Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe
Resource
win7-20241010-en
General
-
Target
0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe
-
Size
83KB
-
MD5
dde42bb5a1d2c319d00552409377114f
-
SHA1
a4521c029656ccdc21173d2f3ab9eb6de23e0bb7
-
SHA256
0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55
-
SHA512
8e449cd8d235c3cbf87aab4e0d3e74956be7e9b5d956dce0c1a879fec6ab12626123265b7cefd7b397b72edcaf0e07511394dd129791efeec1e8756da45983dd
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QJf:ymb3NkkiQ3mdBjFIIp9L9QrrA86
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/5020-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4624-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2020-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3784-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3292-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4852-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3152-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4388-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/644-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3792-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3724-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4348-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4912 jpjpd.exe 4028 djpjd.exe 4624 664644.exe 2196 48888.exe 2020 240040.exe 3784 rxrlfff.exe 3624 xrlllfx.exe 4860 3vddv.exe 3292 hhnbbb.exe 3436 bhhthn.exe 2556 26806.exe 2812 jdjjd.exe 4852 248660.exe 3152 00426.exe 3092 68068.exe 212 9bnttb.exe 3096 vvjpp.exe 548 pdddv.exe 4388 hnbtnn.exe 644 0244888.exe 1528 vvdjj.exe 3024 hhhhhb.exe 1384 882802.exe 3792 2404486.exe 3740 w28822.exe 3724 vjjpd.exe 692 m2464.exe 4136 q24444.exe 3524 5rffllx.exe 2240 jjjpj.exe 4348 66804.exe 4992 thttth.exe 4100 64428.exe 4880 286862.exe 672 228862.exe 3324 thtnbb.exe 1704 8260826.exe 4868 002226.exe 3352 lrxflrx.exe 4472 608848.exe 2888 ppvpj.exe 2360 8842284.exe 4912 5nnnnn.exe 4652 6060444.exe 3636 2062288.exe 3076 flffffx.exe 116 82420.exe 4556 44004.exe 5068 1pvvp.exe 2404 0244888.exe 3476 6022440.exe 3624 828046.exe 3596 thbtbn.exe 1996 xrlflxl.exe 2248 hbhhbb.exe 4820 ppddj.exe 3176 tttntt.exe 2164 w62266.exe 4560 btbbtb.exe 5092 620682.exe 2504 ffrxffx.exe 4288 ntntbh.exe 3536 vvvvp.exe 432 80642.exe -
resource yara_rule behavioral2/memory/5020-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5020-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2020-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3784-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3292-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4852-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3152-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4388-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/644-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3724-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 644226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lrfrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2206808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2688440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxlxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w28648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0800000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c682666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 624888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48460.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4912 5020 0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe 83 PID 5020 wrote to memory of 4912 5020 0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe 83 PID 5020 wrote to memory of 4912 5020 0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe 83 PID 4912 wrote to memory of 4028 4912 jpjpd.exe 84 PID 4912 wrote to memory of 4028 4912 jpjpd.exe 84 PID 4912 wrote to memory of 4028 4912 jpjpd.exe 84 PID 4028 wrote to memory of 4624 4028 djpjd.exe 85 PID 4028 wrote to memory of 4624 4028 djpjd.exe 85 PID 4028 wrote to memory of 4624 4028 djpjd.exe 85 PID 4624 wrote to memory of 2196 4624 664644.exe 86 PID 4624 wrote to memory of 2196 4624 664644.exe 86 PID 4624 wrote to memory of 2196 4624 664644.exe 86 PID 2196 wrote to memory of 2020 2196 48888.exe 87 PID 2196 wrote to memory of 2020 2196 48888.exe 87 PID 2196 wrote to memory of 2020 2196 48888.exe 87 PID 2020 wrote to memory of 3784 2020 240040.exe 88 PID 2020 wrote to memory of 3784 2020 240040.exe 88 PID 2020 wrote to memory of 3784 2020 240040.exe 88 PID 3784 wrote to memory of 3624 3784 rxrlfff.exe 89 PID 3784 wrote to memory of 3624 3784 rxrlfff.exe 89 PID 3784 wrote to memory of 3624 3784 rxrlfff.exe 89 PID 3624 wrote to memory of 4860 3624 xrlllfx.exe 90 PID 3624 wrote to memory of 4860 3624 xrlllfx.exe 90 PID 3624 wrote to memory of 4860 3624 xrlllfx.exe 90 PID 4860 wrote to memory of 3292 4860 3vddv.exe 91 PID 4860 wrote to memory of 3292 4860 3vddv.exe 91 PID 4860 wrote to memory of 3292 4860 3vddv.exe 91 PID 3292 wrote to memory of 3436 3292 hhnbbb.exe 92 PID 3292 wrote to memory of 3436 3292 hhnbbb.exe 92 PID 3292 wrote to memory of 3436 3292 hhnbbb.exe 92 PID 3436 wrote to memory of 2556 3436 bhhthn.exe 93 PID 3436 wrote to memory of 2556 3436 bhhthn.exe 93 PID 3436 wrote to memory of 2556 3436 bhhthn.exe 93 PID 2556 wrote to memory of 2812 2556 26806.exe 94 PID 2556 wrote to memory of 2812 2556 26806.exe 94 PID 2556 wrote to memory of 2812 2556 26806.exe 94 PID 2812 wrote to memory of 4852 2812 jdjjd.exe 95 PID 2812 wrote to memory of 4852 2812 jdjjd.exe 95 PID 2812 wrote to memory of 4852 2812 jdjjd.exe 95 PID 4852 wrote to memory of 3152 4852 248660.exe 96 PID 4852 wrote to memory of 3152 4852 248660.exe 96 PID 4852 wrote to memory of 3152 4852 248660.exe 96 PID 3152 wrote to memory of 3092 3152 00426.exe 97 PID 3152 wrote to memory of 3092 3152 00426.exe 97 PID 3152 wrote to memory of 3092 3152 00426.exe 97 PID 3092 wrote to memory of 212 3092 68068.exe 98 PID 3092 wrote to memory of 212 3092 68068.exe 98 PID 3092 wrote to memory of 212 3092 68068.exe 98 PID 212 wrote to memory of 3096 212 9bnttb.exe 99 PID 212 wrote to memory of 3096 212 9bnttb.exe 99 PID 212 wrote to memory of 3096 212 9bnttb.exe 99 PID 3096 wrote to memory of 548 3096 vvjpp.exe 100 PID 3096 wrote to memory of 548 3096 vvjpp.exe 100 PID 3096 wrote to memory of 548 3096 vvjpp.exe 100 PID 548 wrote to memory of 4388 548 pdddv.exe 101 PID 548 wrote to memory of 4388 548 pdddv.exe 101 PID 548 wrote to memory of 4388 548 pdddv.exe 101 PID 4388 wrote to memory of 644 4388 hnbtnn.exe 102 PID 4388 wrote to memory of 644 4388 hnbtnn.exe 102 PID 4388 wrote to memory of 644 4388 hnbtnn.exe 102 PID 644 wrote to memory of 1528 644 0244888.exe 103 PID 644 wrote to memory of 1528 644 0244888.exe 103 PID 644 wrote to memory of 1528 644 0244888.exe 103 PID 1528 wrote to memory of 3024 1528 vvdjj.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe"C:\Users\Admin\AppData\Local\Temp\0e07450946f752516b4dc5143a3b4bf62d4e1a6dd38d65071c06b92d41ae5f55.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\jpjpd.exec:\jpjpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\djpjd.exec:\djpjd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\664644.exec:\664644.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
\??\c:\48888.exec:\48888.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\240040.exec:\240040.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\rxrlfff.exec:\rxrlfff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
\??\c:\xrlllfx.exec:\xrlllfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\3vddv.exec:\3vddv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\hhnbbb.exec:\hhnbbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
\??\c:\bhhthn.exec:\bhhthn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\26806.exec:\26806.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\jdjjd.exec:\jdjjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\248660.exec:\248660.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\00426.exec:\00426.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
\??\c:\68068.exec:\68068.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\9bnttb.exec:\9bnttb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\vvjpp.exec:\vvjpp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\pdddv.exec:\pdddv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\hnbtnn.exec:\hnbtnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
\??\c:\0244888.exec:\0244888.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\vvdjj.exec:\vvdjj.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\hhhhhb.exec:\hhhhhb.exe23⤵
- Executes dropped EXE
PID:3024 -
\??\c:\882802.exec:\882802.exe24⤵
- Executes dropped EXE
PID:1384 -
\??\c:\2404486.exec:\2404486.exe25⤵
- Executes dropped EXE
PID:3792 -
\??\c:\w28822.exec:\w28822.exe26⤵
- Executes dropped EXE
PID:3740 -
\??\c:\vjjpd.exec:\vjjpd.exe27⤵
- Executes dropped EXE
PID:3724 -
\??\c:\m2464.exec:\m2464.exe28⤵
- Executes dropped EXE
PID:692 -
\??\c:\q24444.exec:\q24444.exe29⤵
- Executes dropped EXE
PID:4136 -
\??\c:\5rffllx.exec:\5rffllx.exe30⤵
- Executes dropped EXE
PID:3524 -
\??\c:\jjjpj.exec:\jjjpj.exe31⤵
- Executes dropped EXE
PID:2240 -
\??\c:\66804.exec:\66804.exe32⤵
- Executes dropped EXE
PID:4348 -
\??\c:\thttth.exec:\thttth.exe33⤵
- Executes dropped EXE
PID:4992 -
\??\c:\64428.exec:\64428.exe34⤵
- Executes dropped EXE
PID:4100 -
\??\c:\286862.exec:\286862.exe35⤵
- Executes dropped EXE
PID:4880 -
\??\c:\228862.exec:\228862.exe36⤵
- Executes dropped EXE
PID:672 -
\??\c:\thtnbb.exec:\thtnbb.exe37⤵
- Executes dropped EXE
PID:3324 -
\??\c:\8260826.exec:\8260826.exe38⤵
- Executes dropped EXE
PID:1704 -
\??\c:\002226.exec:\002226.exe39⤵
- Executes dropped EXE
PID:4868 -
\??\c:\lrxflrx.exec:\lrxflrx.exe40⤵
- Executes dropped EXE
PID:3352 -
\??\c:\608848.exec:\608848.exe41⤵
- Executes dropped EXE
PID:4472 -
\??\c:\ppvpj.exec:\ppvpj.exe42⤵
- Executes dropped EXE
PID:2888 -
\??\c:\8842284.exec:\8842284.exe43⤵
- Executes dropped EXE
PID:2360 -
\??\c:\5nnnnn.exec:\5nnnnn.exe44⤵
- Executes dropped EXE
PID:4912 -
\??\c:\6060444.exec:\6060444.exe45⤵
- Executes dropped EXE
PID:4652 -
\??\c:\2062288.exec:\2062288.exe46⤵
- Executes dropped EXE
PID:3636 -
\??\c:\flffffx.exec:\flffffx.exe47⤵
- Executes dropped EXE
PID:3076 -
\??\c:\82420.exec:\82420.exe48⤵
- Executes dropped EXE
PID:116 -
\??\c:\44004.exec:\44004.exe49⤵
- Executes dropped EXE
PID:4556 -
\??\c:\1pvvp.exec:\1pvvp.exe50⤵
- Executes dropped EXE
PID:5068 -
\??\c:\0244888.exec:\0244888.exe51⤵
- Executes dropped EXE
PID:2404 -
\??\c:\6022440.exec:\6022440.exe52⤵
- Executes dropped EXE
PID:3476 -
\??\c:\828046.exec:\828046.exe53⤵
- Executes dropped EXE
PID:3624 -
\??\c:\thbtbn.exec:\thbtbn.exe54⤵
- Executes dropped EXE
PID:3596 -
\??\c:\xrlflxl.exec:\xrlflxl.exe55⤵
- Executes dropped EXE
PID:1996 -
\??\c:\hbhhbb.exec:\hbhhbb.exe56⤵
- Executes dropped EXE
PID:2248 -
\??\c:\ppddj.exec:\ppddj.exe57⤵
- Executes dropped EXE
PID:4820 -
\??\c:\tttntt.exec:\tttntt.exe58⤵
- Executes dropped EXE
PID:3176 -
\??\c:\w62266.exec:\w62266.exe59⤵
- Executes dropped EXE
PID:2164 -
\??\c:\btbbtb.exec:\btbbtb.exe60⤵
- Executes dropped EXE
PID:4560 -
\??\c:\620682.exec:\620682.exe61⤵
- Executes dropped EXE
PID:5092 -
\??\c:\ffrxffx.exec:\ffrxffx.exe62⤵
- Executes dropped EXE
PID:2504 -
\??\c:\ntntbh.exec:\ntntbh.exe63⤵
- Executes dropped EXE
PID:4288 -
\??\c:\vvvvp.exec:\vvvvp.exe64⤵
- Executes dropped EXE
PID:3536 -
\??\c:\80642.exec:\80642.exe65⤵
- Executes dropped EXE
PID:432 -
\??\c:\60446.exec:\60446.exe66⤵PID:1672
-
\??\c:\pjjjp.exec:\pjjjp.exe67⤵PID:2260
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe68⤵PID:5096
-
\??\c:\2688440.exec:\2688440.exe69⤵
- System Location Discovery: System Language Discovery
PID:4504 -
\??\c:\4886064.exec:\4886064.exe70⤵PID:1888
-
\??\c:\2408226.exec:\2408226.exe71⤵PID:1904
-
\??\c:\2400000.exec:\2400000.exe72⤵PID:4060
-
\??\c:\w68804.exec:\w68804.exe73⤵PID:3568
-
\??\c:\djppp.exec:\djppp.exe74⤵PID:4020
-
\??\c:\dvdvp.exec:\dvdvp.exe75⤵PID:4956
-
\??\c:\thhbtn.exec:\thhbtn.exe76⤵PID:3164
-
\??\c:\ntthnt.exec:\ntthnt.exe77⤵PID:3820
-
\??\c:\ffrrllf.exec:\ffrrllf.exe78⤵PID:4936
-
\??\c:\624000.exec:\624000.exe79⤵PID:528
-
\??\c:\3ntnhh.exec:\3ntnhh.exe80⤵PID:800
-
\??\c:\dpppp.exec:\dpppp.exe81⤵PID:3524
-
\??\c:\bhhhbb.exec:\bhhhbb.exe82⤵PID:2428
-
\??\c:\djjjj.exec:\djjjj.exe83⤵PID:1988
-
\??\c:\fxxxfrl.exec:\fxxxfrl.exe84⤵PID:3640
-
\??\c:\o422884.exec:\o422884.exe85⤵PID:4832
-
\??\c:\68004.exec:\68004.exe86⤵PID:2368
-
\??\c:\7xxxllr.exec:\7xxxllr.exe87⤵PID:3528
-
\??\c:\6222666.exec:\6222666.exe88⤵PID:2772
-
\??\c:\28604.exec:\28604.exe89⤵PID:2676
-
\??\c:\djppp.exec:\djppp.exe90⤵PID:2680
-
\??\c:\w68862.exec:\w68862.exe91⤵PID:4160
-
\??\c:\4468246.exec:\4468246.exe92⤵PID:4844
-
\??\c:\7rrfllx.exec:\7rrfllx.exe93⤵PID:4472
-
\??\c:\c404488.exec:\c404488.exe94⤵PID:4436
-
\??\c:\822828.exec:\822828.exe95⤵PID:488
-
\??\c:\rffxrxr.exec:\rffxrxr.exe96⤵PID:4028
-
\??\c:\lxlxxrx.exec:\lxlxxrx.exe97⤵PID:4652
-
\??\c:\426288.exec:\426288.exe98⤵PID:1444
-
\??\c:\600082.exec:\600082.exe99⤵PID:224
-
\??\c:\480064.exec:\480064.exe100⤵PID:116
-
\??\c:\pjpjd.exec:\pjpjd.exe101⤵PID:4224
-
\??\c:\042886.exec:\042886.exe102⤵PID:1128
-
\??\c:\60664.exec:\60664.exe103⤵PID:2404
-
\??\c:\s0824.exec:\s0824.exe104⤵PID:4860
-
\??\c:\hhhbtt.exec:\hhhbtt.exe105⤵PID:3624
-
\??\c:\jdddv.exec:\jdddv.exe106⤵PID:2468
-
\??\c:\u460448.exec:\u460448.exe107⤵PID:1996
-
\??\c:\u022268.exec:\u022268.exe108⤵PID:2560
-
\??\c:\62882.exec:\62882.exe109⤵PID:1900
-
\??\c:\862206.exec:\862206.exe110⤵PID:3176
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe111⤵PID:2868
-
\??\c:\nbhtbt.exec:\nbhtbt.exe112⤵PID:3152
-
\??\c:\24666.exec:\24666.exe113⤵PID:2664
-
\??\c:\46886.exec:\46886.exe114⤵PID:4968
-
\??\c:\hbnhtb.exec:\hbnhtb.exe115⤵PID:1656
-
\??\c:\dvvvp.exec:\dvvvp.exe116⤵PID:4816
-
\??\c:\llxrrrx.exec:\llxrrrx.exe117⤵PID:1976
-
\??\c:\202828.exec:\202828.exe118⤵PID:2648
-
\??\c:\frrrfll.exec:\frrrfll.exe119⤵PID:2424
-
\??\c:\400040.exec:\400040.exe120⤵PID:1096
-
\??\c:\46222.exec:\46222.exe121⤵PID:4124
-
\??\c:\vjpjv.exec:\vjpjv.exe122⤵PID:3068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-