Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 03:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe
-
Size
71KB
-
MD5
66fa6c1fb1547424cebaef7242860150
-
SHA1
1c1dd06ff332fe1220277b6d065360582719cfc6
-
SHA256
31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871da
-
SHA512
4ab5bb1d0665d717954d87eafc4b2672add840c52452bbc077f06236a06c6c3fc2554c6709469d30a9b56de934b0713f05f6e93703c6a2441781b0e1405e2473
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6Mu/ePS3A89:ymb3NkkiQ3mdBjFI46TQ89
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/2980-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4404-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2920-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2052-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4284-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3264-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3912-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5092-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2604-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5076-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1908-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2056-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4516-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1040-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4640-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3080-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3536-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/944-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2696-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4404 288226.exe 3628 08480.exe 2920 a6604.exe 4964 422204.exe 2052 fxrlfxr.exe 4284 rxrrllf.exe 3528 htbbhb.exe 3264 httbbn.exe 4172 046826.exe 3912 4066004.exe 896 pvvpj.exe 2696 2228244.exe 5092 88488.exe 944 jjjdv.exe 3536 k06644.exe 2316 ntbtbb.exe 4264 k22222.exe 1252 0426222.exe 3080 062648.exe 3596 rfrxrlf.exe 2604 nntttt.exe 3756 lrxrlll.exe 5076 k26604.exe 1908 c882688.exe 1604 284260.exe 2056 5llffff.exe 4516 rlxxxlf.exe 4640 pdvvp.exe 4924 26480.exe 3928 44040.exe 1040 662600.exe 2256 8888600.exe 4396 24600.exe 4012 2626004.exe 668 864866.exe 1576 000602.exe 1800 6660482.exe 5068 80206.exe 1864 806682.exe 1160 htbntn.exe 3484 lflxffx.exe 4108 xfxxrlf.exe 652 9lxrlll.exe 1892 8846026.exe 1812 rxrlffx.exe 1644 rfxrffr.exe 4448 84048.exe 2896 u200448.exe 4040 dddvd.exe 1584 llfxrrl.exe 3120 88482.exe 3512 thnbhh.exe 2996 7pdvv.exe 1116 lxxrxxx.exe 3152 dpjdv.exe 1488 rxlllll.exe 2108 vjpjj.exe 4548 846088.exe 4060 lxxrlfx.exe 4672 dvdvp.exe 760 288822.exe 3912 u000482.exe 396 024444.exe 2596 nhhbtt.exe -
resource yara_rule behavioral2/memory/2980-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4404-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2920-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2920-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2052-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3264-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3912-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3912-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3912-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3912-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2604-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5076-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1908-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2056-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1040-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4640-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3080-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4264-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3536-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/944-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2696-96-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q46084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4404 2980 31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe 83 PID 2980 wrote to memory of 4404 2980 31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe 83 PID 2980 wrote to memory of 4404 2980 31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe 83 PID 4404 wrote to memory of 3628 4404 288226.exe 84 PID 4404 wrote to memory of 3628 4404 288226.exe 84 PID 4404 wrote to memory of 3628 4404 288226.exe 84 PID 3628 wrote to memory of 2920 3628 08480.exe 85 PID 3628 wrote to memory of 2920 3628 08480.exe 85 PID 3628 wrote to memory of 2920 3628 08480.exe 85 PID 2920 wrote to memory of 4964 2920 a6604.exe 86 PID 2920 wrote to memory of 4964 2920 a6604.exe 86 PID 2920 wrote to memory of 4964 2920 a6604.exe 86 PID 4964 wrote to memory of 2052 4964 422204.exe 87 PID 4964 wrote to memory of 2052 4964 422204.exe 87 PID 4964 wrote to memory of 2052 4964 422204.exe 87 PID 2052 wrote to memory of 4284 2052 fxrlfxr.exe 197 PID 2052 wrote to memory of 4284 2052 fxrlfxr.exe 197 PID 2052 wrote to memory of 4284 2052 fxrlfxr.exe 197 PID 4284 wrote to memory of 3528 4284 rxrrllf.exe 317 PID 4284 wrote to memory of 3528 4284 rxrrllf.exe 317 PID 4284 wrote to memory of 3528 4284 rxrrllf.exe 317 PID 3528 wrote to memory of 3264 3528 htbbhb.exe 90 PID 3528 wrote to memory of 3264 3528 htbbhb.exe 90 PID 3528 wrote to memory of 3264 3528 htbbhb.exe 90 PID 3264 wrote to memory of 4172 3264 httbbn.exe 91 PID 3264 wrote to memory of 4172 3264 httbbn.exe 91 PID 3264 wrote to memory of 4172 3264 httbbn.exe 91 PID 4172 wrote to memory of 3912 4172 046826.exe 144 PID 4172 wrote to memory of 3912 4172 046826.exe 144 PID 4172 wrote to memory of 3912 4172 046826.exe 144 PID 3912 wrote to memory of 896 3912 4066004.exe 93 PID 3912 wrote to memory of 896 3912 4066004.exe 93 PID 3912 wrote to memory of 896 3912 4066004.exe 93 PID 896 wrote to memory of 2696 896 pvvpj.exe 94 PID 896 wrote to memory of 2696 896 pvvpj.exe 94 PID 896 wrote to memory of 2696 896 pvvpj.exe 94 PID 2696 wrote to memory of 5092 2696 2228244.exe 95 PID 2696 wrote to memory of 5092 2696 2228244.exe 95 PID 2696 wrote to memory of 5092 2696 2228244.exe 95 PID 5092 wrote to memory of 944 5092 88488.exe 96 PID 5092 wrote to memory of 944 5092 88488.exe 96 PID 5092 wrote to memory of 944 5092 88488.exe 96 PID 944 wrote to memory of 3536 944 jjjdv.exe 97 PID 944 wrote to memory of 3536 944 jjjdv.exe 97 PID 944 wrote to memory of 3536 944 jjjdv.exe 97 PID 3536 wrote to memory of 2316 3536 k06644.exe 98 PID 3536 wrote to memory of 2316 3536 k06644.exe 98 PID 3536 wrote to memory of 2316 3536 k06644.exe 98 PID 2316 wrote to memory of 4264 2316 ntbtbb.exe 99 PID 2316 wrote to memory of 4264 2316 ntbtbb.exe 99 PID 2316 wrote to memory of 4264 2316 ntbtbb.exe 99 PID 4264 wrote to memory of 1252 4264 k22222.exe 100 PID 4264 wrote to memory of 1252 4264 k22222.exe 100 PID 4264 wrote to memory of 1252 4264 k22222.exe 100 PID 1252 wrote to memory of 3080 1252 0426222.exe 101 PID 1252 wrote to memory of 3080 1252 0426222.exe 101 PID 1252 wrote to memory of 3080 1252 0426222.exe 101 PID 3080 wrote to memory of 3596 3080 062648.exe 102 PID 3080 wrote to memory of 3596 3080 062648.exe 102 PID 3080 wrote to memory of 3596 3080 062648.exe 102 PID 3596 wrote to memory of 2604 3596 rfrxrlf.exe 103 PID 3596 wrote to memory of 2604 3596 rfrxrlf.exe 103 PID 3596 wrote to memory of 2604 3596 rfrxrlf.exe 103 PID 2604 wrote to memory of 3756 2604 nntttt.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe"C:\Users\Admin\AppData\Local\Temp\31fb62663d933be51a04f0a6d6f54e0b7288404babf7c27e12f7b4bcb56871daN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\288226.exec:\288226.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\08480.exec:\08480.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\a6604.exec:\a6604.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\422204.exec:\422204.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
\??\c:\fxrlfxr.exec:\fxrlfxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\rxrrllf.exec:\rxrrllf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\htbbhb.exec:\htbbhb.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\httbbn.exec:\httbbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
\??\c:\046826.exec:\046826.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\4066004.exec:\4066004.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
\??\c:\pvvpj.exec:\pvvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
\??\c:\2228244.exec:\2228244.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\88488.exec:\88488.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\jjjdv.exec:\jjjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
\??\c:\k06644.exec:\k06644.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\ntbtbb.exec:\ntbtbb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\k22222.exec:\k22222.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\0426222.exec:\0426222.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\062648.exec:\062648.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\rfrxrlf.exec:\rfrxrlf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\nntttt.exec:\nntttt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\lrxrlll.exec:\lrxrlll.exe23⤵
- Executes dropped EXE
PID:3756 -
\??\c:\k26604.exec:\k26604.exe24⤵
- Executes dropped EXE
PID:5076 -
\??\c:\c882688.exec:\c882688.exe25⤵
- Executes dropped EXE
PID:1908 -
\??\c:\284260.exec:\284260.exe26⤵
- Executes dropped EXE
PID:1604 -
\??\c:\5llffff.exec:\5llffff.exe27⤵
- Executes dropped EXE
PID:2056 -
\??\c:\rlxxxlf.exec:\rlxxxlf.exe28⤵
- Executes dropped EXE
PID:4516 -
\??\c:\pdvvp.exec:\pdvvp.exe29⤵
- Executes dropped EXE
PID:4640 -
\??\c:\26480.exec:\26480.exe30⤵
- Executes dropped EXE
PID:4924 -
\??\c:\44040.exec:\44040.exe31⤵
- Executes dropped EXE
PID:3928 -
\??\c:\662600.exec:\662600.exe32⤵
- Executes dropped EXE
PID:1040 -
\??\c:\8888600.exec:\8888600.exe33⤵
- Executes dropped EXE
PID:2256 -
\??\c:\24600.exec:\24600.exe34⤵
- Executes dropped EXE
PID:4396 -
\??\c:\2626004.exec:\2626004.exe35⤵
- Executes dropped EXE
PID:4012 -
\??\c:\864866.exec:\864866.exe36⤵
- Executes dropped EXE
PID:668 -
\??\c:\000602.exec:\000602.exe37⤵
- Executes dropped EXE
PID:1576 -
\??\c:\6660482.exec:\6660482.exe38⤵
- Executes dropped EXE
PID:1800 -
\??\c:\80206.exec:\80206.exe39⤵
- Executes dropped EXE
PID:5068 -
\??\c:\806682.exec:\806682.exe40⤵
- Executes dropped EXE
PID:1864 -
\??\c:\htbntn.exec:\htbntn.exe41⤵
- Executes dropped EXE
PID:1160 -
\??\c:\lflxffx.exec:\lflxffx.exe42⤵
- Executes dropped EXE
PID:3484 -
\??\c:\xfxxrlf.exec:\xfxxrlf.exe43⤵
- Executes dropped EXE
PID:4108 -
\??\c:\9lxrlll.exec:\9lxrlll.exe44⤵
- Executes dropped EXE
PID:652 -
\??\c:\8846026.exec:\8846026.exe45⤵
- Executes dropped EXE
PID:1892 -
\??\c:\rxrlffx.exec:\rxrlffx.exe46⤵
- Executes dropped EXE
PID:1812 -
\??\c:\rfxrffr.exec:\rfxrffr.exe47⤵
- Executes dropped EXE
PID:1644 -
\??\c:\84048.exec:\84048.exe48⤵
- Executes dropped EXE
PID:4448 -
\??\c:\u200448.exec:\u200448.exe49⤵
- Executes dropped EXE
PID:2896 -
\??\c:\dddvd.exec:\dddvd.exe50⤵
- Executes dropped EXE
PID:4040 -
\??\c:\llfxrrl.exec:\llfxrrl.exe51⤵
- Executes dropped EXE
PID:1584 -
\??\c:\88482.exec:\88482.exe52⤵
- Executes dropped EXE
PID:3120 -
\??\c:\thnbhh.exec:\thnbhh.exe53⤵
- Executes dropped EXE
PID:3512 -
\??\c:\7pdvv.exec:\7pdvv.exe54⤵
- Executes dropped EXE
PID:2996 -
\??\c:\lxxrxxx.exec:\lxxrxxx.exe55⤵
- Executes dropped EXE
PID:1116 -
\??\c:\dpjdv.exec:\dpjdv.exe56⤵
- Executes dropped EXE
PID:3152 -
\??\c:\rxlllll.exec:\rxlllll.exe57⤵
- Executes dropped EXE
PID:1488 -
\??\c:\vjpjj.exec:\vjpjj.exe58⤵
- Executes dropped EXE
PID:2108 -
\??\c:\846088.exec:\846088.exe59⤵
- Executes dropped EXE
PID:4548 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe60⤵
- Executes dropped EXE
PID:4060 -
\??\c:\dvdvp.exec:\dvdvp.exe61⤵
- Executes dropped EXE
PID:4672 -
\??\c:\288822.exec:\288822.exe62⤵
- Executes dropped EXE
PID:760 -
\??\c:\u000482.exec:\u000482.exe63⤵
- Executes dropped EXE
PID:3912 -
\??\c:\024444.exec:\024444.exe64⤵
- Executes dropped EXE
PID:396 -
\??\c:\nhhbtt.exec:\nhhbtt.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596 -
\??\c:\26446.exec:\26446.exe66⤵PID:2040
-
\??\c:\vdjdv.exec:\vdjdv.exe67⤵PID:1288
-
\??\c:\4884440.exec:\4884440.exe68⤵PID:3684
-
\??\c:\jdvvv.exec:\jdvvv.exe69⤵PID:1456
-
\??\c:\8426004.exec:\8426004.exe70⤵PID:2200
-
\??\c:\ttbhhb.exec:\ttbhhb.exe71⤵PID:2284
-
\??\c:\btnbnh.exec:\btnbnh.exe72⤵PID:3332
-
\??\c:\pjjdd.exec:\pjjdd.exe73⤵PID:4264
-
\??\c:\ntbtnn.exec:\ntbtnn.exe74⤵PID:2224
-
\??\c:\7fllrxf.exec:\7fllrxf.exe75⤵PID:3864
-
\??\c:\022828.exec:\022828.exe76⤵PID:2500
-
\??\c:\824844.exec:\824844.exe77⤵PID:4752
-
\??\c:\vpvpp.exec:\vpvpp.exe78⤵PID:2604
-
\??\c:\vdvpp.exec:\vdvpp.exe79⤵PID:1284
-
\??\c:\tnhbnn.exec:\tnhbnn.exe80⤵PID:4384
-
\??\c:\nbttnn.exec:\nbttnn.exe81⤵PID:3224
-
\??\c:\40604.exec:\40604.exe82⤵PID:4468
-
\??\c:\5ddvp.exec:\5ddvp.exe83⤵PID:4748
-
\??\c:\rrrlflf.exec:\rrrlflf.exe84⤵PID:4340
-
\??\c:\hntntt.exec:\hntntt.exe85⤵PID:2664
-
\??\c:\06226.exec:\06226.exe86⤵PID:5056
-
\??\c:\flrlllr.exec:\flrlllr.exe87⤵PID:3952
-
\??\c:\ppjvv.exec:\ppjvv.exe88⤵PID:3532
-
\??\c:\dvppj.exec:\dvppj.exe89⤵PID:2508
-
\??\c:\tntnbb.exec:\tntnbb.exe90⤵PID:736
-
\??\c:\866668.exec:\866668.exe91⤵PID:976
-
\??\c:\42440.exec:\42440.exe92⤵PID:4888
-
\??\c:\9lxfrfr.exec:\9lxfrfr.exe93⤵PID:1324
-
\??\c:\lflxlfx.exec:\lflxlfx.exe94⤵PID:4052
-
\??\c:\4682666.exec:\4682666.exe95⤵PID:3580
-
\??\c:\hhbnhb.exec:\hhbnhb.exe96⤵PID:1768
-
\??\c:\djdvd.exec:\djdvd.exe97⤵PID:1208
-
\??\c:\84482.exec:\84482.exe98⤵PID:1608
-
\??\c:\lxfrllf.exec:\lxfrllf.exe99⤵PID:3344
-
\??\c:\5hbnbn.exec:\5hbnbn.exe100⤵PID:4104
-
\??\c:\6060660.exec:\6060660.exe101⤵PID:1092
-
\??\c:\k62600.exec:\k62600.exe102⤵PID:3868
-
\??\c:\5xffrrr.exec:\5xffrrr.exe103⤵PID:1440
-
\??\c:\8282222.exec:\8282222.exe104⤵PID:652
-
\??\c:\684482.exec:\684482.exe105⤵PID:3468
-
\??\c:\62266.exec:\62266.exe106⤵PID:4184
-
\??\c:\66804.exec:\66804.exe107⤵PID:1104
-
\??\c:\rllxlfx.exec:\rllxlfx.exe108⤵PID:4900
-
\??\c:\3lrlrff.exec:\3lrlrff.exe109⤵PID:4816
-
\??\c:\pvdvj.exec:\pvdvj.exe110⤵PID:4896
-
\??\c:\68042.exec:\68042.exe111⤵PID:3488
-
\??\c:\dvdvd.exec:\dvdvd.exe112⤵PID:5048
-
\??\c:\g6260.exec:\g6260.exe113⤵PID:4624
-
\??\c:\jdvjd.exec:\jdvjd.exe114⤵PID:2168
-
\??\c:\5fxlfrl.exec:\5fxlfrl.exe115⤵PID:3672
-
\??\c:\8460482.exec:\8460482.exe116⤵PID:4284
-
\??\c:\nbbtnn.exec:\nbbtnn.exe117⤵PID:1068
-
\??\c:\s4620.exec:\s4620.exe118⤵PID:4648
-
\??\c:\lflfrrx.exec:\lflfrrx.exe119⤵PID:2772
-
\??\c:\bbtbtt.exec:\bbtbtt.exe120⤵PID:4672
-
\??\c:\5ntnhn.exec:\5ntnhn.exe121⤵PID:960
-
\??\c:\1ttnnn.exec:\1ttnnn.exe122⤵PID:1524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-