Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 08:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe
-
Size
64KB
-
MD5
5a092aba06b25a3bab39707b9cb8f740
-
SHA1
191c9d682e8d8e303c9db4ffbccb2f97b54509ae
-
SHA256
587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0c
-
SHA512
4e98927577990c35071ea71c9d8bf07748c26a822356d2ca06973ddca1c36bc0bc6e3ea0569428d6c097de8eace5f2832198ee5c5ff750f1638539ba284c3c26
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIrmCeRMBW9:ymb3NkkiQ3mdBjFIjeu0
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2440-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/320-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/572-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1092-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1408-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1760-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2572 bthhtt.exe 320 bbhntb.exe 2512 k24844.exe 2964 o462440.exe 2836 008842.exe 2988 vpppv.exe 3056 0280600.exe 2716 frxxllr.exe 1960 xrxfrrx.exe 2924 004442.exe 572 ntbttt.exe 2348 bntttb.exe 3000 488620.exe 2900 k68400.exe 2920 a8484.exe 1044 48628.exe 1028 64802.exe 2464 9djpp.exe 2084 s4688.exe 844 hthbbb.exe 1828 c886224.exe 1092 g8668.exe 2240 dvjjp.exe 1372 vvvvv.exe 1684 686666.exe 1408 004646.exe 2428 o628484.exe 2400 o828040.exe 624 ttbhht.exe 1036 5rfxxxf.exe 1760 m0666.exe 2440 080666.exe 2496 dvppj.exe 2888 9fllfxl.exe 2968 bnnntt.exe 2180 fxxfllr.exe 2248 jvddd.exe 2976 600048.exe 2296 jdpjv.exe 2344 bthbhn.exe 2740 820682.exe 2392 08228.exe 2708 7lfxxrx.exe 2452 lrrlfrx.exe 2768 vjpjj.exe 2756 246826.exe 3004 vjvpv.exe 912 xrfxrll.exe 580 tnnnbh.exe 2992 s6844.exe 3000 64440.exe 2336 vdjjd.exe 1544 hbhhnh.exe 1396 pdddv.exe 2272 64666.exe 1028 6844488.exe 2076 1jvpp.exe 2384 rfxxlll.exe 2388 dpdvp.exe 2636 djppp.exe 1832 8600242.exe 2068 jdvvv.exe 1992 3jvpp.exe 1372 pjjdp.exe -
resource yara_rule behavioral1/memory/2440-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/320-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/572-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1092-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1408-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1760-302-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 868462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k60846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o082266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hhtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4240628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k06660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2572 2440 587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe 30 PID 2440 wrote to memory of 2572 2440 587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe 30 PID 2440 wrote to memory of 2572 2440 587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe 30 PID 2440 wrote to memory of 2572 2440 587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe 30 PID 2572 wrote to memory of 320 2572 bthhtt.exe 31 PID 2572 wrote to memory of 320 2572 bthhtt.exe 31 PID 2572 wrote to memory of 320 2572 bthhtt.exe 31 PID 2572 wrote to memory of 320 2572 bthhtt.exe 31 PID 320 wrote to memory of 2512 320 bbhntb.exe 32 PID 320 wrote to memory of 2512 320 bbhntb.exe 32 PID 320 wrote to memory of 2512 320 bbhntb.exe 32 PID 320 wrote to memory of 2512 320 bbhntb.exe 32 PID 2512 wrote to memory of 2964 2512 k24844.exe 33 PID 2512 wrote to memory of 2964 2512 k24844.exe 33 PID 2512 wrote to memory of 2964 2512 k24844.exe 33 PID 2512 wrote to memory of 2964 2512 k24844.exe 33 PID 2964 wrote to memory of 2836 2964 o462440.exe 34 PID 2964 wrote to memory of 2836 2964 o462440.exe 34 PID 2964 wrote to memory of 2836 2964 o462440.exe 34 PID 2964 wrote to memory of 2836 2964 o462440.exe 34 PID 2836 wrote to memory of 2988 2836 008842.exe 35 PID 2836 wrote to memory of 2988 2836 008842.exe 35 PID 2836 wrote to memory of 2988 2836 008842.exe 35 PID 2836 wrote to memory of 2988 2836 008842.exe 35 PID 2988 wrote to memory of 3056 2988 vpppv.exe 36 PID 2988 wrote to memory of 3056 2988 vpppv.exe 36 PID 2988 wrote to memory of 3056 2988 vpppv.exe 36 PID 2988 wrote to memory of 3056 2988 vpppv.exe 36 PID 3056 wrote to memory of 2716 3056 0280600.exe 37 PID 3056 wrote to memory of 2716 3056 0280600.exe 37 PID 3056 wrote to memory of 2716 3056 0280600.exe 37 PID 3056 wrote to memory of 2716 3056 0280600.exe 37 PID 2716 wrote to memory of 1960 2716 frxxllr.exe 38 PID 2716 wrote to memory of 1960 2716 frxxllr.exe 38 PID 2716 wrote to memory of 1960 2716 frxxllr.exe 38 PID 2716 wrote to memory of 1960 2716 frxxllr.exe 38 PID 1960 wrote to memory of 2924 1960 xrxfrrx.exe 39 PID 1960 wrote to memory of 2924 1960 xrxfrrx.exe 39 PID 1960 wrote to memory of 2924 1960 xrxfrrx.exe 39 PID 1960 wrote to memory of 2924 1960 xrxfrrx.exe 39 PID 2924 wrote to memory of 572 2924 004442.exe 40 PID 2924 wrote to memory of 572 2924 004442.exe 40 PID 2924 wrote to memory of 572 2924 004442.exe 40 PID 2924 wrote to memory of 572 2924 004442.exe 40 PID 572 wrote to memory of 2348 572 ntbttt.exe 41 PID 572 wrote to memory of 2348 572 ntbttt.exe 41 PID 572 wrote to memory of 2348 572 ntbttt.exe 41 PID 572 wrote to memory of 2348 572 ntbttt.exe 41 PID 2348 wrote to memory of 3000 2348 bntttb.exe 42 PID 2348 wrote to memory of 3000 2348 bntttb.exe 42 PID 2348 wrote to memory of 3000 2348 bntttb.exe 42 PID 2348 wrote to memory of 3000 2348 bntttb.exe 42 PID 3000 wrote to memory of 2900 3000 488620.exe 43 PID 3000 wrote to memory of 2900 3000 488620.exe 43 PID 3000 wrote to memory of 2900 3000 488620.exe 43 PID 3000 wrote to memory of 2900 3000 488620.exe 43 PID 2900 wrote to memory of 2920 2900 k68400.exe 44 PID 2900 wrote to memory of 2920 2900 k68400.exe 44 PID 2900 wrote to memory of 2920 2900 k68400.exe 44 PID 2900 wrote to memory of 2920 2900 k68400.exe 44 PID 2920 wrote to memory of 1044 2920 a8484.exe 45 PID 2920 wrote to memory of 1044 2920 a8484.exe 45 PID 2920 wrote to memory of 1044 2920 a8484.exe 45 PID 2920 wrote to memory of 1044 2920 a8484.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe"C:\Users\Admin\AppData\Local\Temp\587856e04c5cb030aff137f3fbc4c4d093436c464fd1bb6f8e91336954aeea0cN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\bthhtt.exec:\bthhtt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\bbhntb.exec:\bbhntb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\k24844.exec:\k24844.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\o462440.exec:\o462440.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\008842.exec:\008842.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\vpppv.exec:\vpppv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\0280600.exec:\0280600.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\frxxllr.exec:\frxxllr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\xrxfrrx.exec:\xrxfrrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\004442.exec:\004442.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\ntbttt.exec:\ntbttt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\bntttb.exec:\bntttb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\488620.exec:\488620.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\k68400.exec:\k68400.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\a8484.exec:\a8484.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\48628.exec:\48628.exe17⤵
- Executes dropped EXE
PID:1044 -
\??\c:\64802.exec:\64802.exe18⤵
- Executes dropped EXE
PID:1028 -
\??\c:\9djpp.exec:\9djpp.exe19⤵
- Executes dropped EXE
PID:2464 -
\??\c:\s4688.exec:\s4688.exe20⤵
- Executes dropped EXE
PID:2084 -
\??\c:\hthbbb.exec:\hthbbb.exe21⤵
- Executes dropped EXE
PID:844 -
\??\c:\c886224.exec:\c886224.exe22⤵
- Executes dropped EXE
PID:1828 -
\??\c:\g8668.exec:\g8668.exe23⤵
- Executes dropped EXE
PID:1092 -
\??\c:\dvjjp.exec:\dvjjp.exe24⤵
- Executes dropped EXE
PID:2240 -
\??\c:\vvvvv.exec:\vvvvv.exe25⤵
- Executes dropped EXE
PID:1372 -
\??\c:\686666.exec:\686666.exe26⤵
- Executes dropped EXE
PID:1684 -
\??\c:\004646.exec:\004646.exe27⤵
- Executes dropped EXE
PID:1408 -
\??\c:\o628484.exec:\o628484.exe28⤵
- Executes dropped EXE
PID:2428 -
\??\c:\o828040.exec:\o828040.exe29⤵
- Executes dropped EXE
PID:2400 -
\??\c:\ttbhht.exec:\ttbhht.exe30⤵
- Executes dropped EXE
PID:624 -
\??\c:\5rfxxxf.exec:\5rfxxxf.exe31⤵
- Executes dropped EXE
PID:1036 -
\??\c:\m0666.exec:\m0666.exe32⤵
- Executes dropped EXE
PID:1760 -
\??\c:\080666.exec:\080666.exe33⤵
- Executes dropped EXE
PID:2440 -
\??\c:\dvppj.exec:\dvppj.exe34⤵
- Executes dropped EXE
PID:2496 -
\??\c:\9fllfxl.exec:\9fllfxl.exe35⤵
- Executes dropped EXE
PID:2888 -
\??\c:\bnnntt.exec:\bnnntt.exe36⤵
- Executes dropped EXE
PID:2968 -
\??\c:\fxxfllr.exec:\fxxfllr.exe37⤵
- Executes dropped EXE
PID:2180 -
\??\c:\jvddd.exec:\jvddd.exe38⤵
- Executes dropped EXE
PID:2248 -
\??\c:\600048.exec:\600048.exe39⤵
- Executes dropped EXE
PID:2976 -
\??\c:\jdpjv.exec:\jdpjv.exe40⤵
- Executes dropped EXE
PID:2296 -
\??\c:\bthbhn.exec:\bthbhn.exe41⤵
- Executes dropped EXE
PID:2344 -
\??\c:\820682.exec:\820682.exe42⤵
- Executes dropped EXE
PID:2740 -
\??\c:\08228.exec:\08228.exe43⤵
- Executes dropped EXE
PID:2392 -
\??\c:\7lfxxrx.exec:\7lfxxrx.exe44⤵
- Executes dropped EXE
PID:2708 -
\??\c:\lrrlfrx.exec:\lrrlfrx.exe45⤵
- Executes dropped EXE
PID:2452 -
\??\c:\vjpjj.exec:\vjpjj.exe46⤵
- Executes dropped EXE
PID:2768 -
\??\c:\246826.exec:\246826.exe47⤵
- Executes dropped EXE
PID:2756 -
\??\c:\vjvpv.exec:\vjvpv.exe48⤵
- Executes dropped EXE
PID:3004 -
\??\c:\xrfxrll.exec:\xrfxrll.exe49⤵
- Executes dropped EXE
PID:912 -
\??\c:\tnnnbh.exec:\tnnnbh.exe50⤵
- Executes dropped EXE
PID:580 -
\??\c:\s6844.exec:\s6844.exe51⤵
- Executes dropped EXE
PID:2992 -
\??\c:\64440.exec:\64440.exe52⤵
- Executes dropped EXE
PID:3000 -
\??\c:\vdjjd.exec:\vdjjd.exe53⤵
- Executes dropped EXE
PID:2336 -
\??\c:\hbhhnh.exec:\hbhhnh.exe54⤵
- Executes dropped EXE
PID:1544 -
\??\c:\pdddv.exec:\pdddv.exe55⤵
- Executes dropped EXE
PID:1396 -
\??\c:\64666.exec:\64666.exe56⤵
- Executes dropped EXE
PID:2272 -
\??\c:\6844488.exec:\6844488.exe57⤵
- Executes dropped EXE
PID:1028 -
\??\c:\1jvpp.exec:\1jvpp.exe58⤵
- Executes dropped EXE
PID:2076 -
\??\c:\rfxxlll.exec:\rfxxlll.exe59⤵
- Executes dropped EXE
PID:2384 -
\??\c:\dpdvp.exec:\dpdvp.exe60⤵
- Executes dropped EXE
PID:2388 -
\??\c:\djppp.exec:\djppp.exe61⤵
- Executes dropped EXE
PID:2636 -
\??\c:\8600242.exec:\8600242.exe62⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jdvvv.exec:\jdvvv.exe63⤵
- Executes dropped EXE
PID:2068 -
\??\c:\3jvpp.exec:\3jvpp.exe64⤵
- Executes dropped EXE
PID:1992 -
\??\c:\pjjdp.exec:\pjjdp.exe65⤵
- Executes dropped EXE
PID:1372 -
\??\c:\nbnbbn.exec:\nbnbbn.exe66⤵PID:1684
-
\??\c:\o244446.exec:\o244446.exe67⤵PID:916
-
\??\c:\k84404.exec:\k84404.exe68⤵PID:2232
-
\??\c:\640688.exec:\640688.exe69⤵PID:1776
-
\??\c:\dvjpd.exec:\dvjpd.exe70⤵PID:2212
-
\??\c:\m0286.exec:\m0286.exe71⤵PID:1468
-
\??\c:\26822.exec:\26822.exe72⤵PID:1348
-
\??\c:\208444.exec:\208444.exe73⤵PID:888
-
\??\c:\w42628.exec:\w42628.exe74⤵PID:2528
-
\??\c:\8680628.exec:\8680628.exe75⤵PID:2440
-
\??\c:\7jpdj.exec:\7jpdj.exe76⤵PID:2140
-
\??\c:\e82462.exec:\e82462.exe77⤵PID:1940
-
\??\c:\fxxlfff.exec:\fxxlfff.exe78⤵PID:2848
-
\??\c:\64402.exec:\64402.exe79⤵PID:2796
-
\??\c:\rlrxxxx.exec:\rlrxxxx.exe80⤵PID:2860
-
\??\c:\20280.exec:\20280.exe81⤵PID:2404
-
\??\c:\frrrxrx.exec:\frrrxrx.exe82⤵PID:2832
-
\??\c:\1pjpv.exec:\1pjpv.exe83⤵PID:2880
-
\??\c:\s2444.exec:\s2444.exe84⤵PID:2988
-
\??\c:\pjpvj.exec:\pjpvj.exe85⤵PID:2876
-
\??\c:\20040.exec:\20040.exe86⤵PID:3056
-
\??\c:\1hbbhh.exec:\1hbbhh.exe87⤵
- System Location Discovery: System Language Discovery
PID:2452 -
\??\c:\64028.exec:\64028.exe88⤵PID:592
-
\??\c:\82424.exec:\82424.exe89⤵PID:1824
-
\??\c:\5thbhb.exec:\5thbhb.exe90⤵PID:588
-
\??\c:\9tnhnn.exec:\9tnhnn.exe91⤵PID:1488
-
\??\c:\frffllf.exec:\frffllf.exe92⤵PID:2896
-
\??\c:\244444.exec:\244444.exe93⤵PID:3016
-
\??\c:\m0228.exec:\m0228.exe94⤵PID:2260
-
\??\c:\420244.exec:\420244.exe95⤵PID:1296
-
\??\c:\jvdpp.exec:\jvdpp.exe96⤵PID:944
-
\??\c:\46888.exec:\46888.exe97⤵PID:2932
-
\??\c:\rxffxrr.exec:\rxffxrr.exe98⤵PID:2600
-
\??\c:\9vdpp.exec:\9vdpp.exe99⤵PID:2644
-
\??\c:\bnhnnn.exec:\bnhnnn.exe100⤵PID:2628
-
\??\c:\2048822.exec:\2048822.exe101⤵PID:1792
-
\??\c:\xrrlrrr.exec:\xrrlrrr.exe102⤵PID:1512
-
\??\c:\462248.exec:\462248.exe103⤵PID:1004
-
\??\c:\4848822.exec:\4848822.exe104⤵PID:2484
-
\??\c:\vjpdd.exec:\vjpdd.exe105⤵PID:2448
-
\??\c:\684442.exec:\684442.exe106⤵PID:1836
-
\??\c:\7ppjj.exec:\7ppjj.exe107⤵PID:628
-
\??\c:\dvjvv.exec:\dvjvv.exe108⤵PID:1372
-
\??\c:\k06660.exec:\k06660.exe109⤵
- System Location Discovery: System Language Discovery
PID:1408 -
\??\c:\o648044.exec:\o648044.exe110⤵PID:776
-
\??\c:\4240228.exec:\4240228.exe111⤵PID:2360
-
\??\c:\m6888.exec:\m6888.exe112⤵PID:2400
-
\??\c:\lrrrxrr.exec:\lrrrxrr.exe113⤵PID:624
-
\??\c:\5dpvj.exec:\5dpvj.exe114⤵PID:1904
-
\??\c:\68828.exec:\68828.exe115⤵PID:2052
-
\??\c:\g0226.exec:\g0226.exe116⤵PID:2592
-
\??\c:\jjppj.exec:\jjppj.exe117⤵PID:1704
-
\??\c:\206626.exec:\206626.exe118⤵PID:880
-
\??\c:\8062482.exec:\8062482.exe119⤵PID:2512
-
\??\c:\q46660.exec:\q46660.exe120⤵PID:2312
-
\??\c:\6840200.exec:\6840200.exe121⤵PID:2588
-
\??\c:\20666.exec:\20666.exe122⤵PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-