Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 13:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe
-
Size
63KB
-
MD5
c8ce151fa3fcd0b1c20882d3a9997df5
-
SHA1
c37d8301a59f9d77912c6eb1587cb7e2c367b57a
-
SHA256
f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543
-
SHA512
78a4ecfee64582cd9da0be6eaa9aba068e3273cb5e859fe50d626650fbc6084159ec63630cc288212c4379907bd86b4b9bd895f8c2a054f32af2551da10c52e1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIrmCeRMBJ:ymb3NkkiQ3mdBjFIjeuv
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2716-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1808-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1364-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2656-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2892-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1144-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/700-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-290-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2876 bthnth.exe 2460 48006.exe 2940 a0600.exe 2592 fxlrxxf.exe 1808 rlllrxf.exe 3056 w08680.exe 1364 86806.exe 2216 o004400.exe 2524 042240.exe 2896 0868400.exe 2656 rfrxllx.exe 2792 fxxrlxf.exe 2892 w20406.exe 2076 i046204.exe 844 fxfxxlf.exe 1144 m2060.exe 592 64666.exe 700 s0840.exe 2964 42822.exe 1516 802482.exe 1788 e84840.exe 824 42024.exe 2316 lrlrrfl.exe 1324 644400.exe 2372 602404.exe 2140 82484.exe 2368 6462266.exe 876 bhbttt.exe 2960 w68888.exe 2844 486826.exe 2872 424444.exe 1536 a8680.exe 2812 ntttnb.exe 2204 0802406.exe 2824 nhbbhn.exe 2652 206882.exe 2900 268842.exe 2760 824062.exe 1652 1xlxxrr.exe 2360 1xrllrl.exe 2068 djppv.exe 2092 pdjjp.exe 2948 k46620.exe 624 lfrrrlr.exe 2896 llrrxlr.exe 2328 8028824.exe 2128 hnnnhh.exe 2468 200648.exe 1288 k40664.exe 304 2400600.exe 1848 684404.exe 2996 bhtnnh.exe 1648 820400.exe 2228 q42840.exe 3004 lfxxxff.exe 2148 008462.exe 1076 bbbhnt.exe 828 rfxrxlx.exe 1264 26462.exe 1072 bnnbbb.exe 536 djppv.exe 1512 pddpv.exe 3020 5tnttn.exe 2396 bttttt.exe -
resource yara_rule behavioral1/memory/2716-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1808-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1364-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1144-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/700-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-290-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 080000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c066884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxllflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 802482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2876 2716 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 30 PID 2716 wrote to memory of 2876 2716 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 30 PID 2716 wrote to memory of 2876 2716 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 30 PID 2716 wrote to memory of 2876 2716 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 30 PID 2876 wrote to memory of 2460 2876 bthnth.exe 31 PID 2876 wrote to memory of 2460 2876 bthnth.exe 31 PID 2876 wrote to memory of 2460 2876 bthnth.exe 31 PID 2876 wrote to memory of 2460 2876 bthnth.exe 31 PID 2460 wrote to memory of 2940 2460 48006.exe 32 PID 2460 wrote to memory of 2940 2460 48006.exe 32 PID 2460 wrote to memory of 2940 2460 48006.exe 32 PID 2460 wrote to memory of 2940 2460 48006.exe 32 PID 2940 wrote to memory of 2592 2940 a0600.exe 33 PID 2940 wrote to memory of 2592 2940 a0600.exe 33 PID 2940 wrote to memory of 2592 2940 a0600.exe 33 PID 2940 wrote to memory of 2592 2940 a0600.exe 33 PID 2592 wrote to memory of 1808 2592 fxlrxxf.exe 34 PID 2592 wrote to memory of 1808 2592 fxlrxxf.exe 34 PID 2592 wrote to memory of 1808 2592 fxlrxxf.exe 34 PID 2592 wrote to memory of 1808 2592 fxlrxxf.exe 34 PID 1808 wrote to memory of 3056 1808 rlllrxf.exe 35 PID 1808 wrote to memory of 3056 1808 rlllrxf.exe 35 PID 1808 wrote to memory of 3056 1808 rlllrxf.exe 35 PID 1808 wrote to memory of 3056 1808 rlllrxf.exe 35 PID 3056 wrote to memory of 1364 3056 w08680.exe 36 PID 3056 wrote to memory of 1364 3056 w08680.exe 36 PID 3056 wrote to memory of 1364 3056 w08680.exe 36 PID 3056 wrote to memory of 1364 3056 w08680.exe 36 PID 1364 wrote to memory of 2216 1364 86806.exe 37 PID 1364 wrote to memory of 2216 1364 86806.exe 37 PID 1364 wrote to memory of 2216 1364 86806.exe 37 PID 1364 wrote to memory of 2216 1364 86806.exe 37 PID 2216 wrote to memory of 2524 2216 o004400.exe 38 PID 2216 wrote to memory of 2524 2216 o004400.exe 38 PID 2216 wrote to memory of 2524 2216 o004400.exe 38 PID 2216 wrote to memory of 2524 2216 o004400.exe 38 PID 2524 wrote to memory of 2896 2524 042240.exe 39 PID 2524 wrote to memory of 2896 2524 042240.exe 39 PID 2524 wrote to memory of 2896 2524 042240.exe 39 PID 2524 wrote to memory of 2896 2524 042240.exe 39 PID 2896 wrote to memory of 2656 2896 0868400.exe 40 PID 2896 wrote to memory of 2656 2896 0868400.exe 40 PID 2896 wrote to memory of 2656 2896 0868400.exe 40 PID 2896 wrote to memory of 2656 2896 0868400.exe 40 PID 2656 wrote to memory of 2792 2656 rfrxllx.exe 41 PID 2656 wrote to memory of 2792 2656 rfrxllx.exe 41 PID 2656 wrote to memory of 2792 2656 rfrxllx.exe 41 PID 2656 wrote to memory of 2792 2656 rfrxllx.exe 41 PID 2792 wrote to memory of 2892 2792 fxxrlxf.exe 42 PID 2792 wrote to memory of 2892 2792 fxxrlxf.exe 42 PID 2792 wrote to memory of 2892 2792 fxxrlxf.exe 42 PID 2792 wrote to memory of 2892 2792 fxxrlxf.exe 42 PID 2892 wrote to memory of 2076 2892 w20406.exe 43 PID 2892 wrote to memory of 2076 2892 w20406.exe 43 PID 2892 wrote to memory of 2076 2892 w20406.exe 43 PID 2892 wrote to memory of 2076 2892 w20406.exe 43 PID 2076 wrote to memory of 844 2076 i046204.exe 44 PID 2076 wrote to memory of 844 2076 i046204.exe 44 PID 2076 wrote to memory of 844 2076 i046204.exe 44 PID 2076 wrote to memory of 844 2076 i046204.exe 44 PID 844 wrote to memory of 1144 844 fxfxxlf.exe 45 PID 844 wrote to memory of 1144 844 fxfxxlf.exe 45 PID 844 wrote to memory of 1144 844 fxfxxlf.exe 45 PID 844 wrote to memory of 1144 844 fxfxxlf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe"C:\Users\Admin\AppData\Local\Temp\f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\bthnth.exec:\bthnth.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\48006.exec:\48006.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\a0600.exec:\a0600.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\fxlrxxf.exec:\fxlrxxf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\rlllrxf.exec:\rlllrxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\w08680.exec:\w08680.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\86806.exec:\86806.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
\??\c:\o004400.exec:\o004400.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\042240.exec:\042240.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\0868400.exec:\0868400.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\rfrxllx.exec:\rfrxllx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\fxxrlxf.exec:\fxxrlxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\w20406.exec:\w20406.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\i046204.exec:\i046204.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\fxfxxlf.exec:\fxfxxlf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
\??\c:\m2060.exec:\m2060.exe17⤵
- Executes dropped EXE
PID:1144 -
\??\c:\64666.exec:\64666.exe18⤵
- Executes dropped EXE
PID:592 -
\??\c:\s0840.exec:\s0840.exe19⤵
- Executes dropped EXE
PID:700 -
\??\c:\42822.exec:\42822.exe20⤵
- Executes dropped EXE
PID:2964 -
\??\c:\802482.exec:\802482.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
\??\c:\e84840.exec:\e84840.exe22⤵
- Executes dropped EXE
PID:1788 -
\??\c:\42024.exec:\42024.exe23⤵
- Executes dropped EXE
PID:824 -
\??\c:\lrlrrfl.exec:\lrlrrfl.exe24⤵
- Executes dropped EXE
PID:2316 -
\??\c:\644400.exec:\644400.exe25⤵
- Executes dropped EXE
PID:1324 -
\??\c:\602404.exec:\602404.exe26⤵
- Executes dropped EXE
PID:2372 -
\??\c:\82484.exec:\82484.exe27⤵
- Executes dropped EXE
PID:2140 -
\??\c:\6462266.exec:\6462266.exe28⤵
- Executes dropped EXE
PID:2368 -
\??\c:\bhbttt.exec:\bhbttt.exe29⤵
- Executes dropped EXE
PID:876 -
\??\c:\w68888.exec:\w68888.exe30⤵
- Executes dropped EXE
PID:2960 -
\??\c:\486826.exec:\486826.exe31⤵
- Executes dropped EXE
PID:2844 -
\??\c:\424444.exec:\424444.exe32⤵
- Executes dropped EXE
PID:2872 -
\??\c:\a8680.exec:\a8680.exe33⤵
- Executes dropped EXE
PID:1536 -
\??\c:\ntttnb.exec:\ntttnb.exe34⤵
- Executes dropped EXE
PID:2812 -
\??\c:\0802406.exec:\0802406.exe35⤵
- Executes dropped EXE
PID:2204 -
\??\c:\nhbbhn.exec:\nhbbhn.exe36⤵
- Executes dropped EXE
PID:2824 -
\??\c:\206882.exec:\206882.exe37⤵
- Executes dropped EXE
PID:2652 -
\??\c:\268842.exec:\268842.exe38⤵
- Executes dropped EXE
PID:2900 -
\??\c:\824062.exec:\824062.exe39⤵
- Executes dropped EXE
PID:2760 -
\??\c:\1xlxxrr.exec:\1xlxxrr.exe40⤵
- Executes dropped EXE
PID:1652 -
\??\c:\1xrllrl.exec:\1xrllrl.exe41⤵
- Executes dropped EXE
PID:2360 -
\??\c:\djppv.exec:\djppv.exe42⤵
- Executes dropped EXE
PID:2068 -
\??\c:\pdjjp.exec:\pdjjp.exe43⤵
- Executes dropped EXE
PID:2092 -
\??\c:\k46620.exec:\k46620.exe44⤵
- Executes dropped EXE
PID:2948 -
\??\c:\lfrrrlr.exec:\lfrrrlr.exe45⤵
- Executes dropped EXE
PID:624 -
\??\c:\llrrxlr.exec:\llrrxlr.exe46⤵
- Executes dropped EXE
PID:2896 -
\??\c:\8028824.exec:\8028824.exe47⤵
- Executes dropped EXE
PID:2328 -
\??\c:\hnnnhh.exec:\hnnnhh.exe48⤵
- Executes dropped EXE
PID:2128 -
\??\c:\200648.exec:\200648.exe49⤵
- Executes dropped EXE
PID:2468 -
\??\c:\k40664.exec:\k40664.exe50⤵
- Executes dropped EXE
PID:1288 -
\??\c:\2400600.exec:\2400600.exe51⤵
- Executes dropped EXE
PID:304 -
\??\c:\684404.exec:\684404.exe52⤵
- Executes dropped EXE
PID:1848 -
\??\c:\bhtnnh.exec:\bhtnnh.exe53⤵
- Executes dropped EXE
PID:2996 -
\??\c:\820400.exec:\820400.exe54⤵
- Executes dropped EXE
PID:1648 -
\??\c:\q42840.exec:\q42840.exe55⤵
- Executes dropped EXE
PID:2228 -
\??\c:\lfxxxff.exec:\lfxxxff.exe56⤵
- Executes dropped EXE
PID:3004 -
\??\c:\008462.exec:\008462.exe57⤵
- Executes dropped EXE
PID:2148 -
\??\c:\bbbhnt.exec:\bbbhnt.exe58⤵
- Executes dropped EXE
PID:1076 -
\??\c:\rfxrxlx.exec:\rfxrxlx.exe59⤵
- Executes dropped EXE
PID:828 -
\??\c:\26462.exec:\26462.exe60⤵
- Executes dropped EXE
PID:1264 -
\??\c:\bnnbbb.exec:\bnnbbb.exe61⤵
- Executes dropped EXE
PID:1072 -
\??\c:\djppv.exec:\djppv.exe62⤵
- Executes dropped EXE
PID:536 -
\??\c:\pddpv.exec:\pddpv.exe63⤵
- Executes dropped EXE
PID:1512 -
\??\c:\5tnttn.exec:\5tnttn.exe64⤵
- Executes dropped EXE
PID:3020 -
\??\c:\bttttt.exec:\bttttt.exe65⤵
- Executes dropped EXE
PID:2396 -
\??\c:\xffxfxl.exec:\xffxfxl.exe66⤵PID:2388
-
\??\c:\42224.exec:\42224.exe67⤵PID:1904
-
\??\c:\806666.exec:\806666.exe68⤵PID:2012
-
\??\c:\086884.exec:\086884.exe69⤵PID:2020
-
\??\c:\8028448.exec:\8028448.exe70⤵PID:2740
-
\??\c:\tnhbbt.exec:\tnhbbt.exe71⤵PID:2880
-
\??\c:\rrffffx.exec:\rrffffx.exe72⤵PID:2472
-
\??\c:\rxllflf.exec:\rxllflf.exe73⤵
- System Location Discovery: System Language Discovery
PID:2864 -
\??\c:\i468666.exec:\i468666.exe74⤵PID:2812
-
\??\c:\3ttntt.exec:\3ttntt.exe75⤵PID:2204
-
\??\c:\vpdvv.exec:\vpdvv.exe76⤵PID:2708
-
\??\c:\vjddd.exec:\vjddd.exe77⤵PID:3040
-
\??\c:\nhttnh.exec:\nhttnh.exe78⤵PID:2156
-
\??\c:\086844.exec:\086844.exe79⤵PID:1100
-
\??\c:\20622.exec:\20622.exe80⤵PID:2576
-
\??\c:\04666.exec:\04666.exe81⤵PID:2060
-
\??\c:\lxffxlx.exec:\lxffxlx.exe82⤵PID:2376
-
\??\c:\22062.exec:\22062.exe83⤵PID:2164
-
\??\c:\rfrrrrf.exec:\rfrrrrf.exe84⤵PID:1476
-
\??\c:\jppjp.exec:\jppjp.exe85⤵PID:1384
-
\??\c:\o204062.exec:\o204062.exe86⤵PID:2808
-
\??\c:\xxfffrr.exec:\xxfffrr.exe87⤵PID:1196
-
\??\c:\200684.exec:\200684.exe88⤵PID:2180
-
\??\c:\20802.exec:\20802.exe89⤵PID:3028
-
\??\c:\htbttn.exec:\htbttn.exe90⤵PID:1288
-
\??\c:\04884.exec:\04884.exe91⤵PID:1992
-
\??\c:\lfllffl.exec:\lfllffl.exe92⤵PID:1848
-
\??\c:\vjvdj.exec:\vjvdj.exe93⤵PID:2572
-
\??\c:\644288.exec:\644288.exe94⤵PID:1084
-
\??\c:\6068062.exec:\6068062.exe95⤵PID:2104
-
\??\c:\vpjjj.exec:\vpjjj.exe96⤵PID:2348
-
\??\c:\fxlxfrf.exec:\fxlxfrf.exe97⤵PID:2004
-
\??\c:\64646.exec:\64646.exe98⤵PID:2132
-
\??\c:\7jdjp.exec:\7jdjp.exe99⤵PID:1792
-
\??\c:\82666.exec:\82666.exe100⤵PID:2392
-
\??\c:\9nnhnt.exec:\9nnhnt.exe101⤵PID:2668
-
\??\c:\rlrrrxf.exec:\rlrrrxf.exe102⤵PID:1744
-
\??\c:\tththt.exec:\tththt.exe103⤵PID:1028
-
\??\c:\ddvvd.exec:\ddvvd.exe104⤵PID:2248
-
\??\c:\hhnthn.exec:\hhnthn.exe105⤵PID:980
-
\??\c:\8280688.exec:\8280688.exe106⤵PID:1736
-
\??\c:\a0406.exec:\a0406.exe107⤵PID:2556
-
\??\c:\2640624.exec:\2640624.exe108⤵PID:2716
-
\??\c:\1pvjp.exec:\1pvjp.exe109⤵PID:2960
-
\??\c:\48284.exec:\48284.exe110⤵PID:2744
-
\??\c:\rlrlxll.exec:\rlrlxll.exe111⤵PID:2704
-
\??\c:\48028.exec:\48028.exe112⤵PID:1564
-
\??\c:\ffrxlrx.exec:\ffrxlrx.exe113⤵PID:1536
-
\??\c:\i206280.exec:\i206280.exe114⤵PID:2752
-
\??\c:\266800.exec:\266800.exe115⤵PID:2940
-
\??\c:\7fxflrl.exec:\7fxflrl.exe116⤵PID:2840
-
\??\c:\8206824.exec:\8206824.exe117⤵PID:2660
-
\??\c:\ddjpd.exec:\ddjpd.exe118⤵PID:1656
-
\??\c:\7lrlrxl.exec:\7lrlrxl.exe119⤵PID:2760
-
\??\c:\rlfrrxl.exec:\rlfrrxl.exe120⤵
- System Location Discovery: System Language Discovery
PID:2576 -
\??\c:\xxxfrlf.exec:\xxxfrlf.exe121⤵PID:632
-
\??\c:\tnbbhn.exec:\tnbbhn.exe122⤵PID:2944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-