Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe
Resource
win7-20240708-en
General
-
Target
e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe
-
Size
91KB
-
MD5
7770a099fcc9d33227caac3b9f782e30
-
SHA1
a999195d674946804f301b89d9f7a38649f4b2d9
-
SHA256
e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6
-
SHA512
2c62c8600a6fda5274d381167a2c32d9bd68f47d25ddedad9e868c64f1f17043ccc6bc61cfc871fd36759635e049a8f10c6614e9df6ccc0270a27bb8c850d8b6
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iJvRirE0DmmdL2jqWkBq:ymb3NkkiQ3mdBjF+3TU2iBRioSumWS14
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/1620-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-40-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2964-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-68-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1720-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1628-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2204-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/768-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1064-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2688 0828866.exe 2972 6028044.exe 2964 2640406.exe 2648 nhtbnb.exe 2600 w08844.exe 2564 5pdpv.exe 3048 e80246.exe 2748 242404.exe 2996 200828.exe 1932 04242.exe 2500 xxllflx.exe 2772 rrrxlxl.exe 2932 7vddp.exe 2928 xfllfll.exe 2432 6042420.exe 2328 nhbhbt.exe 2332 48480.exe 532 pjppd.exe 2140 hbbntb.exe 1720 64668.exe 2068 hbtbhh.exe 1628 7pddj.exe 2204 5bbtbh.exe 768 3rllxfl.exe 1728 9dpdv.exe 1268 202206.exe 1064 htnntt.exe 1732 4864624.exe 1796 6002680.exe 1056 vjvvp.exe 2404 bthbtt.exe 2364 ffxfrfx.exe 2696 66082.exe 2968 rrxllxx.exe 1716 nnhttb.exe 1572 2646246.exe 2840 fxrrllr.exe 2724 8640680.exe 2596 208666.exe 2556 tntbnn.exe 2244 5hbhtb.exe 2312 hbhnbb.exe 2748 u206880.exe 2992 flfffrr.exe 2996 7bnnbb.exe 2616 20240.exe 2764 8200280.exe 2940 1jjjp.exe 2908 bthntb.exe 1964 260640.exe 1696 1frxlxf.exe 404 vpvdj.exe 2328 208422.exe 1740 frfrxfl.exe 2228 1rflxfr.exe 2108 04284.exe 2140 5fxfrxl.exe 2232 2688662.exe 1624 xrffrrx.exe 2436 pdjpd.exe 2252 rlrxfrx.exe 1772 bthnbh.exe 768 flflxfr.exe 2604 5xxrxxf.exe -
resource yara_rule behavioral1/memory/1620-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1720-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/768-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1064-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thntbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2628406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0080880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 426600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxfrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2688 1620 e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe 30 PID 1620 wrote to memory of 2688 1620 e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe 30 PID 1620 wrote to memory of 2688 1620 e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe 30 PID 1620 wrote to memory of 2688 1620 e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe 30 PID 2688 wrote to memory of 2972 2688 0828866.exe 31 PID 2688 wrote to memory of 2972 2688 0828866.exe 31 PID 2688 wrote to memory of 2972 2688 0828866.exe 31 PID 2688 wrote to memory of 2972 2688 0828866.exe 31 PID 2972 wrote to memory of 2964 2972 6028044.exe 32 PID 2972 wrote to memory of 2964 2972 6028044.exe 32 PID 2972 wrote to memory of 2964 2972 6028044.exe 32 PID 2972 wrote to memory of 2964 2972 6028044.exe 32 PID 2964 wrote to memory of 2648 2964 2640406.exe 33 PID 2964 wrote to memory of 2648 2964 2640406.exe 33 PID 2964 wrote to memory of 2648 2964 2640406.exe 33 PID 2964 wrote to memory of 2648 2964 2640406.exe 33 PID 2648 wrote to memory of 2600 2648 nhtbnb.exe 34 PID 2648 wrote to memory of 2600 2648 nhtbnb.exe 34 PID 2648 wrote to memory of 2600 2648 nhtbnb.exe 34 PID 2648 wrote to memory of 2600 2648 nhtbnb.exe 34 PID 2600 wrote to memory of 2564 2600 w08844.exe 35 PID 2600 wrote to memory of 2564 2600 w08844.exe 35 PID 2600 wrote to memory of 2564 2600 w08844.exe 35 PID 2600 wrote to memory of 2564 2600 w08844.exe 35 PID 2564 wrote to memory of 3048 2564 5pdpv.exe 36 PID 2564 wrote to memory of 3048 2564 5pdpv.exe 36 PID 2564 wrote to memory of 3048 2564 5pdpv.exe 36 PID 2564 wrote to memory of 3048 2564 5pdpv.exe 36 PID 3048 wrote to memory of 2748 3048 e80246.exe 37 PID 3048 wrote to memory of 2748 3048 e80246.exe 37 PID 3048 wrote to memory of 2748 3048 e80246.exe 37 PID 3048 wrote to memory of 2748 3048 e80246.exe 37 PID 2748 wrote to memory of 2996 2748 242404.exe 38 PID 2748 wrote to memory of 2996 2748 242404.exe 38 PID 2748 wrote to memory of 2996 2748 242404.exe 38 PID 2748 wrote to memory of 2996 2748 242404.exe 38 PID 2996 wrote to memory of 1932 2996 200828.exe 39 PID 2996 wrote to memory of 1932 2996 200828.exe 39 PID 2996 wrote to memory of 1932 2996 200828.exe 39 PID 2996 wrote to memory of 1932 2996 200828.exe 39 PID 1932 wrote to memory of 2500 1932 04242.exe 40 PID 1932 wrote to memory of 2500 1932 04242.exe 40 PID 1932 wrote to memory of 2500 1932 04242.exe 40 PID 1932 wrote to memory of 2500 1932 04242.exe 40 PID 2500 wrote to memory of 2772 2500 xxllflx.exe 41 PID 2500 wrote to memory of 2772 2500 xxllflx.exe 41 PID 2500 wrote to memory of 2772 2500 xxllflx.exe 41 PID 2500 wrote to memory of 2772 2500 xxllflx.exe 41 PID 2772 wrote to memory of 2932 2772 rrrxlxl.exe 42 PID 2772 wrote to memory of 2932 2772 rrrxlxl.exe 42 PID 2772 wrote to memory of 2932 2772 rrrxlxl.exe 42 PID 2772 wrote to memory of 2932 2772 rrrxlxl.exe 42 PID 2932 wrote to memory of 2928 2932 7vddp.exe 43 PID 2932 wrote to memory of 2928 2932 7vddp.exe 43 PID 2932 wrote to memory of 2928 2932 7vddp.exe 43 PID 2932 wrote to memory of 2928 2932 7vddp.exe 43 PID 2928 wrote to memory of 2432 2928 xfllfll.exe 44 PID 2928 wrote to memory of 2432 2928 xfllfll.exe 44 PID 2928 wrote to memory of 2432 2928 xfllfll.exe 44 PID 2928 wrote to memory of 2432 2928 xfllfll.exe 44 PID 2432 wrote to memory of 2328 2432 6042420.exe 45 PID 2432 wrote to memory of 2328 2432 6042420.exe 45 PID 2432 wrote to memory of 2328 2432 6042420.exe 45 PID 2432 wrote to memory of 2328 2432 6042420.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe"C:\Users\Admin\AppData\Local\Temp\e8e5d4ccef085d9a4472b8d3104e49d8a64ea9f760a1e0fafa5f1ec344b78bc6N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\0828866.exec:\0828866.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\6028044.exec:\6028044.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\2640406.exec:\2640406.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\nhtbnb.exec:\nhtbnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\w08844.exec:\w08844.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\5pdpv.exec:\5pdpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\e80246.exec:\e80246.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\242404.exec:\242404.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\200828.exec:\200828.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\04242.exec:\04242.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\xxllflx.exec:\xxllflx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\rrrxlxl.exec:\rrrxlxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\7vddp.exec:\7vddp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\xfllfll.exec:\xfllfll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\6042420.exec:\6042420.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\nhbhbt.exec:\nhbhbt.exe17⤵
- Executes dropped EXE
PID:2328 -
\??\c:\48480.exec:\48480.exe18⤵
- Executes dropped EXE
PID:2332 -
\??\c:\pjppd.exec:\pjppd.exe19⤵
- Executes dropped EXE
PID:532 -
\??\c:\hbbntb.exec:\hbbntb.exe20⤵
- Executes dropped EXE
PID:2140 -
\??\c:\64668.exec:\64668.exe21⤵
- Executes dropped EXE
PID:1720 -
\??\c:\hbtbhh.exec:\hbtbhh.exe22⤵
- Executes dropped EXE
PID:2068 -
\??\c:\7pddj.exec:\7pddj.exe23⤵
- Executes dropped EXE
PID:1628 -
\??\c:\5bbtbh.exec:\5bbtbh.exe24⤵
- Executes dropped EXE
PID:2204 -
\??\c:\3rllxfl.exec:\3rllxfl.exe25⤵
- Executes dropped EXE
PID:768 -
\??\c:\9dpdv.exec:\9dpdv.exe26⤵
- Executes dropped EXE
PID:1728 -
\??\c:\202206.exec:\202206.exe27⤵
- Executes dropped EXE
PID:1268 -
\??\c:\htnntt.exec:\htnntt.exe28⤵
- Executes dropped EXE
PID:1064 -
\??\c:\4864624.exec:\4864624.exe29⤵
- Executes dropped EXE
PID:1732 -
\??\c:\6002680.exec:\6002680.exe30⤵
- Executes dropped EXE
PID:1796 -
\??\c:\vjvvp.exec:\vjvvp.exe31⤵
- Executes dropped EXE
PID:1056 -
\??\c:\bthbtt.exec:\bthbtt.exe32⤵
- Executes dropped EXE
PID:2404 -
\??\c:\ffxfrfx.exec:\ffxfrfx.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364 -
\??\c:\66082.exec:\66082.exe34⤵
- Executes dropped EXE
PID:2696 -
\??\c:\rrxllxx.exec:\rrxllxx.exe35⤵
- Executes dropped EXE
PID:2968 -
\??\c:\nnhttb.exec:\nnhttb.exe36⤵
- Executes dropped EXE
PID:1716 -
\??\c:\2646246.exec:\2646246.exe37⤵
- Executes dropped EXE
PID:1572 -
\??\c:\fxrrllr.exec:\fxrrllr.exe38⤵
- Executes dropped EXE
PID:2840 -
\??\c:\8640680.exec:\8640680.exe39⤵
- Executes dropped EXE
PID:2724 -
\??\c:\208666.exec:\208666.exe40⤵
- Executes dropped EXE
PID:2596 -
\??\c:\tntbnn.exec:\tntbnn.exe41⤵
- Executes dropped EXE
PID:2556 -
\??\c:\5hbhtb.exec:\5hbhtb.exe42⤵
- Executes dropped EXE
PID:2244 -
\??\c:\hbhnbb.exec:\hbhnbb.exe43⤵
- Executes dropped EXE
PID:2312 -
\??\c:\u206880.exec:\u206880.exe44⤵
- Executes dropped EXE
PID:2748 -
\??\c:\flfffrr.exec:\flfffrr.exe45⤵
- Executes dropped EXE
PID:2992 -
\??\c:\7bnnbb.exec:\7bnnbb.exe46⤵
- Executes dropped EXE
PID:2996 -
\??\c:\20240.exec:\20240.exe47⤵
- Executes dropped EXE
PID:2616 -
\??\c:\8200280.exec:\8200280.exe48⤵
- Executes dropped EXE
PID:2764 -
\??\c:\1jjjp.exec:\1jjjp.exe49⤵
- Executes dropped EXE
PID:2940 -
\??\c:\bthntb.exec:\bthntb.exe50⤵
- Executes dropped EXE
PID:2908 -
\??\c:\260640.exec:\260640.exe51⤵
- Executes dropped EXE
PID:1964 -
\??\c:\1frxlxf.exec:\1frxlxf.exe52⤵
- Executes dropped EXE
PID:1696 -
\??\c:\vpvdj.exec:\vpvdj.exe53⤵
- Executes dropped EXE
PID:404 -
\??\c:\208422.exec:\208422.exe54⤵
- Executes dropped EXE
PID:2328 -
\??\c:\frfrxfl.exec:\frfrxfl.exe55⤵
- Executes dropped EXE
PID:1740 -
\??\c:\1rflxfr.exec:\1rflxfr.exe56⤵
- Executes dropped EXE
PID:2228 -
\??\c:\04284.exec:\04284.exe57⤵
- Executes dropped EXE
PID:2108 -
\??\c:\5fxfrxl.exec:\5fxfrxl.exe58⤵
- Executes dropped EXE
PID:2140 -
\??\c:\2688662.exec:\2688662.exe59⤵
- Executes dropped EXE
PID:2232 -
\??\c:\xrffrrx.exec:\xrffrrx.exe60⤵
- Executes dropped EXE
PID:1624 -
\??\c:\pdjpd.exec:\pdjpd.exe61⤵
- Executes dropped EXE
PID:2436 -
\??\c:\rlrxfrx.exec:\rlrxfrx.exe62⤵
- Executes dropped EXE
PID:2252 -
\??\c:\bthnbh.exec:\bthnbh.exe63⤵
- Executes dropped EXE
PID:1772 -
\??\c:\flflxfr.exec:\flflxfr.exe64⤵
- Executes dropped EXE
PID:768 -
\??\c:\5xxrxxf.exec:\5xxrxxf.exe65⤵
- Executes dropped EXE
PID:2604 -
\??\c:\pjvvp.exec:\pjvvp.exe66⤵PID:1008
-
\??\c:\btnthh.exec:\btnthh.exe67⤵PID:3024
-
\??\c:\64664.exec:\64664.exe68⤵PID:1064
-
\??\c:\602626.exec:\602626.exe69⤵PID:1732
-
\??\c:\w86088.exec:\w86088.exe70⤵PID:908
-
\??\c:\ththbn.exec:\ththbn.exe71⤵PID:1264
-
\??\c:\260684.exec:\260684.exe72⤵PID:2032
-
\??\c:\ddddj.exec:\ddddj.exe73⤵PID:2180
-
\??\c:\dppvv.exec:\dppvv.exe74⤵PID:2832
-
\??\c:\lxfllxf.exec:\lxfllxf.exe75⤵PID:2572
-
\??\c:\rlrlrlx.exec:\rlrlrlx.exe76⤵PID:2184
-
\??\c:\5xlllll.exec:\5xlllll.exe77⤵PID:1604
-
\??\c:\e20028.exec:\e20028.exe78⤵PID:1612
-
\??\c:\tnbhhh.exec:\tnbhhh.exe79⤵PID:2540
-
\??\c:\g4284.exec:\g4284.exe80⤵PID:2620
-
\??\c:\pdpvd.exec:\pdpvd.exe81⤵PID:2548
-
\??\c:\9hnntt.exec:\9hnntt.exe82⤵PID:3064
-
\??\c:\rlxxxxf.exec:\rlxxxxf.exe83⤵PID:2200
-
\??\c:\g4040.exec:\g4040.exe84⤵PID:1584
-
\??\c:\2062628.exec:\2062628.exe85⤵PID:2528
-
\??\c:\i066828.exec:\i066828.exe86⤵PID:2980
-
\??\c:\xlrfffr.exec:\xlrfffr.exe87⤵PID:2792
-
\??\c:\jdppd.exec:\jdppd.exe88⤵PID:2636
-
\??\c:\lxrxlll.exec:\lxrxlll.exe89⤵PID:2900
-
\??\c:\1rfxxxx.exec:\1rfxxxx.exe90⤵PID:2780
-
\??\c:\04002.exec:\04002.exe91⤵PID:2932
-
\??\c:\880404.exec:\880404.exe92⤵PID:2928
-
\??\c:\bnnhnt.exec:\bnnhnt.exe93⤵PID:2512
-
\??\c:\xrfxxff.exec:\xrfxxff.exe94⤵PID:1532
-
\??\c:\484848.exec:\484848.exe95⤵PID:1200
-
\??\c:\k26866.exec:\k26866.exe96⤵PID:1764
-
\??\c:\nhhhbh.exec:\nhhhbh.exe97⤵PID:2356
-
\??\c:\0468084.exec:\0468084.exe98⤵PID:2316
-
\??\c:\e20060.exec:\e20060.exe99⤵PID:1868
-
\??\c:\26462.exec:\26462.exe100⤵PID:1864
-
\??\c:\8060006.exec:\8060006.exe101⤵PID:288
-
\??\c:\vpjpv.exec:\vpjpv.exe102⤵PID:1688
-
\??\c:\xrxrxrf.exec:\xrxrxrf.exe103⤵PID:1804
-
\??\c:\7rrlllr.exec:\7rrlllr.exe104⤵PID:2100
-
\??\c:\thntbh.exec:\thntbh.exe105⤵PID:1952
-
\??\c:\9xrrrrf.exec:\9xrrrrf.exe106⤵PID:1948
-
\??\c:\s0262.exec:\s0262.exe107⤵PID:2288
-
\??\c:\ttnhhn.exec:\ttnhhn.exe108⤵PID:464
-
\??\c:\5lfxlfl.exec:\5lfxlfl.exe109⤵PID:1756
-
\??\c:\8622488.exec:\8622488.exe110⤵PID:1508
-
\??\c:\424400.exec:\424400.exe111⤵PID:1348
-
\??\c:\64664.exec:\64664.exe112⤵PID:2080
-
\??\c:\rlffxxl.exec:\rlffxxl.exe113⤵PID:2676
-
\??\c:\nhbbbt.exec:\nhbbbt.exe114⤵PID:2972
-
\??\c:\e20060.exec:\e20060.exe115⤵PID:2696
-
\??\c:\rfllflr.exec:\rfllflr.exe116⤵PID:2828
-
\??\c:\dppvd.exec:\dppvd.exe117⤵PID:2580
-
\??\c:\6406262.exec:\6406262.exe118⤵PID:2592
-
\??\c:\820062.exec:\820062.exe119⤵PID:2544
-
\??\c:\m6868.exec:\m6868.exe120⤵PID:2608
-
\??\c:\86828.exec:\86828.exe121⤵PID:2848
-
\??\c:\k64804.exec:\k64804.exe122⤵PID:780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-