Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 10:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f43f5d72e2322d16d457edb072823c0N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
General
-
Target
7f43f5d72e2322d16d457edb072823c0N.exe
-
Size
366KB
-
MD5
7f43f5d72e2322d16d457edb072823c0
-
SHA1
830e208c3004fe63e5ffae1bf7f3181c3f260474
-
SHA256
da10c5b6c363461a8373dbe38c2d8313917533d4ad6da5573627894573caa3b4
-
SHA512
672c9fbaf0e26ddc0e8d99290cc15957c9f3a2b4acafd6db7ac72a0ebf863fe90329f39d95d74aefaf9b49fc56555cf46b4962dd2d388a4d9347b94e8434ae76
-
SSDEEP
6144:n3C9BRo7tvnJ9oH0IRgZvjD8296gnzeZhBul:n3C9ytvngQj429nnzeZhBq
Malware Config
Signatures
-
Detect Blackmoon payload 18 IoCs
resource yara_rule behavioral1/memory/2708-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2036-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2988-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1264-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/980-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1980-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/552-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/872-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2844-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2840 nbbhhn.exe 2476 44802.exe 2932 6444068.exe 2768 868400.exe 2620 864022.exe 1940 6060642.exe 2036 0868840.exe 2988 7pjpp.exe 1928 pjvdv.exe 2192 26682.exe 1264 xxrxrlx.exe 980 frxxxxf.exe 2816 4624686.exe 2876 8802402.exe 1980 82224.exe 1820 ffxxrrf.exe 552 a2006.exe 2456 280028.exe 1132 806080.exe 1960 5xxxrrr.exe 2572 26228.exe 1792 60880.exe 2412 04242.exe 2020 6640280.exe 872 nhthtt.exe 2140 btbhtn.exe 1480 828020.exe 2996 vppdj.exe 1680 e04080.exe 2500 666200.exe 2844 jjpvv.exe 1580 480466.exe 2612 48442.exe 2784 q86806.exe 2740 7hhthb.exe 2024 vvpdp.exe 2668 lfxflrf.exe 2620 60808.exe 1316 pvvdj.exe 1312 0462846.exe 2036 w08400.exe 2188 442244.exe 380 5rrrflx.exe 1252 660028.exe 376 fxllrxr.exe 1964 c262408.exe 2672 04284.exe 2872 228424.exe 2816 jddjd.exe 2012 48620.exe 112 s0846.exe 2016 1ppjp.exe 2312 rfffflx.exe 448 i684068.exe 2332 6628482.exe 2284 btnbhb.exe 1072 jdpdp.exe 1752 lflllfr.exe 1536 448640.exe 1528 g0846.exe 1772 3vppp.exe 2020 xrlrxlr.exe 2168 k26246.exe 2248 9frrrrr.exe -
resource yara_rule behavioral1/memory/2708-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1264-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/980-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1980-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/552-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/872-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4446408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tbnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4222024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0824628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8828068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0422406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2840 2708 7f43f5d72e2322d16d457edb072823c0N.exe 31 PID 2708 wrote to memory of 2840 2708 7f43f5d72e2322d16d457edb072823c0N.exe 31 PID 2708 wrote to memory of 2840 2708 7f43f5d72e2322d16d457edb072823c0N.exe 31 PID 2708 wrote to memory of 2840 2708 7f43f5d72e2322d16d457edb072823c0N.exe 31 PID 2840 wrote to memory of 2476 2840 nbbhhn.exe 32 PID 2840 wrote to memory of 2476 2840 nbbhhn.exe 32 PID 2840 wrote to memory of 2476 2840 nbbhhn.exe 32 PID 2840 wrote to memory of 2476 2840 nbbhhn.exe 32 PID 2476 wrote to memory of 2932 2476 44802.exe 33 PID 2476 wrote to memory of 2932 2476 44802.exe 33 PID 2476 wrote to memory of 2932 2476 44802.exe 33 PID 2476 wrote to memory of 2932 2476 44802.exe 33 PID 2932 wrote to memory of 2768 2932 6444068.exe 34 PID 2932 wrote to memory of 2768 2932 6444068.exe 34 PID 2932 wrote to memory of 2768 2932 6444068.exe 34 PID 2932 wrote to memory of 2768 2932 6444068.exe 34 PID 2768 wrote to memory of 2620 2768 868400.exe 35 PID 2768 wrote to memory of 2620 2768 868400.exe 35 PID 2768 wrote to memory of 2620 2768 868400.exe 35 PID 2768 wrote to memory of 2620 2768 868400.exe 35 PID 2620 wrote to memory of 1940 2620 864022.exe 36 PID 2620 wrote to memory of 1940 2620 864022.exe 36 PID 2620 wrote to memory of 1940 2620 864022.exe 36 PID 2620 wrote to memory of 1940 2620 864022.exe 36 PID 1940 wrote to memory of 2036 1940 6060642.exe 37 PID 1940 wrote to memory of 2036 1940 6060642.exe 37 PID 1940 wrote to memory of 2036 1940 6060642.exe 37 PID 1940 wrote to memory of 2036 1940 6060642.exe 37 PID 2036 wrote to memory of 2988 2036 0868840.exe 38 PID 2036 wrote to memory of 2988 2036 0868840.exe 38 PID 2036 wrote to memory of 2988 2036 0868840.exe 38 PID 2036 wrote to memory of 2988 2036 0868840.exe 38 PID 2988 wrote to memory of 1928 2988 7pjpp.exe 39 PID 2988 wrote to memory of 1928 2988 7pjpp.exe 39 PID 2988 wrote to memory of 1928 2988 7pjpp.exe 39 PID 2988 wrote to memory of 1928 2988 7pjpp.exe 39 PID 1928 wrote to memory of 2192 1928 pjvdv.exe 40 PID 1928 wrote to memory of 2192 1928 pjvdv.exe 40 PID 1928 wrote to memory of 2192 1928 pjvdv.exe 40 PID 1928 wrote to memory of 2192 1928 pjvdv.exe 40 PID 2192 wrote to memory of 1264 2192 26682.exe 41 PID 2192 wrote to memory of 1264 2192 26682.exe 41 PID 2192 wrote to memory of 1264 2192 26682.exe 41 PID 2192 wrote to memory of 1264 2192 26682.exe 41 PID 1264 wrote to memory of 980 1264 xxrxrlx.exe 42 PID 1264 wrote to memory of 980 1264 xxrxrlx.exe 42 PID 1264 wrote to memory of 980 1264 xxrxrlx.exe 42 PID 1264 wrote to memory of 980 1264 xxrxrlx.exe 42 PID 980 wrote to memory of 2816 980 frxxxxf.exe 43 PID 980 wrote to memory of 2816 980 frxxxxf.exe 43 PID 980 wrote to memory of 2816 980 frxxxxf.exe 43 PID 980 wrote to memory of 2816 980 frxxxxf.exe 43 PID 2816 wrote to memory of 2876 2816 4624686.exe 44 PID 2816 wrote to memory of 2876 2816 4624686.exe 44 PID 2816 wrote to memory of 2876 2816 4624686.exe 44 PID 2816 wrote to memory of 2876 2816 4624686.exe 44 PID 2876 wrote to memory of 1980 2876 8802402.exe 45 PID 2876 wrote to memory of 1980 2876 8802402.exe 45 PID 2876 wrote to memory of 1980 2876 8802402.exe 45 PID 2876 wrote to memory of 1980 2876 8802402.exe 45 PID 1980 wrote to memory of 1820 1980 82224.exe 46 PID 1980 wrote to memory of 1820 1980 82224.exe 46 PID 1980 wrote to memory of 1820 1980 82224.exe 46 PID 1980 wrote to memory of 1820 1980 82224.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f43f5d72e2322d16d457edb072823c0N.exe"C:\Users\Admin\AppData\Local\Temp\7f43f5d72e2322d16d457edb072823c0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\nbbhhn.exec:\nbbhhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\44802.exec:\44802.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\6444068.exec:\6444068.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\868400.exec:\868400.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\864022.exec:\864022.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\6060642.exec:\6060642.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\0868840.exec:\0868840.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\7pjpp.exec:\7pjpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\pjvdv.exec:\pjvdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\26682.exec:\26682.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\xxrxrlx.exec:\xxrxrlx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\frxxxxf.exec:\frxxxxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\4624686.exec:\4624686.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\8802402.exec:\8802402.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\82224.exec:\82224.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\ffxxrrf.exec:\ffxxrrf.exe17⤵
- Executes dropped EXE
PID:1820 -
\??\c:\a2006.exec:\a2006.exe18⤵
- Executes dropped EXE
PID:552 -
\??\c:\280028.exec:\280028.exe19⤵
- Executes dropped EXE
PID:2456 -
\??\c:\806080.exec:\806080.exe20⤵
- Executes dropped EXE
PID:1132 -
\??\c:\5xxxrrr.exec:\5xxxrrr.exe21⤵
- Executes dropped EXE
PID:1960 -
\??\c:\26228.exec:\26228.exe22⤵
- Executes dropped EXE
PID:2572 -
\??\c:\60880.exec:\60880.exe23⤵
- Executes dropped EXE
PID:1792 -
\??\c:\04242.exec:\04242.exe24⤵
- Executes dropped EXE
PID:2412 -
\??\c:\6640280.exec:\6640280.exe25⤵
- Executes dropped EXE
PID:2020 -
\??\c:\nhthtt.exec:\nhthtt.exe26⤵
- Executes dropped EXE
PID:872 -
\??\c:\btbhtn.exec:\btbhtn.exe27⤵
- Executes dropped EXE
PID:2140 -
\??\c:\828020.exec:\828020.exe28⤵
- Executes dropped EXE
PID:1480 -
\??\c:\vppdj.exec:\vppdj.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2996 -
\??\c:\e04080.exec:\e04080.exe30⤵
- Executes dropped EXE
PID:1680 -
\??\c:\666200.exec:\666200.exe31⤵
- Executes dropped EXE
PID:2500 -
\??\c:\jjpvv.exec:\jjpvv.exe32⤵
- Executes dropped EXE
PID:2844 -
\??\c:\480466.exec:\480466.exe33⤵
- Executes dropped EXE
PID:1580 -
\??\c:\48442.exec:\48442.exe34⤵
- Executes dropped EXE
PID:2612 -
\??\c:\q86806.exec:\q86806.exe35⤵
- Executes dropped EXE
PID:2784 -
\??\c:\7hhthb.exec:\7hhthb.exe36⤵
- Executes dropped EXE
PID:2740 -
\??\c:\vvpdp.exec:\vvpdp.exe37⤵
- Executes dropped EXE
PID:2024 -
\??\c:\lfxflrf.exec:\lfxflrf.exe38⤵
- Executes dropped EXE
PID:2668 -
\??\c:\60808.exec:\60808.exe39⤵
- Executes dropped EXE
PID:2620 -
\??\c:\pvvdj.exec:\pvvdj.exe40⤵
- Executes dropped EXE
PID:1316 -
\??\c:\0462846.exec:\0462846.exe41⤵
- Executes dropped EXE
PID:1312 -
\??\c:\w08400.exec:\w08400.exe42⤵
- Executes dropped EXE
PID:2036 -
\??\c:\442244.exec:\442244.exe43⤵
- Executes dropped EXE
PID:2188 -
\??\c:\5rrrflx.exec:\5rrrflx.exe44⤵
- Executes dropped EXE
PID:380 -
\??\c:\660028.exec:\660028.exe45⤵
- Executes dropped EXE
PID:1252 -
\??\c:\fxllrxr.exec:\fxllrxr.exe46⤵
- Executes dropped EXE
PID:376 -
\??\c:\c262408.exec:\c262408.exe47⤵
- Executes dropped EXE
PID:1964 -
\??\c:\04284.exec:\04284.exe48⤵
- Executes dropped EXE
PID:2672 -
\??\c:\228424.exec:\228424.exe49⤵
- Executes dropped EXE
PID:2872 -
\??\c:\jddjd.exec:\jddjd.exe50⤵
- Executes dropped EXE
PID:2816 -
\??\c:\48620.exec:\48620.exe51⤵
- Executes dropped EXE
PID:2012 -
\??\c:\s0846.exec:\s0846.exe52⤵
- Executes dropped EXE
PID:112 -
\??\c:\1ppjp.exec:\1ppjp.exe53⤵
- Executes dropped EXE
PID:2016 -
\??\c:\rfffflx.exec:\rfffflx.exe54⤵
- Executes dropped EXE
PID:2312 -
\??\c:\i684068.exec:\i684068.exe55⤵
- Executes dropped EXE
PID:448 -
\??\c:\6628482.exec:\6628482.exe56⤵
- Executes dropped EXE
PID:2332 -
\??\c:\btnbhb.exec:\btnbhb.exe57⤵
- Executes dropped EXE
PID:2284 -
\??\c:\jdpdp.exec:\jdpdp.exe58⤵
- Executes dropped EXE
PID:1072 -
\??\c:\lflllfr.exec:\lflllfr.exe59⤵
- Executes dropped EXE
PID:1752 -
\??\c:\448640.exec:\448640.exe60⤵
- Executes dropped EXE
PID:1536 -
\??\c:\g0846.exec:\g0846.exe61⤵
- Executes dropped EXE
PID:1528 -
\??\c:\3vppp.exec:\3vppp.exe62⤵
- Executes dropped EXE
PID:1772 -
\??\c:\xrlrxlr.exec:\xrlrxlr.exe63⤵
- Executes dropped EXE
PID:2020 -
\??\c:\k26246.exec:\k26246.exe64⤵
- Executes dropped EXE
PID:2168 -
\??\c:\9frrrrr.exec:\9frrrrr.exe65⤵
- Executes dropped EXE
PID:2248 -
\??\c:\i608402.exec:\i608402.exe66⤵PID:852
-
\??\c:\dddpv.exec:\dddpv.exe67⤵PID:1480
-
\??\c:\w86624.exec:\w86624.exe68⤵PID:1324
-
\??\c:\64880.exec:\64880.exe69⤵PID:2400
-
\??\c:\nnnbnt.exec:\nnnbnt.exe70⤵PID:2708
-
\??\c:\86468.exec:\86468.exe71⤵PID:2904
-
\??\c:\80026.exec:\80026.exe72⤵PID:2728
-
\??\c:\48684.exec:\48684.exe73⤵
- System Location Discovery: System Language Discovery
PID:2756 -
\??\c:\4824662.exec:\4824662.exe74⤵PID:2612
-
\??\c:\608406.exec:\608406.exe75⤵PID:2632
-
\??\c:\lrrfxlx.exec:\lrrfxlx.exe76⤵PID:2776
-
\??\c:\jjvvj.exec:\jjvvj.exe77⤵PID:2616
-
\??\c:\fxrfxff.exec:\fxrfxff.exe78⤵PID:2676
-
\??\c:\66446.exec:\66446.exe79⤵PID:2620
-
\??\c:\264644.exec:\264644.exe80⤵PID:1148
-
\??\c:\042400.exec:\042400.exe81⤵PID:1312
-
\??\c:\xrffxlx.exec:\xrffxlx.exe82⤵PID:2644
-
\??\c:\4824046.exec:\4824046.exe83⤵PID:2108
-
\??\c:\6024062.exec:\6024062.exe84⤵PID:1604
-
\??\c:\608068.exec:\608068.exe85⤵PID:1532
-
\??\c:\8828068.exec:\8828068.exe86⤵
- System Location Discovery: System Language Discovery
PID:1572 -
\??\c:\004024.exec:\004024.exe87⤵PID:1964
-
\??\c:\pjdvj.exec:\pjdvj.exe88⤵PID:2828
-
\??\c:\3dpvj.exec:\3dpvj.exe89⤵PID:2880
-
\??\c:\jpjvj.exec:\jpjvj.exe90⤵PID:2816
-
\??\c:\7hthhb.exec:\7hthhb.exe91⤵PID:484
-
\??\c:\llrfxlx.exec:\llrfxlx.exe92⤵PID:536
-
\??\c:\7lxfxff.exec:\7lxfxff.exe93⤵PID:2016
-
\??\c:\bthhtn.exec:\bthhtn.exe94⤵PID:2532
-
\??\c:\hhtbhn.exec:\hhtbhn.exe95⤵PID:1956
-
\??\c:\7lfllrx.exec:\7lfllrx.exe96⤵PID:2352
-
\??\c:\0862024.exec:\0862024.exe97⤵PID:2232
-
\??\c:\vjpjj.exec:\vjpjj.exe98⤵PID:1704
-
\??\c:\k86628.exec:\k86628.exe99⤵PID:924
-
\??\c:\5jvdd.exec:\5jvdd.exe100⤵PID:1816
-
\??\c:\3rffllr.exec:\3rffllr.exe101⤵PID:1644
-
\??\c:\7djpd.exec:\7djpd.exe102⤵PID:2412
-
\??\c:\82668.exec:\82668.exe103⤵PID:2008
-
\??\c:\lxlllxf.exec:\lxlllxf.exe104⤵PID:2320
-
\??\c:\pdjjj.exec:\pdjjj.exe105⤵PID:680
-
\??\c:\o206688.exec:\o206688.exe106⤵PID:2560
-
\??\c:\3jvdd.exec:\3jvdd.exe107⤵PID:3048
-
\??\c:\rflxflx.exec:\rflxflx.exe108⤵PID:1324
-
\??\c:\jdpvd.exec:\jdpvd.exe109⤵PID:2400
-
\??\c:\7rxrrlx.exec:\7rxrrlx.exe110⤵PID:2840
-
\??\c:\pjvjp.exec:\pjvjp.exe111⤵PID:1588
-
\??\c:\o842280.exec:\o842280.exe112⤵PID:3008
-
\??\c:\ffxflxx.exec:\ffxflxx.exe113⤵PID:1920
-
\??\c:\dvjdp.exec:\dvjdp.exe114⤵PID:1916
-
\??\c:\s0022.exec:\s0022.exe115⤵PID:2636
-
\??\c:\q62228.exec:\q62228.exe116⤵PID:2776
-
\??\c:\o244042.exec:\o244042.exe117⤵PID:2660
-
\??\c:\8202402.exec:\8202402.exe118⤵PID:2668
-
\??\c:\pppvd.exec:\pppvd.exe119⤵PID:2892
-
\??\c:\486242.exec:\486242.exe120⤵PID:1316
-
\??\c:\48424.exec:\48424.exe121⤵PID:2992
-
\??\c:\xxllffl.exec:\xxllffl.exe122⤵PID:2656
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-