Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 03:31
Static task
static1
Behavioral task
behavioral1
Sample
d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe
Resource
win7-20240903-en
General
-
Target
d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe
-
Size
83KB
-
MD5
c2883033fbf6268999237c503958f74d
-
SHA1
7de01061096419bf907c089c6d41a5f9c9177162
-
SHA256
d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc
-
SHA512
c6ae2e26d7edfc9c9ca409dbcd35898b5987551d87a05d8efdb21bc0e782a9e3944b43cecd6a060231c091b04f348f928978f3611860c4d54150e414e5bade1b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Qo1:ymb3NkkiQ3mdBjFIIp9L9QrrA8l1
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/1344-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1344-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4136-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3212-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-37-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2020-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2272-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/768-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2868-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5060-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1252-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1016-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2892 c842266.exe 4136 m6822.exe 3212 nhhbbb.exe 3720 nhnhbb.exe 2152 dvpjd.exe 4676 480088.exe 2020 tnnnhn.exe 2272 3tbtbt.exe 212 00400.exe 768 dvppp.exe 60 462222.exe 928 224488.exe 2980 rfrllll.exe 4032 g2848.exe 4216 o400448.exe 4660 htbbhh.exe 2868 1jvpv.exe 3332 jpvdp.exe 3520 vpppp.exe 1104 lxxxrrr.exe 412 68666.exe 5060 jjvjv.exe 3348 g6608.exe 4616 xflxllf.exe 1252 nhhbtt.exe 2264 2664260.exe 1972 206662.exe 1016 flrllfr.exe 2912 9rrlfxr.exe 3948 q22660.exe 2488 840422.exe 1028 5hhttn.exe 4548 vpjvj.exe 2228 g0268.exe 1932 nhtntn.exe 2640 fffllxf.exe 4476 266024.exe 960 42268.exe 3060 8026860.exe 4460 tnhthn.exe 1848 28620.exe 1092 jdvjd.exe 116 0666442.exe 5032 xfflxxr.exe 5004 826826.exe 3720 202600.exe 4036 lxxrxrl.exe 2844 hnnnnn.exe 4072 c826404.exe 1524 0284444.exe 3160 lflfrxx.exe 2096 xrfxrfl.exe 4424 000482.exe 3668 vpvjp.exe 768 lxfxfxx.exe 3796 48204.exe 4464 a2820.exe 2260 88660.exe 1856 bttnhh.exe 1212 q00400.exe 1180 bbnnhn.exe 2928 222260.exe 1044 fxllffl.exe 1580 u460662.exe -
resource yara_rule behavioral2/memory/1344-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1344-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3212-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3212-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4136-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3212-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2020-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2272-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/768-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2868-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1252-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1972-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1016-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfrllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 484826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 222260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 066448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i882488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 620606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfflxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 2892 1344 d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe 83 PID 1344 wrote to memory of 2892 1344 d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe 83 PID 1344 wrote to memory of 2892 1344 d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe 83 PID 2892 wrote to memory of 4136 2892 c842266.exe 84 PID 2892 wrote to memory of 4136 2892 c842266.exe 84 PID 2892 wrote to memory of 4136 2892 c842266.exe 84 PID 4136 wrote to memory of 3212 4136 m6822.exe 85 PID 4136 wrote to memory of 3212 4136 m6822.exe 85 PID 4136 wrote to memory of 3212 4136 m6822.exe 85 PID 3212 wrote to memory of 3720 3212 nhhbbb.exe 86 PID 3212 wrote to memory of 3720 3212 nhhbbb.exe 86 PID 3212 wrote to memory of 3720 3212 nhhbbb.exe 86 PID 3720 wrote to memory of 2152 3720 nhnhbb.exe 87 PID 3720 wrote to memory of 2152 3720 nhnhbb.exe 87 PID 3720 wrote to memory of 2152 3720 nhnhbb.exe 87 PID 2152 wrote to memory of 4676 2152 dvpjd.exe 89 PID 2152 wrote to memory of 4676 2152 dvpjd.exe 89 PID 2152 wrote to memory of 4676 2152 dvpjd.exe 89 PID 4676 wrote to memory of 2020 4676 480088.exe 90 PID 4676 wrote to memory of 2020 4676 480088.exe 90 PID 4676 wrote to memory of 2020 4676 480088.exe 90 PID 2020 wrote to memory of 2272 2020 tnnnhn.exe 91 PID 2020 wrote to memory of 2272 2020 tnnnhn.exe 91 PID 2020 wrote to memory of 2272 2020 tnnnhn.exe 91 PID 2272 wrote to memory of 212 2272 3tbtbt.exe 92 PID 2272 wrote to memory of 212 2272 3tbtbt.exe 92 PID 2272 wrote to memory of 212 2272 3tbtbt.exe 92 PID 212 wrote to memory of 768 212 00400.exe 93 PID 212 wrote to memory of 768 212 00400.exe 93 PID 212 wrote to memory of 768 212 00400.exe 93 PID 768 wrote to memory of 60 768 dvppp.exe 94 PID 768 wrote to memory of 60 768 dvppp.exe 94 PID 768 wrote to memory of 60 768 dvppp.exe 94 PID 60 wrote to memory of 928 60 462222.exe 95 PID 60 wrote to memory of 928 60 462222.exe 95 PID 60 wrote to memory of 928 60 462222.exe 95 PID 928 wrote to memory of 2980 928 224488.exe 96 PID 928 wrote to memory of 2980 928 224488.exe 96 PID 928 wrote to memory of 2980 928 224488.exe 96 PID 2980 wrote to memory of 4032 2980 rfrllll.exe 97 PID 2980 wrote to memory of 4032 2980 rfrllll.exe 97 PID 2980 wrote to memory of 4032 2980 rfrllll.exe 97 PID 4032 wrote to memory of 4216 4032 g2848.exe 99 PID 4032 wrote to memory of 4216 4032 g2848.exe 99 PID 4032 wrote to memory of 4216 4032 g2848.exe 99 PID 4216 wrote to memory of 4660 4216 o400448.exe 100 PID 4216 wrote to memory of 4660 4216 o400448.exe 100 PID 4216 wrote to memory of 4660 4216 o400448.exe 100 PID 4660 wrote to memory of 2868 4660 htbbhh.exe 101 PID 4660 wrote to memory of 2868 4660 htbbhh.exe 101 PID 4660 wrote to memory of 2868 4660 htbbhh.exe 101 PID 2868 wrote to memory of 3332 2868 1jvpv.exe 102 PID 2868 wrote to memory of 3332 2868 1jvpv.exe 102 PID 2868 wrote to memory of 3332 2868 1jvpv.exe 102 PID 3332 wrote to memory of 3520 3332 jpvdp.exe 103 PID 3332 wrote to memory of 3520 3332 jpvdp.exe 103 PID 3332 wrote to memory of 3520 3332 jpvdp.exe 103 PID 3520 wrote to memory of 1104 3520 vpppp.exe 105 PID 3520 wrote to memory of 1104 3520 vpppp.exe 105 PID 3520 wrote to memory of 1104 3520 vpppp.exe 105 PID 1104 wrote to memory of 412 1104 lxxxrrr.exe 106 PID 1104 wrote to memory of 412 1104 lxxxrrr.exe 106 PID 1104 wrote to memory of 412 1104 lxxxrrr.exe 106 PID 412 wrote to memory of 5060 412 68666.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe"C:\Users\Admin\AppData\Local\Temp\d2b32bf0d2bc5dd9c2900b7000365d7e34f01f80ff436754bd7f9e21a299b3fc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\c842266.exec:\c842266.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\m6822.exec:\m6822.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
\??\c:\nhhbbb.exec:\nhhbbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
\??\c:\nhnhbb.exec:\nhnhbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\dvpjd.exec:\dvpjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\480088.exec:\480088.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\tnnnhn.exec:\tnnnhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\3tbtbt.exec:\3tbtbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\00400.exec:\00400.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\dvppp.exec:\dvppp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
\??\c:\462222.exec:\462222.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
\??\c:\224488.exec:\224488.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\rfrllll.exec:\rfrllll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\g2848.exec:\g2848.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
\??\c:\o400448.exec:\o400448.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
\??\c:\htbbhh.exec:\htbbhh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\1jvpv.exec:\1jvpv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\jpvdp.exec:\jpvdp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
\??\c:\vpppp.exec:\vpppp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\lxxxrrr.exec:\lxxxrrr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\68666.exec:\68666.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
\??\c:\jjvjv.exec:\jjvjv.exe23⤵
- Executes dropped EXE
PID:5060 -
\??\c:\g6608.exec:\g6608.exe24⤵
- Executes dropped EXE
PID:3348 -
\??\c:\xflxllf.exec:\xflxllf.exe25⤵
- Executes dropped EXE
PID:4616 -
\??\c:\nhhbtt.exec:\nhhbtt.exe26⤵
- Executes dropped EXE
PID:1252 -
\??\c:\2664260.exec:\2664260.exe27⤵
- Executes dropped EXE
PID:2264 -
\??\c:\206662.exec:\206662.exe28⤵
- Executes dropped EXE
PID:1972 -
\??\c:\flrllfr.exec:\flrllfr.exe29⤵
- Executes dropped EXE
PID:1016 -
\??\c:\9rrlfxr.exec:\9rrlfxr.exe30⤵
- Executes dropped EXE
PID:2912 -
\??\c:\q22660.exec:\q22660.exe31⤵
- Executes dropped EXE
PID:3948 -
\??\c:\840422.exec:\840422.exe32⤵
- Executes dropped EXE
PID:2488 -
\??\c:\5hhttn.exec:\5hhttn.exe33⤵
- Executes dropped EXE
PID:1028 -
\??\c:\vpjvj.exec:\vpjvj.exe34⤵
- Executes dropped EXE
PID:4548 -
\??\c:\g0268.exec:\g0268.exe35⤵
- Executes dropped EXE
PID:2228 -
\??\c:\nhtntn.exec:\nhtntn.exe36⤵
- Executes dropped EXE
PID:1932 -
\??\c:\fffllxf.exec:\fffllxf.exe37⤵
- Executes dropped EXE
PID:2640 -
\??\c:\266024.exec:\266024.exe38⤵
- Executes dropped EXE
PID:4476 -
\??\c:\42268.exec:\42268.exe39⤵
- Executes dropped EXE
PID:960 -
\??\c:\8026860.exec:\8026860.exe40⤵
- Executes dropped EXE
PID:3060 -
\??\c:\tnhthn.exec:\tnhthn.exe41⤵
- Executes dropped EXE
PID:4460 -
\??\c:\28620.exec:\28620.exe42⤵
- Executes dropped EXE
PID:1848 -
\??\c:\jdvjd.exec:\jdvjd.exe43⤵
- Executes dropped EXE
PID:1092 -
\??\c:\0666442.exec:\0666442.exe44⤵
- Executes dropped EXE
PID:116 -
\??\c:\xfflxxr.exec:\xfflxxr.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5032 -
\??\c:\826826.exec:\826826.exe46⤵
- Executes dropped EXE
PID:5004 -
\??\c:\202600.exec:\202600.exe47⤵
- Executes dropped EXE
PID:3720 -
\??\c:\lxxrxrl.exec:\lxxrxrl.exe48⤵
- Executes dropped EXE
PID:4036 -
\??\c:\hnnnnn.exec:\hnnnnn.exe49⤵
- Executes dropped EXE
PID:2844 -
\??\c:\c826404.exec:\c826404.exe50⤵
- Executes dropped EXE
PID:4072 -
\??\c:\0284444.exec:\0284444.exe51⤵
- Executes dropped EXE
PID:1524 -
\??\c:\lflfrxx.exec:\lflfrxx.exe52⤵
- Executes dropped EXE
PID:3160 -
\??\c:\xrfxrfl.exec:\xrfxrfl.exe53⤵
- Executes dropped EXE
PID:2096 -
\??\c:\000482.exec:\000482.exe54⤵
- Executes dropped EXE
PID:4424 -
\??\c:\vpvjp.exec:\vpvjp.exe55⤵
- Executes dropped EXE
PID:3668 -
\??\c:\lxfxfxx.exec:\lxfxfxx.exe56⤵
- Executes dropped EXE
PID:768 -
\??\c:\48204.exec:\48204.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3796 -
\??\c:\a2820.exec:\a2820.exe58⤵
- Executes dropped EXE
PID:4464 -
\??\c:\88660.exec:\88660.exe59⤵
- Executes dropped EXE
PID:2260 -
\??\c:\bttnhh.exec:\bttnhh.exe60⤵
- Executes dropped EXE
PID:1856 -
\??\c:\q00400.exec:\q00400.exe61⤵
- Executes dropped EXE
PID:1212 -
\??\c:\bbnnhn.exec:\bbnnhn.exe62⤵
- Executes dropped EXE
PID:1180 -
\??\c:\222260.exec:\222260.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\fxllffl.exec:\fxllffl.exe64⤵
- Executes dropped EXE
PID:1044 -
\??\c:\u460662.exec:\u460662.exe65⤵
- Executes dropped EXE
PID:1580 -
\??\c:\djvpj.exec:\djvpj.exe66⤵PID:2748
-
\??\c:\vvddv.exec:\vvddv.exe67⤵PID:940
-
\??\c:\k24484.exec:\k24484.exe68⤵PID:3308
-
\??\c:\8466444.exec:\8466444.exe69⤵PID:3236
-
\??\c:\2648266.exec:\2648266.exe70⤵PID:4420
-
\??\c:\jdjpj.exec:\jdjpj.exe71⤵PID:4184
-
\??\c:\840448.exec:\840448.exe72⤵PID:5060
-
\??\c:\642266.exec:\642266.exe73⤵PID:3224
-
\??\c:\60480.exec:\60480.exe74⤵PID:3996
-
\??\c:\rrfxxfx.exec:\rrfxxfx.exe75⤵PID:112
-
\??\c:\xrrlffx.exec:\xrrlffx.exe76⤵PID:5028
-
\??\c:\ddjdv.exec:\ddjdv.exe77⤵PID:4380
-
\??\c:\3djjv.exec:\3djjv.exe78⤵PID:4640
-
\??\c:\0286048.exec:\0286048.exe79⤵PID:4808
-
\??\c:\jdddv.exec:\jdddv.exe80⤵PID:4888
-
\??\c:\thhnbn.exec:\thhnbn.exe81⤵PID:4472
-
\??\c:\c684440.exec:\c684440.exe82⤵PID:3808
-
\??\c:\02448.exec:\02448.exe83⤵PID:3088
-
\??\c:\9lrrrxx.exec:\9lrrrxx.exe84⤵PID:1004
-
\??\c:\0288888.exec:\0288888.exe85⤵PID:8
-
\??\c:\hhnbtt.exec:\hhnbtt.exe86⤵PID:5012
-
\??\c:\9btnhb.exec:\9btnhb.exe87⤵PID:2792
-
\??\c:\668622.exec:\668622.exe88⤵PID:448
-
\??\c:\nhbtbh.exec:\nhbtbh.exe89⤵PID:2220
-
\??\c:\djdjj.exec:\djdjj.exe90⤵
- System Location Discovery: System Language Discovery
PID:4712 -
\??\c:\vpjdv.exec:\vpjdv.exe91⤵PID:4468
-
\??\c:\pjjpj.exec:\pjjpj.exe92⤵PID:3060
-
\??\c:\68208.exec:\68208.exe93⤵PID:4460
-
\??\c:\004000.exec:\004000.exe94⤵PID:1848
-
\??\c:\vpjjj.exec:\vpjjj.exe95⤵PID:3144
-
\??\c:\dpjdv.exec:\dpjdv.exe96⤵PID:116
-
\??\c:\2428666.exec:\2428666.exe97⤵PID:4948
-
\??\c:\tntbtt.exec:\tntbtt.exe98⤵PID:4028
-
\??\c:\xxxxxfl.exec:\xxxxxfl.exe99⤵PID:436
-
\??\c:\w28882.exec:\w28882.exe100⤵PID:2152
-
\??\c:\fxrrfrr.exec:\fxrrfrr.exe101⤵PID:2460
-
\??\c:\pjddv.exec:\pjddv.exe102⤵PID:4128
-
\??\c:\w06000.exec:\w06000.exe103⤵PID:2020
-
\??\c:\484044.exec:\484044.exe104⤵PID:2208
-
\??\c:\6064846.exec:\6064846.exe105⤵PID:3044
-
\??\c:\ppdpj.exec:\ppdpj.exe106⤵PID:3052
-
\??\c:\k68882.exec:\k68882.exe107⤵PID:3424
-
\??\c:\fxxxxxx.exec:\fxxxxxx.exe108⤵PID:2428
-
\??\c:\jdddv.exec:\jdddv.exe109⤵PID:4572
-
\??\c:\vvddp.exec:\vvddp.exe110⤵PID:1508
-
\??\c:\hhbtnt.exec:\hhbtnt.exe111⤵PID:2856
-
\??\c:\042828.exec:\042828.exe112⤵PID:4836
-
\??\c:\jjddp.exec:\jjddp.exe113⤵PID:4216
-
\??\c:\pjjjv.exec:\pjjjv.exe114⤵PID:2464
-
\??\c:\vvppd.exec:\vvppd.exe115⤵PID:3472
-
\??\c:\rxrxrlr.exec:\rxrxrlr.exe116⤵PID:3392
-
\??\c:\u426888.exec:\u426888.exe117⤵PID:3780
-
\??\c:\2662648.exec:\2662648.exe118⤵PID:1912
-
\??\c:\xflfxxx.exec:\xflfxxx.exe119⤵PID:2748
-
\??\c:\484044.exec:\484044.exe120⤵PID:3408
-
\??\c:\vvddp.exec:\vvddp.exe121⤵PID:4692
-
\??\c:\4240828.exec:\4240828.exe122⤵PID:4648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-