Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe
Resource
win7-20240903-en
General
-
Target
9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe
-
Size
83KB
-
MD5
67099e34768aa6dc60c27c6519ab8850
-
SHA1
9a8144a735fc0398bde5838e4c5fb7ee6dad25b5
-
SHA256
9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167
-
SHA512
977150c14647af428275398f3e95960b099898d982ccb2bb9a89fad6f3cebade1ef30d55bf32a138a2da4fb9ca6df31325c23d1c0aa886a7a942bf02fe046dc4
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QM:ymb3NkkiQ3mdBjFIIp9L9QrrA8n
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/1292-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1720-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/572-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1280-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1900-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3032-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2184-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2224-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1816-279-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2060 vpddj.exe 1720 3pvvp.exe 2020 ddppv.exe 2772 lrffxrf.exe 2904 tbntnh.exe 2752 djjpd.exe 2336 jvdpp.exe 2792 rlfrxxl.exe 2676 lxlrxfr.exe 572 bbtttb.exe 1684 pvpjp.exe 1048 frflfxr.exe 2972 thnbhh.exe 2888 tbhhnt.exe 1280 ddjjp.exe 2932 flrfllr.exe 1900 xffrxlr.exe 3028 nnttbh.exe 3032 ppvpp.exe 2344 jjdjv.exe 2320 fxxfxfr.exe 2348 1ffrlxf.exe 2184 ntbtbh.exe 1308 vpdjp.exe 708 jdpvp.exe 2224 lxxlxxl.exe 2196 htnnhb.exe 3064 1hhthb.exe 1816 pvppj.exe 1692 rfrrfxf.exe 2708 bbhbhn.exe 3044 bbnbnt.exe 2308 djppp.exe 624 5ppdj.exe 2832 lxxlxfx.exe 2380 lrxxrfx.exe 2784 ntbbhn.exe 3068 vpvpp.exe 2760 7vvvj.exe 3020 xxrlffl.exe 2684 xxxrrrf.exe 2848 3nhhhn.exe 2016 bnhbhn.exe 2040 vpddj.exe 236 jpddj.exe 2868 rlxrxxl.exe 1904 xfllxrf.exe 2688 bbnnhh.exe 2956 rlfrlfr.exe 2384 llrxrrx.exe 2976 rfrlrrl.exe 2932 tnbbnn.exe 672 pjpvj.exe 2372 9jddj.exe 2168 pdjpv.exe 556 lfrxfxf.exe 2496 3flfxlx.exe 1000 bbtbhh.exe 2192 ntbbtb.exe 1712 5jpvd.exe 276 jjvdp.exe 848 xlrxlrf.exe 708 rlflfff.exe 380 thtttt.exe -
resource yara_rule behavioral1/memory/1292-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1720-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2336-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/572-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1280-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3032-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1816-279-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlflfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xxfffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlrxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlflfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhttbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrflrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2060 1292 9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe 30 PID 1292 wrote to memory of 2060 1292 9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe 30 PID 1292 wrote to memory of 2060 1292 9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe 30 PID 1292 wrote to memory of 2060 1292 9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe 30 PID 2060 wrote to memory of 1720 2060 vpddj.exe 31 PID 2060 wrote to memory of 1720 2060 vpddj.exe 31 PID 2060 wrote to memory of 1720 2060 vpddj.exe 31 PID 2060 wrote to memory of 1720 2060 vpddj.exe 31 PID 1720 wrote to memory of 2020 1720 3pvvp.exe 32 PID 1720 wrote to memory of 2020 1720 3pvvp.exe 32 PID 1720 wrote to memory of 2020 1720 3pvvp.exe 32 PID 1720 wrote to memory of 2020 1720 3pvvp.exe 32 PID 2020 wrote to memory of 2772 2020 ddppv.exe 33 PID 2020 wrote to memory of 2772 2020 ddppv.exe 33 PID 2020 wrote to memory of 2772 2020 ddppv.exe 33 PID 2020 wrote to memory of 2772 2020 ddppv.exe 33 PID 2772 wrote to memory of 2904 2772 lrffxrf.exe 34 PID 2772 wrote to memory of 2904 2772 lrffxrf.exe 34 PID 2772 wrote to memory of 2904 2772 lrffxrf.exe 34 PID 2772 wrote to memory of 2904 2772 lrffxrf.exe 34 PID 2904 wrote to memory of 2752 2904 tbntnh.exe 35 PID 2904 wrote to memory of 2752 2904 tbntnh.exe 35 PID 2904 wrote to memory of 2752 2904 tbntnh.exe 35 PID 2904 wrote to memory of 2752 2904 tbntnh.exe 35 PID 2752 wrote to memory of 2336 2752 djjpd.exe 36 PID 2752 wrote to memory of 2336 2752 djjpd.exe 36 PID 2752 wrote to memory of 2336 2752 djjpd.exe 36 PID 2752 wrote to memory of 2336 2752 djjpd.exe 36 PID 2336 wrote to memory of 2792 2336 jvdpp.exe 37 PID 2336 wrote to memory of 2792 2336 jvdpp.exe 37 PID 2336 wrote to memory of 2792 2336 jvdpp.exe 37 PID 2336 wrote to memory of 2792 2336 jvdpp.exe 37 PID 2792 wrote to memory of 2676 2792 rlfrxxl.exe 38 PID 2792 wrote to memory of 2676 2792 rlfrxxl.exe 38 PID 2792 wrote to memory of 2676 2792 rlfrxxl.exe 38 PID 2792 wrote to memory of 2676 2792 rlfrxxl.exe 38 PID 2676 wrote to memory of 572 2676 lxlrxfr.exe 39 PID 2676 wrote to memory of 572 2676 lxlrxfr.exe 39 PID 2676 wrote to memory of 572 2676 lxlrxfr.exe 39 PID 2676 wrote to memory of 572 2676 lxlrxfr.exe 39 PID 572 wrote to memory of 1684 572 bbtttb.exe 40 PID 572 wrote to memory of 1684 572 bbtttb.exe 40 PID 572 wrote to memory of 1684 572 bbtttb.exe 40 PID 572 wrote to memory of 1684 572 bbtttb.exe 40 PID 1684 wrote to memory of 1048 1684 pvpjp.exe 41 PID 1684 wrote to memory of 1048 1684 pvpjp.exe 41 PID 1684 wrote to memory of 1048 1684 pvpjp.exe 41 PID 1684 wrote to memory of 1048 1684 pvpjp.exe 41 PID 1048 wrote to memory of 2972 1048 frflfxr.exe 42 PID 1048 wrote to memory of 2972 1048 frflfxr.exe 42 PID 1048 wrote to memory of 2972 1048 frflfxr.exe 42 PID 1048 wrote to memory of 2972 1048 frflfxr.exe 42 PID 2972 wrote to memory of 2888 2972 thnbhh.exe 43 PID 2972 wrote to memory of 2888 2972 thnbhh.exe 43 PID 2972 wrote to memory of 2888 2972 thnbhh.exe 43 PID 2972 wrote to memory of 2888 2972 thnbhh.exe 43 PID 2888 wrote to memory of 1280 2888 tbhhnt.exe 44 PID 2888 wrote to memory of 1280 2888 tbhhnt.exe 44 PID 2888 wrote to memory of 1280 2888 tbhhnt.exe 44 PID 2888 wrote to memory of 1280 2888 tbhhnt.exe 44 PID 1280 wrote to memory of 2932 1280 ddjjp.exe 45 PID 1280 wrote to memory of 2932 1280 ddjjp.exe 45 PID 1280 wrote to memory of 2932 1280 ddjjp.exe 45 PID 1280 wrote to memory of 2932 1280 ddjjp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe"C:\Users\Admin\AppData\Local\Temp\9729c5c4375579bc75f478d389ee42305aacb2cf555baa5f53d520a096ead167N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\vpddj.exec:\vpddj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\3pvvp.exec:\3pvvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\ddppv.exec:\ddppv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\lrffxrf.exec:\lrffxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\tbntnh.exec:\tbntnh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\djjpd.exec:\djjpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\jvdpp.exec:\jvdpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\rlfrxxl.exec:\rlfrxxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\lxlrxfr.exec:\lxlrxfr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\bbtttb.exec:\bbtttb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\pvpjp.exec:\pvpjp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\frflfxr.exec:\frflfxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\thnbhh.exec:\thnbhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\tbhhnt.exec:\tbhhnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\ddjjp.exec:\ddjjp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\flrfllr.exec:\flrfllr.exe17⤵
- Executes dropped EXE
PID:2932 -
\??\c:\xffrxlr.exec:\xffrxlr.exe18⤵
- Executes dropped EXE
PID:1900 -
\??\c:\nnttbh.exec:\nnttbh.exe19⤵
- Executes dropped EXE
PID:3028 -
\??\c:\ppvpp.exec:\ppvpp.exe20⤵
- Executes dropped EXE
PID:3032 -
\??\c:\jjdjv.exec:\jjdjv.exe21⤵
- Executes dropped EXE
PID:2344 -
\??\c:\fxxfxfr.exec:\fxxfxfr.exe22⤵
- Executes dropped EXE
PID:2320 -
\??\c:\1ffrlxf.exec:\1ffrlxf.exe23⤵
- Executes dropped EXE
PID:2348 -
\??\c:\ntbtbh.exec:\ntbtbh.exe24⤵
- Executes dropped EXE
PID:2184 -
\??\c:\vpdjp.exec:\vpdjp.exe25⤵
- Executes dropped EXE
PID:1308 -
\??\c:\jdpvp.exec:\jdpvp.exe26⤵
- Executes dropped EXE
PID:708 -
\??\c:\lxxlxxl.exec:\lxxlxxl.exe27⤵
- Executes dropped EXE
PID:2224 -
\??\c:\htnnhb.exec:\htnnhb.exe28⤵
- Executes dropped EXE
PID:2196 -
\??\c:\1hhthb.exec:\1hhthb.exe29⤵
- Executes dropped EXE
PID:3064 -
\??\c:\pvppj.exec:\pvppj.exe30⤵
- Executes dropped EXE
PID:1816 -
\??\c:\rfrrfxf.exec:\rfrrfxf.exe31⤵
- Executes dropped EXE
PID:1692 -
\??\c:\bbhbhn.exec:\bbhbhn.exe32⤵
- Executes dropped EXE
PID:2708 -
\??\c:\bbnbnt.exec:\bbnbnt.exe33⤵
- Executes dropped EXE
PID:3044 -
\??\c:\djppp.exec:\djppp.exe34⤵
- Executes dropped EXE
PID:2308 -
\??\c:\5ppdj.exec:\5ppdj.exe35⤵
- Executes dropped EXE
PID:624 -
\??\c:\lxxlxfx.exec:\lxxlxfx.exe36⤵
- Executes dropped EXE
PID:2832 -
\??\c:\lrxxrfx.exec:\lrxxrfx.exe37⤵
- Executes dropped EXE
PID:2380 -
\??\c:\ntbbhn.exec:\ntbbhn.exe38⤵
- Executes dropped EXE
PID:2784 -
\??\c:\vpvpp.exec:\vpvpp.exe39⤵
- Executes dropped EXE
PID:3068 -
\??\c:\7vvvj.exec:\7vvvj.exe40⤵
- Executes dropped EXE
PID:2760 -
\??\c:\xxrlffl.exec:\xxrlffl.exe41⤵
- Executes dropped EXE
PID:3020 -
\??\c:\xxxrrrf.exec:\xxxrrrf.exe42⤵
- Executes dropped EXE
PID:2684 -
\??\c:\3nhhhn.exec:\3nhhhn.exe43⤵
- Executes dropped EXE
PID:2848 -
\??\c:\bnhbhn.exec:\bnhbhn.exe44⤵
- Executes dropped EXE
PID:2016 -
\??\c:\vpddj.exec:\vpddj.exe45⤵
- Executes dropped EXE
PID:2040 -
\??\c:\jpddj.exec:\jpddj.exe46⤵
- Executes dropped EXE
PID:236 -
\??\c:\rlxrxxl.exec:\rlxrxxl.exe47⤵
- Executes dropped EXE
PID:2868 -
\??\c:\xfllxrf.exec:\xfllxrf.exe48⤵
- Executes dropped EXE
PID:1904 -
\??\c:\bbnnhh.exec:\bbnnhh.exe49⤵
- Executes dropped EXE
PID:2688 -
\??\c:\rlfrlfr.exec:\rlfrlfr.exe50⤵
- Executes dropped EXE
PID:2956 -
\??\c:\llrxrrx.exec:\llrxrrx.exe51⤵
- Executes dropped EXE
PID:2384 -
\??\c:\rfrlrrl.exec:\rfrlrrl.exe52⤵
- Executes dropped EXE
PID:2976 -
\??\c:\tnbbnn.exec:\tnbbnn.exe53⤵
- Executes dropped EXE
PID:2932 -
\??\c:\pjpvj.exec:\pjpvj.exe54⤵
- Executes dropped EXE
PID:672 -
\??\c:\9jddj.exec:\9jddj.exe55⤵
- Executes dropped EXE
PID:2372 -
\??\c:\pdjpv.exec:\pdjpv.exe56⤵
- Executes dropped EXE
PID:2168 -
\??\c:\lfrxfxf.exec:\lfrxfxf.exe57⤵
- Executes dropped EXE
PID:556 -
\??\c:\3flfxlx.exec:\3flfxlx.exe58⤵
- Executes dropped EXE
PID:2496 -
\??\c:\bbtbhh.exec:\bbtbhh.exe59⤵
- Executes dropped EXE
PID:1000 -
\??\c:\ntbbtb.exec:\ntbbtb.exe60⤵
- Executes dropped EXE
PID:2192 -
\??\c:\5jpvd.exec:\5jpvd.exe61⤵
- Executes dropped EXE
PID:1712 -
\??\c:\jjvdp.exec:\jjvdp.exe62⤵
- Executes dropped EXE
PID:276 -
\??\c:\xlrxlrf.exec:\xlrxlrf.exe63⤵
- Executes dropped EXE
PID:848 -
\??\c:\rlflfff.exec:\rlflfff.exe64⤵
- Executes dropped EXE
PID:708 -
\??\c:\thtttt.exec:\thtttt.exe65⤵
- Executes dropped EXE
PID:380 -
\??\c:\nnhtnh.exec:\nnhtnh.exe66⤵PID:2368
-
\??\c:\dvdjd.exec:\dvdjd.exe67⤵PID:2196
-
\??\c:\ppjvj.exec:\ppjvj.exe68⤵PID:3064
-
\??\c:\rrxxlrf.exec:\rrxxlrf.exe69⤵PID:2116
-
\??\c:\lxllrff.exec:\lxllrff.exe70⤵PID:1292
-
\??\c:\1thntb.exec:\1thntb.exe71⤵PID:320
-
\??\c:\hbtnhb.exec:\hbtnhb.exe72⤵PID:2708
-
\??\c:\jpjvp.exec:\jpjvp.exe73⤵PID:2920
-
\??\c:\xrlxlrx.exec:\xrlxlrx.exe74⤵
- System Location Discovery: System Language Discovery
PID:2388 -
\??\c:\1rlfrxr.exec:\1rlfrxr.exe75⤵PID:2824
-
\??\c:\9nnbnn.exec:\9nnbnn.exe76⤵PID:1600
-
\??\c:\bnbtnn.exec:\bnbtnn.exe77⤵PID:2828
-
\??\c:\jdpvj.exec:\jdpvj.exe78⤵PID:2872
-
\??\c:\vvdvp.exec:\vvdvp.exe79⤵PID:2916
-
\??\c:\llxfllx.exec:\llxfllx.exe80⤵PID:2884
-
\??\c:\hnhhth.exec:\hnhhth.exe81⤵PID:2664
-
\??\c:\thhbnt.exec:\thhbnt.exe82⤵PID:2672
-
\??\c:\ttnbhh.exec:\ttnbhh.exe83⤵PID:2656
-
\??\c:\pjdpj.exec:\pjdpj.exe84⤵PID:2584
-
\??\c:\vpppv.exec:\vpppv.exe85⤵PID:2008
-
\??\c:\rxrxxrl.exec:\rxrxxrl.exe86⤵PID:1624
-
\??\c:\fffxlrx.exec:\fffxlrx.exe87⤵
- System Location Discovery: System Language Discovery
PID:1788 -
\??\c:\5hhhht.exec:\5hhhht.exe88⤵PID:1048
-
\??\c:\nthtbt.exec:\nthtbt.exe89⤵PID:2948
-
\??\c:\pvvvd.exec:\pvvvd.exe90⤵PID:2532
-
\??\c:\lxllrfl.exec:\lxllrfl.exe91⤵PID:2968
-
\??\c:\xxrxlrx.exec:\xxrxlrx.exe92⤵PID:2460
-
\??\c:\tthnnb.exec:\tthnnb.exe93⤵PID:1456
-
\??\c:\bbtbbh.exec:\bbtbbh.exe94⤵PID:1860
-
\??\c:\dvdjp.exec:\dvdjp.exe95⤵PID:372
-
\??\c:\dvjpd.exec:\dvjpd.exe96⤵PID:3032
-
\??\c:\rlffrxf.exec:\rlffrxf.exe97⤵PID:2724
-
\??\c:\xrxfrfr.exec:\xrxfrfr.exe98⤵PID:1276
-
\??\c:\rrllxlr.exec:\rrllxlr.exe99⤵PID:2112
-
\??\c:\ttnhtt.exec:\ttnhtt.exe100⤵PID:2348
-
\??\c:\9tthtt.exec:\9tthtt.exe101⤵PID:2284
-
\??\c:\3djjd.exec:\3djjd.exe102⤵PID:2484
-
\??\c:\1vjjp.exec:\1vjjp.exe103⤵PID:568
-
\??\c:\9xlxffx.exec:\9xlxffx.exe104⤵PID:2220
-
\??\c:\rlrflfl.exec:\rlrflfl.exe105⤵PID:2224
-
\??\c:\xfrrlfl.exec:\xfrrlfl.exe106⤵PID:2960
-
\??\c:\hbtttb.exec:\hbtttb.exe107⤵PID:2188
-
\??\c:\9thtbh.exec:\9thtbh.exe108⤵PID:2576
-
\??\c:\1dvdp.exec:\1dvdp.exe109⤵PID:2420
-
\??\c:\pvjjd.exec:\pvjjd.exe110⤵PID:2712
-
\??\c:\llrrllx.exec:\llrrllx.exe111⤵PID:2292
-
\??\c:\xxrxlrf.exec:\xxrxlrf.exe112⤵PID:2924
-
\??\c:\bntbnt.exec:\bntbnt.exe113⤵PID:2324
-
\??\c:\btbhhn.exec:\btbhhn.exe114⤵PID:2840
-
\??\c:\1dddp.exec:\1dddp.exe115⤵PID:2592
-
\??\c:\jvdjv.exec:\jvdjv.exe116⤵PID:2832
-
\??\c:\llfrrrx.exec:\llfrrrx.exe117⤵PID:2864
-
\??\c:\3lflrrf.exec:\3lflrrf.exe118⤵PID:2784
-
\??\c:\tttbhh.exec:\tttbhh.exe119⤵PID:2892
-
\??\c:\bbbbbt.exec:\bbbbbt.exe120⤵PID:2756
-
\??\c:\btnbnn.exec:\btnbnn.exe121⤵PID:3020
-
\??\c:\7dpvj.exec:\7dpvj.exe122⤵PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-