Analysis
-
max time kernel
149s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe
Resource
win7-20240903-en
General
-
Target
0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe
-
Size
83KB
-
MD5
1ba21cc120f0857bd04c038bc38d6b99
-
SHA1
5210a5dba10c2c06eeba04da14a432bad06bd464
-
SHA256
0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273
-
SHA512
b370fa16195e906f7a3c69a024199258c4983534a297c24924312e9fffed72860f3550eeea1c7a565af0a6b369f1e721bf919c986d7959db2c9497c5126bf648
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Qf:ymb3NkkiQ3mdBjFIIp9L9QrrA8I
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/4812-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1808-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2328-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/964-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1952-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3592-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2920-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1640-31-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1640-30-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1412-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2292-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2684-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2032-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/680-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1112-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1400-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2972-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1808 846284.exe 2328 k04208.exe 1640 224204.exe 2920 7rllrfr.exe 3592 6004264.exe 1952 dpdpd.exe 4752 xlxflxl.exe 964 nhthtn.exe 5056 5btbhb.exe 4620 440804.exe 4196 djvjd.exe 3696 7lxlfrr.exe 1412 8848864.exe 880 frlxlfr.exe 1576 5nbtht.exe 5080 ntnbht.exe 2292 06642.exe 2684 1tnbnh.exe 4140 nnnnhn.exe 2032 lxlllrr.exe 1820 64420.exe 4236 5tnhnh.exe 680 xrxlrlf.exe 1136 llxlfrf.exe 5084 0848662.exe 3844 2842048.exe 1112 1lxrflx.exe 4508 7lfrllx.exe 5020 1xlxlfr.exe 1400 000204.exe 2972 tnhbbb.exe 4336 9pvjd.exe 3852 3pjpv.exe 4332 4048682.exe 2764 9rfxlfl.exe 2500 5dvpj.exe 4728 w00808.exe 116 dvpvj.exe 2792 7bthbn.exe 2528 5rrflxf.exe 212 3lxlxrf.exe 4656 q04860.exe 3504 7djpv.exe 4688 604468.exe 4448 1jdvd.exe 3000 dvjvd.exe 4556 u264820.exe 2800 6864208.exe 2964 06228.exe 2680 ntbbtt.exe 4344 e66460.exe 652 k04804.exe 4968 22866.exe 3496 866008.exe 4196 0228860.exe 1388 xlfrfrf.exe 628 jvvjv.exe 4480 vdvjv.exe 3792 484822.exe 2936 1ddpv.exe 2220 5nthbn.exe 4044 m4046.exe 4492 k48648.exe 2084 jpddj.exe -
resource yara_rule behavioral2/memory/4812-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1808-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2328-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2328-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/964-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1952-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2920-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1640-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2328-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2328-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1412-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1576-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2292-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2684-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4140-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2032-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/680-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1112-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4508-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5020-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1400-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2972-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 846648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2220842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o442000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxfflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4224604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frflxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2448626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1808 4812 0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe 83 PID 4812 wrote to memory of 1808 4812 0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe 83 PID 4812 wrote to memory of 1808 4812 0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe 83 PID 1808 wrote to memory of 2328 1808 846284.exe 84 PID 1808 wrote to memory of 2328 1808 846284.exe 84 PID 1808 wrote to memory of 2328 1808 846284.exe 84 PID 2328 wrote to memory of 1640 2328 k04208.exe 85 PID 2328 wrote to memory of 1640 2328 k04208.exe 85 PID 2328 wrote to memory of 1640 2328 k04208.exe 85 PID 1640 wrote to memory of 2920 1640 224204.exe 86 PID 1640 wrote to memory of 2920 1640 224204.exe 86 PID 1640 wrote to memory of 2920 1640 224204.exe 86 PID 2920 wrote to memory of 3592 2920 7rllrfr.exe 87 PID 2920 wrote to memory of 3592 2920 7rllrfr.exe 87 PID 2920 wrote to memory of 3592 2920 7rllrfr.exe 87 PID 3592 wrote to memory of 1952 3592 6004264.exe 88 PID 3592 wrote to memory of 1952 3592 6004264.exe 88 PID 3592 wrote to memory of 1952 3592 6004264.exe 88 PID 1952 wrote to memory of 4752 1952 dpdpd.exe 89 PID 1952 wrote to memory of 4752 1952 dpdpd.exe 89 PID 1952 wrote to memory of 4752 1952 dpdpd.exe 89 PID 4752 wrote to memory of 964 4752 xlxflxl.exe 90 PID 4752 wrote to memory of 964 4752 xlxflxl.exe 90 PID 4752 wrote to memory of 964 4752 xlxflxl.exe 90 PID 964 wrote to memory of 5056 964 nhthtn.exe 91 PID 964 wrote to memory of 5056 964 nhthtn.exe 91 PID 964 wrote to memory of 5056 964 nhthtn.exe 91 PID 5056 wrote to memory of 4620 5056 5btbhb.exe 92 PID 5056 wrote to memory of 4620 5056 5btbhb.exe 92 PID 5056 wrote to memory of 4620 5056 5btbhb.exe 92 PID 4620 wrote to memory of 4196 4620 440804.exe 93 PID 4620 wrote to memory of 4196 4620 440804.exe 93 PID 4620 wrote to memory of 4196 4620 440804.exe 93 PID 4196 wrote to memory of 3696 4196 djvjd.exe 94 PID 4196 wrote to memory of 3696 4196 djvjd.exe 94 PID 4196 wrote to memory of 3696 4196 djvjd.exe 94 PID 3696 wrote to memory of 1412 3696 7lxlfrr.exe 95 PID 3696 wrote to memory of 1412 3696 7lxlfrr.exe 95 PID 3696 wrote to memory of 1412 3696 7lxlfrr.exe 95 PID 1412 wrote to memory of 880 1412 8848864.exe 96 PID 1412 wrote to memory of 880 1412 8848864.exe 96 PID 1412 wrote to memory of 880 1412 8848864.exe 96 PID 880 wrote to memory of 1576 880 frlxlfr.exe 97 PID 880 wrote to memory of 1576 880 frlxlfr.exe 97 PID 880 wrote to memory of 1576 880 frlxlfr.exe 97 PID 1576 wrote to memory of 5080 1576 5nbtht.exe 98 PID 1576 wrote to memory of 5080 1576 5nbtht.exe 98 PID 1576 wrote to memory of 5080 1576 5nbtht.exe 98 PID 5080 wrote to memory of 2292 5080 ntnbht.exe 99 PID 5080 wrote to memory of 2292 5080 ntnbht.exe 99 PID 5080 wrote to memory of 2292 5080 ntnbht.exe 99 PID 2292 wrote to memory of 2684 2292 06642.exe 100 PID 2292 wrote to memory of 2684 2292 06642.exe 100 PID 2292 wrote to memory of 2684 2292 06642.exe 100 PID 2684 wrote to memory of 4140 2684 1tnbnh.exe 101 PID 2684 wrote to memory of 4140 2684 1tnbnh.exe 101 PID 2684 wrote to memory of 4140 2684 1tnbnh.exe 101 PID 4140 wrote to memory of 2032 4140 nnnnhn.exe 102 PID 4140 wrote to memory of 2032 4140 nnnnhn.exe 102 PID 4140 wrote to memory of 2032 4140 nnnnhn.exe 102 PID 2032 wrote to memory of 1820 2032 lxlllrr.exe 103 PID 2032 wrote to memory of 1820 2032 lxlllrr.exe 103 PID 2032 wrote to memory of 1820 2032 lxlllrr.exe 103 PID 1820 wrote to memory of 4236 1820 64420.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe"C:\Users\Admin\AppData\Local\Temp\0ea68803618a9886e7eecfcda8563fce9e7d990ba73203d4d0033504abc76273.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\846284.exec:\846284.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\k04208.exec:\k04208.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\224204.exec:\224204.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\7rllrfr.exec:\7rllrfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\6004264.exec:\6004264.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
\??\c:\dpdpd.exec:\dpdpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\xlxflxl.exec:\xlxflxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\nhthtn.exec:\nhthtn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\5btbhb.exec:\5btbhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\440804.exec:\440804.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\djvjd.exec:\djvjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
\??\c:\7lxlfrr.exec:\7lxlfrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
\??\c:\8848864.exec:\8848864.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
\??\c:\frlxlfr.exec:\frlxlfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
\??\c:\5nbtht.exec:\5nbtht.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\ntnbht.exec:\ntnbht.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\06642.exec:\06642.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\1tnbnh.exec:\1tnbnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\nnnnhn.exec:\nnnnhn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
\??\c:\lxlllrr.exec:\lxlllrr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\64420.exec:\64420.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\5tnhnh.exec:\5tnhnh.exe23⤵
- Executes dropped EXE
PID:4236 -
\??\c:\xrxlrlf.exec:\xrxlrlf.exe24⤵
- Executes dropped EXE
PID:680 -
\??\c:\llxlfrf.exec:\llxlfrf.exe25⤵
- Executes dropped EXE
PID:1136 -
\??\c:\0848662.exec:\0848662.exe26⤵
- Executes dropped EXE
PID:5084 -
\??\c:\2842048.exec:\2842048.exe27⤵
- Executes dropped EXE
PID:3844 -
\??\c:\1lxrflx.exec:\1lxrflx.exe28⤵
- Executes dropped EXE
PID:1112 -
\??\c:\7lfrllx.exec:\7lfrllx.exe29⤵
- Executes dropped EXE
PID:4508 -
\??\c:\1xlxlfr.exec:\1xlxlfr.exe30⤵
- Executes dropped EXE
PID:5020 -
\??\c:\000204.exec:\000204.exe31⤵
- Executes dropped EXE
PID:1400 -
\??\c:\tnhbbb.exec:\tnhbbb.exe32⤵
- Executes dropped EXE
PID:2972 -
\??\c:\9pvjd.exec:\9pvjd.exe33⤵
- Executes dropped EXE
PID:4336 -
\??\c:\3pjpv.exec:\3pjpv.exe34⤵
- Executes dropped EXE
PID:3852 -
\??\c:\4048682.exec:\4048682.exe35⤵
- Executes dropped EXE
PID:4332 -
\??\c:\9rfxlfl.exec:\9rfxlfl.exe36⤵
- Executes dropped EXE
PID:2764 -
\??\c:\5dvpj.exec:\5dvpj.exe37⤵
- Executes dropped EXE
PID:2500 -
\??\c:\w00808.exec:\w00808.exe38⤵
- Executes dropped EXE
PID:4728 -
\??\c:\dvpvj.exec:\dvpvj.exe39⤵
- Executes dropped EXE
PID:116 -
\??\c:\7bthbn.exec:\7bthbn.exe40⤵
- Executes dropped EXE
PID:2792 -
\??\c:\5rrflxf.exec:\5rrflxf.exe41⤵
- Executes dropped EXE
PID:2528 -
\??\c:\3lxlxrf.exec:\3lxlxrf.exe42⤵
- Executes dropped EXE
PID:212 -
\??\c:\q04860.exec:\q04860.exe43⤵
- Executes dropped EXE
PID:4656 -
\??\c:\7djpv.exec:\7djpv.exe44⤵
- Executes dropped EXE
PID:3504 -
\??\c:\604468.exec:\604468.exe45⤵
- Executes dropped EXE
PID:4688 -
\??\c:\1jdvd.exec:\1jdvd.exe46⤵
- Executes dropped EXE
PID:4448 -
\??\c:\dvjvd.exec:\dvjvd.exe47⤵
- Executes dropped EXE
PID:3000 -
\??\c:\u264820.exec:\u264820.exe48⤵
- Executes dropped EXE
PID:4556 -
\??\c:\6864208.exec:\6864208.exe49⤵
- Executes dropped EXE
PID:2800 -
\??\c:\06228.exec:\06228.exe50⤵
- Executes dropped EXE
PID:2964 -
\??\c:\ntbbtt.exec:\ntbbtt.exe51⤵
- Executes dropped EXE
PID:2680 -
\??\c:\e66460.exec:\e66460.exe52⤵
- Executes dropped EXE
PID:4344 -
\??\c:\k04804.exec:\k04804.exe53⤵
- Executes dropped EXE
PID:652 -
\??\c:\22866.exec:\22866.exe54⤵
- Executes dropped EXE
PID:4968 -
\??\c:\866008.exec:\866008.exe55⤵
- Executes dropped EXE
PID:3496 -
\??\c:\0228860.exec:\0228860.exe56⤵
- Executes dropped EXE
PID:4196 -
\??\c:\xlfrfrf.exec:\xlfrfrf.exe57⤵
- Executes dropped EXE
PID:1388 -
\??\c:\jvvjv.exec:\jvvjv.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:628 -
\??\c:\vdvjv.exec:\vdvjv.exe59⤵
- Executes dropped EXE
PID:4480 -
\??\c:\484822.exec:\484822.exe60⤵
- Executes dropped EXE
PID:3792 -
\??\c:\1ddpv.exec:\1ddpv.exe61⤵
- Executes dropped EXE
PID:2936 -
\??\c:\5nthbn.exec:\5nthbn.exe62⤵
- Executes dropped EXE
PID:2220 -
\??\c:\m4046.exec:\m4046.exe63⤵
- Executes dropped EXE
PID:4044 -
\??\c:\k48648.exec:\k48648.exe64⤵
- Executes dropped EXE
PID:4492 -
\??\c:\jpddj.exec:\jpddj.exe65⤵
- Executes dropped EXE
PID:2084 -
\??\c:\rrrxlxl.exec:\rrrxlxl.exe66⤵PID:1852
-
\??\c:\thnbnb.exec:\thnbnb.exe67⤵PID:3916
-
\??\c:\pvpjp.exec:\pvpjp.exe68⤵PID:3780
-
\??\c:\rlllxxr.exec:\rlllxxr.exe69⤵PID:372
-
\??\c:\lffxrrl.exec:\lffxrrl.exe70⤵PID:2832
-
\??\c:\s0648.exec:\s0648.exe71⤵PID:5024
-
\??\c:\u482004.exec:\u482004.exe72⤵PID:620
-
\??\c:\644286.exec:\644286.exe73⤵PID:4360
-
\??\c:\a6804.exec:\a6804.exe74⤵PID:3900
-
\??\c:\pvjpd.exec:\pvjpd.exe75⤵PID:5084
-
\??\c:\064888.exec:\064888.exe76⤵PID:4056
-
\??\c:\vvpdp.exec:\vvpdp.exe77⤵PID:4676
-
\??\c:\8042648.exec:\8042648.exe78⤵PID:4944
-
\??\c:\ppdpj.exec:\ppdpj.exe79⤵PID:2904
-
\??\c:\84046.exec:\84046.exe80⤵PID:3944
-
\??\c:\206826.exec:\206826.exe81⤵PID:4532
-
\??\c:\i848200.exec:\i848200.exe82⤵PID:4736
-
\??\c:\i222620.exec:\i222620.exe83⤵PID:1908
-
\??\c:\rrlxllx.exec:\rrlxllx.exe84⤵PID:1444
-
\??\c:\662260.exec:\662260.exe85⤵PID:2332
-
\??\c:\jppjv.exec:\jppjv.exe86⤵PID:3964
-
\??\c:\8642048.exec:\8642048.exe87⤵PID:4724
-
\??\c:\5thttt.exec:\5thttt.exe88⤵PID:4304
-
\??\c:\frflfrr.exec:\frflfrr.exe89⤵PID:1984
-
\??\c:\u220820.exec:\u220820.exe90⤵PID:4816
-
\??\c:\86866.exec:\86866.exe91⤵PID:1184
-
\??\c:\0060264.exec:\0060264.exe92⤵PID:2136
-
\??\c:\e62648.exec:\e62648.exe93⤵PID:4216
-
\??\c:\tnnhbt.exec:\tnnhbt.exe94⤵PID:4688
-
\??\c:\lxlrxlf.exec:\lxlrxlf.exe95⤵PID:2380
-
\??\c:\jdjpv.exec:\jdjpv.exe96⤵PID:4500
-
\??\c:\a6080.exec:\a6080.exe97⤵PID:4556
-
\??\c:\bhhtbt.exec:\bhhtbt.exe98⤵PID:2800
-
\??\c:\a0468.exec:\a0468.exe99⤵PID:2716
-
\??\c:\86042.exec:\86042.exe100⤵PID:3084
-
\??\c:\0848484.exec:\0848484.exe101⤵PID:4344
-
\??\c:\a6082.exec:\a6082.exe102⤵PID:652
-
\??\c:\2402666.exec:\2402666.exe103⤵PID:1096
-
\??\c:\xfrxlfr.exec:\xfrxlfr.exe104⤵PID:4260
-
\??\c:\s8820.exec:\s8820.exe105⤵PID:2304
-
\??\c:\1dvjp.exec:\1dvjp.exe106⤵PID:868
-
\??\c:\4004208.exec:\4004208.exe107⤵PID:1940
-
\??\c:\4288844.exec:\4288844.exe108⤵PID:880
-
\??\c:\6486488.exec:\6486488.exe109⤵PID:4108
-
\??\c:\8286408.exec:\8286408.exe110⤵PID:2700
-
\??\c:\m4060.exec:\m4060.exe111⤵PID:5068
-
\??\c:\ththtn.exec:\ththtn.exe112⤵PID:4504
-
\??\c:\206026.exec:\206026.exe113⤵PID:2684
-
\??\c:\vjjvp.exec:\vjjvp.exe114⤵PID:1560
-
\??\c:\lxrrxxl.exec:\lxrrxxl.exe115⤵PID:2448
-
\??\c:\s6684.exec:\s6684.exe116⤵PID:424
-
\??\c:\84042.exec:\84042.exe117⤵PID:3576
-
\??\c:\fllxrfx.exec:\fllxrfx.exe118⤵PID:4792
-
\??\c:\i486486.exec:\i486486.exe119⤵PID:1820
-
\??\c:\246048.exec:\246048.exe120⤵PID:2248
-
\??\c:\e28604.exec:\e28604.exe121⤵PID:5024
-
\??\c:\8886048.exec:\8886048.exe122⤵PID:620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-