of 2292 2492 vjddj.exe 32 PID 2492 wrote to memory of 2292 2492 vjddj.exe 32 PID 2492 wrote to memory of 2292 2492 vjddj.exe 32 PID 2492 wrote to memory of 2292 2492 vjddj.exe 32 PID 2292 wrote to memory of 2672 2292 lxrxxfl.exe 33 PID 2292 wrote to memory of 2672 2292 lxrxxfl.exe 33 PID 2292 wrote to memory of 2672 2292 lxrxxfl.exe 33 PID 2292 wrote to memory of 2672 2292 lxrxxfl.exe 33 PID 2672 wrote to memory of 2784 2672 hbtnnt.exe 34 PID 2672 wrote to memory of 2784 2672 hbtnnt.exe 34 PID 2672 wrote to memory of 2784 2672 hbtnnt.exe 34 PID 2672 wrote to memory of 2784 2672 hbtnnt.exe 34 PID 2784 wrote to memory of 2728 2784 hbhbbh.exe 35 PID 2784 wrote to memory of 2728 2784 hbhbbh.exe 35 PID 2784 wrote to memory of 2728 2784 hbhbbh.exe 35 PID 2784 wrote to memory of 2728 2784 hbhbbh.exe 35 PID 2728 wrote to memory of 2912 2728 dvvjp.exe 36 PID 2728 wrote to memory of 2912 2728 dvvjp.exe 36 PID 2728 wrote to memory of 2912 2728 dvvjp.exe 36 PID 2728 wrote to memory of 2912 2728 dvvjp.exe 36 PID 2912 wrote to memory of 2604 2912 1rfrlrr.exe 37 PID 2912 wrote to memory of 2604 2912 1rfrlrr.exe 37 PID 2912 wrote to memory of 2604 2912 1rfrlrr.exe 37 PID 2912 wrote to memory of 2604 2912 1rfrlrr.exe 37 PID 2604 wrote to memory of 2752 2604 rfrxllr.exe 38 PID 2604 wrote to memory of 2752 2604 rfrxllr.exe 38 PID 2604 wrote to memory of 2752 2604 rfrxllr.exe 38 PID 2604 wrote to memory of 2752 2604 rfrxllr.exe 38 PID 2752 wrote to memory of 2652 2752 bbthbt.exe 39 PID 2752 wrote to memory of 2652 2752 bbthbt.exe 39 PID 2752 wrote to memory of 2652 2752 bbthbt.exe 39 PID 2752 wrote to memory of 2652 2752 bbthbt.exe 39 PID 2652 wrote to memory of 1808 2652 1ddjj.exe 40 PID 2652 wrote to memory of 1808 2652 1ddjj.exe 40 PID 2652 wrote to memory of 1808 2652 1ddjj.exe 40 PID 2652 wrote to memory of 1808 2652 1ddjj.exe 40 PID 1808 wrote to memory of 1860 1808 fffxxrr.exe 41 PID 1808 wrote to memory of 1860 1808 fffxxrr.exe 41 PID 1808 wrote to memory of 1860 1808 fffxxrr.exe 41 PID 1808 wrote to memory of 1860 1808 fffxxrr.exe 41 PID 1860 wrote to memory of 1624 1860 lrrlfxl.exe 42 PID 1860 wrote to memory of 1624 1860 lrrlfxl.exe 42 PID 1860 wrote to memory of 1624 1860 lrrlfxl.exe 42 PID 1860 wrote to memory of 1624 1860 lrrlfxl.exe 42 PID 1624 wrote to memory of 2484 1624 pjjvv.exe 43 PID 1624 wrote to memory of 2484 1624 pjjvv.exe 43 PID 1624 wrote to memory of 2484 1624 pjjvv.exe 43 PID 1624 wrote to memory of 2484 1624 pjjvv.exe 43 PID 2484 wrote to memory of 1240 2484 7ddpp.exe 44 PID 2484 wrote to memory of 1240 2484 7ddpp.exe 44 PID 2484 wrote to memory of 1240 2484 7ddpp.exe 44 PID 2484 wrote to memory of 1240 2484 7ddpp.exe 44 PID 1240 wrote to memory of 1552 1240 lfxxxfr.exe 45 PID 1240 wrote to memory of 1552 1240 lfxxxfr.exe 45 PID 1240 wrote to memory of 1552 1240 lfxxxfr.exe 45 PID 1240 wrote to memory of 1552 1240 lfxxxfr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe"C:\Users\Admin\AppData\Local\Temp\9063fae6561fb7a36c58ff4cbeae9f8918e49b16b07d5c63fc604092aefc1a55N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\3dpvd.exec:\3dpvd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\vjddj.exec:\vjddj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\lxrxxfl.exec:\lxrxxfl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\hbtnnt.exec:\hbtnnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\hbhbbh.exec:\hbhbbh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\dvvjp.exec:\dvvjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\1rfrlrr.exec:\1rfrlrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\rfrxllr.exec:\rfrxllr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\bbthbt.exec:\bbthbt.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\1ddjj.exec:\1ddjj.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\fffxxrr.exec:\fffxxrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\lrrlfxl.exec:\lrrlfxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\pjjvv.exec:\pjjvv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\7ddpp.exec:\7ddpp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\lfxxxfr.exec:\lfxxxfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\bthnbb.exec:\bthnbb.exe17⤵
- Executes dropped EXE
PID:1552 -
\??\c:\vpdvd.exec:\vpdvd.exe18⤵
- Executes dropped EXE
PID:1400 -
\??\c:\dvvvd.exec:\dvvvd.exe19⤵
- Executes dropped EXE
PID:1076 -
\??\c:\frffrxf.exec:\frffrxf.exe20⤵
- Executes dropped EXE
PID:1684 -
\??\c:\bnhnnt.exec:\bnhnnt.exe21⤵
- Executes dropped EXE
PID:2876 -
\??\c:\7ntbhh.exec:\7ntbhh.exe22⤵
- Executes dropped EXE
PID:2252 -
\??\c:\jjdpv.exec:\jjdpv.exe23⤵
- Executes dropped EXE
PID:2240 -
\??\c:\7ppdd.exec:\7ppdd.exe24⤵
- Executes dropped EXE
PID:1540 -
\??\c:\xxfrlxr.exec:\xxfrlxr.exe25⤵
- Executes dropped EXE
PID:2412 -
\??\c:\1htbbb.exec:\1htbbb.exe26⤵
- Executes dropped EXE
PID:1160 -
\??\c:\5bnhbb.exec:\5bnhbb.exe27⤵
- Executes dropped EXE
PID:2192 -
\??\c:\9vpjp.exec:\9vpjp.exe28⤵
- Executes dropped EXE
PID:2160 -
\??\c:\fxlxxxx.exec:\fxlxxxx.exe29⤵
- Executes dropped EXE
PID:2952 -
\??\c:\lfrrxxl.exec:\lfrrxxl.exe30⤵
- Executes dropped EXE
PID:2064 -
\??\c:\btnbtb.exec:\btnbtb.exe31⤵
- Executes dropped EXE
PID:1736 -
\??\c:\btnbbh.exec:\btnbbh.exe32⤵
- Executes dropped EXE
PID:2084 -
\??\c:\1thnhh.exec:\1thnhh.exe33⤵
- Executes dropped EXE
PID:1856 -
\??\c:\vjdvv.exec:\vjdvv.exe34⤵
- Executes dropped EXE
PID:1536 -
\??\c:\7lfllll.exec:\7lfllll.exe35⤵
- Executes dropped EXE
PID:2152 -
\??\c:\lrlflff.exec:\lrlflff.exe36⤵
- Executes dropped EXE
PID:2456 -
\??\c:\nbnhnn.exec:\nbnhnn.exe37⤵
- Executes dropped EXE
PID:2720 -
\??\c:\hbhhbb.exec:\hbhhbb.exe38⤵
- Executes dropped EXE
PID:2264 -
\??\c:\3pddj.exec:\3pddj.exe39⤵
- Executes dropped EXE
PID:112 -
\??\c:\7jvpv.exec:\7jvpv.exe40⤵
- Executes dropped EXE
PID:2588 -
\??\c:\rllllrx.exec:\rllllrx.exe41⤵
- Executes dropped EXE
PID:2764 -
\??\c:\lffrxfl.exec:\lffrxfl.exe42⤵
- Executes dropped EXE
PID:2384 -
\??\c:\xlrflff.exec:\xlrflff.exe43⤵
- Executes dropped EXE
PID:2756 -
\??\c:\bnbhhn.exec:\bnbhhn.exe44⤵
- Executes dropped EXE
PID:2632 -
\??\c:\3pvpj.exec:\3pvpj.exe45⤵
- Executes dropped EXE
PID:2752 -
\??\c:\5pjpp.exec:\5pjpp.exe46⤵
- Executes dropped EXE
PID:2652 -
\??\c:\5jddj.exec:\5jddj.exe47⤵
- Executes dropped EXE
PID:1820 -
\??\c:\rfrxxxx.exec:\rfrxxxx.exe48⤵
- Executes dropped EXE
PID:1968 -
\??\c:\frrxllr.exec:\frrxllr.exe49⤵
- Executes dropped EXE
PID:1720 -
\??\c:\btbbbb.exec:\btbbbb.exe50⤵
- Executes dropped EXE
PID:2360 -
\??\c:\nbtnnh.exec:\nbtnnh.exe51⤵
- Executes dropped EXE
PID:2336 -
\??\c:\5pjjp.exec:\5pjjp.exe52⤵
- Executes dropped EXE
PID:864 -
\??\c:\7dpvv.exec:\7dpvv.exe53⤵
- Executes dropped EXE
PID:848 -
\??\c:\rlfrrrx.exec:\rlfrrrx.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080 -
\??\c:\rlrfrxf.exec:\rlrfrxf.exe55⤵
- Executes dropped EXE
PID:756 -
\??\c:\tnnhtb.exec:\tnnhtb.exe56⤵
- Executes dropped EXE
PID:1556 -
\??\c:\bnbhhb.exec:\bnbhhb.exe57⤵
- Executes dropped EXE
PID:1588 -
\??\c:\dpvdd.exec:\dpvdd.exe58⤵
- Executes dropped EXE
PID:1732 -
\??\c:\1jvpv.exec:\1jvpv.exe59⤵
- Executes dropped EXE
PID:2252 -
\??\c:\rlfflrf.exec:\rlfflrf.exe60⤵
- Executes dropped EXE
PID:812 -
\??\c:\9rlxfxf.exec:\9rlxfxf.exe61⤵
- Executes dropped EXE
PID:2932 -
\??\c:\rfffrrx.exec:\rfffrrx.exe62⤵
- Executes dropped EXE
PID:404 -
\??\c:\bbhbnt.exec:\bbhbnt.exe63⤵
- Executes dropped EXE
PID:1512 -
\??\c:\7bthtt.exec:\7bthtt.exe64⤵
- Executes dropped EXE
PID:1160 -
\??\c:\1pvvj.exec:\1pvvj.exe65⤵
- Executes dropped EXE
PID:1644 -
\??\c:\jdjjj.exec:\jdjjj.exe66⤵PID:2920
-
\??\c:\fxrrxrf.exec:\fxrrxrf.exe67⤵PID:576
-
\??\c:\7xffrrr.exec:\7xffrrr.exe68⤵PID:828
-
\??\c:\7nbnbb.exec:\7nbnbb.exe69⤵PID:2340
-
\??\c:\thntnt.exec:\thntnt.exe70⤵PID:1736
-
\??\c:\dppjp.exec:\dppjp.exe71⤵PID:1432
-
\??\c:\ppvpv.exec:\ppvpv.exe72⤵PID:2428
-
\??\c:\rlxxllr.exec:\rlxxllr.exe73⤵PID:2472
-
\??\c:\lfxxlrx.exec:\lfxxlrx.exe74⤵PID:1524
-
\??\c:\fxrxlrf.exec:\fxrxlrf.exe75⤵PID:2496
-
\??\c:\nbhbbb.exec:\nbhbbb.exe76⤵PID:3064
-
\??\c:\nhhhbh.exec:\nhhhbh.exe77⤵PID:2772
-
\??\c:\7hthtb.exec:\7hthtb.exe78⤵PID:2128
-
\??\c:\9jvjj.exec:\9jvjj.exe79⤵PID:2724
-
\??\c:\fxffxrf.exec:\fxffxrf.exe80⤵PID:2828
-
\??\c:\fxxlxxf.exec:\fxxlxxf.exe81⤵PID:2912
-
\??\c:\hbhnbh.exec:\hbhnbh.exe82⤵PID:2680
-
\??\c:\hhbhhn.exec:\hhbhhn.exe83⤵PID:2604
-
\??\c:\dpvpj.exec:\dpvpj.exe84⤵PID:2988
-
\??\c:\vjvdj.exec:\vjvdj.exe85⤵PID:3044
-
\??\c:\rfllxxf.exec:\rfllxxf.exe86⤵PID:3016
-
\??\c:\fxrlxrf.exec:\fxrlxrf.exe87⤵PID:1420
-
\??\c:\btnthh.exec:\btnthh.exe88⤵PID:2036
-
\??\c:\5dddd.exec:\5dddd.exe89⤵PID:1996
-
\??\c:\vpvjj.exec:\vpvjj.exe90⤵PID:2068
-
\??\c:\jdvvj.exec:\jdvvj.exe91⤵PID:1224
-
\??\c:\fxlrffl.exec:\fxlrffl.exe92⤵PID:1632
-
\??\c:\7rllxxl.exec:\7rllxxl.exe93⤵PID:1656
-
\??\c:\hnbhhb.exec:\hnbhhb.exe94⤵PID:296
-
\??\c:\hbthbh.exec:\hbthbh.exe95⤵PID:2984
-
\??\c:\vjddp.exec:\vjddp.exe96⤵PID:2888
-
\??\c:\vjvdj.exec:\vjvdj.exe97⤵PID:840
-
\??\c:\rlxxlrx.exec:\rlxxlrx.exe98⤵PID:2876
-
\??\c:\xlllrlx.exec:\xlllrlx.exe99⤵PID:1416
-
\??\c:\tnttbb.exec:\tnttbb.exe100⤵PID:2240
-
\??\c:\tntbhb.exec:\tntbhb.exe101⤵PID:1540
-
\??\c:\jvdjp.exec:\jvdjp.exe102⤵PID:2232
-
\??\c:\5dpdd.exec:\5dpdd.exe103⤵PID:1316
-
\??\c:\vvjdj.exec:\vvjdj.exe104⤵PID:2936
-
\??\c:\frfffxf.exec:\frfffxf.exe105⤵PID:2192
-
\??\c:\xxrxlfx.exec:\xxrxlfx.exe106⤵PID:2328
-
\??\c:\hthhtt.exec:\hthhtt.exe107⤵PID:2508
-
\??\c:\thtbhh.exec:\thtbhh.exe108⤵PID:616
-
\??\c:\jvdjv.exec:\jvdjv.exe109⤵PID:2140
-
\??\c:\dpdvv.exec:\dpdvv.exe110⤵PID:880
-
\??\c:\rfffllr.exec:\rfffllr.exe111⤵PID:1620
-
\??\c:\5lfrffr.exec:\5lfrffr.exe112⤵PID:2664
-
\??\c:\9htttb.exec:\9htttb.exe113⤵PID:1312
-
\??\c:\tnbhbt.exec:\tnbhbt.exe114⤵PID:1524
-
\??\c:\pjvpd.exec:\pjvpd.exe115⤵PID:1260
-
\??\c:\3jppp.exec:\3jppp.exe116⤵PID:3064
-
\??\c:\1rlxfrx.exec:\1rlxfrx.exe117⤵PID:2712
-
\??\c:\rlflxfl.exec:\rlflxfl.exe118⤵PID:2916
-
\??\c:\5xrrxfl.exec:\5xrrxfl.exe119⤵PID:2728
-
\??\c:\tnbbhh.exec:\tnbbhh.exe120⤵PID:2744
-
\??\c:\nnbtbh.exec:\nnbtbh.exe121⤵PID:2716
-
\??\c:\ddjvd.exec:\ddjvd.exe122⤵PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-