Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe
Resource
win7-20241010-en
General
-
Target
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe
-
Size
91KB
-
MD5
6af719a5edf29e38892683f1a4bd57f0
-
SHA1
43088ca57e32503dedc3819c04ccea38ae096628
-
SHA256
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8
-
SHA512
fa8175bd8d1e8ff76879daee88c59f5ab1fe962f31d4c729e4a7e66eda997e8993f731dd2ac28c6c9daf6d43606fd96bae6a3e2a11499c37b2f3a46368577a18
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iJvRirE0DmmdL2jqWkBc:ymb3NkkiQ3mdBjF+3TU2iBRioSumWS1a
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/1996-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2160-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1936-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2492-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1452-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/944-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1628-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2044-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1004-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/596-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1652-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2548 ddvpd.exe 2160 i422400.exe 2796 hbntnb.exe 2560 w24600.exe 2856 66024.exe 2404 8280840.exe 2880 60246.exe 2972 222600.exe 1936 4826682.exe 2492 tnhtbb.exe 1452 7ppvv.exe 2332 60686.exe 2992 820266.exe 3016 82068.exe 2192 q60602.exe 944 8660440.exe 1628 608624.exe 2600 xrflrxl.exe 2612 ddpdp.exe 2044 5bthtb.exe 2636 82004.exe 1004 k68406.exe 596 1ddpp.exe 1236 3hntbn.exe 2632 ttbbtt.exe 1716 rlxfxxl.exe 2020 rrlrllx.exe 1656 8240622.exe 1652 jdddd.exe 2120 xflrfrx.exe 2572 0848888.exe 1964 a8068.exe 2796 fxlrlff.exe 1948 nnhntb.exe 2844 8688822.exe 2828 ttthbn.exe 2952 20262.exe 1568 rlxrxff.exe 2404 686226.exe 2752 4644228.exe 2728 w68444.exe 2748 jddjj.exe 604 7pjjd.exe 2656 020622.exe 588 824028.exe 2492 86800.exe 3020 hthnbh.exe 1696 nhtnhb.exe 3028 w24444.exe 3024 rlxxlrf.exe 2328 vvvdj.exe 1044 6462266.exe 1028 7jjdd.exe 2524 hbtbbh.exe 2080 42406.exe 2620 484066.exe 844 42240.exe 1828 1fxfrxl.exe 2388 8028484.exe 1004 btbbhh.exe 964 0042206.exe 2152 nhhnbn.exe 2532 pvdvp.exe 2632 vddjd.exe -
resource yara_rule behavioral1/memory/1996-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2160-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1936-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1452-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/944-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2044-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1004-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/596-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1652-282-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hbntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9htbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2208408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhtnb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2548 1996 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe 30 PID 1996 wrote to memory of 2548 1996 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe 30 PID 1996 wrote to memory of 2548 1996 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe 30 PID 1996 wrote to memory of 2548 1996 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe 30 PID 2548 wrote to memory of 2160 2548 ddvpd.exe 31 PID 2548 wrote to memory of 2160 2548 ddvpd.exe 31 PID 2548 wrote to memory of 2160 2548 ddvpd.exe 31 PID 2548 wrote to memory of 2160 2548 ddvpd.exe 31 PID 2160 wrote to memory of 2796 2160 i422400.exe 32 PID 2160 wrote to memory of 2796 2160 i422400.exe 32 PID 2160 wrote to memory of 2796 2160 i422400.exe 32 PID 2160 wrote to memory of 2796 2160 i422400.exe 32 PID 2796 wrote to memory of 2560 2796 hbntnb.exe 33 PID 2796 wrote to memory of 2560 2796 hbntnb.exe 33 PID 2796 wrote to memory of 2560 2796 hbntnb.exe 33 PID 2796 wrote to memory of 2560 2796 hbntnb.exe 33 PID 2560 wrote to memory of 2856 2560 w24600.exe 34 PID 2560 wrote to memory of 2856 2560 w24600.exe 34 PID 2560 wrote to memory of 2856 2560 w24600.exe 34 PID 2560 wrote to memory of 2856 2560 w24600.exe 34 PID 2856 wrote to memory of 2404 2856 66024.exe 35 PID 2856 wrote to memory of 2404 2856 66024.exe 35 PID 2856 wrote to memory of 2404 2856 66024.exe 35 PID 2856 wrote to memory of 2404 2856 66024.exe 35 PID 2404 wrote to memory of 2880 2404 8280840.exe 36 PID 2404 wrote to memory of 2880 2404 8280840.exe 36 PID 2404 wrote to memory of 2880 2404 8280840.exe 36 PID 2404 wrote to memory of 2880 2404 8280840.exe 36 PID 2880 wrote to memory of 2972 2880 60246.exe 37 PID 2880 wrote to memory of 2972 2880 60246.exe 37 PID 2880 wrote to memory of 2972 2880 60246.exe 37 PID 2880 wrote to memory of 2972 2880 60246.exe 37 PID 2972 wrote to memory of 1936 2972 222600.exe 38 PID 2972 wrote to memory of 1936 2972 222600.exe 38 PID 2972 wrote to memory of 1936 2972 222600.exe 38 PID 2972 wrote to memory of 1936 2972 222600.exe 38 PID 1936 wrote to memory of 2492 1936 4826682.exe 39 PID 1936 wrote to memory of 2492 1936 4826682.exe 39 PID 1936 wrote to memory of 2492 1936 4826682.exe 39 PID 1936 wrote to memory of 2492 1936 4826682.exe 39 PID 2492 wrote to memory of 1452 2492 tnhtbb.exe 40 PID 2492 wrote to memory of 1452 2492 tnhtbb.exe 40 PID 2492 wrote to memory of 1452 2492 tnhtbb.exe 40 PID 2492 wrote to memory of 1452 2492 tnhtbb.exe 40 PID 1452 wrote to memory of 2332 1452 7ppvv.exe 41 PID 1452 wrote to memory of 2332 1452 7ppvv.exe 41 PID 1452 wrote to memory of 2332 1452 7ppvv.exe 41 PID 1452 wrote to memory of 2332 1452 7ppvv.exe 41 PID 2332 wrote to memory of 2992 2332 60686.exe 42 PID 2332 wrote to memory of 2992 2332 60686.exe 42 PID 2332 wrote to memory of 2992 2332 60686.exe 42 PID 2332 wrote to memory of 2992 2332 60686.exe 42 PID 2992 wrote to memory of 3016 2992 820266.exe 43 PID 2992 wrote to memory of 3016 2992 820266.exe 43 PID 2992 wrote to memory of 3016 2992 820266.exe 43 PID 2992 wrote to memory of 3016 2992 820266.exe 43 PID 3016 wrote to memory of 2192 3016 82068.exe 44 PID 3016 wrote to memory of 2192 3016 82068.exe 44 PID 3016 wrote to memory of 2192 3016 82068.exe 44 PID 3016 wrote to memory of 2192 3016 82068.exe 44 PID 2192 wrote to memory of 944 2192 q60602.exe 45 PID 2192 wrote to memory of 944 2192 q60602.exe 45 PID 2192 wrote to memory of 944 2192 q60602.exe 45 PID 2192 wrote to memory of 944 2192 q60602.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe"C:\Users\Admin\AppData\Local\Temp\091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\ddvpd.exec:\ddvpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\i422400.exec:\i422400.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\hbntnb.exec:\hbntnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\w24600.exec:\w24600.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\66024.exec:\66024.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\8280840.exec:\8280840.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\60246.exec:\60246.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\222600.exec:\222600.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\4826682.exec:\4826682.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\tnhtbb.exec:\tnhtbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\7ppvv.exec:\7ppvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\60686.exec:\60686.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\820266.exec:\820266.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\82068.exec:\82068.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\q60602.exec:\q60602.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\8660440.exec:\8660440.exe17⤵
- Executes dropped EXE
PID:944 -
\??\c:\608624.exec:\608624.exe18⤵
- Executes dropped EXE
PID:1628 -
\??\c:\xrflrxl.exec:\xrflrxl.exe19⤵
- Executes dropped EXE
PID:2600 -
\??\c:\ddpdp.exec:\ddpdp.exe20⤵
- Executes dropped EXE
PID:2612 -
\??\c:\5bthtb.exec:\5bthtb.exe21⤵
- Executes dropped EXE
PID:2044 -
\??\c:\82004.exec:\82004.exe22⤵
- Executes dropped EXE
PID:2636 -
\??\c:\k68406.exec:\k68406.exe23⤵
- Executes dropped EXE
PID:1004 -
\??\c:\1ddpp.exec:\1ddpp.exe24⤵
- Executes dropped EXE
PID:596 -
\??\c:\3hntbn.exec:\3hntbn.exe25⤵
- Executes dropped EXE
PID:1236 -
\??\c:\ttbbtt.exec:\ttbbtt.exe26⤵
- Executes dropped EXE
PID:2632 -
\??\c:\rlxfxxl.exec:\rlxfxxl.exe27⤵
- Executes dropped EXE
PID:1716 -
\??\c:\rrlrllx.exec:\rrlrllx.exe28⤵
- Executes dropped EXE
PID:2020 -
\??\c:\8240622.exec:\8240622.exe29⤵
- Executes dropped EXE
PID:1656 -
\??\c:\jdddd.exec:\jdddd.exe30⤵
- Executes dropped EXE
PID:1652 -
\??\c:\xflrfrx.exec:\xflrfrx.exe31⤵
- Executes dropped EXE
PID:2120 -
\??\c:\0848888.exec:\0848888.exe32⤵
- Executes dropped EXE
PID:2572 -
\??\c:\a8068.exec:\a8068.exe33⤵
- Executes dropped EXE
PID:1964 -
\??\c:\fxlrlff.exec:\fxlrlff.exe34⤵
- Executes dropped EXE
PID:2796 -
\??\c:\nnhntb.exec:\nnhntb.exe35⤵
- Executes dropped EXE
PID:1948 -
\??\c:\8688822.exec:\8688822.exe36⤵
- Executes dropped EXE
PID:2844 -
\??\c:\ttthbn.exec:\ttthbn.exe37⤵
- Executes dropped EXE
PID:2828 -
\??\c:\20262.exec:\20262.exe38⤵
- Executes dropped EXE
PID:2952 -
\??\c:\rlxrxff.exec:\rlxrxff.exe39⤵
- Executes dropped EXE
PID:1568 -
\??\c:\686226.exec:\686226.exe40⤵
- Executes dropped EXE
PID:2404 -
\??\c:\4644228.exec:\4644228.exe41⤵
- Executes dropped EXE
PID:2752 -
\??\c:\w68444.exec:\w68444.exe42⤵
- Executes dropped EXE
PID:2728 -
\??\c:\jddjj.exec:\jddjj.exe43⤵
- Executes dropped EXE
PID:2748 -
\??\c:\7pjjd.exec:\7pjjd.exe44⤵
- Executes dropped EXE
PID:604 -
\??\c:\020622.exec:\020622.exe45⤵
- Executes dropped EXE
PID:2656 -
\??\c:\824028.exec:\824028.exe46⤵
- Executes dropped EXE
PID:588 -
\??\c:\86800.exec:\86800.exe47⤵
- Executes dropped EXE
PID:2492 -
\??\c:\hthnbh.exec:\hthnbh.exe48⤵
- Executes dropped EXE
PID:3020 -
\??\c:\nhtnhb.exec:\nhtnhb.exe49⤵
- Executes dropped EXE
PID:1696 -
\??\c:\w24444.exec:\w24444.exe50⤵
- Executes dropped EXE
PID:3028 -
\??\c:\rlxxlrf.exec:\rlxxlrf.exe51⤵
- Executes dropped EXE
PID:3024 -
\??\c:\vvvdj.exec:\vvvdj.exe52⤵
- Executes dropped EXE
PID:2328 -
\??\c:\6462266.exec:\6462266.exe53⤵
- Executes dropped EXE
PID:1044 -
\??\c:\7jjdd.exec:\7jjdd.exe54⤵
- Executes dropped EXE
PID:1028 -
\??\c:\hbtbbh.exec:\hbtbbh.exe55⤵
- Executes dropped EXE
PID:2524 -
\??\c:\42406.exec:\42406.exe56⤵
- Executes dropped EXE
PID:2080 -
\??\c:\484066.exec:\484066.exe57⤵
- Executes dropped EXE
PID:2620 -
\??\c:\42240.exec:\42240.exe58⤵
- Executes dropped EXE
PID:844 -
\??\c:\1fxfrxl.exec:\1fxfrxl.exe59⤵
- Executes dropped EXE
PID:1828 -
\??\c:\8028484.exec:\8028484.exe60⤵
- Executes dropped EXE
PID:2388 -
\??\c:\btbbhh.exec:\btbbhh.exe61⤵
- Executes dropped EXE
PID:1004 -
\??\c:\0042206.exec:\0042206.exe62⤵
- Executes dropped EXE
PID:964 -
\??\c:\nhhnbn.exec:\nhhnbn.exe63⤵
- Executes dropped EXE
PID:2152 -
\??\c:\pvdvp.exec:\pvdvp.exe64⤵
- Executes dropped EXE
PID:2532 -
\??\c:\vddjd.exec:\vddjd.exe65⤵
- Executes dropped EXE
PID:2632 -
\??\c:\rlxfxfx.exec:\rlxfxfx.exe66⤵PID:2476
-
\??\c:\7pjpp.exec:\7pjpp.exe67⤵PID:2400
-
\??\c:\8202846.exec:\8202846.exe68⤵PID:1036
-
\??\c:\3nnbnt.exec:\3nnbnt.exe69⤵PID:1756
-
\??\c:\0884884.exec:\0884884.exe70⤵PID:1652
-
\??\c:\ffrfxlr.exec:\ffrfxlr.exe71⤵PID:2788
-
\??\c:\llfxrxr.exec:\llfxrxr.exe72⤵PID:2052
-
\??\c:\66462.exec:\66462.exe73⤵PID:2440
-
\??\c:\2088488.exec:\2088488.exe74⤵PID:2968
-
\??\c:\bbnhtt.exec:\bbnhtt.exe75⤵PID:2948
-
\??\c:\g4806.exec:\g4806.exe76⤵PID:2156
-
\??\c:\646884.exec:\646884.exe77⤵PID:3060
-
\??\c:\fxxfflr.exec:\fxxfflr.exe78⤵PID:2528
-
\??\c:\s4224.exec:\s4224.exe79⤵PID:1600
-
\??\c:\4246468.exec:\4246468.exe80⤵PID:2504
-
\??\c:\djdvp.exec:\djdvp.exe81⤵PID:2868
-
\??\c:\ttnhnn.exec:\ttnhnn.exe82⤵PID:2876
-
\??\c:\a8440.exec:\a8440.exe83⤵PID:1960
-
\??\c:\nhtbtb.exec:\nhtbtb.exe84⤵PID:2736
-
\??\c:\84284.exec:\84284.exe85⤵PID:3004
-
\??\c:\6284488.exec:\6284488.exe86⤵PID:1488
-
\??\c:\s8002.exec:\s8002.exe87⤵PID:2348
-
\??\c:\xrfrflf.exec:\xrfrflf.exe88⤵PID:2936
-
\??\c:\042244.exec:\042244.exe89⤵PID:2772
-
\??\c:\ddvdv.exec:\ddvdv.exe90⤵PID:2884
-
\??\c:\htttnt.exec:\htttnt.exe91⤵PID:2920
-
\??\c:\ppjpv.exec:\ppjpv.exe92⤵PID:3024
-
\??\c:\24224.exec:\24224.exe93⤵PID:2328
-
\??\c:\o260228.exec:\o260228.exe94⤵PID:1544
-
\??\c:\7llxrrx.exec:\7llxrrx.exe95⤵PID:2096
-
\??\c:\u688606.exec:\u688606.exe96⤵PID:2640
-
\??\c:\0806060.exec:\0806060.exe97⤵PID:2340
-
\??\c:\ppvvv.exec:\ppvvv.exe98⤵PID:2044
-
\??\c:\28664.exec:\28664.exe99⤵PID:1380
-
\??\c:\xrrxrrf.exec:\xrrxrrf.exe100⤵PID:1092
-
\??\c:\tnnntb.exec:\tnnntb.exe101⤵PID:700
-
\??\c:\bthhht.exec:\bthhht.exe102⤵PID:1372
-
\??\c:\64280.exec:\64280.exe103⤵PID:1524
-
\??\c:\q64806.exec:\q64806.exe104⤵PID:1604
-
\??\c:\o262284.exec:\o262284.exe105⤵PID:916
-
\??\c:\5frxrrr.exec:\5frxrrr.exe106⤵PID:1776
-
\??\c:\1flxrxl.exec:\1flxrxl.exe107⤵PID:2476
-
\??\c:\u028440.exec:\u028440.exe108⤵PID:1640
-
\??\c:\0462882.exec:\0462882.exe109⤵PID:1036
-
\??\c:\88224.exec:\88224.exe110⤵PID:1996
-
\??\c:\dvjpv.exec:\dvjpv.exe111⤵PID:2432
-
\??\c:\804460.exec:\804460.exe112⤵PID:2572
-
\??\c:\lfxfllx.exec:\lfxfllx.exe113⤵PID:2888
-
\??\c:\lxlrlrr.exec:\lxlrlrr.exe114⤵PID:2160
-
\??\c:\9vvdp.exec:\9vvdp.exe115⤵PID:2560
-
\??\c:\42260.exec:\42260.exe116⤵
- System Location Discovery: System Language Discovery
PID:2836 -
\??\c:\ffxflrf.exec:\ffxflrf.exe117⤵PID:2856
-
\??\c:\42446.exec:\42446.exe118⤵PID:2124
-
\??\c:\040040.exec:\040040.exe119⤵PID:2984
-
\??\c:\btnhhh.exec:\btnhhh.exe120⤵PID:1916
-
\??\c:\xxlllff.exec:\xxlllff.exe121⤵PID:2564
-
\??\c:\pjdpd.exec:\pjdpd.exe122⤵PID:2452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-