Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 22:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe
Resource
win7-20241023-en
7 signatures
120 seconds
General
-
Target
2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe
-
Size
71KB
-
MD5
295743f678f1a7b3191112e186d896d0
-
SHA1
5a6ef3599c143f2ba783eb776a9d3d350717ba49
-
SHA256
2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf
-
SHA512
15a22a5b7b37e1e7d1499875f4185e6e5bd1b156e0537e9490a1a4047c84f061e72b9d37b858bae255f5e6e345f433d324c3011436c1bc62a1346c0e9b338ec3
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjM:ymb3NkkiQ3mdBjFI4Vc
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/1872-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/904-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2420-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1468-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1668-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1200-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2120-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1836-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2564 bntttn.exe 904 rlrlrrf.exe 2244 5thbhn.exe 2704 8628262.exe 3004 ddpjp.exe 2636 48028.exe 2768 pdjdd.exe 2632 dvjpp.exe 2420 hhnnhn.exe 2360 640662.exe 1468 24406.exe 2496 486626.exe 1668 tnbbhh.exe 1832 k68848.exe 1704 9fxflrx.exe 1904 m8000.exe 2900 pjvvd.exe 2060 bhttbt.exe 2980 7jvvd.exe 1200 3lfffll.exe 2832 82006.exe 2088 260666.exe 1664 nnhhnn.exe 2572 thnntt.exe 2120 648282.exe 1836 m6848.exe 980 xrfxxrx.exe 2180 2048040.exe 2476 a6440.exe 1520 llllrrr.exe 2084 86828.exe 2304 7bntbb.exe 2440 bbhhnt.exe 2692 4244484.exe 2788 frfxxfl.exe 2756 frflrxf.exe 2836 vjvvv.exe 2868 2084006.exe 2740 fxxrllr.exe 2340 dpdjj.exe 2656 bthbhb.exe 2324 pdjjd.exe 2144 9xxxxxl.exe 1120 rlrxlrl.exe 2360 e20622.exe 1268 3dppj.exe 1860 028662.exe 1028 68066.exe 824 8644086.exe 1720 lfrrrrx.exe 1716 g6840.exe 2908 826806.exe 2952 pdppd.exe 2872 5frrllx.exe 2060 ffrflrf.exe 2856 ffxflfr.exe 3012 20806.exe 1180 bbnntt.exe 1196 8644008.exe 1292 nhtthh.exe 1664 vvjjj.exe 1924 xxrfxxf.exe 1584 5tntbt.exe 1768 tnbhnb.exe -
resource yara_rule behavioral1/memory/1872-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1872-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/904-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/904-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/904-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1468-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1668-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1200-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2120-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1836-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6084028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w62800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5frxflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2064044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o266224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9flrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o422224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 668406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 424682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tntbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pjvv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2564 1872 2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe 30 PID 1872 wrote to memory of 2564 1872 2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe 30 PID 1872 wrote to memory of 2564 1872 2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe 30 PID 1872 wrote to memory of 2564 1872 2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe 30 PID 2564 wrote to memory of 904 2564 bntttn.exe 31 PID 2564 wrote to memory of 904 2564 bntttn.exe 31 PID 2564 wrote to memory of 904 2564 bntttn.exe 31 PID 2564 wrote to memory of 904 2564 bntttn.exe 31 PID 904 wrote to memory of 2244 904 rlrlrrf.exe 32 PID 904 wrote to memory of 2244 904 rlrlrrf.exe 32 PID 904 wrote to memory of 2244 904 rlrlrrf.exe 32 PID 904 wrote to memory of 2244 904 rlrlrrf.exe 32 PID 2244 wrote to memory of 2704 2244 5thbhn.exe 33 PID 2244 wrote to memory of 2704 2244 5thbhn.exe 33 PID 2244 wrote to memory of 2704 2244 5thbhn.exe 33 PID 2244 wrote to memory of 2704 2244 5thbhn.exe 33 PID 2704 wrote to memory of 3004 2704 8628262.exe 34 PID 2704 wrote to memory of 3004 2704 8628262.exe 34 PID 2704 wrote to memory of 3004 2704 8628262.exe 34 PID 2704 wrote to memory of 3004 2704 8628262.exe 34 PID 3004 wrote to memory of 2636 3004 ddpjp.exe 35 PID 3004 wrote to memory of 2636 3004 ddpjp.exe 35 PID 3004 wrote to memory of 2636 3004 ddpjp.exe 35 PID 3004 wrote to memory of 2636 3004 ddpjp.exe 35 PID 2636 wrote to memory of 2768 2636 48028.exe 36 PID 2636 wrote to memory of 2768 2636 48028.exe 36 PID 2636 wrote to memory of 2768 2636 48028.exe 36 PID 2636 wrote to memory of 2768 2636 48028.exe 36 PID 2768 wrote to memory of 2632 2768 pdjdd.exe 37 PID 2768 wrote to memory of 2632 2768 pdjdd.exe 37 PID 2768 wrote to memory of 2632 2768 pdjdd.exe 37 PID 2768 wrote to memory of 2632 2768 pdjdd.exe 37 PID 2632 wrote to memory of 2420 2632 dvjpp.exe 38 PID 2632 wrote to memory of 2420 2632 dvjpp.exe 38 PID 2632 wrote to memory of 2420 2632 dvjpp.exe 38 PID 2632 wrote to memory of 2420 2632 dvjpp.exe 38 PID 2420 wrote to memory of 2360 2420 hhnnhn.exe 39 PID 2420 wrote to memory of 2360 2420 hhnnhn.exe 39 PID 2420 wrote to memory of 2360 2420 hhnnhn.exe 39 PID 2420 wrote to memory of 2360 2420 hhnnhn.exe 39 PID 2360 wrote to memory of 1468 2360 640662.exe 40 PID 2360 wrote to memory of 1468 2360 640662.exe 40 PID 2360 wrote to memory of 1468 2360 640662.exe 40 PID 2360 wrote to memory of 1468 2360 640662.exe 40 PID 1468 wrote to memory of 2496 1468 24406.exe 41 PID 1468 wrote to memory of 2496 1468 24406.exe 41 PID 1468 wrote to memory of 2496 1468 24406.exe 41 PID 1468 wrote to memory of 2496 1468 24406.exe 41 PID 2496 wrote to memory of 1668 2496 486626.exe 42 PID 2496 wrote to memory of 1668 2496 486626.exe 42 PID 2496 wrote to memory of 1668 2496 486626.exe 42 PID 2496 wrote to memory of 1668 2496 486626.exe 42 PID 1668 wrote to memory of 1832 1668 tnbbhh.exe 43 PID 1668 wrote to memory of 1832 1668 tnbbhh.exe 43 PID 1668 wrote to memory of 1832 1668 tnbbhh.exe 43 PID 1668 wrote to memory of 1832 1668 tnbbhh.exe 43 PID 1832 wrote to memory of 1704 1832 k68848.exe 44 PID 1832 wrote to memory of 1704 1832 k68848.exe 44 PID 1832 wrote to memory of 1704 1832 k68848.exe 44 PID 1832 wrote to memory of 1704 1832 k68848.exe 44 PID 1704 wrote to memory of 1904 1704 9fxflrx.exe 45 PID 1704 wrote to memory of 1904 1704 9fxflrx.exe 45 PID 1704 wrote to memory of 1904 1704 9fxflrx.exe 45 PID 1704 wrote to memory of 1904 1704 9fxflrx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe"C:\Users\Admin\AppData\Local\Temp\2a15ef6618d6c74063edb4e72a1d274210de60e444fb718253e4a24a57d957cf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\bntttn.exec:\bntttn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\rlrlrrf.exec:\rlrlrrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:904 -
\??\c:\5thbhn.exec:\5thbhn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\8628262.exec:\8628262.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\ddpjp.exec:\ddpjp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\48028.exec:\48028.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\pdjdd.exec:\pdjdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\dvjpp.exec:\dvjpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\hhnnhn.exec:\hhnnhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\640662.exec:\640662.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\24406.exec:\24406.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
\??\c:\486626.exec:\486626.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\tnbbhh.exec:\tnbbhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\k68848.exec:\k68848.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\9fxflrx.exec:\9fxflrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\m8000.exec:\m8000.exe17⤵
- Executes dropped EXE
PID:1904 -
\??\c:\pjvvd.exec:\pjvvd.exe18⤵
- Executes dropped EXE
PID:2900 -
\??\c:\bhttbt.exec:\bhttbt.exe19⤵
- Executes dropped EXE
PID:2060 -
\??\c:\7jvvd.exec:\7jvvd.exe20⤵
- Executes dropped EXE
PID:2980 -
\??\c:\3lfffll.exec:\3lfffll.exe21⤵
- Executes dropped EXE
PID:1200 -
\??\c:\82006.exec:\82006.exe22⤵
- Executes dropped EXE
PID:2832 -
\??\c:\260666.exec:\260666.exe23⤵
- Executes dropped EXE
PID:2088 -
\??\c:\nnhhnn.exec:\nnhhnn.exe24⤵
- Executes dropped EXE
PID:1664 -
\??\c:\thnntt.exec:\thnntt.exe25⤵
- Executes dropped EXE
PID:2572 -
\??\c:\648282.exec:\648282.exe26⤵
- Executes dropped EXE
PID:2120 -
\??\c:\m6848.exec:\m6848.exe27⤵
- Executes dropped EXE
PID:1836 -
\??\c:\xrfxxrx.exec:\xrfxxrx.exe28⤵
- Executes dropped EXE
PID:980 -
\??\c:\2048040.exec:\2048040.exe29⤵
- Executes dropped EXE
PID:2180 -
\??\c:\a6440.exec:\a6440.exe30⤵
- Executes dropped EXE
PID:2476 -
\??\c:\llllrrr.exec:\llllrrr.exe31⤵
- Executes dropped EXE
PID:1520 -
\??\c:\86828.exec:\86828.exe32⤵
- Executes dropped EXE
PID:2084 -
\??\c:\7bntbb.exec:\7bntbb.exe33⤵
- Executes dropped EXE
PID:2304 -
\??\c:\bbhhnt.exec:\bbhhnt.exe34⤵
- Executes dropped EXE
PID:2440 -
\??\c:\4244484.exec:\4244484.exe35⤵
- Executes dropped EXE
PID:2692 -
\??\c:\frfxxfl.exec:\frfxxfl.exe36⤵
- Executes dropped EXE
PID:2788 -
\??\c:\frflrxf.exec:\frflrxf.exe37⤵
- Executes dropped EXE
PID:2756 -
\??\c:\vjvvv.exec:\vjvvv.exe38⤵
- Executes dropped EXE
PID:2836 -
\??\c:\2084006.exec:\2084006.exe39⤵
- Executes dropped EXE
PID:2868 -
\??\c:\fxxrllr.exec:\fxxrllr.exe40⤵
- Executes dropped EXE
PID:2740 -
\??\c:\dpdjj.exec:\dpdjj.exe41⤵
- Executes dropped EXE
PID:2340 -
\??\c:\bthbhb.exec:\bthbhb.exe42⤵
- Executes dropped EXE
PID:2656 -
\??\c:\pdjjd.exec:\pdjjd.exe43⤵
- Executes dropped EXE
PID:2324 -
\??\c:\9xxxxxl.exec:\9xxxxxl.exe44⤵
- Executes dropped EXE
PID:2144 -
\??\c:\rlrxlrl.exec:\rlrxlrl.exe45⤵
- Executes dropped EXE
PID:1120 -
\??\c:\e20622.exec:\e20622.exe46⤵
- Executes dropped EXE
PID:2360 -
\??\c:\3dppj.exec:\3dppj.exe47⤵
- Executes dropped EXE
PID:1268 -
\??\c:\028662.exec:\028662.exe48⤵
- Executes dropped EXE
PID:1860 -
\??\c:\68066.exec:\68066.exe49⤵
- Executes dropped EXE
PID:1028 -
\??\c:\8644086.exec:\8644086.exe50⤵
- Executes dropped EXE
PID:824 -
\??\c:\lfrrrrx.exec:\lfrrrrx.exe51⤵
- Executes dropped EXE
PID:1720 -
\??\c:\g6840.exec:\g6840.exe52⤵
- Executes dropped EXE
PID:1716 -
\??\c:\826806.exec:\826806.exe53⤵
- Executes dropped EXE
PID:2908 -
\??\c:\pdppd.exec:\pdppd.exe54⤵
- Executes dropped EXE
PID:2952 -
\??\c:\5frrllx.exec:\5frrllx.exe55⤵
- Executes dropped EXE
PID:2872 -
\??\c:\ffrflrf.exec:\ffrflrf.exe56⤵
- Executes dropped EXE
PID:2060 -
\??\c:\ffxflfr.exec:\ffxflfr.exe57⤵
- Executes dropped EXE
PID:2856 -
\??\c:\20806.exec:\20806.exe58⤵
- Executes dropped EXE
PID:3012 -
\??\c:\bbnntt.exec:\bbnntt.exe59⤵
- Executes dropped EXE
PID:1180 -
\??\c:\8644008.exec:\8644008.exe60⤵
- Executes dropped EXE
PID:1196 -
\??\c:\nhtthh.exec:\nhtthh.exe61⤵
- Executes dropped EXE
PID:1292 -
\??\c:\vvjjj.exec:\vvjjj.exe62⤵
- Executes dropped EXE
PID:1664 -
\??\c:\xxrfxxf.exec:\xxrfxxf.exe63⤵
- Executes dropped EXE
PID:1924 -
\??\c:\5tntbt.exec:\5tntbt.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584 -
\??\c:\tnbhnb.exec:\tnbhnb.exe65⤵
- Executes dropped EXE
PID:1768 -
\??\c:\pdjdv.exec:\pdjdv.exe66⤵PID:2568
-
\??\c:\pdjvj.exec:\pdjvj.exe67⤵PID:980
-
\??\c:\hbhhbn.exec:\hbhhbn.exe68⤵PID:2484
-
\??\c:\xrfflfr.exec:\xrfflfr.exe69⤵PID:2896
-
\??\c:\k08400.exec:\k08400.exe70⤵PID:1576
-
\??\c:\62266.exec:\62266.exe71⤵PID:2056
-
\??\c:\vpvjj.exec:\vpvjj.exe72⤵PID:2084
-
\??\c:\268800.exec:\268800.exe73⤵PID:2504
-
\??\c:\42062.exec:\42062.exe74⤵PID:588
-
\??\c:\26022.exec:\26022.exe75⤵PID:2244
-
\??\c:\44220.exec:\44220.exe76⤵PID:2796
-
\??\c:\lflrxfl.exec:\lflrxfl.exe77⤵PID:2996
-
\??\c:\868404.exec:\868404.exe78⤵PID:2888
-
\??\c:\c422446.exec:\c422446.exe79⤵PID:2724
-
\??\c:\pjddj.exec:\pjddj.exe80⤵PID:2604
-
\??\c:\xrffflx.exec:\xrffflx.exe81⤵PID:2876
-
\??\c:\djjvj.exec:\djjvj.exe82⤵PID:2620
-
\??\c:\jjdpv.exec:\jjdpv.exe83⤵PID:2772
-
\??\c:\jjpvd.exec:\jjpvd.exe84⤵PID:2420
-
\??\c:\60002.exec:\60002.exe85⤵PID:1148
-
\??\c:\3dvpv.exec:\3dvpv.exe86⤵PID:828
-
\??\c:\602424.exec:\602424.exe87⤵PID:2496
-
\??\c:\e04684.exec:\e04684.exe88⤵PID:1668
-
\??\c:\24802.exec:\24802.exe89⤵PID:2012
-
\??\c:\hbnttt.exec:\hbnttt.exe90⤵PID:1892
-
\??\c:\tntnhh.exec:\tntnhh.exe91⤵PID:1896
-
\??\c:\jvvpv.exec:\jvvpv.exe92⤵PID:2140
-
\??\c:\1hhhbb.exec:\1hhhbb.exe93⤵PID:2456
-
\??\c:\o428480.exec:\o428480.exe94⤵PID:1868
-
\??\c:\nhtntn.exec:\nhtntn.exe95⤵PID:1480
-
\??\c:\vvjjj.exec:\vvjjj.exe96⤵PID:3028
-
\??\c:\jvpvd.exec:\jvpvd.exe97⤵PID:448
-
\??\c:\04840.exec:\04840.exe98⤵PID:2168
-
\??\c:\frffllx.exec:\frffllx.exe99⤵PID:956
-
\??\c:\e86484.exec:\e86484.exe100⤵PID:2388
-
\??\c:\rxrrflx.exec:\rxrrflx.exe101⤵PID:1788
-
\??\c:\a6020.exec:\a6020.exe102⤵PID:612
-
\??\c:\4862468.exec:\4862468.exe103⤵PID:2436
-
\??\c:\9pjjp.exec:\9pjjp.exe104⤵PID:2492
-
\??\c:\xrxlfrf.exec:\xrxlfrf.exe105⤵PID:696
-
\??\c:\8666666.exec:\8666666.exe106⤵PID:2384
-
\??\c:\bnnhnh.exec:\bnnhnh.exe107⤵PID:836
-
\??\c:\82002.exec:\82002.exe108⤵PID:1636
-
\??\c:\5pddv.exec:\5pddv.exe109⤵PID:1876
-
\??\c:\btbnnt.exec:\btbnnt.exe110⤵PID:2528
-
\??\c:\jvdvv.exec:\jvdvv.exe111⤵PID:1880
-
\??\c:\xxrrxll.exec:\xxrrxll.exe112⤵PID:2820
-
\??\c:\8688002.exec:\8688002.exe113⤵PID:1256
-
\??\c:\xrxfffr.exec:\xrxfffr.exe114⤵PID:2132
-
\??\c:\26628.exec:\26628.exe115⤵PID:2732
-
\??\c:\8880080.exec:\8880080.exe116⤵PID:2792
-
\??\c:\82002.exec:\82002.exe117⤵PID:2716
-
\??\c:\nhbnnt.exec:\nhbnnt.exe118⤵PID:2844
-
\??\c:\2680668.exec:\2680668.exe119⤵PID:2612
-
\??\c:\2804000.exec:\2804000.exe120⤵PID:2336
-
\??\c:\tnhhnn.exec:\tnhhnn.exe121⤵PID:2184
-
\??\c:\0806480.exec:\0806480.exe122⤵PID:380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-