Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe
Resource
win7-20240708-en
General
-
Target
d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe
-
Size
963KB
-
MD5
07612bfccc863ae2d0f84dd4f1a85453
-
SHA1
0d3969ce5680da5ec475348e196e5d7cdafe826d
-
SHA256
d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24
-
SHA512
052956c3e744f0ce0f13e6a4d08e4c1f2390de9f986891847001cb88eebac459c2728574a37850ddf24f28c8a66a74739ad6c4dc2fd23605362bf722e34b624a
-
SSDEEP
12288:n3C9yMo+S0L9xRnoq7H9xqYL04iVypNKvzcMwdBS3b3aoqYveXVadBlHD+CURPO6:SgD4bhoqLDqYLagB6Wj1+CyU
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4908-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4908-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2076-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3228-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1316-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4020-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4108-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3076-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/452-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3632-79-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1136-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/264-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4976-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1728-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1900-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4428-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4868-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3376-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4420-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3108-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/448-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3628 6422604.exe 2076 vdvpj.exe 3228 bhnhnh.exe 1316 88486.exe 4020 0844226.exe 4108 m6008.exe 3076 402048.exe 452 lxfxrlx.exe 532 nnbtth.exe 3632 00446.exe 1136 26840.exe 4836 3vvpp.exe 1728 vpvpj.exe 264 8246660.exe 4976 1dvvd.exe 1900 24266.exe 4428 0626660.exe 4868 lflxlxf.exe 2504 bbbbbb.exe 3376 bhntbh.exe 2556 hbtnnn.exe 4228 g8604.exe 4420 60648.exe 3108 ppjjd.exe 224 1rlxlfr.exe 448 402260.exe 2564 5hbthh.exe 1916 bhhnhb.exe 5080 066082.exe 4508 5lrfrlr.exe 1880 e40444.exe 1152 842860.exe 1848 20260.exe 4808 bthtbn.exe 3404 fxlfrrl.exe 2860 7frlllx.exe 2372 20420.exe 2976 bbbnbt.exe 1532 jvpdp.exe 2756 jdvpj.exe 4240 frrfrlx.exe 5100 7rrlxxl.exe 4628 c248608.exe 1900 088206.exe 1896 488282.exe 2388 66642.exe 2044 frxrlfl.exe 3216 fxllffr.exe 3564 440488.exe 1168 7lrlffr.exe 4484 022666.exe 1748 1djdv.exe 2084 rlfxrlf.exe 3740 3xxrlfx.exe 640 00482.exe 3272 1dppp.exe 1632 268888.exe 2776 c080222.exe 1604 lfrllff.exe 2984 bnbtnn.exe 4252 c848248.exe 3024 0028244.exe 1848 w80444.exe 1656 1ddvv.exe -
resource yara_rule behavioral2/memory/4908-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4908-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3228-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1316-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4020-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4108-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3076-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/452-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/264-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4976-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1728-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1900-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4428-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3376-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4420-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3108-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/448-175-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 600488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e88204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0844226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2226000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4022260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u808222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0400420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 446644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 402044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1djdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3628 4908 d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe 89 PID 4908 wrote to memory of 3628 4908 d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe 89 PID 4908 wrote to memory of 3628 4908 d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe 89 PID 3628 wrote to memory of 2076 3628 6422604.exe 90 PID 3628 wrote to memory of 2076 3628 6422604.exe 90 PID 3628 wrote to memory of 2076 3628 6422604.exe 90 PID 2076 wrote to memory of 3228 2076 vdvpj.exe 91 PID 2076 wrote to memory of 3228 2076 vdvpj.exe 91 PID 2076 wrote to memory of 3228 2076 vdvpj.exe 91 PID 3228 wrote to memory of 1316 3228 bhnhnh.exe 92 PID 3228 wrote to memory of 1316 3228 bhnhnh.exe 92 PID 3228 wrote to memory of 1316 3228 bhnhnh.exe 92 PID 1316 wrote to memory of 4020 1316 88486.exe 93 PID 1316 wrote to memory of 4020 1316 88486.exe 93 PID 1316 wrote to memory of 4020 1316 88486.exe 93 PID 4020 wrote to memory of 4108 4020 0844226.exe 95 PID 4020 wrote to memory of 4108 4020 0844226.exe 95 PID 4020 wrote to memory of 4108 4020 0844226.exe 95 PID 4108 wrote to memory of 3076 4108 m6008.exe 96 PID 4108 wrote to memory of 3076 4108 m6008.exe 96 PID 4108 wrote to memory of 3076 4108 m6008.exe 96 PID 3076 wrote to memory of 452 3076 402048.exe 98 PID 3076 wrote to memory of 452 3076 402048.exe 98 PID 3076 wrote to memory of 452 3076 402048.exe 98 PID 452 wrote to memory of 532 452 lxfxrlx.exe 99 PID 452 wrote to memory of 532 452 lxfxrlx.exe 99 PID 452 wrote to memory of 532 452 lxfxrlx.exe 99 PID 532 wrote to memory of 3632 532 nnbtth.exe 101 PID 532 wrote to memory of 3632 532 nnbtth.exe 101 PID 532 wrote to memory of 3632 532 nnbtth.exe 101 PID 3632 wrote to memory of 1136 3632 00446.exe 102 PID 3632 wrote to memory of 1136 3632 00446.exe 102 PID 3632 wrote to memory of 1136 3632 00446.exe 102 PID 1136 wrote to memory of 4836 1136 26840.exe 103 PID 1136 wrote to memory of 4836 1136 26840.exe 103 PID 1136 wrote to memory of 4836 1136 26840.exe 103 PID 4836 wrote to memory of 1728 4836 3vvpp.exe 104 PID 4836 wrote to memory of 1728 4836 3vvpp.exe 104 PID 4836 wrote to memory of 1728 4836 3vvpp.exe 104 PID 1728 wrote to memory of 264 1728 vpvpj.exe 105 PID 1728 wrote to memory of 264 1728 vpvpj.exe 105 PID 1728 wrote to memory of 264 1728 vpvpj.exe 105 PID 264 wrote to memory of 4976 264 8246660.exe 106 PID 264 wrote to memory of 4976 264 8246660.exe 106 PID 264 wrote to memory of 4976 264 8246660.exe 106 PID 4976 wrote to memory of 1900 4976 1dvvd.exe 107 PID 4976 wrote to memory of 1900 4976 1dvvd.exe 107 PID 4976 wrote to memory of 1900 4976 1dvvd.exe 107 PID 1900 wrote to memory of 4428 1900 24266.exe 108 PID 1900 wrote to memory of 4428 1900 24266.exe 108 PID 1900 wrote to memory of 4428 1900 24266.exe 108 PID 4428 wrote to memory of 4868 4428 0626660.exe 109 PID 4428 wrote to memory of 4868 4428 0626660.exe 109 PID 4428 wrote to memory of 4868 4428 0626660.exe 109 PID 4868 wrote to memory of 2504 4868 lflxlxf.exe 110 PID 4868 wrote to memory of 2504 4868 lflxlxf.exe 110 PID 4868 wrote to memory of 2504 4868 lflxlxf.exe 110 PID 2504 wrote to memory of 3376 2504 bbbbbb.exe 111 PID 2504 wrote to memory of 3376 2504 bbbbbb.exe 111 PID 2504 wrote to memory of 3376 2504 bbbbbb.exe 111 PID 3376 wrote to memory of 2556 3376 bhntbh.exe 112 PID 3376 wrote to memory of 2556 3376 bhntbh.exe 112 PID 3376 wrote to memory of 2556 3376 bhntbh.exe 112 PID 2556 wrote to memory of 4228 2556 hbtnnn.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe"C:\Users\Admin\AppData\Local\Temp\d30bceb876f5e4697d5a6300a330f2774fe7d5509f1d2cbd846cc3691fb31c24.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
\??\c:\6422604.exec:\6422604.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\vdvpj.exec:\vdvpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\bhnhnh.exec:\bhnhnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
\??\c:\88486.exec:\88486.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
\??\c:\0844226.exec:\0844226.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
\??\c:\m6008.exec:\m6008.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
\??\c:\402048.exec:\402048.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
\??\c:\lxfxrlx.exec:\lxfxrlx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
\??\c:\nnbtth.exec:\nnbtth.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\00446.exec:\00446.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\26840.exec:\26840.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\3vvpp.exec:\3vvpp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\vpvpj.exec:\vpvpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\8246660.exec:\8246660.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
\??\c:\1dvvd.exec:\1dvvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
\??\c:\24266.exec:\24266.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
\??\c:\0626660.exec:\0626660.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
\??\c:\lflxlxf.exec:\lflxlxf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
\??\c:\bbbbbb.exec:\bbbbbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\bhntbh.exec:\bhntbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
\??\c:\hbtnnn.exec:\hbtnnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\g8604.exec:\g8604.exe23⤵
- Executes dropped EXE
PID:4228 -
\??\c:\60648.exec:\60648.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4420 -
\??\c:\ppjjd.exec:\ppjjd.exe25⤵
- Executes dropped EXE
PID:3108 -
\??\c:\s6264.exec:\s6264.exe26⤵PID:3692
-
\??\c:\1rlxlfr.exec:\1rlxlfr.exe27⤵
- Executes dropped EXE
PID:224 -
\??\c:\402260.exec:\402260.exe28⤵
- Executes dropped EXE
PID:448 -
\??\c:\5hbthh.exec:\5hbthh.exe29⤵
- Executes dropped EXE
PID:2564 -
\??\c:\bhhnhb.exec:\bhhnhb.exe30⤵
- Executes dropped EXE
PID:1916 -
\??\c:\066082.exec:\066082.exe31⤵
- Executes dropped EXE
PID:5080 -
\??\c:\5lrfrlr.exec:\5lrfrlr.exe32⤵
- Executes dropped EXE
PID:4508 -
\??\c:\e40444.exec:\e40444.exe33⤵
- Executes dropped EXE
PID:1880 -
\??\c:\842860.exec:\842860.exe34⤵
- Executes dropped EXE
PID:1152 -
\??\c:\20260.exec:\20260.exe35⤵
- Executes dropped EXE
PID:1848 -
\??\c:\bthtbn.exec:\bthtbn.exe36⤵
- Executes dropped EXE
PID:4808 -
\??\c:\fxlfrrl.exec:\fxlfrrl.exe37⤵
- Executes dropped EXE
PID:3404 -
\??\c:\7frlllx.exec:\7frlllx.exe38⤵
- Executes dropped EXE
PID:2860 -
\??\c:\20420.exec:\20420.exe39⤵
- Executes dropped EXE
PID:2372 -
\??\c:\bbbnbt.exec:\bbbnbt.exe40⤵
- Executes dropped EXE
PID:2976 -
\??\c:\jvpdp.exec:\jvpdp.exe41⤵
- Executes dropped EXE
PID:1532 -
\??\c:\jdvpj.exec:\jdvpj.exe42⤵
- Executes dropped EXE
PID:2756 -
\??\c:\frrfrlx.exec:\frrfrlx.exe43⤵
- Executes dropped EXE
PID:4240 -
\??\c:\7rrlxxl.exec:\7rrlxxl.exe44⤵
- Executes dropped EXE
PID:5100 -
\??\c:\c248608.exec:\c248608.exe45⤵
- Executes dropped EXE
PID:4628 -
\??\c:\088206.exec:\088206.exe46⤵
- Executes dropped EXE
PID:1900 -
\??\c:\488282.exec:\488282.exe47⤵
- Executes dropped EXE
PID:1896 -
\??\c:\66642.exec:\66642.exe48⤵
- Executes dropped EXE
PID:2388 -
\??\c:\frxrlfl.exec:\frxrlfl.exe49⤵
- Executes dropped EXE
PID:2044 -
\??\c:\fxllffr.exec:\fxllffr.exe50⤵
- Executes dropped EXE
PID:3216 -
\??\c:\440488.exec:\440488.exe51⤵
- Executes dropped EXE
PID:3564 -
\??\c:\7lrlffr.exec:\7lrlffr.exe52⤵
- Executes dropped EXE
PID:1168 -
\??\c:\022666.exec:\022666.exe53⤵
- Executes dropped EXE
PID:4484 -
\??\c:\1djdv.exec:\1djdv.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748 -
\??\c:\rlfxrlf.exec:\rlfxrlf.exe55⤵
- Executes dropped EXE
PID:2084 -
\??\c:\3xxrlfx.exec:\3xxrlfx.exe56⤵
- Executes dropped EXE
PID:3740 -
\??\c:\00482.exec:\00482.exe57⤵
- Executes dropped EXE
PID:640 -
\??\c:\1dppp.exec:\1dppp.exe58⤵
- Executes dropped EXE
PID:3272 -
\??\c:\268888.exec:\268888.exe59⤵
- Executes dropped EXE
PID:1632 -
\??\c:\c080222.exec:\c080222.exe60⤵
- Executes dropped EXE
PID:2776 -
\??\c:\lfrllff.exec:\lfrllff.exe61⤵
- Executes dropped EXE
PID:1604 -
\??\c:\bnbtnn.exec:\bnbtnn.exe62⤵
- Executes dropped EXE
PID:2984 -
\??\c:\c848248.exec:\c848248.exe63⤵
- Executes dropped EXE
PID:4252 -
\??\c:\0028244.exec:\0028244.exe64⤵
- Executes dropped EXE
PID:3024 -
\??\c:\w80444.exec:\w80444.exe65⤵
- Executes dropped EXE
PID:1848 -
\??\c:\1ddvv.exec:\1ddvv.exe66⤵
- Executes dropped EXE
PID:1656 -
\??\c:\lrffxxr.exec:\lrffxxr.exe67⤵PID:4632
-
\??\c:\086600.exec:\086600.exe68⤵PID:2976
-
\??\c:\g2040.exec:\g2040.exe69⤵
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\jpvvp.exec:\jpvvp.exe70⤵
- System Location Discovery: System Language Discovery
PID:5100 -
\??\c:\24604.exec:\24604.exe71⤵PID:3252
-
\??\c:\ppjvv.exec:\ppjvv.exe72⤵PID:1328
-
\??\c:\bttnnb.exec:\bttnnb.exe73⤵PID:3376
-
\??\c:\g8626.exec:\g8626.exe74⤵PID:1348
-
\??\c:\080488.exec:\080488.exe75⤵PID:3792
-
\??\c:\htbhht.exec:\htbhht.exe76⤵PID:2176
-
\??\c:\6800448.exec:\6800448.exe77⤵PID:404
-
\??\c:\pjjdd.exec:\pjjdd.exe78⤵PID:4500
-
\??\c:\468666.exec:\468666.exe79⤵PID:2968
-
\??\c:\rffxxxx.exec:\rffxxxx.exe80⤵PID:224
-
\??\c:\3vvvp.exec:\3vvvp.exe81⤵PID:1804
-
\??\c:\m4884.exec:\m4884.exe82⤵PID:876
-
\??\c:\tbhnhh.exec:\tbhnhh.exe83⤵PID:640
-
\??\c:\680822.exec:\680822.exe84⤵PID:3952
-
\??\c:\60284.exec:\60284.exe85⤵PID:4376
-
\??\c:\pjppd.exec:\pjppd.exe86⤵PID:2020
-
\??\c:\266600.exec:\266600.exe87⤵PID:3076
-
\??\c:\5ttnhh.exec:\5ttnhh.exe88⤵PID:1928
-
\??\c:\jdddd.exec:\jdddd.exe89⤵PID:2972
-
\??\c:\1pvpp.exec:\1pvpp.exe90⤵PID:3584
-
\??\c:\pdvpj.exec:\pdvpj.exe91⤵PID:4532
-
\??\c:\288482.exec:\288482.exe92⤵PID:2860
-
\??\c:\c222026.exec:\c222026.exe93⤵PID:796
-
\??\c:\e62604.exec:\e62604.exe94⤵PID:4976
-
\??\c:\6282666.exec:\6282666.exe95⤵PID:3480
-
\??\c:\5flfrxr.exec:\5flfrxr.exe96⤵PID:3548
-
\??\c:\622082.exec:\622082.exe97⤵PID:3876
-
\??\c:\28628.exec:\28628.exe98⤵PID:4640
-
\??\c:\pjjvd.exec:\pjjvd.exe99⤵PID:332
-
\??\c:\04280.exec:\04280.exe100⤵PID:4896
-
\??\c:\7xfxfff.exec:\7xfxfff.exe101⤵PID:436
-
\??\c:\hhtnhb.exec:\hhtnhb.exe102⤵PID:212
-
\??\c:\82426.exec:\82426.exe103⤵PID:3968
-
\??\c:\480066.exec:\480066.exe104⤵PID:4044
-
\??\c:\jvvpj.exec:\jvvpj.exe105⤵PID:3560
-
\??\c:\1rrrllf.exec:\1rrrllf.exe106⤵PID:4104
-
\??\c:\4042604.exec:\4042604.exe107⤵PID:2564
-
\??\c:\842468.exec:\842468.exe108⤵PID:1680
-
\??\c:\22264.exec:\22264.exe109⤵PID:4508
-
\??\c:\66286.exec:\66286.exe110⤵PID:3044
-
\??\c:\2208484.exec:\2208484.exe111⤵PID:5016
-
\??\c:\nhhhbh.exec:\nhhhbh.exe112⤵PID:2240
-
\??\c:\lrlxlxl.exec:\lrlxlxl.exe113⤵PID:3820
-
\??\c:\u008604.exec:\u008604.exe114⤵PID:2712
-
\??\c:\ffxrxxx.exec:\ffxrxxx.exe115⤵PID:2824
-
\??\c:\u602420.exec:\u602420.exe116⤵PID:3404
-
\??\c:\bnhtnh.exec:\bnhtnh.exe117⤵
- System Location Discovery: System Language Discovery
PID:4632 -
\??\c:\lfrllll.exec:\lfrllll.exe118⤵PID:5072
-
\??\c:\ffxrrxr.exec:\ffxrrxr.exe119⤵
- System Location Discovery: System Language Discovery
PID:4880 -
\??\c:\ffflfrr.exec:\ffflfrr.exe120⤵PID:3252
-
\??\c:\88820.exec:\88820.exe121⤵PID:1676
-
\??\c:\lxxlfxr.exec:\lxxlfxr.exe122⤵PID:3264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-