Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe
Resource
win7-20240708-en
General
-
Target
57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe
-
Size
72KB
-
MD5
cc6c129dea2e39ff9a714daa7fe767d5
-
SHA1
b817580baad528a1b0320b0dfe74405b8c53c070
-
SHA256
57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605
-
SHA512
1e39f736793d2acea57c47a0676ecb4deaa1c391db7e63bc6ee903693718401c606537491aa7bcfc8616814e7820aab2b5ba6a7a04d93ad136b55b5661b88ce2
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfUcicP/fH:ymb3NkkiQ3mdBjFI4V4ci2/fH
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/464-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1628-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1708-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1432-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/848-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1228-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1140-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2520-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1628 g0408.exe 1708 thnbhn.exe 2108 dvjpv.exe 2692 6046462.exe 2704 4244442.exe 2240 o246000.exe 2760 66422.exe 2900 ddpvj.exe 2604 604024.exe 2720 k20284.exe 2768 02086.exe 1540 nhttht.exe 2980 82006.exe 2784 00462.exe 1432 08446.exe 1476 hbtbnn.exe 848 7nhbtt.exe 3056 llxflrf.exe 3048 thtnbb.exe 532 hbnbnt.exe 2560 1llrxxl.exe 3064 84028.exe 2060 6488446.exe 1228 bthhbb.exe 600 hhtbtt.exe 1140 2642440.exe 2140 tbtbbb.exe 556 6088668.exe 1948 26842.exe 2476 llfrxfr.exe 2520 dpdvv.exe 2548 286266.exe 1836 bnbttt.exe 1552 1pjjj.exe 1612 dvddj.exe 2748 k04028.exe 2020 dvjjj.exe 2608 xrllxfl.exe 2848 hnnhnh.exe 2928 pdjjp.exe 2764 dvddv.exe 2600 6606246.exe 2712 c684068.exe 2604 hbtbnt.exe 1648 620208.exe 2908 q24480.exe 2968 nhbhbt.exe 2996 hbtntn.exe 2924 4288488.exe 2784 8828280.exe 2660 0466662.exe 1508 llfrlfl.exe 1868 60266.exe 3044 48066.exe 2276 640404.exe 1356 82440.exe 676 pddvd.exe 2348 2206220.exe 404 lfrrxrl.exe 3064 7bbhnn.exe 2060 g8626.exe 1608 lxlxxlr.exe 1944 486888.exe 572 tnbthh.exe -
resource yara_rule behavioral1/memory/464-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1708-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1432-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1228-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1140-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-303-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k80066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c608868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2642440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8282680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i462444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 1628 464 57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe 30 PID 464 wrote to memory of 1628 464 57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe 30 PID 464 wrote to memory of 1628 464 57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe 30 PID 464 wrote to memory of 1628 464 57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe 30 PID 1628 wrote to memory of 1708 1628 g0408.exe 31 PID 1628 wrote to memory of 1708 1628 g0408.exe 31 PID 1628 wrote to memory of 1708 1628 g0408.exe 31 PID 1628 wrote to memory of 1708 1628 g0408.exe 31 PID 1708 wrote to memory of 2108 1708 thnbhn.exe 32 PID 1708 wrote to memory of 2108 1708 thnbhn.exe 32 PID 1708 wrote to memory of 2108 1708 thnbhn.exe 32 PID 1708 wrote to memory of 2108 1708 thnbhn.exe 32 PID 2108 wrote to memory of 2692 2108 dvjpv.exe 33 PID 2108 wrote to memory of 2692 2108 dvjpv.exe 33 PID 2108 wrote to memory of 2692 2108 dvjpv.exe 33 PID 2108 wrote to memory of 2692 2108 dvjpv.exe 33 PID 2692 wrote to memory of 2704 2692 6046462.exe 34 PID 2692 wrote to memory of 2704 2692 6046462.exe 34 PID 2692 wrote to memory of 2704 2692 6046462.exe 34 PID 2692 wrote to memory of 2704 2692 6046462.exe 34 PID 2704 wrote to memory of 2240 2704 4244442.exe 35 PID 2704 wrote to memory of 2240 2704 4244442.exe 35 PID 2704 wrote to memory of 2240 2704 4244442.exe 35 PID 2704 wrote to memory of 2240 2704 4244442.exe 35 PID 2240 wrote to memory of 2760 2240 o246000.exe 36 PID 2240 wrote to memory of 2760 2240 o246000.exe 36 PID 2240 wrote to memory of 2760 2240 o246000.exe 36 PID 2240 wrote to memory of 2760 2240 o246000.exe 36 PID 2760 wrote to memory of 2900 2760 66422.exe 37 PID 2760 wrote to memory of 2900 2760 66422.exe 37 PID 2760 wrote to memory of 2900 2760 66422.exe 37 PID 2760 wrote to memory of 2900 2760 66422.exe 37 PID 2900 wrote to memory of 2604 2900 ddpvj.exe 38 PID 2900 wrote to memory of 2604 2900 ddpvj.exe 38 PID 2900 wrote to memory of 2604 2900 ddpvj.exe 38 PID 2900 wrote to memory of 2604 2900 ddpvj.exe 38 PID 2604 wrote to memory of 2720 2604 604024.exe 39 PID 2604 wrote to memory of 2720 2604 604024.exe 39 PID 2604 wrote to memory of 2720 2604 604024.exe 39 PID 2604 wrote to memory of 2720 2604 604024.exe 39 PID 2720 wrote to memory of 2768 2720 k20284.exe 40 PID 2720 wrote to memory of 2768 2720 k20284.exe 40 PID 2720 wrote to memory of 2768 2720 k20284.exe 40 PID 2720 wrote to memory of 2768 2720 k20284.exe 40 PID 2768 wrote to memory of 1540 2768 02086.exe 41 PID 2768 wrote to memory of 1540 2768 02086.exe 41 PID 2768 wrote to memory of 1540 2768 02086.exe 41 PID 2768 wrote to memory of 1540 2768 02086.exe 41 PID 1540 wrote to memory of 2980 1540 nhttht.exe 42 PID 1540 wrote to memory of 2980 1540 nhttht.exe 42 PID 1540 wrote to memory of 2980 1540 nhttht.exe 42 PID 1540 wrote to memory of 2980 1540 nhttht.exe 42 PID 2980 wrote to memory of 2784 2980 82006.exe 43 PID 2980 wrote to memory of 2784 2980 82006.exe 43 PID 2980 wrote to memory of 2784 2980 82006.exe 43 PID 2980 wrote to memory of 2784 2980 82006.exe 43 PID 2784 wrote to memory of 1432 2784 00462.exe 44 PID 2784 wrote to memory of 1432 2784 00462.exe 44 PID 2784 wrote to memory of 1432 2784 00462.exe 44 PID 2784 wrote to memory of 1432 2784 00462.exe 44 PID 1432 wrote to memory of 1476 1432 08446.exe 45 PID 1432 wrote to memory of 1476 1432 08446.exe 45 PID 1432 wrote to memory of 1476 1432 08446.exe 45 PID 1432 wrote to memory of 1476 1432 08446.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe"C:\Users\Admin\AppData\Local\Temp\57ae8b14343e8a46087a6665989810a3bb2dd02252117da47a95fe6ebc8e5605.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\g0408.exec:\g0408.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\thnbhn.exec:\thnbhn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\dvjpv.exec:\dvjpv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\6046462.exec:\6046462.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\4244442.exec:\4244442.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\o246000.exec:\o246000.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\66422.exec:\66422.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\ddpvj.exec:\ddpvj.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\604024.exec:\604024.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\k20284.exec:\k20284.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\02086.exec:\02086.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\nhttht.exec:\nhttht.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\82006.exec:\82006.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\00462.exec:\00462.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\08446.exec:\08446.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
\??\c:\hbtbnn.exec:\hbtbnn.exe17⤵
- Executes dropped EXE
PID:1476 -
\??\c:\7nhbtt.exec:\7nhbtt.exe18⤵
- Executes dropped EXE
PID:848 -
\??\c:\llxflrf.exec:\llxflrf.exe19⤵
- Executes dropped EXE
PID:3056 -
\??\c:\thtnbb.exec:\thtnbb.exe20⤵
- Executes dropped EXE
PID:3048 -
\??\c:\hbnbnt.exec:\hbnbnt.exe21⤵
- Executes dropped EXE
PID:532 -
\??\c:\1llrxxl.exec:\1llrxxl.exe22⤵
- Executes dropped EXE
PID:2560 -
\??\c:\84028.exec:\84028.exe23⤵
- Executes dropped EXE
PID:3064 -
\??\c:\6488446.exec:\6488446.exe24⤵
- Executes dropped EXE
PID:2060 -
\??\c:\bthhbb.exec:\bthhbb.exe25⤵
- Executes dropped EXE
PID:1228 -
\??\c:\hhtbtt.exec:\hhtbtt.exe26⤵
- Executes dropped EXE
PID:600 -
\??\c:\2642440.exec:\2642440.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
\??\c:\tbtbbb.exec:\tbtbbb.exe28⤵
- Executes dropped EXE
PID:2140 -
\??\c:\6088668.exec:\6088668.exe29⤵
- Executes dropped EXE
PID:556 -
\??\c:\26842.exec:\26842.exe30⤵
- Executes dropped EXE
PID:1948 -
\??\c:\llfrxfr.exec:\llfrxfr.exe31⤵
- Executes dropped EXE
PID:2476 -
\??\c:\dpdvv.exec:\dpdvv.exe32⤵
- Executes dropped EXE
PID:2520 -
\??\c:\286266.exec:\286266.exe33⤵
- Executes dropped EXE
PID:2548 -
\??\c:\bnbttt.exec:\bnbttt.exe34⤵
- Executes dropped EXE
PID:1836 -
\??\c:\1pjjj.exec:\1pjjj.exe35⤵
- Executes dropped EXE
PID:1552 -
\??\c:\dvddj.exec:\dvddj.exe36⤵
- Executes dropped EXE
PID:1612 -
\??\c:\k04028.exec:\k04028.exe37⤵
- Executes dropped EXE
PID:2748 -
\??\c:\dvjjj.exec:\dvjjj.exe38⤵
- Executes dropped EXE
PID:2020 -
\??\c:\xrllxfl.exec:\xrllxfl.exe39⤵
- Executes dropped EXE
PID:2608 -
\??\c:\hnnhnh.exec:\hnnhnh.exe40⤵
- Executes dropped EXE
PID:2848 -
\??\c:\pdjjp.exec:\pdjjp.exe41⤵
- Executes dropped EXE
PID:2928 -
\??\c:\dvddv.exec:\dvddv.exe42⤵
- Executes dropped EXE
PID:2764 -
\??\c:\6606246.exec:\6606246.exe43⤵
- Executes dropped EXE
PID:2600 -
\??\c:\c684068.exec:\c684068.exe44⤵
- Executes dropped EXE
PID:2712 -
\??\c:\hbtbnt.exec:\hbtbnt.exe45⤵
- Executes dropped EXE
PID:2604 -
\??\c:\620208.exec:\620208.exe46⤵
- Executes dropped EXE
PID:1648 -
\??\c:\q24480.exec:\q24480.exe47⤵
- Executes dropped EXE
PID:2908 -
\??\c:\nhbhbt.exec:\nhbhbt.exe48⤵
- Executes dropped EXE
PID:2968 -
\??\c:\hbtntn.exec:\hbtntn.exe49⤵
- Executes dropped EXE
PID:2996 -
\??\c:\4288488.exec:\4288488.exe50⤵
- Executes dropped EXE
PID:2924 -
\??\c:\8828280.exec:\8828280.exe51⤵
- Executes dropped EXE
PID:2784 -
\??\c:\0466662.exec:\0466662.exe52⤵
- Executes dropped EXE
PID:2660 -
\??\c:\llfrlfl.exec:\llfrlfl.exe53⤵
- Executes dropped EXE
PID:1508 -
\??\c:\60266.exec:\60266.exe54⤵
- Executes dropped EXE
PID:1868 -
\??\c:\48066.exec:\48066.exe55⤵
- Executes dropped EXE
PID:3044 -
\??\c:\640404.exec:\640404.exe56⤵
- Executes dropped EXE
PID:2276 -
\??\c:\82440.exec:\82440.exe57⤵
- Executes dropped EXE
PID:1356 -
\??\c:\pddvd.exec:\pddvd.exe58⤵
- Executes dropped EXE
PID:676 -
\??\c:\2206220.exec:\2206220.exe59⤵
- Executes dropped EXE
PID:2348 -
\??\c:\lfrrxrl.exec:\lfrrxrl.exe60⤵
- Executes dropped EXE
PID:404 -
\??\c:\7bbhnn.exec:\7bbhnn.exe61⤵
- Executes dropped EXE
PID:3064 -
\??\c:\g8626.exec:\g8626.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060 -
\??\c:\lxlxxlr.exec:\lxlxxlr.exe63⤵
- Executes dropped EXE
PID:1608 -
\??\c:\486888.exec:\486888.exe64⤵
- Executes dropped EXE
PID:1944 -
\??\c:\tnbthh.exec:\tnbthh.exe65⤵
- Executes dropped EXE
PID:572 -
\??\c:\2640828.exec:\2640828.exe66⤵PID:2416
-
\??\c:\4862888.exec:\4862888.exe67⤵PID:1668
-
\??\c:\w86228.exec:\w86228.exe68⤵PID:868
-
\??\c:\pjddp.exec:\pjddp.exe69⤵
- System Location Discovery: System Language Discovery
PID:2168 -
\??\c:\e44840.exec:\e44840.exe70⤵PID:1728
-
\??\c:\rlffrrr.exec:\rlffrrr.exe71⤵PID:3068
-
\??\c:\428800.exec:\428800.exe72⤵PID:2568
-
\??\c:\2088446.exec:\2088446.exe73⤵PID:3060
-
\??\c:\nbhhhb.exec:\nbhhhb.exe74⤵PID:1708
-
\??\c:\7xxlxfl.exec:\7xxlxfl.exe75⤵PID:2708
-
\??\c:\w86628.exec:\w86628.exe76⤵PID:2468
-
\??\c:\2684462.exec:\2684462.exe77⤵PID:872
-
\??\c:\k22228.exec:\k22228.exe78⤵PID:2732
-
\??\c:\vvjjp.exec:\vvjjp.exe79⤵PID:2844
-
\??\c:\jdjvd.exec:\jdjvd.exe80⤵PID:2628
-
\??\c:\xrlfrrf.exec:\xrlfrrf.exe81⤵PID:2864
-
\??\c:\660628.exec:\660628.exe82⤵PID:2872
-
\??\c:\084002.exec:\084002.exe83⤵PID:2840
-
\??\c:\68608.exec:\68608.exe84⤵PID:2596
-
\??\c:\0862802.exec:\0862802.exe85⤵PID:2028
-
\??\c:\88240.exec:\88240.exe86⤵PID:1872
-
\??\c:\3pddj.exec:\3pddj.exe87⤵PID:2988
-
\??\c:\048422.exec:\048422.exe88⤵PID:2948
-
\??\c:\46826.exec:\46826.exe89⤵PID:2820
-
\??\c:\42840.exec:\42840.exe90⤵PID:2776
-
\??\c:\hbnntb.exec:\hbnntb.exe91⤵PID:2984
-
\??\c:\llffrrf.exec:\llffrrf.exe92⤵PID:1344
-
\??\c:\tnthnt.exec:\tnthnt.exe93⤵PID:1200
-
\??\c:\xrrxffr.exec:\xrrxffr.exe94⤵PID:2008
-
\??\c:\60802.exec:\60802.exe95⤵PID:3044
-
\??\c:\vdjjp.exec:\vdjjp.exe96⤵PID:1956
-
\??\c:\60884.exec:\60884.exe97⤵PID:2012
-
\??\c:\xxlrrxf.exec:\xxlrrxf.exe98⤵PID:2552
-
\??\c:\frlxllx.exec:\frlxllx.exe99⤵PID:2560
-
\??\c:\rrlrflf.exec:\rrlrflf.exe100⤵PID:884
-
\??\c:\6028020.exec:\6028020.exe101⤵PID:1716
-
\??\c:\ppvpv.exec:\ppvpv.exe102⤵PID:1228
-
\??\c:\7tbhhb.exec:\7tbhhb.exe103⤵PID:1176
-
\??\c:\btnthn.exec:\btnthn.exe104⤵PID:1500
-
\??\c:\608804.exec:\608804.exe105⤵PID:572
-
\??\c:\08068.exec:\08068.exe106⤵PID:1952
-
\??\c:\hbnnbt.exec:\hbnnbt.exe107⤵PID:1972
-
\??\c:\5vpvv.exec:\5vpvv.exe108⤵PID:1180
-
\??\c:\w20288.exec:\w20288.exe109⤵PID:2052
-
\??\c:\8688440.exec:\8688440.exe110⤵PID:1712
-
\??\c:\lfllrfr.exec:\lfllrfr.exe111⤵PID:340
-
\??\c:\6606880.exec:\6606880.exe112⤵PID:2108
-
\??\c:\5xxfllr.exec:\5xxfllr.exe113⤵PID:2544
-
\??\c:\4206024.exec:\4206024.exe114⤵PID:1524
-
\??\c:\lfllrlr.exec:\lfllrlr.exe115⤵PID:2500
-
\??\c:\60802.exec:\60802.exe116⤵PID:1976
-
\??\c:\pjvdp.exec:\pjvdp.exe117⤵PID:2752
-
\??\c:\1jjvv.exec:\1jjvv.exe118⤵PID:2812
-
\??\c:\htnnht.exec:\htnnht.exe119⤵PID:2860
-
\??\c:\vpjjp.exec:\vpjjp.exe120⤵PID:2736
-
\??\c:\vvppd.exec:\vvppd.exe121⤵PID:2656
-
\??\c:\nhbhtb.exec:\nhbhtb.exe122⤵PID:2624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-