Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe
Resource
win7-20241023-en
General
-
Target
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe
-
Size
88KB
-
MD5
3ba83c9a96a914bb6030d2b7f50a6e00
-
SHA1
4f60f6cfaa9edaecaeb89c64d9e436fc51b07526
-
SHA256
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54
-
SHA512
294a924bedbac134017992666f3da414fe7dfcf1d09200df55bdcc9126691a6933d4481f8009ff4ba6c6acd5531b92dca2edca4fdaf5a232d42afe1aef51cd92
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAXPfgr2hKmdbcPi2vhdWl:ymb3NkkiQ3mdBjFo6Pfgy3dbc/hdWl
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2092-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1920-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2844-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2776-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1144-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1084-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1312-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1720-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1368-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1500-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/984-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bnbn04.exeo468680.exe2289lfx.exepdddp.exe6428480.exe608024.exe842640.exe464240.exexrrxxfx.exe0006020.exe8840886.exe864062.exexflxxlr.exe5tbthb.exe864066.exevpdjp.exe224060.exehtbnbn.exe5pddp.exe5lxrrxf.exebnbbbt.exenhnttb.exe7xxlxfr.exe1vpjp.exe1rxlxfr.exe420008.exe86662.exew84288.exebnhtbh.exehhtthh.exe4286044.exe2404402.exe480628.exe9xxfxll.exe7pjpp.exe604204.exeo480224.exe80282.exeg2062.exeq86406.exepjpjv.exe486884.exe7pjjp.exe860284.exem8664.exe2224460.exe3frxrlx.exe6624246.exe042084.exe60846.exe2640884.exe7jjdj.exe7dpdp.exe20840.exevjdpp.exefrrllxf.exe00222.exebnthtn.exepdppv.exedvjjj.exe1bbthb.exedvvjj.exelrffllr.exe28080.exepid Process 2284 bnbn04.exe 1920 o468680.exe 2888 2289lfx.exe 592 pdddp.exe 2844 6428480.exe 2776 608024.exe 2928 842640.exe 2788 464240.exe 2660 xrrxxfx.exe 2328 0006020.exe 1032 8840886.exe 1952 864062.exe 2460 xflxxlr.exe 1716 5tbthb.exe 1452 864066.exe 1144 vpdjp.exe 1764 224060.exe 2636 htbnbn.exe 2116 5pddp.exe 1084 5lxrrxf.exe 2180 bnbbbt.exe 1080 nhnttb.exe 1312 7xxlxfr.exe 1720 1vpjp.exe 1368 1rxlxfr.exe 884 420008.exe 2068 86662.exe 1500 w84288.exe 2444 bnhtbh.exe 984 hhtthh.exe 756 4286044.exe 1612 2404402.exe 2284 480628.exe 468 9xxfxll.exe 2376 7pjpp.exe 3068 604204.exe 2780 o480224.exe 2756 80282.exe 2784 g2062.exe 2428 q86406.exe 2672 pjpjv.exe 2824 486884.exe 2764 7pjjp.exe 2680 860284.exe 2648 m8664.exe 2136 2224460.exe 1644 3frxrlx.exe 796 6624246.exe 1980 042084.exe 1696 60846.exe 2012 2640884.exe 288 7jjdj.exe 2716 7dpdp.exe 1788 20840.exe 2556 vjdpp.exe 2980 frrllxf.exe 444 00222.exe 2244 bnthtn.exe 1344 pdppv.exe 1640 dvjjj.exe 1080 1bbthb.exe 864 dvvjj.exe 1704 lrffllr.exe 656 28080.exe -
Processes:
resource yara_rule behavioral1/memory/2092-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1144-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1084-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1312-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1720-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1368-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1500-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/984-299-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7lflfrr.exedvvvv.exe4206402.exe602400.exedvpvj.exe1htnbn.exe5xrfxxr.exe5ttbth.exefrrflxf.exe5lrrxxx.exe06860.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lflfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4206402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 602400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1htnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xrfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ttbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lrrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exebnbn04.exeo468680.exe2289lfx.exepdddp.exe6428480.exe608024.exe842640.exe464240.exexrrxxfx.exe0006020.exe8840886.exe864062.exexflxxlr.exe5tbthb.exe864066.exedescription pid Process procid_target PID 2092 wrote to memory of 2284 2092 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 30 PID 2092 wrote to memory of 2284 2092 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 30 PID 2092 wrote to memory of 2284 2092 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 30 PID 2092 wrote to memory of 2284 2092 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 30 PID 2284 wrote to memory of 1920 2284 bnbn04.exe 31 PID 2284 wrote to memory of 1920 2284 bnbn04.exe 31 PID 2284 wrote to memory of 1920 2284 bnbn04.exe 31 PID 2284 wrote to memory of 1920 2284 bnbn04.exe 31 PID 1920 wrote to memory of 2888 1920 o468680.exe 32 PID 1920 wrote to memory of 2888 1920 o468680.exe 32 PID 1920 wrote to memory of 2888 1920 o468680.exe 32 PID 1920 wrote to memory of 2888 1920 o468680.exe 32 PID 2888 wrote to memory of 592 2888 2289lfx.exe 33 PID 2888 wrote to memory of 592 2888 2289lfx.exe 33 PID 2888 wrote to memory of 592 2888 2289lfx.exe 33 PID 2888 wrote to memory of 592 2888 2289lfx.exe 33 PID 592 wrote to memory of 2844 592 pdddp.exe 34 PID 592 wrote to memory of 2844 592 pdddp.exe 34 PID 592 wrote to memory of 2844 592 pdddp.exe 34 PID 592 wrote to memory of 2844 592 pdddp.exe 34 PID 2844 wrote to memory of 2776 2844 6428480.exe 35 PID 2844 wrote to memory of 2776 2844 6428480.exe 35 PID 2844 wrote to memory of 2776 2844 6428480.exe 35 PID 2844 wrote to memory of 2776 2844 6428480.exe 35 PID 2776 wrote to memory of 2928 2776 608024.exe 36 PID 2776 wrote to memory of 2928 2776 608024.exe 36 PID 2776 wrote to memory of 2928 2776 608024.exe 36 PID 2776 wrote to memory of 2928 2776 608024.exe 36 PID 2928 wrote to memory of 2788 2928 842640.exe 37 PID 2928 wrote to memory of 2788 2928 842640.exe 37 PID 2928 wrote to memory of 2788 2928 842640.exe 37 PID 2928 wrote to memory of 2788 2928 842640.exe 37 PID 2788 wrote to memory of 2660 2788 464240.exe 38 PID 2788 wrote to memory of 2660 2788 464240.exe 38 PID 2788 wrote to memory of 2660 2788 464240.exe 38 PID 2788 wrote to memory of 2660 2788 464240.exe 38 PID 2660 wrote to memory of 2328 2660 xrrxxfx.exe 39 PID 2660 wrote to memory of 2328 2660 xrrxxfx.exe 39 PID 2660 wrote to memory of 2328 2660 xrrxxfx.exe 39 PID 2660 wrote to memory of 2328 2660 xrrxxfx.exe 39 PID 2328 wrote to memory of 1032 2328 0006020.exe 40 PID 2328 wrote to memory of 1032 2328 0006020.exe 40 PID 2328 wrote to memory of 1032 2328 0006020.exe 40 PID 2328 wrote to memory of 1032 2328 0006020.exe 40 PID 1032 wrote to memory of 1952 1032 8840886.exe 41 PID 1032 wrote to memory of 1952 1032 8840886.exe 41 PID 1032 wrote to memory of 1952 1032 8840886.exe 41 PID 1032 wrote to memory of 1952 1032 8840886.exe 41 PID 1952 wrote to memory of 2460 1952 864062.exe 42 PID 1952 wrote to memory of 2460 1952 864062.exe 42 PID 1952 wrote to memory of 2460 1952 864062.exe 42 PID 1952 wrote to memory of 2460 1952 864062.exe 42 PID 2460 wrote to memory of 1716 2460 xflxxlr.exe 43 PID 2460 wrote to memory of 1716 2460 xflxxlr.exe 43 PID 2460 wrote to memory of 1716 2460 xflxxlr.exe 43 PID 2460 wrote to memory of 1716 2460 xflxxlr.exe 43 PID 1716 wrote to memory of 1452 1716 5tbthb.exe 44 PID 1716 wrote to memory of 1452 1716 5tbthb.exe 44 PID 1716 wrote to memory of 1452 1716 5tbthb.exe 44 PID 1716 wrote to memory of 1452 1716 5tbthb.exe 44 PID 1452 wrote to memory of 1144 1452 864066.exe 45 PID 1452 wrote to memory of 1144 1452 864066.exe 45 PID 1452 wrote to memory of 1144 1452 864066.exe 45 PID 1452 wrote to memory of 1144 1452 864066.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe"C:\Users\Admin\AppData\Local\Temp\7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\bnbn04.exec:\bnbn04.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\o468680.exec:\o468680.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\2289lfx.exec:\2289lfx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\pdddp.exec:\pdddp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\6428480.exec:\6428480.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\608024.exec:\608024.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\842640.exec:\842640.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\464240.exec:\464240.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\xrrxxfx.exec:\xrrxxfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\0006020.exec:\0006020.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\8840886.exec:\8840886.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\864062.exec:\864062.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\xflxxlr.exec:\xflxxlr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\5tbthb.exec:\5tbthb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\864066.exec:\864066.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\vpdjp.exec:\vpdjp.exe17⤵
- Executes dropped EXE
PID:1144 -
\??\c:\224060.exec:\224060.exe18⤵
- Executes dropped EXE
PID:1764 -
\??\c:\htbnbn.exec:\htbnbn.exe19⤵
- Executes dropped EXE
PID:2636 -
\??\c:\5pddp.exec:\5pddp.exe20⤵
- Executes dropped EXE
PID:2116 -
\??\c:\5lxrrxf.exec:\5lxrrxf.exe21⤵
- Executes dropped EXE
PID:1084 -
\??\c:\bnbbbt.exec:\bnbbbt.exe22⤵
- Executes dropped EXE
PID:2180 -
\??\c:\nhnttb.exec:\nhnttb.exe23⤵
- Executes dropped EXE
PID:1080 -
\??\c:\7xxlxfr.exec:\7xxlxfr.exe24⤵
- Executes dropped EXE
PID:1312 -
\??\c:\1vpjp.exec:\1vpjp.exe25⤵
- Executes dropped EXE
PID:1720 -
\??\c:\1rxlxfr.exec:\1rxlxfr.exe26⤵
- Executes dropped EXE
PID:1368 -
\??\c:\420008.exec:\420008.exe27⤵
- Executes dropped EXE
PID:884 -
\??\c:\86662.exec:\86662.exe28⤵
- Executes dropped EXE
PID:2068 -
\??\c:\w84288.exec:\w84288.exe29⤵
- Executes dropped EXE
PID:1500 -
\??\c:\bnhtbh.exec:\bnhtbh.exe30⤵
- Executes dropped EXE
PID:2444 -
\??\c:\hhtthh.exec:\hhtthh.exe31⤵
- Executes dropped EXE
PID:984 -
\??\c:\4286044.exec:\4286044.exe32⤵
- Executes dropped EXE
PID:756 -
\??\c:\2404402.exec:\2404402.exe33⤵
- Executes dropped EXE
PID:1612 -
\??\c:\480628.exec:\480628.exe34⤵
- Executes dropped EXE
PID:2284 -
\??\c:\9xxfxll.exec:\9xxfxll.exe35⤵
- Executes dropped EXE
PID:468 -
\??\c:\7pjpp.exec:\7pjpp.exe36⤵
- Executes dropped EXE
PID:2376 -
\??\c:\604204.exec:\604204.exe37⤵
- Executes dropped EXE
PID:3068 -
\??\c:\o480224.exec:\o480224.exe38⤵
- Executes dropped EXE
PID:2780 -
\??\c:\80282.exec:\80282.exe39⤵
- Executes dropped EXE
PID:2756 -
\??\c:\g2062.exec:\g2062.exe40⤵
- Executes dropped EXE
PID:2784 -
\??\c:\q86406.exec:\q86406.exe41⤵
- Executes dropped EXE
PID:2428 -
\??\c:\pjpjv.exec:\pjpjv.exe42⤵
- Executes dropped EXE
PID:2672 -
\??\c:\486884.exec:\486884.exe43⤵
- Executes dropped EXE
PID:2824 -
\??\c:\7pjjp.exec:\7pjjp.exe44⤵
- Executes dropped EXE
PID:2764 -
\??\c:\860284.exec:\860284.exe45⤵
- Executes dropped EXE
PID:2680 -
\??\c:\m8664.exec:\m8664.exe46⤵
- Executes dropped EXE
PID:2648 -
\??\c:\2224460.exec:\2224460.exe47⤵
- Executes dropped EXE
PID:2136 -
\??\c:\3frxrlx.exec:\3frxrlx.exe48⤵
- Executes dropped EXE
PID:1644 -
\??\c:\6624246.exec:\6624246.exe49⤵
- Executes dropped EXE
PID:796 -
\??\c:\042084.exec:\042084.exe50⤵
- Executes dropped EXE
PID:1980 -
\??\c:\60846.exec:\60846.exe51⤵
- Executes dropped EXE
PID:1696 -
\??\c:\2640884.exec:\2640884.exe52⤵
- Executes dropped EXE
PID:2012 -
\??\c:\7jjdj.exec:\7jjdj.exe53⤵
- Executes dropped EXE
PID:288 -
\??\c:\7dpdp.exec:\7dpdp.exe54⤵
- Executes dropped EXE
PID:2716 -
\??\c:\20840.exec:\20840.exe55⤵
- Executes dropped EXE
PID:1788 -
\??\c:\vjdpp.exec:\vjdpp.exe56⤵
- Executes dropped EXE
PID:2556 -
\??\c:\frrllxf.exec:\frrllxf.exe57⤵
- Executes dropped EXE
PID:2980 -
\??\c:\00222.exec:\00222.exe58⤵
- Executes dropped EXE
PID:444 -
\??\c:\bnthtn.exec:\bnthtn.exe59⤵
- Executes dropped EXE
PID:2244 -
\??\c:\pdppv.exec:\pdppv.exe60⤵
- Executes dropped EXE
PID:1344 -
\??\c:\dvjjj.exec:\dvjjj.exe61⤵
- Executes dropped EXE
PID:1640 -
\??\c:\1bbthb.exec:\1bbthb.exe62⤵
- Executes dropped EXE
PID:1080 -
\??\c:\dvvjj.exec:\dvvjj.exe63⤵
- Executes dropped EXE
PID:864 -
\??\c:\lrffllr.exec:\lrffllr.exe64⤵
- Executes dropped EXE
PID:1704 -
\??\c:\28080.exec:\28080.exe65⤵
- Executes dropped EXE
PID:656 -
\??\c:\06424.exec:\06424.exe66⤵PID:3020
-
\??\c:\664022.exec:\664022.exe67⤵PID:2072
-
\??\c:\u060280.exec:\u060280.exe68⤵PID:2068
-
\??\c:\xrfrlrf.exec:\xrfrlrf.exe69⤵PID:2312
-
\??\c:\5vvdj.exec:\5vvdj.exe70⤵PID:1520
-
\??\c:\fxrrlrf.exec:\fxrrlrf.exe71⤵PID:2140
-
\??\c:\dvdpv.exec:\dvdpv.exe72⤵PID:1584
-
\??\c:\6048884.exec:\6048884.exe73⤵PID:2032
-
\??\c:\8248800.exec:\8248800.exe74⤵PID:2580
-
\??\c:\fxxlxrx.exec:\fxxlxrx.exe75⤵PID:2584
-
\??\c:\864640.exec:\864640.exe76⤵PID:2512
-
\??\c:\6860862.exec:\6860862.exe77⤵PID:2520
-
\??\c:\0004866.exec:\0004866.exe78⤵PID:2760
-
\??\c:\djpvd.exec:\djpvd.exe79⤵PID:2860
-
\??\c:\rfrflfl.exec:\rfrflfl.exe80⤵PID:2844
-
\??\c:\6022846.exec:\6022846.exe81⤵PID:2912
-
\??\c:\ffxrlrx.exec:\ffxrlrx.exe82⤵PID:2676
-
\??\c:\hbnnbh.exec:\hbnnbh.exe83⤵PID:2920
-
\??\c:\82686.exec:\82686.exe84⤵PID:2276
-
\??\c:\48662.exec:\48662.exe85⤵PID:2724
-
\??\c:\420200.exec:\420200.exe86⤵PID:2704
-
\??\c:\bhbhht.exec:\bhbhht.exe87⤵PID:1040
-
\??\c:\26464.exec:\26464.exe88⤵PID:1304
-
\??\c:\pdjjj.exec:\pdjjj.exe89⤵PID:1816
-
\??\c:\82400.exec:\82400.exe90⤵PID:2548
-
\??\c:\266848.exec:\266848.exe91⤵PID:380
-
\??\c:\jvjjp.exec:\jvjjp.exe92⤵PID:1716
-
\??\c:\ddppd.exec:\ddppd.exe93⤵PID:2304
-
\??\c:\frfrxrf.exec:\frfrxrf.exe94⤵PID:1972
-
\??\c:\4822802.exec:\4822802.exe95⤵PID:2932
-
\??\c:\jjdjd.exec:\jjdjd.exe96⤵PID:1848
-
\??\c:\9vpvd.exec:\9vpvd.exe97⤵PID:1360
-
\??\c:\ppppp.exec:\ppppp.exe98⤵PID:632
-
\??\c:\pddjp.exec:\pddjp.exe99⤵PID:1412
-
\??\c:\26668.exec:\26668.exe100⤵PID:1188
-
\??\c:\ffrflll.exec:\ffrflll.exe101⤵PID:2624
-
\??\c:\dpvdp.exec:\dpvdp.exe102⤵PID:1724
-
\??\c:\5nhhbb.exec:\5nhhbb.exe103⤵PID:3016
-
\??\c:\86480.exec:\86480.exe104⤵PID:1556
-
\??\c:\208606.exec:\208606.exe105⤵PID:1804
-
\??\c:\1pdvd.exec:\1pdvd.exe106⤵PID:948
-
\??\c:\5llxfff.exec:\5llxfff.exe107⤵PID:1048
-
\??\c:\vjpvd.exec:\vjpvd.exe108⤵PID:3032
-
\??\c:\8022222.exec:\8022222.exe109⤵PID:1532
-
\??\c:\vppjj.exec:\vppjj.exe110⤵PID:872
-
\??\c:\lxllxfl.exec:\lxllxfl.exe111⤵PID:2300
-
\??\c:\6086428.exec:\6086428.exe112⤵PID:2732
-
\??\c:\042406.exec:\042406.exe113⤵PID:1604
-
\??\c:\648866.exec:\648866.exe114⤵PID:2560
-
\??\c:\5lrrxxx.exec:\5lrrxxx.exe115⤵
- System Location Discovery: System Language Discovery
PID:1864 -
\??\c:\jdvjv.exec:\jdvjv.exe116⤵PID:2496
-
\??\c:\o800062.exec:\o800062.exe117⤵PID:1156
-
\??\c:\xrlrlxr.exec:\xrlrlxr.exe118⤵PID:2892
-
\??\c:\82068.exec:\82068.exe119⤵PID:2880
-
\??\c:\bhhnhb.exec:\bhhnhb.exe120⤵PID:2852
-
\??\c:\vpvjv.exec:\vpvjv.exe121⤵PID:2808
-
\??\c:\nnnhnb.exec:\nnnhnb.exe122⤵PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-