Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe
Resource
win7-20241023-en
General
-
Target
d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe
-
Size
95KB
-
MD5
a0fd18a63d054daff3c27c2c710496bf
-
SHA1
3ba87cbba65e44f0b9391c816911a3a824b69c8c
-
SHA256
d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392
-
SHA512
1e77b82d29dde1d688b0ce6f0dc90613c935891e57ede09aafcd7039b353ebf3fec4319300006351f02dd10d11bbaf703615e28532dcb8e36dbc617e7cc5adac
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2lmf6g7xYIM0:ymb3NkkiQ3mdBjF+3TU20LO0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/2160-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2572-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-49-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2816-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-69-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2884-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1052-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/268-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/332-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3040-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1760-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1488-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3044-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/112-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2772 1dvvd.exe 3008 vvvjv.exe 2572 7btbtt.exe 2932 862268.exe 2816 220082.exe 2884 o682020.exe 3040 608800.exe 2700 1fflrrf.exe 1052 26824.exe 2140 nhhnhn.exe 268 3vjpv.exe 2904 g0284.exe 1744 646288.exe 332 xrlrrfr.exe 2148 pjjvd.exe 1436 djpvj.exe 2008 lxflrxx.exe 2992 xrflrrf.exe 2448 042244.exe 2632 208400.exe 1760 hbnnhh.exe 2204 rrrfflf.exe 1488 0484662.exe 3044 6048006.exe 1524 nhttbt.exe 2532 k64082.exe 308 rfrlxxf.exe 112 llffrrl.exe 1556 86062.exe 1284 fxrrxxl.exe 2612 i428440.exe 2772 nhhhnn.exe 2832 rfrlxrx.exe 2952 lxlffff.exe 2928 264004.exe 1540 08262.exe 2816 frxflxx.exe 2716 pjvdv.exe 2864 4266228.exe 2944 e28088.exe 2736 9hnnbb.exe 2580 826282.exe 1648 60880.exe 1788 rllrlrx.exe 2912 22446.exe 816 nbtbnt.exe 1372 86884.exe 588 208466.exe 2148 7bnttt.exe 304 xrfxfxf.exe 2028 lfxxllx.exe 320 02848.exe 3020 rlxfrxr.exe 572 1pjjv.exe 2988 xxrrrrr.exe 2312 48080.exe 2672 2644228.exe 1144 vdjjd.exe 2204 pjdjv.exe 1956 5tntbb.exe 2896 q24444.exe 1820 djdpj.exe 1716 5hhhbb.exe 2296 864066.exe -
resource yara_rule behavioral1/memory/2160-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3008-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1052-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/268-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/332-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1760-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1488-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-281-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0462442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k28062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlllfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxrxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4266228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2772 2160 d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe 30 PID 2160 wrote to memory of 2772 2160 d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe 30 PID 2160 wrote to memory of 2772 2160 d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe 30 PID 2160 wrote to memory of 2772 2160 d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe 30 PID 2772 wrote to memory of 3008 2772 1dvvd.exe 31 PID 2772 wrote to memory of 3008 2772 1dvvd.exe 31 PID 2772 wrote to memory of 3008 2772 1dvvd.exe 31 PID 2772 wrote to memory of 3008 2772 1dvvd.exe 31 PID 3008 wrote to memory of 2572 3008 vvvjv.exe 32 PID 3008 wrote to memory of 2572 3008 vvvjv.exe 32 PID 3008 wrote to memory of 2572 3008 vvvjv.exe 32 PID 3008 wrote to memory of 2572 3008 vvvjv.exe 32 PID 2572 wrote to memory of 2932 2572 7btbtt.exe 33 PID 2572 wrote to memory of 2932 2572 7btbtt.exe 33 PID 2572 wrote to memory of 2932 2572 7btbtt.exe 33 PID 2572 wrote to memory of 2932 2572 7btbtt.exe 33 PID 2932 wrote to memory of 2816 2932 862268.exe 34 PID 2932 wrote to memory of 2816 2932 862268.exe 34 PID 2932 wrote to memory of 2816 2932 862268.exe 34 PID 2932 wrote to memory of 2816 2932 862268.exe 34 PID 2816 wrote to memory of 2884 2816 220082.exe 35 PID 2816 wrote to memory of 2884 2816 220082.exe 35 PID 2816 wrote to memory of 2884 2816 220082.exe 35 PID 2816 wrote to memory of 2884 2816 220082.exe 35 PID 2884 wrote to memory of 3040 2884 o682020.exe 36 PID 2884 wrote to memory of 3040 2884 o682020.exe 36 PID 2884 wrote to memory of 3040 2884 o682020.exe 36 PID 2884 wrote to memory of 3040 2884 o682020.exe 36 PID 3040 wrote to memory of 2700 3040 608800.exe 37 PID 3040 wrote to memory of 2700 3040 608800.exe 37 PID 3040 wrote to memory of 2700 3040 608800.exe 37 PID 3040 wrote to memory of 2700 3040 608800.exe 37 PID 2700 wrote to memory of 1052 2700 1fflrrf.exe 38 PID 2700 wrote to memory of 1052 2700 1fflrrf.exe 38 PID 2700 wrote to memory of 1052 2700 1fflrrf.exe 38 PID 2700 wrote to memory of 1052 2700 1fflrrf.exe 38 PID 1052 wrote to memory of 2140 1052 26824.exe 39 PID 1052 wrote to memory of 2140 1052 26824.exe 39 PID 1052 wrote to memory of 2140 1052 26824.exe 39 PID 1052 wrote to memory of 2140 1052 26824.exe 39 PID 2140 wrote to memory of 268 2140 nhhnhn.exe 40 PID 2140 wrote to memory of 268 2140 nhhnhn.exe 40 PID 2140 wrote to memory of 268 2140 nhhnhn.exe 40 PID 2140 wrote to memory of 268 2140 nhhnhn.exe 40 PID 268 wrote to memory of 2904 268 3vjpv.exe 41 PID 268 wrote to memory of 2904 268 3vjpv.exe 41 PID 268 wrote to memory of 2904 268 3vjpv.exe 41 PID 268 wrote to memory of 2904 268 3vjpv.exe 41 PID 2904 wrote to memory of 1744 2904 g0284.exe 42 PID 2904 wrote to memory of 1744 2904 g0284.exe 42 PID 2904 wrote to memory of 1744 2904 g0284.exe 42 PID 2904 wrote to memory of 1744 2904 g0284.exe 42 PID 1744 wrote to memory of 332 1744 646288.exe 43 PID 1744 wrote to memory of 332 1744 646288.exe 43 PID 1744 wrote to memory of 332 1744 646288.exe 43 PID 1744 wrote to memory of 332 1744 646288.exe 43 PID 332 wrote to memory of 2148 332 xrlrrfr.exe 44 PID 332 wrote to memory of 2148 332 xrlrrfr.exe 44 PID 332 wrote to memory of 2148 332 xrlrrfr.exe 44 PID 332 wrote to memory of 2148 332 xrlrrfr.exe 44 PID 2148 wrote to memory of 1436 2148 pjjvd.exe 45 PID 2148 wrote to memory of 1436 2148 pjjvd.exe 45 PID 2148 wrote to memory of 1436 2148 pjjvd.exe 45 PID 2148 wrote to memory of 1436 2148 pjjvd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe"C:\Users\Admin\AppData\Local\Temp\d35a13a885375a3897c94d3834037a5328d266df18c8558be3dbf20e3d191392.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\1dvvd.exec:\1dvvd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\vvvjv.exec:\vvvjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\7btbtt.exec:\7btbtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\862268.exec:\862268.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\220082.exec:\220082.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\o682020.exec:\o682020.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\608800.exec:\608800.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\1fflrrf.exec:\1fflrrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\26824.exec:\26824.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\nhhnhn.exec:\nhhnhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\3vjpv.exec:\3vjpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
\??\c:\g0284.exec:\g0284.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\646288.exec:\646288.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\xrlrrfr.exec:\xrlrrfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
\??\c:\pjjvd.exec:\pjjvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\djpvj.exec:\djpvj.exe17⤵
- Executes dropped EXE
PID:1436 -
\??\c:\lxflrxx.exec:\lxflrxx.exe18⤵
- Executes dropped EXE
PID:2008 -
\??\c:\xrflrrf.exec:\xrflrrf.exe19⤵
- Executes dropped EXE
PID:2992 -
\??\c:\042244.exec:\042244.exe20⤵
- Executes dropped EXE
PID:2448 -
\??\c:\208400.exec:\208400.exe21⤵
- Executes dropped EXE
PID:2632 -
\??\c:\hbnnhh.exec:\hbnnhh.exe22⤵
- Executes dropped EXE
PID:1760 -
\??\c:\rrrfflf.exec:\rrrfflf.exe23⤵
- Executes dropped EXE
PID:2204 -
\??\c:\0484662.exec:\0484662.exe24⤵
- Executes dropped EXE
PID:1488 -
\??\c:\6048006.exec:\6048006.exe25⤵
- Executes dropped EXE
PID:3044 -
\??\c:\nhttbt.exec:\nhttbt.exe26⤵
- Executes dropped EXE
PID:1524 -
\??\c:\k64082.exec:\k64082.exe27⤵
- Executes dropped EXE
PID:2532 -
\??\c:\rfrlxxf.exec:\rfrlxxf.exe28⤵
- Executes dropped EXE
PID:308 -
\??\c:\llffrrl.exec:\llffrrl.exe29⤵
- Executes dropped EXE
PID:112 -
\??\c:\86062.exec:\86062.exe30⤵
- Executes dropped EXE
PID:1556 -
\??\c:\fxrrxxl.exec:\fxrrxxl.exe31⤵
- Executes dropped EXE
PID:1284 -
\??\c:\i428440.exec:\i428440.exe32⤵
- Executes dropped EXE
PID:2612 -
\??\c:\nhhhnn.exec:\nhhhnn.exe33⤵
- Executes dropped EXE
PID:2772 -
\??\c:\rfrlxrx.exec:\rfrlxrx.exe34⤵
- Executes dropped EXE
PID:2832 -
\??\c:\lxlffff.exec:\lxlffff.exe35⤵
- Executes dropped EXE
PID:2952 -
\??\c:\264004.exec:\264004.exe36⤵
- Executes dropped EXE
PID:2928 -
\??\c:\08262.exec:\08262.exe37⤵
- Executes dropped EXE
PID:1540 -
\??\c:\frxflxx.exec:\frxflxx.exe38⤵
- Executes dropped EXE
PID:2816 -
\??\c:\pjvdv.exec:\pjvdv.exe39⤵
- Executes dropped EXE
PID:2716 -
\??\c:\4266228.exec:\4266228.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864 -
\??\c:\e28088.exec:\e28088.exe41⤵
- Executes dropped EXE
PID:2944 -
\??\c:\9hnnbb.exec:\9hnnbb.exe42⤵
- Executes dropped EXE
PID:2736 -
\??\c:\826282.exec:\826282.exe43⤵
- Executes dropped EXE
PID:2580 -
\??\c:\60880.exec:\60880.exe44⤵
- Executes dropped EXE
PID:1648 -
\??\c:\rllrlrx.exec:\rllrlrx.exe45⤵
- Executes dropped EXE
PID:1788 -
\??\c:\22446.exec:\22446.exe46⤵
- Executes dropped EXE
PID:2912 -
\??\c:\nbtbnt.exec:\nbtbnt.exe47⤵
- Executes dropped EXE
PID:816 -
\??\c:\86884.exec:\86884.exe48⤵
- Executes dropped EXE
PID:1372 -
\??\c:\208466.exec:\208466.exe49⤵
- Executes dropped EXE
PID:588 -
\??\c:\7bnttt.exec:\7bnttt.exe50⤵
- Executes dropped EXE
PID:2148 -
\??\c:\xrfxfxf.exec:\xrfxfxf.exe51⤵
- Executes dropped EXE
PID:304 -
\??\c:\lfxxllx.exec:\lfxxllx.exe52⤵
- Executes dropped EXE
PID:2028 -
\??\c:\02848.exec:\02848.exe53⤵
- Executes dropped EXE
PID:320 -
\??\c:\rlxfrxr.exec:\rlxfrxr.exe54⤵
- Executes dropped EXE
PID:3020 -
\??\c:\1pjjv.exec:\1pjjv.exe55⤵
- Executes dropped EXE
PID:572 -
\??\c:\xxrrrrr.exec:\xxrrrrr.exe56⤵
- Executes dropped EXE
PID:2988 -
\??\c:\48080.exec:\48080.exe57⤵
- Executes dropped EXE
PID:2312 -
\??\c:\2644228.exec:\2644228.exe58⤵
- Executes dropped EXE
PID:2672 -
\??\c:\vdjjd.exec:\vdjjd.exe59⤵
- Executes dropped EXE
PID:1144 -
\??\c:\pjdjv.exec:\pjdjv.exe60⤵
- Executes dropped EXE
PID:2204 -
\??\c:\5tntbb.exec:\5tntbb.exe61⤵
- Executes dropped EXE
PID:1956 -
\??\c:\q24444.exec:\q24444.exe62⤵
- Executes dropped EXE
PID:2896 -
\??\c:\djdpj.exec:\djdpj.exe63⤵
- Executes dropped EXE
PID:1820 -
\??\c:\5hhhbb.exec:\5hhhbb.exe64⤵
- Executes dropped EXE
PID:1716 -
\??\c:\864066.exec:\864066.exe65⤵
- Executes dropped EXE
PID:2296 -
\??\c:\6088062.exec:\6088062.exe66⤵PID:1480
-
\??\c:\60202.exec:\60202.exe67⤵PID:2112
-
\??\c:\022282.exec:\022282.exe68⤵PID:892
-
\??\c:\826000.exec:\826000.exe69⤵PID:1664
-
\??\c:\426226.exec:\426226.exe70⤵PID:2160
-
\??\c:\xrrxflr.exec:\xrrxflr.exe71⤵PID:1496
-
\??\c:\rflflfl.exec:\rflflfl.exe72⤵PID:2880
-
\??\c:\264682.exec:\264682.exe73⤵PID:2180
-
\??\c:\7thhhh.exec:\7thhhh.exe74⤵PID:2832
-
\??\c:\8288440.exec:\8288440.exe75⤵PID:2952
-
\??\c:\202804.exec:\202804.exe76⤵PID:2932
-
\??\c:\w64066.exec:\w64066.exe77⤵PID:1552
-
\??\c:\220088.exec:\220088.exe78⤵PID:2712
-
\??\c:\rlxxfxl.exec:\rlxxfxl.exe79⤵PID:2868
-
\??\c:\pjppv.exec:\pjppv.exe80⤵PID:2936
-
\??\c:\86462.exec:\86462.exe81⤵PID:2704
-
\??\c:\2688440.exec:\2688440.exe82⤵PID:2860
-
\??\c:\428406.exec:\428406.exe83⤵PID:2580
-
\??\c:\080060.exec:\080060.exe84⤵PID:2452
-
\??\c:\9tttbb.exec:\9tttbb.exe85⤵PID:1788
-
\??\c:\vjvdd.exec:\vjvdd.exe86⤵PID:1980
-
\??\c:\g8448.exec:\g8448.exe87⤵PID:1388
-
\??\c:\20240.exec:\20240.exe88⤵PID:1748
-
\??\c:\262288.exec:\262288.exe89⤵PID:588
-
\??\c:\480628.exec:\480628.exe90⤵PID:2460
-
\??\c:\rfxrrlx.exec:\rfxrrlx.exe91⤵PID:2360
-
\??\c:\rxlxxxr.exec:\rxlxxxr.exe92⤵PID:1908
-
\??\c:\jddvv.exec:\jddvv.exe93⤵PID:1976
-
\??\c:\xffrlfl.exec:\xffrlfl.exe94⤵PID:3024
-
\??\c:\i800668.exec:\i800668.exe95⤵PID:572
-
\??\c:\5xxrrff.exec:\5xxrrff.exe96⤵PID:1884
-
\??\c:\pdvpp.exec:\pdvpp.exe97⤵PID:2312
-
\??\c:\q64022.exec:\q64022.exe98⤵PID:1580
-
\??\c:\m6006.exec:\m6006.exe99⤵PID:1144
-
\??\c:\rffffxf.exec:\rffffxf.exe100⤵PID:1896
-
\??\c:\xlfrrlx.exec:\xlfrrlx.exe101⤵PID:1612
-
\??\c:\vpdvv.exec:\vpdvv.exe102⤵PID:996
-
\??\c:\jvdvd.exec:\jvdvd.exe103⤵PID:1820
-
\??\c:\862222.exec:\862222.exe104⤵PID:1536
-
\??\c:\xlxrffr.exec:\xlxrffr.exe105⤵PID:1812
-
\??\c:\hntthb.exec:\hntthb.exe106⤵PID:792
-
\??\c:\lfrrxrx.exec:\lfrrxrx.exe107⤵PID:2540
-
\??\c:\c088006.exec:\c088006.exe108⤵PID:892
-
\??\c:\o288006.exec:\o288006.exe109⤵PID:2464
-
\??\c:\6462402.exec:\6462402.exe110⤵PID:2160
-
\??\c:\s6444.exec:\s6444.exe111⤵PID:2172
-
\??\c:\1dpjp.exec:\1dpjp.exe112⤵PID:2616
-
\??\c:\0844006.exec:\0844006.exe113⤵PID:2556
-
\??\c:\1rxflrx.exec:\1rxflrx.exe114⤵PID:3068
-
\??\c:\rlxfrxx.exec:\rlxfrxx.exe115⤵PID:2796
-
\??\c:\xrfxfxx.exec:\xrfxfxx.exe116⤵PID:1544
-
\??\c:\fxlrxxl.exec:\fxlrxxl.exe117⤵PID:2724
-
\??\c:\flrlrfl.exec:\flrlrfl.exe118⤵PID:2828
-
\??\c:\08460.exec:\08460.exe119⤵PID:2876
-
\??\c:\5hbtnn.exec:\5hbtnn.exe120⤵PID:2856
-
\??\c:\fxllffl.exec:\fxllffl.exe121⤵PID:2752
-
\??\c:\lxxxxxf.exec:\lxxxxxf.exe122⤵PID:2692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-