Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe
-
Size
229KB
-
MD5
c5e7534975529f51823f5fd4190ede40
-
SHA1
ec7522020a699a8273ac8a81bcfe21bf1341ef1c
-
SHA256
988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ec
-
SHA512
99a9daf063e56f950e6aa884f3679d1df16e29fcb8b978dac2eecc5f6203cdb62a4bc9da27be6dcc63d4110b8ae5767964fd1e698d2be0a5fb9aa47bd9cd8b74
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeGdQ:n3C9BRo7MlrWKo+lxKU
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2316-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2492-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1852-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/664-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/824-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1208-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/484-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2724 06208.exe 2880 3llrffl.exe 2996 820600.exe 2888 ffxfrxl.exe 2864 20426.exe 2652 w42466.exe 2204 5dvjv.exe 2236 5lrxfll.exe 2168 jjjdp.exe 2224 82468.exe 484 c084662.exe 2912 486840.exe 1208 9dvdp.exe 2936 lfxrlrf.exe 2980 06422.exe 1956 3thhbb.exe 1488 604088.exe 340 7llxlfx.exe 1608 486022.exe 2560 6266200.exe 2468 nthbtn.exe 824 rrxflrl.exe 1864 6602846.exe 664 dvppd.exe 1852 7pddp.exe 3044 7pjpv.exe 2500 hhthbn.exe 1736 5djvv.exe 1696 882862.exe 1444 3tntbn.exe 2492 w26400.exe 2804 g6680.exe 1808 22248.exe 2844 22224.exe 1224 066806.exe 2740 2820866.exe 2616 46608.exe 2632 64624.exe 2692 8868668.exe 2288 a8628.exe 2388 rlrxxrr.exe 2212 9hhtbt.exe 376 jjdjv.exe 1264 8424806.exe 484 08246.exe 2116 24040.exe 2908 tttnht.exe 2976 c202840.exe 2028 5lffflr.exe 2980 44820.exe 1548 8244068.exe 1496 ddvdp.exe 604 rrllxxx.exe 1984 5nntnn.exe 1860 80460.exe 2448 4444044.exe 876 jdjdj.exe 708 26062.exe 1076 00424.exe 936 6086242.exe 1340 ddpjv.exe 1092 btnbhn.exe 2500 64462.exe 2000 rlffrxf.exe -
resource yara_rule behavioral1/memory/2316-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-300-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1852-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/664-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/824-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1208-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/484-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-102-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4822026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c208468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u600286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6286688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0208440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lfrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2224808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8224802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxlrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjpv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2724 2316 988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe 30 PID 2316 wrote to memory of 2724 2316 988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe 30 PID 2316 wrote to memory of 2724 2316 988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe 30 PID 2316 wrote to memory of 2724 2316 988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe 30 PID 2724 wrote to memory of 2880 2724 06208.exe 31 PID 2724 wrote to memory of 2880 2724 06208.exe 31 PID 2724 wrote to memory of 2880 2724 06208.exe 31 PID 2724 wrote to memory of 2880 2724 06208.exe 31 PID 2880 wrote to memory of 2996 2880 3llrffl.exe 32 PID 2880 wrote to memory of 2996 2880 3llrffl.exe 32 PID 2880 wrote to memory of 2996 2880 3llrffl.exe 32 PID 2880 wrote to memory of 2996 2880 3llrffl.exe 32 PID 2996 wrote to memory of 2888 2996 820600.exe 33 PID 2996 wrote to memory of 2888 2996 820600.exe 33 PID 2996 wrote to memory of 2888 2996 820600.exe 33 PID 2996 wrote to memory of 2888 2996 820600.exe 33 PID 2888 wrote to memory of 2864 2888 ffxfrxl.exe 34 PID 2888 wrote to memory of 2864 2888 ffxfrxl.exe 34 PID 2888 wrote to memory of 2864 2888 ffxfrxl.exe 34 PID 2888 wrote to memory of 2864 2888 ffxfrxl.exe 34 PID 2864 wrote to memory of 2652 2864 20426.exe 35 PID 2864 wrote to memory of 2652 2864 20426.exe 35 PID 2864 wrote to memory of 2652 2864 20426.exe 35 PID 2864 wrote to memory of 2652 2864 20426.exe 35 PID 2652 wrote to memory of 2204 2652 w42466.exe 36 PID 2652 wrote to memory of 2204 2652 w42466.exe 36 PID 2652 wrote to memory of 2204 2652 w42466.exe 36 PID 2652 wrote to memory of 2204 2652 w42466.exe 36 PID 2204 wrote to memory of 2236 2204 5dvjv.exe 37 PID 2204 wrote to memory of 2236 2204 5dvjv.exe 37 PID 2204 wrote to memory of 2236 2204 5dvjv.exe 37 PID 2204 wrote to memory of 2236 2204 5dvjv.exe 37 PID 2236 wrote to memory of 2168 2236 5lrxfll.exe 38 PID 2236 wrote to memory of 2168 2236 5lrxfll.exe 38 PID 2236 wrote to memory of 2168 2236 5lrxfll.exe 38 PID 2236 wrote to memory of 2168 2236 5lrxfll.exe 38 PID 2168 wrote to memory of 2224 2168 jjjdp.exe 39 PID 2168 wrote to memory of 2224 2168 jjjdp.exe 39 PID 2168 wrote to memory of 2224 2168 jjjdp.exe 39 PID 2168 wrote to memory of 2224 2168 jjjdp.exe 39 PID 2224 wrote to memory of 484 2224 82468.exe 40 PID 2224 wrote to memory of 484 2224 82468.exe 40 PID 2224 wrote to memory of 484 2224 82468.exe 40 PID 2224 wrote to memory of 484 2224 82468.exe 40 PID 484 wrote to memory of 2912 484 c084662.exe 41 PID 484 wrote to memory of 2912 484 c084662.exe 41 PID 484 wrote to memory of 2912 484 c084662.exe 41 PID 484 wrote to memory of 2912 484 c084662.exe 41 PID 2912 wrote to memory of 1208 2912 486840.exe 42 PID 2912 wrote to memory of 1208 2912 486840.exe 42 PID 2912 wrote to memory of 1208 2912 486840.exe 42 PID 2912 wrote to memory of 1208 2912 486840.exe 42 PID 1208 wrote to memory of 2936 1208 9dvdp.exe 43 PID 1208 wrote to memory of 2936 1208 9dvdp.exe 43 PID 1208 wrote to memory of 2936 1208 9dvdp.exe 43 PID 1208 wrote to memory of 2936 1208 9dvdp.exe 43 PID 2936 wrote to memory of 2980 2936 lfxrlrf.exe 44 PID 2936 wrote to memory of 2980 2936 lfxrlrf.exe 44 PID 2936 wrote to memory of 2980 2936 lfxrlrf.exe 44 PID 2936 wrote to memory of 2980 2936 lfxrlrf.exe 44 PID 2980 wrote to memory of 1956 2980 06422.exe 45 PID 2980 wrote to memory of 1956 2980 06422.exe 45 PID 2980 wrote to memory of 1956 2980 06422.exe 45 PID 2980 wrote to memory of 1956 2980 06422.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe"C:\Users\Admin\AppData\Local\Temp\988b7520d682dbac0ceef153b106c1efaf2411751ec61cbde3587c6b39f016ecN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\06208.exec:\06208.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\3llrffl.exec:\3llrffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\820600.exec:\820600.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\ffxfrxl.exec:\ffxfrxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\20426.exec:\20426.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\w42466.exec:\w42466.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\5dvjv.exec:\5dvjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\5lrxfll.exec:\5lrxfll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\jjjdp.exec:\jjjdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\82468.exec:\82468.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\c084662.exec:\c084662.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
\??\c:\486840.exec:\486840.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\9dvdp.exec:\9dvdp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\lfxrlrf.exec:\lfxrlrf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\06422.exec:\06422.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\3thhbb.exec:\3thhbb.exe17⤵
- Executes dropped EXE
PID:1956 -
\??\c:\604088.exec:\604088.exe18⤵
- Executes dropped EXE
PID:1488 -
\??\c:\7llxlfx.exec:\7llxlfx.exe19⤵
- Executes dropped EXE
PID:340 -
\??\c:\486022.exec:\486022.exe20⤵
- Executes dropped EXE
PID:1608 -
\??\c:\6266200.exec:\6266200.exe21⤵
- Executes dropped EXE
PID:2560 -
\??\c:\nthbtn.exec:\nthbtn.exe22⤵
- Executes dropped EXE
PID:2468 -
\??\c:\rrxflrl.exec:\rrxflrl.exe23⤵
- Executes dropped EXE
PID:824 -
\??\c:\6602846.exec:\6602846.exe24⤵
- Executes dropped EXE
PID:1864 -
\??\c:\dvppd.exec:\dvppd.exe25⤵
- Executes dropped EXE
PID:664 -
\??\c:\7pddp.exec:\7pddp.exe26⤵
- Executes dropped EXE
PID:1852 -
\??\c:\7pjpv.exec:\7pjpv.exe27⤵
- Executes dropped EXE
PID:3044 -
\??\c:\hhthbn.exec:\hhthbn.exe28⤵
- Executes dropped EXE
PID:2500 -
\??\c:\5djvv.exec:\5djvv.exe29⤵
- Executes dropped EXE
PID:1736 -
\??\c:\882862.exec:\882862.exe30⤵
- Executes dropped EXE
PID:1696 -
\??\c:\3tntbn.exec:\3tntbn.exe31⤵
- Executes dropped EXE
PID:1444 -
\??\c:\w26400.exec:\w26400.exe32⤵
- Executes dropped EXE
PID:2492 -
\??\c:\g6680.exec:\g6680.exe33⤵
- Executes dropped EXE
PID:2804 -
\??\c:\22248.exec:\22248.exe34⤵
- Executes dropped EXE
PID:1808 -
\??\c:\22224.exec:\22224.exe35⤵
- Executes dropped EXE
PID:2844 -
\??\c:\066806.exec:\066806.exe36⤵
- Executes dropped EXE
PID:1224 -
\??\c:\2820866.exec:\2820866.exe37⤵
- Executes dropped EXE
PID:2740 -
\??\c:\46608.exec:\46608.exe38⤵
- Executes dropped EXE
PID:2616 -
\??\c:\64624.exec:\64624.exe39⤵
- Executes dropped EXE
PID:2632 -
\??\c:\8868668.exec:\8868668.exe40⤵
- Executes dropped EXE
PID:2692 -
\??\c:\a8628.exec:\a8628.exe41⤵
- Executes dropped EXE
PID:2288 -
\??\c:\rlrxxrr.exec:\rlrxxrr.exe42⤵
- Executes dropped EXE
PID:2388 -
\??\c:\9hhtbt.exec:\9hhtbt.exe43⤵
- Executes dropped EXE
PID:2212 -
\??\c:\jjdjv.exec:\jjdjv.exe44⤵
- Executes dropped EXE
PID:376 -
\??\c:\8424806.exec:\8424806.exe45⤵
- Executes dropped EXE
PID:1264 -
\??\c:\08246.exec:\08246.exe46⤵
- Executes dropped EXE
PID:484 -
\??\c:\24040.exec:\24040.exe47⤵
- Executes dropped EXE
PID:2116 -
\??\c:\tttnht.exec:\tttnht.exe48⤵
- Executes dropped EXE
PID:2908 -
\??\c:\c202840.exec:\c202840.exe49⤵
- Executes dropped EXE
PID:2976 -
\??\c:\5lffflr.exec:\5lffflr.exe50⤵
- Executes dropped EXE
PID:2028 -
\??\c:\44820.exec:\44820.exe51⤵
- Executes dropped EXE
PID:2980 -
\??\c:\8244068.exec:\8244068.exe52⤵
- Executes dropped EXE
PID:1548 -
\??\c:\ddvdp.exec:\ddvdp.exe53⤵
- Executes dropped EXE
PID:1496 -
\??\c:\rrllxxx.exec:\rrllxxx.exe54⤵
- Executes dropped EXE
PID:604 -
\??\c:\5nntnn.exec:\5nntnn.exe55⤵
- Executes dropped EXE
PID:1984 -
\??\c:\80460.exec:\80460.exe56⤵
- Executes dropped EXE
PID:1860 -
\??\c:\4444044.exec:\4444044.exe57⤵
- Executes dropped EXE
PID:2448 -
\??\c:\jdjdj.exec:\jdjdj.exe58⤵
- Executes dropped EXE
PID:876 -
\??\c:\26062.exec:\26062.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:708 -
\??\c:\00424.exec:\00424.exe60⤵
- Executes dropped EXE
PID:1076 -
\??\c:\6086242.exec:\6086242.exe61⤵
- Executes dropped EXE
PID:936 -
\??\c:\ddpjv.exec:\ddpjv.exe62⤵
- Executes dropped EXE
PID:1340 -
\??\c:\btnbhn.exec:\btnbhn.exe63⤵
- Executes dropped EXE
PID:1092 -
\??\c:\64462.exec:\64462.exe64⤵
- Executes dropped EXE
PID:2500 -
\??\c:\rlffrxf.exec:\rlffrxf.exe65⤵
- Executes dropped EXE
PID:2000 -
\??\c:\dpjpv.exec:\dpjpv.exe66⤵PID:1696
-
\??\c:\06646.exec:\06646.exe67⤵PID:2444
-
\??\c:\hbtnbb.exec:\hbtnbb.exe68⤵PID:1512
-
\??\c:\c240668.exec:\c240668.exe69⤵PID:868
-
\??\c:\lllxlxr.exec:\lllxlxr.exe70⤵PID:2492
-
\??\c:\8240668.exec:\8240668.exe71⤵PID:344
-
\??\c:\vvjpp.exec:\vvjpp.exe72⤵PID:1808
-
\??\c:\4488402.exec:\4488402.exe73⤵PID:2300
-
\??\c:\vpvjj.exec:\vpvjj.exe74⤵PID:300
-
\??\c:\c268008.exec:\c268008.exe75⤵PID:3000
-
\??\c:\nnhnbh.exec:\nnhnbh.exe76⤵PID:2612
-
\??\c:\7jdjv.exec:\7jdjv.exe77⤵PID:2600
-
\??\c:\088820.exec:\088820.exe78⤵PID:2752
-
\??\c:\nnnbnb.exec:\nnnbnb.exe79⤵PID:2852
-
\??\c:\88664.exec:\88664.exe80⤵PID:2644
-
\??\c:\82682.exec:\82682.exe81⤵PID:2692
-
\??\c:\c208468.exec:\c208468.exe82⤵
- System Location Discovery: System Language Discovery
PID:640 -
\??\c:\482202.exec:\482202.exe83⤵PID:2204
-
\??\c:\7djdj.exec:\7djdj.exe84⤵PID:2144
-
\??\c:\ddvvp.exec:\ddvvp.exe85⤵PID:1904
-
\??\c:\nbtttn.exec:\nbtttn.exe86⤵PID:2784
-
\??\c:\068008.exec:\068008.exe87⤵PID:484
-
\??\c:\822864.exec:\822864.exe88⤵PID:2900
-
\??\c:\24864.exec:\24864.exe89⤵PID:2908
-
\??\c:\dvddv.exec:\dvddv.exe90⤵PID:2216
-
\??\c:\82062.exec:\82062.exe91⤵PID:2028
-
\??\c:\0868668.exec:\0868668.exe92⤵PID:1488
-
\??\c:\pjdpd.exec:\pjdpd.exe93⤵PID:2764
-
\??\c:\dvdjp.exec:\dvdjp.exe94⤵PID:568
-
\??\c:\tnhnnb.exec:\tnhnnb.exe95⤵PID:340
-
\??\c:\3dvpd.exec:\3dvpd.exe96⤵PID:2432
-
\??\c:\8200280.exec:\8200280.exe97⤵PID:1580
-
\??\c:\nntbht.exec:\nntbht.exe98⤵PID:1676
-
\??\c:\5pjjj.exec:\5pjjj.exe99⤵PID:2096
-
\??\c:\w26424.exec:\w26424.exe100⤵PID:2952
-
\??\c:\pdvjv.exec:\pdvjv.exe101⤵PID:2172
-
\??\c:\dvdjd.exec:\dvdjd.exe102⤵PID:936
-
\??\c:\xrllxfr.exec:\xrllxfr.exe103⤵PID:1620
-
\??\c:\tththh.exec:\tththh.exe104⤵PID:1852
-
\??\c:\0040846.exec:\0040846.exe105⤵PID:1748
-
\??\c:\8220664.exec:\8220664.exe106⤵PID:284
-
\??\c:\7tbhnh.exec:\7tbhnh.exe107⤵PID:1848
-
\??\c:\jvjpp.exec:\jvjpp.exe108⤵PID:1420
-
\??\c:\5jjdp.exec:\5jjdp.exe109⤵PID:872
-
\??\c:\420240.exec:\420240.exe110⤵PID:1408
-
\??\c:\k48024.exec:\k48024.exe111⤵PID:2492
-
\??\c:\ppvdp.exec:\ppvdp.exe112⤵PID:2804
-
\??\c:\nhhbtt.exec:\nhhbtt.exe113⤵PID:2844
-
\??\c:\3lxllxr.exec:\3lxllxr.exe114⤵PID:2300
-
\??\c:\dvpjj.exec:\dvpjj.exe115⤵PID:2584
-
\??\c:\xrrxrrr.exec:\xrrxrrr.exe116⤵PID:2176
-
\??\c:\1hhnht.exec:\1hhnht.exe117⤵PID:2612
-
\??\c:\hnntht.exec:\hnntht.exe118⤵PID:2056
-
\??\c:\k88462.exec:\k88462.exe119⤵PID:2752
-
\??\c:\5lrlflx.exec:\5lrlflx.exe120⤵PID:2572
-
\??\c:\bhbnhb.exec:\bhbnhb.exe121⤵PID:2864
-
\??\c:\o648046.exec:\o648046.exe122⤵PID:2312
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-