Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 13:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe
-
Size
230KB
-
MD5
2dd1e3632c6935aebbf9567fdb7c97a0
-
SHA1
509cd9d604f2dc3b2f5ed27813e4a1c23f16f12f
-
SHA256
6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3
-
SHA512
6db7c7b36b2197a124c6c742d4f09633c71367def2e61c198dcf1561b8490904c137c3da193ef78077601f64f6b9dc709eac57faa9a09e969ddbe603970d3f9f
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeG+F:n3C9BRo7MlrWKo+lxK6
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2232-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4320-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2232-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1888-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2460-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1004-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4812-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2744-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3588-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/648-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3372-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4064-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/948-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4908-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1012-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3916-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2172-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4256-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1432-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4320 22262.exe 1888 466420.exe 2460 7ttnbt.exe 4812 hbtbnh.exe 2728 8408608.exe 1004 1btnbb.exe 1780 2404860.exe 2744 ffxflxx.exe 2888 jjjvp.exe 3588 o026448.exe 648 frrxrlf.exe 3372 w80044.exe 4744 pvpvv.exe 4064 xrxrrrx.exe 1448 5pvpd.exe 948 nthbnb.exe 4908 g6268.exe 2564 xxffffx.exe 4848 824866.exe 4832 04620.exe 1728 624082.exe 1012 jpvpj.exe 3916 5vpdv.exe 2580 86486.exe 4004 xrrlfxr.exe 2172 86608.exe 4256 1fxlxrl.exe 2512 o842040.exe 4236 262604.exe 1432 nbhbnn.exe 4268 nthnhh.exe 2232 vppdp.exe 1688 vjvpd.exe 972 g6608.exe 1808 vjjdp.exe 5072 jjjpd.exe 436 hbbnhh.exe 2808 6664860.exe 2184 rrxrflr.exe 4448 thhbnn.exe 1784 dvdpp.exe 4180 662666.exe 2960 o008226.exe 2332 vdjvj.exe 1776 xrfxffx.exe 676 002228.exe 2720 c260826.exe 4952 6600004.exe 2180 82480.exe 2260 866468.exe 3140 8868264.exe 1528 06888.exe 3428 a2608.exe 1660 hhttnn.exe 948 ntbtbn.exe 2128 686408.exe 1228 284866.exe 372 pddvj.exe 1372 g2044.exe 2004 jdvpv.exe 3992 7tnbnn.exe 5056 6862684.exe 4120 frrfxlf.exe 3192 628426.exe -
resource yara_rule behavioral2/memory/2232-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2232-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1888-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2460-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1004-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2744-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3588-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/648-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3372-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4064-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/948-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4908-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1012-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3916-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2172-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4256-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4236-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1432-198-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8266042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i800482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4800448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5llfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4320 2232 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 89 PID 2232 wrote to memory of 4320 2232 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 89 PID 2232 wrote to memory of 4320 2232 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 89 PID 4320 wrote to memory of 1888 4320 22262.exe 90 PID 4320 wrote to memory of 1888 4320 22262.exe 90 PID 4320 wrote to memory of 1888 4320 22262.exe 90 PID 1888 wrote to memory of 2460 1888 466420.exe 91 PID 1888 wrote to memory of 2460 1888 466420.exe 91 PID 1888 wrote to memory of 2460 1888 466420.exe 91 PID 2460 wrote to memory of 4812 2460 7ttnbt.exe 92 PID 2460 wrote to memory of 4812 2460 7ttnbt.exe 92 PID 2460 wrote to memory of 4812 2460 7ttnbt.exe 92 PID 4812 wrote to memory of 2728 4812 hbtbnh.exe 93 PID 4812 wrote to memory of 2728 4812 hbtbnh.exe 93 PID 4812 wrote to memory of 2728 4812 hbtbnh.exe 93 PID 2728 wrote to memory of 1004 2728 8408608.exe 94 PID 2728 wrote to memory of 1004 2728 8408608.exe 94 PID 2728 wrote to memory of 1004 2728 8408608.exe 94 PID 1004 wrote to memory of 1780 1004 1btnbb.exe 95 PID 1004 wrote to memory of 1780 1004 1btnbb.exe 95 PID 1004 wrote to memory of 1780 1004 1btnbb.exe 95 PID 1780 wrote to memory of 2744 1780 2404860.exe 96 PID 1780 wrote to memory of 2744 1780 2404860.exe 96 PID 1780 wrote to memory of 2744 1780 2404860.exe 96 PID 2744 wrote to memory of 2888 2744 ffxflxx.exe 97 PID 2744 wrote to memory of 2888 2744 ffxflxx.exe 97 PID 2744 wrote to memory of 2888 2744 ffxflxx.exe 97 PID 2888 wrote to memory of 3588 2888 jjjvp.exe 98 PID 2888 wrote to memory of 3588 2888 jjjvp.exe 98 PID 2888 wrote to memory of 3588 2888 jjjvp.exe 98 PID 3588 wrote to memory of 648 3588 o026448.exe 99 PID 3588 wrote to memory of 648 3588 o026448.exe 99 PID 3588 wrote to memory of 648 3588 o026448.exe 99 PID 648 wrote to memory of 3372 648 frrxrlf.exe 100 PID 648 wrote to memory of 3372 648 frrxrlf.exe 100 PID 648 wrote to memory of 3372 648 frrxrlf.exe 100 PID 3372 wrote to memory of 4744 3372 w80044.exe 101 PID 3372 wrote to memory of 4744 3372 w80044.exe 101 PID 3372 wrote to memory of 4744 3372 w80044.exe 101 PID 4744 wrote to memory of 4064 4744 pvpvv.exe 102 PID 4744 wrote to memory of 4064 4744 pvpvv.exe 102 PID 4744 wrote to memory of 4064 4744 pvpvv.exe 102 PID 4064 wrote to memory of 1448 4064 xrxrrrx.exe 103 PID 4064 wrote to memory of 1448 4064 xrxrrrx.exe 103 PID 4064 wrote to memory of 1448 4064 xrxrrrx.exe 103 PID 1448 wrote to memory of 948 1448 5pvpd.exe 104 PID 1448 wrote to memory of 948 1448 5pvpd.exe 104 PID 1448 wrote to memory of 948 1448 5pvpd.exe 104 PID 948 wrote to memory of 4908 948 nthbnb.exe 105 PID 948 wrote to memory of 4908 948 nthbnb.exe 105 PID 948 wrote to memory of 4908 948 nthbnb.exe 105 PID 4908 wrote to memory of 2564 4908 g6268.exe 106 PID 4908 wrote to memory of 2564 4908 g6268.exe 106 PID 4908 wrote to memory of 2564 4908 g6268.exe 106 PID 2564 wrote to memory of 4848 2564 xxffffx.exe 107 PID 2564 wrote to memory of 4848 2564 xxffffx.exe 107 PID 2564 wrote to memory of 4848 2564 xxffffx.exe 107 PID 4848 wrote to memory of 4832 4848 824866.exe 108 PID 4848 wrote to memory of 4832 4848 824866.exe 108 PID 4848 wrote to memory of 4832 4848 824866.exe 108 PID 4832 wrote to memory of 1728 4832 04620.exe 109 PID 4832 wrote to memory of 1728 4832 04620.exe 109 PID 4832 wrote to memory of 1728 4832 04620.exe 109 PID 1728 wrote to memory of 1012 1728 624082.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe"C:\Users\Admin\AppData\Local\Temp\6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\22262.exec:\22262.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
\??\c:\466420.exec:\466420.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\7ttnbt.exec:\7ttnbt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\hbtbnh.exec:\hbtbnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\8408608.exec:\8408608.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\1btnbb.exec:\1btnbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\2404860.exec:\2404860.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\ffxflxx.exec:\ffxflxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\jjjvp.exec:\jjjvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\o026448.exec:\o026448.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\frrxrlf.exec:\frrxrlf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
\??\c:\w80044.exec:\w80044.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
\??\c:\pvpvv.exec:\pvpvv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\xrxrrrx.exec:\xrxrrrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\5pvpd.exec:\5pvpd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\nthbnb.exec:\nthbnb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
\??\c:\g6268.exec:\g6268.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
\??\c:\xxffffx.exec:\xxffffx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\824866.exec:\824866.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\04620.exec:\04620.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\624082.exec:\624082.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\jpvpj.exec:\jpvpj.exe23⤵
- Executes dropped EXE
PID:1012 -
\??\c:\5vpdv.exec:\5vpdv.exe24⤵
- Executes dropped EXE
PID:3916 -
\??\c:\86486.exec:\86486.exe25⤵
- Executes dropped EXE
PID:2580 -
\??\c:\xrrlfxr.exec:\xrrlfxr.exe26⤵
- Executes dropped EXE
PID:4004 -
\??\c:\86608.exec:\86608.exe27⤵
- Executes dropped EXE
PID:2172 -
\??\c:\1fxlxrl.exec:\1fxlxrl.exe28⤵
- Executes dropped EXE
PID:4256 -
\??\c:\o842040.exec:\o842040.exe29⤵
- Executes dropped EXE
PID:2512 -
\??\c:\262604.exec:\262604.exe30⤵
- Executes dropped EXE
PID:4236 -
\??\c:\nbhbnn.exec:\nbhbnn.exe31⤵
- Executes dropped EXE
PID:1432 -
\??\c:\nthnhh.exec:\nthnhh.exe32⤵
- Executes dropped EXE
PID:4268 -
\??\c:\vppdp.exec:\vppdp.exe33⤵
- Executes dropped EXE
PID:2232 -
\??\c:\vjvpd.exec:\vjvpd.exe34⤵
- Executes dropped EXE
PID:1688 -
\??\c:\g6608.exec:\g6608.exe35⤵
- Executes dropped EXE
PID:972 -
\??\c:\vjjdp.exec:\vjjdp.exe36⤵
- Executes dropped EXE
PID:1808 -
\??\c:\jjjpd.exec:\jjjpd.exe37⤵
- Executes dropped EXE
PID:5072 -
\??\c:\hbbnhh.exec:\hbbnhh.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:436 -
\??\c:\6664860.exec:\6664860.exe39⤵
- Executes dropped EXE
PID:2808 -
\??\c:\rrxrflr.exec:\rrxrflr.exe40⤵
- Executes dropped EXE
PID:2184 -
\??\c:\thhbnn.exec:\thhbnn.exe41⤵
- Executes dropped EXE
PID:4448 -
\??\c:\dvdpp.exec:\dvdpp.exe42⤵
- Executes dropped EXE
PID:1784 -
\??\c:\662666.exec:\662666.exe43⤵
- Executes dropped EXE
PID:4180 -
\??\c:\o008226.exec:\o008226.exe44⤵
- Executes dropped EXE
PID:2960 -
\??\c:\vdjvj.exec:\vdjvj.exe45⤵
- Executes dropped EXE
PID:2332 -
\??\c:\xrfxffx.exec:\xrfxffx.exe46⤵
- Executes dropped EXE
PID:1776 -
\??\c:\002228.exec:\002228.exe47⤵
- Executes dropped EXE
PID:676 -
\??\c:\c260826.exec:\c260826.exe48⤵
- Executes dropped EXE
PID:2720 -
\??\c:\6600004.exec:\6600004.exe49⤵
- Executes dropped EXE
PID:4952 -
\??\c:\82480.exec:\82480.exe50⤵
- Executes dropped EXE
PID:2180 -
\??\c:\866468.exec:\866468.exe51⤵
- Executes dropped EXE
PID:2260 -
\??\c:\8868264.exec:\8868264.exe52⤵
- Executes dropped EXE
PID:3140 -
\??\c:\06888.exec:\06888.exe53⤵
- Executes dropped EXE
PID:1528 -
\??\c:\a2608.exec:\a2608.exe54⤵
- Executes dropped EXE
PID:3428 -
\??\c:\hhttnn.exec:\hhttnn.exe55⤵
- Executes dropped EXE
PID:1660 -
\??\c:\ntbtbn.exec:\ntbtbn.exe56⤵
- Executes dropped EXE
PID:948 -
\??\c:\686408.exec:\686408.exe57⤵
- Executes dropped EXE
PID:2128 -
\??\c:\284866.exec:\284866.exe58⤵
- Executes dropped EXE
PID:1228 -
\??\c:\pddvj.exec:\pddvj.exe59⤵
- Executes dropped EXE
PID:372 -
\??\c:\g2044.exec:\g2044.exe60⤵
- Executes dropped EXE
PID:1372 -
\??\c:\jdvpv.exec:\jdvpv.exe61⤵
- Executes dropped EXE
PID:2004 -
\??\c:\7tnbnn.exec:\7tnbnn.exe62⤵
- Executes dropped EXE
PID:3992 -
\??\c:\6862684.exec:\6862684.exe63⤵
- Executes dropped EXE
PID:5056 -
\??\c:\frrfxlf.exec:\frrfxlf.exe64⤵
- Executes dropped EXE
PID:4120 -
\??\c:\628426.exec:\628426.exe65⤵
- Executes dropped EXE
PID:3192 -
\??\c:\5nnbnh.exec:\5nnbnh.exe66⤵PID:3608
-
\??\c:\4048648.exec:\4048648.exe67⤵PID:4264
-
\??\c:\462660.exec:\462660.exe68⤵PID:1600
-
\??\c:\046060.exec:\046060.exe69⤵PID:5052
-
\??\c:\6460080.exec:\6460080.exe70⤵PID:376
-
\??\c:\840482.exec:\840482.exe71⤵PID:1048
-
\??\c:\o804260.exec:\o804260.exe72⤵PID:1180
-
\??\c:\206044.exec:\206044.exe73⤵PID:4268
-
\??\c:\djddv.exec:\djddv.exe74⤵PID:1988
-
\??\c:\lllxfll.exec:\lllxfll.exe75⤵PID:4624
-
\??\c:\w44866.exec:\w44866.exe76⤵PID:3536
-
\??\c:\2020826.exec:\2020826.exe77⤵PID:4564
-
\??\c:\5nbthb.exec:\5nbthb.exe78⤵PID:2084
-
\??\c:\262648.exec:\262648.exe79⤵PID:2884
-
\??\c:\2844822.exec:\2844822.exe80⤵PID:1116
-
\??\c:\42264.exec:\42264.exe81⤵PID:3188
-
\??\c:\pppjv.exec:\pppjv.exe82⤵PID:5116
-
\??\c:\thbtht.exec:\thbtht.exe83⤵PID:1908
-
\??\c:\3llxlfx.exec:\3llxlfx.exe84⤵PID:4904
-
\??\c:\lrlxlfx.exec:\lrlxlfx.exe85⤵PID:408
-
\??\c:\6420046.exec:\6420046.exe86⤵PID:2352
-
\??\c:\vpjdp.exec:\vpjdp.exe87⤵PID:2488
-
\??\c:\6260860.exec:\6260860.exe88⤵PID:184
-
\??\c:\28624.exec:\28624.exe89⤵PID:3780
-
\??\c:\hbthnb.exec:\hbthnb.exe90⤵PID:3372
-
\??\c:\a2860.exec:\a2860.exe91⤵PID:3588
-
\??\c:\9jdpj.exec:\9jdpj.exe92⤵PID:4968
-
\??\c:\rxffxlr.exec:\rxffxlr.exe93⤵PID:2832
-
\??\c:\86206.exec:\86206.exe94⤵PID:4704
-
\??\c:\nbbbhb.exec:\nbbbhb.exe95⤵PID:2128
-
\??\c:\q28082.exec:\q28082.exe96⤵PID:4796
-
\??\c:\64044.exec:\64044.exe97⤵PID:876
-
\??\c:\262664.exec:\262664.exe98⤵PID:2408
-
\??\c:\84264.exec:\84264.exe99⤵PID:2216
-
\??\c:\084826.exec:\084826.exe100⤵PID:1420
-
\??\c:\9ffxrrr.exec:\9ffxrrr.exe101⤵PID:4840
-
\??\c:\62082.exec:\62082.exe102⤵PID:4256
-
\??\c:\dpvjv.exec:\dpvjv.exe103⤵PID:2812
-
\??\c:\8288060.exec:\8288060.exe104⤵PID:1600
-
\??\c:\nbbnbt.exec:\nbbnbt.exe105⤵PID:5052
-
\??\c:\6040806.exec:\6040806.exe106⤵PID:860
-
\??\c:\q88040.exec:\q88040.exe107⤵PID:1164
-
\??\c:\48402.exec:\48402.exe108⤵PID:3312
-
\??\c:\k44482.exec:\k44482.exe109⤵PID:4268
-
\??\c:\6426606.exec:\6426606.exe110⤵PID:1988
-
\??\c:\rlxxffl.exec:\rlxxffl.exe111⤵PID:3216
-
\??\c:\5hhbtt.exec:\5hhbtt.exe112⤵PID:2836
-
\??\c:\xlrrfll.exec:\xlrrfll.exe113⤵PID:4740
-
\??\c:\bnbtbt.exec:\bnbtbt.exe114⤵PID:4568
-
\??\c:\pdvjv.exec:\pdvjv.exe115⤵PID:756
-
\??\c:\xffrlrl.exec:\xffrlrl.exe116⤵PID:1116
-
\??\c:\g8426.exec:\g8426.exe117⤵PID:2992
-
\??\c:\llrxxxx.exec:\llrxxxx.exe118⤵PID:1220
-
\??\c:\rlrlrll.exec:\rlrlrll.exe119⤵PID:1908
-
\??\c:\8266042.exec:\8266042.exe120⤵
- System Location Discovery: System Language Discovery
PID:3832 -
\??\c:\866604.exec:\866604.exe121⤵PID:4692
-
\??\c:\vjjjv.exec:\vjjjv.exe122⤵PID:1776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-