Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 17:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
adf89092eaf1af6b22ab7db8b55c4930N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
adf89092eaf1af6b22ab7db8b55c4930N.exe
-
Size
403KB
-
MD5
adf89092eaf1af6b22ab7db8b55c4930
-
SHA1
124e429d2f141bfbdda57b4d8a5886b3a823aafb
-
SHA256
5685ae1dfb4338d718418271bb8c9df4a084c8f8f8f2c25d5b55ded82e401f48
-
SHA512
e0e249a7780290afda63417a6c68cf2962b8e0e26570377adc0e3339a6505015179f51a4778c9636e629cb67839f38d4b8b2ef7104e7899b65e3e026ddf10c64
-
SSDEEP
3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmPzTkV2wcTl+JBy+3yoRaYZkYh9GVQcI:n3C9BRIG0asYFm71mPfkk+JBy+iJQ
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/3328-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2392-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3772-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4812-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/908-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2356-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4984-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/220-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2464-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/692-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2448-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/912-80-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/912-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-73-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/840-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3104-65-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3104-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4456-58-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4456-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2568-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1060-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2392 602262.exe 1060 djdpj.exe 4672 hbbnht.exe 1636 2640660.exe 2700 pdddp.exe 2568 q40608.exe 4456 llxlfxf.exe 3104 2004840.exe 840 q20088.exe 912 w88086.exe 2504 8460264.exe 1708 1hbnbt.exe 4224 8648488.exe 2448 w40822.exe 692 xllxlff.exe 4088 488884.exe 2464 668648.exe 5052 5bbntn.exe 220 jvdpj.exe 2208 9btnhb.exe 4984 42208.exe 4248 pjdvj.exe 2356 884826.exe 908 tnhnnt.exe 320 i626486.exe 5048 jpppj.exe 4812 nbhttt.exe 3664 g2660.exe 4268 62226.exe 3772 xrxlxlf.exe 3140 4060826.exe 1060 9vvdv.exe 5076 g8826.exe 4424 u686600.exe 640 pjjdp.exe 3036 thnbbb.exe 3412 402860.exe 3848 2484000.exe 3104 bnnbth.exe 1332 002220.exe 3720 bhbtnh.exe 4480 2882008.exe 4832 e00424.exe 1616 86264.exe 1816 20604.exe 2464 4064608.exe 4916 68820.exe 4504 ntnhhb.exe 4316 7bbthh.exe 2768 0804448.exe 3516 20626.exe 800 1fxrffr.exe 2216 bhbhtn.exe 4440 6222042.exe 4536 fxxrffr.exe 2560 8826048.exe 492 fxrlflx.exe 4392 tnhbnh.exe 4528 3ddvd.exe 4708 7rxrrrr.exe 3548 k20820.exe 3712 3bthtn.exe 2548 22820.exe 1156 888482.exe -
resource yara_rule behavioral2/memory/3328-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2392-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3772-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/908-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2356-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/220-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2464-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/692-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2448-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/912-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3104-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2568-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-17-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 422206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2600228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9btnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 664888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2222226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0026626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0400444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bbntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 400044.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 2392 3328 adf89092eaf1af6b22ab7db8b55c4930N.exe 91 PID 3328 wrote to memory of 2392 3328 adf89092eaf1af6b22ab7db8b55c4930N.exe 91 PID 3328 wrote to memory of 2392 3328 adf89092eaf1af6b22ab7db8b55c4930N.exe 91 PID 2392 wrote to memory of 1060 2392 602262.exe 92 PID 2392 wrote to memory of 1060 2392 602262.exe 92 PID 2392 wrote to memory of 1060 2392 602262.exe 92 PID 1060 wrote to memory of 4672 1060 djdpj.exe 93 PID 1060 wrote to memory of 4672 1060 djdpj.exe 93 PID 1060 wrote to memory of 4672 1060 djdpj.exe 93 PID 4672 wrote to memory of 1636 4672 hbbnht.exe 94 PID 4672 wrote to memory of 1636 4672 hbbnht.exe 94 PID 4672 wrote to memory of 1636 4672 hbbnht.exe 94 PID 1636 wrote to memory of 2700 1636 2640660.exe 95 PID 1636 wrote to memory of 2700 1636 2640660.exe 95 PID 1636 wrote to memory of 2700 1636 2640660.exe 95 PID 2700 wrote to memory of 2568 2700 pdddp.exe 96 PID 2700 wrote to memory of 2568 2700 pdddp.exe 96 PID 2700 wrote to memory of 2568 2700 pdddp.exe 96 PID 2568 wrote to memory of 4456 2568 q40608.exe 97 PID 2568 wrote to memory of 4456 2568 q40608.exe 97 PID 2568 wrote to memory of 4456 2568 q40608.exe 97 PID 4456 wrote to memory of 3104 4456 llxlfxf.exe 98 PID 4456 wrote to memory of 3104 4456 llxlfxf.exe 98 PID 4456 wrote to memory of 3104 4456 llxlfxf.exe 98 PID 3104 wrote to memory of 840 3104 2004840.exe 99 PID 3104 wrote to memory of 840 3104 2004840.exe 99 PID 3104 wrote to memory of 840 3104 2004840.exe 99 PID 840 wrote to memory of 912 840 q20088.exe 100 PID 840 wrote to memory of 912 840 q20088.exe 100 PID 840 wrote to memory of 912 840 q20088.exe 100 PID 912 wrote to memory of 2504 912 w88086.exe 101 PID 912 wrote to memory of 2504 912 w88086.exe 101 PID 912 wrote to memory of 2504 912 w88086.exe 101 PID 2504 wrote to memory of 1708 2504 8460264.exe 102 PID 2504 wrote to memory of 1708 2504 8460264.exe 102 PID 2504 wrote to memory of 1708 2504 8460264.exe 102 PID 1708 wrote to memory of 4224 1708 1hbnbt.exe 103 PID 1708 wrote to memory of 4224 1708 1hbnbt.exe 103 PID 1708 wrote to memory of 4224 1708 1hbnbt.exe 103 PID 4224 wrote to memory of 2448 4224 8648488.exe 169 PID 4224 wrote to memory of 2448 4224 8648488.exe 169 PID 4224 wrote to memory of 2448 4224 8648488.exe 169 PID 2448 wrote to memory of 692 2448 w40822.exe 105 PID 2448 wrote to memory of 692 2448 w40822.exe 105 PID 2448 wrote to memory of 692 2448 w40822.exe 105 PID 692 wrote to memory of 4088 692 xllxlff.exe 106 PID 692 wrote to memory of 4088 692 xllxlff.exe 106 PID 692 wrote to memory of 4088 692 xllxlff.exe 106 PID 4088 wrote to memory of 2464 4088 488884.exe 107 PID 4088 wrote to memory of 2464 4088 488884.exe 107 PID 4088 wrote to memory of 2464 4088 488884.exe 107 PID 2464 wrote to memory of 5052 2464 668648.exe 108 PID 2464 wrote to memory of 5052 2464 668648.exe 108 PID 2464 wrote to memory of 5052 2464 668648.exe 108 PID 5052 wrote to memory of 220 5052 5bbntn.exe 109 PID 5052 wrote to memory of 220 5052 5bbntn.exe 109 PID 5052 wrote to memory of 220 5052 5bbntn.exe 109 PID 220 wrote to memory of 2208 220 jvdpj.exe 110 PID 220 wrote to memory of 2208 220 jvdpj.exe 110 PID 220 wrote to memory of 2208 220 jvdpj.exe 110 PID 2208 wrote to memory of 4984 2208 9btnhb.exe 111 PID 2208 wrote to memory of 4984 2208 9btnhb.exe 111 PID 2208 wrote to memory of 4984 2208 9btnhb.exe 111 PID 4984 wrote to memory of 4248 4984 42208.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf89092eaf1af6b22ab7db8b55c4930N.exe"C:\Users\Admin\AppData\Local\Temp\adf89092eaf1af6b22ab7db8b55c4930N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
\??\c:\602262.exec:\602262.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\djdpj.exec:\djdpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
\??\c:\hbbnht.exec:\hbbnht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\2640660.exec:\2640660.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\pdddp.exec:\pdddp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\q40608.exec:\q40608.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\llxlfxf.exec:\llxlfxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\2004840.exec:\2004840.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
\??\c:\q20088.exec:\q20088.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\w88086.exec:\w88086.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
\??\c:\8460264.exec:\8460264.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\1hbnbt.exec:\1hbnbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\8648488.exec:\8648488.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\w40822.exec:\w40822.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\xllxlff.exec:\xllxlff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\488884.exec:\488884.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\668648.exec:\668648.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\5bbntn.exec:\5bbntn.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\jvdpj.exec:\jvdpj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\9btnhb.exec:\9btnhb.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\42208.exec:\42208.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\pjdvj.exec:\pjdvj.exe23⤵
- Executes dropped EXE
PID:4248 -
\??\c:\884826.exec:\884826.exe24⤵
- Executes dropped EXE
PID:2356 -
\??\c:\tnhnnt.exec:\tnhnnt.exe25⤵
- Executes dropped EXE
PID:908 -
\??\c:\i626486.exec:\i626486.exe26⤵
- Executes dropped EXE
PID:320 -
\??\c:\jpppj.exec:\jpppj.exe27⤵
- Executes dropped EXE
PID:5048 -
\??\c:\nbhttt.exec:\nbhttt.exe28⤵
- Executes dropped EXE
PID:4812 -
\??\c:\g2660.exec:\g2660.exe29⤵
- Executes dropped EXE
PID:3664 -
\??\c:\62226.exec:\62226.exe30⤵
- Executes dropped EXE
PID:4268 -
\??\c:\xrxlxlf.exec:\xrxlxlf.exe31⤵
- Executes dropped EXE
PID:3772 -
\??\c:\4060826.exec:\4060826.exe32⤵
- Executes dropped EXE
PID:3140 -
\??\c:\9vvdv.exec:\9vvdv.exe33⤵
- Executes dropped EXE
PID:1060 -
\??\c:\g8826.exec:\g8826.exe34⤵
- Executes dropped EXE
PID:5076 -
\??\c:\u686600.exec:\u686600.exe35⤵
- Executes dropped EXE
PID:4424 -
\??\c:\pjjdp.exec:\pjjdp.exe36⤵
- Executes dropped EXE
PID:640 -
\??\c:\thnbbb.exec:\thnbbb.exe37⤵
- Executes dropped EXE
PID:3036 -
\??\c:\402860.exec:\402860.exe38⤵
- Executes dropped EXE
PID:3412 -
\??\c:\2484000.exec:\2484000.exe39⤵
- Executes dropped EXE
PID:3848 -
\??\c:\bnnbth.exec:\bnnbth.exe40⤵
- Executes dropped EXE
PID:3104 -
\??\c:\002220.exec:\002220.exe41⤵
- Executes dropped EXE
PID:1332 -
\??\c:\bhbtnh.exec:\bhbtnh.exe42⤵
- Executes dropped EXE
PID:3720 -
\??\c:\2882008.exec:\2882008.exe43⤵
- Executes dropped EXE
PID:4480 -
\??\c:\e00424.exec:\e00424.exe44⤵
- Executes dropped EXE
PID:4832 -
\??\c:\86264.exec:\86264.exe45⤵
- Executes dropped EXE
PID:1616 -
\??\c:\20604.exec:\20604.exe46⤵
- Executes dropped EXE
PID:1816 -
\??\c:\4064608.exec:\4064608.exe47⤵
- Executes dropped EXE
PID:2464 -
\??\c:\68820.exec:\68820.exe48⤵
- Executes dropped EXE
PID:4916 -
\??\c:\ntnhhb.exec:\ntnhhb.exe49⤵
- Executes dropped EXE
PID:4504 -
\??\c:\7bbthh.exec:\7bbthh.exe50⤵
- Executes dropped EXE
PID:4316 -
\??\c:\0804448.exec:\0804448.exe51⤵
- Executes dropped EXE
PID:2768 -
\??\c:\20626.exec:\20626.exe52⤵
- Executes dropped EXE
PID:3516 -
\??\c:\1fxrffr.exec:\1fxrffr.exe53⤵
- Executes dropped EXE
PID:800 -
\??\c:\bhbhtn.exec:\bhbhtn.exe54⤵
- Executes dropped EXE
PID:2216 -
\??\c:\6222042.exec:\6222042.exe55⤵
- Executes dropped EXE
PID:4440 -
\??\c:\fxxrffr.exec:\fxxrffr.exe56⤵
- Executes dropped EXE
PID:4536 -
\??\c:\8826048.exec:\8826048.exe57⤵
- Executes dropped EXE
PID:2560 -
\??\c:\fxrlflx.exec:\fxrlflx.exe58⤵
- Executes dropped EXE
PID:492 -
\??\c:\tnhbnh.exec:\tnhbnh.exe59⤵
- Executes dropped EXE
PID:4392 -
\??\c:\xlfflrf.exec:\xlfflrf.exe60⤵PID:3160
-
\??\c:\3ddvd.exec:\3ddvd.exe61⤵
- Executes dropped EXE
PID:4528 -
\??\c:\7rxrrrr.exec:\7rxrrrr.exe62⤵
- Executes dropped EXE
PID:4708 -
\??\c:\k20820.exec:\k20820.exe63⤵
- Executes dropped EXE
PID:3548 -
\??\c:\3bthtn.exec:\3bthtn.exe64⤵
- Executes dropped EXE
PID:3712 -
\??\c:\22820.exec:\22820.exe65⤵
- Executes dropped EXE
PID:2548 -
\??\c:\888482.exec:\888482.exe66⤵
- Executes dropped EXE
PID:1156 -
\??\c:\80642.exec:\80642.exe67⤵PID:3536
-
\??\c:\6004604.exec:\6004604.exe68⤵PID:4808
-
\??\c:\frfrrll.exec:\frfrrll.exe69⤵PID:388
-
\??\c:\w22648.exec:\w22648.exe70⤵PID:5028
-
\??\c:\nnnbbt.exec:\nnnbbt.exe71⤵PID:4480
-
\??\c:\2064482.exec:\2064482.exe72⤵PID:2052
-
\??\c:\0444248.exec:\0444248.exe73⤵PID:1952
-
\??\c:\xxlfxxl.exec:\xxlfxxl.exe74⤵PID:4388
-
\??\c:\jvvpd.exec:\jvvpd.exe75⤵PID:1656
-
\??\c:\202060.exec:\202060.exe76⤵PID:1576
-
\??\c:\0004226.exec:\0004226.exe77⤵PID:4504
-
\??\c:\bnttnb.exec:\bnttnb.exe78⤵PID:4556
-
\??\c:\644444.exec:\644444.exe79⤵PID:4208
-
\??\c:\666486.exec:\666486.exe80⤵PID:2448
-
\??\c:\jddvv.exec:\jddvv.exe81⤵PID:2492
-
\??\c:\68848.exec:\68848.exe82⤵PID:2500
-
\??\c:\rlfrxrl.exec:\rlfrxrl.exe83⤵PID:1004
-
\??\c:\224048.exec:\224048.exe84⤵PID:3100
-
\??\c:\4248260.exec:\4248260.exe85⤵PID:5048
-
\??\c:\hbtnhn.exec:\hbtnhn.exe86⤵PID:3028
-
\??\c:\06664.exec:\06664.exe87⤵PID:3924
-
\??\c:\xrlfrrl.exec:\xrlfrrl.exe88⤵PID:4268
-
\??\c:\rxfxrlf.exec:\rxfxrlf.exe89⤵PID:4392
-
\??\c:\1xfrxrx.exec:\1xfrxrx.exe90⤵PID:3160
-
\??\c:\622044.exec:\622044.exe91⤵PID:4448
-
\??\c:\c808648.exec:\c808648.exe92⤵PID:3060
-
\??\c:\nbbttt.exec:\nbbttt.exe93⤵PID:4708
-
\??\c:\28002.exec:\28002.exe94⤵PID:2660
-
\??\c:\242226.exec:\242226.exe95⤵PID:2028
-
\??\c:\pjpdv.exec:\pjpdv.exe96⤵PID:1960
-
\??\c:\xlrllfl.exec:\xlrllfl.exe97⤵PID:3504
-
\??\c:\5flfxxl.exec:\5flfxxl.exe98⤵PID:4432
-
\??\c:\xllfrlf.exec:\xllfrlf.exe99⤵PID:572
-
\??\c:\22664.exec:\22664.exe100⤵PID:3536
-
\??\c:\lflxrlx.exec:\lflxrlx.exe101⤵PID:3328
-
\??\c:\7tnbnh.exec:\7tnbnh.exe102⤵PID:2996
-
\??\c:\s8404.exec:\s8404.exe103⤵PID:2876
-
\??\c:\jpvjj.exec:\jpvjj.exe104⤵PID:4920
-
\??\c:\6084008.exec:\6084008.exe105⤵PID:2568
-
\??\c:\ththbt.exec:\ththbt.exe106⤵PID:924
-
\??\c:\k68626.exec:\k68626.exe107⤵PID:692
-
\??\c:\tttntb.exec:\tttntb.exe108⤵PID:4640
-
\??\c:\0882084.exec:\0882084.exe109⤵PID:4916
-
\??\c:\hthttt.exec:\hthttt.exe110⤵PID:2504
-
\??\c:\3dvvj.exec:\3dvvj.exe111⤵PID:3584
-
\??\c:\022048.exec:\022048.exe112⤵PID:3476
-
\??\c:\o426448.exec:\o426448.exe113⤵PID:5024
-
\??\c:\0400444.exec:\0400444.exe114⤵
- System Location Discovery: System Language Discovery
PID:2184 -
\??\c:\lrxxrrf.exec:\lrxxrrf.exe115⤵PID:2572
-
\??\c:\48660.exec:\48660.exe116⤵PID:2216
-
\??\c:\866044.exec:\866044.exe117⤵PID:3100
-
\??\c:\btnhbt.exec:\btnhbt.exe118⤵PID:5048
-
\??\c:\hhnhbt.exec:\hhnhbt.exe119⤵PID:3028
-
\??\c:\nnthht.exec:\nnthht.exe120⤵PID:708
-
\??\c:\0004488.exec:\0004488.exe121⤵PID:1792
-
\??\c:\5hnbhh.exec:\5hnbhh.exe122⤵PID:4360
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-