Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 05:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d4db9c85fa9495da6140a0db7178e150N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
d4db9c85fa9495da6140a0db7178e150N.exe
-
Size
92KB
-
MD5
d4db9c85fa9495da6140a0db7178e150
-
SHA1
bae87e6faf5f9dee21d621de4ff0133b3e073f77
-
SHA256
d0d847cc8ffc482f51591448828e86a582c3b534a4fcba641b67b9d28d741ccc
-
SHA512
7f09682399c5637e9f6404ce9360f6e43f3268a3872a4454780f63e4d36b703ff4c2b0818b350ecfefaa5a4d55f881d8ff2e7ad3fb453ee859b5b7331376a544
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIS7/b9EUeWpEC3alBlwtn8BLn9t:ymb3NkkiQ3mdBjFIi/REUZnKlb94xs
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2540-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-21-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2084-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2116-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2076-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1936-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1064-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-238-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1804-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-295-0x0000000077100000-0x000000007721F000-memory.dmp family_blackmoon behavioral1/memory/2424-296-0x0000000077220000-0x000000007731A000-memory.dmp family_blackmoon behavioral1/memory/2424-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1640 fxrrxxf.exe 2696 bnhhnn.exe 2084 vvpvj.exe 2500 tnbbnn.exe 2836 vjdvv.exe 2580 vpjjp.exe 2960 5lxxffl.exe 2724 nhnnnt.exe 2732 vvvdv.exe 2328 1rxrffl.exe 1464 3llrffl.exe 2924 tnhhbh.exe 1180 1pjpv.exe 704 ddjpv.exe 2116 3rrrxfr.exe 2076 bnhtbb.exe 1108 bhhnnt.exe 2156 dvddv.exe 1044 fxrrxxf.exe 1936 ffxflfl.exe 2588 btntbh.exe 1064 jdvdp.exe 2244 vpjjj.exe 1148 3xllrxl.exe 540 bttnth.exe 2280 pjjvj.exe 2988 pdvvd.exe 1944 xrflrrx.exe 1804 llfxffl.exe 2424 nhttht.exe 2972 3pdjp.exe 2384 3bnnnn.exe 2220 dpjpd.exe 264 dvjdd.exe 2808 1xfrflx.exe 2764 rlflxfr.exe 2836 7bbhnb.exe 2880 thnhnt.exe 2580 ddpvj.exe 2780 vjvdj.exe 2620 3lrfflr.exe 840 rfxrrrf.exe 2152 thbnnt.exe 628 hbnbnn.exe 2900 dvddp.exe 1692 frrfrrl.exe 2892 7xrxxfl.exe 580 tbhttn.exe 2700 btbbbn.exe 1916 ppdpp.exe 1920 pjjpp.exe 2076 xlxxffl.exe 1620 fxrxffr.exe 2228 bnbbtn.exe 2268 bnbbtt.exe 2708 pdppp.exe 756 vjjdd.exe 2588 rfllrlr.exe 2800 llrxffl.exe 1304 thhntb.exe 1408 bnbhbn.exe 1512 vpddd.exe 3044 pjdjp.exe 3024 vppvv.exe -
resource yara_rule behavioral1/memory/2540-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2116-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2076-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1936-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1064-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-238-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1804-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-295-0x0000000077100000-0x000000007721F000-memory.dmp upx behavioral1/memory/2424-294-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1640 2540 d4db9c85fa9495da6140a0db7178e150N.exe 30 PID 2540 wrote to memory of 1640 2540 d4db9c85fa9495da6140a0db7178e150N.exe 30 PID 2540 wrote to memory of 1640 2540 d4db9c85fa9495da6140a0db7178e150N.exe 30 PID 2540 wrote to memory of 1640 2540 d4db9c85fa9495da6140a0db7178e150N.exe 30 PID 1640 wrote to memory of 2696 1640 fxrrxxf.exe 31 PID 1640 wrote to memory of 2696 1640 fxrrxxf.exe 31 PID 1640 wrote to memory of 2696 1640 fxrrxxf.exe 31 PID 1640 wrote to memory of 2696 1640 fxrrxxf.exe 31 PID 2696 wrote to memory of 2084 2696 bnhhnn.exe 32 PID 2696 wrote to memory of 2084 2696 bnhhnn.exe 32 PID 2696 wrote to memory of 2084 2696 bnhhnn.exe 32 PID 2696 wrote to memory of 2084 2696 bnhhnn.exe 32 PID 2084 wrote to memory of 2500 2084 vvpvj.exe 33 PID 2084 wrote to memory of 2500 2084 vvpvj.exe 33 PID 2084 wrote to memory of 2500 2084 vvpvj.exe 33 PID 2084 wrote to memory of 2500 2084 vvpvj.exe 33 PID 2500 wrote to memory of 2836 2500 tnbbnn.exe 34 PID 2500 wrote to memory of 2836 2500 tnbbnn.exe 34 PID 2500 wrote to memory of 2836 2500 tnbbnn.exe 34 PID 2500 wrote to memory of 2836 2500 tnbbnn.exe 34 PID 2836 wrote to memory of 2580 2836 vjdvv.exe 35 PID 2836 wrote to memory of 2580 2836 vjdvv.exe 35 PID 2836 wrote to memory of 2580 2836 vjdvv.exe 35 PID 2836 wrote to memory of 2580 2836 vjdvv.exe 35 PID 2580 wrote to memory of 2960 2580 vpjjp.exe 36 PID 2580 wrote to memory of 2960 2580 vpjjp.exe 36 PID 2580 wrote to memory of 2960 2580 vpjjp.exe 36 PID 2580 wrote to memory of 2960 2580 vpjjp.exe 36 PID 2960 wrote to memory of 2724 2960 5lxxffl.exe 37 PID 2960 wrote to memory of 2724 2960 5lxxffl.exe 37 PID 2960 wrote to memory of 2724 2960 5lxxffl.exe 37 PID 2960 wrote to memory of 2724 2960 5lxxffl.exe 37 PID 2724 wrote to memory of 2732 2724 nhnnnt.exe 38 PID 2724 wrote to memory of 2732 2724 nhnnnt.exe 38 PID 2724 wrote to memory of 2732 2724 nhnnnt.exe 38 PID 2724 wrote to memory of 2732 2724 nhnnnt.exe 38 PID 2732 wrote to memory of 2328 2732 vvvdv.exe 39 PID 2732 wrote to memory of 2328 2732 vvvdv.exe 39 PID 2732 wrote to memory of 2328 2732 vvvdv.exe 39 PID 2732 wrote to memory of 2328 2732 vvvdv.exe 39 PID 2328 wrote to memory of 1464 2328 1rxrffl.exe 40 PID 2328 wrote to memory of 1464 2328 1rxrffl.exe 40 PID 2328 wrote to memory of 1464 2328 1rxrffl.exe 40 PID 2328 wrote to memory of 1464 2328 1rxrffl.exe 40 PID 1464 wrote to memory of 2924 1464 3llrffl.exe 41 PID 1464 wrote to memory of 2924 1464 3llrffl.exe 41 PID 1464 wrote to memory of 2924 1464 3llrffl.exe 41 PID 1464 wrote to memory of 2924 1464 3llrffl.exe 41 PID 2924 wrote to memory of 1180 2924 tnhhbh.exe 42 PID 2924 wrote to memory of 1180 2924 tnhhbh.exe 42 PID 2924 wrote to memory of 1180 2924 tnhhbh.exe 42 PID 2924 wrote to memory of 1180 2924 tnhhbh.exe 42 PID 1180 wrote to memory of 704 1180 1pjpv.exe 43 PID 1180 wrote to memory of 704 1180 1pjpv.exe 43 PID 1180 wrote to memory of 704 1180 1pjpv.exe 43 PID 1180 wrote to memory of 704 1180 1pjpv.exe 43 PID 704 wrote to memory of 2116 704 ddjpv.exe 44 PID 704 wrote to memory of 2116 704 ddjpv.exe 44 PID 704 wrote to memory of 2116 704 ddjpv.exe 44 PID 704 wrote to memory of 2116 704 ddjpv.exe 44 PID 2116 wrote to memory of 2076 2116 3rrrxfr.exe 45 PID 2116 wrote to memory of 2076 2116 3rrrxfr.exe 45 PID 2116 wrote to memory of 2076 2116 3rrrxfr.exe 45 PID 2116 wrote to memory of 2076 2116 3rrrxfr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4db9c85fa9495da6140a0db7178e150N.exe"C:\Users\Admin\AppData\Local\Temp\d4db9c85fa9495da6140a0db7178e150N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\fxrrxxf.exec:\fxrrxxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\bnhhnn.exec:\bnhhnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\vvpvj.exec:\vvpvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\tnbbnn.exec:\tnbbnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\vjdvv.exec:\vjdvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\vpjjp.exec:\vpjjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\5lxxffl.exec:\5lxxffl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\nhnnnt.exec:\nhnnnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\vvvdv.exec:\vvvdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\1rxrffl.exec:\1rxrffl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\3llrffl.exec:\3llrffl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\tnhhbh.exec:\tnhhbh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\1pjpv.exec:\1pjpv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
\??\c:\ddjpv.exec:\ddjpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
\??\c:\3rrrxfr.exec:\3rrrxfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\bnhtbb.exec:\bnhtbb.exe17⤵
- Executes dropped EXE
PID:2076 -
\??\c:\bhhnnt.exec:\bhhnnt.exe18⤵
- Executes dropped EXE
PID:1108 -
\??\c:\dvddv.exec:\dvddv.exe19⤵
- Executes dropped EXE
PID:2156 -
\??\c:\fxrrxxf.exec:\fxrrxxf.exe20⤵
- Executes dropped EXE
PID:1044 -
\??\c:\ffxflfl.exec:\ffxflfl.exe21⤵
- Executes dropped EXE
PID:1936 -
\??\c:\btntbh.exec:\btntbh.exe22⤵
- Executes dropped EXE
PID:2588 -
\??\c:\jdvdp.exec:\jdvdp.exe23⤵
- Executes dropped EXE
PID:1064 -
\??\c:\vpjjj.exec:\vpjjj.exe24⤵
- Executes dropped EXE
PID:2244 -
\??\c:\3xllrxl.exec:\3xllrxl.exe25⤵
- Executes dropped EXE
PID:1148 -
\??\c:\bttnth.exec:\bttnth.exe26⤵
- Executes dropped EXE
PID:540 -
\??\c:\pjjvj.exec:\pjjvj.exe27⤵
- Executes dropped EXE
PID:2280 -
\??\c:\pdvvd.exec:\pdvvd.exe28⤵
- Executes dropped EXE
PID:2988 -
\??\c:\xrflrrx.exec:\xrflrrx.exe29⤵
- Executes dropped EXE
PID:1944 -
\??\c:\llfxffl.exec:\llfxffl.exe30⤵
- Executes dropped EXE
PID:1804 -
\??\c:\nhttht.exec:\nhttht.exe31⤵
- Executes dropped EXE
PID:2424 -
\??\c:\jvdvv.exec:\jvdvv.exe32⤵PID:1640
-
\??\c:\3pdjp.exec:\3pdjp.exe33⤵
- Executes dropped EXE
PID:2972 -
\??\c:\3bnnnn.exec:\3bnnnn.exe34⤵
- Executes dropped EXE
PID:2384 -
\??\c:\dpjpd.exec:\dpjpd.exe35⤵
- Executes dropped EXE
PID:2220 -
\??\c:\dvjdd.exec:\dvjdd.exe36⤵
- Executes dropped EXE
PID:264 -
\??\c:\1xfrflx.exec:\1xfrflx.exe37⤵
- Executes dropped EXE
PID:2808 -
\??\c:\rlflxfr.exec:\rlflxfr.exe38⤵
- Executes dropped EXE
PID:2764 -
\??\c:\7bbhnb.exec:\7bbhnb.exe39⤵
- Executes dropped EXE
PID:2836 -
\??\c:\thnhnt.exec:\thnhnt.exe40⤵
- Executes dropped EXE
PID:2880 -
\??\c:\ddpvj.exec:\ddpvj.exe41⤵
- Executes dropped EXE
PID:2580 -
\??\c:\vjvdj.exec:\vjvdj.exe42⤵
- Executes dropped EXE
PID:2780 -
\??\c:\3lrfflr.exec:\3lrfflr.exe43⤵
- Executes dropped EXE
PID:2620 -
\??\c:\rfxrrrf.exec:\rfxrrrf.exe44⤵
- Executes dropped EXE
PID:840 -
\??\c:\thbnnt.exec:\thbnnt.exe45⤵
- Executes dropped EXE
PID:2152 -
\??\c:\hbnbnn.exec:\hbnbnn.exe46⤵
- Executes dropped EXE
PID:628 -
\??\c:\dvddp.exec:\dvddp.exe47⤵
- Executes dropped EXE
PID:2900 -
\??\c:\frrfrrl.exec:\frrfrrl.exe48⤵
- Executes dropped EXE
PID:1692 -
\??\c:\7xrxxfl.exec:\7xrxxfl.exe49⤵
- Executes dropped EXE
PID:2892 -
\??\c:\tbhttn.exec:\tbhttn.exe50⤵
- Executes dropped EXE
PID:580 -
\??\c:\btbbbn.exec:\btbbbn.exe51⤵
- Executes dropped EXE
PID:2700 -
\??\c:\ppdpp.exec:\ppdpp.exe52⤵
- Executes dropped EXE
PID:1916 -
\??\c:\pjjpp.exec:\pjjpp.exe53⤵
- Executes dropped EXE
PID:1920 -
\??\c:\xlxxffl.exec:\xlxxffl.exe54⤵
- Executes dropped EXE
PID:2076 -
\??\c:\fxrxffr.exec:\fxrxffr.exe55⤵
- Executes dropped EXE
PID:1620 -
\??\c:\bnbbtn.exec:\bnbbtn.exe56⤵
- Executes dropped EXE
PID:2228 -
\??\c:\bnbbtt.exec:\bnbbtt.exe57⤵
- Executes dropped EXE
PID:2268 -
\??\c:\pdppp.exec:\pdppp.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708 -
\??\c:\vjjdd.exec:\vjjdd.exe59⤵
- Executes dropped EXE
PID:756 -
\??\c:\rfllrlr.exec:\rfllrlr.exe60⤵
- Executes dropped EXE
PID:2588 -
\??\c:\llrxffl.exec:\llrxffl.exe61⤵
- Executes dropped EXE
PID:2800 -
\??\c:\thhntb.exec:\thhntb.exe62⤵
- Executes dropped EXE
PID:1304 -
\??\c:\bnbhbn.exec:\bnbhbn.exe63⤵
- Executes dropped EXE
PID:1408 -
\??\c:\vpddd.exec:\vpddd.exe64⤵
- Executes dropped EXE
PID:1512 -
\??\c:\pjdjp.exec:\pjdjp.exe65⤵
- Executes dropped EXE
PID:3044 -
\??\c:\vppvv.exec:\vppvv.exe66⤵
- Executes dropped EXE
PID:3024 -
\??\c:\5fxfflr.exec:\5fxfflr.exe67⤵PID:1864
-
\??\c:\tnhhbt.exec:\tnhhbt.exe68⤵PID:876
-
\??\c:\dvvpd.exec:\dvvpd.exe69⤵PID:1704
-
\??\c:\jdppj.exec:\jdppj.exe70⤵PID:2540
-
\??\c:\frfxffl.exec:\frfxffl.exe71⤵PID:1576
-
\??\c:\frflxlx.exec:\frflxlx.exe72⤵PID:2532
-
\??\c:\hbbhht.exec:\hbbhht.exe73⤵PID:2284
-
\??\c:\5tnthh.exec:\5tnthh.exe74⤵PID:2884
-
\??\c:\pjvdd.exec:\pjvdd.exe75⤵PID:2252
-
\??\c:\vvpvv.exec:\vvpvv.exe76⤵PID:2716
-
\??\c:\rrrfrfl.exec:\rrrfrfl.exe77⤵PID:588
-
\??\c:\lfxfrrx.exec:\lfxfrrx.exe78⤵PID:2868
-
\??\c:\hbtbhh.exec:\hbtbhh.exe79⤵PID:2728
-
\??\c:\tbtbnt.exec:\tbtbnt.exe80⤵PID:2936
-
\??\c:\pdpvd.exec:\pdpvd.exe81⤵PID:2840
-
\??\c:\vpvjp.exec:\vpvjp.exe82⤵PID:2604
-
\??\c:\rlffffl.exec:\rlffffl.exe83⤵PID:2664
-
\??\c:\xxrxllr.exec:\xxrxllr.exe84⤵PID:2200
-
\??\c:\bttbtt.exec:\bttbtt.exe85⤵PID:1948
-
\??\c:\nhtbhh.exec:\nhtbhh.exe86⤵PID:2948
-
\??\c:\dvppj.exec:\dvppj.exe87⤵PID:1464
-
\??\c:\5vjpv.exec:\5vjpv.exe88⤵PID:1184
-
\??\c:\djvjp.exec:\djvjp.exe89⤵PID:1008
-
\??\c:\lfxlfrf.exec:\lfxlfrf.exe90⤵PID:2896
-
\??\c:\rlffrrx.exec:\rlffrrx.exe91⤵PID:704
-
\??\c:\nbnttt.exec:\nbnttt.exe92⤵PID:2116
-
\??\c:\bthbbt.exec:\bthbbt.exe93⤵PID:1140
-
\??\c:\bbtbhn.exec:\bbtbhn.exe94⤵PID:2648
-
\??\c:\jjvvj.exec:\jjvvj.exe95⤵PID:3040
-
\??\c:\pjddp.exec:\pjddp.exe96⤵PID:2164
-
\??\c:\llxfllr.exec:\llxfllr.exe97⤵PID:1852
-
\??\c:\rfrrffl.exec:\rfrrffl.exe98⤵PID:1848
-
\??\c:\bbhhhb.exec:\bbhhhb.exe99⤵PID:444
-
\??\c:\3btnnn.exec:\3btnnn.exe100⤵PID:3008
-
\??\c:\jdppv.exec:\jdppv.exe101⤵PID:1608
-
\??\c:\pjdjv.exec:\pjdjv.exe102⤵PID:1940
-
\??\c:\9dpvv.exec:\9dpvv.exe103⤵PID:1148
-
\??\c:\7rflxfr.exec:\7rflxfr.exe104⤵PID:1792
-
\??\c:\rlxfllx.exec:\rlxfllx.exe105⤵PID:2032
-
\??\c:\5nbntn.exec:\5nbntn.exe106⤵PID:2248
-
\??\c:\nnnnbb.exec:\nnnnbb.exe107⤵PID:2096
-
\??\c:\vvjdd.exec:\vvjdd.exe108⤵PID:2536
-
\??\c:\7pddd.exec:\7pddd.exe109⤵PID:2524
-
\??\c:\fxfxxxx.exec:\fxfxxxx.exe110⤵PID:340
-
\??\c:\xrfxffl.exec:\xrfxffl.exe111⤵PID:1584
-
\??\c:\thbbnt.exec:\thbbnt.exe112⤵PID:1616
-
\??\c:\1nhhnn.exec:\1nhhnn.exe113⤵PID:2564
-
\??\c:\9nbbbb.exec:\9nbbbb.exe114⤵PID:2968
-
\??\c:\vpddj.exec:\vpddj.exe115⤵PID:2752
-
\??\c:\lllxrff.exec:\lllxrff.exe116⤵PID:2832
-
\??\c:\rrflrrl.exec:\rrflrrl.exe117⤵PID:2768
-
\??\c:\rlxxffl.exec:\rlxxffl.exe118⤵PID:2980
-
\??\c:\nhttbn.exec:\nhttbn.exe119⤵PID:2636
-
\??\c:\tnbbbb.exec:\tnbbbb.exe120⤵
- System Location Discovery: System Language Discovery
PID:2776 -
\??\c:\pjvpd.exec:\pjvpd.exe121⤵PID:2788
-
\??\c:\vpddj.exec:\vpddj.exe122⤵PID:2672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-