Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 06:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
970771ff3538cc7439e6a1edaf6a9be0N.exe
Resource
win7-20240705-en
6 signatures
120 seconds
General
-
Target
970771ff3538cc7439e6a1edaf6a9be0N.exe
-
Size
76KB
-
MD5
970771ff3538cc7439e6a1edaf6a9be0
-
SHA1
758b92e2f78a46f21718204a2b81ddefa8acdfb0
-
SHA256
e1692cb6fb1024c9bdaad2296aefd6393ecb28bfdef7fc51823838acc510d0ac
-
SHA512
684b0d8b7329223927195cc181003e2c1af8bf0a19246e1b5d216b6b5e37153c033cde588ee37dcd2ba7ace82461e6b67124dfd4862aac0de8d6ae71dbbb8583
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIJSsD+cGUFzJhB:ymb3NkkiQ3mdBjFIwsDhbN7B
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2780-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2820-31-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2820-30-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-41-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2740-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/332-81-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1728-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1820-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2312-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/684-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1716-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1328-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2912 lfxfrxf.exe 2820 9nntnn.exe 2740 hhhtth.exe 2684 9vvdv.exe 2648 jpvvv.exe 1632 lrxlrll.exe 332 3btbnn.exe 1728 vvdvp.exe 2608 frffrrr.exe 2168 nnbtnb.exe 2348 pvpjd.exe 1808 nhbhth.exe 1820 jjvdv.exe 1660 ppdjp.exe 2660 fxlrllr.exe 2924 rxlfxfr.exe 2332 bbhttn.exe 2312 7lxflrl.exe 684 nhbbnn.exe 304 nhttbb.exe 648 ppdpv.exe 1716 rrflxfl.exe 1404 fxlxffr.exe 2380 5htbtb.exe 1676 ppjdp.exe 920 xxfxrff.exe 1328 fffrlll.exe 2516 thhnnn.exe 2368 pjpvp.exe 1736 lllrxrx.exe 1948 hbthtt.exe 2800 9djjp.exe 2896 7ppdj.exe 2740 rfrrlxl.exe 2688 lfxxlrx.exe 2732 tbbtbh.exe 320 vvppj.exe 1652 1pddp.exe 2124 xflfxxl.exe 3056 nbnhhb.exe 2860 pdvdv.exe 2232 pppjv.exe 2320 xxfxrfx.exe 580 rlfrxxf.exe 800 bbnhtn.exe 1976 jppvv.exe 1996 1pddj.exe 1932 xrfrxlr.exe 1696 bttttn.exe 2172 ntthnh.exe 1452 jvpvj.exe 1760 jpjdd.exe 1056 xxrlflx.exe 2308 ffrrllx.exe 2216 bbntnt.exe 1756 jvpvj.exe 1488 vvpvp.exe 1136 lxllxff.exe 408 3tnhtn.exe 1348 7hbtnb.exe 1608 jvpvd.exe 1784 lfrffrl.exe 1688 1bnbbb.exe 2940 ttnthh.exe -
resource yara_rule behavioral1/memory/2780-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1820-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/684-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1716-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1328-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-280-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9djvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhtt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2912 2780 970771ff3538cc7439e6a1edaf6a9be0N.exe 30 PID 2780 wrote to memory of 2912 2780 970771ff3538cc7439e6a1edaf6a9be0N.exe 30 PID 2780 wrote to memory of 2912 2780 970771ff3538cc7439e6a1edaf6a9be0N.exe 30 PID 2780 wrote to memory of 2912 2780 970771ff3538cc7439e6a1edaf6a9be0N.exe 30 PID 2912 wrote to memory of 2820 2912 lfxfrxf.exe 31 PID 2912 wrote to memory of 2820 2912 lfxfrxf.exe 31 PID 2912 wrote to memory of 2820 2912 lfxfrxf.exe 31 PID 2912 wrote to memory of 2820 2912 lfxfrxf.exe 31 PID 2820 wrote to memory of 2740 2820 9nntnn.exe 32 PID 2820 wrote to memory of 2740 2820 9nntnn.exe 32 PID 2820 wrote to memory of 2740 2820 9nntnn.exe 32 PID 2820 wrote to memory of 2740 2820 9nntnn.exe 32 PID 2740 wrote to memory of 2684 2740 hhhtth.exe 33 PID 2740 wrote to memory of 2684 2740 hhhtth.exe 33 PID 2740 wrote to memory of 2684 2740 hhhtth.exe 33 PID 2740 wrote to memory of 2684 2740 hhhtth.exe 33 PID 2684 wrote to memory of 2648 2684 9vvdv.exe 34 PID 2684 wrote to memory of 2648 2684 9vvdv.exe 34 PID 2684 wrote to memory of 2648 2684 9vvdv.exe 34 PID 2684 wrote to memory of 2648 2684 9vvdv.exe 34 PID 2648 wrote to memory of 1632 2648 jpvvv.exe 35 PID 2648 wrote to memory of 1632 2648 jpvvv.exe 35 PID 2648 wrote to memory of 1632 2648 jpvvv.exe 35 PID 2648 wrote to memory of 1632 2648 jpvvv.exe 35 PID 1632 wrote to memory of 332 1632 lrxlrll.exe 36 PID 1632 wrote to memory of 332 1632 lrxlrll.exe 36 PID 1632 wrote to memory of 332 1632 lrxlrll.exe 36 PID 1632 wrote to memory of 332 1632 lrxlrll.exe 36 PID 332 wrote to memory of 1728 332 3btbnn.exe 37 PID 332 wrote to memory of 1728 332 3btbnn.exe 37 PID 332 wrote to memory of 1728 332 3btbnn.exe 37 PID 332 wrote to memory of 1728 332 3btbnn.exe 37 PID 1728 wrote to memory of 2608 1728 vvdvp.exe 38 PID 1728 wrote to memory of 2608 1728 vvdvp.exe 38 PID 1728 wrote to memory of 2608 1728 vvdvp.exe 38 PID 1728 wrote to memory of 2608 1728 vvdvp.exe 38 PID 2608 wrote to memory of 2168 2608 frffrrr.exe 39 PID 2608 wrote to memory of 2168 2608 frffrrr.exe 39 PID 2608 wrote to memory of 2168 2608 frffrrr.exe 39 PID 2608 wrote to memory of 2168 2608 frffrrr.exe 39 PID 2168 wrote to memory of 2348 2168 nnbtnb.exe 40 PID 2168 wrote to memory of 2348 2168 nnbtnb.exe 40 PID 2168 wrote to memory of 2348 2168 nnbtnb.exe 40 PID 2168 wrote to memory of 2348 2168 nnbtnb.exe 40 PID 2348 wrote to memory of 1808 2348 pvpjd.exe 41 PID 2348 wrote to memory of 1808 2348 pvpjd.exe 41 PID 2348 wrote to memory of 1808 2348 pvpjd.exe 41 PID 2348 wrote to memory of 1808 2348 pvpjd.exe 41 PID 1808 wrote to memory of 1820 1808 nhbhth.exe 42 PID 1808 wrote to memory of 1820 1808 nhbhth.exe 42 PID 1808 wrote to memory of 1820 1808 nhbhth.exe 42 PID 1808 wrote to memory of 1820 1808 nhbhth.exe 42 PID 1820 wrote to memory of 1660 1820 jjvdv.exe 43 PID 1820 wrote to memory of 1660 1820 jjvdv.exe 43 PID 1820 wrote to memory of 1660 1820 jjvdv.exe 43 PID 1820 wrote to memory of 1660 1820 jjvdv.exe 43 PID 1660 wrote to memory of 2660 1660 ppdjp.exe 44 PID 1660 wrote to memory of 2660 1660 ppdjp.exe 44 PID 1660 wrote to memory of 2660 1660 ppdjp.exe 44 PID 1660 wrote to memory of 2660 1660 ppdjp.exe 44 PID 2660 wrote to memory of 2924 2660 fxlrllr.exe 45 PID 2660 wrote to memory of 2924 2660 fxlrllr.exe 45 PID 2660 wrote to memory of 2924 2660 fxlrllr.exe 45 PID 2660 wrote to memory of 2924 2660 fxlrllr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\970771ff3538cc7439e6a1edaf6a9be0N.exe"C:\Users\Admin\AppData\Local\Temp\970771ff3538cc7439e6a1edaf6a9be0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\lfxfrxf.exec:\lfxfrxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\9nntnn.exec:\9nntnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\hhhtth.exec:\hhhtth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\9vvdv.exec:\9vvdv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\jpvvv.exec:\jpvvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\lrxlrll.exec:\lrxlrll.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\3btbnn.exec:\3btbnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
\??\c:\vvdvp.exec:\vvdvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\frffrrr.exec:\frffrrr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\nnbtnb.exec:\nnbtnb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\pvpjd.exec:\pvpjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\nhbhth.exec:\nhbhth.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\jjvdv.exec:\jjvdv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\ppdjp.exec:\ppdjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\fxlrllr.exec:\fxlrllr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\rxlfxfr.exec:\rxlfxfr.exe17⤵
- Executes dropped EXE
PID:2924 -
\??\c:\bbhttn.exec:\bbhttn.exe18⤵
- Executes dropped EXE
PID:2332 -
\??\c:\7lxflrl.exec:\7lxflrl.exe19⤵
- Executes dropped EXE
PID:2312 -
\??\c:\nhbbnn.exec:\nhbbnn.exe20⤵
- Executes dropped EXE
PID:684 -
\??\c:\nhttbb.exec:\nhttbb.exe21⤵
- Executes dropped EXE
PID:304 -
\??\c:\ppdpv.exec:\ppdpv.exe22⤵
- Executes dropped EXE
PID:648 -
\??\c:\rrflxfl.exec:\rrflxfl.exe23⤵
- Executes dropped EXE
PID:1716 -
\??\c:\fxlxffr.exec:\fxlxffr.exe24⤵
- Executes dropped EXE
PID:1404 -
\??\c:\5htbtb.exec:\5htbtb.exe25⤵
- Executes dropped EXE
PID:2380 -
\??\c:\ppjdp.exec:\ppjdp.exe26⤵
- Executes dropped EXE
PID:1676 -
\??\c:\xxfxrff.exec:\xxfxrff.exe27⤵
- Executes dropped EXE
PID:920 -
\??\c:\fffrlll.exec:\fffrlll.exe28⤵
- Executes dropped EXE
PID:1328 -
\??\c:\thhnnn.exec:\thhnnn.exe29⤵
- Executes dropped EXE
PID:2516 -
\??\c:\pjpvp.exec:\pjpvp.exe30⤵
- Executes dropped EXE
PID:2368 -
\??\c:\lllrxrx.exec:\lllrxrx.exe31⤵
- Executes dropped EXE
PID:1736 -
\??\c:\hbthtt.exec:\hbthtt.exe32⤵
- Executes dropped EXE
PID:1948 -
\??\c:\9djjp.exec:\9djjp.exe33⤵
- Executes dropped EXE
PID:2800 -
\??\c:\7ppdj.exec:\7ppdj.exe34⤵
- Executes dropped EXE
PID:2896 -
\??\c:\rfrrlxl.exec:\rfrrlxl.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740 -
\??\c:\lfxxlrx.exec:\lfxxlrx.exe36⤵
- Executes dropped EXE
PID:2688 -
\??\c:\tbbtbh.exec:\tbbtbh.exe37⤵
- Executes dropped EXE
PID:2732 -
\??\c:\vvppj.exec:\vvppj.exe38⤵
- Executes dropped EXE
PID:320 -
\??\c:\1pddp.exec:\1pddp.exe39⤵
- Executes dropped EXE
PID:1652 -
\??\c:\xflfxxl.exec:\xflfxxl.exe40⤵
- Executes dropped EXE
PID:2124 -
\??\c:\9hbbtb.exec:\9hbbtb.exe41⤵PID:2636
-
\??\c:\nbnhhb.exec:\nbnhhb.exe42⤵
- Executes dropped EXE
PID:3056 -
\??\c:\pdvdv.exec:\pdvdv.exe43⤵
- Executes dropped EXE
PID:2860 -
\??\c:\pppjv.exec:\pppjv.exe44⤵
- Executes dropped EXE
PID:2232 -
\??\c:\xxfxrfx.exec:\xxfxrfx.exe45⤵
- Executes dropped EXE
PID:2320 -
\??\c:\rlfrxxf.exec:\rlfrxxf.exe46⤵
- Executes dropped EXE
PID:580 -
\??\c:\bbnhtn.exec:\bbnhtn.exe47⤵
- Executes dropped EXE
PID:800 -
\??\c:\jppvv.exec:\jppvv.exe48⤵
- Executes dropped EXE
PID:1976 -
\??\c:\1pddj.exec:\1pddj.exe49⤵
- Executes dropped EXE
PID:1996 -
\??\c:\xrfrxlr.exec:\xrfrxlr.exe50⤵
- Executes dropped EXE
PID:1932 -
\??\c:\bttttn.exec:\bttttn.exe51⤵
- Executes dropped EXE
PID:1696 -
\??\c:\ntthnh.exec:\ntthnh.exe52⤵
- Executes dropped EXE
PID:2172 -
\??\c:\jvpvj.exec:\jvpvj.exe53⤵
- Executes dropped EXE
PID:1452 -
\??\c:\jpjdd.exec:\jpjdd.exe54⤵
- Executes dropped EXE
PID:1760 -
\??\c:\xxrlflx.exec:\xxrlflx.exe55⤵
- Executes dropped EXE
PID:1056 -
\??\c:\ffrrllx.exec:\ffrrllx.exe56⤵
- Executes dropped EXE
PID:2308 -
\??\c:\bbntnt.exec:\bbntnt.exe57⤵
- Executes dropped EXE
PID:2216 -
\??\c:\jvpvj.exec:\jvpvj.exe58⤵
- Executes dropped EXE
PID:1756 -
\??\c:\vvpvp.exec:\vvpvp.exe59⤵
- Executes dropped EXE
PID:1488 -
\??\c:\lxllxff.exec:\lxllxff.exe60⤵
- Executes dropped EXE
PID:1136 -
\??\c:\3tnhtn.exec:\3tnhtn.exe61⤵
- Executes dropped EXE
PID:408 -
\??\c:\7hbtnb.exec:\7hbtnb.exe62⤵
- Executes dropped EXE
PID:1348 -
\??\c:\jvpvd.exec:\jvpvd.exe63⤵
- Executes dropped EXE
PID:1608 -
\??\c:\lfrffrl.exec:\lfrffrl.exe64⤵
- Executes dropped EXE
PID:1784 -
\??\c:\1bnbbb.exec:\1bnbbb.exe65⤵
- Executes dropped EXE
PID:1688 -
\??\c:\ttnthh.exec:\ttnthh.exe66⤵
- Executes dropped EXE
PID:2940 -
\??\c:\vvvdj.exec:\vvvdj.exe67⤵PID:924
-
\??\c:\vvvdp.exec:\vvvdp.exe68⤵PID:1788
-
\??\c:\fxllrrf.exec:\fxllrrf.exe69⤵PID:1520
-
\??\c:\bbthbn.exec:\bbthbn.exe70⤵PID:2492
-
\??\c:\hbbhhn.exec:\hbbhhn.exe71⤵PID:2000
-
\??\c:\dddjj.exec:\dddjj.exe72⤵PID:1628
-
\??\c:\vpppj.exec:\vpppj.exe73⤵PID:2792
-
\??\c:\lrlfrrr.exec:\lrlfrrr.exe74⤵PID:2304
-
\??\c:\tnhhtb.exec:\tnhhtb.exe75⤵PID:2832
-
\??\c:\btnhbt.exec:\btnhbt.exe76⤵PID:2840
-
\??\c:\dpjpj.exec:\dpjpj.exe77⤵PID:2672
-
\??\c:\vpvjp.exec:\vpvjp.exe78⤵PID:2644
-
\??\c:\xrrrlrr.exec:\xrrrlrr.exe79⤵PID:2692
-
\??\c:\hhbhtt.exec:\hhbhtt.exe80⤵PID:2588
-
\??\c:\tthhnn.exec:\tthhnn.exe81⤵PID:1652
-
\??\c:\jdjvp.exec:\jdjvp.exe82⤵PID:592
-
\??\c:\xrlfllr.exec:\xrlfllr.exe83⤵PID:2336
-
\??\c:\lxrxrlr.exec:\lxrxrlr.exe84⤵PID:1556
-
\??\c:\vppdj.exec:\vppdj.exe85⤵PID:2956
-
\??\c:\dvvpv.exec:\dvvpv.exe86⤵PID:2876
-
\??\c:\9rrrrlf.exec:\9rrrrlf.exe87⤵PID:2608
-
\??\c:\fllxxll.exec:\fllxxll.exe88⤵PID:2156
-
\??\c:\bnnnbn.exec:\bnnnbn.exe89⤵PID:1704
-
\??\c:\7bhntn.exec:\7bhntn.exe90⤵PID:2104
-
\??\c:\7pjjv.exec:\7pjjv.exe91⤵PID:1320
-
\??\c:\jppdd.exec:\jppdd.exe92⤵PID:2352
-
\??\c:\rfrlxrl.exec:\rfrlxrl.exe93⤵PID:2856
-
\??\c:\7nhbnt.exec:\7nhbnt.exe94⤵PID:2660
-
\??\c:\7hnhhn.exec:\7hnhhn.exe95⤵PID:2296
-
\??\c:\vpvdv.exec:\vpvdv.exe96⤵PID:2456
-
\??\c:\dvvjj.exec:\dvvjj.exe97⤵PID:2136
-
\??\c:\xfflxrl.exec:\xfflxrl.exe98⤵PID:1528
-
\??\c:\1frfflx.exec:\1frfflx.exe99⤵PID:2436
-
\??\c:\hhhnhh.exec:\hhhnhh.exe100⤵PID:2904
-
\??\c:\bbbnbh.exec:\bbbnbh.exe101⤵PID:1116
-
\??\c:\jjppj.exec:\jjppj.exe102⤵PID:1180
-
\??\c:\ddvjp.exec:\ddvjp.exe103⤵PID:688
-
\??\c:\rlfrrfl.exec:\rlfrrfl.exe104⤵PID:328
-
\??\c:\xrxfrfx.exec:\xrxfrfx.exe105⤵PID:1524
-
\??\c:\hbtbbb.exec:\hbtbbb.exe106⤵PID:1688
-
\??\c:\hbtnhh.exec:\hbtnhh.exe107⤵PID:1928
-
\??\c:\dvvpj.exec:\dvvpj.exe108⤵PID:2068
-
\??\c:\1jpjv.exec:\1jpjv.exe109⤵PID:1328
-
\??\c:\3xrfrxl.exec:\3xrfrxl.exe110⤵PID:2496
-
\??\c:\xflxfrx.exec:\xflxfrx.exe111⤵PID:2512
-
\??\c:\hhhbhn.exec:\hhhbhn.exe112⤵PID:2244
-
\??\c:\httntb.exec:\httntb.exe113⤵PID:892
-
\??\c:\jdvjd.exec:\jdvjd.exe114⤵PID:2292
-
\??\c:\vvpdv.exec:\vvpdv.exe115⤵PID:2604
-
\??\c:\9lfxlrf.exec:\9lfxlrf.exe116⤵PID:3052
-
\??\c:\lfxfxxl.exec:\lfxfxxl.exe117⤵PID:2600
-
\??\c:\5bnbtt.exec:\5bnbtt.exe118⤵PID:2616
-
\??\c:\ntthhh.exec:\ntthhh.exe119⤵PID:2984
-
\??\c:\7pjvd.exec:\7pjvd.exe120⤵PID:3012
-
\??\c:\3lffflr.exec:\3lffflr.exe121⤵PID:792
-
\??\c:\rlflrfl.exec:\rlflrfl.exe122⤵PID:572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-