Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe
-
Size
70KB
-
MD5
7156245e761778f632cb48a97f7079cf
-
SHA1
80ca133818d903ecaec718b42ba6cc8c92163384
-
SHA256
702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9
-
SHA512
0602d47234d4323e28992506fb074ac1dc64eefa6fb9e11bc70334afab370862a89b3c479fbe9a205b24353a01d5b04bd43d63dfe96b11bfb32b11d23700e86c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUPqrDZ5RxfB:ymb3NkkiQ3mdBjF0yUmrfB
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2720-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2004-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2160-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1504-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/352-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/804-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1780-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2164-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2912 008080.exe 2908 hbbhhh.exe 2828 c268062.exe 2004 2606440.exe 1796 420026.exe 2356 084462.exe 2684 rxllffl.exe 2160 04286.exe 1724 jjddp.exe 3040 82440.exe 2984 rrxxxlf.exe 2588 vvpjd.exe 1504 tnbbht.exe 2080 tbnbbb.exe 352 fxflrrf.exe 804 042060.exe 1744 08028.exe 2500 pdpvv.exe 2460 dvjjv.exe 2244 604026.exe 1860 jvpvj.exe 448 202288.exe 1300 pjdjv.exe 1356 xrrxffl.exe 1780 pdjvd.exe 572 w08406.exe 2164 pvpvp.exe 1956 vpjpp.exe 2592 1flxlxf.exe 2960 22868.exe 2772 s8286.exe 2732 nbnnnn.exe 2704 9pjjd.exe 2788 hthhtb.exe 2636 0486484.exe 2736 0468402.exe 2436 jdpvd.exe 1088 pjppd.exe 2856 rlllflx.exe 2684 m4624.exe 2068 64668.exe 2160 hbtthb.exe 2848 4244666.exe 2944 jdpvd.exe 2980 64228.exe 2604 048806.exe 2676 480068.exe 3024 hhbbbh.exe 1612 4800284.exe 1168 bhbnbn.exe 2256 608462.exe 264 bbtbbn.exe 2280 o044262.exe 2456 048084.exe 1056 6486628.exe 1968 9xllxxf.exe 564 c422664.exe 2544 g8024.exe 2452 fxlrflr.exe 776 08202.exe 2016 ppdjd.exe 1832 xrxxllr.exe 872 82064.exe 1272 pdpjv.exe -
resource yara_rule behavioral1/memory/2720-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2160-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2160-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1504-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/352-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/804-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1780-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2164-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-280-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s8068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0800228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8284440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i246802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxlrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420044.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2912 2720 702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe 30 PID 2720 wrote to memory of 2912 2720 702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe 30 PID 2720 wrote to memory of 2912 2720 702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe 30 PID 2720 wrote to memory of 2912 2720 702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe 30 PID 2912 wrote to memory of 2908 2912 008080.exe 31 PID 2912 wrote to memory of 2908 2912 008080.exe 31 PID 2912 wrote to memory of 2908 2912 008080.exe 31 PID 2912 wrote to memory of 2908 2912 008080.exe 31 PID 2908 wrote to memory of 2828 2908 hbbhhh.exe 32 PID 2908 wrote to memory of 2828 2908 hbbhhh.exe 32 PID 2908 wrote to memory of 2828 2908 hbbhhh.exe 32 PID 2908 wrote to memory of 2828 2908 hbbhhh.exe 32 PID 2828 wrote to memory of 2004 2828 c268062.exe 33 PID 2828 wrote to memory of 2004 2828 c268062.exe 33 PID 2828 wrote to memory of 2004 2828 c268062.exe 33 PID 2828 wrote to memory of 2004 2828 c268062.exe 33 PID 2004 wrote to memory of 1796 2004 2606440.exe 34 PID 2004 wrote to memory of 1796 2004 2606440.exe 34 PID 2004 wrote to memory of 1796 2004 2606440.exe 34 PID 2004 wrote to memory of 1796 2004 2606440.exe 34 PID 1796 wrote to memory of 2356 1796 420026.exe 35 PID 1796 wrote to memory of 2356 1796 420026.exe 35 PID 1796 wrote to memory of 2356 1796 420026.exe 35 PID 1796 wrote to memory of 2356 1796 420026.exe 35 PID 2356 wrote to memory of 2684 2356 084462.exe 36 PID 2356 wrote to memory of 2684 2356 084462.exe 36 PID 2356 wrote to memory of 2684 2356 084462.exe 36 PID 2356 wrote to memory of 2684 2356 084462.exe 36 PID 2684 wrote to memory of 2160 2684 rxllffl.exe 37 PID 2684 wrote to memory of 2160 2684 rxllffl.exe 37 PID 2684 wrote to memory of 2160 2684 rxllffl.exe 37 PID 2684 wrote to memory of 2160 2684 rxllffl.exe 37 PID 2160 wrote to memory of 1724 2160 04286.exe 38 PID 2160 wrote to memory of 1724 2160 04286.exe 38 PID 2160 wrote to memory of 1724 2160 04286.exe 38 PID 2160 wrote to memory of 1724 2160 04286.exe 38 PID 1724 wrote to memory of 3040 1724 jjddp.exe 39 PID 1724 wrote to memory of 3040 1724 jjddp.exe 39 PID 1724 wrote to memory of 3040 1724 jjddp.exe 39 PID 1724 wrote to memory of 3040 1724 jjddp.exe 39 PID 3040 wrote to memory of 2984 3040 82440.exe 40 PID 3040 wrote to memory of 2984 3040 82440.exe 40 PID 3040 wrote to memory of 2984 3040 82440.exe 40 PID 3040 wrote to memory of 2984 3040 82440.exe 40 PID 2984 wrote to memory of 2588 2984 rrxxxlf.exe 41 PID 2984 wrote to memory of 2588 2984 rrxxxlf.exe 41 PID 2984 wrote to memory of 2588 2984 rrxxxlf.exe 41 PID 2984 wrote to memory of 2588 2984 rrxxxlf.exe 41 PID 2588 wrote to memory of 1504 2588 vvpjd.exe 42 PID 2588 wrote to memory of 1504 2588 vvpjd.exe 42 PID 2588 wrote to memory of 1504 2588 vvpjd.exe 42 PID 2588 wrote to memory of 1504 2588 vvpjd.exe 42 PID 1504 wrote to memory of 2080 1504 tnbbht.exe 43 PID 1504 wrote to memory of 2080 1504 tnbbht.exe 43 PID 1504 wrote to memory of 2080 1504 tnbbht.exe 43 PID 1504 wrote to memory of 2080 1504 tnbbht.exe 43 PID 2080 wrote to memory of 352 2080 tbnbbb.exe 44 PID 2080 wrote to memory of 352 2080 tbnbbb.exe 44 PID 2080 wrote to memory of 352 2080 tbnbbb.exe 44 PID 2080 wrote to memory of 352 2080 tbnbbb.exe 44 PID 352 wrote to memory of 804 352 fxflrrf.exe 45 PID 352 wrote to memory of 804 352 fxflrrf.exe 45 PID 352 wrote to memory of 804 352 fxflrrf.exe 45 PID 352 wrote to memory of 804 352 fxflrrf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe"C:\Users\Admin\AppData\Local\Temp\702ec49cd9a4e3cbcee4c60d531470670530e416333088443512380895f1b7f9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\008080.exec:\008080.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\hbbhhh.exec:\hbbhhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\c268062.exec:\c268062.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\2606440.exec:\2606440.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\420026.exec:\420026.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\084462.exec:\084462.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\rxllffl.exec:\rxllffl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\04286.exec:\04286.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\jjddp.exec:\jjddp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\82440.exec:\82440.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\rrxxxlf.exec:\rrxxxlf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\vvpjd.exec:\vvpjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\tnbbht.exec:\tnbbht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\tbnbbb.exec:\tbnbbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\fxflrrf.exec:\fxflrrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\042060.exec:\042060.exe17⤵
- Executes dropped EXE
PID:804 -
\??\c:\08028.exec:\08028.exe18⤵
- Executes dropped EXE
PID:1744 -
\??\c:\pdpvv.exec:\pdpvv.exe19⤵
- Executes dropped EXE
PID:2500 -
\??\c:\dvjjv.exec:\dvjjv.exe20⤵
- Executes dropped EXE
PID:2460 -
\??\c:\604026.exec:\604026.exe21⤵
- Executes dropped EXE
PID:2244 -
\??\c:\jvpvj.exec:\jvpvj.exe22⤵
- Executes dropped EXE
PID:1860 -
\??\c:\202288.exec:\202288.exe23⤵
- Executes dropped EXE
PID:448 -
\??\c:\pjdjv.exec:\pjdjv.exe24⤵
- Executes dropped EXE
PID:1300 -
\??\c:\xrrxffl.exec:\xrrxffl.exe25⤵
- Executes dropped EXE
PID:1356 -
\??\c:\pdjvd.exec:\pdjvd.exe26⤵
- Executes dropped EXE
PID:1780 -
\??\c:\w08406.exec:\w08406.exe27⤵
- Executes dropped EXE
PID:572 -
\??\c:\pvpvp.exec:\pvpvp.exe28⤵
- Executes dropped EXE
PID:2164 -
\??\c:\vpjpp.exec:\vpjpp.exe29⤵
- Executes dropped EXE
PID:1956 -
\??\c:\1flxlxf.exec:\1flxlxf.exe30⤵
- Executes dropped EXE
PID:2592 -
\??\c:\22868.exec:\22868.exe31⤵
- Executes dropped EXE
PID:2960 -
\??\c:\s8286.exec:\s8286.exe32⤵
- Executes dropped EXE
PID:2772 -
\??\c:\nbnnnn.exec:\nbnnnn.exe33⤵
- Executes dropped EXE
PID:2732 -
\??\c:\9pjjd.exec:\9pjjd.exe34⤵
- Executes dropped EXE
PID:2704 -
\??\c:\hthhtb.exec:\hthhtb.exe35⤵
- Executes dropped EXE
PID:2788 -
\??\c:\0486484.exec:\0486484.exe36⤵
- Executes dropped EXE
PID:2636 -
\??\c:\0468402.exec:\0468402.exe37⤵
- Executes dropped EXE
PID:2736 -
\??\c:\jdpvd.exec:\jdpvd.exe38⤵
- Executes dropped EXE
PID:2436 -
\??\c:\pjppd.exec:\pjppd.exe39⤵
- Executes dropped EXE
PID:1088 -
\??\c:\rlllflx.exec:\rlllflx.exe40⤵
- Executes dropped EXE
PID:2856 -
\??\c:\m4624.exec:\m4624.exe41⤵
- Executes dropped EXE
PID:2684 -
\??\c:\64668.exec:\64668.exe42⤵
- Executes dropped EXE
PID:2068 -
\??\c:\hbtthb.exec:\hbtthb.exe43⤵
- Executes dropped EXE
PID:2160 -
\??\c:\4244666.exec:\4244666.exe44⤵
- Executes dropped EXE
PID:2848 -
\??\c:\jdpvd.exec:\jdpvd.exe45⤵
- Executes dropped EXE
PID:2944 -
\??\c:\64228.exec:\64228.exe46⤵
- Executes dropped EXE
PID:2980 -
\??\c:\048806.exec:\048806.exe47⤵
- Executes dropped EXE
PID:2604 -
\??\c:\480068.exec:\480068.exe48⤵
- Executes dropped EXE
PID:2676 -
\??\c:\hhbbbh.exec:\hhbbbh.exe49⤵
- Executes dropped EXE
PID:3024 -
\??\c:\4800284.exec:\4800284.exe50⤵
- Executes dropped EXE
PID:1612 -
\??\c:\bhbnbn.exec:\bhbnbn.exe51⤵
- Executes dropped EXE
PID:1168 -
\??\c:\608462.exec:\608462.exe52⤵
- Executes dropped EXE
PID:2256 -
\??\c:\bbtbbn.exec:\bbtbbn.exe53⤵
- Executes dropped EXE
PID:264 -
\??\c:\o044262.exec:\o044262.exe54⤵
- Executes dropped EXE
PID:2280 -
\??\c:\048084.exec:\048084.exe55⤵
- Executes dropped EXE
PID:2456 -
\??\c:\6486628.exec:\6486628.exe56⤵
- Executes dropped EXE
PID:1056 -
\??\c:\9xllxxf.exec:\9xllxxf.exe57⤵
- Executes dropped EXE
PID:1968 -
\??\c:\c422664.exec:\c422664.exe58⤵
- Executes dropped EXE
PID:564 -
\??\c:\g8024.exec:\g8024.exe59⤵
- Executes dropped EXE
PID:2544 -
\??\c:\fxlrflr.exec:\fxlrflr.exe60⤵
- Executes dropped EXE
PID:2452 -
\??\c:\08202.exec:\08202.exe61⤵
- Executes dropped EXE
PID:776 -
\??\c:\ppdjd.exec:\ppdjd.exe62⤵
- Executes dropped EXE
PID:2016 -
\??\c:\xrxxllr.exec:\xrxxllr.exe63⤵
- Executes dropped EXE
PID:1832 -
\??\c:\82064.exec:\82064.exe64⤵
- Executes dropped EXE
PID:872 -
\??\c:\pdpjv.exec:\pdpjv.exe65⤵
- Executes dropped EXE
PID:1272 -
\??\c:\jvppd.exec:\jvppd.exe66⤵PID:1924
-
\??\c:\dvjpp.exec:\dvjpp.exe67⤵PID:1732
-
\??\c:\206024.exec:\206024.exe68⤵PID:2044
-
\??\c:\thtbtb.exec:\thtbtb.exe69⤵PID:1700
-
\??\c:\202282.exec:\202282.exe70⤵PID:2904
-
\??\c:\3frflrf.exec:\3frflrf.exe71⤵PID:2748
-
\??\c:\2628666.exec:\2628666.exe72⤵PID:2932
-
\??\c:\g2062.exec:\g2062.exe73⤵
- System Location Discovery: System Language Discovery
PID:2732 -
\??\c:\46488.exec:\46488.exe74⤵PID:2704
-
\??\c:\640028.exec:\640028.exe75⤵PID:2788
-
\??\c:\64688.exec:\64688.exe76⤵PID:2728
-
\??\c:\68648.exec:\68648.exe77⤵PID:2260
-
\??\c:\a4288.exec:\a4288.exe78⤵PID:636
-
\??\c:\nbbbhb.exec:\nbbbhb.exe79⤵PID:1088
-
\??\c:\frfxrlr.exec:\frfxrlr.exe80⤵PID:2856
-
\??\c:\jvdpd.exec:\jvdpd.exe81⤵PID:2684
-
\??\c:\4622828.exec:\4622828.exe82⤵PID:2408
-
\??\c:\5vvpp.exec:\5vvpp.exe83⤵PID:2160
-
\??\c:\g2446.exec:\g2446.exe84⤵PID:1620
-
\??\c:\5nnnnh.exec:\5nnnnh.exe85⤵PID:2944
-
\??\c:\bhhttn.exec:\bhhttn.exe86⤵PID:2980
-
\??\c:\s6628.exec:\s6628.exe87⤵PID:2604
-
\??\c:\vpvvp.exec:\vpvvp.exe88⤵PID:2588
-
\??\c:\5ppvd.exec:\5ppvd.exe89⤵PID:3024
-
\??\c:\xrrlxxf.exec:\xrrlxxf.exe90⤵PID:2028
-
\??\c:\w44000.exec:\w44000.exe91⤵PID:1168
-
\??\c:\680404.exec:\680404.exe92⤵PID:2364
-
\??\c:\hntbtn.exec:\hntbtn.exe93⤵PID:264
-
\??\c:\nbhnth.exec:\nbhnth.exe94⤵PID:2492
-
\??\c:\2466604.exec:\2466604.exe95⤵PID:2456
-
\??\c:\lxrrxrr.exec:\lxrrxrr.exe96⤵PID:1984
-
\??\c:\c688422.exec:\c688422.exe97⤵PID:916
-
\??\c:\nhttnb.exec:\nhttnb.exe98⤵PID:2140
-
\??\c:\lrrlxlr.exec:\lrrlxlr.exe99⤵PID:2544
-
\??\c:\vjpvv.exec:\vjpvv.exe100⤵PID:2452
-
\??\c:\8022666.exec:\8022666.exe101⤵PID:776
-
\??\c:\3jppv.exec:\3jppv.exe102⤵PID:1652
-
\??\c:\084466.exec:\084466.exe103⤵PID:1688
-
\??\c:\9bnntn.exec:\9bnntn.exe104⤵PID:1816
-
\??\c:\c206644.exec:\c206644.exe105⤵PID:1272
-
\??\c:\dpdjp.exec:\dpdjp.exe106⤵PID:1520
-
\??\c:\1vddj.exec:\1vddj.exe107⤵PID:1732
-
\??\c:\s8488.exec:\s8488.exe108⤵PID:2592
-
\??\c:\htbhhh.exec:\htbhhh.exe109⤵PID:1696
-
\??\c:\0866002.exec:\0866002.exe110⤵PID:2624
-
\??\c:\httnbb.exec:\httnbb.exe111⤵PID:2644
-
\??\c:\086282.exec:\086282.exe112⤵PID:2752
-
\??\c:\htbnhh.exec:\htbnhh.exe113⤵PID:2936
-
\??\c:\rlflxxl.exec:\rlflxxl.exe114⤵PID:2660
-
\??\c:\c022000.exec:\c022000.exe115⤵PID:2004
-
\??\c:\ffxfrxx.exec:\ffxfrxx.exe116⤵PID:584
-
\??\c:\086026.exec:\086026.exe117⤵PID:1388
-
\??\c:\u406606.exec:\u406606.exe118⤵PID:2328
-
\??\c:\hhhhtn.exec:\hhhhtn.exe119⤵PID:2144
-
\??\c:\vpdpv.exec:\vpdpv.exe120⤵PID:1628
-
\??\c:\w48004.exec:\w48004.exe121⤵PID:3032
-
\??\c:\thbbhh.exec:\thbbhh.exe122⤵PID:2824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-