Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/12/2024, 00:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe
Resource
win7-20240729-en
7 signatures
150 seconds
General
-
Target
7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe
-
Size
74KB
-
MD5
61e2fbf07114fc301797deca6baafb0d
-
SHA1
86cf501da6f3019d0469730fa5b93cd778e9f969
-
SHA256
7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c
-
SHA512
692f9350c4985a98e24cfa89b0a039204dbe0ff08888fa227a6de20dff56008358582bc17bbdd2eb88e4dbcd7543c72cf69afeca6406f26564cb7add200c8396
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdJUDbAIdiW65y:ymb3NkkiQ3mdBjFIFdJ8bViW68
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2588-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2588-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/692-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4408-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2024-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2008-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3052-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3900-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1792-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1560-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4816-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4052-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1164-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1964-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4324-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 692 04004.exe 4408 6060826.exe 2024 68868.exe 4664 w80048.exe 2008 dppdp.exe 1336 dppvv.exe 3720 bhnhtn.exe 3052 btbbth.exe 3900 bntnhh.exe 3916 802600.exe 4556 tnthht.exe 4632 dpvvp.exe 5068 26226.exe 1792 4868266.exe 1660 lfxxrrl.exe 1816 djpjj.exe 1560 pvdvp.exe 2144 082244.exe 620 04604.exe 3416 2400488.exe 3964 pdddv.exe 4816 pjjdd.exe 1968 26804.exe 4052 vpvpj.exe 1164 402600.exe 1964 bthhnn.exe 2648 62440.exe 4324 82266.exe 4796 22820.exe 3436 1nnhtn.exe 3132 82482.exe 2532 pjppd.exe 4000 frrlxxr.exe 3652 pppjv.exe 4608 02260.exe 3904 i626448.exe 4812 880640.exe 1748 dvpvj.exe 2864 1xfxllf.exe 2788 vvvpp.exe 2036 bbhbnn.exe 2464 nbbntb.exe 1960 668266.exe 4232 5vpjv.exe 4340 vjvjv.exe 228 lxrfrlr.exe 2588 4822228.exe 4240 tnnnnn.exe 3892 6800488.exe 4268 6082666.exe 3148 068822.exe 4416 g0042.exe 3528 lxxrlff.exe 844 flfxllx.exe 1336 0400444.exe 4824 04666.exe 1624 bnnhtt.exe 1924 frxlrxl.exe 64 fffxxrr.exe 1328 tttnbb.exe 4260 680044.exe 5080 ntthbt.exe 3968 pppjd.exe 1104 e40082.exe -
resource yara_rule behavioral2/memory/2588-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2588-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/692-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2008-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3052-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3900-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4556-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1792-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1560-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4816-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4052-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1164-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1964-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-189-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6804226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 406260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k46606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 606082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 680044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0426662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 080484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 692 2588 7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe 83 PID 2588 wrote to memory of 692 2588 7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe 83 PID 2588 wrote to memory of 692 2588 7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe 83 PID 692 wrote to memory of 4408 692 04004.exe 84 PID 692 wrote to memory of 4408 692 04004.exe 84 PID 692 wrote to memory of 4408 692 04004.exe 84 PID 4408 wrote to memory of 2024 4408 6060826.exe 85 PID 4408 wrote to memory of 2024 4408 6060826.exe 85 PID 4408 wrote to memory of 2024 4408 6060826.exe 85 PID 2024 wrote to memory of 4664 2024 68868.exe 86 PID 2024 wrote to memory of 4664 2024 68868.exe 86 PID 2024 wrote to memory of 4664 2024 68868.exe 86 PID 4664 wrote to memory of 2008 4664 w80048.exe 87 PID 4664 wrote to memory of 2008 4664 w80048.exe 87 PID 4664 wrote to memory of 2008 4664 w80048.exe 87 PID 2008 wrote to memory of 1336 2008 dppdp.exe 88 PID 2008 wrote to memory of 1336 2008 dppdp.exe 88 PID 2008 wrote to memory of 1336 2008 dppdp.exe 88 PID 1336 wrote to memory of 3720 1336 dppvv.exe 89 PID 1336 wrote to memory of 3720 1336 dppvv.exe 89 PID 1336 wrote to memory of 3720 1336 dppvv.exe 89 PID 3720 wrote to memory of 3052 3720 bhnhtn.exe 90 PID 3720 wrote to memory of 3052 3720 bhnhtn.exe 90 PID 3720 wrote to memory of 3052 3720 bhnhtn.exe 90 PID 3052 wrote to memory of 3900 3052 btbbth.exe 91 PID 3052 wrote to memory of 3900 3052 btbbth.exe 91 PID 3052 wrote to memory of 3900 3052 btbbth.exe 91 PID 3900 wrote to memory of 3916 3900 bntnhh.exe 92 PID 3900 wrote to memory of 3916 3900 bntnhh.exe 92 PID 3900 wrote to memory of 3916 3900 bntnhh.exe 92 PID 3916 wrote to memory of 4556 3916 802600.exe 93 PID 3916 wrote to memory of 4556 3916 802600.exe 93 PID 3916 wrote to memory of 4556 3916 802600.exe 93 PID 4556 wrote to memory of 4632 4556 tnthht.exe 94 PID 4556 wrote to memory of 4632 4556 tnthht.exe 94 PID 4556 wrote to memory of 4632 4556 tnthht.exe 94 PID 4632 wrote to memory of 5068 4632 dpvvp.exe 95 PID 4632 wrote to memory of 5068 4632 dpvvp.exe 95 PID 4632 wrote to memory of 5068 4632 dpvvp.exe 95 PID 5068 wrote to memory of 1792 5068 26226.exe 96 PID 5068 wrote to memory of 1792 5068 26226.exe 96 PID 5068 wrote to memory of 1792 5068 26226.exe 96 PID 1792 wrote to memory of 1660 1792 4868266.exe 97 PID 1792 wrote to memory of 1660 1792 4868266.exe 97 PID 1792 wrote to memory of 1660 1792 4868266.exe 97 PID 1660 wrote to memory of 1816 1660 lfxxrrl.exe 98 PID 1660 wrote to memory of 1816 1660 lfxxrrl.exe 98 PID 1660 wrote to memory of 1816 1660 lfxxrrl.exe 98 PID 1816 wrote to memory of 1560 1816 djpjj.exe 99 PID 1816 wrote to memory of 1560 1816 djpjj.exe 99 PID 1816 wrote to memory of 1560 1816 djpjj.exe 99 PID 1560 wrote to memory of 2144 1560 pvdvp.exe 100 PID 1560 wrote to memory of 2144 1560 pvdvp.exe 100 PID 1560 wrote to memory of 2144 1560 pvdvp.exe 100 PID 2144 wrote to memory of 620 2144 082244.exe 101 PID 2144 wrote to memory of 620 2144 082244.exe 101 PID 2144 wrote to memory of 620 2144 082244.exe 101 PID 620 wrote to memory of 3416 620 04604.exe 102 PID 620 wrote to memory of 3416 620 04604.exe 102 PID 620 wrote to memory of 3416 620 04604.exe 102 PID 3416 wrote to memory of 3964 3416 2400488.exe 103 PID 3416 wrote to memory of 3964 3416 2400488.exe 103 PID 3416 wrote to memory of 3964 3416 2400488.exe 103 PID 3964 wrote to memory of 4816 3964 pdddv.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe"C:\Users\Admin\AppData\Local\Temp\7c05ceb9e0a1ef1b812752d737e6fe3dec2b11f41499c80da8d37cfd684d602c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\04004.exec:\04004.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\6060826.exec:\6060826.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\68868.exec:\68868.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\w80048.exec:\w80048.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\dppdp.exec:\dppdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\dppvv.exec:\dppvv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\bhnhtn.exec:\bhnhtn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\btbbth.exec:\btbbth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\bntnhh.exec:\bntnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
\??\c:\802600.exec:\802600.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
\??\c:\tnthht.exec:\tnthht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\dpvvp.exec:\dpvvp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
\??\c:\26226.exec:\26226.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\4868266.exec:\4868266.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
\??\c:\lfxxrrl.exec:\lfxxrrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\djpjj.exec:\djpjj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\pvdvp.exec:\pvdvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\082244.exec:\082244.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\04604.exec:\04604.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
\??\c:\2400488.exec:\2400488.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
\??\c:\pdddv.exec:\pdddv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\pjjdd.exec:\pjjdd.exe23⤵
- Executes dropped EXE
PID:4816 -
\??\c:\26804.exec:\26804.exe24⤵
- Executes dropped EXE
PID:1968 -
\??\c:\vpvpj.exec:\vpvpj.exe25⤵
- Executes dropped EXE
PID:4052 -
\??\c:\402600.exec:\402600.exe26⤵
- Executes dropped EXE
PID:1164 -
\??\c:\bthhnn.exec:\bthhnn.exe27⤵
- Executes dropped EXE
PID:1964 -
\??\c:\62440.exec:\62440.exe28⤵
- Executes dropped EXE
PID:2648 -
\??\c:\82266.exec:\82266.exe29⤵
- Executes dropped EXE
PID:4324 -
\??\c:\22820.exec:\22820.exe30⤵
- Executes dropped EXE
PID:4796 -
\??\c:\1nnhtn.exec:\1nnhtn.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3436 -
\??\c:\82482.exec:\82482.exe32⤵
- Executes dropped EXE
PID:3132 -
\??\c:\pjppd.exec:\pjppd.exe33⤵
- Executes dropped EXE
PID:2532 -
\??\c:\frrlxxr.exec:\frrlxxr.exe34⤵
- Executes dropped EXE
PID:4000 -
\??\c:\pppjv.exec:\pppjv.exe35⤵
- Executes dropped EXE
PID:3652 -
\??\c:\02260.exec:\02260.exe36⤵
- Executes dropped EXE
PID:4608 -
\??\c:\i626448.exec:\i626448.exe37⤵
- Executes dropped EXE
PID:3904 -
\??\c:\880640.exec:\880640.exe38⤵
- Executes dropped EXE
PID:4812 -
\??\c:\dvpvj.exec:\dvpvj.exe39⤵
- Executes dropped EXE
PID:1748 -
\??\c:\1xfxllf.exec:\1xfxllf.exe40⤵
- Executes dropped EXE
PID:2864 -
\??\c:\vvvpp.exec:\vvvpp.exe41⤵
- Executes dropped EXE
PID:2788 -
\??\c:\bbhbnn.exec:\bbhbnn.exe42⤵
- Executes dropped EXE
PID:2036 -
\??\c:\nbbntb.exec:\nbbntb.exe43⤵
- Executes dropped EXE
PID:2464 -
\??\c:\668266.exec:\668266.exe44⤵
- Executes dropped EXE
PID:1960 -
\??\c:\5vpjv.exec:\5vpjv.exe45⤵
- Executes dropped EXE
PID:4232 -
\??\c:\vjvjv.exec:\vjvjv.exe46⤵
- Executes dropped EXE
PID:4340 -
\??\c:\lxrfrlr.exec:\lxrfrlr.exe47⤵
- Executes dropped EXE
PID:228 -
\??\c:\4822228.exec:\4822228.exe48⤵
- Executes dropped EXE
PID:2588 -
\??\c:\tnnnnn.exec:\tnnnnn.exe49⤵
- Executes dropped EXE
PID:4240 -
\??\c:\6800488.exec:\6800488.exe50⤵
- Executes dropped EXE
PID:3892 -
\??\c:\6082666.exec:\6082666.exe51⤵
- Executes dropped EXE
PID:4268 -
\??\c:\068822.exec:\068822.exe52⤵
- Executes dropped EXE
PID:3148 -
\??\c:\g0042.exec:\g0042.exe53⤵
- Executes dropped EXE
PID:4416 -
\??\c:\lxxrlff.exec:\lxxrlff.exe54⤵
- Executes dropped EXE
PID:3528 -
\??\c:\flfxllx.exec:\flfxllx.exe55⤵
- Executes dropped EXE
PID:844 -
\??\c:\0400444.exec:\0400444.exe56⤵
- Executes dropped EXE
PID:1336 -
\??\c:\04666.exec:\04666.exe57⤵
- Executes dropped EXE
PID:4824 -
\??\c:\bnnhtt.exec:\bnnhtt.exe58⤵
- Executes dropped EXE
PID:1624 -
\??\c:\frxlrxl.exec:\frxlrxl.exe59⤵
- Executes dropped EXE
PID:1924 -
\??\c:\fffxxrr.exec:\fffxxrr.exe60⤵
- Executes dropped EXE
PID:64 -
\??\c:\tttnbb.exec:\tttnbb.exe61⤵
- Executes dropped EXE
PID:1328 -
\??\c:\680044.exec:\680044.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4260 -
\??\c:\ntthbt.exec:\ntthbt.exe63⤵
- Executes dropped EXE
PID:5080 -
\??\c:\pppjd.exec:\pppjd.exe64⤵
- Executes dropped EXE
PID:3968 -
\??\c:\e40082.exec:\e40082.exe65⤵
- Executes dropped EXE
PID:1104 -
\??\c:\htttnn.exec:\htttnn.exe66⤵PID:3468
-
\??\c:\dpvjv.exec:\dpvjv.exe67⤵
- System Location Discovery: System Language Discovery
PID:4080 -
\??\c:\tnnhbb.exec:\tnnhbb.exe68⤵PID:1660
-
\??\c:\822222.exec:\822222.exe69⤵PID:4316
-
\??\c:\frxrxlf.exec:\frxrxlf.exe70⤵PID:4032
-
\??\c:\8400820.exec:\8400820.exe71⤵PID:4460
-
\??\c:\s2264.exec:\s2264.exe72⤵PID:2444
-
\??\c:\3dvdp.exec:\3dvdp.exe73⤵PID:3672
-
\??\c:\42826.exec:\42826.exe74⤵PID:1096
-
\??\c:\rxxxlff.exec:\rxxxlff.exe75⤵PID:680
-
\??\c:\thttnn.exec:\thttnn.exe76⤵PID:4648
-
\??\c:\bhhnht.exec:\bhhnht.exe77⤵PID:1756
-
\??\c:\i282604.exec:\i282604.exe78⤵PID:2304
-
\??\c:\hbbbbt.exec:\hbbbbt.exe79⤵PID:4948
-
\??\c:\vjvjv.exec:\vjvjv.exe80⤵PID:736
-
\??\c:\3jppd.exec:\3jppd.exe81⤵PID:3740
-
\??\c:\k62266.exec:\k62266.exe82⤵PID:3012
-
\??\c:\dpvvp.exec:\dpvvp.exe83⤵PID:3452
-
\??\c:\2626006.exec:\2626006.exe84⤵PID:2648
-
\??\c:\228288.exec:\228288.exe85⤵PID:688
-
\??\c:\pjpjv.exec:\pjpjv.exe86⤵PID:4020
-
\??\c:\jjvvp.exec:\jjvvp.exe87⤵PID:1048
-
\??\c:\vvvvj.exec:\vvvvj.exe88⤵PID:2604
-
\??\c:\2802884.exec:\2802884.exe89⤵PID:1744
-
\??\c:\266600.exec:\266600.exe90⤵PID:2532
-
\??\c:\64660.exec:\64660.exe91⤵PID:4000
-
\??\c:\1pvpd.exec:\1pvpd.exe92⤵PID:4412
-
\??\c:\806022.exec:\806022.exe93⤵PID:4608
-
\??\c:\6004448.exec:\6004448.exe94⤵PID:3160
-
\??\c:\08246.exec:\08246.exe95⤵PID:4812
-
\??\c:\440662.exec:\440662.exe96⤵PID:1748
-
\??\c:\8644462.exec:\8644462.exe97⤵PID:4372
-
\??\c:\q40000.exec:\q40000.exe98⤵PID:3184
-
\??\c:\8244888.exec:\8244888.exe99⤵PID:1656
-
\??\c:\84882.exec:\84882.exe100⤵PID:4552
-
\??\c:\6082884.exec:\6082884.exe101⤵PID:3796
-
\??\c:\nthnnn.exec:\nthnnn.exe102⤵PID:720
-
\??\c:\xlfflll.exec:\xlfflll.exe103⤵PID:2752
-
\??\c:\jvddj.exec:\jvddj.exe104⤵PID:2956
-
\??\c:\1djdv.exec:\1djdv.exe105⤵PID:2436
-
\??\c:\vppdv.exec:\vppdv.exe106⤵PID:3204
-
\??\c:\440482.exec:\440482.exe107⤵PID:392
-
\??\c:\nbhbtt.exec:\nbhbtt.exe108⤵PID:2060
-
\??\c:\3jdvj.exec:\3jdvj.exe109⤵PID:2608
-
\??\c:\vdvdv.exec:\vdvdv.exe110⤵PID:4132
-
\??\c:\vpvpj.exec:\vpvpj.exe111⤵PID:4760
-
\??\c:\vpvpd.exec:\vpvpd.exe112⤵PID:3236
-
\??\c:\bhtthb.exec:\bhtthb.exe113⤵PID:3720
-
\??\c:\hbbtbb.exec:\hbbtbb.exe114⤵PID:5116
-
\??\c:\xrfrfff.exec:\xrfrfff.exe115⤵PID:1840
-
\??\c:\e44882.exec:\e44882.exe116⤵PID:2328
-
\??\c:\nthbnh.exec:\nthbnh.exe117⤵PID:1876
-
\??\c:\488206.exec:\488206.exe118⤵PID:1664
-
\??\c:\dvjdv.exec:\dvjdv.exe119⤵PID:5048
-
\??\c:\jdvvj.exec:\jdvvj.exe120⤵PID:3092
-
\??\c:\206682.exec:\206682.exe121⤵PID:3644
-
\??\c:\rxlxlfx.exec:\rxlxlfx.exe122⤵PID:4884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-