Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 03:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe
Resource
win7-20241010-en
6 signatures
120 seconds
General
-
Target
d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe
-
Size
60KB
-
MD5
31df9368bcaad524c0d9467a56a78450
-
SHA1
2cdbeb9c0ccfb102f1b1e81b53ffb0fe0c9cbd9f
-
SHA256
d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348
-
SHA512
29f12a8a24551e1ba51fad1fdb1ea59f13442d8c1c657050e771dce3462ad383688003828739cabb22e7dd5888a462c693b0832ec259fca27c3e0adf28975ea8
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuSwFaEul:ymb3NkkiQ3mdBjFIvIFaEu
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral1/memory/1656-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1012-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1012-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1924-32-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1924-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1544-52-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1544-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1976-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1008-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1504-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1380-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1992-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1184-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2076-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-238-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1424-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1876-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1032-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2364-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1012 0244488.exe 1924 m4664.exe 2232 rxlxllf.exe 1544 08884.exe 1976 s8028.exe 2832 02826.exe 2340 vvjjd.exe 2836 5ntttn.exe 2724 frrflff.exe 1008 68600.exe 2584 208802.exe 2068 i806224.exe 1448 8688822.exe 1556 jjdjv.exe 1504 pdpdv.exe 1380 pdppd.exe 1992 7pdpv.exe 1664 pdjpv.exe 1184 6462822.exe 2872 pjvjp.exe 2076 9rflfrr.exe 2164 202888.exe 2080 rffxrxr.exe 1784 80222.exe 1836 thhhnh.exe 1728 nbtbbb.exe 1424 lxfllrr.exe 1876 6008880.exe 1032 666220.exe 3000 rllrrxf.exe 2364 pjpjv.exe 1656 5lffrrf.exe 3028 02444.exe 352 4206262.exe 1924 868448.exe 2228 lfxfflf.exe 2460 04068.exe 2960 7lfffxx.exe 2808 6080222.exe 2316 080420.exe 2988 6444006.exe 2112 64624.exe 2764 0242266.exe 376 604028.exe 2824 rffxfxx.exe 2540 5pjjp.exe 2128 20660.exe 1880 vjvpv.exe 1932 k84882.exe 2728 nbbtth.exe 2420 rffflfl.exe 1516 xlxrxxf.exe 2508 xlrxffr.exe 1380 m4204.exe 536 u060066.exe 1252 42462.exe 2944 80222.exe 1960 6428440.exe 768 640444.exe 3052 080448.exe 2884 o806440.exe 276 7hnbbh.exe 1080 lxllxxx.exe 1852 frxfxrr.exe -
resource yara_rule behavioral1/memory/1656-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1012-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1544-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1976-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1008-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1504-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1380-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1992-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1184-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2076-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-238-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1424-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1876-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-283-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2364-301-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w24404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u060066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frffxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0862486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nbthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8868680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6008880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1012 1656 d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe 28 PID 1656 wrote to memory of 1012 1656 d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe 28 PID 1656 wrote to memory of 1012 1656 d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe 28 PID 1656 wrote to memory of 1012 1656 d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe 28 PID 1012 wrote to memory of 1924 1012 0244488.exe 29 PID 1012 wrote to memory of 1924 1012 0244488.exe 29 PID 1012 wrote to memory of 1924 1012 0244488.exe 29 PID 1012 wrote to memory of 1924 1012 0244488.exe 29 PID 1924 wrote to memory of 2232 1924 m4664.exe 30 PID 1924 wrote to memory of 2232 1924 m4664.exe 30 PID 1924 wrote to memory of 2232 1924 m4664.exe 30 PID 1924 wrote to memory of 2232 1924 m4664.exe 30 PID 2232 wrote to memory of 1544 2232 rxlxllf.exe 31 PID 2232 wrote to memory of 1544 2232 rxlxllf.exe 31 PID 2232 wrote to memory of 1544 2232 rxlxllf.exe 31 PID 2232 wrote to memory of 1544 2232 rxlxllf.exe 31 PID 1544 wrote to memory of 1976 1544 08884.exe 32 PID 1544 wrote to memory of 1976 1544 08884.exe 32 PID 1544 wrote to memory of 1976 1544 08884.exe 32 PID 1544 wrote to memory of 1976 1544 08884.exe 32 PID 1976 wrote to memory of 2832 1976 s8028.exe 33 PID 1976 wrote to memory of 2832 1976 s8028.exe 33 PID 1976 wrote to memory of 2832 1976 s8028.exe 33 PID 1976 wrote to memory of 2832 1976 s8028.exe 33 PID 2832 wrote to memory of 2340 2832 02826.exe 34 PID 2832 wrote to memory of 2340 2832 02826.exe 34 PID 2832 wrote to memory of 2340 2832 02826.exe 34 PID 2832 wrote to memory of 2340 2832 02826.exe 34 PID 2340 wrote to memory of 2836 2340 vvjjd.exe 35 PID 2340 wrote to memory of 2836 2340 vvjjd.exe 35 PID 2340 wrote to memory of 2836 2340 vvjjd.exe 35 PID 2340 wrote to memory of 2836 2340 vvjjd.exe 35 PID 2836 wrote to memory of 2724 2836 5ntttn.exe 36 PID 2836 wrote to memory of 2724 2836 5ntttn.exe 36 PID 2836 wrote to memory of 2724 2836 5ntttn.exe 36 PID 2836 wrote to memory of 2724 2836 5ntttn.exe 36 PID 2724 wrote to memory of 1008 2724 frrflff.exe 37 PID 2724 wrote to memory of 1008 2724 frrflff.exe 37 PID 2724 wrote to memory of 1008 2724 frrflff.exe 37 PID 2724 wrote to memory of 1008 2724 frrflff.exe 37 PID 1008 wrote to memory of 2584 1008 68600.exe 38 PID 1008 wrote to memory of 2584 1008 68600.exe 38 PID 1008 wrote to memory of 2584 1008 68600.exe 38 PID 1008 wrote to memory of 2584 1008 68600.exe 38 PID 2584 wrote to memory of 2068 2584 208802.exe 39 PID 2584 wrote to memory of 2068 2584 208802.exe 39 PID 2584 wrote to memory of 2068 2584 208802.exe 39 PID 2584 wrote to memory of 2068 2584 208802.exe 39 PID 2068 wrote to memory of 1448 2068 i806224.exe 40 PID 2068 wrote to memory of 1448 2068 i806224.exe 40 PID 2068 wrote to memory of 1448 2068 i806224.exe 40 PID 2068 wrote to memory of 1448 2068 i806224.exe 40 PID 1448 wrote to memory of 1556 1448 8688822.exe 41 PID 1448 wrote to memory of 1556 1448 8688822.exe 41 PID 1448 wrote to memory of 1556 1448 8688822.exe 41 PID 1448 wrote to memory of 1556 1448 8688822.exe 41 PID 1556 wrote to memory of 1504 1556 jjdjv.exe 42 PID 1556 wrote to memory of 1504 1556 jjdjv.exe 42 PID 1556 wrote to memory of 1504 1556 jjdjv.exe 42 PID 1556 wrote to memory of 1504 1556 jjdjv.exe 42 PID 1504 wrote to memory of 1380 1504 pdpdv.exe 43 PID 1504 wrote to memory of 1380 1504 pdpdv.exe 43 PID 1504 wrote to memory of 1380 1504 pdpdv.exe 43 PID 1504 wrote to memory of 1380 1504 pdpdv.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe"C:\Users\Admin\AppData\Local\Temp\d904a9b6b206b9b8949053788c189ba13b1b615706de859fd5c2f70092ce7348N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\0244488.exec:\0244488.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\m4664.exec:\m4664.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\rxlxllf.exec:\rxlxllf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\08884.exec:\08884.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\s8028.exec:\s8028.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\02826.exec:\02826.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\vvjjd.exec:\vvjjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\5ntttn.exec:\5ntttn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\frrflff.exec:\frrflff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\68600.exec:\68600.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\208802.exec:\208802.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\i806224.exec:\i806224.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\8688822.exec:\8688822.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\jjdjv.exec:\jjdjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\pdpdv.exec:\pdpdv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\pdppd.exec:\pdppd.exe17⤵
- Executes dropped EXE
PID:1380 -
\??\c:\7pdpv.exec:\7pdpv.exe18⤵
- Executes dropped EXE
PID:1992 -
\??\c:\pdjpv.exec:\pdjpv.exe19⤵
- Executes dropped EXE
PID:1664 -
\??\c:\6462822.exec:\6462822.exe20⤵
- Executes dropped EXE
PID:1184 -
\??\c:\pjvjp.exec:\pjvjp.exe21⤵
- Executes dropped EXE
PID:2872 -
\??\c:\9rflfrr.exec:\9rflfrr.exe22⤵
- Executes dropped EXE
PID:2076 -
\??\c:\202888.exec:\202888.exe23⤵
- Executes dropped EXE
PID:2164 -
\??\c:\rffxrxr.exec:\rffxrxr.exe24⤵
- Executes dropped EXE
PID:2080 -
\??\c:\80222.exec:\80222.exe25⤵
- Executes dropped EXE
PID:1784 -
\??\c:\thhhnh.exec:\thhhnh.exe26⤵
- Executes dropped EXE
PID:1836 -
\??\c:\nbtbbb.exec:\nbtbbb.exe27⤵
- Executes dropped EXE
PID:1728 -
\??\c:\lxfllrr.exec:\lxfllrr.exe28⤵
- Executes dropped EXE
PID:1424 -
\??\c:\6008880.exec:\6008880.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876 -
\??\c:\666220.exec:\666220.exe30⤵
- Executes dropped EXE
PID:1032 -
\??\c:\rllrrxf.exec:\rllrrxf.exe31⤵
- Executes dropped EXE
PID:3000 -
\??\c:\pjpjv.exec:\pjpjv.exe32⤵
- Executes dropped EXE
PID:2364 -
\??\c:\5lffrrf.exec:\5lffrrf.exe33⤵
- Executes dropped EXE
PID:1656 -
\??\c:\02444.exec:\02444.exe34⤵
- Executes dropped EXE
PID:3028 -
\??\c:\4206262.exec:\4206262.exe35⤵
- Executes dropped EXE
PID:352 -
\??\c:\868448.exec:\868448.exe36⤵
- Executes dropped EXE
PID:1924 -
\??\c:\lfxfflf.exec:\lfxfflf.exe37⤵
- Executes dropped EXE
PID:2228 -
\??\c:\04068.exec:\04068.exe38⤵
- Executes dropped EXE
PID:2460 -
\??\c:\7lfffxx.exec:\7lfffxx.exe39⤵
- Executes dropped EXE
PID:2960 -
\??\c:\6080222.exec:\6080222.exe40⤵
- Executes dropped EXE
PID:2808 -
\??\c:\080420.exec:\080420.exe41⤵
- Executes dropped EXE
PID:2316 -
\??\c:\6444006.exec:\6444006.exe42⤵
- Executes dropped EXE
PID:2988 -
\??\c:\64624.exec:\64624.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112 -
\??\c:\0242266.exec:\0242266.exe44⤵
- Executes dropped EXE
PID:2764 -
\??\c:\604028.exec:\604028.exe45⤵
- Executes dropped EXE
PID:376 -
\??\c:\rffxfxx.exec:\rffxfxx.exe46⤵
- Executes dropped EXE
PID:2824 -
\??\c:\5pjjp.exec:\5pjjp.exe47⤵
- Executes dropped EXE
PID:2540 -
\??\c:\20660.exec:\20660.exe48⤵
- Executes dropped EXE
PID:2128 -
\??\c:\vjvpv.exec:\vjvpv.exe49⤵
- Executes dropped EXE
PID:1880 -
\??\c:\k84882.exec:\k84882.exe50⤵
- Executes dropped EXE
PID:1932 -
\??\c:\nbbtth.exec:\nbbtth.exe51⤵
- Executes dropped EXE
PID:2728 -
\??\c:\rffflfl.exec:\rffflfl.exe52⤵
- Executes dropped EXE
PID:2420 -
\??\c:\xlxrxxf.exec:\xlxrxxf.exe53⤵
- Executes dropped EXE
PID:1516 -
\??\c:\xlrxffr.exec:\xlrxffr.exe54⤵
- Executes dropped EXE
PID:2508 -
\??\c:\m4204.exec:\m4204.exe55⤵
- Executes dropped EXE
PID:1380 -
\??\c:\u060066.exec:\u060066.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536 -
\??\c:\42462.exec:\42462.exe57⤵
- Executes dropped EXE
PID:1252 -
\??\c:\80222.exec:\80222.exe58⤵
- Executes dropped EXE
PID:2944 -
\??\c:\6428440.exec:\6428440.exe59⤵
- Executes dropped EXE
PID:1960 -
\??\c:\640444.exec:\640444.exe60⤵
- Executes dropped EXE
PID:768 -
\??\c:\080448.exec:\080448.exe61⤵
- Executes dropped EXE
PID:3052 -
\??\c:\o806440.exec:\o806440.exe62⤵
- Executes dropped EXE
PID:2884 -
\??\c:\7hnbbh.exec:\7hnbbh.exe63⤵
- Executes dropped EXE
PID:276 -
\??\c:\lxllxxx.exec:\lxllxxx.exe64⤵
- Executes dropped EXE
PID:1080 -
\??\c:\frxfxrr.exec:\frxfxrr.exe65⤵
- Executes dropped EXE
PID:1852 -
\??\c:\nbhhnh.exec:\nbhhnh.exe66⤵PID:1728
-
\??\c:\022882.exec:\022882.exe67⤵PID:1216
-
\??\c:\462220.exec:\462220.exe68⤵PID:1244
-
\??\c:\1bbbtt.exec:\1bbbtt.exe69⤵PID:2408
-
\??\c:\dvddv.exec:\dvddv.exe70⤵PID:2304
-
\??\c:\8688882.exec:\8688882.exe71⤵PID:1872
-
\??\c:\48206.exec:\48206.exe72⤵PID:1464
-
\??\c:\86440.exec:\86440.exe73⤵PID:2248
-
\??\c:\20262.exec:\20262.exe74⤵PID:1900
-
\??\c:\xrfxxxl.exec:\xrfxxxl.exe75⤵PID:1984
-
\??\c:\frlflff.exec:\frlflff.exe76⤵PID:2176
-
\??\c:\vjvvd.exec:\vjvvd.exe77⤵PID:792
-
\??\c:\46644.exec:\46644.exe78⤵PID:1644
-
\??\c:\62224.exec:\62224.exe79⤵PID:1940
-
\??\c:\g6824.exec:\g6824.exe80⤵PID:2652
-
\??\c:\lrfrlfl.exec:\lrfrlfl.exe81⤵PID:2816
-
\??\c:\vjjjp.exec:\vjjjp.exe82⤵PID:2012
-
\??\c:\nbbnnh.exec:\nbbnnh.exe83⤵PID:2656
-
\??\c:\24228.exec:\24228.exe84⤵PID:2972
-
\??\c:\m8400.exec:\m8400.exe85⤵PID:2740
-
\??\c:\e24882.exec:\e24882.exe86⤵PID:2836
-
\??\c:\i868888.exec:\i868888.exe87⤵PID:2516
-
\??\c:\tnnnnh.exec:\tnnnnh.exe88⤵PID:1008
-
\??\c:\24800.exec:\24800.exe89⤵PID:2040
-
\??\c:\vjpjp.exec:\vjpjp.exe90⤵PID:1452
-
\??\c:\w08882.exec:\w08882.exe91⤵PID:2720
-
\??\c:\86884.exec:\86884.exe92⤵PID:2416
-
\??\c:\9lrlllr.exec:\9lrlllr.exe93⤵PID:948
-
\??\c:\86264.exec:\86264.exe94⤵PID:1488
-
\??\c:\0804624.exec:\0804624.exe95⤵PID:2760
-
\??\c:\20622.exec:\20622.exe96⤵PID:1896
-
\??\c:\6800228.exec:\6800228.exe97⤵PID:1248
-
\??\c:\lrxxflr.exec:\lrxxflr.exe98⤵PID:1664
-
\??\c:\rffxxxf.exec:\rffxxxf.exe99⤵PID:1184
-
\??\c:\w08400.exec:\w08400.exe100⤵PID:3044
-
\??\c:\dpdjj.exec:\dpdjj.exe101⤵PID:1948
-
\??\c:\rllfrxx.exec:\rllfrxx.exe102⤵PID:2312
-
\??\c:\o402440.exec:\o402440.exe103⤵PID:1536
-
\??\c:\5llrxxr.exec:\5llrxxr.exe104⤵PID:604
-
\??\c:\82400.exec:\82400.exe105⤵PID:2100
-
\??\c:\08428.exec:\08428.exe106⤵PID:1928
-
\??\c:\26082.exec:\26082.exe107⤵PID:744
-
\??\c:\7xlxrlr.exec:\7xlxrlr.exe108⤵PID:1968
-
\??\c:\nhhhnn.exec:\nhhhnn.exe109⤵PID:1860
-
\??\c:\k88886.exec:\k88886.exe110⤵PID:2892
-
\??\c:\rrfxrxx.exec:\rrfxrxx.exe111⤵PID:2056
-
\??\c:\jdpjv.exec:\jdpjv.exe112⤵PID:3020
-
\??\c:\042440.exec:\042440.exe113⤵PID:2388
-
\??\c:\9jdvv.exec:\9jdvv.exe114⤵
- System Location Discovery: System Language Discovery
PID:2364 -
\??\c:\s6224.exec:\s6224.exe115⤵PID:2248
-
\??\c:\k64444.exec:\k64444.exe116⤵PID:1900
-
\??\c:\xllfxxx.exec:\xllfxxx.exe117⤵PID:1984
-
\??\c:\22468.exec:\22468.exe118⤵PID:2176
-
\??\c:\g4006.exec:\g4006.exe119⤵PID:2232
-
\??\c:\64284.exec:\64284.exe120⤵PID:1644
-
\??\c:\7tbthn.exec:\7tbthn.exe121⤵PID:1940
-
\??\c:\484628.exec:\484628.exe122⤵PID:2652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-