Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 22:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe
Resource
win7-20240729-en
windows7-x64
6 signatures
150 seconds
General
-
Target
3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe
-
Size
250KB
-
MD5
b9565267b2735db164191e6b0a149fbd
-
SHA1
d71184b326c3b5fdd6526a258d5304653b62577d
-
SHA256
3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521
-
SHA512
3da5edff109b1491baf701360d9536d4d930febe20fc1225ea0dda5757c4c1d201908c91adc3f9e02d490a1ed9e930e6b4731f8e71d0e23cefe6b3e0667f2bff
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4MAWvGjR1oa:n3C9BRo7MlrWKo+lxtvGt1oa
Malware Config
Signatures
-
Detect Blackmoon payload 18 IoCs
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2312-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1032-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2308-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2656-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2312 ppdvj.exe 2192 7fxxlrr.exe 2812 jjdvd.exe 2720 rrrffxl.exe 2624 ttnhnb.exe 2724 jpjpj.exe 2584 1pppj.exe 2276 xxlrlxx.exe 1124 9tbhtn.exe 1032 hbtntb.exe 2308 lrrfrrl.exe 2516 7btthh.exe 776 tttbnh.exe 2656 jpjvj.exe 2688 7ffxlxl.exe 3028 3xllrfl.exe 2388 bbnbnb.exe 1684 btthnn.exe 1460 vppjd.exe 2976 rlflxrl.exe 2216 bbthnt.exe 2208 1jjjj.exe 3036 frrxlfl.exe 2464 5xflxlx.exe 264 tbhtnb.exe 1872 bttbtt.exe 772 5jvvd.exe 852 xrfffrx.exe 3008 5nnnnn.exe 860 ddjdd.exe 2328 rfxfxrx.exe 788 1bnhnn.exe 1564 nhthnt.exe 2824 pvvjj.exe 2864 llllxxf.exe 2956 xrlrlrf.exe 2780 1htbnn.exe 1748 httbhb.exe 2588 dpvvj.exe 2664 dpjjv.exe 3056 9xxlflf.exe 620 bbtbtt.exe 1792 nhbhbb.exe 2104 dvppv.exe 2640 dpjjj.exe 2440 jdpvp.exe 3064 xrxxrrx.exe 2296 fxrxllx.exe 2916 7bnnnn.exe 2136 nhhbnt.exe 2100 vvddj.exe 1852 pvdpv.exe 2984 1fxxlrx.exe 2432 btnbhh.exe 2176 7xrlrrf.exe 3016 ffxxrrl.exe 2252 1vpdp.exe 2232 rlfxfxl.exe 1840 9lxxlfx.exe 1692 bhthhn.exe 888 9jdjp.exe 1980 xxfrxlr.exe 600 vdjvj.exe 2468 pppjd.exe -
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2276-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3008-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-136-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflrflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlxlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xrlxll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2312 2532 3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe 29 PID 2532 wrote to memory of 2312 2532 3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe 29 PID 2532 wrote to memory of 2312 2532 3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe 29 PID 2532 wrote to memory of 2312 2532 3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe 29 PID 2312 wrote to memory of 2192 2312 ppdvj.exe 30 PID 2312 wrote to memory of 2192 2312 ppdvj.exe 30 PID 2312 wrote to memory of 2192 2312 ppdvj.exe 30 PID 2312 wrote to memory of 2192 2312 ppdvj.exe 30 PID 2192 wrote to memory of 2812 2192 7fxxlrr.exe 31 PID 2192 wrote to memory of 2812 2192 7fxxlrr.exe 31 PID 2192 wrote to memory of 2812 2192 7fxxlrr.exe 31 PID 2192 wrote to memory of 2812 2192 7fxxlrr.exe 31 PID 2812 wrote to memory of 2720 2812 jjdvd.exe 32 PID 2812 wrote to memory of 2720 2812 jjdvd.exe 32 PID 2812 wrote to memory of 2720 2812 jjdvd.exe 32 PID 2812 wrote to memory of 2720 2812 jjdvd.exe 32 PID 2720 wrote to memory of 2624 2720 rrrffxl.exe 33 PID 2720 wrote to memory of 2624 2720 rrrffxl.exe 33 PID 2720 wrote to memory of 2624 2720 rrrffxl.exe 33 PID 2720 wrote to memory of 2624 2720 rrrffxl.exe 33 PID 2624 wrote to memory of 2724 2624 ttnhnb.exe 34 PID 2624 wrote to memory of 2724 2624 ttnhnb.exe 34 PID 2624 wrote to memory of 2724 2624 ttnhnb.exe 34 PID 2624 wrote to memory of 2724 2624 ttnhnb.exe 34 PID 2724 wrote to memory of 2584 2724 jpjpj.exe 35 PID 2724 wrote to memory of 2584 2724 jpjpj.exe 35 PID 2724 wrote to memory of 2584 2724 jpjpj.exe 35 PID 2724 wrote to memory of 2584 2724 jpjpj.exe 35 PID 2584 wrote to memory of 2276 2584 1pppj.exe 36 PID 2584 wrote to memory of 2276 2584 1pppj.exe 36 PID 2584 wrote to memory of 2276 2584 1pppj.exe 36 PID 2584 wrote to memory of 2276 2584 1pppj.exe 36 PID 2276 wrote to memory of 1124 2276 xxlrlxx.exe 37 PID 2276 wrote to memory of 1124 2276 xxlrlxx.exe 37 PID 2276 wrote to memory of 1124 2276 xxlrlxx.exe 37 PID 2276 wrote to memory of 1124 2276 xxlrlxx.exe 37 PID 1124 wrote to memory of 1032 1124 9tbhtn.exe 38 PID 1124 wrote to memory of 1032 1124 9tbhtn.exe 38 PID 1124 wrote to memory of 1032 1124 9tbhtn.exe 38 PID 1124 wrote to memory of 1032 1124 9tbhtn.exe 38 PID 1032 wrote to memory of 2308 1032 hbtntb.exe 39 PID 1032 wrote to memory of 2308 1032 hbtntb.exe 39 PID 1032 wrote to memory of 2308 1032 hbtntb.exe 39 PID 1032 wrote to memory of 2308 1032 hbtntb.exe 39 PID 2308 wrote to memory of 2516 2308 lrrfrrl.exe 40 PID 2308 wrote to memory of 2516 2308 lrrfrrl.exe 40 PID 2308 wrote to memory of 2516 2308 lrrfrrl.exe 40 PID 2308 wrote to memory of 2516 2308 lrrfrrl.exe 40 PID 2516 wrote to memory of 776 2516 7btthh.exe 41 PID 2516 wrote to memory of 776 2516 7btthh.exe 41 PID 2516 wrote to memory of 776 2516 7btthh.exe 41 PID 2516 wrote to memory of 776 2516 7btthh.exe 41 PID 776 wrote to memory of 2656 776 tttbnh.exe 42 PID 776 wrote to memory of 2656 776 tttbnh.exe 42 PID 776 wrote to memory of 2656 776 tttbnh.exe 42 PID 776 wrote to memory of 2656 776 tttbnh.exe 42 PID 2656 wrote to memory of 2688 2656 jpjvj.exe 43 PID 2656 wrote to memory of 2688 2656 jpjvj.exe 43 PID 2656 wrote to memory of 2688 2656 jpjvj.exe 43 PID 2656 wrote to memory of 2688 2656 jpjvj.exe 43 PID 2688 wrote to memory of 3028 2688 7ffxlxl.exe 44 PID 2688 wrote to memory of 3028 2688 7ffxlxl.exe 44 PID 2688 wrote to memory of 3028 2688 7ffxlxl.exe 44 PID 2688 wrote to memory of 3028 2688 7ffxlxl.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe"C:\Users\Admin\AppData\Local\Temp\3fb075a131556c630300dbbe12b9352fba3640759d37f9ced4b7738aeea18521.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\ppdvj.exec:\ppdvj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\7fxxlrr.exec:\7fxxlrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\jjdvd.exec:\jjdvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\rrrffxl.exec:\rrrffxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\ttnhnb.exec:\ttnhnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\jpjpj.exec:\jpjpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\1pppj.exec:\1pppj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\xxlrlxx.exec:\xxlrlxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\9tbhtn.exec:\9tbhtn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\hbtntb.exec:\hbtntb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\lrrfrrl.exec:\lrrfrrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\7btthh.exec:\7btthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\tttbnh.exec:\tttbnh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\jpjvj.exec:\jpjvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\7ffxlxl.exec:\7ffxlxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\3xllrfl.exec:\3xllrfl.exe17⤵
- Executes dropped EXE
PID:3028 -
\??\c:\bbnbnb.exec:\bbnbnb.exe18⤵
- Executes dropped EXE
PID:2388 -
\??\c:\btthnn.exec:\btthnn.exe19⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vppjd.exec:\vppjd.exe20⤵
- Executes dropped EXE
PID:1460 -
\??\c:\rlflxrl.exec:\rlflxrl.exe21⤵
- Executes dropped EXE
PID:2976 -
\??\c:\bbthnt.exec:\bbthnt.exe22⤵
- Executes dropped EXE
PID:2216 -
\??\c:\1jjjj.exec:\1jjjj.exe23⤵
- Executes dropped EXE
PID:2208 -
\??\c:\frrxlfl.exec:\frrxlfl.exe24⤵
- Executes dropped EXE
PID:3036 -
\??\c:\5xflxlx.exec:\5xflxlx.exe25⤵
- Executes dropped EXE
PID:2464 -
\??\c:\tbhtnb.exec:\tbhtnb.exe26⤵
- Executes dropped EXE
PID:264 -
\??\c:\bttbtt.exec:\bttbtt.exe27⤵
- Executes dropped EXE
PID:1872 -
\??\c:\5jvvd.exec:\5jvvd.exe28⤵
- Executes dropped EXE
PID:772 -
\??\c:\xrfffrx.exec:\xrfffrx.exe29⤵
- Executes dropped EXE
PID:852 -
\??\c:\5nnnnn.exec:\5nnnnn.exe30⤵
- Executes dropped EXE
PID:3008 -
\??\c:\ddjdd.exec:\ddjdd.exe31⤵
- Executes dropped EXE
PID:860 -
\??\c:\rfxfxrx.exec:\rfxfxrx.exe32⤵
- Executes dropped EXE
PID:2328 -
\??\c:\1bnhnn.exec:\1bnhnn.exe33⤵
- Executes dropped EXE
PID:788 -
\??\c:\nhthnt.exec:\nhthnt.exe34⤵
- Executes dropped EXE
PID:1564 -
\??\c:\pvvjj.exec:\pvvjj.exe35⤵
- Executes dropped EXE
PID:2824 -
\??\c:\llllxxf.exec:\llllxxf.exe36⤵
- Executes dropped EXE
PID:2864 -
\??\c:\xrlrlrf.exec:\xrlrlrf.exe37⤵
- Executes dropped EXE
PID:2956 -
\??\c:\1htbnn.exec:\1htbnn.exe38⤵
- Executes dropped EXE
PID:2780 -
\??\c:\httbhb.exec:\httbhb.exe39⤵
- Executes dropped EXE
PID:1748 -
\??\c:\dpvvj.exec:\dpvvj.exe40⤵
- Executes dropped EXE
PID:2588 -
\??\c:\dpjjv.exec:\dpjjv.exe41⤵
- Executes dropped EXE
PID:2664 -
\??\c:\9xxlflf.exec:\9xxlflf.exe42⤵
- Executes dropped EXE
PID:3056 -
\??\c:\bbtbtt.exec:\bbtbtt.exe43⤵
- Executes dropped EXE
PID:620 -
\??\c:\nhbhbb.exec:\nhbhbb.exe44⤵
- Executes dropped EXE
PID:1792 -
\??\c:\dvppv.exec:\dvppv.exe45⤵
- Executes dropped EXE
PID:2104 -
\??\c:\dpjjj.exec:\dpjjj.exe46⤵
- Executes dropped EXE
PID:2640 -
\??\c:\jdpvp.exec:\jdpvp.exe47⤵
- Executes dropped EXE
PID:2440 -
\??\c:\xrxxrrx.exec:\xrxxrrx.exe48⤵
- Executes dropped EXE
PID:3064 -
\??\c:\fxrxllx.exec:\fxrxllx.exe49⤵
- Executes dropped EXE
PID:2296 -
\??\c:\7bnnnn.exec:\7bnnnn.exe50⤵
- Executes dropped EXE
PID:2916 -
\??\c:\nhhbnt.exec:\nhhbnt.exe51⤵
- Executes dropped EXE
PID:2136 -
\??\c:\vvddj.exec:\vvddj.exe52⤵
- Executes dropped EXE
PID:2100 -
\??\c:\pvdpv.exec:\pvdpv.exe53⤵
- Executes dropped EXE
PID:1852 -
\??\c:\1fxxlrx.exec:\1fxxlrx.exe54⤵
- Executes dropped EXE
PID:2984 -
\??\c:\btnbhh.exec:\btnbhh.exe55⤵
- Executes dropped EXE
PID:2432 -
\??\c:\7xrlrrf.exec:\7xrlrrf.exe56⤵
- Executes dropped EXE
PID:2176 -
\??\c:\ffxxrrl.exec:\ffxxrrl.exe57⤵
- Executes dropped EXE
PID:3016 -
\??\c:\1vpdp.exec:\1vpdp.exe58⤵
- Executes dropped EXE
PID:2252 -
\??\c:\rlfxfxl.exec:\rlfxfxl.exe59⤵
- Executes dropped EXE
PID:2232 -
\??\c:\9lxxlfx.exec:\9lxxlfx.exe60⤵
- Executes dropped EXE
PID:1840 -
\??\c:\bhthhn.exec:\bhthhn.exe61⤵
- Executes dropped EXE
PID:1692 -
\??\c:\9jdjp.exec:\9jdjp.exe62⤵
- Executes dropped EXE
PID:888 -
\??\c:\xxfrxlr.exec:\xxfrxlr.exe63⤵
- Executes dropped EXE
PID:1980 -
\??\c:\vdjvj.exec:\vdjvj.exe64⤵
- Executes dropped EXE
PID:600 -
\??\c:\pppjd.exec:\pppjd.exe65⤵
- Executes dropped EXE
PID:2468 -
\??\c:\rlflllx.exec:\rlflllx.exe66⤵PID:492
-
\??\c:\ttbnbh.exec:\ttbnbh.exe67⤵PID:2168
-
\??\c:\fxrlrlr.exec:\fxrlrlr.exe68⤵PID:2268
-
\??\c:\tnbnth.exec:\tnbnth.exe69⤵PID:2528
-
\??\c:\dpvjv.exec:\dpvjv.exe70⤵PID:904
-
\??\c:\5tnbnt.exec:\5tnbnt.exe71⤵PID:2184
-
\??\c:\bhbnhh.exec:\bhbnhh.exe72⤵PID:788
-
\??\c:\jjdpd.exec:\jjdpd.exe73⤵PID:1584
-
\??\c:\3pjpd.exec:\3pjpd.exe74⤵PID:2712
-
\??\c:\xrrxlrr.exec:\xrrxlrr.exe75⤵PID:2212
-
\??\c:\xlxrxxl.exec:\xlxrxxl.exe76⤵PID:2596
-
\??\c:\hhbbht.exec:\hhbbht.exe77⤵PID:2616
-
\??\c:\bttbhn.exec:\bttbhn.exe78⤵PID:408
-
\??\c:\jjdvv.exec:\jjdvv.exe79⤵PID:2608
-
\??\c:\rrxrfrl.exec:\rrxrfrl.exe80⤵PID:2704
-
\??\c:\lllxrxl.exec:\lllxrxl.exe81⤵PID:2428
-
\??\c:\ttnhtn.exec:\ttnhtn.exe82⤵
- System Location Discovery: System Language Discovery
PID:1820 -
\??\c:\vvvpj.exec:\vvvpj.exe83⤵PID:2436
-
\??\c:\dddpd.exec:\dddpd.exe84⤵PID:2352
-
\??\c:\rlfxlxl.exec:\rlfxlxl.exe85⤵PID:2944
-
\??\c:\1fxlfxl.exec:\1fxlfxl.exe86⤵PID:1812
-
\??\c:\bhbnnh.exec:\bhbnnh.exe87⤵PID:1388
-
\??\c:\jjddp.exec:\jjddp.exe88⤵PID:2576
-
\??\c:\xrlxrff.exec:\xrlxrff.exe89⤵PID:268
-
\??\c:\fflflxl.exec:\fflflxl.exe90⤵PID:1496
-
\??\c:\5nhthb.exec:\5nhthb.exe91⤵PID:2072
-
\??\c:\1jvpv.exec:\1jvpv.exe92⤵PID:1132
-
\??\c:\pvvjj.exec:\pvvjj.exe93⤵PID:1216
-
\??\c:\fxxllll.exec:\fxxllll.exe94⤵PID:988
-
\??\c:\nhhtnh.exec:\nhhtnh.exe95⤵PID:2068
-
\??\c:\nnnnnt.exec:\nnnnnt.exe96⤵PID:2236
-
\??\c:\vdvvd.exec:\vdvvd.exe97⤵PID:2648
-
\??\c:\llfxrxl.exec:\llfxrxl.exe98⤵PID:1416
-
\??\c:\xfflffx.exec:\xfflffx.exe99⤵PID:2208
-
\??\c:\tthtnn.exec:\tthtnn.exe100⤵PID:1544
-
\??\c:\nbhbtt.exec:\nbhbtt.exe101⤵PID:2284
-
\??\c:\pdjjv.exec:\pdjjv.exe102⤵PID:1640
-
\??\c:\vpjvj.exec:\vpjvj.exe103⤵PID:2968
-
\??\c:\lllrlrx.exec:\lllrlrx.exe104⤵PID:1872
-
\??\c:\bbnbbn.exec:\bbnbbn.exe105⤵PID:2092
-
\??\c:\hhbhth.exec:\hhbhth.exe106⤵PID:852
-
\??\c:\vpvpv.exec:\vpvpv.exe107⤵PID:1516
-
\??\c:\jjpvj.exec:\jjpvj.exe108⤵PID:2484
-
\??\c:\lrrrfrx.exec:\lrrrfrx.exe109⤵PID:908
-
\??\c:\bbbhth.exec:\bbbhth.exe110⤵PID:2156
-
\??\c:\dddvp.exec:\dddvp.exe111⤵PID:1712
-
\??\c:\9djjp.exec:\9djjp.exe112⤵PID:2188
-
\??\c:\lffxlrl.exec:\lffxlrl.exe113⤵PID:2852
-
\??\c:\xffrfff.exec:\xffrfff.exe114⤵PID:2820
-
\??\c:\3ttnbh.exec:\3ttnbh.exe115⤵PID:2676
-
\??\c:\jjjvj.exec:\jjjvj.exe116⤵PID:664
-
\??\c:\3ddjd.exec:\3ddjd.exe117⤵PID:2780
-
\??\c:\xxflffx.exec:\xxflffx.exe118⤵PID:2772
-
\??\c:\hthtbn.exec:\hthtbn.exe119⤵PID:2652
-
\??\c:\vvjvp.exec:\vvjvp.exe120⤵PID:2600
-
\??\c:\jjjpp.exec:\jjjpp.exe121⤵PID:3060
-
\??\c:\xxlrfrx.exec:\xxlrfrx.exe122⤵PID:2908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-