Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 22:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe
-
Size
72KB
-
MD5
ac37b4c2ad4dbe69dc90bcf1b232555f
-
SHA1
31d12a63e3c759c4a093ea2c0c98dd3a84637a67
-
SHA256
722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128
-
SHA512
bfb13d42cc06dd459610eb106e1cc842576a6597ea9e30818a3c368ab8cf837566c8fd618e3839700f6235c631e88157e81bfcb77e0da5f9cf6819edc9adcc0e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUPqrDZ5RxfVT:ymb3NkkiQ3mdBjF0yUmrfVT
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2152-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1288-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2272-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1536-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/492-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/564-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1028-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/828-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2488-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/664-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2680 btbbnn.exe 2912 jdpvv.exe 2664 9jjjd.exe 2876 9lrrllx.exe 2772 7nnhbn.exe 2544 bthbhh.exe 3020 lfrxffl.exe 1288 bbtnbb.exe 2736 tnttbh.exe 2716 9djjp.exe 2272 fxxrffx.exe 1536 7lxflxf.exe 492 hnhnhh.exe 876 dvjpd.exe 564 vvdjv.exe 1028 rfffxxf.exe 1880 rflrxff.exe 2508 nhbhbh.exe 2060 jjvjp.exe 2392 llffrrf.exe 2332 llxlrlr.exe 2388 bthnth.exe 828 dvpvd.exe 2488 vdjpp.exe 664 3frrxfr.exe 1612 hbthtb.exe 2216 nhhhtt.exe 2944 dddjv.exe 1444 vpdvj.exe 868 xrfflxr.exe 2800 llfrxfl.exe 2804 5hbhhn.exe 2816 bbthtt.exe 2100 nhhnhh.exe 2632 jjdjd.exe 2852 9vvdj.exe 2584 xxffrxl.exe 2904 lfffrxl.exe 2844 rlrflrf.exe 2416 3hhhtn.exe 1480 tththn.exe 1288 ddjpv.exe 1532 jdvvd.exe 2732 lfrflrx.exe 2288 7rlxxxl.exe 628 bthhtt.exe 1436 hnbtbh.exe 348 jvjdv.exe 2504 5lflfll.exe 588 hhtbnn.exe 1776 9dpjv.exe 2324 lfxfrxl.exe 1280 5rlrfrx.exe 2180 5bhntb.exe 2092 hbnnbb.exe 2264 vdvdd.exe 2392 vpdpv.exe 2408 rrxfllr.exe 652 xrxfxlr.exe 1928 hbtthh.exe 2432 nnhhnn.exe 2468 vvvjp.exe 344 dvddd.exe 2920 lfrflrf.exe -
resource yara_rule behavioral1/memory/2152-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1288-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2272-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/492-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/564-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1028-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/828-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/664-241-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rllrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fllrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bttht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrxxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2680 2152 722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe 31 PID 2152 wrote to memory of 2680 2152 722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe 31 PID 2152 wrote to memory of 2680 2152 722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe 31 PID 2152 wrote to memory of 2680 2152 722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe 31 PID 2680 wrote to memory of 2912 2680 btbbnn.exe 32 PID 2680 wrote to memory of 2912 2680 btbbnn.exe 32 PID 2680 wrote to memory of 2912 2680 btbbnn.exe 32 PID 2680 wrote to memory of 2912 2680 btbbnn.exe 32 PID 2912 wrote to memory of 2664 2912 jdpvv.exe 33 PID 2912 wrote to memory of 2664 2912 jdpvv.exe 33 PID 2912 wrote to memory of 2664 2912 jdpvv.exe 33 PID 2912 wrote to memory of 2664 2912 jdpvv.exe 33 PID 2664 wrote to memory of 2876 2664 9jjjd.exe 34 PID 2664 wrote to memory of 2876 2664 9jjjd.exe 34 PID 2664 wrote to memory of 2876 2664 9jjjd.exe 34 PID 2664 wrote to memory of 2876 2664 9jjjd.exe 34 PID 2876 wrote to memory of 2772 2876 9lrrllx.exe 35 PID 2876 wrote to memory of 2772 2876 9lrrllx.exe 35 PID 2876 wrote to memory of 2772 2876 9lrrllx.exe 35 PID 2876 wrote to memory of 2772 2876 9lrrllx.exe 35 PID 2772 wrote to memory of 2544 2772 7nnhbn.exe 36 PID 2772 wrote to memory of 2544 2772 7nnhbn.exe 36 PID 2772 wrote to memory of 2544 2772 7nnhbn.exe 36 PID 2772 wrote to memory of 2544 2772 7nnhbn.exe 36 PID 2544 wrote to memory of 3020 2544 bthbhh.exe 37 PID 2544 wrote to memory of 3020 2544 bthbhh.exe 37 PID 2544 wrote to memory of 3020 2544 bthbhh.exe 37 PID 2544 wrote to memory of 3020 2544 bthbhh.exe 37 PID 3020 wrote to memory of 1288 3020 lfrxffl.exe 38 PID 3020 wrote to memory of 1288 3020 lfrxffl.exe 38 PID 3020 wrote to memory of 1288 3020 lfrxffl.exe 38 PID 3020 wrote to memory of 1288 3020 lfrxffl.exe 38 PID 1288 wrote to memory of 2736 1288 bbtnbb.exe 39 PID 1288 wrote to memory of 2736 1288 bbtnbb.exe 39 PID 1288 wrote to memory of 2736 1288 bbtnbb.exe 39 PID 1288 wrote to memory of 2736 1288 bbtnbb.exe 39 PID 2736 wrote to memory of 2716 2736 tnttbh.exe 40 PID 2736 wrote to memory of 2716 2736 tnttbh.exe 40 PID 2736 wrote to memory of 2716 2736 tnttbh.exe 40 PID 2736 wrote to memory of 2716 2736 tnttbh.exe 40 PID 2716 wrote to memory of 2272 2716 9djjp.exe 41 PID 2716 wrote to memory of 2272 2716 9djjp.exe 41 PID 2716 wrote to memory of 2272 2716 9djjp.exe 41 PID 2716 wrote to memory of 2272 2716 9djjp.exe 41 PID 2272 wrote to memory of 1536 2272 fxxrffx.exe 42 PID 2272 wrote to memory of 1536 2272 fxxrffx.exe 42 PID 2272 wrote to memory of 1536 2272 fxxrffx.exe 42 PID 2272 wrote to memory of 1536 2272 fxxrffx.exe 42 PID 1536 wrote to memory of 492 1536 7lxflxf.exe 43 PID 1536 wrote to memory of 492 1536 7lxflxf.exe 43 PID 1536 wrote to memory of 492 1536 7lxflxf.exe 43 PID 1536 wrote to memory of 492 1536 7lxflxf.exe 43 PID 492 wrote to memory of 876 492 hnhnhh.exe 44 PID 492 wrote to memory of 876 492 hnhnhh.exe 44 PID 492 wrote to memory of 876 492 hnhnhh.exe 44 PID 492 wrote to memory of 876 492 hnhnhh.exe 44 PID 876 wrote to memory of 564 876 dvjpd.exe 45 PID 876 wrote to memory of 564 876 dvjpd.exe 45 PID 876 wrote to memory of 564 876 dvjpd.exe 45 PID 876 wrote to memory of 564 876 dvjpd.exe 45 PID 564 wrote to memory of 1028 564 vvdjv.exe 46 PID 564 wrote to memory of 1028 564 vvdjv.exe 46 PID 564 wrote to memory of 1028 564 vvdjv.exe 46 PID 564 wrote to memory of 1028 564 vvdjv.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe"C:\Users\Admin\AppData\Local\Temp\722cadddb3e98bf09546a0d412664eff7ca3a64e519f8e7ff9a450b07c76f128.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\btbbnn.exec:\btbbnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\jdpvv.exec:\jdpvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\9jjjd.exec:\9jjjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\9lrrllx.exec:\9lrrllx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\7nnhbn.exec:\7nnhbn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\bthbhh.exec:\bthbhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\lfrxffl.exec:\lfrxffl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\bbtnbb.exec:\bbtnbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
\??\c:\tnttbh.exec:\tnttbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\9djjp.exec:\9djjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\fxxrffx.exec:\fxxrffx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\7lxflxf.exec:\7lxflxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\hnhnhh.exec:\hnhnhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:492 -
\??\c:\dvjpd.exec:\dvjpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\vvdjv.exec:\vvdjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
\??\c:\rfffxxf.exec:\rfffxxf.exe17⤵
- Executes dropped EXE
PID:1028 -
\??\c:\rflrxff.exec:\rflrxff.exe18⤵
- Executes dropped EXE
PID:1880 -
\??\c:\nhbhbh.exec:\nhbhbh.exe19⤵
- Executes dropped EXE
PID:2508 -
\??\c:\jjvjp.exec:\jjvjp.exe20⤵
- Executes dropped EXE
PID:2060 -
\??\c:\llffrrf.exec:\llffrrf.exe21⤵
- Executes dropped EXE
PID:2392 -
\??\c:\llxlrlr.exec:\llxlrlr.exe22⤵
- Executes dropped EXE
PID:2332 -
\??\c:\bthnth.exec:\bthnth.exe23⤵
- Executes dropped EXE
PID:2388 -
\??\c:\dvpvd.exec:\dvpvd.exe24⤵
- Executes dropped EXE
PID:828 -
\??\c:\vdjpp.exec:\vdjpp.exe25⤵
- Executes dropped EXE
PID:2488 -
\??\c:\3frrxfr.exec:\3frrxfr.exe26⤵
- Executes dropped EXE
PID:664 -
\??\c:\hbthtb.exec:\hbthtb.exe27⤵
- Executes dropped EXE
PID:1612 -
\??\c:\nhhhtt.exec:\nhhhtt.exe28⤵
- Executes dropped EXE
PID:2216 -
\??\c:\dddjv.exec:\dddjv.exe29⤵
- Executes dropped EXE
PID:2944 -
\??\c:\vpdvj.exec:\vpdvj.exe30⤵
- Executes dropped EXE
PID:1444 -
\??\c:\xrfflxr.exec:\xrfflxr.exe31⤵
- Executes dropped EXE
PID:868 -
\??\c:\llfrxfl.exec:\llfrxfl.exe32⤵
- Executes dropped EXE
PID:2800 -
\??\c:\5hbhhn.exec:\5hbhhn.exe33⤵
- Executes dropped EXE
PID:2804 -
\??\c:\bbthtt.exec:\bbthtt.exe34⤵
- Executes dropped EXE
PID:2816 -
\??\c:\nhhnhh.exec:\nhhnhh.exe35⤵
- Executes dropped EXE
PID:2100 -
\??\c:\jjdjd.exec:\jjdjd.exe36⤵
- Executes dropped EXE
PID:2632 -
\??\c:\9vvdj.exec:\9vvdj.exe37⤵
- Executes dropped EXE
PID:2852 -
\??\c:\xxffrxl.exec:\xxffrxl.exe38⤵
- Executes dropped EXE
PID:2584 -
\??\c:\lfffrxl.exec:\lfffrxl.exe39⤵
- Executes dropped EXE
PID:2904 -
\??\c:\rlrflrf.exec:\rlrflrf.exe40⤵
- Executes dropped EXE
PID:2844 -
\??\c:\3hhhtn.exec:\3hhhtn.exe41⤵
- Executes dropped EXE
PID:2416 -
\??\c:\tththn.exec:\tththn.exe42⤵
- Executes dropped EXE
PID:1480 -
\??\c:\ddjpv.exec:\ddjpv.exe43⤵
- Executes dropped EXE
PID:1288 -
\??\c:\jdvvd.exec:\jdvvd.exe44⤵
- Executes dropped EXE
PID:1532 -
\??\c:\lfrflrx.exec:\lfrflrx.exe45⤵
- Executes dropped EXE
PID:2732 -
\??\c:\7rlxxxl.exec:\7rlxxxl.exe46⤵
- Executes dropped EXE
PID:2288 -
\??\c:\bthhtt.exec:\bthhtt.exe47⤵
- Executes dropped EXE
PID:628 -
\??\c:\hnbtbh.exec:\hnbtbh.exe48⤵
- Executes dropped EXE
PID:1436 -
\??\c:\jvjdv.exec:\jvjdv.exe49⤵
- Executes dropped EXE
PID:348 -
\??\c:\5lflfll.exec:\5lflfll.exe50⤵
- Executes dropped EXE
PID:2504 -
\??\c:\hhtbnn.exec:\hhtbnn.exe51⤵
- Executes dropped EXE
PID:588 -
\??\c:\9dpjv.exec:\9dpjv.exe52⤵
- Executes dropped EXE
PID:1776 -
\??\c:\lfxfrxl.exec:\lfxfrxl.exe53⤵
- Executes dropped EXE
PID:2324 -
\??\c:\5rlrfrx.exec:\5rlrfrx.exe54⤵
- Executes dropped EXE
PID:1280 -
\??\c:\5bhntb.exec:\5bhntb.exe55⤵
- Executes dropped EXE
PID:2180 -
\??\c:\hbnnbb.exec:\hbnnbb.exe56⤵
- Executes dropped EXE
PID:2092 -
\??\c:\vdvdd.exec:\vdvdd.exe57⤵
- Executes dropped EXE
PID:2264 -
\??\c:\vpdpv.exec:\vpdpv.exe58⤵
- Executes dropped EXE
PID:2392 -
\??\c:\rrxfllr.exec:\rrxfllr.exe59⤵
- Executes dropped EXE
PID:2408 -
\??\c:\xrxfxlr.exec:\xrxfxlr.exe60⤵
- Executes dropped EXE
PID:652 -
\??\c:\hbtthh.exec:\hbtthh.exe61⤵
- Executes dropped EXE
PID:1928 -
\??\c:\nnhhnn.exec:\nnhhnn.exe62⤵
- Executes dropped EXE
PID:2432 -
\??\c:\vvvjp.exec:\vvvjp.exe63⤵
- Executes dropped EXE
PID:2468 -
\??\c:\dvddd.exec:\dvddd.exe64⤵
- Executes dropped EXE
PID:344 -
\??\c:\lfrflrf.exec:\lfrflrf.exe65⤵
- Executes dropped EXE
PID:2920 -
\??\c:\xrflrrx.exec:\xrflrrx.exe66⤵PID:2212
-
\??\c:\hbbhtb.exec:\hbbhtb.exe67⤵PID:1984
-
\??\c:\7nbhhb.exec:\7nbhhb.exe68⤵PID:2148
-
\??\c:\ddvvd.exec:\ddvvd.exe69⤵PID:2256
-
\??\c:\dppvd.exec:\dppvd.exe70⤵PID:1256
-
\??\c:\fxrlxrf.exec:\fxrlxrf.exe71⤵PID:1856
-
\??\c:\ffxfrxr.exec:\ffxfrxr.exe72⤵PID:2776
-
\??\c:\hhbhnn.exec:\hhbhnn.exe73⤵PID:2536
-
\??\c:\vpjvv.exec:\vpjvv.exe74⤵PID:2876
-
\??\c:\7vppv.exec:\7vppv.exe75⤵PID:2828
-
\??\c:\pjvdd.exec:\pjvdd.exe76⤵PID:2276
-
\??\c:\lfxxxlx.exec:\lfxxxlx.exe77⤵PID:2528
-
\??\c:\1fflrlf.exec:\1fflrlf.exe78⤵PID:2572
-
\??\c:\bbnbhn.exec:\bbnbhn.exe79⤵PID:2652
-
\??\c:\hbbtnn.exec:\hbbtnn.exe80⤵PID:2592
-
\??\c:\jdjjd.exec:\jdjjd.exe81⤵PID:2980
-
\??\c:\ppvdp.exec:\ppvdp.exe82⤵PID:1100
-
\??\c:\lxrrffl.exec:\lxrrffl.exe83⤵PID:1288
-
\??\c:\rrlrffl.exec:\rrlrffl.exe84⤵PID:2768
-
\??\c:\7tnthh.exec:\7tnthh.exe85⤵PID:2732
-
\??\c:\1httbb.exec:\1httbb.exe86⤵PID:2272
-
\??\c:\hbnnbh.exec:\hbnnbh.exe87⤵PID:628
-
\??\c:\5dvdd.exec:\5dvdd.exe88⤵PID:2280
-
\??\c:\vjpdd.exec:\vjpdd.exe89⤵PID:348
-
\??\c:\rlfrlrx.exec:\rlfrlrx.exe90⤵PID:316
-
\??\c:\xrffllr.exec:\xrffllr.exe91⤵PID:864
-
\??\c:\nntbhh.exec:\nntbhh.exe92⤵PID:1476
-
\??\c:\tnbbnn.exec:\tnbbnn.exe93⤵PID:1200
-
\??\c:\9vjpd.exec:\9vjpd.exe94⤵PID:2924
-
\??\c:\7dvdv.exec:\7dvdv.exe95⤵PID:2180
-
\??\c:\1rrrrxf.exec:\1rrrrxf.exe96⤵PID:1060
-
\??\c:\ffflflf.exec:\ffflflf.exe97⤵PID:2304
-
\??\c:\7nhhbt.exec:\7nhhbt.exe98⤵PID:2228
-
\??\c:\bbtbnt.exec:\bbtbnt.exe99⤵PID:2260
-
\??\c:\nnhhbh.exec:\nnhhbh.exe100⤵PID:2400
-
\??\c:\5jvvv.exec:\5jvvv.exe101⤵PID:1120
-
\??\c:\dpvpv.exec:\dpvpv.exe102⤵PID:2196
-
\??\c:\flxfrrf.exec:\flxfrrf.exe103⤵PID:2488
-
\??\c:\bbttht.exec:\bbttht.exe104⤵PID:552
-
\??\c:\7hbhhh.exec:\7hbhhh.exe105⤵PID:1612
-
\??\c:\vvjpj.exec:\vvjpj.exe106⤵PID:1372
-
\??\c:\jdddd.exec:\jdddd.exe107⤵PID:992
-
\??\c:\frlrfxx.exec:\frlrfxx.exe108⤵PID:1748
-
\??\c:\fxffllx.exec:\fxffllx.exe109⤵PID:1420
-
\??\c:\tnbntt.exec:\tnbntt.exe110⤵PID:2660
-
\??\c:\btbhnt.exec:\btbhnt.exe111⤵PID:2636
-
\??\c:\nbtntb.exec:\nbtntb.exe112⤵PID:2696
-
\??\c:\jjppj.exec:\jjppj.exe113⤵PID:2012
-
\??\c:\pdvvd.exec:\pdvvd.exe114⤵PID:2680
-
\??\c:\5fxxxfr.exec:\5fxxxfr.exe115⤵PID:2828
-
\??\c:\rrfrxrx.exec:\rrfrxrx.exe116⤵PID:2464
-
\??\c:\bbthnt.exec:\bbthnt.exe117⤵PID:2564
-
\??\c:\ttbhhb.exec:\ttbhhb.exe118⤵PID:2532
-
\??\c:\vpdjd.exec:\vpdjd.exe119⤵PID:2548
-
\??\c:\pjvdd.exec:\pjvdd.exe120⤵
- System Location Discovery: System Language Discovery
PID:2984 -
\??\c:\xrffrrf.exec:\xrffrrf.exe121⤵PID:1724
-
\??\c:\xrfrrxr.exec:\xrfrrxr.exe122⤵PID:2724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-