Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe
Resource
win7-20240903-en
General
-
Target
47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe
-
Size
83KB
-
MD5
47101f1f654f70d2ac978618874c74c0
-
SHA1
d8f4c2533aefd4da45fda5ba815925c9b7791b1b
-
SHA256
47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895
-
SHA512
f069f82f801f635ddef739f525f66833cda7685d156981299bda7f8d48b7bf461a8d7c0cee9d196ea9f6862f1aaab02f661834dd9d1e1be20be9857b5b9d3d80
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QW:ymb3NkkiQ3mdBjFIIp9L9QrrA8p
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2380-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2868-49-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2868-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2620-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1108-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1788-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1888-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1708-298-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2544 rrrxfll.exe 2380 ttbhbn.exe 2256 jdpvj.exe 2868 3vvdp.exe 2732 llfllff.exe 2912 1bnbth.exe 2772 bhhbtb.exe 2620 ppvjv.exe 2172 jdddp.exe 1108 7jjpj.exe 1788 ddjjd.exe 1888 9lflrfx.exe 1724 3xrxrrf.exe 2788 7ppdd.exe 2044 5jjvd.exe 1312 xrllrff.exe 1424 9tnhtb.exe 2968 1nnbbn.exe 264 pdjvd.exe 1632 xxrfrxr.exe 288 bthhnn.exe 628 ppjjd.exe 2460 5vvpv.exe 1784 3llrlrf.exe 484 bbntbh.exe 776 bhbnnh.exe 2496 ddvvj.exe 3032 1llrlrf.exe 880 5llxlxf.exe 1916 bbhhhb.exe 1708 jvvvd.exe 2544 ffrfrxl.exe 2920 fxrlrxl.exe 2736 nthbtn.exe 2868 ddvdj.exe 2612 pdjjj.exe 2992 5ffrfll.exe 2908 rlxrllx.exe 2656 tnnhtb.exe 2884 1bbbhh.exe 2620 jdjjp.exe 2176 dvdpd.exe 2128 rrfrrrl.exe 1108 flxxxrx.exe 852 3nhtnb.exe 2932 jjjpj.exe 1892 5pjdp.exe 2008 fxrxrxl.exe 2012 rlflflx.exe 1348 bbbtnh.exe 1608 bbthtb.exe 1872 jjjdd.exe 2416 dvppp.exe 1684 rlxflrf.exe 2392 nttnhn.exe 812 nntnbh.exe 1856 dvpdv.exe 3024 pjpvv.exe 1536 rxxfxlx.exe 2460 ffrfrxl.exe 1500 1xffrrx.exe 2432 5tnbhn.exe 2476 7vjjj.exe 2440 ppjvd.exe -
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2380-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1108-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1788-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1888-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1708-298-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flflflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlfxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9btnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2544 2532 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 30 PID 2532 wrote to memory of 2544 2532 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 30 PID 2532 wrote to memory of 2544 2532 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 30 PID 2532 wrote to memory of 2544 2532 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 30 PID 2544 wrote to memory of 2380 2544 rrrxfll.exe 31 PID 2544 wrote to memory of 2380 2544 rrrxfll.exe 31 PID 2544 wrote to memory of 2380 2544 rrrxfll.exe 31 PID 2544 wrote to memory of 2380 2544 rrrxfll.exe 31 PID 2380 wrote to memory of 2256 2380 ttbhbn.exe 32 PID 2380 wrote to memory of 2256 2380 ttbhbn.exe 32 PID 2380 wrote to memory of 2256 2380 ttbhbn.exe 32 PID 2380 wrote to memory of 2256 2380 ttbhbn.exe 32 PID 2256 wrote to memory of 2868 2256 jdpvj.exe 33 PID 2256 wrote to memory of 2868 2256 jdpvj.exe 33 PID 2256 wrote to memory of 2868 2256 jdpvj.exe 33 PID 2256 wrote to memory of 2868 2256 jdpvj.exe 33 PID 2868 wrote to memory of 2732 2868 3vvdp.exe 34 PID 2868 wrote to memory of 2732 2868 3vvdp.exe 34 PID 2868 wrote to memory of 2732 2868 3vvdp.exe 34 PID 2868 wrote to memory of 2732 2868 3vvdp.exe 34 PID 2732 wrote to memory of 2912 2732 llfllff.exe 35 PID 2732 wrote to memory of 2912 2732 llfllff.exe 35 PID 2732 wrote to memory of 2912 2732 llfllff.exe 35 PID 2732 wrote to memory of 2912 2732 llfllff.exe 35 PID 2912 wrote to memory of 2772 2912 1bnbth.exe 36 PID 2912 wrote to memory of 2772 2912 1bnbth.exe 36 PID 2912 wrote to memory of 2772 2912 1bnbth.exe 36 PID 2912 wrote to memory of 2772 2912 1bnbth.exe 36 PID 2772 wrote to memory of 2620 2772 bhhbtb.exe 37 PID 2772 wrote to memory of 2620 2772 bhhbtb.exe 37 PID 2772 wrote to memory of 2620 2772 bhhbtb.exe 37 PID 2772 wrote to memory of 2620 2772 bhhbtb.exe 37 PID 2620 wrote to memory of 2172 2620 ppvjv.exe 38 PID 2620 wrote to memory of 2172 2620 ppvjv.exe 38 PID 2620 wrote to memory of 2172 2620 ppvjv.exe 38 PID 2620 wrote to memory of 2172 2620 ppvjv.exe 38 PID 2172 wrote to memory of 1108 2172 jdddp.exe 39 PID 2172 wrote to memory of 1108 2172 jdddp.exe 39 PID 2172 wrote to memory of 1108 2172 jdddp.exe 39 PID 2172 wrote to memory of 1108 2172 jdddp.exe 39 PID 1108 wrote to memory of 1788 1108 7jjpj.exe 40 PID 1108 wrote to memory of 1788 1108 7jjpj.exe 40 PID 1108 wrote to memory of 1788 1108 7jjpj.exe 40 PID 1108 wrote to memory of 1788 1108 7jjpj.exe 40 PID 1788 wrote to memory of 1888 1788 ddjjd.exe 41 PID 1788 wrote to memory of 1888 1788 ddjjd.exe 41 PID 1788 wrote to memory of 1888 1788 ddjjd.exe 41 PID 1788 wrote to memory of 1888 1788 ddjjd.exe 41 PID 1888 wrote to memory of 1724 1888 9lflrfx.exe 42 PID 1888 wrote to memory of 1724 1888 9lflrfx.exe 42 PID 1888 wrote to memory of 1724 1888 9lflrfx.exe 42 PID 1888 wrote to memory of 1724 1888 9lflrfx.exe 42 PID 1724 wrote to memory of 2788 1724 3xrxrrf.exe 43 PID 1724 wrote to memory of 2788 1724 3xrxrrf.exe 43 PID 1724 wrote to memory of 2788 1724 3xrxrrf.exe 43 PID 1724 wrote to memory of 2788 1724 3xrxrrf.exe 43 PID 2788 wrote to memory of 2044 2788 7ppdd.exe 44 PID 2788 wrote to memory of 2044 2788 7ppdd.exe 44 PID 2788 wrote to memory of 2044 2788 7ppdd.exe 44 PID 2788 wrote to memory of 2044 2788 7ppdd.exe 44 PID 2044 wrote to memory of 1312 2044 5jjvd.exe 45 PID 2044 wrote to memory of 1312 2044 5jjvd.exe 45 PID 2044 wrote to memory of 1312 2044 5jjvd.exe 45 PID 2044 wrote to memory of 1312 2044 5jjvd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe"C:\Users\Admin\AppData\Local\Temp\47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\rrrxfll.exec:\rrrxfll.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\ttbhbn.exec:\ttbhbn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\jdpvj.exec:\jdpvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\3vvdp.exec:\3vvdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\llfllff.exec:\llfllff.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\1bnbth.exec:\1bnbth.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\bhhbtb.exec:\bhhbtb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\ppvjv.exec:\ppvjv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\jdddp.exec:\jdddp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\7jjpj.exec:\7jjpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\ddjjd.exec:\ddjjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\9lflrfx.exec:\9lflrfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\3xrxrrf.exec:\3xrxrrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\7ppdd.exec:\7ppdd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\5jjvd.exec:\5jjvd.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\xrllrff.exec:\xrllrff.exe17⤵
- Executes dropped EXE
PID:1312 -
\??\c:\9tnhtb.exec:\9tnhtb.exe18⤵
- Executes dropped EXE
PID:1424 -
\??\c:\1nnbbn.exec:\1nnbbn.exe19⤵
- Executes dropped EXE
PID:2968 -
\??\c:\pdjvd.exec:\pdjvd.exe20⤵
- Executes dropped EXE
PID:264 -
\??\c:\xxrfrxr.exec:\xxrfrxr.exe21⤵
- Executes dropped EXE
PID:1632 -
\??\c:\bthhnn.exec:\bthhnn.exe22⤵
- Executes dropped EXE
PID:288 -
\??\c:\ppjjd.exec:\ppjjd.exe23⤵
- Executes dropped EXE
PID:628 -
\??\c:\5vvpv.exec:\5vvpv.exe24⤵
- Executes dropped EXE
PID:2460 -
\??\c:\3llrlrf.exec:\3llrlrf.exe25⤵
- Executes dropped EXE
PID:1784 -
\??\c:\bbntbh.exec:\bbntbh.exe26⤵
- Executes dropped EXE
PID:484 -
\??\c:\bhbnnh.exec:\bhbnnh.exe27⤵
- Executes dropped EXE
PID:776 -
\??\c:\ddvvj.exec:\ddvvj.exe28⤵
- Executes dropped EXE
PID:2496 -
\??\c:\1llrlrf.exec:\1llrlrf.exe29⤵
- Executes dropped EXE
PID:3032 -
\??\c:\5llxlxf.exec:\5llxlxf.exe30⤵
- Executes dropped EXE
PID:880 -
\??\c:\bbhhhb.exec:\bbhhhb.exe31⤵
- Executes dropped EXE
PID:1916 -
\??\c:\jvvvd.exec:\jvvvd.exe32⤵
- Executes dropped EXE
PID:1708 -
\??\c:\ffrfrxl.exec:\ffrfrxl.exe33⤵
- Executes dropped EXE
PID:2544 -
\??\c:\fxrlrxl.exec:\fxrlrxl.exe34⤵
- Executes dropped EXE
PID:2920 -
\??\c:\nthbtn.exec:\nthbtn.exe35⤵
- Executes dropped EXE
PID:2736 -
\??\c:\ddvdj.exec:\ddvdj.exe36⤵
- Executes dropped EXE
PID:2868 -
\??\c:\pdjjj.exec:\pdjjj.exe37⤵
- Executes dropped EXE
PID:2612 -
\??\c:\5ffrfll.exec:\5ffrfll.exe38⤵
- Executes dropped EXE
PID:2992 -
\??\c:\rlxrllx.exec:\rlxrllx.exe39⤵
- Executes dropped EXE
PID:2908 -
\??\c:\tnnhtb.exec:\tnnhtb.exe40⤵
- Executes dropped EXE
PID:2656 -
\??\c:\1bbbhh.exec:\1bbbhh.exe41⤵
- Executes dropped EXE
PID:2884 -
\??\c:\jdjjp.exec:\jdjjp.exe42⤵
- Executes dropped EXE
PID:2620 -
\??\c:\dvdpd.exec:\dvdpd.exe43⤵
- Executes dropped EXE
PID:2176 -
\??\c:\rrfrrrl.exec:\rrfrrrl.exe44⤵
- Executes dropped EXE
PID:2128 -
\??\c:\flxxxrx.exec:\flxxxrx.exe45⤵
- Executes dropped EXE
PID:1108 -
\??\c:\3nhtnb.exec:\3nhtnb.exe46⤵
- Executes dropped EXE
PID:852 -
\??\c:\jjjpj.exec:\jjjpj.exe47⤵
- Executes dropped EXE
PID:2932 -
\??\c:\5pjdp.exec:\5pjdp.exe48⤵
- Executes dropped EXE
PID:1892 -
\??\c:\fxrxrxl.exec:\fxrxrxl.exe49⤵
- Executes dropped EXE
PID:2008 -
\??\c:\rlflflx.exec:\rlflflx.exe50⤵
- Executes dropped EXE
PID:2012 -
\??\c:\bbbtnh.exec:\bbbtnh.exe51⤵
- Executes dropped EXE
PID:1348 -
\??\c:\bbthtb.exec:\bbthtb.exe52⤵
- Executes dropped EXE
PID:1608 -
\??\c:\jjjdd.exec:\jjjdd.exe53⤵
- Executes dropped EXE
PID:1872 -
\??\c:\dvppp.exec:\dvppp.exe54⤵
- Executes dropped EXE
PID:2416 -
\??\c:\rlxflrf.exec:\rlxflrf.exe55⤵
- Executes dropped EXE
PID:1684 -
\??\c:\nttnhn.exec:\nttnhn.exe56⤵
- Executes dropped EXE
PID:2392 -
\??\c:\nntnbh.exec:\nntnbh.exe57⤵
- Executes dropped EXE
PID:812 -
\??\c:\dvpdv.exec:\dvpdv.exe58⤵
- Executes dropped EXE
PID:1856 -
\??\c:\pjpvv.exec:\pjpvv.exe59⤵
- Executes dropped EXE
PID:3024 -
\??\c:\rxxfxlx.exec:\rxxfxlx.exe60⤵
- Executes dropped EXE
PID:1536 -
\??\c:\ffrfrxl.exec:\ffrfrxl.exe61⤵
- Executes dropped EXE
PID:2460 -
\??\c:\1xffrrx.exec:\1xffrrx.exe62⤵
- Executes dropped EXE
PID:1500 -
\??\c:\5tnbhn.exec:\5tnbhn.exe63⤵
- Executes dropped EXE
PID:2432 -
\??\c:\7vjjj.exec:\7vjjj.exe64⤵
- Executes dropped EXE
PID:2476 -
\??\c:\ppjvd.exec:\ppjvd.exe65⤵
- Executes dropped EXE
PID:2440 -
\??\c:\5fflflf.exec:\5fflflf.exe66⤵PID:2496
-
\??\c:\fxlxrrl.exec:\fxlxrrl.exe67⤵PID:3032
-
\??\c:\bthhth.exec:\bthhth.exe68⤵PID:1560
-
\??\c:\nhnthn.exec:\nhnthn.exe69⤵PID:2104
-
\??\c:\9pjjj.exec:\9pjjj.exe70⤵PID:1916
-
\??\c:\pjdjp.exec:\pjdjp.exe71⤵
- System Location Discovery: System Language Discovery
PID:2108 -
\??\c:\xxfllrx.exec:\xxfllrx.exe72⤵PID:2544
-
\??\c:\9rxrrrx.exec:\9rxrrrx.exe73⤵PID:2748
-
\??\c:\ththth.exec:\ththth.exe74⤵PID:2856
-
\??\c:\bbbthh.exec:\bbbthh.exe75⤵PID:2756
-
\??\c:\hhbthn.exec:\hhbthn.exe76⤵PID:2724
-
\??\c:\jdddd.exec:\jdddd.exe77⤵PID:2168
-
\??\c:\ffrxfrx.exec:\ffrxfrx.exe78⤵PID:2628
-
\??\c:\llffrrf.exec:\llffrrf.exe79⤵PID:2648
-
\??\c:\3tnbnt.exec:\3tnbnt.exe80⤵PID:2728
-
\??\c:\tthhnn.exec:\tthhnn.exe81⤵PID:2332
-
\??\c:\5ppdp.exec:\5ppdp.exe82⤵PID:1716
-
\??\c:\jddjv.exec:\jddjv.exe83⤵PID:1388
-
\??\c:\jdpdd.exec:\jdpdd.exe84⤵
- System Location Discovery: System Language Discovery
PID:272 -
\??\c:\lrlllrl.exec:\lrlllrl.exe85⤵PID:2940
-
\??\c:\xrlrlxf.exec:\xrlrlxf.exe86⤵PID:2364
-
\??\c:\3bnhtb.exec:\3bnhtb.exe87⤵PID:1900
-
\??\c:\9btnth.exec:\9btnth.exe88⤵
- System Location Discovery: System Language Discovery
PID:1272 -
\??\c:\dvvdj.exec:\dvvdj.exe89⤵PID:1152
-
\??\c:\5vvpv.exec:\5vvpv.exe90⤵PID:1508
-
\??\c:\rlffrxf.exec:\rlffrxf.exe91⤵PID:1752
-
\??\c:\9xfrrrf.exec:\9xfrrrf.exe92⤵PID:2944
-
\??\c:\nbhbnh.exec:\nbhbnh.exe93⤵PID:3052
-
\??\c:\hbhtnb.exec:\hbhtnb.exe94⤵PID:1684
-
\??\c:\vjdvp.exec:\vjdvp.exe95⤵PID:2368
-
\??\c:\vppvd.exec:\vppvd.exe96⤵PID:2700
-
\??\c:\fxlxrrl.exec:\fxlxrrl.exe97⤵PID:444
-
\??\c:\lllfflf.exec:\lllfflf.exe98⤵PID:628
-
\??\c:\7hnbtt.exec:\7hnbtt.exe99⤵PID:1664
-
\??\c:\7nhtbn.exec:\7nhtbn.exe100⤵PID:960
-
\??\c:\ttnbhb.exec:\ttnbhb.exe101⤵PID:2224
-
\??\c:\jdppd.exec:\jdppd.exe102⤵PID:1552
-
\??\c:\ddpjj.exec:\ddpjj.exe103⤵PID:1624
-
\??\c:\rlllxxl.exec:\rlllxxl.exe104⤵PID:1480
-
\??\c:\rrfrxfx.exec:\rrfrxfx.exe105⤵PID:1040
-
\??\c:\nbnntb.exec:\nbnntb.exe106⤵PID:1880
-
\??\c:\bbntbn.exec:\bbntbn.exe107⤵PID:2540
-
\??\c:\pjjdd.exec:\pjjdd.exe108⤵PID:2076
-
\??\c:\5vvjv.exec:\5vvjv.exe109⤵PID:2524
-
\??\c:\7xlrrxl.exec:\7xlrrxl.exe110⤵PID:2060
-
\??\c:\9rfrlfr.exec:\9rfrlfr.exe111⤵PID:1996
-
\??\c:\bbttnb.exec:\bbttnb.exe112⤵PID:2748
-
\??\c:\tttbbn.exec:\tttbbn.exe113⤵PID:2740
-
\??\c:\vjjjd.exec:\vjjjd.exe114⤵PID:2916
-
\??\c:\5jjdp.exec:\5jjdp.exe115⤵PID:864
-
\??\c:\7ffllll.exec:\7ffllll.exe116⤵PID:2808
-
\??\c:\1xfllxx.exec:\1xfllxx.exe117⤵PID:1776
-
\??\c:\nnhbnt.exec:\nnhbnt.exe118⤵PID:2884
-
\??\c:\3hbnbb.exec:\3hbnbb.exe119⤵PID:2436
-
\??\c:\ppdpj.exec:\ppdpj.exe120⤵PID:1700
-
\??\c:\vdjvj.exec:\vdjvj.exe121⤵PID:572
-
\??\c:\xrxllxx.exec:\xrxllxx.exe122⤵PID:2564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-