Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 02:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4df053f3f442e606571bc49c6e6df030N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
4df053f3f442e606571bc49c6e6df030N.exe
-
Size
91KB
-
MD5
4df053f3f442e606571bc49c6e6df030
-
SHA1
9281627b280953325ab141d4420d3023761f8ac3
-
SHA256
82359b024bcebbf41b4e1a5109ecef6f171588c0c79a868a02cd1c62b9ce1072
-
SHA512
aadd71e6f216c0703352b44963721827bb90fc702e6000df21e07ea9022a307f76a379f7751afcd7455cb38ff8fa5db0271ffeebd0f9dfe0893ebfdfd639d01c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZaRBv:ymb3NkkiQ3mdBjFIVLd2hWZGreRCYBVl
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral2/memory/1748-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/224-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1748-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4052-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3412-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3512-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2148-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4020-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3820-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/536-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5064-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1172-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4680-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/516-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5072-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4440-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/756-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 224 ttbnhb.exe 3512 48486.exe 4052 i226004.exe 3412 0004606.exe 2148 082426.exe 4020 btnhbt.exe 3820 pppjv.exe 4576 a8004.exe 3432 dpvjj.exe 2996 vppjv.exe 536 6428666.exe 5004 8682660.exe 4608 26466.exe 1008 dvpdv.exe 5064 btnhtn.exe 4668 vpjdp.exe 1172 xrllxxr.exe 4680 hhhbht.exe 516 nthnbh.exe 5072 240280.exe 2388 424448.exe 3780 httttt.exe 4440 rxfffff.exe 2176 jjddj.exe 756 842822.exe 4492 m4262.exe 4164 g0044.exe 648 bnnhbt.exe 4460 40042.exe 3048 xlfxfxr.exe 1316 1rrffxx.exe 892 68426.exe 3424 vjjjj.exe 1120 42268.exe 1512 hbbnth.exe 3352 488628.exe 2108 pjpjd.exe 3604 o448606.exe 1304 602622.exe 532 0084002.exe 1824 9nhbtt.exe 4844 fllxrlf.exe 2800 02042.exe 4016 8028660.exe 3180 dvvpp.exe 4272 822422.exe 4740 8804826.exe 3480 pjpjd.exe 4552 22884.exe 2368 2428604.exe 3536 o282604.exe 5072 8804266.exe 2344 646846.exe 3900 vpvdj.exe 2948 5rlfrxx.exe 1400 662020.exe 4520 5vpdv.exe 2944 tbbttb.exe 1708 68242.exe 212 xxlrlrl.exe 2440 bnnnbt.exe 3272 2886426.exe 224 ddjdv.exe 4052 86866.exe -
resource yara_rule behavioral2/memory/1748-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/224-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1748-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4052-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3412-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3512-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4020-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3820-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/536-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5064-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1172-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4680-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/516-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5072-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4440-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/756-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-193-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 680480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0648004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0044040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s4660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 224 1748 4df053f3f442e606571bc49c6e6df030N.exe 89 PID 1748 wrote to memory of 224 1748 4df053f3f442e606571bc49c6e6df030N.exe 89 PID 1748 wrote to memory of 224 1748 4df053f3f442e606571bc49c6e6df030N.exe 89 PID 224 wrote to memory of 3512 224 ttbnhb.exe 90 PID 224 wrote to memory of 3512 224 ttbnhb.exe 90 PID 224 wrote to memory of 3512 224 ttbnhb.exe 90 PID 3512 wrote to memory of 4052 3512 48486.exe 91 PID 3512 wrote to memory of 4052 3512 48486.exe 91 PID 3512 wrote to memory of 4052 3512 48486.exe 91 PID 4052 wrote to memory of 3412 4052 i226004.exe 92 PID 4052 wrote to memory of 3412 4052 i226004.exe 92 PID 4052 wrote to memory of 3412 4052 i226004.exe 92 PID 3412 wrote to memory of 2148 3412 0004606.exe 93 PID 3412 wrote to memory of 2148 3412 0004606.exe 93 PID 3412 wrote to memory of 2148 3412 0004606.exe 93 PID 2148 wrote to memory of 4020 2148 082426.exe 94 PID 2148 wrote to memory of 4020 2148 082426.exe 94 PID 2148 wrote to memory of 4020 2148 082426.exe 94 PID 4020 wrote to memory of 3820 4020 btnhbt.exe 95 PID 4020 wrote to memory of 3820 4020 btnhbt.exe 95 PID 4020 wrote to memory of 3820 4020 btnhbt.exe 95 PID 3820 wrote to memory of 4576 3820 pppjv.exe 96 PID 3820 wrote to memory of 4576 3820 pppjv.exe 96 PID 3820 wrote to memory of 4576 3820 pppjv.exe 96 PID 4576 wrote to memory of 3432 4576 a8004.exe 97 PID 4576 wrote to memory of 3432 4576 a8004.exe 97 PID 4576 wrote to memory of 3432 4576 a8004.exe 97 PID 3432 wrote to memory of 2996 3432 dpvjj.exe 98 PID 3432 wrote to memory of 2996 3432 dpvjj.exe 98 PID 3432 wrote to memory of 2996 3432 dpvjj.exe 98 PID 2996 wrote to memory of 536 2996 vppjv.exe 100 PID 2996 wrote to memory of 536 2996 vppjv.exe 100 PID 2996 wrote to memory of 536 2996 vppjv.exe 100 PID 536 wrote to memory of 5004 536 6428666.exe 101 PID 536 wrote to memory of 5004 536 6428666.exe 101 PID 536 wrote to memory of 5004 536 6428666.exe 101 PID 5004 wrote to memory of 4608 5004 8682660.exe 102 PID 5004 wrote to memory of 4608 5004 8682660.exe 102 PID 5004 wrote to memory of 4608 5004 8682660.exe 102 PID 4608 wrote to memory of 1008 4608 26466.exe 103 PID 4608 wrote to memory of 1008 4608 26466.exe 103 PID 4608 wrote to memory of 1008 4608 26466.exe 103 PID 1008 wrote to memory of 5064 1008 dvpdv.exe 104 PID 1008 wrote to memory of 5064 1008 dvpdv.exe 104 PID 1008 wrote to memory of 5064 1008 dvpdv.exe 104 PID 5064 wrote to memory of 4668 5064 btnhtn.exe 105 PID 5064 wrote to memory of 4668 5064 btnhtn.exe 105 PID 5064 wrote to memory of 4668 5064 btnhtn.exe 105 PID 4668 wrote to memory of 1172 4668 vpjdp.exe 106 PID 4668 wrote to memory of 1172 4668 vpjdp.exe 106 PID 4668 wrote to memory of 1172 4668 vpjdp.exe 106 PID 1172 wrote to memory of 4680 1172 xrllxxr.exe 107 PID 1172 wrote to memory of 4680 1172 xrllxxr.exe 107 PID 1172 wrote to memory of 4680 1172 xrllxxr.exe 107 PID 4680 wrote to memory of 516 4680 hhhbht.exe 109 PID 4680 wrote to memory of 516 4680 hhhbht.exe 109 PID 4680 wrote to memory of 516 4680 hhhbht.exe 109 PID 516 wrote to memory of 5072 516 nthnbh.exe 143 PID 516 wrote to memory of 5072 516 nthnbh.exe 143 PID 516 wrote to memory of 5072 516 nthnbh.exe 143 PID 5072 wrote to memory of 2388 5072 240280.exe 111 PID 5072 wrote to memory of 2388 5072 240280.exe 111 PID 5072 wrote to memory of 2388 5072 240280.exe 111 PID 2388 wrote to memory of 3780 2388 424448.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df053f3f442e606571bc49c6e6df030N.exe"C:\Users\Admin\AppData\Local\Temp\4df053f3f442e606571bc49c6e6df030N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\ttbnhb.exec:\ttbnhb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
\??\c:\48486.exec:\48486.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\i226004.exec:\i226004.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
\??\c:\0004606.exec:\0004606.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
\??\c:\082426.exec:\082426.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\btnhbt.exec:\btnhbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
\??\c:\pppjv.exec:\pppjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
\??\c:\a8004.exec:\a8004.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\dpvjj.exec:\dpvjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
\??\c:\vppjv.exec:\vppjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\6428666.exec:\6428666.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\8682660.exec:\8682660.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\26466.exec:\26466.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
\??\c:\dvpdv.exec:\dvpdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\btnhtn.exec:\btnhtn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\vpjdp.exec:\vpjdp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\xrllxxr.exec:\xrllxxr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\hhhbht.exec:\hhhbht.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
\??\c:\nthnbh.exec:\nthnbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:516 -
\??\c:\240280.exec:\240280.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\424448.exec:\424448.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\httttt.exec:\httttt.exe23⤵
- Executes dropped EXE
PID:3780 -
\??\c:\rxfffff.exec:\rxfffff.exe24⤵
- Executes dropped EXE
PID:4440 -
\??\c:\jjddj.exec:\jjddj.exe25⤵
- Executes dropped EXE
PID:2176 -
\??\c:\842822.exec:\842822.exe26⤵
- Executes dropped EXE
PID:756 -
\??\c:\m4262.exec:\m4262.exe27⤵
- Executes dropped EXE
PID:4492 -
\??\c:\g0044.exec:\g0044.exe28⤵
- Executes dropped EXE
PID:4164 -
\??\c:\bnnhbt.exec:\bnnhbt.exe29⤵
- Executes dropped EXE
PID:648 -
\??\c:\40042.exec:\40042.exe30⤵
- Executes dropped EXE
PID:4460 -
\??\c:\xlfxfxr.exec:\xlfxfxr.exe31⤵
- Executes dropped EXE
PID:3048 -
\??\c:\1rrffxx.exec:\1rrffxx.exe32⤵
- Executes dropped EXE
PID:1316 -
\??\c:\68426.exec:\68426.exe33⤵
- Executes dropped EXE
PID:892 -
\??\c:\vjjjj.exec:\vjjjj.exe34⤵
- Executes dropped EXE
PID:3424 -
\??\c:\42268.exec:\42268.exe35⤵
- Executes dropped EXE
PID:1120 -
\??\c:\hbbnth.exec:\hbbnth.exe36⤵
- Executes dropped EXE
PID:1512 -
\??\c:\488628.exec:\488628.exe37⤵
- Executes dropped EXE
PID:3352 -
\??\c:\pjpjd.exec:\pjpjd.exe38⤵
- Executes dropped EXE
PID:2108 -
\??\c:\o448606.exec:\o448606.exe39⤵
- Executes dropped EXE
PID:3604 -
\??\c:\602622.exec:\602622.exe40⤵
- Executes dropped EXE
PID:1304 -
\??\c:\0084002.exec:\0084002.exe41⤵
- Executes dropped EXE
PID:532 -
\??\c:\9nhbtt.exec:\9nhbtt.exe42⤵
- Executes dropped EXE
PID:1824 -
\??\c:\fllxrlf.exec:\fllxrlf.exe43⤵
- Executes dropped EXE
PID:4844 -
\??\c:\02042.exec:\02042.exe44⤵
- Executes dropped EXE
PID:2800 -
\??\c:\8028660.exec:\8028660.exe45⤵
- Executes dropped EXE
PID:4016 -
\??\c:\dvvpp.exec:\dvvpp.exe46⤵
- Executes dropped EXE
PID:3180 -
\??\c:\822422.exec:\822422.exe47⤵
- Executes dropped EXE
PID:4272 -
\??\c:\8804826.exec:\8804826.exe48⤵
- Executes dropped EXE
PID:4740 -
\??\c:\pjpjd.exec:\pjpjd.exe49⤵
- Executes dropped EXE
PID:3480 -
\??\c:\22884.exec:\22884.exe50⤵
- Executes dropped EXE
PID:4552 -
\??\c:\2428604.exec:\2428604.exe51⤵
- Executes dropped EXE
PID:2368 -
\??\c:\o282604.exec:\o282604.exe52⤵
- Executes dropped EXE
PID:3536 -
\??\c:\8804266.exec:\8804266.exe53⤵
- Executes dropped EXE
PID:5072 -
\??\c:\646846.exec:\646846.exe54⤵
- Executes dropped EXE
PID:2344 -
\??\c:\vpvdj.exec:\vpvdj.exe55⤵
- Executes dropped EXE
PID:3900 -
\??\c:\5rlfrxx.exec:\5rlfrxx.exe56⤵
- Executes dropped EXE
PID:2948 -
\??\c:\662020.exec:\662020.exe57⤵
- Executes dropped EXE
PID:1400 -
\??\c:\5vpdv.exec:\5vpdv.exe58⤵
- Executes dropped EXE
PID:4520 -
\??\c:\tbbttb.exec:\tbbttb.exe59⤵
- Executes dropped EXE
PID:2944 -
\??\c:\68242.exec:\68242.exe60⤵
- Executes dropped EXE
PID:1708 -
\??\c:\xxlrlrl.exec:\xxlrlrl.exe61⤵
- Executes dropped EXE
PID:212 -
\??\c:\bnnnbt.exec:\bnnnbt.exe62⤵
- Executes dropped EXE
PID:2440 -
\??\c:\2886426.exec:\2886426.exe63⤵
- Executes dropped EXE
PID:3272 -
\??\c:\ddjdv.exec:\ddjdv.exe64⤵
- Executes dropped EXE
PID:224 -
\??\c:\86866.exec:\86866.exe65⤵
- Executes dropped EXE
PID:4052 -
\??\c:\040848.exec:\040848.exe66⤵PID:2960
-
\??\c:\80602.exec:\80602.exe67⤵PID:644
-
\??\c:\o886608.exec:\o886608.exe68⤵PID:1264
-
\??\c:\pjvdd.exec:\pjvdd.exe69⤵PID:892
-
\??\c:\66604.exec:\66604.exe70⤵PID:3032
-
\??\c:\88486.exec:\88486.exe71⤵PID:3540
-
\??\c:\08000.exec:\08000.exe72⤵PID:3168
-
\??\c:\48260.exec:\48260.exe73⤵PID:3352
-
\??\c:\pjdvp.exec:\pjdvp.exe74⤵PID:4176
-
\??\c:\6622222.exec:\6622222.exe75⤵PID:1680
-
\??\c:\tttttt.exec:\tttttt.exe76⤵PID:1060
-
\??\c:\i068888.exec:\i068888.exe77⤵PID:3404
-
\??\c:\e68406.exec:\e68406.exe78⤵PID:948
-
\??\c:\462448.exec:\462448.exe79⤵PID:4212
-
\??\c:\vdvpj.exec:\vdvpj.exe80⤵PID:4016
-
\??\c:\djdvv.exec:\djdvv.exe81⤵PID:2756
-
\??\c:\4422880.exec:\4422880.exe82⤵PID:3992
-
\??\c:\rllllll.exec:\rllllll.exe83⤵PID:1960
-
\??\c:\llffrfl.exec:\llffrfl.exe84⤵PID:3480
-
\??\c:\vpdvd.exec:\vpdvd.exe85⤵PID:3764
-
\??\c:\7lrlxxf.exec:\7lrlxxf.exe86⤵PID:4656
-
\??\c:\424820.exec:\424820.exe87⤵PID:3536
-
\??\c:\8262604.exec:\8262604.exe88⤵PID:5072
-
\??\c:\0022602.exec:\0022602.exe89⤵PID:2344
-
\??\c:\fxxrlrl.exec:\fxxrlrl.exe90⤵PID:3776
-
\??\c:\628264.exec:\628264.exe91⤵PID:1320
-
\??\c:\3rlrxrx.exec:\3rlrxrx.exe92⤵PID:1092
-
\??\c:\66604.exec:\66604.exe93⤵PID:2176
-
\??\c:\jvpjv.exec:\jvpjv.exe94⤵PID:2944
-
\??\c:\htbbtb.exec:\htbbtb.exe95⤵
- System Location Discovery: System Language Discovery
PID:448 -
\??\c:\nnbnhb.exec:\nnbnhb.exe96⤵PID:3920
-
\??\c:\08426.exec:\08426.exe97⤵PID:3560
-
\??\c:\s2422.exec:\s2422.exe98⤵PID:3272
-
\??\c:\5xfrrlr.exec:\5xfrrlr.exe99⤵PID:3840
-
\??\c:\k04646.exec:\k04646.exe100⤵PID:3080
-
\??\c:\840480.exec:\840480.exe101⤵PID:1316
-
\??\c:\9vvpv.exec:\9vvpv.exe102⤵PID:1216
-
\??\c:\624866.exec:\624866.exe103⤵PID:2352
-
\??\c:\vpvjd.exec:\vpvjd.exe104⤵PID:2560
-
\??\c:\nnnntb.exec:\nnnntb.exe105⤵PID:2988
-
\??\c:\lflrfll.exec:\lflrfll.exe106⤵PID:452
-
\??\c:\jpppj.exec:\jpppj.exe107⤵PID:3608
-
\??\c:\1rrlxrl.exec:\1rrlxrl.exe108⤵PID:2996
-
\??\c:\ppjvp.exec:\ppjvp.exe109⤵PID:4532
-
\??\c:\jvvpj.exec:\jvvpj.exe110⤵PID:3448
-
\??\c:\04048.exec:\04048.exe111⤵PID:1576
-
\??\c:\9hbthb.exec:\9hbthb.exe112⤵PID:2372
-
\??\c:\c482008.exec:\c482008.exe113⤵PID:4836
-
\??\c:\pddvv.exec:\pddvv.exe114⤵PID:1628
-
\??\c:\5jvjj.exec:\5jvjj.exe115⤵PID:4272
-
\??\c:\2220826.exec:\2220826.exe116⤵PID:4456
-
\??\c:\6866246.exec:\6866246.exe117⤵PID:4236
-
\??\c:\5tnhtb.exec:\5tnhtb.exe118⤵PID:1192
-
\??\c:\1jdvj.exec:\1jdvj.exe119⤵PID:1896
-
\??\c:\2660000.exec:\2660000.exe120⤵PID:2504
-
\??\c:\k28626.exec:\k28626.exe121⤵PID:4848
-
\??\c:\82226.exec:\82226.exe122⤵PID:3780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-