Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe
Resource
win7-20241023-en
General
-
Target
4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe
-
Size
82KB
-
MD5
a67205c38d1e1643d6857a8ded9c3d0f
-
SHA1
c19a68e2cbea3217f0b6c44a9e5ba085ab3bb44b
-
SHA256
4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d
-
SHA512
8c5eaaad694f32815a430b6d3e58a823d12e48d019beda495e1a2417f797751f492577d900db334d821ddc33c7c4339cd2121897f2f05b8eb7e1d802220625a9
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIpWCz+FR4RzWqC5rINFE4yeqa:ymb3NkkiQ3mdBjFIsIpZ+R4RzWqCu4rS
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/472-11-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/472-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2536-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-71-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2264-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2160-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2336-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2032-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1772-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1776-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/296-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2480 rfffflr.exe 2060 nbtbhb.exe 2536 dpdjv.exe 2460 lxfrrxf.exe 2928 bbnthn.exe 2264 48068.exe 2888 4802288.exe 2816 1flrxlx.exe 2696 86228.exe 2160 7xxlrrf.exe 1708 a8624.exe 2336 o240046.exe 1968 5dvvd.exe 1796 tbhtht.exe 1948 frxfllr.exe 2032 3jpvj.exe 2748 60620.exe 2740 bnhbtb.exe 2256 u022224.exe 2776 82640.exe 1688 406286.exe 836 1fxxfff.exe 2240 jjdpj.exe 1772 080682.exe 604 2084624.exe 2648 g0088.exe 1776 m2444.exe 2376 q82080.exe 296 vpdpv.exe 2348 2044826.exe 2484 42682.exe 2416 s2064.exe 2244 6868806.exe 2536 824640.exe 2772 g6802.exe 2460 hbtbbb.exe 2968 bthntn.exe 2936 w26026.exe 2912 dpvpv.exe 1364 w60282.exe 2888 ddpvp.exe 2816 26068.exe 2300 rrxxlrx.exe 2692 26446.exe 2092 0826240.exe 2024 4206406.exe 1804 5htnbn.exe 1992 c488402.exe 1184 a6402.exe 1440 7hbhnt.exe 304 btnbhn.exe 268 q00866.exe 2956 i468446.exe 1760 hbbtbn.exe 2220 o040824.exe 272 6424624.exe 2268 04244.exe 832 0822446.exe 1468 7rffrxf.exe 2856 824600.exe 2020 482444.exe 1772 hbnhtb.exe 604 824688.exe 692 8202664.exe -
resource yara_rule behavioral1/memory/472-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/472-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2536-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2160-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2336-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1772-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-247-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/296-283-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-301-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4288024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xllrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4862808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nhthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xxrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 472 wrote to memory of 2480 472 4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe 30 PID 472 wrote to memory of 2480 472 4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe 30 PID 472 wrote to memory of 2480 472 4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe 30 PID 472 wrote to memory of 2480 472 4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe 30 PID 2480 wrote to memory of 2060 2480 rfffflr.exe 31 PID 2480 wrote to memory of 2060 2480 rfffflr.exe 31 PID 2480 wrote to memory of 2060 2480 rfffflr.exe 31 PID 2480 wrote to memory of 2060 2480 rfffflr.exe 31 PID 2060 wrote to memory of 2536 2060 nbtbhb.exe 32 PID 2060 wrote to memory of 2536 2060 nbtbhb.exe 32 PID 2060 wrote to memory of 2536 2060 nbtbhb.exe 32 PID 2060 wrote to memory of 2536 2060 nbtbhb.exe 32 PID 2536 wrote to memory of 2460 2536 dpdjv.exe 33 PID 2536 wrote to memory of 2460 2536 dpdjv.exe 33 PID 2536 wrote to memory of 2460 2536 dpdjv.exe 33 PID 2536 wrote to memory of 2460 2536 dpdjv.exe 33 PID 2460 wrote to memory of 2928 2460 lxfrrxf.exe 34 PID 2460 wrote to memory of 2928 2460 lxfrrxf.exe 34 PID 2460 wrote to memory of 2928 2460 lxfrrxf.exe 34 PID 2460 wrote to memory of 2928 2460 lxfrrxf.exe 34 PID 2928 wrote to memory of 2264 2928 bbnthn.exe 35 PID 2928 wrote to memory of 2264 2928 bbnthn.exe 35 PID 2928 wrote to memory of 2264 2928 bbnthn.exe 35 PID 2928 wrote to memory of 2264 2928 bbnthn.exe 35 PID 2264 wrote to memory of 2888 2264 48068.exe 36 PID 2264 wrote to memory of 2888 2264 48068.exe 36 PID 2264 wrote to memory of 2888 2264 48068.exe 36 PID 2264 wrote to memory of 2888 2264 48068.exe 36 PID 2888 wrote to memory of 2816 2888 4802288.exe 37 PID 2888 wrote to memory of 2816 2888 4802288.exe 37 PID 2888 wrote to memory of 2816 2888 4802288.exe 37 PID 2888 wrote to memory of 2816 2888 4802288.exe 37 PID 2816 wrote to memory of 2696 2816 1flrxlx.exe 38 PID 2816 wrote to memory of 2696 2816 1flrxlx.exe 38 PID 2816 wrote to memory of 2696 2816 1flrxlx.exe 38 PID 2816 wrote to memory of 2696 2816 1flrxlx.exe 38 PID 2696 wrote to memory of 2160 2696 86228.exe 39 PID 2696 wrote to memory of 2160 2696 86228.exe 39 PID 2696 wrote to memory of 2160 2696 86228.exe 39 PID 2696 wrote to memory of 2160 2696 86228.exe 39 PID 2160 wrote to memory of 1708 2160 7xxlrrf.exe 40 PID 2160 wrote to memory of 1708 2160 7xxlrrf.exe 40 PID 2160 wrote to memory of 1708 2160 7xxlrrf.exe 40 PID 2160 wrote to memory of 1708 2160 7xxlrrf.exe 40 PID 1708 wrote to memory of 2336 1708 a8624.exe 41 PID 1708 wrote to memory of 2336 1708 a8624.exe 41 PID 1708 wrote to memory of 2336 1708 a8624.exe 41 PID 1708 wrote to memory of 2336 1708 a8624.exe 41 PID 2336 wrote to memory of 1968 2336 o240046.exe 42 PID 2336 wrote to memory of 1968 2336 o240046.exe 42 PID 2336 wrote to memory of 1968 2336 o240046.exe 42 PID 2336 wrote to memory of 1968 2336 o240046.exe 42 PID 1968 wrote to memory of 1796 1968 5dvvd.exe 43 PID 1968 wrote to memory of 1796 1968 5dvvd.exe 43 PID 1968 wrote to memory of 1796 1968 5dvvd.exe 43 PID 1968 wrote to memory of 1796 1968 5dvvd.exe 43 PID 1796 wrote to memory of 1948 1796 tbhtht.exe 44 PID 1796 wrote to memory of 1948 1796 tbhtht.exe 44 PID 1796 wrote to memory of 1948 1796 tbhtht.exe 44 PID 1796 wrote to memory of 1948 1796 tbhtht.exe 44 PID 1948 wrote to memory of 2032 1948 frxfllr.exe 45 PID 1948 wrote to memory of 2032 1948 frxfllr.exe 45 PID 1948 wrote to memory of 2032 1948 frxfllr.exe 45 PID 1948 wrote to memory of 2032 1948 frxfllr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe"C:\Users\Admin\AppData\Local\Temp\4efbe558859c51d8abbe470c1aad9054f7dc0a2493c8f823b990894b4f74ab3d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:472 -
\??\c:\rfffflr.exec:\rfffflr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\nbtbhb.exec:\nbtbhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\dpdjv.exec:\dpdjv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\lxfrrxf.exec:\lxfrrxf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\bbnthn.exec:\bbnthn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\48068.exec:\48068.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\4802288.exec:\4802288.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\1flrxlx.exec:\1flrxlx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\86228.exec:\86228.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\7xxlrrf.exec:\7xxlrrf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\a8624.exec:\a8624.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\o240046.exec:\o240046.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\5dvvd.exec:\5dvvd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\tbhtht.exec:\tbhtht.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\frxfllr.exec:\frxfllr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\3jpvj.exec:\3jpvj.exe17⤵
- Executes dropped EXE
PID:2032 -
\??\c:\60620.exec:\60620.exe18⤵
- Executes dropped EXE
PID:2748 -
\??\c:\bnhbtb.exec:\bnhbtb.exe19⤵
- Executes dropped EXE
PID:2740 -
\??\c:\u022224.exec:\u022224.exe20⤵
- Executes dropped EXE
PID:2256 -
\??\c:\82640.exec:\82640.exe21⤵
- Executes dropped EXE
PID:2776 -
\??\c:\406286.exec:\406286.exe22⤵
- Executes dropped EXE
PID:1688 -
\??\c:\1fxxfff.exec:\1fxxfff.exe23⤵
- Executes dropped EXE
PID:836 -
\??\c:\jjdpj.exec:\jjdpj.exe24⤵
- Executes dropped EXE
PID:2240 -
\??\c:\080682.exec:\080682.exe25⤵
- Executes dropped EXE
PID:1772 -
\??\c:\2084624.exec:\2084624.exe26⤵
- Executes dropped EXE
PID:604 -
\??\c:\g0088.exec:\g0088.exe27⤵
- Executes dropped EXE
PID:2648 -
\??\c:\m2444.exec:\m2444.exe28⤵
- Executes dropped EXE
PID:1776 -
\??\c:\q82080.exec:\q82080.exe29⤵
- Executes dropped EXE
PID:2376 -
\??\c:\vpdpv.exec:\vpdpv.exe30⤵
- Executes dropped EXE
PID:296 -
\??\c:\2044826.exec:\2044826.exe31⤵
- Executes dropped EXE
PID:2348 -
\??\c:\42682.exec:\42682.exe32⤵
- Executes dropped EXE
PID:2484 -
\??\c:\s2064.exec:\s2064.exe33⤵
- Executes dropped EXE
PID:2416 -
\??\c:\6868806.exec:\6868806.exe34⤵
- Executes dropped EXE
PID:2244 -
\??\c:\824640.exec:\824640.exe35⤵
- Executes dropped EXE
PID:2536 -
\??\c:\g6802.exec:\g6802.exe36⤵
- Executes dropped EXE
PID:2772 -
\??\c:\hbtbbb.exec:\hbtbbb.exe37⤵
- Executes dropped EXE
PID:2460 -
\??\c:\bthntn.exec:\bthntn.exe38⤵
- Executes dropped EXE
PID:2968 -
\??\c:\w26026.exec:\w26026.exe39⤵
- Executes dropped EXE
PID:2936 -
\??\c:\dpvpv.exec:\dpvpv.exe40⤵
- Executes dropped EXE
PID:2912 -
\??\c:\w60282.exec:\w60282.exe41⤵
- Executes dropped EXE
PID:1364 -
\??\c:\ddpvp.exec:\ddpvp.exe42⤵
- Executes dropped EXE
PID:2888 -
\??\c:\26068.exec:\26068.exe43⤵
- Executes dropped EXE
PID:2816 -
\??\c:\rrxxlrx.exec:\rrxxlrx.exe44⤵
- Executes dropped EXE
PID:2300 -
\??\c:\26446.exec:\26446.exe45⤵
- Executes dropped EXE
PID:2692 -
\??\c:\0826240.exec:\0826240.exe46⤵
- Executes dropped EXE
PID:2092 -
\??\c:\4206406.exec:\4206406.exe47⤵
- Executes dropped EXE
PID:2024 -
\??\c:\5htnbn.exec:\5htnbn.exe48⤵
- Executes dropped EXE
PID:1804 -
\??\c:\c488402.exec:\c488402.exe49⤵
- Executes dropped EXE
PID:1992 -
\??\c:\a6402.exec:\a6402.exe50⤵
- Executes dropped EXE
PID:1184 -
\??\c:\7hbhnt.exec:\7hbhnt.exe51⤵
- Executes dropped EXE
PID:1440 -
\??\c:\btnbhn.exec:\btnbhn.exe52⤵
- Executes dropped EXE
PID:304 -
\??\c:\q00866.exec:\q00866.exe53⤵
- Executes dropped EXE
PID:268 -
\??\c:\i468446.exec:\i468446.exe54⤵
- Executes dropped EXE
PID:2956 -
\??\c:\hbbtbn.exec:\hbbtbn.exe55⤵
- Executes dropped EXE
PID:1760 -
\??\c:\o040824.exec:\o040824.exe56⤵
- Executes dropped EXE
PID:2220 -
\??\c:\6424624.exec:\6424624.exe57⤵
- Executes dropped EXE
PID:272 -
\??\c:\04244.exec:\04244.exe58⤵
- Executes dropped EXE
PID:2268 -
\??\c:\0822446.exec:\0822446.exe59⤵
- Executes dropped EXE
PID:832 -
\??\c:\7rffrxf.exec:\7rffrxf.exe60⤵
- Executes dropped EXE
PID:1468 -
\??\c:\824600.exec:\824600.exe61⤵
- Executes dropped EXE
PID:2856 -
\??\c:\482444.exec:\482444.exe62⤵
- Executes dropped EXE
PID:2020 -
\??\c:\hbnhtb.exec:\hbnhtb.exe63⤵
- Executes dropped EXE
PID:1772 -
\??\c:\824688.exec:\824688.exe64⤵
- Executes dropped EXE
PID:604 -
\??\c:\8202664.exec:\8202664.exe65⤵
- Executes dropped EXE
PID:692 -
\??\c:\jdvvd.exec:\jdvvd.exe66⤵PID:1096
-
\??\c:\nhbbtt.exec:\nhbbtt.exe67⤵PID:2368
-
\??\c:\i864006.exec:\i864006.exe68⤵PID:1972
-
\??\c:\866244.exec:\866244.exe69⤵PID:1568
-
\??\c:\o424000.exec:\o424000.exe70⤵PID:2036
-
\??\c:\rfrlfxl.exec:\rfrlfxl.exe71⤵PID:3052
-
\??\c:\btbnbh.exec:\btbnbh.exe72⤵PID:2900
-
\??\c:\s8622.exec:\s8622.exe73⤵PID:2416
-
\??\c:\6866880.exec:\6866880.exe74⤵PID:2764
-
\??\c:\3bhhtt.exec:\3bhhtt.exe75⤵PID:2784
-
\??\c:\0466868.exec:\0466868.exe76⤵PID:2228
-
\??\c:\pddpp.exec:\pddpp.exe77⤵PID:2476
-
\??\c:\8684006.exec:\8684006.exe78⤵PID:2820
-
\??\c:\a0288.exec:\a0288.exe79⤵PID:2812
-
\??\c:\5jpjd.exec:\5jpjd.exe80⤵PID:2936
-
\??\c:\rlxrfrx.exec:\rlxrfrx.exe81⤵PID:2972
-
\??\c:\xlflrxx.exec:\xlflrxx.exe82⤵PID:2848
-
\??\c:\w08428.exec:\w08428.exe83⤵PID:2756
-
\??\c:\426284.exec:\426284.exe84⤵PID:2100
-
\??\c:\48044.exec:\48044.exe85⤵PID:2448
-
\??\c:\08068.exec:\08068.exe86⤵PID:2576
-
\??\c:\608846.exec:\608846.exe87⤵PID:2004
-
\??\c:\frffxfr.exec:\frffxfr.exe88⤵PID:2432
-
\??\c:\pjppd.exec:\pjppd.exe89⤵PID:1644
-
\??\c:\2606624.exec:\2606624.exe90⤵PID:2328
-
\??\c:\vddpd.exec:\vddpd.exe91⤵PID:1744
-
\??\c:\a2224.exec:\a2224.exe92⤵PID:396
-
\??\c:\5tnntb.exec:\5tnntb.exe93⤵PID:1248
-
\??\c:\648804.exec:\648804.exe94⤵PID:1808
-
\??\c:\7vdjp.exec:\7vdjp.exe95⤵PID:2188
-
\??\c:\fxrrxff.exec:\fxrrxff.exe96⤵PID:2280
-
\??\c:\8262622.exec:\8262622.exe97⤵PID:3064
-
\??\c:\c202284.exec:\c202284.exe98⤵PID:2132
-
\??\c:\240404.exec:\240404.exe99⤵PID:564
-
\??\c:\a4886.exec:\a4886.exe100⤵PID:1860
-
\??\c:\q64284.exec:\q64284.exe101⤵PID:828
-
\??\c:\xxfxlll.exec:\xxfxlll.exe102⤵PID:960
-
\??\c:\lfxfrrf.exec:\lfxfrrf.exe103⤵PID:532
-
\??\c:\604824.exec:\604824.exe104⤵PID:1600
-
\??\c:\xlrlxfl.exec:\xlrlxfl.exe105⤵PID:1280
-
\??\c:\9lfrxfr.exec:\9lfrxfr.exe106⤵PID:2396
-
\??\c:\ddvjd.exec:\ddvjd.exe107⤵PID:872
-
\??\c:\k04068.exec:\k04068.exe108⤵PID:300
-
\??\c:\4448860.exec:\4448860.exe109⤵PID:656
-
\??\c:\pjjpj.exec:\pjjpj.exe110⤵PID:2292
-
\??\c:\pjvdj.exec:\pjvdj.exe111⤵PID:2468
-
\??\c:\3rlrfll.exec:\3rlrfll.exe112⤵PID:2456
-
\??\c:\4862808.exec:\4862808.exe113⤵
- System Location Discovery: System Language Discovery
PID:1720 -
\??\c:\4202446.exec:\4202446.exe114⤵PID:2464
-
\??\c:\804044.exec:\804044.exe115⤵PID:2536
-
\??\c:\86068.exec:\86068.exe116⤵PID:2176
-
\??\c:\9btthh.exec:\9btthh.exe117⤵PID:2832
-
\??\c:\7hbnbb.exec:\7hbnbb.exe118⤵PID:3008
-
\??\c:\jddpj.exec:\jddpj.exe119⤵PID:2548
-
\??\c:\86468.exec:\86468.exe120⤵PID:2872
-
\??\c:\rfxfrxl.exec:\rfxfrxl.exe121⤵PID:2992
-
\??\c:\8688462.exec:\8688462.exe122⤵PID:2888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-