Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 21:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
150 seconds
General
-
Target
5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe
-
Size
54KB
-
MD5
8f99b1e7e26f208169151e7143ffed70
-
SHA1
467d54f1034c5ceb85fe317374be781a272c96cb
-
SHA256
5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3
-
SHA512
4b95696ee39e6dfd61323ac36dbdbe34415215bc438cd290e1750be647f2eaef7ab03d87b8030f2704170d47568d6d532f13fe2ac02a4b057940d3fbbcd67755
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIY6St9xj:ymb3NkkiQ3mdBjFIY79xj
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/856-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-16-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4352-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3804-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4064-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4408-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3768-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1472-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3076-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3684-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1564-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3540-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2496-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1596-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4280-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4520-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4560 62260.exe 3088 bnnnbt.exe 4352 q40460.exe 3576 flfxlfr.exe 3804 3xrrlfr.exe 4408 ppppd.exe 4064 5llxrlf.exe 3768 8604804.exe 4616 68048.exe 1472 i408262.exe 5016 7bnbnn.exe 3640 066460.exe 3076 lxrlxrl.exe 2892 dvjpj.exe 4224 rxxlfxr.exe 3684 684086.exe 2044 e26082.exe 1564 88486.exe 1716 e88860.exe 4456 0886426.exe 3540 604860.exe 2496 1vvjv.exe 1596 7rrlrll.exe 4660 httnnh.exe 4280 tnbtbt.exe 4172 nbhhhh.exe 2868 lrlxfxr.exe 4656 6448220.exe 3704 ffffxxf.exe 4032 o266226.exe 4520 204082.exe 2536 3nnthb.exe 1992 9jpdv.exe 540 llrxlxr.exe 4352 nbtbtn.exe 1648 644426.exe 4592 0400242.exe 4408 66604.exe 4368 pddjv.exe 4304 pdvjj.exe 1904 40648.exe 3872 6400040.exe 5004 9bnbtn.exe 5116 208860.exe 756 rxxrllx.exe 3980 tnntnh.exe 2884 066866.exe 2396 m0888.exe 4024 88864.exe 2428 3ppjv.exe 3084 ffxlxrl.exe 1564 s8486.exe 3228 08482.exe 4664 e44488.exe 2120 c020084.exe 4556 64848.exe 4516 nnbnhh.exe 1068 646042.exe 1580 5hbnbt.exe 4632 204860.exe 4740 s8264.exe 800 nhtntt.exe 652 frlfxrf.exe 4804 060420.exe -
resource yara_rule behavioral2/memory/856-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3804-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4064-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3768-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1472-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3640-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3076-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3684-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1564-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3540-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2496-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1596-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4280-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4520-202-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 822604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0244220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ffrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 884820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 666082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c048282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4208646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 4560 856 5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe 90 PID 856 wrote to memory of 4560 856 5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe 90 PID 856 wrote to memory of 4560 856 5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe 90 PID 4560 wrote to memory of 3088 4560 62260.exe 91 PID 4560 wrote to memory of 3088 4560 62260.exe 91 PID 4560 wrote to memory of 3088 4560 62260.exe 91 PID 3088 wrote to memory of 4352 3088 bnnnbt.exe 92 PID 3088 wrote to memory of 4352 3088 bnnnbt.exe 92 PID 3088 wrote to memory of 4352 3088 bnnnbt.exe 92 PID 4352 wrote to memory of 3576 4352 q40460.exe 93 PID 4352 wrote to memory of 3576 4352 q40460.exe 93 PID 4352 wrote to memory of 3576 4352 q40460.exe 93 PID 3576 wrote to memory of 3804 3576 flfxlfr.exe 94 PID 3576 wrote to memory of 3804 3576 flfxlfr.exe 94 PID 3576 wrote to memory of 3804 3576 flfxlfr.exe 94 PID 3804 wrote to memory of 4408 3804 3xrrlfr.exe 95 PID 3804 wrote to memory of 4408 3804 3xrrlfr.exe 95 PID 3804 wrote to memory of 4408 3804 3xrrlfr.exe 95 PID 4408 wrote to memory of 4064 4408 ppppd.exe 97 PID 4408 wrote to memory of 4064 4408 ppppd.exe 97 PID 4408 wrote to memory of 4064 4408 ppppd.exe 97 PID 4064 wrote to memory of 3768 4064 5llxrlf.exe 98 PID 4064 wrote to memory of 3768 4064 5llxrlf.exe 98 PID 4064 wrote to memory of 3768 4064 5llxrlf.exe 98 PID 3768 wrote to memory of 4616 3768 8604804.exe 99 PID 3768 wrote to memory of 4616 3768 8604804.exe 99 PID 3768 wrote to memory of 4616 3768 8604804.exe 99 PID 4616 wrote to memory of 1472 4616 68048.exe 100 PID 4616 wrote to memory of 1472 4616 68048.exe 100 PID 4616 wrote to memory of 1472 4616 68048.exe 100 PID 1472 wrote to memory of 5016 1472 i408262.exe 101 PID 1472 wrote to memory of 5016 1472 i408262.exe 101 PID 1472 wrote to memory of 5016 1472 i408262.exe 101 PID 5016 wrote to memory of 3640 5016 7bnbnn.exe 102 PID 5016 wrote to memory of 3640 5016 7bnbnn.exe 102 PID 5016 wrote to memory of 3640 5016 7bnbnn.exe 102 PID 3640 wrote to memory of 3076 3640 066460.exe 103 PID 3640 wrote to memory of 3076 3640 066460.exe 103 PID 3640 wrote to memory of 3076 3640 066460.exe 103 PID 3076 wrote to memory of 2892 3076 lxrlxrl.exe 105 PID 3076 wrote to memory of 2892 3076 lxrlxrl.exe 105 PID 3076 wrote to memory of 2892 3076 lxrlxrl.exe 105 PID 2892 wrote to memory of 4224 2892 dvjpj.exe 106 PID 2892 wrote to memory of 4224 2892 dvjpj.exe 106 PID 2892 wrote to memory of 4224 2892 dvjpj.exe 106 PID 4224 wrote to memory of 3684 4224 rxxlfxr.exe 107 PID 4224 wrote to memory of 3684 4224 rxxlfxr.exe 107 PID 4224 wrote to memory of 3684 4224 rxxlfxr.exe 107 PID 3684 wrote to memory of 2044 3684 684086.exe 108 PID 3684 wrote to memory of 2044 3684 684086.exe 108 PID 3684 wrote to memory of 2044 3684 684086.exe 108 PID 2044 wrote to memory of 1564 2044 e26082.exe 109 PID 2044 wrote to memory of 1564 2044 e26082.exe 109 PID 2044 wrote to memory of 1564 2044 e26082.exe 109 PID 1564 wrote to memory of 1716 1564 88486.exe 110 PID 1564 wrote to memory of 1716 1564 88486.exe 110 PID 1564 wrote to memory of 1716 1564 88486.exe 110 PID 1716 wrote to memory of 4456 1716 e88860.exe 111 PID 1716 wrote to memory of 4456 1716 e88860.exe 111 PID 1716 wrote to memory of 4456 1716 e88860.exe 111 PID 4456 wrote to memory of 3540 4456 0886426.exe 112 PID 4456 wrote to memory of 3540 4456 0886426.exe 112 PID 4456 wrote to memory of 3540 4456 0886426.exe 112 PID 3540 wrote to memory of 2496 3540 604860.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe"C:\Users\Admin\AppData\Local\Temp\5091382b77d59ace64b0bf7649c753a43963be014306037104c10ac29414d2f3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\62260.exec:\62260.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\bnnnbt.exec:\bnnnbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\q40460.exec:\q40460.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\flfxlfr.exec:\flfxlfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\3xrrlfr.exec:\3xrrlfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
\??\c:\ppppd.exec:\ppppd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\5llxrlf.exec:\5llxrlf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\8604804.exec:\8604804.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\68048.exec:\68048.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\i408262.exec:\i408262.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\7bnbnn.exec:\7bnbnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\066460.exec:\066460.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\lxrlxrl.exec:\lxrlxrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
\??\c:\dvjpj.exec:\dvjpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\rxxlfxr.exec:\rxxlfxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\684086.exec:\684086.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
\??\c:\e26082.exec:\e26082.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\88486.exec:\88486.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\e88860.exec:\e88860.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\0886426.exec:\0886426.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\604860.exec:\604860.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
\??\c:\1vvjv.exec:\1vvjv.exe23⤵
- Executes dropped EXE
PID:2496 -
\??\c:\7rrlrll.exec:\7rrlrll.exe24⤵
- Executes dropped EXE
PID:1596 -
\??\c:\httnnh.exec:\httnnh.exe25⤵
- Executes dropped EXE
PID:4660 -
\??\c:\tnbtbt.exec:\tnbtbt.exe26⤵
- Executes dropped EXE
PID:4280 -
\??\c:\nbhhhh.exec:\nbhhhh.exe27⤵
- Executes dropped EXE
PID:4172 -
\??\c:\lrlxfxr.exec:\lrlxfxr.exe28⤵
- Executes dropped EXE
PID:2868 -
\??\c:\6448220.exec:\6448220.exe29⤵
- Executes dropped EXE
PID:4656 -
\??\c:\ffffxxf.exec:\ffffxxf.exe30⤵
- Executes dropped EXE
PID:3704 -
\??\c:\o266226.exec:\o266226.exe31⤵
- Executes dropped EXE
PID:4032 -
\??\c:\204082.exec:\204082.exe32⤵
- Executes dropped EXE
PID:4520 -
\??\c:\3nnthb.exec:\3nnthb.exe33⤵
- Executes dropped EXE
PID:2536 -
\??\c:\9jpdv.exec:\9jpdv.exe34⤵
- Executes dropped EXE
PID:1992 -
\??\c:\llrxlxr.exec:\llrxlxr.exe35⤵
- Executes dropped EXE
PID:540 -
\??\c:\nbtbtn.exec:\nbtbtn.exe36⤵
- Executes dropped EXE
PID:4352 -
\??\c:\644426.exec:\644426.exe37⤵
- Executes dropped EXE
PID:1648 -
\??\c:\0400242.exec:\0400242.exe38⤵
- Executes dropped EXE
PID:4592 -
\??\c:\66604.exec:\66604.exe39⤵
- Executes dropped EXE
PID:4408 -
\??\c:\pddjv.exec:\pddjv.exe40⤵
- Executes dropped EXE
PID:4368 -
\??\c:\pdvjj.exec:\pdvjj.exe41⤵
- Executes dropped EXE
PID:4304 -
\??\c:\40648.exec:\40648.exe42⤵
- Executes dropped EXE
PID:1904 -
\??\c:\6400040.exec:\6400040.exe43⤵
- Executes dropped EXE
PID:3872 -
\??\c:\9bnbtn.exec:\9bnbtn.exe44⤵
- Executes dropped EXE
PID:5004 -
\??\c:\208860.exec:\208860.exe45⤵
- Executes dropped EXE
PID:5116 -
\??\c:\rxxrllx.exec:\rxxrllx.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:756 -
\??\c:\tnntnh.exec:\tnntnh.exe47⤵
- Executes dropped EXE
PID:3980 -
\??\c:\066866.exec:\066866.exe48⤵
- Executes dropped EXE
PID:2884 -
\??\c:\m0888.exec:\m0888.exe49⤵
- Executes dropped EXE
PID:2396 -
\??\c:\88864.exec:\88864.exe50⤵
- Executes dropped EXE
PID:4024 -
\??\c:\3ppjv.exec:\3ppjv.exe51⤵
- Executes dropped EXE
PID:2428 -
\??\c:\ffxlxrl.exec:\ffxlxrl.exe52⤵
- Executes dropped EXE
PID:3084 -
\??\c:\s8486.exec:\s8486.exe53⤵
- Executes dropped EXE
PID:1564 -
\??\c:\08482.exec:\08482.exe54⤵
- Executes dropped EXE
PID:3228 -
\??\c:\e44488.exec:\e44488.exe55⤵
- Executes dropped EXE
PID:4664 -
\??\c:\c020084.exec:\c020084.exe56⤵
- Executes dropped EXE
PID:2120 -
\??\c:\64848.exec:\64848.exe57⤵
- Executes dropped EXE
PID:4556 -
\??\c:\nnbnhh.exec:\nnbnhh.exe58⤵
- Executes dropped EXE
PID:4516 -
\??\c:\646042.exec:\646042.exe59⤵
- Executes dropped EXE
PID:1068 -
\??\c:\5hbnbt.exec:\5hbnbt.exe60⤵
- Executes dropped EXE
PID:1580 -
\??\c:\204860.exec:\204860.exe61⤵
- Executes dropped EXE
PID:4632 -
\??\c:\s8264.exec:\s8264.exe62⤵
- Executes dropped EXE
PID:4740 -
\??\c:\nhtntt.exec:\nhtntt.exe63⤵
- Executes dropped EXE
PID:800 -
\??\c:\frlfxrf.exec:\frlfxrf.exe64⤵
- Executes dropped EXE
PID:652 -
\??\c:\060420.exec:\060420.exe65⤵
- Executes dropped EXE
PID:4804 -
\??\c:\644200.exec:\644200.exe66⤵PID:4384
-
\??\c:\4004204.exec:\4004204.exe67⤵PID:3704
-
\??\c:\4448482.exec:\4448482.exe68⤵PID:2272
-
\??\c:\8260448.exec:\8260448.exe69⤵PID:2324
-
\??\c:\04648.exec:\04648.exe70⤵
- System Location Discovery: System Language Discovery
PID:2352 -
\??\c:\frllxll.exec:\frllxll.exe71⤵PID:3088
-
\??\c:\fllxlxr.exec:\fllxlxr.exe72⤵PID:5068
-
\??\c:\thbnnh.exec:\thbnnh.exe73⤵PID:3652
-
\??\c:\hbnthb.exec:\hbnthb.exe74⤵PID:3136
-
\??\c:\thbthb.exec:\thbthb.exe75⤵PID:2860
-
\??\c:\0088266.exec:\0088266.exe76⤵PID:636
-
\??\c:\jvpjv.exec:\jvpjv.exe77⤵PID:764
-
\??\c:\nnnhtn.exec:\nnnhtn.exe78⤵PID:5020
-
\??\c:\u648600.exec:\u648600.exe79⤵PID:4868
-
\??\c:\hnhtnh.exec:\hnhtnh.exe80⤵PID:4272
-
\??\c:\lxfflll.exec:\lxfflll.exe81⤵PID:1988
-
\??\c:\1jdpj.exec:\1jdpj.exe82⤵PID:1724
-
\??\c:\s0482.exec:\s0482.exe83⤵PID:4840
-
\??\c:\602000.exec:\602000.exe84⤵PID:3076
-
\??\c:\2248086.exec:\2248086.exe85⤵PID:3924
-
\??\c:\0282266.exec:\0282266.exe86⤵PID:3600
-
\??\c:\6648264.exec:\6648264.exe87⤵PID:4340
-
\??\c:\rlxxrff.exec:\rlxxrff.exe88⤵PID:3996
-
\??\c:\86204.exec:\86204.exe89⤵PID:4400
-
\??\c:\2026280.exec:\2026280.exe90⤵PID:1716
-
\??\c:\9ffrfxr.exec:\9ffrfxr.exe91⤵
- System Location Discovery: System Language Discovery
PID:1628 -
\??\c:\862806.exec:\862806.exe92⤵PID:3228
-
\??\c:\tbbbnn.exec:\tbbbnn.exe93⤵PID:3540
-
\??\c:\4228682.exec:\4228682.exe94⤵PID:1204
-
\??\c:\828260.exec:\828260.exe95⤵PID:4556
-
\??\c:\0404880.exec:\0404880.exe96⤵PID:4612
-
\??\c:\286228.exec:\286228.exe97⤵PID:1068
-
\??\c:\nnnhbb.exec:\nnnhbb.exe98⤵PID:3552
-
\??\c:\0804444.exec:\0804444.exe99⤵PID:4632
-
\??\c:\rfrlfxx.exec:\rfrlfxx.exe100⤵PID:4740
-
\??\c:\jvvvp.exec:\jvvvp.exe101⤵PID:800
-
\??\c:\6288884.exec:\6288884.exe102⤵PID:4920
-
\??\c:\240448.exec:\240448.exe103⤵PID:4364
-
\??\c:\lrlxfxr.exec:\lrlxfxr.exe104⤵PID:3516
-
\??\c:\thtnbt.exec:\thtnbt.exe105⤵PID:2424
-
\??\c:\00844.exec:\00844.exe106⤵PID:2272
-
\??\c:\hbnnhh.exec:\hbnnhh.exe107⤵PID:2536
-
\??\c:\02822.exec:\02822.exe108⤵PID:4832
-
\??\c:\624062.exec:\624062.exe109⤵PID:540
-
\??\c:\lrllffx.exec:\lrllffx.exe110⤵PID:1620
-
\??\c:\608822.exec:\608822.exe111⤵PID:4884
-
\??\c:\vppjv.exec:\vppjv.exe112⤵PID:3136
-
\??\c:\nnnnhn.exec:\nnnnhn.exe113⤵PID:4408
-
\??\c:\4482222.exec:\4482222.exe114⤵PID:636
-
\??\c:\jppdd.exec:\jppdd.exe115⤵PID:764
-
\??\c:\462666.exec:\462666.exe116⤵PID:2660
-
\??\c:\26440.exec:\26440.exe117⤵PID:4868
-
\??\c:\lrxrflf.exec:\lrxrflf.exe118⤵PID:4272
-
\??\c:\rrxlfrl.exec:\rrxlfrl.exe119⤵PID:1988
-
\??\c:\nhbbtt.exec:\nhbbtt.exe120⤵PID:1724
-
\??\c:\htbbnn.exec:\htbbnn.exe121⤵PID:3480
-
\??\c:\0244220.exec:\0244220.exe122⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-