Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 09:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
25af8646094136691a9c630f54de1e10N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
25af8646094136691a9c630f54de1e10N.exe
-
Size
843KB
-
MD5
25af8646094136691a9c630f54de1e10
-
SHA1
55f75783b05c3048ce3d532bb5698a0f34a66e03
-
SHA256
c7c334a34d6be9f3afa8ef6e041b08e3ca488727a942d9f3dda21b0830973540
-
SHA512
92806900dd4cb32b7f33d2fddc2142be3362c06078e0a93a2cc38e3673ed9261c50069d6deb3d48f420fef6fdc27b5c68a651fbf72f2b086a7593cdd6c45e381
-
SSDEEP
24576:Sgdn8whSenedn8whhdn76gdn8whSfgdn8whSzu:TFyVPf5
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2632-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2860-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/568-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1124-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1204-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1132-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1608-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/996-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-289-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-298-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2516 1hnhbn.exe 2256 tttbht.exe 2692 xlrxrxx.exe 2820 htthbh.exe 2860 rfxxrrl.exe 2652 ppdpv.exe 2548 dvjvp.exe 3060 nnbntn.exe 568 lrrrxrl.exe 396 3ddvj.exe 2924 hbnntt.exe 2536 vvpvj.exe 2096 nhtbnt.exe 1124 vdjpd.exe 2000 ntthtb.exe 1068 fxlxffx.exe 3000 7vvvp.exe 1204 fxrxxrf.exe 2944 lxlxfrx.exe 1132 vjpjd.exe 1608 7xlxfrr.exe 848 xrrflrf.exe 2156 vpvjp.exe 1908 fxflrxr.exe 1932 3llxrfx.exe 2432 hnntnt.exe 2108 fxflxfx.exe 996 9nhthn.exe 2468 7flflrx.exe 868 nnnnbh.exe 1560 lxllxff.exe 2632 dvdpv.exe 1896 frlrrxl.exe 1408 jjjdj.exe 1924 fxrxxff.exe 2692 rrlxffx.exe 2716 nhthhn.exe 2272 ppjpv.exe 2856 lffrlrx.exe 2664 nbtbbn.exe 2284 5jdjp.exe 2552 rrrrxfl.exe 1704 pjpvp.exe 3068 lllxflr.exe 1188 llxlrrf.exe 1244 vvdvv.exe 2608 bttbnn.exe 2616 jdvdj.exe 1672 rlxlxrl.exe 2404 1dpvd.exe 1952 xrfrrxf.exe 1492 bbnthn.exe 2644 vjdjv.exe 1404 lflrxxf.exe 936 bhhhhh.exe 1204 jjvjp.exe 2936 lfrxlxl.exe 1332 hbhhnt.exe 660 vddjj.exe 444 3rffllr.exe 2440 bnhnnb.exe 1544 vjppd.exe 1964 llxflrx.exe 1532 9hnntb.exe -
resource yara_rule behavioral1/memory/2632-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/568-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1124-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2000-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1204-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-209-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1608-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/996-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-289-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-298-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxlfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfrxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fxfxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxlrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2516 2632 25af8646094136691a9c630f54de1e10N.exe 31 PID 2632 wrote to memory of 2516 2632 25af8646094136691a9c630f54de1e10N.exe 31 PID 2632 wrote to memory of 2516 2632 25af8646094136691a9c630f54de1e10N.exe 31 PID 2632 wrote to memory of 2516 2632 25af8646094136691a9c630f54de1e10N.exe 31 PID 2516 wrote to memory of 2256 2516 1hnhbn.exe 32 PID 2516 wrote to memory of 2256 2516 1hnhbn.exe 32 PID 2516 wrote to memory of 2256 2516 1hnhbn.exe 32 PID 2516 wrote to memory of 2256 2516 1hnhbn.exe 32 PID 2256 wrote to memory of 2692 2256 tttbht.exe 33 PID 2256 wrote to memory of 2692 2256 tttbht.exe 33 PID 2256 wrote to memory of 2692 2256 tttbht.exe 33 PID 2256 wrote to memory of 2692 2256 tttbht.exe 33 PID 2692 wrote to memory of 2820 2692 xlrxrxx.exe 34 PID 2692 wrote to memory of 2820 2692 xlrxrxx.exe 34 PID 2692 wrote to memory of 2820 2692 xlrxrxx.exe 34 PID 2692 wrote to memory of 2820 2692 xlrxrxx.exe 34 PID 2820 wrote to memory of 2860 2820 htthbh.exe 35 PID 2820 wrote to memory of 2860 2820 htthbh.exe 35 PID 2820 wrote to memory of 2860 2820 htthbh.exe 35 PID 2820 wrote to memory of 2860 2820 htthbh.exe 35 PID 2860 wrote to memory of 2652 2860 rfxxrrl.exe 36 PID 2860 wrote to memory of 2652 2860 rfxxrrl.exe 36 PID 2860 wrote to memory of 2652 2860 rfxxrrl.exe 36 PID 2860 wrote to memory of 2652 2860 rfxxrrl.exe 36 PID 2652 wrote to memory of 2548 2652 ppdpv.exe 37 PID 2652 wrote to memory of 2548 2652 ppdpv.exe 37 PID 2652 wrote to memory of 2548 2652 ppdpv.exe 37 PID 2652 wrote to memory of 2548 2652 ppdpv.exe 37 PID 2548 wrote to memory of 3060 2548 dvjvp.exe 38 PID 2548 wrote to memory of 3060 2548 dvjvp.exe 38 PID 2548 wrote to memory of 3060 2548 dvjvp.exe 38 PID 2548 wrote to memory of 3060 2548 dvjvp.exe 38 PID 3060 wrote to memory of 568 3060 nnbntn.exe 39 PID 3060 wrote to memory of 568 3060 nnbntn.exe 39 PID 3060 wrote to memory of 568 3060 nnbntn.exe 39 PID 3060 wrote to memory of 568 3060 nnbntn.exe 39 PID 568 wrote to memory of 396 568 lrrrxrl.exe 40 PID 568 wrote to memory of 396 568 lrrrxrl.exe 40 PID 568 wrote to memory of 396 568 lrrrxrl.exe 40 PID 568 wrote to memory of 396 568 lrrrxrl.exe 40 PID 396 wrote to memory of 2924 396 3ddvj.exe 41 PID 396 wrote to memory of 2924 396 3ddvj.exe 41 PID 396 wrote to memory of 2924 396 3ddvj.exe 41 PID 396 wrote to memory of 2924 396 3ddvj.exe 41 PID 2924 wrote to memory of 2536 2924 hbnntt.exe 42 PID 2924 wrote to memory of 2536 2924 hbnntt.exe 42 PID 2924 wrote to memory of 2536 2924 hbnntt.exe 42 PID 2924 wrote to memory of 2536 2924 hbnntt.exe 42 PID 2536 wrote to memory of 2096 2536 vvpvj.exe 43 PID 2536 wrote to memory of 2096 2536 vvpvj.exe 43 PID 2536 wrote to memory of 2096 2536 vvpvj.exe 43 PID 2536 wrote to memory of 2096 2536 vvpvj.exe 43 PID 2096 wrote to memory of 1124 2096 nhtbnt.exe 44 PID 2096 wrote to memory of 1124 2096 nhtbnt.exe 44 PID 2096 wrote to memory of 1124 2096 nhtbnt.exe 44 PID 2096 wrote to memory of 1124 2096 nhtbnt.exe 44 PID 1124 wrote to memory of 2000 1124 vdjpd.exe 45 PID 1124 wrote to memory of 2000 1124 vdjpd.exe 45 PID 1124 wrote to memory of 2000 1124 vdjpd.exe 45 PID 1124 wrote to memory of 2000 1124 vdjpd.exe 45 PID 2000 wrote to memory of 1068 2000 ntthtb.exe 46 PID 2000 wrote to memory of 1068 2000 ntthtb.exe 46 PID 2000 wrote to memory of 1068 2000 ntthtb.exe 46 PID 2000 wrote to memory of 1068 2000 ntthtb.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\25af8646094136691a9c630f54de1e10N.exe"C:\Users\Admin\AppData\Local\Temp\25af8646094136691a9c630f54de1e10N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\1hnhbn.exec:\1hnhbn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\tttbht.exec:\tttbht.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\xlrxrxx.exec:\xlrxrxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\htthbh.exec:\htthbh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\rfxxrrl.exec:\rfxxrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\ppdpv.exec:\ppdpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\dvjvp.exec:\dvjvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\nnbntn.exec:\nnbntn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\lrrrxrl.exec:\lrrrxrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
\??\c:\3ddvj.exec:\3ddvj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\hbnntt.exec:\hbnntt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\vvpvj.exec:\vvpvj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\nhtbnt.exec:\nhtbnt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\vdjpd.exec:\vdjpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\ntthtb.exec:\ntthtb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\fxlxffx.exec:\fxlxffx.exe17⤵
- Executes dropped EXE
PID:1068 -
\??\c:\7vvvp.exec:\7vvvp.exe18⤵
- Executes dropped EXE
PID:3000 -
\??\c:\fxrxxrf.exec:\fxrxxrf.exe19⤵
- Executes dropped EXE
PID:1204 -
\??\c:\lxlxfrx.exec:\lxlxfrx.exe20⤵
- Executes dropped EXE
PID:2944 -
\??\c:\vjpjd.exec:\vjpjd.exe21⤵
- Executes dropped EXE
PID:1132 -
\??\c:\7xlxfrr.exec:\7xlxfrr.exe22⤵
- Executes dropped EXE
PID:1608 -
\??\c:\xrrflrf.exec:\xrrflrf.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:848 -
\??\c:\vpvjp.exec:\vpvjp.exe24⤵
- Executes dropped EXE
PID:2156 -
\??\c:\fxflrxr.exec:\fxflrxr.exe25⤵
- Executes dropped EXE
PID:1908 -
\??\c:\3llxrfx.exec:\3llxrfx.exe26⤵
- Executes dropped EXE
PID:1932 -
\??\c:\hnntnt.exec:\hnntnt.exe27⤵
- Executes dropped EXE
PID:2432 -
\??\c:\fxflxfx.exec:\fxflxfx.exe28⤵
- Executes dropped EXE
PID:2108 -
\??\c:\9nhthn.exec:\9nhthn.exe29⤵
- Executes dropped EXE
PID:996 -
\??\c:\7flflrx.exec:\7flflrx.exe30⤵
- Executes dropped EXE
PID:2468 -
\??\c:\nnnnbh.exec:\nnnnbh.exe31⤵
- Executes dropped EXE
PID:868 -
\??\c:\lxllxff.exec:\lxllxff.exe32⤵
- Executes dropped EXE
PID:1560 -
\??\c:\dvdpv.exec:\dvdpv.exe33⤵
- Executes dropped EXE
PID:2632 -
\??\c:\frlrrxl.exec:\frlrrxl.exe34⤵
- Executes dropped EXE
PID:1896 -
\??\c:\jjjdj.exec:\jjjdj.exe35⤵
- Executes dropped EXE
PID:1408 -
\??\c:\fxrxxff.exec:\fxrxxff.exe36⤵
- Executes dropped EXE
PID:1924 -
\??\c:\rrlxffx.exec:\rrlxffx.exe37⤵
- Executes dropped EXE
PID:2692 -
\??\c:\nhthhn.exec:\nhthhn.exe38⤵
- Executes dropped EXE
PID:2716 -
\??\c:\ppjpv.exec:\ppjpv.exe39⤵
- Executes dropped EXE
PID:2272 -
\??\c:\lffrlrx.exec:\lffrlrx.exe40⤵
- Executes dropped EXE
PID:2856 -
\??\c:\nbtbbn.exec:\nbtbbn.exe41⤵
- Executes dropped EXE
PID:2664 -
\??\c:\5jdjp.exec:\5jdjp.exe42⤵
- Executes dropped EXE
PID:2284 -
\??\c:\rrrrxfl.exec:\rrrrxfl.exe43⤵
- Executes dropped EXE
PID:2552 -
\??\c:\pjpvp.exec:\pjpvp.exe44⤵
- Executes dropped EXE
PID:1704 -
\??\c:\lllxflr.exec:\lllxflr.exe45⤵
- Executes dropped EXE
PID:3068 -
\??\c:\llxlrrf.exec:\llxlrrf.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188 -
\??\c:\vvdvv.exec:\vvdvv.exe47⤵
- Executes dropped EXE
PID:1244 -
\??\c:\bttbnn.exec:\bttbnn.exe48⤵
- Executes dropped EXE
PID:2608 -
\??\c:\jdvdj.exec:\jdvdj.exe49⤵
- Executes dropped EXE
PID:2616 -
\??\c:\rlxlxrl.exec:\rlxlxrl.exe50⤵
- Executes dropped EXE
PID:1672 -
\??\c:\1dpvd.exec:\1dpvd.exe51⤵
- Executes dropped EXE
PID:2404 -
\??\c:\xrfrrxf.exec:\xrfrrxf.exe52⤵
- Executes dropped EXE
PID:1952 -
\??\c:\bbnthn.exec:\bbnthn.exe53⤵
- Executes dropped EXE
PID:1492 -
\??\c:\vjdjv.exec:\vjdjv.exe54⤵
- Executes dropped EXE
PID:2644 -
\??\c:\lflrxxf.exec:\lflrxxf.exe55⤵
- Executes dropped EXE
PID:1404 -
\??\c:\bhhhhh.exec:\bhhhhh.exe56⤵
- Executes dropped EXE
PID:936 -
\??\c:\jjvjp.exec:\jjvjp.exe57⤵
- Executes dropped EXE
PID:1204 -
\??\c:\lfrxlxl.exec:\lfrxlxl.exe58⤵
- Executes dropped EXE
PID:2936 -
\??\c:\hbhhnt.exec:\hbhhnt.exe59⤵
- Executes dropped EXE
PID:1332 -
\??\c:\vddjj.exec:\vddjj.exe60⤵
- Executes dropped EXE
PID:660 -
\??\c:\3rffllr.exec:\3rffllr.exe61⤵
- Executes dropped EXE
PID:444 -
\??\c:\bnhnnb.exec:\bnhnnb.exe62⤵
- Executes dropped EXE
PID:2440 -
\??\c:\vjppd.exec:\vjppd.exe63⤵
- Executes dropped EXE
PID:1544 -
\??\c:\llxflrx.exec:\llxflrx.exe64⤵
- Executes dropped EXE
PID:1964 -
\??\c:\9hnntb.exec:\9hnntb.exe65⤵
- Executes dropped EXE
PID:1532 -
\??\c:\vjvdj.exec:\vjvdj.exe66⤵PID:2288
-
\??\c:\lflxlrl.exec:\lflxlrl.exe67⤵PID:2432
-
\??\c:\hbttth.exec:\hbttth.exe68⤵PID:2108
-
\??\c:\pdvdd.exec:\pdvdd.exe69⤵PID:996
-
\??\c:\xrfrlrx.exec:\xrfrlrx.exe70⤵PID:2468
-
\??\c:\btnbbn.exec:\btnbbn.exe71⤵PID:2112
-
\??\c:\1vdjd.exec:\1vdjd.exe72⤵PID:2492
-
\??\c:\jdpdd.exec:\jdpdd.exe73⤵PID:2488
-
\??\c:\llxlxlx.exec:\llxlxlx.exe74⤵PID:2632
-
\??\c:\btbnbb.exec:\btbnbb.exe75⤵PID:1896
-
\??\c:\vvpjp.exec:\vvpjp.exe76⤵PID:2688
-
\??\c:\fxrxxlr.exec:\fxrxxlr.exe77⤵PID:2500
-
\??\c:\hbtttn.exec:\hbtttn.exe78⤵PID:2824
-
\??\c:\jpdjj.exec:\jpdjj.exe79⤵PID:2976
-
\??\c:\htnthn.exec:\htnthn.exe80⤵PID:2800
-
\??\c:\9pjpv.exec:\9pjpv.exe81⤵PID:2596
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe82⤵PID:2568
-
\??\c:\nbbbhn.exec:\nbbbhn.exe83⤵PID:788
-
\??\c:\jdvdj.exec:\jdvdj.exe84⤵PID:2620
-
\??\c:\xrrlrrx.exec:\xrrlrrx.exe85⤵PID:816
-
\??\c:\nnnnth.exec:\nnnnth.exe86⤵PID:2308
-
\??\c:\pjpdj.exec:\pjpdj.exe87⤵PID:2908
-
\??\c:\rffxrxf.exec:\rffxrxf.exe88⤵PID:1372
-
\??\c:\ttntbh.exec:\ttntbh.exe89⤵PID:2880
-
\??\c:\vddpv.exec:\vddpv.exe90⤵PID:2460
-
\??\c:\fxfrflr.exec:\fxfrflr.exe91⤵PID:1040
-
\??\c:\btnnth.exec:\btnnth.exe92⤵PID:1764
-
\??\c:\jjvdp.exec:\jjvdp.exe93⤵PID:2372
-
\??\c:\5lxflxf.exec:\5lxflxf.exe94⤵PID:2396
-
\??\c:\bnttbb.exec:\bnttbb.exe95⤵PID:2528
-
\??\c:\pjppj.exec:\pjppj.exe96⤵PID:2996
-
\??\c:\vppvj.exec:\vppvj.exe97⤵PID:2732
-
\??\c:\xllrxll.exec:\xllrxll.exe98⤵PID:2004
-
\??\c:\nntttb.exec:\nntttb.exe99⤵PID:1912
-
\??\c:\jjdjv.exec:\jjdjv.exe100⤵PID:1416
-
\??\c:\3ffllxx.exec:\3ffllxx.exe101⤵PID:1320
-
\??\c:\btnnbh.exec:\btnnbh.exe102⤵PID:848
-
\??\c:\xrflrrr.exec:\xrflrrr.exe103⤵PID:1656
-
\??\c:\nhtbht.exec:\nhtbht.exe104⤵PID:796
-
\??\c:\7ttthb.exec:\7ttthb.exe105⤵PID:2744
-
\??\c:\dvjjv.exec:\dvjjv.exe106⤵PID:2968
-
\??\c:\xrflrxl.exec:\xrflrxl.exe107⤵PID:2280
-
\??\c:\hbbbnt.exec:\hbbbnt.exe108⤵PID:2700
-
\??\c:\jdvjp.exec:\jdvjp.exe109⤵PID:1060
-
\??\c:\fffxffl.exec:\fffxffl.exe110⤵PID:1724
-
\??\c:\9tnhnn.exec:\9tnhnn.exe111⤵PID:1152
-
\??\c:\7vddd.exec:\7vddd.exe112⤵PID:1716
-
\??\c:\lxxrrrx.exec:\lxxrrrx.exe113⤵PID:1984
-
\??\c:\1htbhb.exec:\1htbhb.exe114⤵PID:2268
-
\??\c:\ppppv.exec:\ppppv.exe115⤵PID:2656
-
\??\c:\rfflxrx.exec:\rfflxrx.exe116⤵PID:2292
-
\??\c:\ttnttn.exec:\ttnttn.exe117⤵
- System Location Discovery: System Language Discovery
PID:2816 -
\??\c:\3pdjv.exec:\3pdjv.exe118⤵PID:2556
-
\??\c:\rfffxfr.exec:\rfffxfr.exe119⤵PID:2136
-
\??\c:\9hbbhn.exec:\9hbbhn.exe120⤵PID:2724
-
\??\c:\jjdvd.exec:\jjdvd.exe121⤵PID:2104
-
\??\c:\lfxlllr.exec:\lfxlllr.exe122⤵PID:2728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-