Analysis
-
max time kernel
44s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe
Resource
win7-20240708-en
General
-
Target
3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe
-
Size
73KB
-
MD5
208bccfc8c1671f8e857f1613328a50d
-
SHA1
6afcd01ec35c02c3e8e06f55df468ecc317b3f71
-
SHA256
3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c
-
SHA512
bde56cb4ce28ff67318e98089480409dec3224e1c8510176ef30f49eccc61edc047dac6d00e4a01fded7faf8e9570e0356d35d02e1114073c710436456d9eb20
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIuyldHinxpifW6WLT65wl:ymb3NkkiQ3mdBjFIuyldH+keL+a
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2804-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2868-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/772-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2988-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1212-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/652-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/840-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1164-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1296-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1216-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1348-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/568-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2680 pjdjp.exe 2916 rlfllrf.exe 2804 bbnhht.exe 2868 fflrllf.exe 2664 dpdjv.exe 2624 hhhthb.exe 2996 ntbbhn.exe 772 lrxxrrx.exe 652 jvjvj.exe 2988 bnnhnn.exe 2392 llxfxff.exe 1212 pdvdp.exe 840 9nhhbh.exe 2308 llfxlxf.exe 1872 1vjjj.exe 2532 vpddd.exe 1984 lrxxxxl.exe 1164 htnnth.exe 1296 fffxxrr.exe 1216 rxxxxrr.exe 604 pjvvj.exe 3004 hbhtbt.exe 1932 9lxlxlr.exe 856 1tnbnn.exe 1552 hhbthb.exe 1348 xrffxll.exe 2636 jvpdv.exe 2888 bnbbbt.exe 568 hntnnn.exe 2388 rlfllfx.exe 884 pdvpv.exe 2656 pjvjd.exe 2660 hhhhbn.exe 2752 lrrflff.exe 2768 9xxrlff.exe 2572 3ttnht.exe 3024 vpppv.exe 1712 hthhnt.exe 2000 fllffxx.exe 2616 lrrrrll.exe 2156 dpvpp.exe 320 hnbtbn.exe 536 xflffxx.exe 772 ntthhb.exe 2840 pvvvv.exe 652 bhhbtn.exe 2456 dpvjv.exe 2536 7rxxlxf.exe 2760 3ddjp.exe 2316 lrxxfff.exe 840 ppddp.exe 2500 xffxffx.exe 2216 1bhtbb.exe 2104 dvdpj.exe 1984 hnbbnt.exe 2184 3jpjv.exe 2036 lrxrlxf.exe 1104 bnhhhh.exe 2828 xlrlrrx.exe 604 jvddp.exe 704 bbtttn.exe 836 xxrfrxl.exe 2232 htttth.exe 1876 rfxfrrl.exe -
resource yara_rule behavioral1/memory/2804-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/772-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1212-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/652-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/840-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1164-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1296-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1216-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1348-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/568-280-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffllrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllrxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfxfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xlxfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrlrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxllllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxffxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlxrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxfflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lllxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ttnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbbh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2680 3052 3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe 30 PID 3052 wrote to memory of 2680 3052 3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe 30 PID 3052 wrote to memory of 2680 3052 3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe 30 PID 3052 wrote to memory of 2680 3052 3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe 30 PID 2680 wrote to memory of 2916 2680 pjdjp.exe 31 PID 2680 wrote to memory of 2916 2680 pjdjp.exe 31 PID 2680 wrote to memory of 2916 2680 pjdjp.exe 31 PID 2680 wrote to memory of 2916 2680 pjdjp.exe 31 PID 2916 wrote to memory of 2804 2916 rlfllrf.exe 32 PID 2916 wrote to memory of 2804 2916 rlfllrf.exe 32 PID 2916 wrote to memory of 2804 2916 rlfllrf.exe 32 PID 2916 wrote to memory of 2804 2916 rlfllrf.exe 32 PID 2804 wrote to memory of 2868 2804 bbnhht.exe 33 PID 2804 wrote to memory of 2868 2804 bbnhht.exe 33 PID 2804 wrote to memory of 2868 2804 bbnhht.exe 33 PID 2804 wrote to memory of 2868 2804 bbnhht.exe 33 PID 2868 wrote to memory of 2664 2868 fflrllf.exe 34 PID 2868 wrote to memory of 2664 2868 fflrllf.exe 34 PID 2868 wrote to memory of 2664 2868 fflrllf.exe 34 PID 2868 wrote to memory of 2664 2868 fflrllf.exe 34 PID 2664 wrote to memory of 2624 2664 dpdjv.exe 35 PID 2664 wrote to memory of 2624 2664 dpdjv.exe 35 PID 2664 wrote to memory of 2624 2664 dpdjv.exe 35 PID 2664 wrote to memory of 2624 2664 dpdjv.exe 35 PID 2624 wrote to memory of 2996 2624 hhhthb.exe 36 PID 2624 wrote to memory of 2996 2624 hhhthb.exe 36 PID 2624 wrote to memory of 2996 2624 hhhthb.exe 36 PID 2624 wrote to memory of 2996 2624 hhhthb.exe 36 PID 2996 wrote to memory of 772 2996 ntbbhn.exe 73 PID 2996 wrote to memory of 772 2996 ntbbhn.exe 73 PID 2996 wrote to memory of 772 2996 ntbbhn.exe 73 PID 2996 wrote to memory of 772 2996 ntbbhn.exe 73 PID 772 wrote to memory of 652 772 lrxxrrx.exe 75 PID 772 wrote to memory of 652 772 lrxxrrx.exe 75 PID 772 wrote to memory of 652 772 lrxxrrx.exe 75 PID 772 wrote to memory of 652 772 lrxxrrx.exe 75 PID 652 wrote to memory of 2988 652 jvjvj.exe 39 PID 652 wrote to memory of 2988 652 jvjvj.exe 39 PID 652 wrote to memory of 2988 652 jvjvj.exe 39 PID 652 wrote to memory of 2988 652 jvjvj.exe 39 PID 2988 wrote to memory of 2392 2988 bnnhnn.exe 40 PID 2988 wrote to memory of 2392 2988 bnnhnn.exe 40 PID 2988 wrote to memory of 2392 2988 bnnhnn.exe 40 PID 2988 wrote to memory of 2392 2988 bnnhnn.exe 40 PID 2392 wrote to memory of 1212 2392 llxfxff.exe 41 PID 2392 wrote to memory of 1212 2392 llxfxff.exe 41 PID 2392 wrote to memory of 1212 2392 llxfxff.exe 41 PID 2392 wrote to memory of 1212 2392 llxfxff.exe 41 PID 1212 wrote to memory of 840 1212 pdvdp.exe 80 PID 1212 wrote to memory of 840 1212 pdvdp.exe 80 PID 1212 wrote to memory of 840 1212 pdvdp.exe 80 PID 1212 wrote to memory of 840 1212 pdvdp.exe 80 PID 840 wrote to memory of 2308 840 9nhhbh.exe 43 PID 840 wrote to memory of 2308 840 9nhhbh.exe 43 PID 840 wrote to memory of 2308 840 9nhhbh.exe 43 PID 840 wrote to memory of 2308 840 9nhhbh.exe 43 PID 2308 wrote to memory of 1872 2308 llfxlxf.exe 44 PID 2308 wrote to memory of 1872 2308 llfxlxf.exe 44 PID 2308 wrote to memory of 1872 2308 llfxlxf.exe 44 PID 2308 wrote to memory of 1872 2308 llfxlxf.exe 44 PID 1872 wrote to memory of 2532 1872 1vjjj.exe 45 PID 1872 wrote to memory of 2532 1872 1vjjj.exe 45 PID 1872 wrote to memory of 2532 1872 1vjjj.exe 45 PID 1872 wrote to memory of 2532 1872 1vjjj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe"C:\Users\Admin\AppData\Local\Temp\3687404b7d85b5c8c5420084ba9ebbde873e9c68d4e855d219289bcb9ac06c6c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\pjdjp.exec:\pjdjp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\rlfllrf.exec:\rlfllrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\bbnhht.exec:\bbnhht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\fflrllf.exec:\fflrllf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\dpdjv.exec:\dpdjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\hhhthb.exec:\hhhthb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\ntbbhn.exec:\ntbbhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\lrxxrrx.exec:\lrxxrrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\jvjvj.exec:\jvjvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
\??\c:\bnnhnn.exec:\bnnhnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\llxfxff.exec:\llxfxff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\pdvdp.exec:\pdvdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\9nhhbh.exec:\9nhhbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\llfxlxf.exec:\llfxlxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\1vjjj.exec:\1vjjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\vpddd.exec:\vpddd.exe17⤵
- Executes dropped EXE
PID:2532 -
\??\c:\lrxxxxl.exec:\lrxxxxl.exe18⤵
- Executes dropped EXE
PID:1984 -
\??\c:\htnnth.exec:\htnnth.exe19⤵
- Executes dropped EXE
PID:1164 -
\??\c:\fffxxrr.exec:\fffxxrr.exe20⤵
- Executes dropped EXE
PID:1296 -
\??\c:\rxxxxrr.exec:\rxxxxrr.exe21⤵
- Executes dropped EXE
PID:1216 -
\??\c:\pjvvj.exec:\pjvvj.exe22⤵
- Executes dropped EXE
PID:604 -
\??\c:\hbhtbt.exec:\hbhtbt.exe23⤵
- Executes dropped EXE
PID:3004 -
\??\c:\9lxlxlr.exec:\9lxlxlr.exe24⤵
- Executes dropped EXE
PID:1932 -
\??\c:\1tnbnn.exec:\1tnbnn.exe25⤵
- Executes dropped EXE
PID:856 -
\??\c:\hhbthb.exec:\hhbthb.exe26⤵
- Executes dropped EXE
PID:1552 -
\??\c:\xrffxll.exec:\xrffxll.exe27⤵
- Executes dropped EXE
PID:1348 -
\??\c:\jvpdv.exec:\jvpdv.exe28⤵
- Executes dropped EXE
PID:2636 -
\??\c:\bnbbbt.exec:\bnbbbt.exe29⤵
- Executes dropped EXE
PID:2888 -
\??\c:\hntnnn.exec:\hntnnn.exe30⤵
- Executes dropped EXE
PID:568 -
\??\c:\rlfllfx.exec:\rlfllfx.exe31⤵
- Executes dropped EXE
PID:2388 -
\??\c:\pdvpv.exec:\pdvpv.exe32⤵
- Executes dropped EXE
PID:884 -
\??\c:\pjvjd.exec:\pjvjd.exe33⤵
- Executes dropped EXE
PID:2656 -
\??\c:\hhhhbn.exec:\hhhhbn.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660 -
\??\c:\lrrflff.exec:\lrrflff.exe35⤵
- Executes dropped EXE
PID:2752 -
\??\c:\9xxrlff.exec:\9xxrlff.exe36⤵
- Executes dropped EXE
PID:2768 -
\??\c:\3ttnht.exec:\3ttnht.exe37⤵
- Executes dropped EXE
PID:2572 -
\??\c:\vpppv.exec:\vpppv.exe38⤵
- Executes dropped EXE
PID:3024 -
\??\c:\hthhnt.exec:\hthhnt.exe39⤵
- Executes dropped EXE
PID:1712 -
\??\c:\fllffxx.exec:\fllffxx.exe40⤵
- Executes dropped EXE
PID:2000 -
\??\c:\lrrrrll.exec:\lrrrrll.exe41⤵
- Executes dropped EXE
PID:2616 -
\??\c:\dpvpp.exec:\dpvpp.exe42⤵
- Executes dropped EXE
PID:2156 -
\??\c:\hnbtbn.exec:\hnbtbn.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:320 -
\??\c:\xflffxx.exec:\xflffxx.exe44⤵
- Executes dropped EXE
PID:536 -
\??\c:\ntthhb.exec:\ntthhb.exe45⤵
- Executes dropped EXE
PID:772 -
\??\c:\pvvvv.exec:\pvvvv.exe46⤵
- Executes dropped EXE
PID:2840 -
\??\c:\bhhbtn.exec:\bhhbtn.exe47⤵
- Executes dropped EXE
PID:652 -
\??\c:\dpvjv.exec:\dpvjv.exe48⤵
- Executes dropped EXE
PID:2456 -
\??\c:\7rxxlxf.exec:\7rxxlxf.exe49⤵
- Executes dropped EXE
PID:2536 -
\??\c:\3ddjp.exec:\3ddjp.exe50⤵
- Executes dropped EXE
PID:2760 -
\??\c:\lrxxfff.exec:\lrxxfff.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316 -
\??\c:\ppddp.exec:\ppddp.exe52⤵
- Executes dropped EXE
PID:840 -
\??\c:\xffxffx.exec:\xffxffx.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2500 -
\??\c:\1bhtbb.exec:\1bhtbb.exe54⤵
- Executes dropped EXE
PID:2216 -
\??\c:\dvdpj.exec:\dvdpj.exe55⤵
- Executes dropped EXE
PID:2104 -
\??\c:\hnbbnt.exec:\hnbbnt.exe56⤵
- Executes dropped EXE
PID:1984 -
\??\c:\3jpjv.exec:\3jpjv.exe57⤵
- Executes dropped EXE
PID:2184 -
\??\c:\lrxrlxf.exec:\lrxrlxf.exe58⤵
- Executes dropped EXE
PID:2036 -
\??\c:\bnhhhh.exec:\bnhhhh.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104 -
\??\c:\xlrlrrx.exec:\xlrlrrx.exe60⤵
- Executes dropped EXE
PID:2828 -
\??\c:\jvddp.exec:\jvddp.exe61⤵
- Executes dropped EXE
PID:604 -
\??\c:\bbtttn.exec:\bbtttn.exe62⤵
- Executes dropped EXE
PID:704 -
\??\c:\xxrfrxl.exec:\xxrfrxl.exe63⤵
- Executes dropped EXE
PID:836 -
\??\c:\htttth.exec:\htttth.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
\??\c:\rfxfrrl.exec:\rfxfrrl.exe65⤵
- Executes dropped EXE
PID:1876 -
\??\c:\btnttt.exec:\btnttt.exe66⤵PID:1972
-
\??\c:\7lffflf.exec:\7lffflf.exe67⤵PID:952
-
\??\c:\bbbhtb.exec:\bbbhtb.exe68⤵PID:3020
-
\??\c:\tbnhht.exec:\tbnhht.exe69⤵PID:2208
-
\??\c:\jjdpd.exec:\jjdpd.exe70⤵PID:2108
-
\??\c:\bbnthh.exec:\bbnthh.exe71⤵PID:2312
-
\??\c:\jdvvd.exec:\jdvvd.exe72⤵PID:2488
-
\??\c:\7xrffll.exec:\7xrffll.exe73⤵PID:2412
-
\??\c:\httbhh.exec:\httbhh.exe74⤵PID:2916
-
\??\c:\9llrflx.exec:\9llrflx.exe75⤵PID:2692
-
\??\c:\vvpjv.exec:\vvpjv.exe76⤵PID:2788
-
\??\c:\xlrrrrx.exec:\xlrrrrx.exe77⤵PID:2728
-
\??\c:\1jjdj.exec:\1jjdj.exe78⤵PID:2792
-
\??\c:\jddvv.exec:\jddvv.exe79⤵PID:1596
-
\??\c:\vjppv.exec:\vjppv.exe80⤵PID:1712
-
\??\c:\3hbtnb.exec:\3hbtnb.exe81⤵PID:2608
-
\??\c:\rrrllll.exec:\rrrllll.exe82⤵PID:2984
-
\??\c:\bhtnbh.exec:\bhtnbh.exe83⤵PID:2616
-
\??\c:\9ffxxlr.exec:\9ffxxlr.exe84⤵PID:2996
-
\??\c:\nhttbb.exec:\nhttbb.exe85⤵PID:2852
-
\??\c:\ttnbnb.exec:\ttnbnb.exe86⤵PID:1496
-
\??\c:\9pvpj.exec:\9pvpj.exe87⤵PID:2972
-
\??\c:\vdddp.exec:\vdddp.exe88⤵PID:2004
-
\??\c:\bhhhtt.exec:\bhhhtt.exe89⤵PID:2264
-
\??\c:\jpvjj.exec:\jpvjj.exe90⤵PID:376
-
\??\c:\tttbnb.exec:\tttbnb.exe91⤵PID:1640
-
\??\c:\jppjj.exec:\jppjj.exe92⤵
- System Location Discovery: System Language Discovery
PID:2620 -
\??\c:\bthhtb.exec:\bthhtb.exe93⤵PID:1660
-
\??\c:\pdjjv.exec:\pdjjv.exe94⤵PID:2528
-
\??\c:\frrlrfx.exec:\frrlrfx.exe95⤵PID:2132
-
\??\c:\bbhhnb.exec:\bbhhnb.exe96⤵PID:2140
-
\??\c:\xffrlxf.exec:\xffrlxf.exe97⤵PID:2236
-
\??\c:\nttnnt.exec:\nttnnt.exe98⤵PID:2936
-
\??\c:\rlxfrll.exec:\rlxfrll.exe99⤵
- System Location Discovery: System Language Discovery
PID:1052 -
\??\c:\vpjpp.exec:\vpjpp.exe100⤵PID:408
-
\??\c:\rfxxllx.exec:\rfxxllx.exe101⤵PID:2948
-
\??\c:\lrxrxxr.exec:\lrxrxxr.exe102⤵PID:2864
-
\??\c:\bhbbhb.exec:\bhbbhb.exe103⤵PID:1780
-
\??\c:\vdddj.exec:\vdddj.exe104⤵PID:2400
-
\??\c:\rxxxxxx.exec:\rxxxxxx.exe105⤵PID:1536
-
\??\c:\jpdvd.exec:\jpdvd.exe106⤵PID:1968
-
\??\c:\fffrlxr.exec:\fffrlxr.exe107⤵PID:908
-
\??\c:\dvpdp.exec:\dvpdp.exe108⤵PID:1976
-
\??\c:\lxxlllr.exec:\lxxlllr.exe109⤵PID:2196
-
\??\c:\tnnbnh.exec:\tnnbnh.exe110⤵PID:1740
-
\??\c:\jdjvd.exec:\jdjvd.exe111⤵PID:2436
-
\??\c:\rllrrll.exec:\rllrrll.exe112⤵PID:2440
-
\??\c:\thnnnh.exec:\thnnnh.exe113⤵PID:3064
-
\??\c:\rlfxllx.exec:\rlfxllx.exe114⤵PID:2708
-
\??\c:\bnnbth.exec:\bnnbth.exe115⤵
- System Location Discovery: System Language Discovery
PID:2808 -
\??\c:\djjpv.exec:\djjpv.exe116⤵PID:2776
-
\??\c:\3hbbbt.exec:\3hbbbt.exe117⤵PID:2752
-
\??\c:\dpvdd.exec:\dpvdd.exe118⤵PID:2684
-
\??\c:\ppjvd.exec:\ppjvd.exe119⤵
- System Location Discovery: System Language Discovery
PID:2604 -
\??\c:\lxlrffl.exec:\lxlrffl.exe120⤵PID:1600
-
\??\c:\ththbh.exec:\ththbh.exe121⤵PID:2544
-
\??\c:\jvjvj.exec:\jvjvj.exe122⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-