Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 18:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
General
-
Target
0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe
-
Size
75KB
-
MD5
d48b29e89d175510dd9d27a152c8bbba
-
SHA1
936a8da8edcad3cfd7ff13410300d6b173f08e0c
-
SHA256
0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37
-
SHA512
3ed6aa1f25fcdda4609f999f14deb51276c9eb29db2cf1cb1ee8a598d50ff15425e7a94c43e399e8ccd0f554ee95bf2a8ad3649e24a4e3814092576b01ee44d9
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73DQQNeOSTyb:ymb3NkkiQ3mdBjFo73DdoxGb
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/1512-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-30-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1888-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2436-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/752-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2156-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1508-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1964-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/940-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/780-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/872-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2888 ljjbnhj.exe 2824 jffjvl.exe 1888 hbfdx.exe 676 dpbrrhj.exe 2876 jdtxj.exe 2744 rpvdp.exe 2760 vfrtfr.exe 2436 lfxlx.exe 1620 bfnnnv.exe 752 xhlrphh.exe 1880 tbrhbj.exe 1356 nbjrbvb.exe 2756 xlhjj.exe 3020 xrbhntj.exe 1760 vhtdfl.exe 2148 thnvdb.exe 2156 dfpfnx.exe 1508 vpjhnvh.exe 2184 vxtll.exe 1964 dlbflnv.exe 236 fdtdn.exe 1956 bjvxx.exe 940 hjbfb.exe 2384 vnbtl.exe 2272 lnbbdjx.exe 780 bpvpr.exe 1832 bprrrf.exe 2316 rntdrht.exe 1700 tbhtv.exe 2516 dffjhj.exe 872 ftfltv.exe 1948 nnbdbh.exe 2852 pxfnbn.exe 1604 vrrvthx.exe 2824 tvxxp.exe 2800 tjlpnnd.exe 2916 xjvfr.exe 2972 bpbjnhn.exe 2356 dhpxxvt.exe 2940 jllbt.exe 2716 jlhpl.exe 2728 hrrpb.exe 2740 hxxnrlf.exe 2268 jhvrpx.exe 1180 nbjtlj.exe 2396 bfvpxl.exe 2024 tdnhj.exe 2044 lxbdrf.exe 1192 vhbjjt.exe 956 vhlttf.exe 3008 rjvfj.exe 1780 tvlvvvl.exe 2144 vvjfv.exe 2076 jjvdrjr.exe 1908 thpdtvr.exe 2376 rbbhxt.exe 2052 hpfpnvf.exe 1368 nfhjh.exe 1520 nlxbff.exe 1504 pdnhjll.exe 2136 drtdnf.exe 2432 vfdxj.exe 2204 btxhp.exe 2120 tbrjbxl.exe -
resource yara_rule behavioral1/memory/1512-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1888-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1888-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/752-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1964-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/940-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/780-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-273-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-283-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/872-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdxhlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvnjtrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfjfpbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phdfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjtvdnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhlttf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtptflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brfbpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vflrjdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbrhbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnbhnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdbjrtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhfbhhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbdbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbxbthf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpbbdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxvvjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrdltf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2888 1512 0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe 30 PID 1512 wrote to memory of 2888 1512 0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe 30 PID 1512 wrote to memory of 2888 1512 0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe 30 PID 1512 wrote to memory of 2888 1512 0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe 30 PID 2888 wrote to memory of 2824 2888 ljjbnhj.exe 31 PID 2888 wrote to memory of 2824 2888 ljjbnhj.exe 31 PID 2888 wrote to memory of 2824 2888 ljjbnhj.exe 31 PID 2888 wrote to memory of 2824 2888 ljjbnhj.exe 31 PID 2824 wrote to memory of 1888 2824 jffjvl.exe 32 PID 2824 wrote to memory of 1888 2824 jffjvl.exe 32 PID 2824 wrote to memory of 1888 2824 jffjvl.exe 32 PID 2824 wrote to memory of 1888 2824 jffjvl.exe 32 PID 1888 wrote to memory of 676 1888 hbfdx.exe 33 PID 1888 wrote to memory of 676 1888 hbfdx.exe 33 PID 1888 wrote to memory of 676 1888 hbfdx.exe 33 PID 1888 wrote to memory of 676 1888 hbfdx.exe 33 PID 676 wrote to memory of 2876 676 dpbrrhj.exe 34 PID 676 wrote to memory of 2876 676 dpbrrhj.exe 34 PID 676 wrote to memory of 2876 676 dpbrrhj.exe 34 PID 676 wrote to memory of 2876 676 dpbrrhj.exe 34 PID 2876 wrote to memory of 2744 2876 jdtxj.exe 35 PID 2876 wrote to memory of 2744 2876 jdtxj.exe 35 PID 2876 wrote to memory of 2744 2876 jdtxj.exe 35 PID 2876 wrote to memory of 2744 2876 jdtxj.exe 35 PID 2744 wrote to memory of 2760 2744 rpvdp.exe 36 PID 2744 wrote to memory of 2760 2744 rpvdp.exe 36 PID 2744 wrote to memory of 2760 2744 rpvdp.exe 36 PID 2744 wrote to memory of 2760 2744 rpvdp.exe 36 PID 2760 wrote to memory of 2436 2760 vfrtfr.exe 37 PID 2760 wrote to memory of 2436 2760 vfrtfr.exe 37 PID 2760 wrote to memory of 2436 2760 vfrtfr.exe 37 PID 2760 wrote to memory of 2436 2760 vfrtfr.exe 37 PID 2436 wrote to memory of 1620 2436 lfxlx.exe 38 PID 2436 wrote to memory of 1620 2436 lfxlx.exe 38 PID 2436 wrote to memory of 1620 2436 lfxlx.exe 38 PID 2436 wrote to memory of 1620 2436 lfxlx.exe 38 PID 1620 wrote to memory of 752 1620 bfnnnv.exe 39 PID 1620 wrote to memory of 752 1620 bfnnnv.exe 39 PID 1620 wrote to memory of 752 1620 bfnnnv.exe 39 PID 1620 wrote to memory of 752 1620 bfnnnv.exe 39 PID 752 wrote to memory of 1880 752 xhlrphh.exe 40 PID 752 wrote to memory of 1880 752 xhlrphh.exe 40 PID 752 wrote to memory of 1880 752 xhlrphh.exe 40 PID 752 wrote to memory of 1880 752 xhlrphh.exe 40 PID 1880 wrote to memory of 1356 1880 tbrhbj.exe 41 PID 1880 wrote to memory of 1356 1880 tbrhbj.exe 41 PID 1880 wrote to memory of 1356 1880 tbrhbj.exe 41 PID 1880 wrote to memory of 1356 1880 tbrhbj.exe 41 PID 1356 wrote to memory of 2756 1356 nbjrbvb.exe 42 PID 1356 wrote to memory of 2756 1356 nbjrbvb.exe 42 PID 1356 wrote to memory of 2756 1356 nbjrbvb.exe 42 PID 1356 wrote to memory of 2756 1356 nbjrbvb.exe 42 PID 2756 wrote to memory of 3020 2756 xlhjj.exe 43 PID 2756 wrote to memory of 3020 2756 xlhjj.exe 43 PID 2756 wrote to memory of 3020 2756 xlhjj.exe 43 PID 2756 wrote to memory of 3020 2756 xlhjj.exe 43 PID 3020 wrote to memory of 1760 3020 xrbhntj.exe 44 PID 3020 wrote to memory of 1760 3020 xrbhntj.exe 44 PID 3020 wrote to memory of 1760 3020 xrbhntj.exe 44 PID 3020 wrote to memory of 1760 3020 xrbhntj.exe 44 PID 1760 wrote to memory of 2148 1760 vhtdfl.exe 45 PID 1760 wrote to memory of 2148 1760 vhtdfl.exe 45 PID 1760 wrote to memory of 2148 1760 vhtdfl.exe 45 PID 1760 wrote to memory of 2148 1760 vhtdfl.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe"C:\Users\Admin\AppData\Local\Temp\0bcd17c096666da4ec8286ecbcba0352530dc2bd9b343a8f95d1ce6038b42a37.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\ljjbnhj.exec:\ljjbnhj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\jffjvl.exec:\jffjvl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\hbfdx.exec:\hbfdx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\dpbrrhj.exec:\dpbrrhj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\jdtxj.exec:\jdtxj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\rpvdp.exec:\rpvdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\vfrtfr.exec:\vfrtfr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\lfxlx.exec:\lfxlx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\bfnnnv.exec:\bfnnnv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\xhlrphh.exec:\xhlrphh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
\??\c:\tbrhbj.exec:\tbrhbj.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\nbjrbvb.exec:\nbjrbvb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
\??\c:\xlhjj.exec:\xlhjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\xrbhntj.exec:\xrbhntj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vhtdfl.exec:\vhtdfl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\thnvdb.exec:\thnvdb.exe17⤵
- Executes dropped EXE
PID:2148 -
\??\c:\dfpfnx.exec:\dfpfnx.exe18⤵
- Executes dropped EXE
PID:2156 -
\??\c:\vpjhnvh.exec:\vpjhnvh.exe19⤵
- Executes dropped EXE
PID:1508 -
\??\c:\vxtll.exec:\vxtll.exe20⤵
- Executes dropped EXE
PID:2184 -
\??\c:\dlbflnv.exec:\dlbflnv.exe21⤵
- Executes dropped EXE
PID:1964 -
\??\c:\fdtdn.exec:\fdtdn.exe22⤵
- Executes dropped EXE
PID:236 -
\??\c:\bjvxx.exec:\bjvxx.exe23⤵
- Executes dropped EXE
PID:1956 -
\??\c:\hjbfb.exec:\hjbfb.exe24⤵
- Executes dropped EXE
PID:940 -
\??\c:\vnbtl.exec:\vnbtl.exe25⤵
- Executes dropped EXE
PID:2384 -
\??\c:\lnbbdjx.exec:\lnbbdjx.exe26⤵
- Executes dropped EXE
PID:2272 -
\??\c:\bpvpr.exec:\bpvpr.exe27⤵
- Executes dropped EXE
PID:780 -
\??\c:\bprrrf.exec:\bprrrf.exe28⤵
- Executes dropped EXE
PID:1832 -
\??\c:\rntdrht.exec:\rntdrht.exe29⤵
- Executes dropped EXE
PID:2316 -
\??\c:\tbhtv.exec:\tbhtv.exe30⤵
- Executes dropped EXE
PID:1700 -
\??\c:\dffjhj.exec:\dffjhj.exe31⤵
- Executes dropped EXE
PID:2516 -
\??\c:\ftfltv.exec:\ftfltv.exe32⤵
- Executes dropped EXE
PID:872 -
\??\c:\nnbdbh.exec:\nnbdbh.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948 -
\??\c:\pxfnbn.exec:\pxfnbn.exe34⤵
- Executes dropped EXE
PID:2852 -
\??\c:\vrrvthx.exec:\vrrvthx.exe35⤵
- Executes dropped EXE
PID:1604 -
\??\c:\tvxxp.exec:\tvxxp.exe36⤵
- Executes dropped EXE
PID:2824 -
\??\c:\tjlpnnd.exec:\tjlpnnd.exe37⤵
- Executes dropped EXE
PID:2800 -
\??\c:\xjvfr.exec:\xjvfr.exe38⤵
- Executes dropped EXE
PID:2916 -
\??\c:\bpbjnhn.exec:\bpbjnhn.exe39⤵
- Executes dropped EXE
PID:2972 -
\??\c:\dhpxxvt.exec:\dhpxxvt.exe40⤵
- Executes dropped EXE
PID:2356 -
\??\c:\jllbt.exec:\jllbt.exe41⤵
- Executes dropped EXE
PID:2940 -
\??\c:\jlhpl.exec:\jlhpl.exe42⤵
- Executes dropped EXE
PID:2716 -
\??\c:\hrrpb.exec:\hrrpb.exe43⤵
- Executes dropped EXE
PID:2728 -
\??\c:\hxxnrlf.exec:\hxxnrlf.exe44⤵
- Executes dropped EXE
PID:2740 -
\??\c:\jhvrpx.exec:\jhvrpx.exe45⤵
- Executes dropped EXE
PID:2268 -
\??\c:\nbjtlj.exec:\nbjtlj.exe46⤵
- Executes dropped EXE
PID:1180 -
\??\c:\bfvpxl.exec:\bfvpxl.exe47⤵
- Executes dropped EXE
PID:2396 -
\??\c:\tdnhj.exec:\tdnhj.exe48⤵
- Executes dropped EXE
PID:2024 -
\??\c:\lxbdrf.exec:\lxbdrf.exe49⤵
- Executes dropped EXE
PID:2044 -
\??\c:\vhbjjt.exec:\vhbjjt.exe50⤵
- Executes dropped EXE
PID:1192 -
\??\c:\vhlttf.exec:\vhlttf.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:956 -
\??\c:\rjvfj.exec:\rjvfj.exe52⤵
- Executes dropped EXE
PID:3008 -
\??\c:\tvlvvvl.exec:\tvlvvvl.exe53⤵
- Executes dropped EXE
PID:1780 -
\??\c:\vvjfv.exec:\vvjfv.exe54⤵
- Executes dropped EXE
PID:2144 -
\??\c:\jjvdrjr.exec:\jjvdrjr.exe55⤵
- Executes dropped EXE
PID:2076 -
\??\c:\thpdtvr.exec:\thpdtvr.exe56⤵
- Executes dropped EXE
PID:1908 -
\??\c:\rbbhxt.exec:\rbbhxt.exe57⤵
- Executes dropped EXE
PID:2376 -
\??\c:\hpfpnvf.exec:\hpfpnvf.exe58⤵
- Executes dropped EXE
PID:2052 -
\??\c:\nfhjh.exec:\nfhjh.exe59⤵
- Executes dropped EXE
PID:1368 -
\??\c:\nlxbff.exec:\nlxbff.exe60⤵
- Executes dropped EXE
PID:1520 -
\??\c:\pdnhjll.exec:\pdnhjll.exe61⤵
- Executes dropped EXE
PID:1504 -
\??\c:\drtdnf.exec:\drtdnf.exe62⤵
- Executes dropped EXE
PID:2136 -
\??\c:\vfdxj.exec:\vfdxj.exe63⤵
- Executes dropped EXE
PID:2432 -
\??\c:\btxhp.exec:\btxhp.exe64⤵
- Executes dropped EXE
PID:2204 -
\??\c:\tbrjbxl.exec:\tbrjbxl.exe65⤵
- Executes dropped EXE
PID:2120 -
\??\c:\vjfpdpp.exec:\vjfpdpp.exe66⤵PID:920
-
\??\c:\rnlftd.exec:\rnlftd.exe67⤵PID:756
-
\??\c:\pfxdjxf.exec:\pfxdjxf.exe68⤵PID:2856
-
\??\c:\xhvvfjx.exec:\xhvvfjx.exe69⤵PID:2112
-
\??\c:\jrvnjr.exec:\jrvnjr.exe70⤵PID:2316
-
\??\c:\nlphvln.exec:\nlphvln.exe71⤵PID:1260
-
\??\c:\vxbjhvp.exec:\vxbjhvp.exe72⤵PID:1412
-
\??\c:\xjdhnh.exec:\xjdhnh.exe73⤵PID:1264
-
\??\c:\prljjpr.exec:\prljjpr.exe74⤵PID:2788
-
\??\c:\jrrbldr.exec:\jrrbldr.exe75⤵PID:2888
-
\??\c:\jbpvxl.exec:\jbpvxl.exe76⤵PID:2804
-
\??\c:\hxxnndt.exec:\hxxnndt.exe77⤵PID:1604
-
\??\c:\jdxdf.exec:\jdxdf.exe78⤵PID:2824
-
\??\c:\jbdvvjx.exec:\jbdvvjx.exe79⤵PID:2920
-
\??\c:\jptflr.exec:\jptflr.exe80⤵PID:2916
-
\??\c:\xbfrbp.exec:\xbfrbp.exe81⤵PID:2720
-
\??\c:\hfbnbjb.exec:\hfbnbjb.exe82⤵PID:2356
-
\??\c:\fbfrh.exec:\fbfrh.exe83⤵PID:2816
-
\??\c:\tdlnl.exec:\tdlnl.exe84⤵PID:2716
-
\??\c:\rdpjr.exec:\rdpjr.exe85⤵PID:2008
-
\??\c:\pdfrvjh.exec:\pdfrvjh.exe86⤵PID:1080
-
\??\c:\nrfjjn.exec:\nrfjjn.exe87⤵PID:2260
-
\??\c:\ldhjtf.exec:\ldhjtf.exe88⤵PID:752
-
\??\c:\brdfhl.exec:\brdfhl.exe89⤵PID:1404
-
\??\c:\nbdrhl.exec:\nbdrhl.exe90⤵PID:2300
-
\??\c:\tlhtrt.exec:\tlhtrt.exe91⤵PID:1356
-
\??\c:\tbpnrj.exec:\tbpnrj.exe92⤵PID:1036
-
\??\c:\txvbh.exec:\txvbh.exe93⤵PID:980
-
\??\c:\jxvxxdn.exec:\jxvxxdn.exe94⤵PID:1228
-
\??\c:\hpfbhdr.exec:\hpfbhdr.exe95⤵PID:2364
-
\??\c:\fjfjl.exec:\fjfjl.exe96⤵PID:1996
-
\??\c:\vbnvlp.exec:\vbnvlp.exe97⤵PID:1772
-
\??\c:\djflrn.exec:\djflrn.exe98⤵PID:400
-
\??\c:\hdhnt.exec:\hdhnt.exe99⤵PID:2068
-
\??\c:\bffvrft.exec:\bffvrft.exe100⤵PID:656
-
\??\c:\tdvlx.exec:\tdvlx.exe101⤵PID:2512
-
\??\c:\fjpfj.exec:\fjpfj.exe102⤵PID:1040
-
\??\c:\lpbbdf.exec:\lpbbdf.exe103⤵
- System Location Discovery: System Language Discovery
PID:2088 -
\??\c:\vtptflr.exec:\vtptflr.exe104⤵
- System Location Discovery: System Language Discovery
PID:1272 -
\??\c:\vhjtn.exec:\vhjtn.exe105⤵PID:1720
-
\??\c:\nfhptr.exec:\nfhptr.exe106⤵PID:1056
-
\??\c:\bltpd.exec:\bltpd.exe107⤵PID:2272
-
\??\c:\vtdtx.exec:\vtdtx.exe108⤵PID:848
-
\??\c:\nplrfrj.exec:\nplrfrj.exe109⤵PID:2636
-
\??\c:\vjbjl.exec:\vjbjl.exe110⤵PID:2468
-
\??\c:\vdpdrt.exec:\vdpdrt.exe111⤵PID:1932
-
\??\c:\fllhhfn.exec:\fllhhfn.exe112⤵PID:1748
-
\??\c:\fhdxrf.exec:\fhdxrf.exe113⤵PID:1064
-
\??\c:\lhbpjx.exec:\lhbpjx.exe114⤵PID:2616
-
\??\c:\rftbtft.exec:\rftbtft.exe115⤵PID:1264
-
\??\c:\hjtnpjb.exec:\hjtnpjb.exe116⤵PID:2456
-
\??\c:\brlxv.exec:\brlxv.exe117⤵PID:1576
-
\??\c:\ljlrh.exec:\ljlrh.exe118⤵PID:2848
-
\??\c:\jdtnp.exec:\jdtnp.exe119⤵PID:2840
-
\??\c:\hlnvvbf.exec:\hlnvvbf.exe120⤵PID:2812
-
\??\c:\rnjrvd.exec:\rnjrvd.exe121⤵PID:2900
-
\??\c:\vjxffb.exec:\vjxffb.exe122⤵PID:3028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-