Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe
Resource
win10v2004-20241007-en
General
-
Target
cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe
-
Size
40KB
-
MD5
7c01a3c63d11415f26e15368efad79e0
-
SHA1
a821a1b5c45e26ae466263557c456b744c7a0cc3
-
SHA256
cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ff
-
SHA512
ee21ba04749e0c8f334af002cbf930e1dafed4633cc0e45822e9693444a7728788661b71f65c211105a7946cfcf06044b897e278f5d5a94cf1e213e97a9fefe7
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZGLqiyj:nSgy19JSVO1ONn511/tivXZjXj
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2140 fxlrrxr.exe 2428 btbbnt.exe 2160 nhhnnh.exe 1684 pdvdv.exe 2760 lrxxlrr.exe 2880 3xllxfl.exe 2756 hthhhn.exe 2948 9bthnt.exe 2380 9ppjp.exe 2644 pvdpj.exe 3068 fxfflfl.exe 2164 bhhbhn.exe 852 1bhhnn.exe 1912 jjvvv.exe 960 xfrllff.exe 1180 hbhthb.exe 2692 htbtbn.exe 1828 vpddp.exe 1932 pddvv.exe 2884 frxxxxx.exe 1748 thnnth.exe 2956 vdpjd.exe 2080 vjvpp.exe 1292 xrflllx.exe 2032 rlllrxf.exe 2508 nbthtt.exe 1664 pdpvv.exe 1240 7pjdd.exe 1832 rlxrxff.exe 1208 hhthnn.exe 1236 nbnttt.exe 2060 vpjjv.exe 912 fxxlxll.exe 2144 llrlxxl.exe 2068 hbhnth.exe 2520 dvjpv.exe 2328 7dddj.exe 2484 llrrrrx.exe 2276 3xrrxxf.exe 1204 hbhnbn.exe 2556 1jvvd.exe 1408 1vdpp.exe 1480 xrffxrx.exe 1724 5bnbbb.exe 2140 bttnbb.exe 2820 dvjjp.exe 2460 jdjdp.exe 2740 lrlfxxr.exe 2836 bthhtt.exe 2736 nhntbb.exe 2988 vpjdp.exe 2372 7jvpj.exe 2796 fxfxxrx.exe 2948 rfllrrx.exe 2640 nhbbtt.exe 2704 tnttbb.exe 2356 btnnbb.exe 3068 jddpd.exe 2204 pdjjd.exe 1116 9rllllr.exe 332 frflrrx.exe 320 nbnthn.exe 960 xrxxfll.exe 2448 nhttnn.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbthtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxlfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lxrrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rlllrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrlxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxfxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxlxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxfffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hthhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ntttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbthhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7httnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hhbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfxllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hhbht.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2140 1752 cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe 30 PID 1752 wrote to memory of 2140 1752 cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe 30 PID 1752 wrote to memory of 2140 1752 cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe 30 PID 1752 wrote to memory of 2140 1752 cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe 30 PID 2140 wrote to memory of 2428 2140 fxlrrxr.exe 31 PID 2140 wrote to memory of 2428 2140 fxlrrxr.exe 31 PID 2140 wrote to memory of 2428 2140 fxlrrxr.exe 31 PID 2140 wrote to memory of 2428 2140 fxlrrxr.exe 31 PID 2428 wrote to memory of 2160 2428 btbbnt.exe 32 PID 2428 wrote to memory of 2160 2428 btbbnt.exe 32 PID 2428 wrote to memory of 2160 2428 btbbnt.exe 32 PID 2428 wrote to memory of 2160 2428 btbbnt.exe 32 PID 2160 wrote to memory of 1684 2160 nhhnnh.exe 33 PID 2160 wrote to memory of 1684 2160 nhhnnh.exe 33 PID 2160 wrote to memory of 1684 2160 nhhnnh.exe 33 PID 2160 wrote to memory of 1684 2160 nhhnnh.exe 33 PID 1684 wrote to memory of 2760 1684 pdvdv.exe 34 PID 1684 wrote to memory of 2760 1684 pdvdv.exe 34 PID 1684 wrote to memory of 2760 1684 pdvdv.exe 34 PID 1684 wrote to memory of 2760 1684 pdvdv.exe 34 PID 2760 wrote to memory of 2880 2760 lrxxlrr.exe 35 PID 2760 wrote to memory of 2880 2760 lrxxlrr.exe 35 PID 2760 wrote to memory of 2880 2760 lrxxlrr.exe 35 PID 2760 wrote to memory of 2880 2760 lrxxlrr.exe 35 PID 2880 wrote to memory of 2756 2880 3xllxfl.exe 36 PID 2880 wrote to memory of 2756 2880 3xllxfl.exe 36 PID 2880 wrote to memory of 2756 2880 3xllxfl.exe 36 PID 2880 wrote to memory of 2756 2880 3xllxfl.exe 36 PID 2756 wrote to memory of 2948 2756 hthhhn.exe 37 PID 2756 wrote to memory of 2948 2756 hthhhn.exe 37 PID 2756 wrote to memory of 2948 2756 hthhhn.exe 37 PID 2756 wrote to memory of 2948 2756 hthhhn.exe 37 PID 2948 wrote to memory of 2380 2948 9bthnt.exe 38 PID 2948 wrote to memory of 2380 2948 9bthnt.exe 38 PID 2948 wrote to memory of 2380 2948 9bthnt.exe 38 PID 2948 wrote to memory of 2380 2948 9bthnt.exe 38 PID 2380 wrote to memory of 2644 2380 9ppjp.exe 39 PID 2380 wrote to memory of 2644 2380 9ppjp.exe 39 PID 2380 wrote to memory of 2644 2380 9ppjp.exe 39 PID 2380 wrote to memory of 2644 2380 9ppjp.exe 39 PID 2644 wrote to memory of 3068 2644 pvdpj.exe 40 PID 2644 wrote to memory of 3068 2644 pvdpj.exe 40 PID 2644 wrote to memory of 3068 2644 pvdpj.exe 40 PID 2644 wrote to memory of 3068 2644 pvdpj.exe 40 PID 3068 wrote to memory of 2164 3068 fxfflfl.exe 41 PID 3068 wrote to memory of 2164 3068 fxfflfl.exe 41 PID 3068 wrote to memory of 2164 3068 fxfflfl.exe 41 PID 3068 wrote to memory of 2164 3068 fxfflfl.exe 41 PID 2164 wrote to memory of 852 2164 bhhbhn.exe 42 PID 2164 wrote to memory of 852 2164 bhhbhn.exe 42 PID 2164 wrote to memory of 852 2164 bhhbhn.exe 42 PID 2164 wrote to memory of 852 2164 bhhbhn.exe 42 PID 852 wrote to memory of 1912 852 1bhhnn.exe 43 PID 852 wrote to memory of 1912 852 1bhhnn.exe 43 PID 852 wrote to memory of 1912 852 1bhhnn.exe 43 PID 852 wrote to memory of 1912 852 1bhhnn.exe 43 PID 1912 wrote to memory of 960 1912 jjvvv.exe 44 PID 1912 wrote to memory of 960 1912 jjvvv.exe 44 PID 1912 wrote to memory of 960 1912 jjvvv.exe 44 PID 1912 wrote to memory of 960 1912 jjvvv.exe 44 PID 960 wrote to memory of 1180 960 xfrllff.exe 45 PID 960 wrote to memory of 1180 960 xfrllff.exe 45 PID 960 wrote to memory of 1180 960 xfrllff.exe 45 PID 960 wrote to memory of 1180 960 xfrllff.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe"C:\Users\Admin\AppData\Local\Temp\cb89f9f080b298d769351aba59a331afd6e926f64542475b1729e91465cd75ffN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
\??\c:\fxlrrxr.exec:\fxlrrxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\btbbnt.exec:\btbbnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\nhhnnh.exec:\nhhnnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\pdvdv.exec:\pdvdv.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\lrxxlrr.exec:\lrxxlrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\3xllxfl.exec:\3xllxfl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\hthhhn.exec:\hthhhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\9bthnt.exec:\9bthnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\9ppjp.exec:\9ppjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\pvdpj.exec:\pvdpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\fxfflfl.exec:\fxfflfl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\bhhbhn.exec:\bhhbhn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\1bhhnn.exec:\1bhhnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
\??\c:\jjvvv.exec:\jjvvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\xfrllff.exec:\xfrllff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\hbhthb.exec:\hbhthb.exe17⤵
- Executes dropped EXE
PID:1180 -
\??\c:\htbtbn.exec:\htbtbn.exe18⤵
- Executes dropped EXE
PID:2692 -
\??\c:\vpddp.exec:\vpddp.exe19⤵
- Executes dropped EXE
PID:1828 -
\??\c:\pddvv.exec:\pddvv.exe20⤵
- Executes dropped EXE
PID:1932 -
\??\c:\frxxxxx.exec:\frxxxxx.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884 -
\??\c:\thnnth.exec:\thnnth.exe22⤵
- Executes dropped EXE
PID:1748 -
\??\c:\vdpjd.exec:\vdpjd.exe23⤵
- Executes dropped EXE
PID:2956 -
\??\c:\vjvpp.exec:\vjvpp.exe24⤵
- Executes dropped EXE
PID:2080 -
\??\c:\xrflllx.exec:\xrflllx.exe25⤵
- Executes dropped EXE
PID:1292 -
\??\c:\rlllrxf.exec:\rlllrxf.exe26⤵
- Executes dropped EXE
PID:2032 -
\??\c:\nbthtt.exec:\nbthtt.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2508 -
\??\c:\pdpvv.exec:\pdpvv.exe28⤵
- Executes dropped EXE
PID:1664 -
\??\c:\7pjdd.exec:\7pjdd.exe29⤵
- Executes dropped EXE
PID:1240 -
\??\c:\rlxrxff.exec:\rlxrxff.exe30⤵
- Executes dropped EXE
PID:1832 -
\??\c:\hhthnn.exec:\hhthnn.exe31⤵
- Executes dropped EXE
PID:1208 -
\??\c:\nbnttt.exec:\nbnttt.exe32⤵
- Executes dropped EXE
PID:1236 -
\??\c:\vpjjv.exec:\vpjjv.exe33⤵
- Executes dropped EXE
PID:2060 -
\??\c:\fxxlxll.exec:\fxxlxll.exe34⤵
- Executes dropped EXE
PID:912 -
\??\c:\llrlxxl.exec:\llrlxxl.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2144 -
\??\c:\hbhnth.exec:\hbhnth.exe36⤵
- Executes dropped EXE
PID:2068 -
\??\c:\dvjpv.exec:\dvjpv.exe37⤵
- Executes dropped EXE
PID:2520 -
\??\c:\7dddj.exec:\7dddj.exe38⤵
- Executes dropped EXE
PID:2328 -
\??\c:\llrrrrx.exec:\llrrrrx.exe39⤵
- Executes dropped EXE
PID:2484 -
\??\c:\3xrrxxf.exec:\3xrrxxf.exe40⤵
- Executes dropped EXE
PID:2276 -
\??\c:\hbhnbn.exec:\hbhnbn.exe41⤵
- Executes dropped EXE
PID:1204 -
\??\c:\1jvvd.exec:\1jvvd.exe42⤵
- Executes dropped EXE
PID:2556 -
\??\c:\1vdpp.exec:\1vdpp.exe43⤵
- Executes dropped EXE
PID:1408 -
\??\c:\xrffxrx.exec:\xrffxrx.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480 -
\??\c:\5bnbbb.exec:\5bnbbb.exe45⤵
- Executes dropped EXE
PID:1724 -
\??\c:\bttnbb.exec:\bttnbb.exe46⤵
- Executes dropped EXE
PID:2140 -
\??\c:\dvjjp.exec:\dvjjp.exe47⤵
- Executes dropped EXE
PID:2820 -
\??\c:\jdjdp.exec:\jdjdp.exe48⤵
- Executes dropped EXE
PID:2460 -
\??\c:\lrlfxxr.exec:\lrlfxxr.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740 -
\??\c:\bthhtt.exec:\bthhtt.exe50⤵
- Executes dropped EXE
PID:2836 -
\??\c:\nhntbb.exec:\nhntbb.exe51⤵
- Executes dropped EXE
PID:2736 -
\??\c:\vpjdp.exec:\vpjdp.exe52⤵
- Executes dropped EXE
PID:2988 -
\??\c:\7jvpj.exec:\7jvpj.exe53⤵
- Executes dropped EXE
PID:2372 -
\??\c:\fxfxxrx.exec:\fxfxxrx.exe54⤵
- Executes dropped EXE
PID:2796 -
\??\c:\rfllrrx.exec:\rfllrrx.exe55⤵
- Executes dropped EXE
PID:2948 -
\??\c:\nhbbtt.exec:\nhbbtt.exe56⤵
- Executes dropped EXE
PID:2640 -
\??\c:\tnttbb.exec:\tnttbb.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704 -
\??\c:\btnnbb.exec:\btnnbb.exe58⤵
- Executes dropped EXE
PID:2356 -
\??\c:\jddpd.exec:\jddpd.exe59⤵
- Executes dropped EXE
PID:3068 -
\??\c:\pdjjd.exec:\pdjjd.exe60⤵
- Executes dropped EXE
PID:2204 -
\??\c:\9rllllr.exec:\9rllllr.exe61⤵
- Executes dropped EXE
PID:1116 -
\??\c:\frflrrx.exec:\frflrrx.exe62⤵
- Executes dropped EXE
PID:332 -
\??\c:\nbnthn.exec:\nbnthn.exe63⤵
- Executes dropped EXE
PID:320 -
\??\c:\xrxxfll.exec:\xrxxfll.exe64⤵
- Executes dropped EXE
PID:960 -
\??\c:\nhttnn.exec:\nhttnn.exe65⤵
- Executes dropped EXE
PID:2448 -
\??\c:\vdddd.exec:\vdddd.exe66⤵PID:2616
-
\??\c:\rrrrrfr.exec:\rrrrrfr.exe67⤵PID:640
-
\??\c:\ttbhhh.exec:\ttbhhh.exe68⤵PID:1932
-
\??\c:\9djjd.exec:\9djjd.exe69⤵PID:1032
-
\??\c:\vpdjp.exec:\vpdjp.exe70⤵PID:2900
-
\??\c:\ffxxllx.exec:\ffxxllx.exe71⤵PID:2124
-
\??\c:\7tnntn.exec:\7tnntn.exe72⤵PID:3004
-
\??\c:\bnbhtn.exec:\bnbhtn.exe73⤵PID:2080
-
\??\c:\pjpjp.exec:\pjpjp.exe74⤵PID:1904
-
\??\c:\vjvvv.exec:\vjvvv.exe75⤵PID:1380
-
\??\c:\rflfllr.exec:\rflfllr.exe76⤵PID:772
-
\??\c:\lrffxrr.exec:\lrffxrr.exe77⤵PID:1656
-
\??\c:\xxlflfl.exec:\xxlflfl.exe78⤵PID:1664
-
\??\c:\nbhbhn.exec:\nbhbhn.exe79⤵PID:1240
-
\??\c:\9httbt.exec:\9httbt.exe80⤵PID:2688
-
\??\c:\dpvjj.exec:\dpvjj.exe81⤵PID:1800
-
\??\c:\5rxxfrf.exec:\5rxxfrf.exe82⤵PID:328
-
\??\c:\flxxxrx.exec:\flxxxrx.exe83⤵PID:1740
-
\??\c:\hbhhhn.exec:\hbhhhn.exe84⤵PID:856
-
\??\c:\3ntntn.exec:\3ntntn.exe85⤵PID:3044
-
\??\c:\5hnnnn.exec:\5hnnnn.exe86⤵PID:1688
-
\??\c:\vppvd.exec:\vppvd.exe87⤵PID:2316
-
\??\c:\pdjdv.exec:\pdjdv.exe88⤵PID:2196
-
\??\c:\9pvvp.exec:\9pvvp.exe89⤵PID:2240
-
\??\c:\fxfxffl.exec:\fxfxffl.exe90⤵PID:2396
-
\??\c:\ffllxxx.exec:\ffllxxx.exe91⤵PID:2148
-
\??\c:\btbttt.exec:\btbttt.exe92⤵PID:1016
-
\??\c:\1bhhhh.exec:\1bhhhh.exe93⤵PID:1624
-
\??\c:\tntttt.exec:\tntttt.exe94⤵PID:2108
-
\??\c:\dvvvv.exec:\dvvvv.exe95⤵PID:1752
-
\??\c:\xlxrrrx.exec:\xlxrrrx.exe96⤵PID:2548
-
\??\c:\tnnntb.exec:\tnnntb.exe97⤵PID:2136
-
\??\c:\dpvpv.exec:\dpvpv.exe98⤵PID:2428
-
\??\c:\jdvvd.exec:\jdvvd.exe99⤵PID:2160
-
\??\c:\vjjjd.exec:\vjjjd.exe100⤵
- System Location Discovery: System Language Discovery
PID:2296 -
\??\c:\frflrrr.exec:\frflrrr.exe101⤵PID:2996
-
\??\c:\hnnhnh.exec:\hnnhnh.exe102⤵PID:2788
-
\??\c:\dpddd.exec:\dpddd.exe103⤵PID:2780
-
\??\c:\vjppj.exec:\vjppj.exe104⤵PID:2764
-
\??\c:\rxlrxrr.exec:\rxlrxrr.exe105⤵PID:2804
-
\??\c:\7xfxxxf.exec:\7xfxxxf.exe106⤵PID:2628
-
\??\c:\bhhttt.exec:\bhhttt.exe107⤵PID:2708
-
\??\c:\3htbtn.exec:\3htbtn.exe108⤵PID:2680
-
\??\c:\7vdpv.exec:\7vdpv.exe109⤵PID:3056
-
\??\c:\9lrrlxf.exec:\9lrrlxf.exe110⤵PID:476
-
\??\c:\3frrfff.exec:\3frrfff.exe111⤵PID:1228
-
\??\c:\7bttbn.exec:\7bttbn.exe112⤵PID:2872
-
\??\c:\tntthb.exec:\tntthb.exe113⤵PID:1912
-
\??\c:\jvddj.exec:\jvddj.exe114⤵
- System Location Discovery: System Language Discovery
PID:1100 -
\??\c:\pdjdj.exec:\pdjdj.exe115⤵PID:2012
-
\??\c:\lxlffff.exec:\lxlffff.exe116⤵PID:2700
-
\??\c:\fxfrfxx.exec:\fxfrfxx.exe117⤵PID:852
-
\??\c:\7nnttn.exec:\7nnttn.exe118⤵
- System Location Discovery: System Language Discovery
PID:1264 -
\??\c:\tnnnhb.exec:\tnnnhb.exe119⤵PID:1880
-
\??\c:\hhnnhb.exec:\hhnnhb.exe120⤵PID:2960
-
\??\c:\5ttttt.exec:\5ttttt.exe121⤵PID:2064
-
\??\c:\1jpjp.exec:\1jpjp.exe122⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-