Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 06:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe
Resource
win7-20240729-en
7 signatures
120 seconds
General
-
Target
a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe
-
Size
60KB
-
MD5
80ff208361bb8210c11f7d7980cbd226
-
SHA1
5b87c00690251037794ca57dce8cb35586dc1bb1
-
SHA256
a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca
-
SHA512
e3102ec13d873caf6cdd90bf21f53c2bfd810b4b65f7944ca8d5bdfbeb5c1763d76e6305d764ebb09e0680e511bf24376a3ac36adfd4fbd63d27c77c4e88d052
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIm2hR0fF:ymb3NkkiQ3mdBjFIsIrhRkF
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2780-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2720-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/348-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1228-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2520-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1304-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1492-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2780 xfrxlfx.exe 2836 htnhtb.exe 2752 jpvjp.exe 2740 5frflrf.exe 2604 jpjjv.exe 2632 jpvdv.exe 592 fflxflx.exe 2548 bbnbnn.exe 2368 jdpvp.exe 2208 3rllxff.exe 2288 lrfrrlr.exe 2864 ttbthh.exe 348 bhnbnn.exe 1644 vjpdv.exe 600 xfrfrxl.exe 1228 bbntbb.exe 2268 bbnbhn.exe 2348 jppdv.exe 3064 ffrxlrx.exe 2520 frlfrxf.exe 1936 nnhhbn.exe 1304 9bnbhn.exe 652 1dpdj.exe 2904 5vpdp.exe 1492 3fxfrxf.exe 2412 bhnnht.exe 1880 ddjdp.exe 2068 vvjpj.exe 912 xfrfrlf.exe 2720 5thhnn.exe 2796 bhbhhh.exe 1524 tbnnhh.exe 2708 dddpj.exe 2812 3lxfxxl.exe 2620 1rffflx.exe 2576 bbhntn.exe 2696 3bbhnn.exe 2388 ppvvp.exe 1464 vvdjv.exe 2552 3xlrrlx.exe 2040 llxxrxf.exe 2396 5nbnnb.exe 2032 3vpvd.exe 2204 xlrlrxf.exe 284 3xlfxfr.exe 2116 tttthh.exe 2872 tttnbh.exe 1688 ppdjj.exe 1892 ffxrxfl.exe 2332 1ffxlfl.exe 484 tnnthn.exe 1768 hhntnn.exe 320 ddpvd.exe 1144 1jppp.exe 860 9xxlflx.exe 2316 rlffrrx.exe 2520 nthhth.exe 1936 bttbhb.exe 296 pjddv.exe 1176 vpdjv.exe 1696 xrxfllx.exe 904 llflfll.exe 2140 ttbhnb.exe 1740 5thhtb.exe -
resource yara_rule behavioral1/memory/2780-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/348-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1228-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1304-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1492-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-276-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-302-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5htnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxfrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbnbt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2780 2720 a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe 30 PID 2720 wrote to memory of 2780 2720 a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe 30 PID 2720 wrote to memory of 2780 2720 a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe 30 PID 2720 wrote to memory of 2780 2720 a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe 30 PID 2780 wrote to memory of 2836 2780 xfrxlfx.exe 31 PID 2780 wrote to memory of 2836 2780 xfrxlfx.exe 31 PID 2780 wrote to memory of 2836 2780 xfrxlfx.exe 31 PID 2780 wrote to memory of 2836 2780 xfrxlfx.exe 31 PID 2836 wrote to memory of 2752 2836 htnhtb.exe 32 PID 2836 wrote to memory of 2752 2836 htnhtb.exe 32 PID 2836 wrote to memory of 2752 2836 htnhtb.exe 32 PID 2836 wrote to memory of 2752 2836 htnhtb.exe 32 PID 2752 wrote to memory of 2740 2752 jpvjp.exe 33 PID 2752 wrote to memory of 2740 2752 jpvjp.exe 33 PID 2752 wrote to memory of 2740 2752 jpvjp.exe 33 PID 2752 wrote to memory of 2740 2752 jpvjp.exe 33 PID 2740 wrote to memory of 2604 2740 5frflrf.exe 34 PID 2740 wrote to memory of 2604 2740 5frflrf.exe 34 PID 2740 wrote to memory of 2604 2740 5frflrf.exe 34 PID 2740 wrote to memory of 2604 2740 5frflrf.exe 34 PID 2604 wrote to memory of 2632 2604 jpjjv.exe 35 PID 2604 wrote to memory of 2632 2604 jpjjv.exe 35 PID 2604 wrote to memory of 2632 2604 jpjjv.exe 35 PID 2604 wrote to memory of 2632 2604 jpjjv.exe 35 PID 2632 wrote to memory of 592 2632 jpvdv.exe 36 PID 2632 wrote to memory of 592 2632 jpvdv.exe 36 PID 2632 wrote to memory of 592 2632 jpvdv.exe 36 PID 2632 wrote to memory of 592 2632 jpvdv.exe 36 PID 592 wrote to memory of 2548 592 fflxflx.exe 37 PID 592 wrote to memory of 2548 592 fflxflx.exe 37 PID 592 wrote to memory of 2548 592 fflxflx.exe 37 PID 592 wrote to memory of 2548 592 fflxflx.exe 37 PID 2548 wrote to memory of 2368 2548 bbnbnn.exe 38 PID 2548 wrote to memory of 2368 2548 bbnbnn.exe 38 PID 2548 wrote to memory of 2368 2548 bbnbnn.exe 38 PID 2548 wrote to memory of 2368 2548 bbnbnn.exe 38 PID 2368 wrote to memory of 2208 2368 jdpvp.exe 39 PID 2368 wrote to memory of 2208 2368 jdpvp.exe 39 PID 2368 wrote to memory of 2208 2368 jdpvp.exe 39 PID 2368 wrote to memory of 2208 2368 jdpvp.exe 39 PID 2208 wrote to memory of 2288 2208 3rllxff.exe 40 PID 2208 wrote to memory of 2288 2208 3rllxff.exe 40 PID 2208 wrote to memory of 2288 2208 3rllxff.exe 40 PID 2208 wrote to memory of 2288 2208 3rllxff.exe 40 PID 2288 wrote to memory of 2864 2288 lrfrrlr.exe 41 PID 2288 wrote to memory of 2864 2288 lrfrrlr.exe 41 PID 2288 wrote to memory of 2864 2288 lrfrrlr.exe 41 PID 2288 wrote to memory of 2864 2288 lrfrrlr.exe 41 PID 2864 wrote to memory of 348 2864 ttbthh.exe 42 PID 2864 wrote to memory of 348 2864 ttbthh.exe 42 PID 2864 wrote to memory of 348 2864 ttbthh.exe 42 PID 2864 wrote to memory of 348 2864 ttbthh.exe 42 PID 348 wrote to memory of 1644 348 bhnbnn.exe 43 PID 348 wrote to memory of 1644 348 bhnbnn.exe 43 PID 348 wrote to memory of 1644 348 bhnbnn.exe 43 PID 348 wrote to memory of 1644 348 bhnbnn.exe 43 PID 1644 wrote to memory of 600 1644 vjpdv.exe 44 PID 1644 wrote to memory of 600 1644 vjpdv.exe 44 PID 1644 wrote to memory of 600 1644 vjpdv.exe 44 PID 1644 wrote to memory of 600 1644 vjpdv.exe 44 PID 600 wrote to memory of 1228 600 xfrfrxl.exe 45 PID 600 wrote to memory of 1228 600 xfrfrxl.exe 45 PID 600 wrote to memory of 1228 600 xfrfrxl.exe 45 PID 600 wrote to memory of 1228 600 xfrfrxl.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe"C:\Users\Admin\AppData\Local\Temp\a62abc3a61ccf5c297f723364067e9dc97662afd0dd1d33b6d992f4d04ebadca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\xfrxlfx.exec:\xfrxlfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\htnhtb.exec:\htnhtb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\jpvjp.exec:\jpvjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\5frflrf.exec:\5frflrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\jpjjv.exec:\jpjjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\jpvdv.exec:\jpvdv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\fflxflx.exec:\fflxflx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\bbnbnn.exec:\bbnbnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\jdpvp.exec:\jdpvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\3rllxff.exec:\3rllxff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\lrfrrlr.exec:\lrfrrlr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\ttbthh.exec:\ttbthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\bhnbnn.exec:\bhnbnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:348 -
\??\c:\vjpdv.exec:\vjpdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\xfrfrxl.exec:\xfrfrxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:600 -
\??\c:\bbntbb.exec:\bbntbb.exe17⤵
- Executes dropped EXE
PID:1228 -
\??\c:\bbnbhn.exec:\bbnbhn.exe18⤵
- Executes dropped EXE
PID:2268 -
\??\c:\jppdv.exec:\jppdv.exe19⤵
- Executes dropped EXE
PID:2348 -
\??\c:\ffrxlrx.exec:\ffrxlrx.exe20⤵
- Executes dropped EXE
PID:3064 -
\??\c:\frlfrxf.exec:\frlfrxf.exe21⤵
- Executes dropped EXE
PID:2520 -
\??\c:\nnhhbn.exec:\nnhhbn.exe22⤵
- Executes dropped EXE
PID:1936 -
\??\c:\9bnbhn.exec:\9bnbhn.exe23⤵
- Executes dropped EXE
PID:1304 -
\??\c:\1dpdj.exec:\1dpdj.exe24⤵
- Executes dropped EXE
PID:652 -
\??\c:\5vpdp.exec:\5vpdp.exe25⤵
- Executes dropped EXE
PID:2904 -
\??\c:\3fxfrxf.exec:\3fxfrxf.exe26⤵
- Executes dropped EXE
PID:1492 -
\??\c:\bhnnht.exec:\bhnnht.exe27⤵
- Executes dropped EXE
PID:2412 -
\??\c:\ddjdp.exec:\ddjdp.exe28⤵
- Executes dropped EXE
PID:1880 -
\??\c:\vvjpj.exec:\vvjpj.exe29⤵
- Executes dropped EXE
PID:2068 -
\??\c:\xfrfrlf.exec:\xfrfrlf.exe30⤵
- Executes dropped EXE
PID:912 -
\??\c:\5thhnn.exec:\5thhnn.exe31⤵
- Executes dropped EXE
PID:2720 -
\??\c:\bhbhhh.exec:\bhbhhh.exe32⤵
- Executes dropped EXE
PID:2796 -
\??\c:\tbnnhh.exec:\tbnnhh.exe33⤵
- Executes dropped EXE
PID:1524 -
\??\c:\dddpj.exec:\dddpj.exe34⤵
- Executes dropped EXE
PID:2708 -
\??\c:\3lxfxxl.exec:\3lxfxxl.exe35⤵
- Executes dropped EXE
PID:2812 -
\??\c:\1rffflx.exec:\1rffflx.exe36⤵
- Executes dropped EXE
PID:2620 -
\??\c:\bbhntn.exec:\bbhntn.exe37⤵
- Executes dropped EXE
PID:2576 -
\??\c:\3bbhnn.exec:\3bbhnn.exe38⤵
- Executes dropped EXE
PID:2696 -
\??\c:\ppvvp.exec:\ppvvp.exe39⤵
- Executes dropped EXE
PID:2388 -
\??\c:\vvdjv.exec:\vvdjv.exe40⤵
- Executes dropped EXE
PID:1464 -
\??\c:\3xlrrlx.exec:\3xlrrlx.exe41⤵
- Executes dropped EXE
PID:2552 -
\??\c:\llxxrxf.exec:\llxxrxf.exe42⤵
- Executes dropped EXE
PID:2040 -
\??\c:\5nbnnb.exec:\5nbnnb.exe43⤵
- Executes dropped EXE
PID:2396 -
\??\c:\3vpvd.exec:\3vpvd.exe44⤵
- Executes dropped EXE
PID:2032 -
\??\c:\xlrlrxf.exec:\xlrlrxf.exe45⤵
- Executes dropped EXE
PID:2204 -
\??\c:\3xlfxfr.exec:\3xlfxfr.exe46⤵
- Executes dropped EXE
PID:284 -
\??\c:\tttthh.exec:\tttthh.exe47⤵
- Executes dropped EXE
PID:2116 -
\??\c:\tttnbh.exec:\tttnbh.exe48⤵
- Executes dropped EXE
PID:2872 -
\??\c:\ppdjj.exec:\ppdjj.exe49⤵
- Executes dropped EXE
PID:1688 -
\??\c:\ffxrxfl.exec:\ffxrxfl.exe50⤵
- Executes dropped EXE
PID:1892 -
\??\c:\1ffxlfl.exec:\1ffxlfl.exe51⤵
- Executes dropped EXE
PID:2332 -
\??\c:\tnnthn.exec:\tnnthn.exe52⤵
- Executes dropped EXE
PID:484 -
\??\c:\hhntnn.exec:\hhntnn.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
\??\c:\ddpvd.exec:\ddpvd.exe54⤵
- Executes dropped EXE
PID:320 -
\??\c:\1jppp.exec:\1jppp.exe55⤵
- Executes dropped EXE
PID:1144 -
\??\c:\9xxlflx.exec:\9xxlflx.exe56⤵
- Executes dropped EXE
PID:860 -
\??\c:\rlffrrx.exec:\rlffrrx.exe57⤵
- Executes dropped EXE
PID:2316 -
\??\c:\nthhth.exec:\nthhth.exe58⤵
- Executes dropped EXE
PID:2520 -
\??\c:\bttbhb.exec:\bttbhb.exe59⤵
- Executes dropped EXE
PID:1936 -
\??\c:\pjddv.exec:\pjddv.exe60⤵
- Executes dropped EXE
PID:296 -
\??\c:\vpdjv.exec:\vpdjv.exe61⤵
- Executes dropped EXE
PID:1176 -
\??\c:\xrxfllx.exec:\xrxfllx.exe62⤵
- Executes dropped EXE
PID:1696 -
\??\c:\llflfll.exec:\llflfll.exe63⤵
- Executes dropped EXE
PID:904 -
\??\c:\ttbhnb.exec:\ttbhnb.exe64⤵
- Executes dropped EXE
PID:2140 -
\??\c:\5thhtb.exec:\5thhtb.exe65⤵
- Executes dropped EXE
PID:1740 -
\??\c:\jjpvd.exec:\jjpvd.exe66⤵PID:2936
-
\??\c:\lrrfxrl.exec:\lrrfxrl.exe67⤵PID:2852
-
\??\c:\llrrffx.exec:\llrrffx.exe68⤵PID:3044
-
\??\c:\tthnbh.exec:\tthnbh.exe69⤵PID:2980
-
\??\c:\tthhtb.exec:\tthhtb.exe70⤵PID:2800
-
\??\c:\ddpjp.exec:\ddpjp.exe71⤵PID:2724
-
\??\c:\jvdjd.exec:\jvdjd.exe72⤵PID:2680
-
\??\c:\llxfxfr.exec:\llxfxfr.exe73⤵PID:2892
-
\??\c:\rlllrff.exec:\rlllrff.exe74⤵PID:2708
-
\??\c:\9nnntb.exec:\9nnntb.exe75⤵PID:2712
-
\??\c:\thnhhb.exec:\thnhhb.exe76⤵PID:2744
-
\??\c:\djvdd.exec:\djvdd.exe77⤵PID:2404
-
\??\c:\jppjd.exec:\jppjd.exe78⤵PID:1732
-
\??\c:\fllxllr.exec:\fllxllr.exe79⤵PID:276
-
\??\c:\rllrxxf.exec:\rllrxxf.exe80⤵PID:1700
-
\??\c:\5bhntb.exec:\5bhntb.exe81⤵PID:2764
-
\??\c:\7jjvv.exec:\7jjvv.exe82⤵PID:2364
-
\??\c:\jpvpv.exec:\jpvpv.exe83⤵PID:1236
-
\??\c:\llrlrxf.exec:\llrlrxf.exe84⤵PID:2408
-
\??\c:\9llrffr.exec:\9llrffr.exe85⤵PID:2560
-
\??\c:\tntnnt.exec:\tntnnt.exe86⤵PID:1432
-
\??\c:\nbhnbh.exec:\nbhnbh.exe87⤵PID:2864
-
\??\c:\pjjpd.exec:\pjjpd.exe88⤵PID:2112
-
\??\c:\3vddd.exec:\3vddd.exe89⤵PID:2240
-
\??\c:\9frxxxx.exec:\9frxxxx.exe90⤵PID:2096
-
\??\c:\xxfllrx.exec:\xxfllrx.exe91⤵PID:2252
-
\??\c:\3tnntb.exec:\3tnntb.exe92⤵PID:2004
-
\??\c:\hhhnnb.exec:\hhhnnb.exe93⤵PID:2192
-
\??\c:\dpvdd.exec:\dpvdd.exe94⤵PID:2532
-
\??\c:\ppvdp.exec:\ppvdp.exe95⤵PID:2300
-
\??\c:\rrrxfff.exec:\rrrxfff.exe96⤵PID:2188
-
\??\c:\rrrfrxx.exec:\rrrfrxx.exe97⤵PID:2292
-
\??\c:\nhntbh.exec:\nhntbh.exe98⤵PID:1648
-
\??\c:\btbhnb.exec:\btbhnb.exe99⤵PID:1576
-
\??\c:\nnbnnt.exec:\nnbnnt.exe100⤵PID:2464
-
\??\c:\3pvvj.exec:\3pvvj.exe101⤵PID:304
-
\??\c:\ppdvd.exec:\ppdvd.exe102⤵PID:1660
-
\??\c:\5rrxllr.exec:\5rrxllr.exe103⤵PID:1492
-
\??\c:\lrxffff.exec:\lrxffff.exe104⤵PID:1724
-
\??\c:\9hthhh.exec:\9hthhh.exe105⤵PID:3032
-
\??\c:\hbhtnb.exec:\hbhtnb.exe106⤵PID:2504
-
\??\c:\jjppv.exec:\jjppv.exe107⤵PID:1028
-
\??\c:\vdjpv.exec:\vdjpv.exe108⤵PID:2328
-
\??\c:\ffrrflr.exec:\ffrrflr.exe109⤵PID:2720
-
\??\c:\fxxlrxf.exec:\fxxlrxf.exe110⤵PID:2788
-
\??\c:\1nbbhn.exec:\1nbbhn.exe111⤵PID:2844
-
\??\c:\1bhnnt.exec:\1bhnnt.exe112⤵PID:2580
-
\??\c:\7vjpd.exec:\7vjpd.exe113⤵PID:2600
-
\??\c:\vdjpd.exec:\vdjpd.exe114⤵PID:808
-
\??\c:\rrxlrlr.exec:\rrxlrlr.exe115⤵PID:2880
-
\??\c:\rrfrfrx.exec:\rrfrfrx.exe116⤵PID:3008
-
\??\c:\7nhbnn.exec:\7nhbnn.exe117⤵PID:3024
-
\??\c:\7tbtbn.exec:\7tbtbn.exe118⤵PID:3020
-
\??\c:\ddddv.exec:\ddddv.exe119⤵PID:592
-
\??\c:\9dppv.exec:\9dppv.exe120⤵PID:1956
-
\??\c:\rxrxflr.exec:\rxrxflr.exe121⤵
- System Location Discovery: System Language Discovery
PID:2176 -
\??\c:\llxlxrl.exec:\llxlxrl.exe122⤵PID:2216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-