Analysis
-
max time kernel
152s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 04:13
Static task
static1
Behavioral task
behavioral1
Sample
af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe
Resource
win7-20241010-en
General
-
Target
af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe
-
Size
85KB
-
MD5
eb493809b3bf5ae3d7d79a22679bf935
-
SHA1
0297a3f408bdabb495fc782893ae78530e2f522a
-
SHA256
af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f
-
SHA512
e7c9f80c2caf227d778876183981bf415a1bde61ff201b7137b60ae4349e77fcd26d870b6cab0fd9b3fb03776bf7eb3919b312dd44c2f5cbd6dd21ed984ebf10
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q4Shc:ymb3NkkiQ3mdBjFIIp9L9QrrA8LSW
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/1236-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/760-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2444-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/264-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/696-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/564-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1532-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2412-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/900-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/756-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/760-306-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1236 bvxdp.exe 2948 dpjnh.exe 2960 djjfpp.exe 2968 lnvltt.exe 2512 btvtl.exe 2828 djhhdrl.exe 2444 jrxpnrl.exe 264 pbhlbfh.exe 1192 pbxbj.exe 1652 xdhdnr.exe 2136 tbdflnb.exe 1952 pfdjjx.exe 2460 xjxfhr.exe 2676 vdvptx.exe 696 tddbr.exe 564 lrrhtnx.exe 2216 dxjtx.exe 1532 rfxppr.exe 2412 rjffnhr.exe 2284 fjltd.exe 900 jdvbrjf.exe 756 ffjlfv.exe 1420 jppnpj.exe 1540 hjdldnr.exe 2764 ntblrb.exe 1708 fndhp.exe 2612 jnjhdxn.exe 1728 lrrpj.exe 2632 vppnpd.exe 2624 dvrxb.exe 760 tdpfph.exe 2128 pvvtv.exe 2948 fnpnb.exe 1612 vnjtdn.exe 2324 pjtxjv.exe 2924 rrjpp.exe 3016 jbhdff.exe 2152 pblxtfl.exe 2864 djlppbx.exe 2820 tbllvbt.exe 2828 bpdtv.exe 1316 rbdnpj.exe 984 rdfvd.exe 1248 tnltlxj.exe 1192 hlvvbjh.exe 1460 tfjtprd.exe 2340 vvrfdfj.exe 432 fphvllt.exe 980 tblxblv.exe 2032 plddph.exe 840 hvpxrdv.exe 1016 dxfnrp.exe 1760 txvnf.exe 2232 nhrvhln.exe 520 xlrfph.exe 2404 pthjljv.exe 2328 tjrfphr.exe 560 fjldrtj.exe 2148 vdnpdp.exe 2468 xprrd.exe 1364 ljrhl.exe 1420 rhvhh.exe 2556 pxlrb.exe 2440 ddrln.exe -
resource yara_rule behavioral1/memory/1236-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/264-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/264-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/264-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/696-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/564-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1532-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/900-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/756-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-306-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rljjbxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddbvtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfdjjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvdtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlbffpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drfbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvjvnpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjnjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthdlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvfhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrbjjfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pplbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtvpnjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blplv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xthnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rltvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdnpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnrffj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvhdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvtjdnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrhdrvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbflnfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbvrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfltjxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfjjnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrbfhnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdbfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjtlbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prhxnjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvtrnpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txdvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnntdfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvvjxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxppr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbfjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhtblf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhxjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tltxrnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbtrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvvfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjrxvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnrjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvdft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdbjrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjdtrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxvdbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trvdfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhtnp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 1236 760 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 30 PID 760 wrote to memory of 1236 760 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 30 PID 760 wrote to memory of 1236 760 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 30 PID 760 wrote to memory of 1236 760 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 30 PID 1236 wrote to memory of 2948 1236 bvxdp.exe 31 PID 1236 wrote to memory of 2948 1236 bvxdp.exe 31 PID 1236 wrote to memory of 2948 1236 bvxdp.exe 31 PID 1236 wrote to memory of 2948 1236 bvxdp.exe 31 PID 2948 wrote to memory of 2960 2948 dpjnh.exe 32 PID 2948 wrote to memory of 2960 2948 dpjnh.exe 32 PID 2948 wrote to memory of 2960 2948 dpjnh.exe 32 PID 2948 wrote to memory of 2960 2948 dpjnh.exe 32 PID 2960 wrote to memory of 2968 2960 djjfpp.exe 33 PID 2960 wrote to memory of 2968 2960 djjfpp.exe 33 PID 2960 wrote to memory of 2968 2960 djjfpp.exe 33 PID 2960 wrote to memory of 2968 2960 djjfpp.exe 33 PID 2968 wrote to memory of 2512 2968 lnvltt.exe 34 PID 2968 wrote to memory of 2512 2968 lnvltt.exe 34 PID 2968 wrote to memory of 2512 2968 lnvltt.exe 34 PID 2968 wrote to memory of 2512 2968 lnvltt.exe 34 PID 2512 wrote to memory of 2828 2512 btvtl.exe 35 PID 2512 wrote to memory of 2828 2512 btvtl.exe 35 PID 2512 wrote to memory of 2828 2512 btvtl.exe 35 PID 2512 wrote to memory of 2828 2512 btvtl.exe 35 PID 2828 wrote to memory of 2444 2828 djhhdrl.exe 36 PID 2828 wrote to memory of 2444 2828 djhhdrl.exe 36 PID 2828 wrote to memory of 2444 2828 djhhdrl.exe 36 PID 2828 wrote to memory of 2444 2828 djhhdrl.exe 36 PID 2444 wrote to memory of 264 2444 jrxpnrl.exe 37 PID 2444 wrote to memory of 264 2444 jrxpnrl.exe 37 PID 2444 wrote to memory of 264 2444 jrxpnrl.exe 37 PID 2444 wrote to memory of 264 2444 jrxpnrl.exe 37 PID 264 wrote to memory of 1192 264 pbhlbfh.exe 38 PID 264 wrote to memory of 1192 264 pbhlbfh.exe 38 PID 264 wrote to memory of 1192 264 pbhlbfh.exe 38 PID 264 wrote to memory of 1192 264 pbhlbfh.exe 38 PID 1192 wrote to memory of 1652 1192 pbxbj.exe 39 PID 1192 wrote to memory of 1652 1192 pbxbj.exe 39 PID 1192 wrote to memory of 1652 1192 pbxbj.exe 39 PID 1192 wrote to memory of 1652 1192 pbxbj.exe 39 PID 1652 wrote to memory of 2136 1652 xdhdnr.exe 40 PID 1652 wrote to memory of 2136 1652 xdhdnr.exe 40 PID 1652 wrote to memory of 2136 1652 xdhdnr.exe 40 PID 1652 wrote to memory of 2136 1652 xdhdnr.exe 40 PID 2136 wrote to memory of 1952 2136 tbdflnb.exe 41 PID 2136 wrote to memory of 1952 2136 tbdflnb.exe 41 PID 2136 wrote to memory of 1952 2136 tbdflnb.exe 41 PID 2136 wrote to memory of 1952 2136 tbdflnb.exe 41 PID 1952 wrote to memory of 2460 1952 pfdjjx.exe 42 PID 1952 wrote to memory of 2460 1952 pfdjjx.exe 42 PID 1952 wrote to memory of 2460 1952 pfdjjx.exe 42 PID 1952 wrote to memory of 2460 1952 pfdjjx.exe 42 PID 2460 wrote to memory of 2676 2460 xjxfhr.exe 43 PID 2460 wrote to memory of 2676 2460 xjxfhr.exe 43 PID 2460 wrote to memory of 2676 2460 xjxfhr.exe 43 PID 2460 wrote to memory of 2676 2460 xjxfhr.exe 43 PID 2676 wrote to memory of 696 2676 vdvptx.exe 44 PID 2676 wrote to memory of 696 2676 vdvptx.exe 44 PID 2676 wrote to memory of 696 2676 vdvptx.exe 44 PID 2676 wrote to memory of 696 2676 vdvptx.exe 44 PID 696 wrote to memory of 564 696 tddbr.exe 45 PID 696 wrote to memory of 564 696 tddbr.exe 45 PID 696 wrote to memory of 564 696 tddbr.exe 45 PID 696 wrote to memory of 564 696 tddbr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe"C:\Users\Admin\AppData\Local\Temp\af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\bvxdp.exec:\bvxdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\dpjnh.exec:\dpjnh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\djjfpp.exec:\djjfpp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\lnvltt.exec:\lnvltt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\btvtl.exec:\btvtl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\djhhdrl.exec:\djhhdrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\jrxpnrl.exec:\jrxpnrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\pbhlbfh.exec:\pbhlbfh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
\??\c:\pbxbj.exec:\pbxbj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\xdhdnr.exec:\xdhdnr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\tbdflnb.exec:\tbdflnb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\pfdjjx.exec:\pfdjjx.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\xjxfhr.exec:\xjxfhr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\vdvptx.exec:\vdvptx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\tddbr.exec:\tddbr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\lrrhtnx.exec:\lrrhtnx.exe17⤵
- Executes dropped EXE
PID:564 -
\??\c:\dxjtx.exec:\dxjtx.exe18⤵
- Executes dropped EXE
PID:2216 -
\??\c:\rfxppr.exec:\rfxppr.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\rjffnhr.exec:\rjffnhr.exe20⤵
- Executes dropped EXE
PID:2412 -
\??\c:\fjltd.exec:\fjltd.exe21⤵
- Executes dropped EXE
PID:2284 -
\??\c:\jdvbrjf.exec:\jdvbrjf.exe22⤵
- Executes dropped EXE
PID:900 -
\??\c:\ffjlfv.exec:\ffjlfv.exe23⤵
- Executes dropped EXE
PID:756 -
\??\c:\jppnpj.exec:\jppnpj.exe24⤵
- Executes dropped EXE
PID:1420 -
\??\c:\hjdldnr.exec:\hjdldnr.exe25⤵
- Executes dropped EXE
PID:1540 -
\??\c:\ntblrb.exec:\ntblrb.exe26⤵
- Executes dropped EXE
PID:2764 -
\??\c:\fndhp.exec:\fndhp.exe27⤵
- Executes dropped EXE
PID:1708 -
\??\c:\jnjhdxn.exec:\jnjhdxn.exe28⤵
- Executes dropped EXE
PID:2612 -
\??\c:\lrrpj.exec:\lrrpj.exe29⤵
- Executes dropped EXE
PID:1728 -
\??\c:\vppnpd.exec:\vppnpd.exe30⤵
- Executes dropped EXE
PID:2632 -
\??\c:\dvrxb.exec:\dvrxb.exe31⤵
- Executes dropped EXE
PID:2624 -
\??\c:\tdpfph.exec:\tdpfph.exe32⤵
- Executes dropped EXE
PID:760 -
\??\c:\pvvtv.exec:\pvvtv.exe33⤵
- Executes dropped EXE
PID:2128 -
\??\c:\fnpnb.exec:\fnpnb.exe34⤵
- Executes dropped EXE
PID:2948 -
\??\c:\vnjtdn.exec:\vnjtdn.exe35⤵
- Executes dropped EXE
PID:1612 -
\??\c:\pjtxjv.exec:\pjtxjv.exe36⤵
- Executes dropped EXE
PID:2324 -
\??\c:\rrjpp.exec:\rrjpp.exe37⤵
- Executes dropped EXE
PID:2924 -
\??\c:\jbhdff.exec:\jbhdff.exe38⤵
- Executes dropped EXE
PID:3016 -
\??\c:\pblxtfl.exec:\pblxtfl.exe39⤵
- Executes dropped EXE
PID:2152 -
\??\c:\djlppbx.exec:\djlppbx.exe40⤵
- Executes dropped EXE
PID:2864 -
\??\c:\tbllvbt.exec:\tbllvbt.exe41⤵
- Executes dropped EXE
PID:2820 -
\??\c:\bpdtv.exec:\bpdtv.exe42⤵
- Executes dropped EXE
PID:2828 -
\??\c:\rbdnpj.exec:\rbdnpj.exe43⤵
- Executes dropped EXE
PID:1316 -
\??\c:\rdfvd.exec:\rdfvd.exe44⤵
- Executes dropped EXE
PID:984 -
\??\c:\tnltlxj.exec:\tnltlxj.exe45⤵
- Executes dropped EXE
PID:1248 -
\??\c:\hlvvbjh.exec:\hlvvbjh.exe46⤵
- Executes dropped EXE
PID:1192 -
\??\c:\tfjtprd.exec:\tfjtprd.exe47⤵
- Executes dropped EXE
PID:1460 -
\??\c:\vvrfdfj.exec:\vvrfdfj.exe48⤵
- Executes dropped EXE
PID:2340 -
\??\c:\fphvllt.exec:\fphvllt.exe49⤵
- Executes dropped EXE
PID:432 -
\??\c:\tblxblv.exec:\tblxblv.exe50⤵
- Executes dropped EXE
PID:980 -
\??\c:\plddph.exec:\plddph.exe51⤵
- Executes dropped EXE
PID:2032 -
\??\c:\hvpxrdv.exec:\hvpxrdv.exe52⤵
- Executes dropped EXE
PID:840 -
\??\c:\dxfnrp.exec:\dxfnrp.exe53⤵
- Executes dropped EXE
PID:1016 -
\??\c:\txvnf.exec:\txvnf.exe54⤵
- Executes dropped EXE
PID:1760 -
\??\c:\nhrvhln.exec:\nhrvhln.exe55⤵
- Executes dropped EXE
PID:2232 -
\??\c:\xlrfph.exec:\xlrfph.exe56⤵
- Executes dropped EXE
PID:520 -
\??\c:\pthjljv.exec:\pthjljv.exe57⤵
- Executes dropped EXE
PID:2404 -
\??\c:\tjrfphr.exec:\tjrfphr.exe58⤵
- Executes dropped EXE
PID:2328 -
\??\c:\fjldrtj.exec:\fjldrtj.exe59⤵
- Executes dropped EXE
PID:560 -
\??\c:\vdnpdp.exec:\vdnpdp.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148 -
\??\c:\xprrd.exec:\xprrd.exe61⤵
- Executes dropped EXE
PID:2468 -
\??\c:\ljrhl.exec:\ljrhl.exe62⤵
- Executes dropped EXE
PID:1364 -
\??\c:\rhvhh.exec:\rhvhh.exe63⤵
- Executes dropped EXE
PID:1420 -
\??\c:\pxlrb.exec:\pxlrb.exe64⤵
- Executes dropped EXE
PID:2556 -
\??\c:\ddrln.exec:\ddrln.exe65⤵
- Executes dropped EXE
PID:2440 -
\??\c:\xpthx.exec:\xpthx.exe66⤵PID:112
-
\??\c:\bnfrjnv.exec:\bnfrjnv.exe67⤵PID:2376
-
\??\c:\jtxnhf.exec:\jtxnhf.exe68⤵PID:1976
-
\??\c:\brntn.exec:\brntn.exe69⤵PID:544
-
\??\c:\vvbxn.exec:\vvbxn.exe70⤵PID:952
-
\??\c:\ffrhnt.exec:\ffrhnt.exe71⤵
- System Location Discovery: System Language Discovery
PID:2288 -
\??\c:\nlvjf.exec:\nlvjf.exe72⤵PID:2432
-
\??\c:\lrjjj.exec:\lrjjj.exe73⤵PID:2212
-
\??\c:\jhjvlvv.exec:\jhjvlvv.exe74⤵PID:760
-
\??\c:\hldbbj.exec:\hldbbj.exe75⤵PID:2952
-
\??\c:\thxfnbb.exec:\thxfnbb.exe76⤵PID:2092
-
\??\c:\fjbrfr.exec:\fjbrfr.exe77⤵PID:2496
-
\??\c:\ljxbhhd.exec:\ljxbhhd.exe78⤵PID:3044
-
\??\c:\hxptl.exec:\hxptl.exe79⤵PID:2848
-
\??\c:\fbfjv.exec:\fbfjv.exe80⤵
- System Location Discovery: System Language Discovery
PID:1804 -
\??\c:\tpfpl.exec:\tpfpl.exe81⤵PID:2152
-
\??\c:\xhllln.exec:\xhllln.exe82⤵PID:2572
-
\??\c:\jvltjt.exec:\jvltjt.exe83⤵PID:2540
-
\??\c:\hpnnfd.exec:\hpnnfd.exe84⤵PID:2784
-
\??\c:\nptrvlh.exec:\nptrvlh.exe85⤵PID:944
-
\??\c:\rffhhb.exec:\rffhhb.exe86⤵PID:984
-
\??\c:\rlftx.exec:\rlftx.exe87⤵PID:1444
-
\??\c:\phnrvrj.exec:\phnrvrj.exe88⤵PID:1192
-
\??\c:\bjvbj.exec:\bjvbj.exe89⤵PID:2580
-
\??\c:\bvfhj.exec:\bvfhj.exe90⤵
- System Location Discovery: System Language Discovery
PID:2344 -
\??\c:\npdfrx.exec:\npdfrx.exe91⤵PID:608
-
\??\c:\bpdjhpj.exec:\bpdjhpj.exe92⤵PID:452
-
\??\c:\hfpdl.exec:\hfpdl.exe93⤵PID:1340
-
\??\c:\dxddj.exec:\dxddj.exe94⤵PID:2500
-
\??\c:\rpldp.exec:\rpldp.exe95⤵PID:2292
-
\??\c:\lnhrn.exec:\lnhrn.exe96⤵PID:1168
-
\??\c:\fhbrrlt.exec:\fhbrrlt.exe97⤵PID:2216
-
\??\c:\ljdfn.exec:\ljdfn.exe98⤵PID:2464
-
\??\c:\fxlxrjh.exec:\fxlxrjh.exe99⤵PID:2280
-
\??\c:\fnbdxb.exec:\fnbdxb.exe100⤵PID:2228
-
\??\c:\rlvfl.exec:\rlvfl.exe101⤵PID:912
-
\??\c:\bvrxpf.exec:\bvrxpf.exe102⤵PID:1868
-
\??\c:\hjdtrf.exec:\hjdtrf.exe103⤵
- System Location Discovery: System Language Discovery
PID:756 -
\??\c:\htrvh.exec:\htrvh.exe104⤵PID:1356
-
\??\c:\nftpbnj.exec:\nftpbnj.exe105⤵PID:2576
-
\??\c:\pvprrxn.exec:\pvprrxn.exe106⤵PID:1764
-
\??\c:\lhlxr.exec:\lhlxr.exe107⤵PID:632
-
\??\c:\tthjvnn.exec:\tthjvnn.exe108⤵PID:2780
-
\??\c:\lvtrnpb.exec:\lvtrnpb.exe109⤵
- System Location Discovery: System Language Discovery
PID:2448 -
\??\c:\plpdbfb.exec:\plpdbfb.exe110⤵PID:1820
-
\??\c:\bvbfrr.exec:\bvbfrr.exe111⤵PID:1544
-
\??\c:\rrftpdb.exec:\rrftpdb.exe112⤵PID:892
-
\??\c:\xxjjhnf.exec:\xxjjhnf.exe113⤵PID:1752
-
\??\c:\rvlpjl.exec:\rvlpjl.exe114⤵PID:2596
-
\??\c:\djbtfb.exec:\djbtfb.exe115⤵PID:1224
-
\??\c:\hbbfjx.exec:\hbbfjx.exe116⤵PID:2956
-
\??\c:\brnnvbt.exec:\brnnvbt.exe117⤵PID:1624
-
\??\c:\jhdbrdn.exec:\jhdbrdn.exe118⤵PID:2020
-
\??\c:\hlfjph.exec:\hlfjph.exe119⤵PID:2304
-
\??\c:\rxxxn.exec:\rxxxn.exe120⤵PID:2964
-
\??\c:\hdlpjfb.exec:\hdlpjfb.exe121⤵PID:3032
-
\??\c:\pxrprtj.exec:\pxrprtj.exe122⤵PID:2824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-