Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 04:13
Static task
static1
Behavioral task
behavioral1
Sample
af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe
Resource
win7-20241010-en
General
-
Target
af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe
-
Size
85KB
-
MD5
eb493809b3bf5ae3d7d79a22679bf935
-
SHA1
0297a3f408bdabb495fc782893ae78530e2f522a
-
SHA256
af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f
-
SHA512
e7c9f80c2caf227d778876183981bf415a1bde61ff201b7137b60ae4349e77fcd26d870b6cab0fd9b3fb03776bf7eb3919b312dd44c2f5cbd6dd21ed984ebf10
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q4Shc:ymb3NkkiQ3mdBjFIIp9L9QrrA8LSW
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/3256-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4068-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3300-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4916-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1628-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4316-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3576-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4600-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1464-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4444-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1020-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1868-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4068 60604.exe 3300 86608.exe 4916 82880.exe 1628 xfxrxrl.exe 2720 nnbhnt.exe 4316 jdvjj.exe 3576 dppjv.exe 2928 bnnbbb.exe 3436 2660826.exe 1972 3hnbbt.exe 4600 3ththh.exe 848 286660.exe 5028 880026.exe 1552 pdjdv.exe 3876 46628.exe 1464 3lffxrl.exe 3212 4226048.exe 2936 htthbb.exe 3624 jdpjv.exe 4444 xlxxllx.exe 1936 08448.exe 2712 lfxfrlf.exe 4928 thhbnh.exe 4656 8844282.exe 1016 828226.exe 1020 q20482.exe 1868 2008604.exe 4968 ddpjv.exe 4612 6404204.exe 3704 q86082.exe 4480 jdvjd.exe 4424 2248840.exe 2088 64666.exe 1776 4220044.exe 5064 xxxrflx.exe 3456 866082.exe 3404 6408624.exe 4884 vddvj.exe 5084 68442.exe 3008 rfrfrlf.exe 1364 64406.exe 2728 6488828.exe 4520 48860.exe 208 40608.exe 1968 86488.exe 3692 42820.exe 3180 dpjjd.exe 2604 rfrflfl.exe 3000 4060448.exe 2612 82666.exe 4636 04008.exe 4460 lrxxxrr.exe 3192 4086028.exe 1696 5vdvp.exe 3744 tttntt.exe 4948 flrxfrx.exe 2996 64660.exe 1208 fxflffx.exe 4488 pjpdd.exe 2068 6060888.exe 4196 8248884.exe 2968 82822.exe 3408 802604.exe 2628 446644.exe -
resource yara_rule behavioral2/memory/3256-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3256-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4068-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3300-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1628-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1628-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4316-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1972-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3576-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1552-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1464-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2936-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4444-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1020-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1868-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8060488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6004604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 806600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8400488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffflfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 002880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 4068 3256 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 82 PID 3256 wrote to memory of 4068 3256 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 82 PID 3256 wrote to memory of 4068 3256 af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe 82 PID 4068 wrote to memory of 3300 4068 60604.exe 83 PID 4068 wrote to memory of 3300 4068 60604.exe 83 PID 4068 wrote to memory of 3300 4068 60604.exe 83 PID 3300 wrote to memory of 4916 3300 86608.exe 84 PID 3300 wrote to memory of 4916 3300 86608.exe 84 PID 3300 wrote to memory of 4916 3300 86608.exe 84 PID 4916 wrote to memory of 1628 4916 82880.exe 85 PID 4916 wrote to memory of 1628 4916 82880.exe 85 PID 4916 wrote to memory of 1628 4916 82880.exe 85 PID 1628 wrote to memory of 2720 1628 xfxrxrl.exe 86 PID 1628 wrote to memory of 2720 1628 xfxrxrl.exe 86 PID 1628 wrote to memory of 2720 1628 xfxrxrl.exe 86 PID 2720 wrote to memory of 4316 2720 nnbhnt.exe 87 PID 2720 wrote to memory of 4316 2720 nnbhnt.exe 87 PID 2720 wrote to memory of 4316 2720 nnbhnt.exe 87 PID 4316 wrote to memory of 3576 4316 jdvjj.exe 88 PID 4316 wrote to memory of 3576 4316 jdvjj.exe 88 PID 4316 wrote to memory of 3576 4316 jdvjj.exe 88 PID 3576 wrote to memory of 2928 3576 dppjv.exe 89 PID 3576 wrote to memory of 2928 3576 dppjv.exe 89 PID 3576 wrote to memory of 2928 3576 dppjv.exe 89 PID 2928 wrote to memory of 3436 2928 bnnbbb.exe 90 PID 2928 wrote to memory of 3436 2928 bnnbbb.exe 90 PID 2928 wrote to memory of 3436 2928 bnnbbb.exe 90 PID 3436 wrote to memory of 1972 3436 2660826.exe 91 PID 3436 wrote to memory of 1972 3436 2660826.exe 91 PID 3436 wrote to memory of 1972 3436 2660826.exe 91 PID 1972 wrote to memory of 4600 1972 3hnbbt.exe 92 PID 1972 wrote to memory of 4600 1972 3hnbbt.exe 92 PID 1972 wrote to memory of 4600 1972 3hnbbt.exe 92 PID 4600 wrote to memory of 848 4600 3ththh.exe 93 PID 4600 wrote to memory of 848 4600 3ththh.exe 93 PID 4600 wrote to memory of 848 4600 3ththh.exe 93 PID 848 wrote to memory of 5028 848 286660.exe 94 PID 848 wrote to memory of 5028 848 286660.exe 94 PID 848 wrote to memory of 5028 848 286660.exe 94 PID 5028 wrote to memory of 1552 5028 880026.exe 95 PID 5028 wrote to memory of 1552 5028 880026.exe 95 PID 5028 wrote to memory of 1552 5028 880026.exe 95 PID 1552 wrote to memory of 3876 1552 pdjdv.exe 96 PID 1552 wrote to memory of 3876 1552 pdjdv.exe 96 PID 1552 wrote to memory of 3876 1552 pdjdv.exe 96 PID 3876 wrote to memory of 1464 3876 46628.exe 97 PID 3876 wrote to memory of 1464 3876 46628.exe 97 PID 3876 wrote to memory of 1464 3876 46628.exe 97 PID 1464 wrote to memory of 3212 1464 3lffxrl.exe 98 PID 1464 wrote to memory of 3212 1464 3lffxrl.exe 98 PID 1464 wrote to memory of 3212 1464 3lffxrl.exe 98 PID 3212 wrote to memory of 2936 3212 4226048.exe 99 PID 3212 wrote to memory of 2936 3212 4226048.exe 99 PID 3212 wrote to memory of 2936 3212 4226048.exe 99 PID 2936 wrote to memory of 3624 2936 htthbb.exe 100 PID 2936 wrote to memory of 3624 2936 htthbb.exe 100 PID 2936 wrote to memory of 3624 2936 htthbb.exe 100 PID 3624 wrote to memory of 4444 3624 jdpjv.exe 101 PID 3624 wrote to memory of 4444 3624 jdpjv.exe 101 PID 3624 wrote to memory of 4444 3624 jdpjv.exe 101 PID 4444 wrote to memory of 1936 4444 xlxxllx.exe 102 PID 4444 wrote to memory of 1936 4444 xlxxllx.exe 102 PID 4444 wrote to memory of 1936 4444 xlxxllx.exe 102 PID 1936 wrote to memory of 2712 1936 08448.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe"C:\Users\Admin\AppData\Local\Temp\af61d6c11c9e340c5b10b07e16920228d519777f0b76688d0962fa1e4a64f61f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
\??\c:\60604.exec:\60604.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\86608.exec:\86608.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
\??\c:\82880.exec:\82880.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\xfxrxrl.exec:\xfxrxrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\nnbhnt.exec:\nnbhnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\jdvjj.exec:\jdvjj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\dppjv.exec:\dppjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\bnnbbb.exec:\bnnbbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\2660826.exec:\2660826.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\3hnbbt.exec:\3hnbbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\3ththh.exec:\3ththh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
\??\c:\286660.exec:\286660.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\880026.exec:\880026.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\pdjdv.exec:\pdjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\46628.exec:\46628.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\3lffxrl.exec:\3lffxrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\4226048.exec:\4226048.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
\??\c:\htthbb.exec:\htthbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\jdpjv.exec:\jdpjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\xlxxllx.exec:\xlxxllx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
\??\c:\08448.exec:\08448.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\lfxfrlf.exec:\lfxfrlf.exe23⤵
- Executes dropped EXE
PID:2712 -
\??\c:\thhbnh.exec:\thhbnh.exe24⤵
- Executes dropped EXE
PID:4928 -
\??\c:\8844282.exec:\8844282.exe25⤵
- Executes dropped EXE
PID:4656 -
\??\c:\828226.exec:\828226.exe26⤵
- Executes dropped EXE
PID:1016 -
\??\c:\q20482.exec:\q20482.exe27⤵
- Executes dropped EXE
PID:1020 -
\??\c:\2008604.exec:\2008604.exe28⤵
- Executes dropped EXE
PID:1868 -
\??\c:\ddpjv.exec:\ddpjv.exe29⤵
- Executes dropped EXE
PID:4968 -
\??\c:\6404204.exec:\6404204.exe30⤵
- Executes dropped EXE
PID:4612 -
\??\c:\q86082.exec:\q86082.exe31⤵
- Executes dropped EXE
PID:3704 -
\??\c:\jdvjd.exec:\jdvjd.exe32⤵
- Executes dropped EXE
PID:4480 -
\??\c:\2248840.exec:\2248840.exe33⤵
- Executes dropped EXE
PID:4424 -
\??\c:\64666.exec:\64666.exe34⤵
- Executes dropped EXE
PID:2088 -
\??\c:\4220044.exec:\4220044.exe35⤵
- Executes dropped EXE
PID:1776 -
\??\c:\xxxrflx.exec:\xxxrflx.exe36⤵
- Executes dropped EXE
PID:5064 -
\??\c:\866082.exec:\866082.exe37⤵
- Executes dropped EXE
PID:3456 -
\??\c:\6408624.exec:\6408624.exe38⤵
- Executes dropped EXE
PID:3404 -
\??\c:\vddvj.exec:\vddvj.exe39⤵
- Executes dropped EXE
PID:4884 -
\??\c:\68442.exec:\68442.exe40⤵
- Executes dropped EXE
PID:5084 -
\??\c:\rfrfrlf.exec:\rfrfrlf.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008 -
\??\c:\64406.exec:\64406.exe42⤵
- Executes dropped EXE
PID:1364 -
\??\c:\6488828.exec:\6488828.exe43⤵
- Executes dropped EXE
PID:2728 -
\??\c:\48860.exec:\48860.exe44⤵
- Executes dropped EXE
PID:4520 -
\??\c:\40608.exec:\40608.exe45⤵
- Executes dropped EXE
PID:208 -
\??\c:\86488.exec:\86488.exe46⤵
- Executes dropped EXE
PID:1968 -
\??\c:\42820.exec:\42820.exe47⤵
- Executes dropped EXE
PID:3692 -
\??\c:\dpjjd.exec:\dpjjd.exe48⤵
- Executes dropped EXE
PID:3180 -
\??\c:\rfrflfl.exec:\rfrflfl.exe49⤵
- Executes dropped EXE
PID:2604 -
\??\c:\4060448.exec:\4060448.exe50⤵
- Executes dropped EXE
PID:3000 -
\??\c:\82666.exec:\82666.exe51⤵
- Executes dropped EXE
PID:2612 -
\??\c:\04008.exec:\04008.exe52⤵
- Executes dropped EXE
PID:4636 -
\??\c:\lrxxxrr.exec:\lrxxxrr.exe53⤵
- Executes dropped EXE
PID:4460 -
\??\c:\4086028.exec:\4086028.exe54⤵
- Executes dropped EXE
PID:3192 -
\??\c:\5vdvp.exec:\5vdvp.exe55⤵
- Executes dropped EXE
PID:1696 -
\??\c:\tttntt.exec:\tttntt.exe56⤵
- Executes dropped EXE
PID:3744 -
\??\c:\flrxfrx.exec:\flrxfrx.exe57⤵
- Executes dropped EXE
PID:4948 -
\??\c:\64660.exec:\64660.exe58⤵
- Executes dropped EXE
PID:2996 -
\??\c:\fxflffx.exec:\fxflffx.exe59⤵
- Executes dropped EXE
PID:1208 -
\??\c:\pjpdd.exec:\pjpdd.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488 -
\??\c:\6060888.exec:\6060888.exe61⤵
- Executes dropped EXE
PID:2068 -
\??\c:\8248884.exec:\8248884.exe62⤵
- Executes dropped EXE
PID:4196 -
\??\c:\82822.exec:\82822.exe63⤵
- Executes dropped EXE
PID:2968 -
\??\c:\802604.exec:\802604.exe64⤵
- Executes dropped EXE
PID:3408 -
\??\c:\446644.exec:\446644.exe65⤵
- Executes dropped EXE
PID:2628 -
\??\c:\60222.exec:\60222.exe66⤵PID:2432
-
\??\c:\1jjjv.exec:\1jjjv.exe67⤵PID:2388
-
\??\c:\2404822.exec:\2404822.exe68⤵PID:4100
-
\??\c:\pjppd.exec:\pjppd.exe69⤵PID:3120
-
\??\c:\hbbttt.exec:\hbbttt.exe70⤵PID:3716
-
\??\c:\808060.exec:\808060.exe71⤵PID:4476
-
\??\c:\3hnhhh.exec:\3hnhhh.exe72⤵PID:3968
-
\??\c:\htbbnt.exec:\htbbnt.exe73⤵PID:1928
-
\??\c:\xrlfxrl.exec:\xrlfxrl.exe74⤵PID:4120
-
\??\c:\dpppj.exec:\dpppj.exe75⤵PID:3748
-
\??\c:\0460004.exec:\0460004.exe76⤵PID:1464
-
\??\c:\2448226.exec:\2448226.exe77⤵PID:4824
-
\??\c:\2626660.exec:\2626660.exe78⤵PID:3724
-
\??\c:\btbhnb.exec:\btbhnb.exe79⤵PID:4296
-
\??\c:\9pdpj.exec:\9pdpj.exe80⤵PID:3624
-
\??\c:\60042.exec:\60042.exe81⤵PID:3760
-
\??\c:\4242660.exec:\4242660.exe82⤵PID:880
-
\??\c:\266060.exec:\266060.exe83⤵PID:2516
-
\??\c:\hbhhhb.exec:\hbhhhb.exe84⤵PID:3916
-
\??\c:\dpppj.exec:\dpppj.exe85⤵PID:4568
-
\??\c:\fxxxllf.exec:\fxxxllf.exe86⤵PID:4492
-
\??\c:\w80060.exec:\w80060.exe87⤵PID:2436
-
\??\c:\nhbttt.exec:\nhbttt.exe88⤵PID:1872
-
\??\c:\jvppd.exec:\jvppd.exe89⤵PID:1448
-
\??\c:\0808222.exec:\0808222.exe90⤵PID:2040
-
\??\c:\e08888.exec:\e08888.exe91⤵PID:952
-
\??\c:\9nnbnn.exec:\9nnbnn.exe92⤵PID:3620
-
\??\c:\606604.exec:\606604.exe93⤵PID:312
-
\??\c:\3rrxllf.exec:\3rrxllf.exe94⤵PID:452
-
\??\c:\thnttt.exec:\thnttt.exe95⤵PID:3264
-
\??\c:\lfxrllf.exec:\lfxrllf.exe96⤵PID:4960
-
\??\c:\68482.exec:\68482.exe97⤵PID:1140
-
\??\c:\a8482.exec:\a8482.exe98⤵PID:1376
-
\??\c:\88008.exec:\88008.exe99⤵PID:1776
-
\??\c:\400482.exec:\400482.exe100⤵PID:5064
-
\??\c:\lllrrrr.exec:\lllrrrr.exe101⤵PID:3912
-
\??\c:\xxrrlrl.exec:\xxrrlrl.exe102⤵PID:2060
-
\??\c:\6662248.exec:\6662248.exe103⤵PID:2480
-
\??\c:\40266.exec:\40266.exe104⤵PID:2124
-
\??\c:\hnbnbt.exec:\hnbnbt.exe105⤵PID:2740
-
\??\c:\6842206.exec:\6842206.exe106⤵PID:2344
-
\??\c:\lfllrfx.exec:\lfllrfx.exe107⤵PID:2728
-
\??\c:\lfxlxlx.exec:\lfxlxlx.exe108⤵PID:4520
-
\??\c:\ppvpd.exec:\ppvpd.exe109⤵PID:3580
-
\??\c:\xfxlxrf.exec:\xfxlxrf.exe110⤵PID:4172
-
\??\c:\i064204.exec:\i064204.exe111⤵PID:3692
-
\??\c:\a8044.exec:\a8044.exe112⤵PID:3180
-
\??\c:\3pdpd.exec:\3pdpd.exe113⤵PID:2604
-
\??\c:\268282.exec:\268282.exe114⤵PID:3000
-
\??\c:\0826608.exec:\0826608.exe115⤵PID:4228
-
\??\c:\jdpvj.exec:\jdpvj.exe116⤵PID:4636
-
\??\c:\fxrfrfx.exec:\fxrfrfx.exe117⤵PID:1924
-
\??\c:\dpjvp.exec:\dpjvp.exe118⤵PID:3300
-
\??\c:\1nhthb.exec:\1nhthb.exe119⤵PID:1948
-
\??\c:\pdpdd.exec:\pdpdd.exe120⤵PID:3744
-
\??\c:\pdpvv.exec:\pdpvv.exe121⤵PID:3288
-
\??\c:\c442486.exec:\c442486.exe122⤵PID:4524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-