Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 04:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe
-
Size
59KB
-
MD5
c6b0004e44a84f3897464ef81e6b0964
-
SHA1
7e91a91f43e3f6b3b4cfb3b43a93012c480f4ed8
-
SHA256
cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b
-
SHA512
90cbcae3e89b6b6e9a82033f650433e71a1770ba62f3d1589b461df0da995d13ae0d399d83c31e24989698d9c981391483870977838ba2fe911580eb4547eeb0
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFYuS:ymb3NkkiQ3mdBjFIFnS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2632-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2080-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/888-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2288-72-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2288-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2488-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1268-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1008-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1844-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1872-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1620-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2080 60240.exe 888 000044.exe 2524 bthhbb.exe 2564 g2624.exe 2972 xxxlrff.exe 2288 406040.exe 2996 vdvjp.exe 2868 k62222.exe 2764 3flrxfr.exe 2488 022262.exe 1268 7dpvd.exe 1008 6684686.exe 1776 7fffrrx.exe 2596 6088240.exe 592 2646406.exe 1716 jjpvp.exe 1624 i640624.exe 1844 ntntbb.exe 2908 lxlfrxf.exe 2796 ffxfrfr.exe 2208 i240846.exe 2460 486868.exe 2676 xrllxfl.exe 1736 5jvvd.exe 296 pdddd.exe 1572 086282.exe 1872 pdppp.exe 1720 46880.exe 2128 3lrrrrx.exe 1620 0484624.exe 2332 464462.exe 888 60840.exe 2600 08246.exe 1532 0042804.exe 3060 5vvjv.exe 3012 42860.exe 2824 o066446.exe 2972 pvppp.exe 2800 2600280.exe 2952 g0064.exe 2660 q46602.exe 2760 w26868.exe 2740 2088066.exe 2772 408022.exe 1612 nhbbbt.exe 1980 e82862.exe 1800 c462446.exe 1292 k84084.exe 2108 02686.exe 1552 3jjpd.exe 2036 5ppvd.exe 1688 7nnttb.exe 1076 pdpvd.exe 1692 5xlflfl.exe 1376 k86266.exe 112 268428.exe 2104 8268686.exe 1548 bbbhhn.exe 912 080880.exe 2188 9dddd.exe 328 ddvdv.exe 1876 k60262.exe 296 ffrrlxl.exe 2468 w68400.exe -
resource yara_rule behavioral1/memory/2632-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2080-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/888-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1268-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1008-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1844-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1872-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1620-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2202606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2062288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6608624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrrxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2028006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflflrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2080 2632 cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe 30 PID 2632 wrote to memory of 2080 2632 cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe 30 PID 2632 wrote to memory of 2080 2632 cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe 30 PID 2632 wrote to memory of 2080 2632 cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe 30 PID 2080 wrote to memory of 888 2080 60240.exe 31 PID 2080 wrote to memory of 888 2080 60240.exe 31 PID 2080 wrote to memory of 888 2080 60240.exe 31 PID 2080 wrote to memory of 888 2080 60240.exe 31 PID 888 wrote to memory of 2524 888 000044.exe 32 PID 888 wrote to memory of 2524 888 000044.exe 32 PID 888 wrote to memory of 2524 888 000044.exe 32 PID 888 wrote to memory of 2524 888 000044.exe 32 PID 2524 wrote to memory of 2564 2524 bthhbb.exe 33 PID 2524 wrote to memory of 2564 2524 bthhbb.exe 33 PID 2524 wrote to memory of 2564 2524 bthhbb.exe 33 PID 2524 wrote to memory of 2564 2524 bthhbb.exe 33 PID 2564 wrote to memory of 2972 2564 g2624.exe 34 PID 2564 wrote to memory of 2972 2564 g2624.exe 34 PID 2564 wrote to memory of 2972 2564 g2624.exe 34 PID 2564 wrote to memory of 2972 2564 g2624.exe 34 PID 2972 wrote to memory of 2288 2972 xxxlrff.exe 35 PID 2972 wrote to memory of 2288 2972 xxxlrff.exe 35 PID 2972 wrote to memory of 2288 2972 xxxlrff.exe 35 PID 2972 wrote to memory of 2288 2972 xxxlrff.exe 35 PID 2288 wrote to memory of 2996 2288 406040.exe 36 PID 2288 wrote to memory of 2996 2288 406040.exe 36 PID 2288 wrote to memory of 2996 2288 406040.exe 36 PID 2288 wrote to memory of 2996 2288 406040.exe 36 PID 2996 wrote to memory of 2868 2996 vdvjp.exe 37 PID 2996 wrote to memory of 2868 2996 vdvjp.exe 37 PID 2996 wrote to memory of 2868 2996 vdvjp.exe 37 PID 2996 wrote to memory of 2868 2996 vdvjp.exe 37 PID 2868 wrote to memory of 2764 2868 k62222.exe 38 PID 2868 wrote to memory of 2764 2868 k62222.exe 38 PID 2868 wrote to memory of 2764 2868 k62222.exe 38 PID 2868 wrote to memory of 2764 2868 k62222.exe 38 PID 2764 wrote to memory of 2488 2764 3flrxfr.exe 39 PID 2764 wrote to memory of 2488 2764 3flrxfr.exe 39 PID 2764 wrote to memory of 2488 2764 3flrxfr.exe 39 PID 2764 wrote to memory of 2488 2764 3flrxfr.exe 39 PID 2488 wrote to memory of 1268 2488 022262.exe 40 PID 2488 wrote to memory of 1268 2488 022262.exe 40 PID 2488 wrote to memory of 1268 2488 022262.exe 40 PID 2488 wrote to memory of 1268 2488 022262.exe 40 PID 1268 wrote to memory of 1008 1268 7dpvd.exe 41 PID 1268 wrote to memory of 1008 1268 7dpvd.exe 41 PID 1268 wrote to memory of 1008 1268 7dpvd.exe 41 PID 1268 wrote to memory of 1008 1268 7dpvd.exe 41 PID 1008 wrote to memory of 1776 1008 6684686.exe 42 PID 1008 wrote to memory of 1776 1008 6684686.exe 42 PID 1008 wrote to memory of 1776 1008 6684686.exe 42 PID 1008 wrote to memory of 1776 1008 6684686.exe 42 PID 1776 wrote to memory of 2596 1776 7fffrrx.exe 43 PID 1776 wrote to memory of 2596 1776 7fffrrx.exe 43 PID 1776 wrote to memory of 2596 1776 7fffrrx.exe 43 PID 1776 wrote to memory of 2596 1776 7fffrrx.exe 43 PID 2596 wrote to memory of 592 2596 6088240.exe 44 PID 2596 wrote to memory of 592 2596 6088240.exe 44 PID 2596 wrote to memory of 592 2596 6088240.exe 44 PID 2596 wrote to memory of 592 2596 6088240.exe 44 PID 592 wrote to memory of 1716 592 2646406.exe 45 PID 592 wrote to memory of 1716 592 2646406.exe 45 PID 592 wrote to memory of 1716 592 2646406.exe 45 PID 592 wrote to memory of 1716 592 2646406.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe"C:\Users\Admin\AppData\Local\Temp\cc69023d29f668e2275b551cb9396cce4353f0ca51f3ab8a3950af0c687df31b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\60240.exec:\60240.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\000044.exec:\000044.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\bthhbb.exec:\bthhbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\g2624.exec:\g2624.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\xxxlrff.exec:\xxxlrff.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\406040.exec:\406040.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\vdvjp.exec:\vdvjp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\k62222.exec:\k62222.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\3flrxfr.exec:\3flrxfr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\022262.exec:\022262.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\7dpvd.exec:\7dpvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\6684686.exec:\6684686.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\7fffrrx.exec:\7fffrrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\6088240.exec:\6088240.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\2646406.exec:\2646406.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\jjpvp.exec:\jjpvp.exe17⤵
- Executes dropped EXE
PID:1716 -
\??\c:\i640624.exec:\i640624.exe18⤵
- Executes dropped EXE
PID:1624 -
\??\c:\ntntbb.exec:\ntntbb.exe19⤵
- Executes dropped EXE
PID:1844 -
\??\c:\lxlfrxf.exec:\lxlfrxf.exe20⤵
- Executes dropped EXE
PID:2908 -
\??\c:\ffxfrfr.exec:\ffxfrfr.exe21⤵
- Executes dropped EXE
PID:2796 -
\??\c:\i240846.exec:\i240846.exe22⤵
- Executes dropped EXE
PID:2208 -
\??\c:\486868.exec:\486868.exe23⤵
- Executes dropped EXE
PID:2460 -
\??\c:\xrllxfl.exec:\xrllxfl.exe24⤵
- Executes dropped EXE
PID:2676 -
\??\c:\5jvvd.exec:\5jvvd.exe25⤵
- Executes dropped EXE
PID:1736 -
\??\c:\pdddd.exec:\pdddd.exe26⤵
- Executes dropped EXE
PID:296 -
\??\c:\086282.exec:\086282.exe27⤵
- Executes dropped EXE
PID:1572 -
\??\c:\pdppp.exec:\pdppp.exe28⤵
- Executes dropped EXE
PID:1872 -
\??\c:\46880.exec:\46880.exe29⤵
- Executes dropped EXE
PID:1720 -
\??\c:\3lrrrrx.exec:\3lrrrrx.exe30⤵
- Executes dropped EXE
PID:2128 -
\??\c:\0484624.exec:\0484624.exe31⤵
- Executes dropped EXE
PID:1620 -
\??\c:\464462.exec:\464462.exe32⤵
- Executes dropped EXE
PID:2332 -
\??\c:\60840.exec:\60840.exe33⤵
- Executes dropped EXE
PID:888 -
\??\c:\08246.exec:\08246.exe34⤵
- Executes dropped EXE
PID:2600 -
\??\c:\0042804.exec:\0042804.exe35⤵
- Executes dropped EXE
PID:1532 -
\??\c:\5vvjv.exec:\5vvjv.exe36⤵
- Executes dropped EXE
PID:3060 -
\??\c:\42860.exec:\42860.exe37⤵
- Executes dropped EXE
PID:3012 -
\??\c:\o066446.exec:\o066446.exe38⤵
- Executes dropped EXE
PID:2824 -
\??\c:\pvppp.exec:\pvppp.exe39⤵
- Executes dropped EXE
PID:2972 -
\??\c:\2600280.exec:\2600280.exe40⤵
- Executes dropped EXE
PID:2800 -
\??\c:\g0064.exec:\g0064.exe41⤵
- Executes dropped EXE
PID:2952 -
\??\c:\q46602.exec:\q46602.exe42⤵
- Executes dropped EXE
PID:2660 -
\??\c:\w26868.exec:\w26868.exe43⤵
- Executes dropped EXE
PID:2760 -
\??\c:\2088066.exec:\2088066.exe44⤵
- Executes dropped EXE
PID:2740 -
\??\c:\408022.exec:\408022.exe45⤵
- Executes dropped EXE
PID:2772 -
\??\c:\nhbbbt.exec:\nhbbbt.exe46⤵
- Executes dropped EXE
PID:1612 -
\??\c:\e82862.exec:\e82862.exe47⤵
- Executes dropped EXE
PID:1980 -
\??\c:\c462446.exec:\c462446.exe48⤵
- Executes dropped EXE
PID:1800 -
\??\c:\k84084.exec:\k84084.exe49⤵
- Executes dropped EXE
PID:1292 -
\??\c:\02686.exec:\02686.exe50⤵
- Executes dropped EXE
PID:2108 -
\??\c:\3jjpd.exec:\3jjpd.exe51⤵
- Executes dropped EXE
PID:1552 -
\??\c:\5ppvd.exec:\5ppvd.exe52⤵
- Executes dropped EXE
PID:2036 -
\??\c:\7nnttb.exec:\7nnttb.exe53⤵
- Executes dropped EXE
PID:1688 -
\??\c:\pdpvd.exec:\pdpvd.exe54⤵
- Executes dropped EXE
PID:1076 -
\??\c:\5xlflfl.exec:\5xlflfl.exe55⤵
- Executes dropped EXE
PID:1692 -
\??\c:\k86266.exec:\k86266.exe56⤵
- Executes dropped EXE
PID:1376 -
\??\c:\268428.exec:\268428.exe57⤵
- Executes dropped EXE
PID:112 -
\??\c:\8268686.exec:\8268686.exe58⤵
- Executes dropped EXE
PID:2104 -
\??\c:\bbbhhn.exec:\bbbhhn.exe59⤵
- Executes dropped EXE
PID:1548 -
\??\c:\080880.exec:\080880.exe60⤵
- Executes dropped EXE
PID:912 -
\??\c:\9dddd.exec:\9dddd.exe61⤵
- Executes dropped EXE
PID:2188 -
\??\c:\ddvdv.exec:\ddvdv.exe62⤵
- Executes dropped EXE
PID:328 -
\??\c:\k60262.exec:\k60262.exe63⤵
- Executes dropped EXE
PID:1876 -
\??\c:\ffrrlxl.exec:\ffrrlxl.exe64⤵
- Executes dropped EXE
PID:296 -
\??\c:\w68400.exec:\w68400.exe65⤵
- Executes dropped EXE
PID:2468 -
\??\c:\2640286.exec:\2640286.exe66⤵PID:2520
-
\??\c:\fxrlflr.exec:\fxrlflr.exe67⤵PID:3032
-
\??\c:\jpdvj.exec:\jpdvj.exe68⤵PID:1444
-
\??\c:\04224.exec:\04224.exe69⤵PID:980
-
\??\c:\260600.exec:\260600.exe70⤵PID:2612
-
\??\c:\m4842.exec:\m4842.exe71⤵PID:2548
-
\??\c:\2606406.exec:\2606406.exe72⤵PID:2528
-
\??\c:\22446.exec:\22446.exe73⤵PID:2464
-
\??\c:\i640624.exec:\i640624.exe74⤵PID:1508
-
\??\c:\60806.exec:\60806.exe75⤵PID:1748
-
\??\c:\xrrflrx.exec:\xrrflrx.exe76⤵PID:2956
-
\??\c:\ppjjd.exec:\ppjjd.exe77⤵PID:1580
-
\??\c:\vvjvj.exec:\vvjvj.exe78⤵PID:3000
-
\??\c:\3btbhn.exec:\3btbhn.exe79⤵PID:3068
-
\??\c:\002800.exec:\002800.exe80⤵PID:2832
-
\??\c:\48280.exec:\48280.exe81⤵PID:2872
-
\??\c:\fxffflx.exec:\fxffflx.exe82⤵PID:1904
-
\??\c:\xxflxfx.exec:\xxflxfx.exe83⤵PID:2672
-
\??\c:\68084.exec:\68084.exe84⤵PID:2480
-
\??\c:\0480842.exec:\0480842.exe85⤵PID:2008
-
\??\c:\046284.exec:\046284.exe86⤵PID:748
-
\??\c:\bbbbnh.exec:\bbbbnh.exe87⤵PID:756
-
\??\c:\8868662.exec:\8868662.exe88⤵PID:752
-
\??\c:\222444.exec:\222444.exe89⤵PID:1932
-
\??\c:\s2062.exec:\s2062.exe90⤵PID:276
-
\??\c:\w60202.exec:\w60202.exe91⤵PID:1996
-
\??\c:\8622006.exec:\8622006.exe92⤵PID:836
-
\??\c:\u042880.exec:\u042880.exe93⤵PID:1688
-
\??\c:\82280.exec:\82280.exe94⤵PID:1892
-
\??\c:\60880.exec:\60880.exe95⤵PID:2988
-
\??\c:\e02806.exec:\e02806.exe96⤵PID:3052
-
\??\c:\000206.exec:\000206.exe97⤵PID:2284
-
\??\c:\ffllrxf.exec:\ffllrxf.exe98⤵PID:2512
-
\??\c:\xxxlxxx.exec:\xxxlxxx.exe99⤵PID:2228
-
\??\c:\6028002.exec:\6028002.exe100⤵PID:1600
-
\??\c:\thttbh.exec:\thttbh.exe101⤵PID:1232
-
\??\c:\jvdjj.exec:\jvdjj.exe102⤵PID:1664
-
\??\c:\lrfllff.exec:\lrfllff.exe103⤵PID:1452
-
\??\c:\26068.exec:\26068.exe104⤵PID:696
-
\??\c:\nhnttb.exec:\nhnttb.exe105⤵PID:2544
-
\??\c:\lllfrff.exec:\lllfrff.exe106⤵PID:2224
-
\??\c:\htbtbb.exec:\htbtbb.exe107⤵PID:916
-
\??\c:\llxlfrx.exec:\llxlfrx.exe108⤵PID:612
-
\??\c:\2646880.exec:\2646880.exe109⤵PID:2128
-
\??\c:\bbhnhn.exec:\bbhnhn.exe110⤵PID:2352
-
\??\c:\1hthhb.exec:\1hthhb.exe111⤵PID:2604
-
\??\c:\6082222.exec:\6082222.exe112⤵PID:1956
-
\??\c:\hhnthh.exec:\hhnthh.exe113⤵PID:2624
-
\??\c:\pjjpv.exec:\pjjpv.exe114⤵PID:3056
-
\??\c:\3rxxflr.exec:\3rxxflr.exe115⤵PID:1532
-
\??\c:\6088000.exec:\6088000.exe116⤵PID:2564
-
\??\c:\jpvvv.exec:\jpvvv.exe117⤵PID:2980
-
\??\c:\jdjdj.exec:\jdjdj.exe118⤵PID:3024
-
\??\c:\7xxrlll.exec:\7xxrlll.exe119⤵PID:3040
-
\??\c:\0844040.exec:\0844040.exe120⤵PID:2800
-
\??\c:\7bbnbb.exec:\7bbnbb.exe121⤵PID:2752
-
\??\c:\82024.exec:\82024.exe122⤵PID:2552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-