Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 14:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe
-
Size
843KB
-
MD5
a218da9bc6221278ff8fd89381bb7d10
-
SHA1
4e67aac3e621cb0fa6d3f7bed7cc507bcf28c320
-
SHA256
33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159
-
SHA512
7225c06e375b975691e47d463c42a3937d12e0b19b1d96521f42e43be0cdac1fe8c400079c272ee52aa7da4f7933a3d6a49897b10ba3596c182cc169ba70b175
-
SSDEEP
24576:Sgdn8whSenedn8whhdn76gdn8whSfgdn8whSz0:TFyVPfT
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2688-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2400-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2360-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/352-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1404-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1348-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1656-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2276-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2400 fxrfxrf.exe 2300 lfrrxrf.exe 2472 tnnthn.exe 2824 vjvpv.exe 2208 1bnbbh.exe 2840 nbnbbt.exe 1624 5frrllx.exe 2732 dpdjp.exe 2000 xxlrxlr.exe 2432 vpddj.exe 2360 5lflrrr.exe 352 xrlrllr.exe 772 tnhhtt.exe 1972 xfrxflx.exe 1008 bntttn.exe 592 3xllrrx.exe 2836 9nhhnt.exe 1404 3pdpv.exe 2196 9htbhh.exe 1300 7frxfxx.exe 1348 jdvdj.exe 1456 rlxxfll.exe 1612 jvjpd.exe 2336 bnhhnt.exe 2276 ddvvd.exe 1656 fllxllr.exe 3060 ttnnth.exe 3052 3xflrrr.exe 2264 pdvjp.exe 2376 ffrxflx.exe 1620 htntnt.exe 2416 jjjjj.exe 2956 llfrllr.exe 2720 fxxflxx.exe 2848 5htbnt.exe 2860 ppddj.exe 3068 lfrxflx.exe 2664 3bthhh.exe 2652 vvppv.exe 3024 jdjpv.exe 1992 xrfrrxf.exe 2748 nnhhtt.exe 308 jjpvj.exe 1396 vvpvj.exe 1652 5lrxfxx.exe 2160 tnhhbh.exe 1228 dvpvp.exe 296 dvpdj.exe 1388 1xfrrlr.exe 1644 btnthn.exe 2916 1hhntn.exe 1544 5djvj.exe 2296 lflrlrx.exe 1736 1hhnnn.exe 1168 jjdjv.exe 1864 lfllxxf.exe 2448 3hhnbn.exe 2292 ppjpd.exe 1272 9fxlrrx.exe 556 xrflxrx.exe 3044 xrrlflf.exe 2536 tthhtt.exe 2576 jdppv.exe 380 ffxffrf.exe -
resource yara_rule behavioral1/memory/2688-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2000-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2360-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/352-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1404-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1348-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2276-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-277-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxfrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ddvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fxlxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbhh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2400 2688 33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe 30 PID 2688 wrote to memory of 2400 2688 33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe 30 PID 2688 wrote to memory of 2400 2688 33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe 30 PID 2688 wrote to memory of 2400 2688 33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe 30 PID 2400 wrote to memory of 2300 2400 fxrfxrf.exe 31 PID 2400 wrote to memory of 2300 2400 fxrfxrf.exe 31 PID 2400 wrote to memory of 2300 2400 fxrfxrf.exe 31 PID 2400 wrote to memory of 2300 2400 fxrfxrf.exe 31 PID 2300 wrote to memory of 2472 2300 lfrrxrf.exe 32 PID 2300 wrote to memory of 2472 2300 lfrrxrf.exe 32 PID 2300 wrote to memory of 2472 2300 lfrrxrf.exe 32 PID 2300 wrote to memory of 2472 2300 lfrrxrf.exe 32 PID 2472 wrote to memory of 2824 2472 tnnthn.exe 33 PID 2472 wrote to memory of 2824 2472 tnnthn.exe 33 PID 2472 wrote to memory of 2824 2472 tnnthn.exe 33 PID 2472 wrote to memory of 2824 2472 tnnthn.exe 33 PID 2824 wrote to memory of 2208 2824 vjvpv.exe 34 PID 2824 wrote to memory of 2208 2824 vjvpv.exe 34 PID 2824 wrote to memory of 2208 2824 vjvpv.exe 34 PID 2824 wrote to memory of 2208 2824 vjvpv.exe 34 PID 2208 wrote to memory of 2840 2208 1bnbbh.exe 35 PID 2208 wrote to memory of 2840 2208 1bnbbh.exe 35 PID 2208 wrote to memory of 2840 2208 1bnbbh.exe 35 PID 2208 wrote to memory of 2840 2208 1bnbbh.exe 35 PID 2840 wrote to memory of 1624 2840 nbnbbt.exe 36 PID 2840 wrote to memory of 1624 2840 nbnbbt.exe 36 PID 2840 wrote to memory of 1624 2840 nbnbbt.exe 36 PID 2840 wrote to memory of 1624 2840 nbnbbt.exe 36 PID 1624 wrote to memory of 2732 1624 5frrllx.exe 37 PID 1624 wrote to memory of 2732 1624 5frrllx.exe 37 PID 1624 wrote to memory of 2732 1624 5frrllx.exe 37 PID 1624 wrote to memory of 2732 1624 5frrllx.exe 37 PID 2732 wrote to memory of 2000 2732 dpdjp.exe 38 PID 2732 wrote to memory of 2000 2732 dpdjp.exe 38 PID 2732 wrote to memory of 2000 2732 dpdjp.exe 38 PID 2732 wrote to memory of 2000 2732 dpdjp.exe 38 PID 2000 wrote to memory of 2432 2000 xxlrxlr.exe 39 PID 2000 wrote to memory of 2432 2000 xxlrxlr.exe 39 PID 2000 wrote to memory of 2432 2000 xxlrxlr.exe 39 PID 2000 wrote to memory of 2432 2000 xxlrxlr.exe 39 PID 2432 wrote to memory of 2360 2432 vpddj.exe 40 PID 2432 wrote to memory of 2360 2432 vpddj.exe 40 PID 2432 wrote to memory of 2360 2432 vpddj.exe 40 PID 2432 wrote to memory of 2360 2432 vpddj.exe 40 PID 2360 wrote to memory of 352 2360 5lflrrr.exe 41 PID 2360 wrote to memory of 352 2360 5lflrrr.exe 41 PID 2360 wrote to memory of 352 2360 5lflrrr.exe 41 PID 2360 wrote to memory of 352 2360 5lflrrr.exe 41 PID 352 wrote to memory of 772 352 xrlrllr.exe 42 PID 352 wrote to memory of 772 352 xrlrllr.exe 42 PID 352 wrote to memory of 772 352 xrlrllr.exe 42 PID 352 wrote to memory of 772 352 xrlrllr.exe 42 PID 772 wrote to memory of 1972 772 tnhhtt.exe 43 PID 772 wrote to memory of 1972 772 tnhhtt.exe 43 PID 772 wrote to memory of 1972 772 tnhhtt.exe 43 PID 772 wrote to memory of 1972 772 tnhhtt.exe 43 PID 1972 wrote to memory of 1008 1972 xfrxflx.exe 44 PID 1972 wrote to memory of 1008 1972 xfrxflx.exe 44 PID 1972 wrote to memory of 1008 1972 xfrxflx.exe 44 PID 1972 wrote to memory of 1008 1972 xfrxflx.exe 44 PID 1008 wrote to memory of 592 1008 bntttn.exe 45 PID 1008 wrote to memory of 592 1008 bntttn.exe 45 PID 1008 wrote to memory of 592 1008 bntttn.exe 45 PID 1008 wrote to memory of 592 1008 bntttn.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe"C:\Users\Admin\AppData\Local\Temp\33915d9e087b490d94e6fafbe9b3c4c312e4cb30e19406e20c9dc532cc90f159N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\fxrfxrf.exec:\fxrfxrf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\lfrrxrf.exec:\lfrrxrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\tnnthn.exec:\tnnthn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\vjvpv.exec:\vjvpv.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\1bnbbh.exec:\1bnbbh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\nbnbbt.exec:\nbnbbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\5frrllx.exec:\5frrllx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\dpdjp.exec:\dpdjp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\xxlrxlr.exec:\xxlrxlr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\vpddj.exec:\vpddj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\5lflrrr.exec:\5lflrrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\xrlrllr.exec:\xrlrllr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\tnhhtt.exec:\tnhhtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\xfrxflx.exec:\xfrxflx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\bntttn.exec:\bntttn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\3xllrrx.exec:\3xllrrx.exe17⤵
- Executes dropped EXE
PID:592 -
\??\c:\9nhhnt.exec:\9nhhnt.exe18⤵
- Executes dropped EXE
PID:2836 -
\??\c:\3pdpv.exec:\3pdpv.exe19⤵
- Executes dropped EXE
PID:1404 -
\??\c:\9htbhh.exec:\9htbhh.exe20⤵
- Executes dropped EXE
PID:2196 -
\??\c:\7frxfxx.exec:\7frxfxx.exe21⤵
- Executes dropped EXE
PID:1300 -
\??\c:\jdvdj.exec:\jdvdj.exe22⤵
- Executes dropped EXE
PID:1348 -
\??\c:\rlxxfll.exec:\rlxxfll.exe23⤵
- Executes dropped EXE
PID:1456 -
\??\c:\jvjpd.exec:\jvjpd.exe24⤵
- Executes dropped EXE
PID:1612 -
\??\c:\bnhhnt.exec:\bnhhnt.exe25⤵
- Executes dropped EXE
PID:2336 -
\??\c:\ddvvd.exec:\ddvvd.exe26⤵
- Executes dropped EXE
PID:2276 -
\??\c:\fllxllr.exec:\fllxllr.exe27⤵
- Executes dropped EXE
PID:1656 -
\??\c:\ttnnth.exec:\ttnnth.exe28⤵
- Executes dropped EXE
PID:3060 -
\??\c:\3xflrrr.exec:\3xflrrr.exe29⤵
- Executes dropped EXE
PID:3052 -
\??\c:\pdvjp.exec:\pdvjp.exe30⤵
- Executes dropped EXE
PID:2264 -
\??\c:\ffrxflx.exec:\ffrxflx.exe31⤵
- Executes dropped EXE
PID:2376 -
\??\c:\htntnt.exec:\htntnt.exe32⤵
- Executes dropped EXE
PID:1620 -
\??\c:\jjjjj.exec:\jjjjj.exe33⤵
- Executes dropped EXE
PID:2416 -
\??\c:\llfrllr.exec:\llfrllr.exe34⤵
- Executes dropped EXE
PID:2956 -
\??\c:\fxxflxx.exec:\fxxflxx.exe35⤵
- Executes dropped EXE
PID:2720 -
\??\c:\5htbnt.exec:\5htbnt.exe36⤵
- Executes dropped EXE
PID:2848 -
\??\c:\ppddj.exec:\ppddj.exe37⤵
- Executes dropped EXE
PID:2860 -
\??\c:\lfrxflx.exec:\lfrxflx.exe38⤵
- Executes dropped EXE
PID:3068 -
\??\c:\3bthhh.exec:\3bthhh.exe39⤵
- Executes dropped EXE
PID:2664 -
\??\c:\vvppv.exec:\vvppv.exe40⤵
- Executes dropped EXE
PID:2652 -
\??\c:\jdjpv.exec:\jdjpv.exe41⤵
- Executes dropped EXE
PID:3024 -
\??\c:\xrfrrxf.exec:\xrfrrxf.exe42⤵
- Executes dropped EXE
PID:1992 -
\??\c:\nnhhtt.exec:\nnhhtt.exe43⤵
- Executes dropped EXE
PID:2748 -
\??\c:\jjpvj.exec:\jjpvj.exe44⤵
- Executes dropped EXE
PID:308 -
\??\c:\vvpvj.exec:\vvpvj.exe45⤵
- Executes dropped EXE
PID:1396 -
\??\c:\5lrxfxx.exec:\5lrxfxx.exe46⤵
- Executes dropped EXE
PID:1652 -
\??\c:\tnhhbh.exec:\tnhhbh.exe47⤵
- Executes dropped EXE
PID:2160 -
\??\c:\dvpvp.exec:\dvpvp.exe48⤵
- Executes dropped EXE
PID:1228 -
\??\c:\dvpdj.exec:\dvpdj.exe49⤵
- Executes dropped EXE
PID:296 -
\??\c:\1xfrrlr.exec:\1xfrrlr.exe50⤵
- Executes dropped EXE
PID:1388 -
\??\c:\btnthn.exec:\btnthn.exe51⤵
- Executes dropped EXE
PID:1644 -
\??\c:\1hhntn.exec:\1hhntn.exe52⤵
- Executes dropped EXE
PID:2916 -
\??\c:\5djvj.exec:\5djvj.exe53⤵
- Executes dropped EXE
PID:1544 -
\??\c:\lflrlrx.exec:\lflrlrx.exe54⤵
- Executes dropped EXE
PID:2296 -
\??\c:\1hhnnn.exec:\1hhnnn.exe55⤵
- Executes dropped EXE
PID:1736 -
\??\c:\jjdjv.exec:\jjdjv.exe56⤵
- Executes dropped EXE
PID:1168 -
\??\c:\lfllxxf.exec:\lfllxxf.exe57⤵
- Executes dropped EXE
PID:1864 -
\??\c:\3hhnbn.exec:\3hhnbn.exe58⤵
- Executes dropped EXE
PID:2448 -
\??\c:\ppjpd.exec:\ppjpd.exe59⤵
- Executes dropped EXE
PID:2292 -
\??\c:\9fxlrrx.exec:\9fxlrrx.exe60⤵
- Executes dropped EXE
PID:1272 -
\??\c:\xrflxrx.exec:\xrflxrx.exe61⤵
- Executes dropped EXE
PID:556 -
\??\c:\xrrlflf.exec:\xrrlflf.exe62⤵
- Executes dropped EXE
PID:3044 -
\??\c:\tthhtt.exec:\tthhtt.exe63⤵
- Executes dropped EXE
PID:2536 -
\??\c:\jdppv.exec:\jdppv.exe64⤵
- Executes dropped EXE
PID:2576 -
\??\c:\ffxffrf.exec:\ffxffrf.exe65⤵
- Executes dropped EXE
PID:380 -
\??\c:\1bttht.exec:\1bttht.exe66⤵PID:760
-
\??\c:\7fxxfxf.exec:\7fxxfxf.exe67⤵PID:2948
-
\??\c:\hbnthn.exec:\hbnthn.exe68⤵PID:2092
-
\??\c:\dvpvj.exec:\dvpvj.exe69⤵PID:2412
-
\??\c:\jddjd.exec:\jddjd.exe70⤵PID:2132
-
\??\c:\5hbhtb.exec:\5hbhtb.exe71⤵PID:2400
-
\??\c:\vpdvj.exec:\vpdvj.exe72⤵PID:2812
-
\??\c:\1rlllll.exec:\1rlllll.exe73⤵PID:2768
-
\??\c:\ffrrffl.exec:\ffrrffl.exe74⤵PID:2728
-
\??\c:\7nhtbb.exec:\7nhtbb.exe75⤵PID:2332
-
\??\c:\5pppp.exec:\5pppp.exe76⤵PID:2816
-
\??\c:\lfxllrf.exec:\lfxllrf.exe77⤵PID:2100
-
\??\c:\bthntn.exec:\bthntn.exe78⤵PID:2656
-
\??\c:\dddjj.exec:\dddjj.exe79⤵PID:2784
-
\??\c:\rlflffr.exec:\rlflffr.exe80⤵PID:3040
-
\??\c:\tnntnt.exec:\tnntnt.exe81⤵PID:2912
-
\??\c:\ddvdv.exec:\ddvdv.exe82⤵PID:1380
-
\??\c:\fxrxflx.exec:\fxrxflx.exe83⤵PID:1900
-
\??\c:\9bttbt.exec:\9bttbt.exe84⤵PID:2428
-
\??\c:\tnhhtn.exec:\tnhhtn.exe85⤵PID:1912
-
\??\c:\9dppv.exec:\9dppv.exe86⤵PID:1560
-
\??\c:\rlxffrl.exec:\rlxffrl.exe87⤵PID:320
-
\??\c:\bhnbnb.exec:\bhnbnb.exe88⤵PID:1932
-
\??\c:\vddjd.exec:\vddjd.exe89⤵PID:1920
-
\??\c:\frxlxfr.exec:\frxlxfr.exe90⤵PID:1340
-
\??\c:\nntntt.exec:\nntntt.exe91⤵PID:492
-
\??\c:\3ddvd.exec:\3ddvd.exe92⤵
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\rllxflf.exec:\rllxflf.exe93⤵PID:2980
-
\??\c:\nhtbhb.exec:\nhtbhb.exe94⤵PID:1732
-
\??\c:\jdvvv.exec:\jdvvv.exe95⤵PID:888
-
\??\c:\llxlxll.exec:\llxlxll.exe96⤵PID:1548
-
\??\c:\hbnthh.exec:\hbnthh.exe97⤵PID:2284
-
\??\c:\dvjjp.exec:\dvjjp.exe98⤵PID:1580
-
\??\c:\5flrllr.exec:\5flrllr.exe99⤵PID:468
-
\??\c:\hbttbb.exec:\hbttbb.exe100⤵PID:2336
-
\??\c:\vjddd.exec:\vjddd.exe101⤵PID:2012
-
\??\c:\vvdjd.exec:\vvdjd.exe102⤵PID:2552
-
\??\c:\lxrlrll.exec:\lxrlrll.exe103⤵PID:1332
-
\??\c:\tnthtt.exec:\tnthtt.exe104⤵PID:3056
-
\??\c:\jvpvd.exec:\jvpvd.exe105⤵PID:2152
-
\??\c:\rxlrxfl.exec:\rxlrxfl.exe106⤵PID:2060
-
\??\c:\3hbhth.exec:\3hbhth.exe107⤵PID:2376
-
\??\c:\vpdjp.exec:\vpdjp.exe108⤵PID:2116
-
\??\c:\xrllrrr.exec:\xrllrrr.exe109⤵PID:2188
-
\??\c:\nhnttb.exec:\nhnttb.exe110⤵PID:2808
-
\??\c:\vpjdj.exec:\vpjdj.exe111⤵PID:2828
-
\??\c:\xxfflxf.exec:\xxfflxf.exe112⤵PID:2472
-
\??\c:\3hbnnn.exec:\3hbnnn.exe113⤵PID:2736
-
\??\c:\jdvdj.exec:\jdvdj.exe114⤵PID:2208
-
\??\c:\jvddj.exec:\jvddj.exe115⤵PID:2764
-
\??\c:\5llfflx.exec:\5llfflx.exe116⤵PID:2604
-
\??\c:\nttnth.exec:\nttnth.exe117⤵PID:2660
-
\??\c:\dvvdd.exec:\dvvdd.exe118⤵PID:2140
-
\??\c:\1xlxllr.exec:\1xlxllr.exe119⤵PID:1712
-
\??\c:\tthhnt.exec:\tthhnt.exe120⤵PID:1992
-
\??\c:\hhnttn.exec:\hhnttn.exe121⤵PID:2748
-
\??\c:\vjdjj.exec:\vjdjj.exe122⤵PID:2680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-