Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 23:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe
-
Size
64KB
-
MD5
c2066d2f26e997746ff705e97ee5f1f6
-
SHA1
afd70f409acb50eeb435564aac347e15dc0d36d0
-
SHA256
8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360
-
SHA512
c899d5705568ddb84d349555d3e4d0abc8caec2555e52bf2287a96f7cff23e8b43182b1df61ba9c36417812d159e13ef395d02050f4f8d682e308d013438d7e3
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxiv:ymb3NkkiQ3mdBjF0y7kbc
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/2068-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2576-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2068-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1304-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4420-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3212-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3808-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3156-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5004-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4216-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4048-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1044-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4076-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5116-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4908-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5044-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1280-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2408-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3684-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2576 nbhhbn.exe 1304 jvdpd.exe 4420 rxlflff.exe 3516 484480.exe 3212 jvdvd.exe 3088 84666.exe 3808 vvpvj.exe 3156 e08062.exe 4688 djjvj.exe 5004 244404.exe 4216 6622666.exe 4048 u286408.exe 3896 0040420.exe 788 nhhnhh.exe 1044 06226.exe 4220 3tbtnn.exe 4076 480004.exe 3640 2006082.exe 5116 nhthtt.exe 1188 nhbntn.exe 4536 2866048.exe 4908 lrfxflr.exe 1736 ffxlrlx.exe 5044 lfrlrll.exe 1544 frllffx.exe 1280 jdddv.exe 2408 6424204.exe 4708 4840008.exe 2032 28468.exe 1128 6242884.exe 3684 3nttnh.exe 4460 dpvjp.exe 2500 9vvpd.exe 2416 6822820.exe 4948 0026048.exe 5076 6282004.exe 1340 7lxfrfx.exe 2068 rfxxrrl.exe 2576 1jjdv.exe 4416 622000.exe 1204 64820.exe 2768 6448866.exe 4528 llllxrl.exe 2868 3xrrffr.exe 1576 djjvj.exe 3996 vdjpv.exe 4372 xlxfrlf.exe 4448 7hnbbt.exe 4688 0486486.exe 3196 xxlxllx.exe 3592 hbnnhn.exe 4252 bhbhht.exe 3660 dpvjp.exe 4740 vvpdj.exe 788 nhthnn.exe 4200 864866.exe 4100 80280.exe 912 m4042.exe 1676 dpvpp.exe 3576 vpddp.exe 4872 8404882.exe 5116 86420.exe 1624 4820226.exe 4500 nhtnth.exe -
resource yara_rule behavioral2/memory/2068-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2576-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2576-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2068-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1304-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4420-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3212-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3212-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3808-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3808-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3808-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3156-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4216-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4048-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1044-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4076-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3640-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5116-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4908-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5044-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1280-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2408-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3684-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4286420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6620482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 024260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xxxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0088222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2576 2068 8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe 85 PID 2068 wrote to memory of 2576 2068 8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe 85 PID 2068 wrote to memory of 2576 2068 8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe 85 PID 2576 wrote to memory of 1304 2576 nbhhbn.exe 86 PID 2576 wrote to memory of 1304 2576 nbhhbn.exe 86 PID 2576 wrote to memory of 1304 2576 nbhhbn.exe 86 PID 1304 wrote to memory of 4420 1304 jvdpd.exe 87 PID 1304 wrote to memory of 4420 1304 jvdpd.exe 87 PID 1304 wrote to memory of 4420 1304 jvdpd.exe 87 PID 4420 wrote to memory of 3516 4420 rxlflff.exe 88 PID 4420 wrote to memory of 3516 4420 rxlflff.exe 88 PID 4420 wrote to memory of 3516 4420 rxlflff.exe 88 PID 3516 wrote to memory of 3212 3516 484480.exe 89 PID 3516 wrote to memory of 3212 3516 484480.exe 89 PID 3516 wrote to memory of 3212 3516 484480.exe 89 PID 3212 wrote to memory of 3088 3212 jvdvd.exe 90 PID 3212 wrote to memory of 3088 3212 jvdvd.exe 90 PID 3212 wrote to memory of 3088 3212 jvdvd.exe 90 PID 3088 wrote to memory of 3808 3088 84666.exe 92 PID 3088 wrote to memory of 3808 3088 84666.exe 92 PID 3088 wrote to memory of 3808 3088 84666.exe 92 PID 3808 wrote to memory of 3156 3808 vvpvj.exe 93 PID 3808 wrote to memory of 3156 3808 vvpvj.exe 93 PID 3808 wrote to memory of 3156 3808 vvpvj.exe 93 PID 3156 wrote to memory of 4688 3156 e08062.exe 94 PID 3156 wrote to memory of 4688 3156 e08062.exe 94 PID 3156 wrote to memory of 4688 3156 e08062.exe 94 PID 4688 wrote to memory of 5004 4688 djjvj.exe 95 PID 4688 wrote to memory of 5004 4688 djjvj.exe 95 PID 4688 wrote to memory of 5004 4688 djjvj.exe 95 PID 5004 wrote to memory of 4216 5004 244404.exe 96 PID 5004 wrote to memory of 4216 5004 244404.exe 96 PID 5004 wrote to memory of 4216 5004 244404.exe 96 PID 4216 wrote to memory of 4048 4216 6622666.exe 97 PID 4216 wrote to memory of 4048 4216 6622666.exe 97 PID 4216 wrote to memory of 4048 4216 6622666.exe 97 PID 4048 wrote to memory of 3896 4048 u286408.exe 98 PID 4048 wrote to memory of 3896 4048 u286408.exe 98 PID 4048 wrote to memory of 3896 4048 u286408.exe 98 PID 3896 wrote to memory of 788 3896 0040420.exe 99 PID 3896 wrote to memory of 788 3896 0040420.exe 99 PID 3896 wrote to memory of 788 3896 0040420.exe 99 PID 788 wrote to memory of 1044 788 nhhnhh.exe 100 PID 788 wrote to memory of 1044 788 nhhnhh.exe 100 PID 788 wrote to memory of 1044 788 nhhnhh.exe 100 PID 1044 wrote to memory of 4220 1044 06226.exe 101 PID 1044 wrote to memory of 4220 1044 06226.exe 101 PID 1044 wrote to memory of 4220 1044 06226.exe 101 PID 4220 wrote to memory of 4076 4220 3tbtnn.exe 102 PID 4220 wrote to memory of 4076 4220 3tbtnn.exe 102 PID 4220 wrote to memory of 4076 4220 3tbtnn.exe 102 PID 4076 wrote to memory of 3640 4076 480004.exe 103 PID 4076 wrote to memory of 3640 4076 480004.exe 103 PID 4076 wrote to memory of 3640 4076 480004.exe 103 PID 3640 wrote to memory of 5116 3640 2006082.exe 104 PID 3640 wrote to memory of 5116 3640 2006082.exe 104 PID 3640 wrote to memory of 5116 3640 2006082.exe 104 PID 5116 wrote to memory of 1188 5116 nhthtt.exe 105 PID 5116 wrote to memory of 1188 5116 nhthtt.exe 105 PID 5116 wrote to memory of 1188 5116 nhthtt.exe 105 PID 1188 wrote to memory of 4536 1188 nhbntn.exe 106 PID 1188 wrote to memory of 4536 1188 nhbntn.exe 106 PID 1188 wrote to memory of 4536 1188 nhbntn.exe 106 PID 4536 wrote to memory of 4908 4536 2866048.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe"C:\Users\Admin\AppData\Local\Temp\8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\nbhhbn.exec:\nbhhbn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\jvdpd.exec:\jvdpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
\??\c:\rxlflff.exec:\rxlflff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
\??\c:\484480.exec:\484480.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\jvdvd.exec:\jvdvd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
\??\c:\84666.exec:\84666.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\vvpvj.exec:\vvpvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\e08062.exec:\e08062.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
\??\c:\djjvj.exec:\djjvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\244404.exec:\244404.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\6622666.exec:\6622666.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
\??\c:\u286408.exec:\u286408.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
\??\c:\0040420.exec:\0040420.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3896 -
\??\c:\nhhnhh.exec:\nhhnhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
\??\c:\06226.exec:\06226.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\3tbtnn.exec:\3tbtnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\480004.exec:\480004.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
\??\c:\2006082.exec:\2006082.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\nhthtt.exec:\nhthtt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\nhbntn.exec:\nhbntn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\2866048.exec:\2866048.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\lrfxflr.exec:\lrfxflr.exe23⤵
- Executes dropped EXE
PID:4908 -
\??\c:\ffxlrlx.exec:\ffxlrlx.exe24⤵
- Executes dropped EXE
PID:1736 -
\??\c:\lfrlrll.exec:\lfrlrll.exe25⤵
- Executes dropped EXE
PID:5044 -
\??\c:\frllffx.exec:\frllffx.exe26⤵
- Executes dropped EXE
PID:1544 -
\??\c:\jdddv.exec:\jdddv.exe27⤵
- Executes dropped EXE
PID:1280 -
\??\c:\6424204.exec:\6424204.exe28⤵
- Executes dropped EXE
PID:2408 -
\??\c:\4840008.exec:\4840008.exe29⤵
- Executes dropped EXE
PID:4708 -
\??\c:\28468.exec:\28468.exe30⤵
- Executes dropped EXE
PID:2032 -
\??\c:\6242884.exec:\6242884.exe31⤵
- Executes dropped EXE
PID:1128 -
\??\c:\3nttnh.exec:\3nttnh.exe32⤵
- Executes dropped EXE
PID:3684 -
\??\c:\dpvjp.exec:\dpvjp.exe33⤵
- Executes dropped EXE
PID:4460 -
\??\c:\9vvpd.exec:\9vvpd.exe34⤵
- Executes dropped EXE
PID:2500 -
\??\c:\6822820.exec:\6822820.exe35⤵
- Executes dropped EXE
PID:2416 -
\??\c:\0026048.exec:\0026048.exe36⤵
- Executes dropped EXE
PID:4948 -
\??\c:\6282004.exec:\6282004.exe37⤵
- Executes dropped EXE
PID:5076 -
\??\c:\5jjdd.exec:\5jjdd.exe38⤵PID:1116
-
\??\c:\7lxfrfx.exec:\7lxfrfx.exe39⤵
- Executes dropped EXE
PID:1340 -
\??\c:\rfxxrrl.exec:\rfxxrrl.exe40⤵
- Executes dropped EXE
PID:2068 -
\??\c:\1jjdv.exec:\1jjdv.exe41⤵
- Executes dropped EXE
PID:2576 -
\??\c:\622000.exec:\622000.exe42⤵
- Executes dropped EXE
PID:4416 -
\??\c:\64820.exec:\64820.exe43⤵
- Executes dropped EXE
PID:1204 -
\??\c:\6448866.exec:\6448866.exe44⤵
- Executes dropped EXE
PID:2768 -
\??\c:\llllxrl.exec:\llllxrl.exe45⤵
- Executes dropped EXE
PID:4528 -
\??\c:\3xrrffr.exec:\3xrrffr.exe46⤵
- Executes dropped EXE
PID:2868 -
\??\c:\djjvj.exec:\djjvj.exe47⤵
- Executes dropped EXE
PID:1576 -
\??\c:\vdjpv.exec:\vdjpv.exe48⤵
- Executes dropped EXE
PID:3996 -
\??\c:\xlxfrlf.exec:\xlxfrlf.exe49⤵
- Executes dropped EXE
PID:4372 -
\??\c:\7hnbbt.exec:\7hnbbt.exe50⤵
- Executes dropped EXE
PID:4448 -
\??\c:\0486486.exec:\0486486.exe51⤵
- Executes dropped EXE
PID:4688 -
\??\c:\xxlxllx.exec:\xxlxllx.exe52⤵
- Executes dropped EXE
PID:3196 -
\??\c:\hbnnhn.exec:\hbnnhn.exe53⤵
- Executes dropped EXE
PID:3592 -
\??\c:\bhbhht.exec:\bhbhht.exe54⤵
- Executes dropped EXE
PID:4252 -
\??\c:\dpvjp.exec:\dpvjp.exe55⤵
- Executes dropped EXE
PID:3660 -
\??\c:\vvpdj.exec:\vvpdj.exe56⤵
- Executes dropped EXE
PID:4740 -
\??\c:\nhthnn.exec:\nhthnn.exe57⤵
- Executes dropped EXE
PID:788 -
\??\c:\864866.exec:\864866.exe58⤵
- Executes dropped EXE
PID:4200 -
\??\c:\80280.exec:\80280.exe59⤵
- Executes dropped EXE
PID:4100 -
\??\c:\m4042.exec:\m4042.exe60⤵
- Executes dropped EXE
PID:912 -
\??\c:\dpvpp.exec:\dpvpp.exe61⤵
- Executes dropped EXE
PID:1676 -
\??\c:\vpddp.exec:\vpddp.exe62⤵
- Executes dropped EXE
PID:3576 -
\??\c:\8404882.exec:\8404882.exe63⤵
- Executes dropped EXE
PID:4872 -
\??\c:\86420.exec:\86420.exe64⤵
- Executes dropped EXE
PID:5116 -
\??\c:\4820226.exec:\4820226.exe65⤵
- Executes dropped EXE
PID:1624 -
\??\c:\nhtnth.exec:\nhtnth.exe66⤵
- Executes dropped EXE
PID:4500 -
\??\c:\5ppjp.exec:\5ppjp.exe67⤵PID:3264
-
\??\c:\fxrflfx.exec:\fxrflfx.exe68⤵PID:4908
-
\??\c:\lfxlxrl.exec:\lfxlxrl.exe69⤵PID:1736
-
\??\c:\4008620.exec:\4008620.exe70⤵PID:1704
-
\??\c:\662660.exec:\662660.exe71⤵PID:648
-
\??\c:\22444.exec:\22444.exe72⤵PID:632
-
\??\c:\2848604.exec:\2848604.exe73⤵PID:4256
-
\??\c:\fllfxrr.exec:\fllfxrr.exe74⤵PID:2408
-
\??\c:\8448264.exec:\8448264.exe75⤵PID:4708
-
\??\c:\8284882.exec:\8284882.exe76⤵PID:3968
-
\??\c:\vpppd.exec:\vpppd.exe77⤵PID:396
-
\??\c:\o004888.exec:\o004888.exe78⤵PID:1120
-
\??\c:\666048.exec:\666048.exe79⤵PID:4732
-
\??\c:\7jjjj.exec:\7jjjj.exe80⤵PID:2148
-
\??\c:\tnhbtt.exec:\tnhbtt.exe81⤵PID:2500
-
\??\c:\u244404.exec:\u244404.exe82⤵PID:2416
-
\??\c:\86028.exec:\86028.exe83⤵PID:4324
-
\??\c:\20448.exec:\20448.exe84⤵PID:3000
-
\??\c:\24604.exec:\24604.exe85⤵PID:4936
-
\??\c:\k84822.exec:\k84822.exe86⤵PID:2068
-
\??\c:\djppd.exec:\djppd.exe87⤵PID:1304
-
\??\c:\06888.exec:\06888.exe88⤵PID:4532
-
\??\c:\4644288.exec:\4644288.exe89⤵PID:2276
-
\??\c:\s8882.exec:\s8882.exe90⤵PID:2656
-
\??\c:\488288.exec:\488288.exe91⤵PID:3248
-
\??\c:\408444.exec:\408444.exe92⤵PID:4800
-
\??\c:\lfxxxxf.exec:\lfxxxxf.exe93⤵PID:1056
-
\??\c:\u204460.exec:\u204460.exe94⤵PID:1184
-
\??\c:\82826.exec:\82826.exe95⤵PID:3688
-
\??\c:\44604.exec:\44604.exe96⤵PID:5032
-
\??\c:\86826.exec:\86826.exe97⤵PID:3852
-
\??\c:\tnbhhb.exec:\tnbhhb.exe98⤵PID:4216
-
\??\c:\bthbnh.exec:\bthbnh.exe99⤵PID:1460
-
\??\c:\3fllxlf.exec:\3fllxlf.exe100⤵PID:5092
-
\??\c:\646048.exec:\646048.exe101⤵PID:1668
-
\??\c:\fxfxfxl.exec:\fxfxfxl.exe102⤵PID:2624
-
\??\c:\hhbhnn.exec:\hhbhnn.exe103⤵PID:3624
-
\??\c:\k28048.exec:\k28048.exe104⤵PID:3932
-
\??\c:\6248226.exec:\6248226.exe105⤵PID:1100
-
\??\c:\7vpdp.exec:\7vpdp.exe106⤵PID:3460
-
\??\c:\68048.exec:\68048.exe107⤵PID:912
-
\??\c:\u844664.exec:\u844664.exe108⤵PID:3036
-
\??\c:\9hbtht.exec:\9hbtht.exe109⤵PID:3972
-
\??\c:\xlxrllf.exec:\xlxrllf.exe110⤵PID:3152
-
\??\c:\vjjjd.exec:\vjjjd.exe111⤵PID:5116
-
\??\c:\bnttnt.exec:\bnttnt.exe112⤵PID:2456
-
\??\c:\a2068.exec:\a2068.exe113⤵PID:700
-
\??\c:\vdjjp.exec:\vdjjp.exe114⤵PID:2884
-
\??\c:\vdvjd.exec:\vdvjd.exe115⤵PID:4908
-
\??\c:\xfllxxr.exec:\xfllxxr.exe116⤵PID:1736
-
\??\c:\ntthht.exec:\ntthht.exe117⤵PID:3868
-
\??\c:\vdvvp.exec:\vdvvp.exe118⤵PID:3664
-
\??\c:\5thbtt.exec:\5thbtt.exe119⤵PID:3116
-
\??\c:\42826.exec:\42826.exe120⤵PID:3280
-
\??\c:\64266.exec:\64266.exe121⤵PID:2408
-
\??\c:\44006.exec:\44006.exe122⤵PID:2032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-