Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe
Resource
win7-20240903-en
General
-
Target
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe
-
Size
81KB
-
MD5
d2f821cac4d7cb591b05b998eeb065d8
-
SHA1
c5f55765f4cb8a55895509b7eb30b78879a8e40c
-
SHA256
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c
-
SHA512
7b2217ed103eea8f69b45f7ef46887970b5209fde5306ff0b316bf00bf83ae6fef53362119c20b8fb7632cd0ff5f37f2d75a91f92703ee6e0cf2de7488584894
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qoHrnZHaY3DLELsn8:ymb3NkkiQ3mdBjFIj+qYjhaoLD8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2332-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2304-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2836-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/888-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4228-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1184-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3540-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1132-56-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1132-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2260-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2140-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4176-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4144-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2972-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2632-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3376-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/824-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1112-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2304 468226.exe 2836 40844.exe 212 2066444.exe 4236 4282266.exe 888 068444.exe 4228 w00824.exe 1132 c622666.exe 5100 66226.exe 1184 84626.exe 3540 xxlrrff.exe 2912 e66000.exe 2260 2604662.exe 2140 440482.exe 4176 rxxlxxx.exe 4144 tnnhhh.exe 3908 q20404.exe 3172 e24482.exe 5060 482660.exe 4900 hntnhh.exe 1656 m0048.exe 2972 20022.exe 2632 bnttnn.exe 3376 3xfxxxx.exe 3476 jdddd.exe 440 tbhtnn.exe 3268 jdpjd.exe 368 628260.exe 824 844488.exe 3224 pvvvp.exe 1112 26664.exe 2076 pdjpj.exe 3260 2400448.exe 1648 824400.exe 4764 60608.exe 1140 046644.exe 3968 4248886.exe 400 jdvvd.exe 1572 406222.exe 820 200044.exe 3840 644488.exe 3916 206004.exe 3144 pddvp.exe 2284 xffxrrl.exe 4684 pjddv.exe 220 jvvvv.exe 2532 tbbthh.exe 3068 4480628.exe 1380 84482.exe 544 624440.exe 2148 w24888.exe 1468 bbbbbb.exe 2424 vpjjv.exe 4572 llrxxxx.exe 2096 4066000.exe 3904 bhhbbb.exe 404 262262.exe 4612 8244264.exe 2416 6004844.exe 2688 jdjdj.exe 2448 fxfxxrr.exe 4168 vvpjd.exe 4172 1jjvp.exe 2292 6082282.exe 3716 ffrlfxr.exe -
resource yara_rule behavioral2/memory/2332-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2332-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4236-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2836-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/888-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3540-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1132-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2260-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2140-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4144-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2972-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2632-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3376-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/824-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1112-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 446600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k66600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0022666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 040000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4400644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 002260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6000448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 662260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c404222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtht.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2304 2332 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe 82 PID 2332 wrote to memory of 2304 2332 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe 82 PID 2332 wrote to memory of 2304 2332 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe 82 PID 2304 wrote to memory of 2836 2304 468226.exe 83 PID 2304 wrote to memory of 2836 2304 468226.exe 83 PID 2304 wrote to memory of 2836 2304 468226.exe 83 PID 2836 wrote to memory of 212 2836 40844.exe 84 PID 2836 wrote to memory of 212 2836 40844.exe 84 PID 2836 wrote to memory of 212 2836 40844.exe 84 PID 212 wrote to memory of 4236 212 2066444.exe 85 PID 212 wrote to memory of 4236 212 2066444.exe 85 PID 212 wrote to memory of 4236 212 2066444.exe 85 PID 4236 wrote to memory of 888 4236 4282266.exe 86 PID 4236 wrote to memory of 888 4236 4282266.exe 86 PID 4236 wrote to memory of 888 4236 4282266.exe 86 PID 888 wrote to memory of 4228 888 068444.exe 87 PID 888 wrote to memory of 4228 888 068444.exe 87 PID 888 wrote to memory of 4228 888 068444.exe 87 PID 4228 wrote to memory of 1132 4228 w00824.exe 88 PID 4228 wrote to memory of 1132 4228 w00824.exe 88 PID 4228 wrote to memory of 1132 4228 w00824.exe 88 PID 1132 wrote to memory of 5100 1132 c622666.exe 89 PID 1132 wrote to memory of 5100 1132 c622666.exe 89 PID 1132 wrote to memory of 5100 1132 c622666.exe 89 PID 5100 wrote to memory of 1184 5100 66226.exe 90 PID 5100 wrote to memory of 1184 5100 66226.exe 90 PID 5100 wrote to memory of 1184 5100 66226.exe 90 PID 1184 wrote to memory of 3540 1184 84626.exe 91 PID 1184 wrote to memory of 3540 1184 84626.exe 91 PID 1184 wrote to memory of 3540 1184 84626.exe 91 PID 3540 wrote to memory of 2912 3540 xxlrrff.exe 92 PID 3540 wrote to memory of 2912 3540 xxlrrff.exe 92 PID 3540 wrote to memory of 2912 3540 xxlrrff.exe 92 PID 2912 wrote to memory of 2260 2912 e66000.exe 93 PID 2912 wrote to memory of 2260 2912 e66000.exe 93 PID 2912 wrote to memory of 2260 2912 e66000.exe 93 PID 2260 wrote to memory of 2140 2260 2604662.exe 94 PID 2260 wrote to memory of 2140 2260 2604662.exe 94 PID 2260 wrote to memory of 2140 2260 2604662.exe 94 PID 2140 wrote to memory of 4176 2140 440482.exe 95 PID 2140 wrote to memory of 4176 2140 440482.exe 95 PID 2140 wrote to memory of 4176 2140 440482.exe 95 PID 4176 wrote to memory of 4144 4176 rxxlxxx.exe 96 PID 4176 wrote to memory of 4144 4176 rxxlxxx.exe 96 PID 4176 wrote to memory of 4144 4176 rxxlxxx.exe 96 PID 4144 wrote to memory of 3908 4144 tnnhhh.exe 97 PID 4144 wrote to memory of 3908 4144 tnnhhh.exe 97 PID 4144 wrote to memory of 3908 4144 tnnhhh.exe 97 PID 3908 wrote to memory of 3172 3908 q20404.exe 98 PID 3908 wrote to memory of 3172 3908 q20404.exe 98 PID 3908 wrote to memory of 3172 3908 q20404.exe 98 PID 3172 wrote to memory of 5060 3172 e24482.exe 99 PID 3172 wrote to memory of 5060 3172 e24482.exe 99 PID 3172 wrote to memory of 5060 3172 e24482.exe 99 PID 5060 wrote to memory of 4900 5060 482660.exe 100 PID 5060 wrote to memory of 4900 5060 482660.exe 100 PID 5060 wrote to memory of 4900 5060 482660.exe 100 PID 4900 wrote to memory of 1656 4900 hntnhh.exe 101 PID 4900 wrote to memory of 1656 4900 hntnhh.exe 101 PID 4900 wrote to memory of 1656 4900 hntnhh.exe 101 PID 1656 wrote to memory of 2972 1656 m0048.exe 102 PID 1656 wrote to memory of 2972 1656 m0048.exe 102 PID 1656 wrote to memory of 2972 1656 m0048.exe 102 PID 2972 wrote to memory of 2632 2972 20022.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe"C:\Users\Admin\AppData\Local\Temp\e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\468226.exec:\468226.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\40844.exec:\40844.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\2066444.exec:\2066444.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\4282266.exec:\4282266.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\068444.exec:\068444.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\w00824.exec:\w00824.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\c622666.exec:\c622666.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\66226.exec:\66226.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\84626.exec:\84626.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\xxlrrff.exec:\xxlrrff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
\??\c:\e66000.exec:\e66000.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\2604662.exec:\2604662.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\440482.exec:\440482.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\rxxlxxx.exec:\rxxlxxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\tnnhhh.exec:\tnnhhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\q20404.exec:\q20404.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\e24482.exec:\e24482.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
\??\c:\482660.exec:\482660.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\hntnhh.exec:\hntnhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\m0048.exec:\m0048.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\20022.exec:\20022.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\bnttnn.exec:\bnttnn.exe23⤵
- Executes dropped EXE
PID:2632 -
\??\c:\3xfxxxx.exec:\3xfxxxx.exe24⤵
- Executes dropped EXE
PID:3376 -
\??\c:\jdddd.exec:\jdddd.exe25⤵
- Executes dropped EXE
PID:3476 -
\??\c:\tbhtnn.exec:\tbhtnn.exe26⤵
- Executes dropped EXE
PID:440 -
\??\c:\jdpjd.exec:\jdpjd.exe27⤵
- Executes dropped EXE
PID:3268 -
\??\c:\628260.exec:\628260.exe28⤵
- Executes dropped EXE
PID:368 -
\??\c:\844488.exec:\844488.exe29⤵
- Executes dropped EXE
PID:824 -
\??\c:\pvvvp.exec:\pvvvp.exe30⤵
- Executes dropped EXE
PID:3224 -
\??\c:\26664.exec:\26664.exe31⤵
- Executes dropped EXE
PID:1112 -
\??\c:\pdjpj.exec:\pdjpj.exe32⤵
- Executes dropped EXE
PID:2076 -
\??\c:\2400448.exec:\2400448.exe33⤵
- Executes dropped EXE
PID:3260 -
\??\c:\824400.exec:\824400.exe34⤵
- Executes dropped EXE
PID:1648 -
\??\c:\60608.exec:\60608.exe35⤵
- Executes dropped EXE
PID:4764 -
\??\c:\046644.exec:\046644.exe36⤵
- Executes dropped EXE
PID:1140 -
\??\c:\4248886.exec:\4248886.exe37⤵
- Executes dropped EXE
PID:3968 -
\??\c:\jdvvd.exec:\jdvvd.exe38⤵
- Executes dropped EXE
PID:400 -
\??\c:\406222.exec:\406222.exe39⤵
- Executes dropped EXE
PID:1572 -
\??\c:\200044.exec:\200044.exe40⤵
- Executes dropped EXE
PID:820 -
\??\c:\644488.exec:\644488.exe41⤵
- Executes dropped EXE
PID:3840 -
\??\c:\206004.exec:\206004.exe42⤵
- Executes dropped EXE
PID:3916 -
\??\c:\pddvp.exec:\pddvp.exe43⤵
- Executes dropped EXE
PID:3144 -
\??\c:\xffxrrl.exec:\xffxrrl.exe44⤵
- Executes dropped EXE
PID:2284 -
\??\c:\pjddv.exec:\pjddv.exe45⤵
- Executes dropped EXE
PID:4684 -
\??\c:\jvvvv.exec:\jvvvv.exe46⤵
- Executes dropped EXE
PID:220 -
\??\c:\tbbthh.exec:\tbbthh.exe47⤵
- Executes dropped EXE
PID:2532 -
\??\c:\4480628.exec:\4480628.exe48⤵
- Executes dropped EXE
PID:3068 -
\??\c:\84482.exec:\84482.exe49⤵
- Executes dropped EXE
PID:1380 -
\??\c:\624440.exec:\624440.exe50⤵
- Executes dropped EXE
PID:544 -
\??\c:\w24888.exec:\w24888.exe51⤵
- Executes dropped EXE
PID:2148 -
\??\c:\bbbbbb.exec:\bbbbbb.exe52⤵
- Executes dropped EXE
PID:1468 -
\??\c:\vpjjv.exec:\vpjjv.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
\??\c:\llrxxxx.exec:\llrxxxx.exe54⤵
- Executes dropped EXE
PID:4572 -
\??\c:\4066000.exec:\4066000.exe55⤵
- Executes dropped EXE
PID:2096 -
\??\c:\bhhbbb.exec:\bhhbbb.exe56⤵
- Executes dropped EXE
PID:3904 -
\??\c:\262262.exec:\262262.exe57⤵
- Executes dropped EXE
PID:404 -
\??\c:\8244264.exec:\8244264.exe58⤵
- Executes dropped EXE
PID:4612 -
\??\c:\6004844.exec:\6004844.exe59⤵
- Executes dropped EXE
PID:2416 -
\??\c:\jdjdj.exec:\jdjdj.exe60⤵
- Executes dropped EXE
PID:2688 -
\??\c:\fxfxxrr.exec:\fxfxxrr.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448 -
\??\c:\vvpjd.exec:\vvpjd.exe62⤵
- Executes dropped EXE
PID:4168 -
\??\c:\1jjvp.exec:\1jjvp.exe63⤵
- Executes dropped EXE
PID:4172 -
\??\c:\6082282.exec:\6082282.exe64⤵
- Executes dropped EXE
PID:2292 -
\??\c:\ffrlfxr.exec:\ffrlfxr.exe65⤵
- Executes dropped EXE
PID:3716 -
\??\c:\nbnhtt.exec:\nbnhtt.exe66⤵PID:2388
-
\??\c:\frfxrxl.exec:\frfxrxl.exe67⤵PID:860
-
\??\c:\rlrlrxx.exec:\rlrlrxx.exe68⤵PID:904
-
\??\c:\2644642.exec:\2644642.exe69⤵PID:2452
-
\??\c:\6460044.exec:\6460044.exe70⤵PID:2512
-
\??\c:\jpdpd.exec:\jpdpd.exe71⤵PID:1600
-
\??\c:\40260.exec:\40260.exe72⤵PID:1496
-
\??\c:\rrxxllr.exec:\rrxxllr.exe73⤵PID:3872
-
\??\c:\btbtnn.exec:\btbtnn.exe74⤵PID:452
-
\??\c:\hhhhnn.exec:\hhhhnn.exe75⤵PID:2576
-
\??\c:\e66228.exec:\e66228.exe76⤵PID:3284
-
\??\c:\q44826.exec:\q44826.exe77⤵PID:4100
-
\??\c:\rllfrrl.exec:\rllfrrl.exe78⤵PID:1628
-
\??\c:\0622226.exec:\0622226.exe79⤵PID:3176
-
\??\c:\6282260.exec:\6282260.exe80⤵PID:3588
-
\??\c:\484888.exec:\484888.exe81⤵PID:3376
-
\??\c:\bnhthh.exec:\bnhthh.exe82⤵PID:3476
-
\??\c:\482862.exec:\482862.exe83⤵PID:1348
-
\??\c:\44662.exec:\44662.exe84⤵PID:3624
-
\??\c:\8226004.exec:\8226004.exe85⤵PID:3268
-
\??\c:\680402.exec:\680402.exe86⤵PID:660
-
\??\c:\tbbbbb.exec:\tbbbbb.exe87⤵PID:2256
-
\??\c:\c060448.exec:\c060448.exe88⤵PID:924
-
\??\c:\42448.exec:\42448.exe89⤵PID:1884
-
\??\c:\7jjdv.exec:\7jjdv.exe90⤵PID:1592
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe91⤵PID:3600
-
\??\c:\640444.exec:\640444.exe92⤵PID:1152
-
\??\c:\jjdvv.exec:\jjdvv.exe93⤵PID:1240
-
\??\c:\nnbtnb.exec:\nnbtnb.exe94⤵PID:3772
-
\??\c:\1hnhhh.exec:\1hnhhh.exe95⤵PID:3188
-
\??\c:\pdddv.exec:\pdddv.exe96⤵PID:3808
-
\??\c:\ppvjj.exec:\ppvjj.exe97⤵PID:3896
-
\??\c:\086004.exec:\086004.exe98⤵PID:5116
-
\??\c:\4026006.exec:\4026006.exe99⤵PID:4068
-
\??\c:\4466800.exec:\4466800.exe100⤵PID:2524
-
\??\c:\jdjdv.exec:\jdjdv.exe101⤵PID:3504
-
\??\c:\fxlfffl.exec:\fxlfffl.exe102⤵PID:2612
-
\??\c:\nnnnbb.exec:\nnnnbb.exe103⤵PID:4484
-
\??\c:\ddppv.exec:\ddppv.exe104⤵PID:2332
-
\??\c:\tttnbb.exec:\tttnbb.exe105⤵PID:3660
-
\??\c:\pjvpp.exec:\pjvpp.exe106⤵
- System Location Discovery: System Language Discovery
PID:2308 -
\??\c:\2860826.exec:\2860826.exe107⤵PID:560
-
\??\c:\o002682.exec:\o002682.exe108⤵PID:4016
-
\??\c:\k66600.exec:\k66600.exe109⤵
- System Location Discovery: System Language Discovery
PID:512 -
\??\c:\3pjdd.exec:\3pjdd.exe110⤵PID:4344
-
\??\c:\xlfxrrl.exec:\xlfxrrl.exe111⤵PID:436
-
\??\c:\hbtbbb.exec:\hbtbbb.exe112⤵PID:3472
-
\??\c:\bhtthn.exec:\bhtthn.exe113⤵PID:1280
-
\??\c:\62042.exec:\62042.exe114⤵PID:1980
-
\??\c:\2682600.exec:\2682600.exe115⤵PID:2448
-
\??\c:\7rxrrll.exec:\7rxrrll.exe116⤵PID:936
-
\??\c:\m2226.exec:\m2226.exe117⤵PID:4172
-
\??\c:\pjjdd.exec:\pjjdd.exe118⤵PID:2204
-
\??\c:\1nnhbb.exec:\1nnhbb.exe119⤵PID:3716
-
\??\c:\rllrffx.exec:\rllrffx.exe120⤵PID:2792
-
\??\c:\5dddv.exec:\5dddv.exe121⤵PID:2064
-
\??\c:\tttbtt.exec:\tttbtt.exe122⤵PID:2084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-