Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 21:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe
-
Size
61KB
-
MD5
18f16c703e5e42b49f0efa95e17d1f99
-
SHA1
91bbfc0ccdd63359bb6c08de5631c0edce391e1f
-
SHA256
47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8
-
SHA512
fb72e87412cf7bb613c82f772c1fe0c46f544f5374cb58858a323870b552a1ad0d4eb34b73c0763e6d4bc484be2aaa066ba327109d16eabdf56a0e40d9603aea
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+byJ:ymb3NkkiQ3mdBjF+3Tpc
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/4936-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2336-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4936-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1180-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2564-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3100-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3536-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4112-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2460-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4780-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2796-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2076-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/364-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3068-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3968-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4588-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4376-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3136-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/396-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2700-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/780-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2336 02448.exe 1180 66600.exe 2564 466826.exe 3536 08048.exe 3100 800480.exe 4112 dvppd.exe 2460 64662.exe 3916 xrfxlff.exe 4004 pvdvp.exe 4744 jvvvv.exe 4780 tnnhbt.exe 2796 rrflxlx.exe 2076 xlxlflf.exe 364 9lxrrll.exe 3068 3jvpd.exe 3968 bnbbbh.exe 4588 280448.exe 3624 rlrrfxx.exe 4376 5vdvp.exe 4704 7rxrxxr.exe 3136 5djdd.exe 4748 0622660.exe 4492 vppjd.exe 4684 5xxfxll.exe 224 3tttnt.exe 528 4066660.exe 396 a8226.exe 2700 028444.exe 780 jvdpv.exe 4100 820444.exe 2928 a4846.exe 548 2462660.exe 4024 e00828.exe 1632 4482602.exe 4788 3hhntn.exe 2432 pvjpv.exe 1080 7xlfllx.exe 1844 842844.exe 1528 800004.exe 4252 djvpd.exe 4760 tnthth.exe 3656 lxrrlfx.exe 4988 2622048.exe 3012 jdjjd.exe 4028 dvjvp.exe 2440 2004828.exe 4348 4600482.exe 2284 bthhbb.exe 4936 0804482.exe 3096 nnnnnb.exe 1800 thnnbh.exe 4552 m4864.exe 2164 e00822.exe 3552 8242222.exe 2200 i866062.exe 4388 488000.exe 4644 240406.exe 5020 868828.exe 3108 hntbbh.exe 3616 djjvd.exe 3972 8248062.exe 4744 46244.exe 4780 a4222.exe 2660 644200.exe -
resource yara_rule behavioral2/memory/4936-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2336-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4936-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1180-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2564-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3100-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3536-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2460-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4744-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4780-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2796-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/364-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3068-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3968-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4376-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3136-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2700-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/780-192-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w62806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 888488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ntnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4028828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4488660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2622048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 288204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2406066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2336 4936 47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe 83 PID 4936 wrote to memory of 2336 4936 47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe 83 PID 4936 wrote to memory of 2336 4936 47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe 83 PID 2336 wrote to memory of 1180 2336 02448.exe 84 PID 2336 wrote to memory of 1180 2336 02448.exe 84 PID 2336 wrote to memory of 1180 2336 02448.exe 84 PID 1180 wrote to memory of 2564 1180 66600.exe 85 PID 1180 wrote to memory of 2564 1180 66600.exe 85 PID 1180 wrote to memory of 2564 1180 66600.exe 85 PID 2564 wrote to memory of 3536 2564 466826.exe 86 PID 2564 wrote to memory of 3536 2564 466826.exe 86 PID 2564 wrote to memory of 3536 2564 466826.exe 86 PID 3536 wrote to memory of 3100 3536 08048.exe 87 PID 3536 wrote to memory of 3100 3536 08048.exe 87 PID 3536 wrote to memory of 3100 3536 08048.exe 87 PID 3100 wrote to memory of 4112 3100 800480.exe 88 PID 3100 wrote to memory of 4112 3100 800480.exe 88 PID 3100 wrote to memory of 4112 3100 800480.exe 88 PID 4112 wrote to memory of 2460 4112 dvppd.exe 89 PID 4112 wrote to memory of 2460 4112 dvppd.exe 89 PID 4112 wrote to memory of 2460 4112 dvppd.exe 89 PID 2460 wrote to memory of 3916 2460 64662.exe 90 PID 2460 wrote to memory of 3916 2460 64662.exe 90 PID 2460 wrote to memory of 3916 2460 64662.exe 90 PID 3916 wrote to memory of 4004 3916 xrfxlff.exe 91 PID 3916 wrote to memory of 4004 3916 xrfxlff.exe 91 PID 3916 wrote to memory of 4004 3916 xrfxlff.exe 91 PID 4004 wrote to memory of 4744 4004 pvdvp.exe 92 PID 4004 wrote to memory of 4744 4004 pvdvp.exe 92 PID 4004 wrote to memory of 4744 4004 pvdvp.exe 92 PID 4744 wrote to memory of 4780 4744 jvvvv.exe 93 PID 4744 wrote to memory of 4780 4744 jvvvv.exe 93 PID 4744 wrote to memory of 4780 4744 jvvvv.exe 93 PID 4780 wrote to memory of 2796 4780 tnnhbt.exe 94 PID 4780 wrote to memory of 2796 4780 tnnhbt.exe 94 PID 4780 wrote to memory of 2796 4780 tnnhbt.exe 94 PID 2796 wrote to memory of 2076 2796 rrflxlx.exe 95 PID 2796 wrote to memory of 2076 2796 rrflxlx.exe 95 PID 2796 wrote to memory of 2076 2796 rrflxlx.exe 95 PID 2076 wrote to memory of 364 2076 xlxlflf.exe 96 PID 2076 wrote to memory of 364 2076 xlxlflf.exe 96 PID 2076 wrote to memory of 364 2076 xlxlflf.exe 96 PID 364 wrote to memory of 3068 364 9lxrrll.exe 97 PID 364 wrote to memory of 3068 364 9lxrrll.exe 97 PID 364 wrote to memory of 3068 364 9lxrrll.exe 97 PID 3068 wrote to memory of 3968 3068 3jvpd.exe 98 PID 3068 wrote to memory of 3968 3068 3jvpd.exe 98 PID 3068 wrote to memory of 3968 3068 3jvpd.exe 98 PID 3968 wrote to memory of 4588 3968 bnbbbh.exe 99 PID 3968 wrote to memory of 4588 3968 bnbbbh.exe 99 PID 3968 wrote to memory of 4588 3968 bnbbbh.exe 99 PID 4588 wrote to memory of 3624 4588 280448.exe 100 PID 4588 wrote to memory of 3624 4588 280448.exe 100 PID 4588 wrote to memory of 3624 4588 280448.exe 100 PID 3624 wrote to memory of 4376 3624 rlrrfxx.exe 101 PID 3624 wrote to memory of 4376 3624 rlrrfxx.exe 101 PID 3624 wrote to memory of 4376 3624 rlrrfxx.exe 101 PID 4376 wrote to memory of 4704 4376 5vdvp.exe 102 PID 4376 wrote to memory of 4704 4376 5vdvp.exe 102 PID 4376 wrote to memory of 4704 4376 5vdvp.exe 102 PID 4704 wrote to memory of 3136 4704 7rxrxxr.exe 103 PID 4704 wrote to memory of 3136 4704 7rxrxxr.exe 103 PID 4704 wrote to memory of 3136 4704 7rxrxxr.exe 103 PID 3136 wrote to memory of 4748 3136 5djdd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe"C:\Users\Admin\AppData\Local\Temp\47de49b882d460301a2e171843557557f1e6b2161ba9f56c99cfe1a6875f8ce8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
\??\c:\02448.exec:\02448.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\66600.exec:\66600.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
\??\c:\466826.exec:\466826.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\08048.exec:\08048.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
\??\c:\800480.exec:\800480.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\dvppd.exec:\dvppd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
\??\c:\64662.exec:\64662.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\xrfxlff.exec:\xrfxlff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
\??\c:\pvdvp.exec:\pvdvp.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\jvvvv.exec:\jvvvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\tnnhbt.exec:\tnnhbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
\??\c:\rrflxlx.exec:\rrflxlx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\xlxlflf.exec:\xlxlflf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\9lxrrll.exec:\9lxrrll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
\??\c:\3jvpd.exec:\3jvpd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\bnbbbh.exec:\bnbbbh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\280448.exec:\280448.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\rlrrfxx.exec:\rlrrfxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\5vdvp.exec:\5vdvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\7rxrxxr.exec:\7rxrxxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\5djdd.exec:\5djdd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
\??\c:\0622660.exec:\0622660.exe23⤵
- Executes dropped EXE
PID:4748 -
\??\c:\vppjd.exec:\vppjd.exe24⤵
- Executes dropped EXE
PID:4492 -
\??\c:\5xxfxll.exec:\5xxfxll.exe25⤵
- Executes dropped EXE
PID:4684 -
\??\c:\3tttnt.exec:\3tttnt.exe26⤵
- Executes dropped EXE
PID:224 -
\??\c:\4066660.exec:\4066660.exe27⤵
- Executes dropped EXE
PID:528 -
\??\c:\a8226.exec:\a8226.exe28⤵
- Executes dropped EXE
PID:396 -
\??\c:\028444.exec:\028444.exe29⤵
- Executes dropped EXE
PID:2700 -
\??\c:\jvdpv.exec:\jvdpv.exe30⤵
- Executes dropped EXE
PID:780 -
\??\c:\820444.exec:\820444.exe31⤵
- Executes dropped EXE
PID:4100 -
\??\c:\a4846.exec:\a4846.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\2462660.exec:\2462660.exe33⤵
- Executes dropped EXE
PID:548 -
\??\c:\e00828.exec:\e00828.exe34⤵
- Executes dropped EXE
PID:4024 -
\??\c:\4482602.exec:\4482602.exe35⤵
- Executes dropped EXE
PID:1632 -
\??\c:\3hhntn.exec:\3hhntn.exe36⤵
- Executes dropped EXE
PID:4788 -
\??\c:\pvjpv.exec:\pvjpv.exe37⤵
- Executes dropped EXE
PID:2432 -
\??\c:\7xlfllx.exec:\7xlfllx.exe38⤵
- Executes dropped EXE
PID:1080 -
\??\c:\842844.exec:\842844.exe39⤵
- Executes dropped EXE
PID:1844 -
\??\c:\800004.exec:\800004.exe40⤵
- Executes dropped EXE
PID:1528 -
\??\c:\djvpd.exec:\djvpd.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252 -
\??\c:\tnthth.exec:\tnthth.exe42⤵
- Executes dropped EXE
PID:4760 -
\??\c:\lxrrlfx.exec:\lxrrlfx.exe43⤵
- Executes dropped EXE
PID:3656 -
\??\c:\2622048.exec:\2622048.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4988 -
\??\c:\jdjjd.exec:\jdjjd.exe45⤵
- Executes dropped EXE
PID:3012 -
\??\c:\dvjvp.exec:\dvjvp.exe46⤵
- Executes dropped EXE
PID:4028 -
\??\c:\2004828.exec:\2004828.exe47⤵
- Executes dropped EXE
PID:2440 -
\??\c:\4600482.exec:\4600482.exe48⤵
- Executes dropped EXE
PID:4348 -
\??\c:\bthhbb.exec:\bthhbb.exe49⤵
- Executes dropped EXE
PID:2284 -
\??\c:\0804482.exec:\0804482.exe50⤵
- Executes dropped EXE
PID:4936 -
\??\c:\nnnnnb.exec:\nnnnnb.exe51⤵
- Executes dropped EXE
PID:3096 -
\??\c:\thnnbh.exec:\thnnbh.exe52⤵
- Executes dropped EXE
PID:1800 -
\??\c:\m4864.exec:\m4864.exe53⤵
- Executes dropped EXE
PID:4552 -
\??\c:\e00822.exec:\e00822.exe54⤵
- Executes dropped EXE
PID:2164 -
\??\c:\8242222.exec:\8242222.exe55⤵
- Executes dropped EXE
PID:3552 -
\??\c:\i866062.exec:\i866062.exe56⤵
- Executes dropped EXE
PID:2200 -
\??\c:\488000.exec:\488000.exe57⤵
- Executes dropped EXE
PID:4388 -
\??\c:\240406.exec:\240406.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644 -
\??\c:\868828.exec:\868828.exe59⤵
- Executes dropped EXE
PID:5020 -
\??\c:\hntbbh.exec:\hntbbh.exe60⤵
- Executes dropped EXE
PID:3108 -
\??\c:\djjvd.exec:\djjvd.exe61⤵
- Executes dropped EXE
PID:3616 -
\??\c:\8248062.exec:\8248062.exe62⤵
- Executes dropped EXE
PID:3972 -
\??\c:\46244.exec:\46244.exe63⤵
- Executes dropped EXE
PID:4744 -
\??\c:\a4222.exec:\a4222.exe64⤵
- Executes dropped EXE
PID:4780 -
\??\c:\644200.exec:\644200.exe65⤵
- Executes dropped EXE
PID:2660 -
\??\c:\djvvd.exec:\djvvd.exe66⤵PID:4800
-
\??\c:\thhtnn.exec:\thhtnn.exe67⤵PID:4956
-
\??\c:\64286.exec:\64286.exe68⤵PID:2076
-
\??\c:\bthbhb.exec:\bthbhb.exe69⤵PID:1576
-
\??\c:\26442.exec:\26442.exe70⤵PID:3068
-
\??\c:\6048604.exec:\6048604.exe71⤵PID:3968
-
\??\c:\8204000.exec:\8204000.exe72⤵PID:2936
-
\??\c:\w00048.exec:\w00048.exe73⤵PID:4588
-
\??\c:\2648222.exec:\2648222.exe74⤵PID:3624
-
\??\c:\e28204.exec:\e28204.exe75⤵PID:1936
-
\??\c:\1hbnth.exec:\1hbnth.exe76⤵PID:624
-
\??\c:\644426.exec:\644426.exe77⤵PID:808
-
\??\c:\7jjpd.exec:\7jjpd.exe78⤵PID:5016
-
\??\c:\222428.exec:\222428.exe79⤵PID:2208
-
\??\c:\42860.exec:\42860.exe80⤵PID:228
-
\??\c:\c046802.exec:\c046802.exe81⤵PID:1704
-
\??\c:\i282664.exec:\i282664.exe82⤵PID:4176
-
\??\c:\4004882.exec:\4004882.exe83⤵PID:1424
-
\??\c:\w00482.exec:\w00482.exe84⤵PID:2880
-
\??\c:\hbbhht.exec:\hbbhht.exe85⤵PID:1912
-
\??\c:\w62602.exec:\w62602.exe86⤵PID:4816
-
\??\c:\pdjdd.exec:\pdjdd.exe87⤵PID:1732
-
\??\c:\24644.exec:\24644.exe88⤵PID:2912
-
\??\c:\2082486.exec:\2082486.exe89⤵PID:2688
-
\??\c:\lllrrlf.exec:\lllrrlf.exe90⤵PID:4940
-
\??\c:\20484.exec:\20484.exe91⤵PID:1196
-
\??\c:\g2826.exec:\g2826.exe92⤵PID:5100
-
\??\c:\vpvvd.exec:\vpvvd.exe93⤵PID:2444
-
\??\c:\s4064.exec:\s4064.exe94⤵PID:4688
-
\??\c:\pvvpj.exec:\pvvpj.exe95⤵PID:3520
-
\??\c:\00062.exec:\00062.exe96⤵PID:4964
-
\??\c:\tnnhnh.exec:\tnnhnh.exe97⤵PID:2652
-
\??\c:\446822.exec:\446822.exe98⤵PID:4256
-
\??\c:\xrrxxrl.exec:\xrrxxrl.exe99⤵PID:3700
-
\??\c:\9pppj.exec:\9pppj.exe100⤵PID:2516
-
\??\c:\flxfflx.exec:\flxfflx.exe101⤵PID:4436
-
\??\c:\pppjj.exec:\pppjj.exe102⤵PID:3104
-
\??\c:\3nhhhn.exec:\3nhhhn.exe103⤵PID:4332
-
\??\c:\hbbthn.exec:\hbbthn.exe104⤵PID:4088
-
\??\c:\02862.exec:\02862.exe105⤵PID:2172
-
\??\c:\048604.exec:\048604.exe106⤵PID:4548
-
\??\c:\dvvdv.exec:\dvvdv.exe107⤵PID:4036
-
\??\c:\886664.exec:\886664.exe108⤵PID:1180
-
\??\c:\006406.exec:\006406.exe109⤵PID:1404
-
\??\c:\jpjdj.exec:\jpjdj.exe110⤵PID:2300
-
\??\c:\c004882.exec:\c004882.exe111⤵PID:4784
-
\??\c:\2602848.exec:\2602848.exe112⤵PID:3588
-
\??\c:\9djjd.exec:\9djjd.exe113⤵PID:2460
-
\??\c:\9thhhh.exec:\9thhhh.exe114⤵PID:4716
-
\??\c:\e46088.exec:\e46088.exe115⤵PID:3616
-
\??\c:\5pjvd.exec:\5pjvd.exe116⤵PID:3568
-
\??\c:\628266.exec:\628266.exe117⤵PID:2728
-
\??\c:\8888604.exec:\8888604.exe118⤵PID:3324
-
\??\c:\jdppj.exec:\jdppj.exe119⤵PID:364
-
\??\c:\222266.exec:\222266.exe120⤵PID:1948
-
\??\c:\488602.exec:\488602.exe121⤵PID:3068
-
\??\c:\jdvjv.exec:\jdvjv.exe122⤵PID:4368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-