Analysis
-
max time kernel
120s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 01:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1664e44118fc4de20b92e2ef0369aea0N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
1664e44118fc4de20b92e2ef0369aea0N.exe
-
Size
64KB
-
MD5
1664e44118fc4de20b92e2ef0369aea0
-
SHA1
73ce4e425a322f483aca437eb22c9a23cbb6027a
-
SHA256
871d914e10373c9ad2b0c827d66a10621da58ef5ce451396ba026f6d6c011ce2
-
SHA512
6d81f84e505a686d39d26db75307155aa7b54d058108a418324bd148225d45979daf48deeef81833f514b3aadc3707ee4d103d0a7f73c8eb31ffed0092080775
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzkzNh:ymb3NkkiQ3mdBjFIvlph
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2080-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1856-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1856-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1316-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1708-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1512-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2324-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1072-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1808-275-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2080 3hnhhn.exe 1984 jdvdj.exe 1856 dddjj.exe 2852 xfrfflf.exe 2740 hthnbb.exe 2644 pjppj.exe 2800 ffxllxr.exe 2624 nnhhtb.exe 2332 ppvjd.exe 848 thtnbb.exe 1600 thtttt.exe 1316 pjdjp.exe 1708 7rlrxll.exe 1512 rlrxflx.exe 1700 nhtbnt.exe 1528 5vjvd.exe 2928 dvjvj.exe 2500 frfrxfl.exe 2324 7hbhnn.exe 264 jdppp.exe 2280 9rxlrrf.exe 2216 9fxflfr.exe 1052 tttbbt.exe 1072 ddpjj.exe 2044 vpdpd.exe 2024 fxlfffr.exe 3020 hbhntb.exe 1808 dvjvd.exe 2108 pjdjv.exe 2896 rlxlrxl.exe 2900 3hhnth.exe 568 3ddjv.exe 2880 7pjdd.exe 1588 1xxrxff.exe 2340 1nhtbh.exe 2808 9vvjd.exe 2836 3xxlxrf.exe 1940 htbbnn.exe 2620 9tttnb.exe 2800 5ppvv.exe 2292 9dpjp.exe 3060 frllrxx.exe 2332 nnbhnt.exe 2860 nnnttb.exe 2868 ddvdj.exe 1928 pvdpp.exe 1496 fxxfllx.exe 1568 9xrrxxl.exe 2784 3hhnth.exe 352 3nbbnb.exe 1844 vpvvd.exe 2908 rrrfffx.exe 1760 rrlflxl.exe 2252 7tnbhb.exe 2324 thnnhh.exe 788 dvvdj.exe 3000 dvjpp.exe 2000 lrfxffr.exe 1564 xrfrxfr.exe 1084 hbbnbn.exe 2272 djpdv.exe 1680 djvpv.exe 2352 7fxflrl.exe 2476 lffrrrx.exe -
resource yara_rule behavioral1/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2080-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1316-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1708-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2324-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1072-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1808-275-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-302-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxlxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3btntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rlrrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3djvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rlllrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2080 3032 1664e44118fc4de20b92e2ef0369aea0N.exe 31 PID 3032 wrote to memory of 2080 3032 1664e44118fc4de20b92e2ef0369aea0N.exe 31 PID 3032 wrote to memory of 2080 3032 1664e44118fc4de20b92e2ef0369aea0N.exe 31 PID 3032 wrote to memory of 2080 3032 1664e44118fc4de20b92e2ef0369aea0N.exe 31 PID 2080 wrote to memory of 1984 2080 3hnhhn.exe 32 PID 2080 wrote to memory of 1984 2080 3hnhhn.exe 32 PID 2080 wrote to memory of 1984 2080 3hnhhn.exe 32 PID 2080 wrote to memory of 1984 2080 3hnhhn.exe 32 PID 1984 wrote to memory of 1856 1984 jdvdj.exe 33 PID 1984 wrote to memory of 1856 1984 jdvdj.exe 33 PID 1984 wrote to memory of 1856 1984 jdvdj.exe 33 PID 1984 wrote to memory of 1856 1984 jdvdj.exe 33 PID 1856 wrote to memory of 2852 1856 dddjj.exe 34 PID 1856 wrote to memory of 2852 1856 dddjj.exe 34 PID 1856 wrote to memory of 2852 1856 dddjj.exe 34 PID 1856 wrote to memory of 2852 1856 dddjj.exe 34 PID 2852 wrote to memory of 2740 2852 xfrfflf.exe 35 PID 2852 wrote to memory of 2740 2852 xfrfflf.exe 35 PID 2852 wrote to memory of 2740 2852 xfrfflf.exe 35 PID 2852 wrote to memory of 2740 2852 xfrfflf.exe 35 PID 2740 wrote to memory of 2644 2740 hthnbb.exe 36 PID 2740 wrote to memory of 2644 2740 hthnbb.exe 36 PID 2740 wrote to memory of 2644 2740 hthnbb.exe 36 PID 2740 wrote to memory of 2644 2740 hthnbb.exe 36 PID 2644 wrote to memory of 2800 2644 pjppj.exe 37 PID 2644 wrote to memory of 2800 2644 pjppj.exe 37 PID 2644 wrote to memory of 2800 2644 pjppj.exe 37 PID 2644 wrote to memory of 2800 2644 pjppj.exe 37 PID 2800 wrote to memory of 2624 2800 ffxllxr.exe 38 PID 2800 wrote to memory of 2624 2800 ffxllxr.exe 38 PID 2800 wrote to memory of 2624 2800 ffxllxr.exe 38 PID 2800 wrote to memory of 2624 2800 ffxllxr.exe 38 PID 2624 wrote to memory of 2332 2624 nnhhtb.exe 39 PID 2624 wrote to memory of 2332 2624 nnhhtb.exe 39 PID 2624 wrote to memory of 2332 2624 nnhhtb.exe 39 PID 2624 wrote to memory of 2332 2624 nnhhtb.exe 39 PID 2332 wrote to memory of 848 2332 ppvjd.exe 40 PID 2332 wrote to memory of 848 2332 ppvjd.exe 40 PID 2332 wrote to memory of 848 2332 ppvjd.exe 40 PID 2332 wrote to memory of 848 2332 ppvjd.exe 40 PID 848 wrote to memory of 1600 848 thtnbb.exe 41 PID 848 wrote to memory of 1600 848 thtnbb.exe 41 PID 848 wrote to memory of 1600 848 thtnbb.exe 41 PID 848 wrote to memory of 1600 848 thtnbb.exe 41 PID 1600 wrote to memory of 1316 1600 thtttt.exe 42 PID 1600 wrote to memory of 1316 1600 thtttt.exe 42 PID 1600 wrote to memory of 1316 1600 thtttt.exe 42 PID 1600 wrote to memory of 1316 1600 thtttt.exe 42 PID 1316 wrote to memory of 1708 1316 pjdjp.exe 43 PID 1316 wrote to memory of 1708 1316 pjdjp.exe 43 PID 1316 wrote to memory of 1708 1316 pjdjp.exe 43 PID 1316 wrote to memory of 1708 1316 pjdjp.exe 43 PID 1708 wrote to memory of 1512 1708 7rlrxll.exe 44 PID 1708 wrote to memory of 1512 1708 7rlrxll.exe 44 PID 1708 wrote to memory of 1512 1708 7rlrxll.exe 44 PID 1708 wrote to memory of 1512 1708 7rlrxll.exe 44 PID 1512 wrote to memory of 1700 1512 rlrxflx.exe 45 PID 1512 wrote to memory of 1700 1512 rlrxflx.exe 45 PID 1512 wrote to memory of 1700 1512 rlrxflx.exe 45 PID 1512 wrote to memory of 1700 1512 rlrxflx.exe 45 PID 1700 wrote to memory of 1528 1700 nhtbnt.exe 46 PID 1700 wrote to memory of 1528 1700 nhtbnt.exe 46 PID 1700 wrote to memory of 1528 1700 nhtbnt.exe 46 PID 1700 wrote to memory of 1528 1700 nhtbnt.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\1664e44118fc4de20b92e2ef0369aea0N.exe"C:\Users\Admin\AppData\Local\Temp\1664e44118fc4de20b92e2ef0369aea0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\3hnhhn.exec:\3hnhhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\jdvdj.exec:\jdvdj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
\??\c:\dddjj.exec:\dddjj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\xfrfflf.exec:\xfrfflf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\hthnbb.exec:\hthnbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\pjppj.exec:\pjppj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\ffxllxr.exec:\ffxllxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\nnhhtb.exec:\nnhhtb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\ppvjd.exec:\ppvjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\thtnbb.exec:\thtnbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\thtttt.exec:\thtttt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\pjdjp.exec:\pjdjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
\??\c:\7rlrxll.exec:\7rlrxll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\rlrxflx.exec:\rlrxflx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\nhtbnt.exec:\nhtbnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\5vjvd.exec:\5vjvd.exe17⤵
- Executes dropped EXE
PID:1528 -
\??\c:\dvjvj.exec:\dvjvj.exe18⤵
- Executes dropped EXE
PID:2928 -
\??\c:\frfrxfl.exec:\frfrxfl.exe19⤵
- Executes dropped EXE
PID:2500 -
\??\c:\7hbhnn.exec:\7hbhnn.exe20⤵
- Executes dropped EXE
PID:2324 -
\??\c:\jdppp.exec:\jdppp.exe21⤵
- Executes dropped EXE
PID:264 -
\??\c:\9rxlrrf.exec:\9rxlrrf.exe22⤵
- Executes dropped EXE
PID:2280 -
\??\c:\9fxflfr.exec:\9fxflfr.exe23⤵
- Executes dropped EXE
PID:2216 -
\??\c:\tttbbt.exec:\tttbbt.exe24⤵
- Executes dropped EXE
PID:1052 -
\??\c:\ddpjj.exec:\ddpjj.exe25⤵
- Executes dropped EXE
PID:1072 -
\??\c:\vpdpd.exec:\vpdpd.exe26⤵
- Executes dropped EXE
PID:2044 -
\??\c:\fxlfffr.exec:\fxlfffr.exe27⤵
- Executes dropped EXE
PID:2024 -
\??\c:\hbhntb.exec:\hbhntb.exe28⤵
- Executes dropped EXE
PID:3020 -
\??\c:\dvjvd.exec:\dvjvd.exe29⤵
- Executes dropped EXE
PID:1808 -
\??\c:\pjdjv.exec:\pjdjv.exe30⤵
- Executes dropped EXE
PID:2108 -
\??\c:\rlxlrxl.exec:\rlxlrxl.exe31⤵
- Executes dropped EXE
PID:2896 -
\??\c:\3hhnth.exec:\3hhnth.exe32⤵
- Executes dropped EXE
PID:2900 -
\??\c:\3ddjv.exec:\3ddjv.exe33⤵
- Executes dropped EXE
PID:568 -
\??\c:\7pjdd.exec:\7pjdd.exe34⤵
- Executes dropped EXE
PID:2880 -
\??\c:\1xxrxff.exec:\1xxrxff.exe35⤵
- Executes dropped EXE
PID:1588 -
\??\c:\1nhtbh.exec:\1nhtbh.exe36⤵
- Executes dropped EXE
PID:2340 -
\??\c:\9vvjd.exec:\9vvjd.exe37⤵
- Executes dropped EXE
PID:2808 -
\??\c:\3xxlxrf.exec:\3xxlxrf.exe38⤵
- Executes dropped EXE
PID:2836 -
\??\c:\htbbnn.exec:\htbbnn.exe39⤵
- Executes dropped EXE
PID:1940 -
\??\c:\9tttnb.exec:\9tttnb.exe40⤵
- Executes dropped EXE
PID:2620 -
\??\c:\5ppvv.exec:\5ppvv.exe41⤵
- Executes dropped EXE
PID:2800 -
\??\c:\9dpjp.exec:\9dpjp.exe42⤵
- Executes dropped EXE
PID:2292 -
\??\c:\frllrxx.exec:\frllrxx.exe43⤵
- Executes dropped EXE
PID:3060 -
\??\c:\nnbhnt.exec:\nnbhnt.exe44⤵
- Executes dropped EXE
PID:2332 -
\??\c:\nnnttb.exec:\nnnttb.exe45⤵
- Executes dropped EXE
PID:2860 -
\??\c:\ddvdj.exec:\ddvdj.exe46⤵
- Executes dropped EXE
PID:2868 -
\??\c:\pvdpp.exec:\pvdpp.exe47⤵
- Executes dropped EXE
PID:1928 -
\??\c:\fxxfllx.exec:\fxxfllx.exe48⤵
- Executes dropped EXE
PID:1496 -
\??\c:\9xrrxxl.exec:\9xrrxxl.exe49⤵
- Executes dropped EXE
PID:1568 -
\??\c:\3hhnth.exec:\3hhnth.exe50⤵
- Executes dropped EXE
PID:2784 -
\??\c:\3nbbnb.exec:\3nbbnb.exe51⤵
- Executes dropped EXE
PID:352 -
\??\c:\vpvvd.exec:\vpvvd.exe52⤵
- Executes dropped EXE
PID:1844 -
\??\c:\rrrfffx.exec:\rrrfffx.exe53⤵
- Executes dropped EXE
PID:2908 -
\??\c:\rrlflxl.exec:\rrlflxl.exe54⤵
- Executes dropped EXE
PID:1760 -
\??\c:\7tnbhb.exec:\7tnbhb.exe55⤵
- Executes dropped EXE
PID:2252 -
\??\c:\thnnhh.exec:\thnnhh.exe56⤵
- Executes dropped EXE
PID:2324 -
\??\c:\dvvdj.exec:\dvvdj.exe57⤵
- Executes dropped EXE
PID:788 -
\??\c:\dvjpp.exec:\dvjpp.exe58⤵
- Executes dropped EXE
PID:3000 -
\??\c:\lrfxffr.exec:\lrfxffr.exe59⤵
- Executes dropped EXE
PID:2000 -
\??\c:\xrfrxfr.exec:\xrfrxfr.exe60⤵
- Executes dropped EXE
PID:1564 -
\??\c:\hbbnbn.exec:\hbbnbn.exe61⤵
- Executes dropped EXE
PID:1084 -
\??\c:\djpdv.exec:\djpdv.exe62⤵
- Executes dropped EXE
PID:2272 -
\??\c:\djvpv.exec:\djvpv.exe63⤵
- Executes dropped EXE
PID:1680 -
\??\c:\7fxflrl.exec:\7fxflrl.exe64⤵
- Executes dropped EXE
PID:2352 -
\??\c:\lffrrrx.exec:\lffrrrx.exe65⤵
- Executes dropped EXE
PID:2476 -
\??\c:\thnntb.exec:\thnntb.exe66⤵PID:3020
-
\??\c:\hbnnnn.exec:\hbnnnn.exe67⤵PID:2188
-
\??\c:\ppppd.exec:\ppppd.exe68⤵PID:2080
-
\??\c:\vpdpj.exec:\vpdpj.exe69⤵PID:2688
-
\??\c:\rrlxlxx.exec:\rrlxlxx.exe70⤵PID:1984
-
\??\c:\3flxflx.exec:\3flxflx.exe71⤵PID:636
-
\??\c:\1bhnbb.exec:\1bhnbb.exe72⤵PID:2760
-
\??\c:\nhbtbh.exec:\nhbtbh.exe73⤵PID:2316
-
\??\c:\pjddd.exec:\pjddd.exe74⤵PID:1580
-
\??\c:\1rxrffr.exec:\1rxrffr.exe75⤵PID:2636
-
\??\c:\lfxfrxr.exec:\lfxfrxr.exe76⤵PID:2764
-
\??\c:\1bhnnt.exec:\1bhnnt.exe77⤵PID:2720
-
\??\c:\hhbhtn.exec:\hhbhtn.exe78⤵PID:2656
-
\??\c:\dvdjv.exec:\dvdjv.exe79⤵PID:2672
-
\??\c:\vvvjj.exec:\vvvjj.exe80⤵PID:2652
-
\??\c:\3flrlrf.exec:\3flrlrf.exe81⤵PID:1256
-
\??\c:\7bthnt.exec:\7bthnt.exe82⤵PID:556
-
\??\c:\tbnbhn.exec:\tbnbhn.exe83⤵PID:1188
-
\??\c:\pvpdd.exec:\pvpdd.exe84⤵PID:1392
-
\??\c:\vvpjp.exec:\vvpjp.exe85⤵PID:1720
-
\??\c:\jjdjv.exec:\jjdjv.exe86⤵PID:1316
-
\??\c:\fxlxlfr.exec:\fxlxlfr.exe87⤵PID:2676
-
\??\c:\tnbnbn.exec:\tnbnbn.exe88⤵PID:1692
-
\??\c:\nnhbnt.exec:\nnhbnt.exe89⤵PID:1660
-
\??\c:\jjvvv.exec:\jjvvv.exe90⤵PID:1632
-
\??\c:\jdppv.exec:\jdppv.exe91⤵PID:2440
-
\??\c:\rlfxlrx.exec:\rlfxlrx.exe92⤵PID:2932
-
\??\c:\1xrfxlr.exec:\1xrfxlr.exe93⤵PID:2204
-
\??\c:\3thnhn.exec:\3thnhn.exe94⤵PID:2212
-
\??\c:\hhbnht.exec:\hhbnht.exe95⤵PID:1048
-
\??\c:\jvvjv.exec:\jvvjv.exe96⤵PID:844
-
\??\c:\xxffrfl.exec:\xxffrfl.exe97⤵PID:2948
-
\??\c:\lxllrrf.exec:\lxllrrf.exe98⤵PID:3008
-
\??\c:\xrflxxl.exec:\xrflxxl.exe99⤵PID:2996
-
\??\c:\tnbtnh.exec:\tnbtnh.exe100⤵PID:1988
-
\??\c:\3nnhth.exec:\3nnhth.exe101⤵PID:328
-
\??\c:\jddjd.exec:\jddjd.exe102⤵PID:2044
-
\??\c:\xxxxrfr.exec:\xxxxrfr.exe103⤵PID:1080
-
\??\c:\rlxlxxr.exec:\rlxlxxr.exe104⤵PID:2564
-
\??\c:\btnthh.exec:\btnthh.exe105⤵PID:2152
-
\??\c:\9hhbnb.exec:\9hhbnb.exe106⤵PID:3032
-
\??\c:\5vpvv.exec:\5vpvv.exe107⤵PID:2020
-
\??\c:\vvvpv.exec:\vvvpv.exe108⤵PID:2164
-
\??\c:\rlfrxfl.exec:\rlfrxfl.exe109⤵PID:1148
-
\??\c:\5ffxfll.exec:\5ffxfll.exe110⤵PID:2492
-
\??\c:\lfllrlx.exec:\lfllrlx.exe111⤵PID:2880
-
\??\c:\ttnhhn.exec:\ttnhhn.exe112⤵PID:2892
-
\??\c:\hhttbh.exec:\hhttbh.exe113⤵PID:2340
-
\??\c:\dvpdp.exec:\dvpdp.exe114⤵PID:2808
-
\??\c:\9dvdp.exec:\9dvdp.exe115⤵PID:2836
-
\??\c:\rllrrfr.exec:\rllrrfr.exe116⤵PID:2640
-
\??\c:\xrlrxlr.exec:\xrlrxlr.exe117⤵PID:2008
-
\??\c:\bbttnn.exec:\bbttnn.exe118⤵
- System Location Discovery: System Language Discovery
PID:2548 -
\??\c:\bbntnn.exec:\bbntnn.exe119⤵PID:2292
-
\??\c:\5djdp.exec:\5djdp.exe120⤵PID:2016
-
\??\c:\ppjvp.exec:\ppjvp.exe121⤵PID:2332
-
\??\c:\5rrxllx.exec:\5rrxllx.exe122⤵PID:1608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-