Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe
Resource
win7-20240729-en
7 signatures
120 seconds
General
-
Target
df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe
-
Size
71KB
-
MD5
1e4ab4d42921fb71305c3bc0e966f7bf
-
SHA1
8759e87fbd6a17ed2c4ced288e48842d28213b38
-
SHA256
df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4
-
SHA512
d55b46061f9fbc56ee4c5e17c4998ff222dc4ce1e1f60568c11b97bbab44ac1ca877580c7a90b402feb51f713dfe8ea72668c8232daf81d8ae2db11b3202312a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+q8l45CmK:ymb3NkkiQ3mdBjFIj+q8lL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2380-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1084-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/908-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1172-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1444-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1980-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/992-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1176-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/884-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1084 lfrxxxf.exe 2824 flxffrf.exe 2784 ttthhh.exe 2840 ppdjp.exe 3020 5ntbhn.exe 2128 vdjjv.exe 2812 lrfxxll.exe 2660 rlxfxfl.exe 2684 9tbhth.exe 924 vjppd.exe 1632 llllllx.exe 2580 rlxlxll.exe 2968 7htnth.exe 960 3vjpv.exe 908 llfflff.exe 2940 ttbtbt.exe 1172 5bthbn.exe 2000 vvdvd.exe 1444 lxlfffl.exe 2092 nnbbhn.exe 2440 tthnht.exe 760 ddppd.exe 904 flllfrf.exe 2064 xxlxrfx.exe 352 nbhntn.exe 1980 nbnhnn.exe 1428 dppjj.exe 992 3btbht.exe 1768 bbthbh.exe 1176 5jpvd.exe 884 pdvpv.exe 1688 flfrflf.exe 1100 tbnnbt.exe 604 vdpvj.exe 2856 9vpvp.exe 2748 rrxxllr.exe 1592 ttntnt.exe 2516 hnbttn.exe 2676 ddpvj.exe 852 pjjpd.exe 2688 rrfrffr.exe 2652 5frfrfl.exe 2672 nnbnhn.exe 484 hhbbth.exe 2176 5vjpd.exe 1076 1xxflrl.exe 2480 9ffrrxl.exe 1480 nnhbbh.exe 1732 3nhntt.exe 2968 vvpdd.exe 2872 lrrfllr.exe 2972 rxflfxr.exe 2104 hnttht.exe 1504 nhhtnh.exe 1944 ddpvj.exe 1016 jppdj.exe 2624 fxfrxfr.exe 2184 hnthnb.exe 2080 1ttbnt.exe 2404 9vdjj.exe 1156 dvdjp.exe 904 rrfxfrx.exe 592 lrfrxlr.exe 1636 5nbtnh.exe -
resource yara_rule behavioral1/memory/2380-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1084-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/908-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1172-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2000-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1444-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1980-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/992-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1176-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/884-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xrflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1084 2380 df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe 29 PID 2380 wrote to memory of 1084 2380 df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe 29 PID 2380 wrote to memory of 1084 2380 df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe 29 PID 2380 wrote to memory of 1084 2380 df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe 29 PID 1084 wrote to memory of 2824 1084 lfrxxxf.exe 30 PID 1084 wrote to memory of 2824 1084 lfrxxxf.exe 30 PID 1084 wrote to memory of 2824 1084 lfrxxxf.exe 30 PID 1084 wrote to memory of 2824 1084 lfrxxxf.exe 30 PID 2824 wrote to memory of 2784 2824 flxffrf.exe 31 PID 2824 wrote to memory of 2784 2824 flxffrf.exe 31 PID 2824 wrote to memory of 2784 2824 flxffrf.exe 31 PID 2824 wrote to memory of 2784 2824 flxffrf.exe 31 PID 2784 wrote to memory of 2840 2784 ttthhh.exe 32 PID 2784 wrote to memory of 2840 2784 ttthhh.exe 32 PID 2784 wrote to memory of 2840 2784 ttthhh.exe 32 PID 2784 wrote to memory of 2840 2784 ttthhh.exe 32 PID 2840 wrote to memory of 3020 2840 ppdjp.exe 33 PID 2840 wrote to memory of 3020 2840 ppdjp.exe 33 PID 2840 wrote to memory of 3020 2840 ppdjp.exe 33 PID 2840 wrote to memory of 3020 2840 ppdjp.exe 33 PID 3020 wrote to memory of 2128 3020 5ntbhn.exe 34 PID 3020 wrote to memory of 2128 3020 5ntbhn.exe 34 PID 3020 wrote to memory of 2128 3020 5ntbhn.exe 34 PID 3020 wrote to memory of 2128 3020 5ntbhn.exe 34 PID 2128 wrote to memory of 2812 2128 vdjjv.exe 35 PID 2128 wrote to memory of 2812 2128 vdjjv.exe 35 PID 2128 wrote to memory of 2812 2128 vdjjv.exe 35 PID 2128 wrote to memory of 2812 2128 vdjjv.exe 35 PID 2812 wrote to memory of 2660 2812 lrfxxll.exe 36 PID 2812 wrote to memory of 2660 2812 lrfxxll.exe 36 PID 2812 wrote to memory of 2660 2812 lrfxxll.exe 36 PID 2812 wrote to memory of 2660 2812 lrfxxll.exe 36 PID 2660 wrote to memory of 2684 2660 rlxfxfl.exe 37 PID 2660 wrote to memory of 2684 2660 rlxfxfl.exe 37 PID 2660 wrote to memory of 2684 2660 rlxfxfl.exe 37 PID 2660 wrote to memory of 2684 2660 rlxfxfl.exe 37 PID 2684 wrote to memory of 924 2684 9tbhth.exe 38 PID 2684 wrote to memory of 924 2684 9tbhth.exe 38 PID 2684 wrote to memory of 924 2684 9tbhth.exe 38 PID 2684 wrote to memory of 924 2684 9tbhth.exe 38 PID 924 wrote to memory of 1632 924 vjppd.exe 39 PID 924 wrote to memory of 1632 924 vjppd.exe 39 PID 924 wrote to memory of 1632 924 vjppd.exe 39 PID 924 wrote to memory of 1632 924 vjppd.exe 39 PID 1632 wrote to memory of 2580 1632 llllllx.exe 40 PID 1632 wrote to memory of 2580 1632 llllllx.exe 40 PID 1632 wrote to memory of 2580 1632 llllllx.exe 40 PID 1632 wrote to memory of 2580 1632 llllllx.exe 40 PID 2580 wrote to memory of 2968 2580 rlxlxll.exe 41 PID 2580 wrote to memory of 2968 2580 rlxlxll.exe 41 PID 2580 wrote to memory of 2968 2580 rlxlxll.exe 41 PID 2580 wrote to memory of 2968 2580 rlxlxll.exe 41 PID 2968 wrote to memory of 960 2968 7htnth.exe 42 PID 2968 wrote to memory of 960 2968 7htnth.exe 42 PID 2968 wrote to memory of 960 2968 7htnth.exe 42 PID 2968 wrote to memory of 960 2968 7htnth.exe 42 PID 960 wrote to memory of 908 960 3vjpv.exe 43 PID 960 wrote to memory of 908 960 3vjpv.exe 43 PID 960 wrote to memory of 908 960 3vjpv.exe 43 PID 960 wrote to memory of 908 960 3vjpv.exe 43 PID 908 wrote to memory of 2940 908 llfflff.exe 44 PID 908 wrote to memory of 2940 908 llfflff.exe 44 PID 908 wrote to memory of 2940 908 llfflff.exe 44 PID 908 wrote to memory of 2940 908 llfflff.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe"C:\Users\Admin\AppData\Local\Temp\df324d02b40aef84514fb392461371048629d46ecf7c670f4580c4dca866f2c4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\lfrxxxf.exec:\lfrxxxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
\??\c:\flxffrf.exec:\flxffrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\ttthhh.exec:\ttthhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\ppdjp.exec:\ppdjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\5ntbhn.exec:\5ntbhn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vdjjv.exec:\vdjjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\lrfxxll.exec:\lrfxxll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\rlxfxfl.exec:\rlxfxfl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\9tbhth.exec:\9tbhth.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\vjppd.exec:\vjppd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:924 -
\??\c:\llllllx.exec:\llllllx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\rlxlxll.exec:\rlxlxll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\7htnth.exec:\7htnth.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\3vjpv.exec:\3vjpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\llfflff.exec:\llfflff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
\??\c:\ttbtbt.exec:\ttbtbt.exe17⤵
- Executes dropped EXE
PID:2940 -
\??\c:\5bthbn.exec:\5bthbn.exe18⤵
- Executes dropped EXE
PID:1172 -
\??\c:\vvdvd.exec:\vvdvd.exe19⤵
- Executes dropped EXE
PID:2000 -
\??\c:\lxlfffl.exec:\lxlfffl.exe20⤵
- Executes dropped EXE
PID:1444 -
\??\c:\nnbbhn.exec:\nnbbhn.exe21⤵
- Executes dropped EXE
PID:2092 -
\??\c:\tthnht.exec:\tthnht.exe22⤵
- Executes dropped EXE
PID:2440 -
\??\c:\ddppd.exec:\ddppd.exe23⤵
- Executes dropped EXE
PID:760 -
\??\c:\flllfrf.exec:\flllfrf.exe24⤵
- Executes dropped EXE
PID:904 -
\??\c:\xxlxrfx.exec:\xxlxrfx.exe25⤵
- Executes dropped EXE
PID:2064 -
\??\c:\nbhntn.exec:\nbhntn.exe26⤵
- Executes dropped EXE
PID:352 -
\??\c:\nbnhnn.exec:\nbnhnn.exe27⤵
- Executes dropped EXE
PID:1980 -
\??\c:\dppjj.exec:\dppjj.exe28⤵
- Executes dropped EXE
PID:1428 -
\??\c:\3btbht.exec:\3btbht.exe29⤵
- Executes dropped EXE
PID:992 -
\??\c:\bbthbh.exec:\bbthbh.exe30⤵
- Executes dropped EXE
PID:1768 -
\??\c:\5jpvd.exec:\5jpvd.exe31⤵
- Executes dropped EXE
PID:1176 -
\??\c:\pdvpv.exec:\pdvpv.exe32⤵
- Executes dropped EXE
PID:884 -
\??\c:\flfrflf.exec:\flfrflf.exe33⤵
- Executes dropped EXE
PID:1688 -
\??\c:\tbnnbt.exec:\tbnnbt.exe34⤵
- Executes dropped EXE
PID:1100 -
\??\c:\vdpvj.exec:\vdpvj.exe35⤵
- Executes dropped EXE
PID:604 -
\??\c:\9vpvp.exec:\9vpvp.exe36⤵
- Executes dropped EXE
PID:2856 -
\??\c:\rrxxllr.exec:\rrxxllr.exe37⤵
- Executes dropped EXE
PID:2748 -
\??\c:\ttntnt.exec:\ttntnt.exe38⤵
- Executes dropped EXE
PID:1592 -
\??\c:\hnbttn.exec:\hnbttn.exe39⤵
- Executes dropped EXE
PID:2516 -
\??\c:\ddpvj.exec:\ddpvj.exe40⤵
- Executes dropped EXE
PID:2676 -
\??\c:\pjjpd.exec:\pjjpd.exe41⤵
- Executes dropped EXE
PID:852 -
\??\c:\rrfrffr.exec:\rrfrffr.exe42⤵
- Executes dropped EXE
PID:2688 -
\??\c:\5frfrfl.exec:\5frfrfl.exe43⤵
- Executes dropped EXE
PID:2652 -
\??\c:\nnbnhn.exec:\nnbnhn.exe44⤵
- Executes dropped EXE
PID:2672 -
\??\c:\hhbbth.exec:\hhbbth.exe45⤵
- Executes dropped EXE
PID:484 -
\??\c:\5vjpd.exec:\5vjpd.exe46⤵
- Executes dropped EXE
PID:2176 -
\??\c:\1xxflrl.exec:\1xxflrl.exe47⤵
- Executes dropped EXE
PID:1076 -
\??\c:\9ffrrxl.exec:\9ffrrxl.exe48⤵
- Executes dropped EXE
PID:2480 -
\??\c:\nnhbbh.exec:\nnhbbh.exe49⤵
- Executes dropped EXE
PID:1480 -
\??\c:\3nhntt.exec:\3nhntt.exe50⤵
- Executes dropped EXE
PID:1732 -
\??\c:\vvpdd.exec:\vvpdd.exe51⤵
- Executes dropped EXE
PID:2968 -
\??\c:\lrrfllr.exec:\lrrfllr.exe52⤵
- Executes dropped EXE
PID:2872 -
\??\c:\rxflfxr.exec:\rxflfxr.exe53⤵
- Executes dropped EXE
PID:2972 -
\??\c:\hnttht.exec:\hnttht.exe54⤵
- Executes dropped EXE
PID:2104 -
\??\c:\nhhtnh.exec:\nhhtnh.exe55⤵
- Executes dropped EXE
PID:1504 -
\??\c:\ddpvj.exec:\ddpvj.exe56⤵
- Executes dropped EXE
PID:1944 -
\??\c:\jppdj.exec:\jppdj.exe57⤵
- Executes dropped EXE
PID:1016 -
\??\c:\fxfrxfr.exec:\fxfrxfr.exe58⤵
- Executes dropped EXE
PID:2624 -
\??\c:\hnthnb.exec:\hnthnb.exe59⤵
- Executes dropped EXE
PID:2184 -
\??\c:\1ttbnt.exec:\1ttbnt.exe60⤵
- Executes dropped EXE
PID:2080 -
\??\c:\9vdjj.exec:\9vdjj.exe61⤵
- Executes dropped EXE
PID:2404 -
\??\c:\dvdjp.exec:\dvdjp.exe62⤵
- Executes dropped EXE
PID:1156 -
\??\c:\rrfxfrx.exec:\rrfxfrx.exe63⤵
- Executes dropped EXE
PID:904 -
\??\c:\lrfrxlr.exec:\lrfrxlr.exe64⤵
- Executes dropped EXE
PID:592 -
\??\c:\5nbtnh.exec:\5nbtnh.exe65⤵
- Executes dropped EXE
PID:1636 -
\??\c:\jvpvj.exec:\jvpvj.exe66⤵PID:1052
-
\??\c:\jdjvd.exec:\jdjvd.exe67⤵PID:1892
-
\??\c:\djpdp.exec:\djpdp.exe68⤵PID:1428
-
\??\c:\llxlrfr.exec:\llxlrfr.exe69⤵PID:836
-
\??\c:\ffrfrxl.exec:\ffrfrxl.exe70⤵PID:1144
-
\??\c:\bhbhbh.exec:\bhbhbh.exe71⤵PID:112
-
\??\c:\3tttnt.exec:\3tttnt.exe72⤵PID:1512
-
\??\c:\jvdjd.exec:\jvdjd.exe73⤵PID:884
-
\??\c:\7pjpd.exec:\7pjpd.exe74⤵PID:2612
-
\??\c:\xlxflrx.exec:\xlxflrx.exe75⤵PID:2240
-
\??\c:\3nnnnh.exec:\3nnnnh.exe76⤵PID:604
-
\??\c:\3nnttb.exec:\3nnttb.exe77⤵PID:2744
-
\??\c:\jvppd.exec:\jvppd.exe78⤵PID:1616
-
\??\c:\jvpjv.exec:\jvpjv.exe79⤵PID:2648
-
\??\c:\9jdjd.exec:\9jdjd.exe80⤵PID:3024
-
\??\c:\1fxfllr.exec:\1fxfllr.exe81⤵PID:2776
-
\??\c:\rxrxrfr.exec:\rxrxrfr.exe82⤵PID:2752
-
\??\c:\htnbhh.exec:\htnbhh.exe83⤵PID:2704
-
\??\c:\hnthbn.exec:\hnthbn.exe84⤵PID:2692
-
\??\c:\vvppd.exec:\vvppd.exe85⤵PID:1288
-
\??\c:\djvdp.exec:\djvdp.exe86⤵PID:484
-
\??\c:\rxllxfr.exec:\rxllxfr.exe87⤵PID:2432
-
\??\c:\rxxrflx.exec:\rxxrflx.exe88⤵
- System Location Discovery: System Language Discovery
PID:2736 -
\??\c:\nbnnth.exec:\nbnnth.exe89⤵PID:2084
-
\??\c:\5jvjd.exec:\5jvjd.exe90⤵PID:2976
-
\??\c:\vdvpv.exec:\vdvpv.exe91⤵PID:1664
-
\??\c:\djpvj.exec:\djpvj.exe92⤵PID:2984
-
\??\c:\5rlrlxl.exec:\5rlrlxl.exe93⤵PID:2860
-
\??\c:\rrxlfrf.exec:\rrxlfrf.exe94⤵PID:2816
-
\??\c:\tththt.exec:\tththt.exe95⤵PID:1484
-
\??\c:\bbntbh.exec:\bbntbh.exe96⤵PID:640
-
\??\c:\5jpjp.exec:\5jpjp.exe97⤵PID:1784
-
\??\c:\rxfrxlx.exec:\rxfrxlx.exe98⤵PID:964
-
\??\c:\rlrxlrr.exec:\rlrxlrr.exe99⤵PID:2168
-
\??\c:\bbhhnt.exec:\bbhhnt.exe100⤵PID:2264
-
\??\c:\ttnbhn.exec:\ttnbhn.exe101⤵PID:2820
-
\??\c:\vddjv.exec:\vddjv.exe102⤵PID:1540
-
\??\c:\jvvvp.exec:\jvvvp.exe103⤵PID:2028
-
\??\c:\rxlrlxf.exec:\rxlrlxf.exe104⤵PID:1568
-
\??\c:\ffflfrf.exec:\ffflfrf.exe105⤵PID:2320
-
\??\c:\tntntt.exec:\tntntt.exe106⤵PID:1708
-
\??\c:\bhnthh.exec:\bhnthh.exe107⤵PID:936
-
\??\c:\jpjpd.exec:\jpjpd.exe108⤵PID:2068
-
\??\c:\djvvd.exec:\djvvd.exe109⤵PID:992
-
\??\c:\xxrfrlx.exec:\xxrfrlx.exe110⤵PID:1912
-
\??\c:\1rflfxl.exec:\1rflfxl.exe111⤵PID:1508
-
\??\c:\bnbhnb.exec:\bnbhnb.exe112⤵PID:2556
-
\??\c:\htthth.exec:\htthth.exe113⤵PID:3004
-
\??\c:\5jjdd.exec:\5jjdd.exe114⤵PID:2152
-
\??\c:\ppjpj.exec:\ppjpj.exe115⤵PID:1100
-
\??\c:\rfxflxl.exec:\rfxflxl.exe116⤵PID:1084
-
\??\c:\ntbntn.exec:\ntbntn.exe117⤵PID:2856
-
\??\c:\nnbnhn.exec:\nnbnhn.exe118⤵PID:2780
-
\??\c:\ppjvj.exec:\ppjvj.exe119⤵PID:1592
-
\??\c:\djjdv.exec:\djjdv.exe120⤵PID:1624
-
\??\c:\xrffrrx.exec:\xrffrrx.exe121⤵PID:2676
-
\??\c:\frxffrr.exec:\frxffrr.exe122⤵PID:2136
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-