Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe
Resource
win7-20240903-en
General
-
Target
47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe
-
Size
83KB
-
MD5
47101f1f654f70d2ac978618874c74c0
-
SHA1
d8f4c2533aefd4da45fda5ba815925c9b7791b1b
-
SHA256
47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895
-
SHA512
f069f82f801f635ddef739f525f66833cda7685d156981299bda7f8d48b7bf461a8d7c0cee9d196ea9f6862f1aaab02f661834dd9d1e1be20be9857b5b9d3d80
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QW:ymb3NkkiQ3mdBjFIIp9L9QrrA8p
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/4412-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1156-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/204-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1596-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4972-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4112-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1420-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2916-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2120-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2240-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/732-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1104-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3272-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2244-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1256-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/712-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5044-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3132-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1156 0682660.exe 204 jjdjp.exe 3416 068084.exe 1596 flrlxxl.exe 4796 o086206.exe 4972 bnnnhh.exe 3452 046660.exe 4112 86426.exe 1420 008844.exe 4536 408828.exe 4172 1hhhhh.exe 2916 xlxrrrl.exe 2516 86862.exe 2120 862644.exe 3956 6066600.exe 2240 djjpp.exe 732 4842066.exe 2768 4464882.exe 2928 42284.exe 1104 nttnbh.exe 3272 3vvpd.exe 2244 k02660.exe 1544 1dpjj.exe 1340 486688.exe 4812 682822.exe 1256 ntbtbh.exe 712 5dvdv.exe 5044 bthtnn.exe 3132 xllrxff.exe 2432 hbttnh.exe 2108 vjpjd.exe 2124 dpvvp.exe 5092 c882660.exe 4804 9dvdd.exe 4532 06264.exe 1008 884444.exe 4392 022822.exe 1072 hnnnnt.exe 2288 xrrlxxx.exe 3304 6844448.exe 2692 pdjdd.exe 2488 408882.exe 4736 lrlxlrr.exe 5068 0622648.exe 1440 ppvvp.exe 216 6200888.exe 3712 pjjdv.exe 2424 lxxlrxr.exe 424 9rllllf.exe 1476 pvpdd.exe 1584 468282.exe 1420 1jvpd.exe 2852 djddv.exe 2980 o288626.exe 996 xfrlfff.exe 4172 rrxrflf.exe 2304 828826.exe 5004 dvppj.exe 2164 nhtnnn.exe 536 tnnnbb.exe 4704 i844444.exe 3864 hhnthb.exe 4304 e04266.exe 5060 bbbbtb.exe -
resource yara_rule behavioral2/memory/4412-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1156-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/204-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/204-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1596-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4972-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4972-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1420-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1420-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1420-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2916-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2120-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2240-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/732-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1104-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3272-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2244-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1256-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5044-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3132-199-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6048448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w68822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 1156 4412 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 83 PID 4412 wrote to memory of 1156 4412 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 83 PID 4412 wrote to memory of 1156 4412 47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe 83 PID 1156 wrote to memory of 204 1156 0682660.exe 84 PID 1156 wrote to memory of 204 1156 0682660.exe 84 PID 1156 wrote to memory of 204 1156 0682660.exe 84 PID 204 wrote to memory of 3416 204 jjdjp.exe 85 PID 204 wrote to memory of 3416 204 jjdjp.exe 85 PID 204 wrote to memory of 3416 204 jjdjp.exe 85 PID 3416 wrote to memory of 1596 3416 068084.exe 86 PID 3416 wrote to memory of 1596 3416 068084.exe 86 PID 3416 wrote to memory of 1596 3416 068084.exe 86 PID 1596 wrote to memory of 4796 1596 flrlxxl.exe 87 PID 1596 wrote to memory of 4796 1596 flrlxxl.exe 87 PID 1596 wrote to memory of 4796 1596 flrlxxl.exe 87 PID 4796 wrote to memory of 4972 4796 o086206.exe 88 PID 4796 wrote to memory of 4972 4796 o086206.exe 88 PID 4796 wrote to memory of 4972 4796 o086206.exe 88 PID 4972 wrote to memory of 3452 4972 bnnnhh.exe 89 PID 4972 wrote to memory of 3452 4972 bnnnhh.exe 89 PID 4972 wrote to memory of 3452 4972 bnnnhh.exe 89 PID 3452 wrote to memory of 4112 3452 046660.exe 90 PID 3452 wrote to memory of 4112 3452 046660.exe 90 PID 3452 wrote to memory of 4112 3452 046660.exe 90 PID 4112 wrote to memory of 1420 4112 86426.exe 91 PID 4112 wrote to memory of 1420 4112 86426.exe 91 PID 4112 wrote to memory of 1420 4112 86426.exe 91 PID 1420 wrote to memory of 4536 1420 008844.exe 92 PID 1420 wrote to memory of 4536 1420 008844.exe 92 PID 1420 wrote to memory of 4536 1420 008844.exe 92 PID 4536 wrote to memory of 4172 4536 408828.exe 93 PID 4536 wrote to memory of 4172 4536 408828.exe 93 PID 4536 wrote to memory of 4172 4536 408828.exe 93 PID 4172 wrote to memory of 2916 4172 1hhhhh.exe 94 PID 4172 wrote to memory of 2916 4172 1hhhhh.exe 94 PID 4172 wrote to memory of 2916 4172 1hhhhh.exe 94 PID 2916 wrote to memory of 2516 2916 xlxrrrl.exe 95 PID 2916 wrote to memory of 2516 2916 xlxrrrl.exe 95 PID 2916 wrote to memory of 2516 2916 xlxrrrl.exe 95 PID 2516 wrote to memory of 2120 2516 86862.exe 96 PID 2516 wrote to memory of 2120 2516 86862.exe 96 PID 2516 wrote to memory of 2120 2516 86862.exe 96 PID 2120 wrote to memory of 3956 2120 862644.exe 97 PID 2120 wrote to memory of 3956 2120 862644.exe 97 PID 2120 wrote to memory of 3956 2120 862644.exe 97 PID 3956 wrote to memory of 2240 3956 6066600.exe 98 PID 3956 wrote to memory of 2240 3956 6066600.exe 98 PID 3956 wrote to memory of 2240 3956 6066600.exe 98 PID 2240 wrote to memory of 732 2240 djjpp.exe 99 PID 2240 wrote to memory of 732 2240 djjpp.exe 99 PID 2240 wrote to memory of 732 2240 djjpp.exe 99 PID 732 wrote to memory of 2768 732 4842066.exe 100 PID 732 wrote to memory of 2768 732 4842066.exe 100 PID 732 wrote to memory of 2768 732 4842066.exe 100 PID 2768 wrote to memory of 2928 2768 4464882.exe 101 PID 2768 wrote to memory of 2928 2768 4464882.exe 101 PID 2768 wrote to memory of 2928 2768 4464882.exe 101 PID 2928 wrote to memory of 1104 2928 42284.exe 102 PID 2928 wrote to memory of 1104 2928 42284.exe 102 PID 2928 wrote to memory of 1104 2928 42284.exe 102 PID 1104 wrote to memory of 3272 1104 nttnbh.exe 103 PID 1104 wrote to memory of 3272 1104 nttnbh.exe 103 PID 1104 wrote to memory of 3272 1104 nttnbh.exe 103 PID 3272 wrote to memory of 2244 3272 3vvpd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe"C:\Users\Admin\AppData\Local\Temp\47c47ede3ab7b1e484afed021c939fbed20469113d92f372f49c1f7199ea4895N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\0682660.exec:\0682660.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
\??\c:\jjdjp.exec:\jjdjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:204 -
\??\c:\068084.exec:\068084.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
\??\c:\flrlxxl.exec:\flrlxxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\o086206.exec:\o086206.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\bnnnhh.exec:\bnnnhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
\??\c:\046660.exec:\046660.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
\??\c:\86426.exec:\86426.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
\??\c:\008844.exec:\008844.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\408828.exec:\408828.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\1hhhhh.exec:\1hhhhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\xlxrrrl.exec:\xlxrrrl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\86862.exec:\86862.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\862644.exec:\862644.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
\??\c:\6066600.exec:\6066600.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
\??\c:\djjpp.exec:\djjpp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\4842066.exec:\4842066.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
\??\c:\4464882.exec:\4464882.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\42284.exec:\42284.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\nttnbh.exec:\nttnbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\3vvpd.exec:\3vvpd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
\??\c:\k02660.exec:\k02660.exe23⤵
- Executes dropped EXE
PID:2244 -
\??\c:\1dpjj.exec:\1dpjj.exe24⤵
- Executes dropped EXE
PID:1544 -
\??\c:\486688.exec:\486688.exe25⤵
- Executes dropped EXE
PID:1340 -
\??\c:\682822.exec:\682822.exe26⤵
- Executes dropped EXE
PID:4812 -
\??\c:\ntbtbh.exec:\ntbtbh.exe27⤵
- Executes dropped EXE
PID:1256 -
\??\c:\5dvdv.exec:\5dvdv.exe28⤵
- Executes dropped EXE
PID:712 -
\??\c:\bthtnn.exec:\bthtnn.exe29⤵
- Executes dropped EXE
PID:5044 -
\??\c:\xllrxff.exec:\xllrxff.exe30⤵
- Executes dropped EXE
PID:3132 -
\??\c:\hbttnh.exec:\hbttnh.exe31⤵
- Executes dropped EXE
PID:2432 -
\??\c:\vjpjd.exec:\vjpjd.exe32⤵
- Executes dropped EXE
PID:2108 -
\??\c:\dpvvp.exec:\dpvvp.exe33⤵
- Executes dropped EXE
PID:2124 -
\??\c:\c882660.exec:\c882660.exe34⤵
- Executes dropped EXE
PID:5092 -
\??\c:\9dvdd.exec:\9dvdd.exe35⤵
- Executes dropped EXE
PID:4804 -
\??\c:\06264.exec:\06264.exe36⤵
- Executes dropped EXE
PID:4532 -
\??\c:\884444.exec:\884444.exe37⤵
- Executes dropped EXE
PID:1008 -
\??\c:\022822.exec:\022822.exe38⤵
- Executes dropped EXE
PID:4392 -
\??\c:\hnnnnt.exec:\hnnnnt.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072 -
\??\c:\xrrlxxx.exec:\xrrlxxx.exe40⤵
- Executes dropped EXE
PID:2288 -
\??\c:\6844448.exec:\6844448.exe41⤵
- Executes dropped EXE
PID:3304 -
\??\c:\pdjdd.exec:\pdjdd.exe42⤵
- Executes dropped EXE
PID:2692 -
\??\c:\408882.exec:\408882.exe43⤵
- Executes dropped EXE
PID:2488 -
\??\c:\lrlxlrr.exec:\lrlxlrr.exe44⤵
- Executes dropped EXE
PID:4736 -
\??\c:\0622648.exec:\0622648.exe45⤵
- Executes dropped EXE
PID:5068 -
\??\c:\ppvvp.exec:\ppvvp.exe46⤵
- Executes dropped EXE
PID:1440 -
\??\c:\6200888.exec:\6200888.exe47⤵
- Executes dropped EXE
PID:216 -
\??\c:\pjjdv.exec:\pjjdv.exe48⤵
- Executes dropped EXE
PID:3712 -
\??\c:\lxxlrxr.exec:\lxxlrxr.exe49⤵
- Executes dropped EXE
PID:2424 -
\??\c:\9rllllf.exec:\9rllllf.exe50⤵
- Executes dropped EXE
PID:424 -
\??\c:\pvpdd.exec:\pvpdd.exe51⤵
- Executes dropped EXE
PID:1476 -
\??\c:\468282.exec:\468282.exe52⤵
- Executes dropped EXE
PID:1584 -
\??\c:\1jvpd.exec:\1jvpd.exe53⤵
- Executes dropped EXE
PID:1420 -
\??\c:\djddv.exec:\djddv.exe54⤵
- Executes dropped EXE
PID:2852 -
\??\c:\o288626.exec:\o288626.exe55⤵
- Executes dropped EXE
PID:2980 -
\??\c:\xfrlfff.exec:\xfrlfff.exe56⤵
- Executes dropped EXE
PID:996 -
\??\c:\rrxrflf.exec:\rrxrflf.exe57⤵
- Executes dropped EXE
PID:4172 -
\??\c:\828826.exec:\828826.exe58⤵
- Executes dropped EXE
PID:2304 -
\??\c:\dvppj.exec:\dvppj.exe59⤵
- Executes dropped EXE
PID:5004 -
\??\c:\nhtnnn.exec:\nhtnnn.exe60⤵
- Executes dropped EXE
PID:2164 -
\??\c:\tnnnbb.exec:\tnnnbb.exe61⤵
- Executes dropped EXE
PID:536 -
\??\c:\i844444.exec:\i844444.exe62⤵
- Executes dropped EXE
PID:4704 -
\??\c:\hhnthb.exec:\hhnthb.exe63⤵
- Executes dropped EXE
PID:3864 -
\??\c:\e04266.exec:\e04266.exe64⤵
- Executes dropped EXE
PID:4304 -
\??\c:\bbbbtb.exec:\bbbbtb.exe65⤵
- Executes dropped EXE
PID:5060 -
\??\c:\rlllrrl.exec:\rlllrrl.exe66⤵PID:864
-
\??\c:\806666.exec:\806666.exe67⤵PID:1964
-
\??\c:\fxxxrfl.exec:\fxxxrfl.exe68⤵PID:732
-
\??\c:\bhbtnn.exec:\bhbtnn.exe69⤵PID:3968
-
\??\c:\04228.exec:\04228.exe70⤵PID:2768
-
\??\c:\hhnnbb.exec:\hhnnbb.exe71⤵PID:2928
-
\??\c:\rrllrxl.exec:\rrllrxl.exe72⤵
- System Location Discovery: System Language Discovery
PID:1104 -
\??\c:\xlrllll.exec:\xlrllll.exe73⤵PID:1284
-
\??\c:\xxfxrxr.exec:\xxfxrxr.exe74⤵PID:4848
-
\??\c:\lxxxxxx.exec:\lxxxxxx.exe75⤵PID:460
-
\??\c:\bhbnhn.exec:\bhbnhn.exe76⤵PID:4828
-
\??\c:\bntnhb.exec:\bntnhb.exe77⤵PID:1340
-
\??\c:\hbtbhn.exec:\hbtbhn.exe78⤵PID:3100
-
\??\c:\i604888.exec:\i604888.exe79⤵PID:4812
-
\??\c:\2222222.exec:\2222222.exe80⤵PID:1256
-
\??\c:\g4444.exec:\g4444.exe81⤵PID:4604
-
\??\c:\rlfxffl.exec:\rlfxffl.exe82⤵PID:3680
-
\??\c:\dvjdj.exec:\dvjdj.exe83⤵PID:3144
-
\??\c:\nnhtnh.exec:\nnhtnh.exe84⤵PID:1336
-
\??\c:\thbttt.exec:\thbttt.exe85⤵PID:2432
-
\??\c:\846600.exec:\846600.exe86⤵PID:4764
-
\??\c:\44824.exec:\44824.exe87⤵PID:1948
-
\??\c:\bnbnbt.exec:\bnbnbt.exe88⤵PID:3248
-
\??\c:\jjjjp.exec:\jjjjp.exe89⤵PID:636
-
\??\c:\vpdvv.exec:\vpdvv.exe90⤵PID:1188
-
\??\c:\xxrxfrf.exec:\xxrxfrf.exe91⤵PID:2840
-
\??\c:\bbnhhh.exec:\bbnhhh.exe92⤵PID:1424
-
\??\c:\hnttnb.exec:\hnttnb.exe93⤵PID:4380
-
\??\c:\fxlflrx.exec:\fxlflrx.exe94⤵PID:2116
-
\??\c:\0202660.exec:\0202660.exe95⤵PID:1072
-
\??\c:\bhthht.exec:\bhthht.exe96⤵PID:2396
-
\??\c:\bthbtn.exec:\bthbtn.exe97⤵PID:1972
-
\??\c:\a8044.exec:\a8044.exe98⤵PID:1636
-
\??\c:\htbtnn.exec:\htbtnn.exe99⤵PID:3456
-
\??\c:\m6260.exec:\m6260.exe100⤵PID:1592
-
\??\c:\e28000.exec:\e28000.exe101⤵PID:2576
-
\??\c:\s0280.exec:\s0280.exe102⤵PID:3064
-
\??\c:\nthbtt.exec:\nthbtt.exe103⤵PID:1984
-
\??\c:\dvdvj.exec:\dvdvj.exe104⤵PID:4748
-
\??\c:\pdvdp.exec:\pdvdp.exe105⤵PID:3712
-
\??\c:\llfxxxf.exec:\llfxxxf.exe106⤵PID:1172
-
\??\c:\a0828.exec:\a0828.exe107⤵PID:4624
-
\??\c:\7nnhbh.exec:\7nnhbh.exe108⤵PID:2152
-
\??\c:\o626822.exec:\o626822.exe109⤵PID:4836
-
\??\c:\bthntt.exec:\bthntt.exe110⤵PID:2224
-
\??\c:\82440.exec:\82440.exe111⤵PID:1520
-
\??\c:\bthhhh.exec:\bthhhh.exe112⤵PID:4004
-
\??\c:\lfrlxxr.exec:\lfrlxxr.exe113⤵
- System Location Discovery: System Language Discovery
PID:996 -
\??\c:\266666.exec:\266666.exe114⤵PID:3608
-
\??\c:\8848202.exec:\8848202.exe115⤵PID:60
-
\??\c:\rfxrxrx.exec:\rfxrxrx.exe116⤵PID:4172
-
\??\c:\84000.exec:\84000.exe117⤵PID:2708
-
\??\c:\o826220.exec:\o826220.exe118⤵PID:4480
-
\??\c:\bthhnt.exec:\bthhnt.exe119⤵PID:5028
-
\??\c:\3djjd.exec:\3djjd.exe120⤵PID:2052
-
\??\c:\rlrlfll.exec:\rlrlfll.exe121⤵PID:2992
-
\??\c:\btnhhb.exec:\btnhhb.exe122⤵PID:1300
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-