Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe
Resource
win7-20240704-en
General
-
Target
3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe
-
Size
85KB
-
MD5
d0bf260be1ac43b9f384807f8302be5c
-
SHA1
77be0e3e7b2aa13ae3ada2382f29d848a911913f
-
SHA256
3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701
-
SHA512
1d2967d7154b4cb3c6bf2b3c38f74c9965d360c7e2bffdd474e55324e0e7f3c9924416894a6ac6db7db42582fd5b53d8f4cfb4e38c98345d9c44db8097bda761
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73yqKH/KjvHo+WdNl99V:ymb3NkkiQ3mdBjFo73yX+vI+qvjV
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2204-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-19-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2700-50-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2700-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2916-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2916-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2164-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/980-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1604-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1016-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2124-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/840-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-289-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2512 1djdp.exe 2568 64662.exe 2576 nnntnb.exe 2700 i806228.exe 2140 20800.exe 2416 bntttb.exe 2332 c864488.exe 2916 nhtbhh.exe 2520 8668068.exe 2772 622440.exe 2164 0844600.exe 980 hthnhh.exe 1584 bbhhnb.exe 2228 64886.exe 1604 084444.exe 2880 642860.exe 1284 428828.exe 2896 20000.exe 1016 lxflrrf.exe 1632 jvdvj.exe 2324 i688868.exe 672 g2402.exe 1856 hhbhnt.exe 2832 xxllxfl.exe 692 864028.exe 2388 jdvjj.exe 2124 8828648.exe 840 040062.exe 3000 rfxflrf.exe 2956 2062480.exe 2080 3nbthb.exe 2636 bhhhbb.exe 2640 hbtbhh.exe 2712 jvdvj.exe 2980 2662804.exe 1600 2640668.exe 2420 pddjj.exe 2452 dpddp.exe 2108 66828.exe 2912 220200.exe 2904 4288488.exe 2720 0888006.exe 2508 5httbb.exe 2788 vjjjp.exe 2936 rffllff.exe 1640 666246.exe 1520 xfrlfrx.exe 2304 tnttnn.exe 2944 608804.exe 1148 lfxxllx.exe 1604 86406.exe 2880 68068.exe 2940 djdjj.exe 304 808220.exe 800 9rfffxx.exe 2092 a8662.exe 1620 626888.exe 2324 fxxxffl.exe 1612 5lxxffx.exe 1392 9jjjj.exe 2136 2206868.exe 2836 rlfxxrx.exe 2800 826240.exe 2348 080686.exe -
resource yara_rule behavioral1/memory/2204-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2164-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/980-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1604-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1016-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/840-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-289-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e20020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4682222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbthtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i400482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2512 2204 3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe 30 PID 2204 wrote to memory of 2512 2204 3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe 30 PID 2204 wrote to memory of 2512 2204 3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe 30 PID 2204 wrote to memory of 2512 2204 3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe 30 PID 2512 wrote to memory of 2568 2512 1djdp.exe 31 PID 2512 wrote to memory of 2568 2512 1djdp.exe 31 PID 2512 wrote to memory of 2568 2512 1djdp.exe 31 PID 2512 wrote to memory of 2568 2512 1djdp.exe 31 PID 2568 wrote to memory of 2576 2568 64662.exe 32 PID 2568 wrote to memory of 2576 2568 64662.exe 32 PID 2568 wrote to memory of 2576 2568 64662.exe 32 PID 2568 wrote to memory of 2576 2568 64662.exe 32 PID 2576 wrote to memory of 2700 2576 nnntnb.exe 33 PID 2576 wrote to memory of 2700 2576 nnntnb.exe 33 PID 2576 wrote to memory of 2700 2576 nnntnb.exe 33 PID 2576 wrote to memory of 2700 2576 nnntnb.exe 33 PID 2700 wrote to memory of 2140 2700 i806228.exe 34 PID 2700 wrote to memory of 2140 2700 i806228.exe 34 PID 2700 wrote to memory of 2140 2700 i806228.exe 34 PID 2700 wrote to memory of 2140 2700 i806228.exe 34 PID 2140 wrote to memory of 2416 2140 20800.exe 35 PID 2140 wrote to memory of 2416 2140 20800.exe 35 PID 2140 wrote to memory of 2416 2140 20800.exe 35 PID 2140 wrote to memory of 2416 2140 20800.exe 35 PID 2416 wrote to memory of 2332 2416 bntttb.exe 36 PID 2416 wrote to memory of 2332 2416 bntttb.exe 36 PID 2416 wrote to memory of 2332 2416 bntttb.exe 36 PID 2416 wrote to memory of 2332 2416 bntttb.exe 36 PID 2332 wrote to memory of 2916 2332 c864488.exe 37 PID 2332 wrote to memory of 2916 2332 c864488.exe 37 PID 2332 wrote to memory of 2916 2332 c864488.exe 37 PID 2332 wrote to memory of 2916 2332 c864488.exe 37 PID 2916 wrote to memory of 2520 2916 nhtbhh.exe 38 PID 2916 wrote to memory of 2520 2916 nhtbhh.exe 38 PID 2916 wrote to memory of 2520 2916 nhtbhh.exe 38 PID 2916 wrote to memory of 2520 2916 nhtbhh.exe 38 PID 2520 wrote to memory of 2772 2520 8668068.exe 39 PID 2520 wrote to memory of 2772 2520 8668068.exe 39 PID 2520 wrote to memory of 2772 2520 8668068.exe 39 PID 2520 wrote to memory of 2772 2520 8668068.exe 39 PID 2772 wrote to memory of 2164 2772 622440.exe 40 PID 2772 wrote to memory of 2164 2772 622440.exe 40 PID 2772 wrote to memory of 2164 2772 622440.exe 40 PID 2772 wrote to memory of 2164 2772 622440.exe 40 PID 2164 wrote to memory of 980 2164 0844600.exe 41 PID 2164 wrote to memory of 980 2164 0844600.exe 41 PID 2164 wrote to memory of 980 2164 0844600.exe 41 PID 2164 wrote to memory of 980 2164 0844600.exe 41 PID 980 wrote to memory of 1584 980 hthnhh.exe 42 PID 980 wrote to memory of 1584 980 hthnhh.exe 42 PID 980 wrote to memory of 1584 980 hthnhh.exe 42 PID 980 wrote to memory of 1584 980 hthnhh.exe 42 PID 1584 wrote to memory of 2228 1584 bbhhnb.exe 43 PID 1584 wrote to memory of 2228 1584 bbhhnb.exe 43 PID 1584 wrote to memory of 2228 1584 bbhhnb.exe 43 PID 1584 wrote to memory of 2228 1584 bbhhnb.exe 43 PID 2228 wrote to memory of 1604 2228 64886.exe 44 PID 2228 wrote to memory of 1604 2228 64886.exe 44 PID 2228 wrote to memory of 1604 2228 64886.exe 44 PID 2228 wrote to memory of 1604 2228 64886.exe 44 PID 1604 wrote to memory of 2880 1604 084444.exe 45 PID 1604 wrote to memory of 2880 1604 084444.exe 45 PID 1604 wrote to memory of 2880 1604 084444.exe 45 PID 1604 wrote to memory of 2880 1604 084444.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe"C:\Users\Admin\AppData\Local\Temp\3211b5b689840f171d9ece38d2dcf066c892b8d8197d263467408afb41588701.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\1djdp.exec:\1djdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\64662.exec:\64662.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\nnntnb.exec:\nnntnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\i806228.exec:\i806228.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\20800.exec:\20800.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\bntttb.exec:\bntttb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\c864488.exec:\c864488.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\nhtbhh.exec:\nhtbhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\8668068.exec:\8668068.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\622440.exec:\622440.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\0844600.exec:\0844600.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\hthnhh.exec:\hthnhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\bbhhnb.exec:\bbhhnb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\64886.exec:\64886.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\084444.exec:\084444.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\642860.exec:\642860.exe17⤵
- Executes dropped EXE
PID:2880 -
\??\c:\428828.exec:\428828.exe18⤵
- Executes dropped EXE
PID:1284 -
\??\c:\20000.exec:\20000.exe19⤵
- Executes dropped EXE
PID:2896 -
\??\c:\lxflrrf.exec:\lxflrrf.exe20⤵
- Executes dropped EXE
PID:1016 -
\??\c:\jvdvj.exec:\jvdvj.exe21⤵
- Executes dropped EXE
PID:1632 -
\??\c:\i688868.exec:\i688868.exe22⤵
- Executes dropped EXE
PID:2324 -
\??\c:\g2402.exec:\g2402.exe23⤵
- Executes dropped EXE
PID:672 -
\??\c:\hhbhnt.exec:\hhbhnt.exe24⤵
- Executes dropped EXE
PID:1856 -
\??\c:\xxllxfl.exec:\xxllxfl.exe25⤵
- Executes dropped EXE
PID:2832 -
\??\c:\864028.exec:\864028.exe26⤵
- Executes dropped EXE
PID:692 -
\??\c:\jdvjj.exec:\jdvjj.exe27⤵
- Executes dropped EXE
PID:2388 -
\??\c:\8828648.exec:\8828648.exe28⤵
- Executes dropped EXE
PID:2124 -
\??\c:\040062.exec:\040062.exe29⤵
- Executes dropped EXE
PID:840 -
\??\c:\rfxflrf.exec:\rfxflrf.exe30⤵
- Executes dropped EXE
PID:3000 -
\??\c:\2062480.exec:\2062480.exe31⤵
- Executes dropped EXE
PID:2956 -
\??\c:\3nbthb.exec:\3nbthb.exe32⤵
- Executes dropped EXE
PID:2080 -
\??\c:\bhhhbb.exec:\bhhhbb.exe33⤵
- Executes dropped EXE
PID:2636 -
\??\c:\hbtbhh.exec:\hbtbhh.exe34⤵
- Executes dropped EXE
PID:2640 -
\??\c:\jvdvj.exec:\jvdvj.exe35⤵
- Executes dropped EXE
PID:2712 -
\??\c:\2662804.exec:\2662804.exe36⤵
- Executes dropped EXE
PID:2980 -
\??\c:\2640668.exec:\2640668.exe37⤵
- Executes dropped EXE
PID:1600 -
\??\c:\pddjj.exec:\pddjj.exe38⤵
- Executes dropped EXE
PID:2420 -
\??\c:\dpddp.exec:\dpddp.exe39⤵
- Executes dropped EXE
PID:2452 -
\??\c:\66828.exec:\66828.exe40⤵
- Executes dropped EXE
PID:2108 -
\??\c:\220200.exec:\220200.exe41⤵
- Executes dropped EXE
PID:2912 -
\??\c:\4288488.exec:\4288488.exe42⤵
- Executes dropped EXE
PID:2904 -
\??\c:\0888006.exec:\0888006.exe43⤵
- Executes dropped EXE
PID:2720 -
\??\c:\5httbb.exec:\5httbb.exe44⤵
- Executes dropped EXE
PID:2508 -
\??\c:\vjjjp.exec:\vjjjp.exe45⤵
- Executes dropped EXE
PID:2788 -
\??\c:\rffllff.exec:\rffllff.exe46⤵
- Executes dropped EXE
PID:2936 -
\??\c:\666246.exec:\666246.exe47⤵
- Executes dropped EXE
PID:1640 -
\??\c:\xfrlfrx.exec:\xfrlfrx.exe48⤵
- Executes dropped EXE
PID:1520 -
\??\c:\tnttnn.exec:\tnttnn.exe49⤵
- Executes dropped EXE
PID:2304 -
\??\c:\608804.exec:\608804.exe50⤵
- Executes dropped EXE
PID:2944 -
\??\c:\lfxxllx.exec:\lfxxllx.exe51⤵
- Executes dropped EXE
PID:1148 -
\??\c:\86406.exec:\86406.exe52⤵
- Executes dropped EXE
PID:1604 -
\??\c:\68068.exec:\68068.exe53⤵
- Executes dropped EXE
PID:2880 -
\??\c:\djdjj.exec:\djdjj.exe54⤵
- Executes dropped EXE
PID:2940 -
\??\c:\808220.exec:\808220.exe55⤵
- Executes dropped EXE
PID:304 -
\??\c:\9rfffxx.exec:\9rfffxx.exe56⤵
- Executes dropped EXE
PID:800 -
\??\c:\a8662.exec:\a8662.exe57⤵
- Executes dropped EXE
PID:2092 -
\??\c:\626888.exec:\626888.exe58⤵
- Executes dropped EXE
PID:1620 -
\??\c:\fxxxffl.exec:\fxxxffl.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324 -
\??\c:\5lxxffx.exec:\5lxxffx.exe60⤵
- Executes dropped EXE
PID:1612 -
\??\c:\9jjjj.exec:\9jjjj.exe61⤵
- Executes dropped EXE
PID:1392 -
\??\c:\2206868.exec:\2206868.exe62⤵
- Executes dropped EXE
PID:2136 -
\??\c:\rlfxxrx.exec:\rlfxxrx.exe63⤵
- Executes dropped EXE
PID:2836 -
\??\c:\826240.exec:\826240.exe64⤵
- Executes dropped EXE
PID:2800 -
\??\c:\080686.exec:\080686.exe65⤵
- Executes dropped EXE
PID:2348 -
\??\c:\k46200.exec:\k46200.exe66⤵PID:992
-
\??\c:\6802284.exec:\6802284.exe67⤵PID:1508
-
\??\c:\dvjpp.exec:\dvjpp.exe68⤵PID:840
-
\??\c:\rxfxrrr.exec:\rxfxrrr.exe69⤵PID:3000
-
\??\c:\nhtbnn.exec:\nhtbnn.exe70⤵PID:316
-
\??\c:\vjvpp.exec:\vjvpp.exe71⤵PID:1248
-
\??\c:\5nhnnb.exec:\5nhnnb.exe72⤵PID:2568
-
\??\c:\vpddd.exec:\vpddd.exe73⤵PID:2576
-
\??\c:\htbhnh.exec:\htbhnh.exe74⤵PID:2640
-
\??\c:\606284.exec:\606284.exe75⤵PID:2468
-
\??\c:\jvjpp.exec:\jvjpp.exe76⤵PID:2692
-
\??\c:\jjvdd.exec:\jjvdd.exe77⤵PID:2652
-
\??\c:\824682.exec:\824682.exe78⤵PID:2492
-
\??\c:\3frxlrl.exec:\3frxlrl.exe79⤵PID:2344
-
\??\c:\w42628.exec:\w42628.exe80⤵PID:612
-
\??\c:\680628.exec:\680628.exe81⤵PID:1656
-
\??\c:\8666600.exec:\8666600.exe82⤵PID:2916
-
\??\c:\htbhhn.exec:\htbhhn.exe83⤵PID:2744
-
\??\c:\3dpjv.exec:\3dpjv.exe84⤵PID:1272
-
\??\c:\nhbbbh.exec:\nhbbbh.exe85⤵PID:568
-
\??\c:\hbtnnn.exec:\hbtnnn.exe86⤵PID:1480
-
\??\c:\826222.exec:\826222.exe87⤵PID:1944
-
\??\c:\5vjjp.exec:\5vjjp.exe88⤵PID:1968
-
\??\c:\s0622.exec:\s0622.exe89⤵PID:2232
-
\??\c:\fxlflfl.exec:\fxlflfl.exe90⤵PID:1964
-
\??\c:\nhtttt.exec:\nhtttt.exe91⤵PID:348
-
\??\c:\lffrxxf.exec:\lffrxxf.exe92⤵PID:1724
-
\??\c:\jjjvd.exec:\jjjvd.exe93⤵PID:2884
-
\??\c:\hthnnt.exec:\hthnnt.exe94⤵PID:2244
-
\??\c:\286648.exec:\286648.exe95⤵PID:796
-
\??\c:\tnbhnn.exec:\tnbhnn.exe96⤵PID:308
-
\??\c:\vjpjj.exec:\vjpjj.exe97⤵PID:3052
-
\??\c:\9bnntn.exec:\9bnntn.exe98⤵PID:1956
-
\??\c:\ddvjj.exec:\ddvjj.exe99⤵PID:696
-
\??\c:\42628.exec:\42628.exe100⤵PID:1344
-
\??\c:\5lxxfff.exec:\5lxxfff.exe101⤵PID:744
-
\??\c:\m2066.exec:\m2066.exe102⤵PID:692
-
\??\c:\5ppdd.exec:\5ppdd.exe103⤵PID:1740
-
\??\c:\3tbttn.exec:\3tbttn.exe104⤵PID:864
-
\??\c:\o684662.exec:\o684662.exe105⤵PID:1572
-
\??\c:\jvdvd.exec:\jvdvd.exe106⤵PID:1932
-
\??\c:\5nbthb.exec:\5nbthb.exe107⤵PID:2868
-
\??\c:\868202.exec:\868202.exe108⤵PID:2528
-
\??\c:\08802.exec:\08802.exe109⤵PID:2792
-
\??\c:\66408.exec:\66408.exe110⤵PID:3028
-
\??\c:\08444.exec:\08444.exe111⤵PID:3032
-
\??\c:\5fxrrxf.exec:\5fxrrxf.exe112⤵PID:2056
-
\??\c:\jdppj.exec:\jdppj.exe113⤵PID:2820
-
\??\c:\04842.exec:\04842.exe114⤵PID:2580
-
\??\c:\26686.exec:\26686.exe115⤵PID:2444
-
\??\c:\m6682.exec:\m6682.exe116⤵PID:2440
-
\??\c:\nntbbt.exec:\nntbbt.exe117⤵PID:2496
-
\??\c:\i064840.exec:\i064840.exe118⤵PID:2540
-
\??\c:\08046.exec:\08046.exe119⤵PID:320
-
\??\c:\1thhhn.exec:\1thhhn.exe120⤵PID:2716
-
\??\c:\842024.exec:\842024.exe121⤵PID:2732
-
\??\c:\64400.exec:\64400.exe122⤵PID:2596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-