Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe
-
Size
374KB
-
MD5
9d507aad3c02f54230b83871ae598dd3
-
SHA1
0df806e29a740966b43df96c0b78c265b28d68c7
-
SHA256
8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd
-
SHA512
c3f060345252284e6966e8f78fcde5081bd306a3db08f5b770f27c4e508d403898a4d984cbc64b22ae909c630187b08a3fa0d93de82c3878504c67cd9563920c
-
SSDEEP
6144:n3C9BRIG0asYFm71mJl3/X8mak5gNv9rC8IwLaYNUvtTxTKMMB:n3C9uYA7i3/stR9HGYyvtTxTKMg
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2636-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2124-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1576-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1840-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/300-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1792-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2364-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2324-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2740 jjjvj.exe 2948 5llxlxx.exe 2760 9djdd.exe 3056 7nhnbh.exe 2528 ppdpv.exe 2124 3frrffl.exe 1576 1vvvp.exe 2900 3llrrxl.exe 2568 vvvdp.exe 2224 lfxlxfl.exe 1840 1bhnbt.exe 352 jjjpv.exe 1084 fxlrxfr.exe 300 dvjpd.exe 764 xxflrxl.exe 1792 ddjvp.exe 2244 lxxxlll.exe 2100 bttnth.exe 2364 5vvjv.exe 824 btbnbh.exe 2084 bnnhhn.exe 1644 lrxlxxf.exe 2984 bttthh.exe 2152 jjjpd.exe 3048 rlrlxrl.exe 2608 vpppj.exe 884 llxxllx.exe 2932 bthhnn.exe 2324 3dvdv.exe 2784 htbbht.exe 2960 7dvvp.exe 2676 fxlxfll.exe 2836 9nhhtb.exe 2692 ddjjd.exe 2316 rrxflrf.exe 2576 bbhhtb.exe 2320 dvjjj.exe 1128 vpjpd.exe 2580 7xllrfl.exe 1764 5bntbb.exe 2904 7vvjp.exe 1348 lxxflrl.exe 1344 rrlrllx.exe 2224 bnbbbb.exe 1552 vpppv.exe 2840 frffllr.exe 2756 flxlrrx.exe 2824 nnbbtt.exe 300 vvppv.exe 1312 3rxxflr.exe 868 btbnnn.exe 2396 pvvpv.exe 1712 ddvdp.exe 2360 rxflrrr.exe 1708 hhntbh.exe 664 hhtthh.exe 1208 9pddj.exe 1844 xrflrrf.exe 1468 ntthbh.exe 1580 ttbnhn.exe 2452 1pdpp.exe 2464 5flrflr.exe 2456 7nhnbn.exe 2492 7jjpv.exe -
resource yara_rule behavioral1/memory/2636-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1576-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1576-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1576-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1840-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/300-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1792-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2364-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2324-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-304-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlflfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxlrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2740 2636 8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe 30 PID 2636 wrote to memory of 2740 2636 8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe 30 PID 2636 wrote to memory of 2740 2636 8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe 30 PID 2636 wrote to memory of 2740 2636 8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe 30 PID 2740 wrote to memory of 2948 2740 jjjvj.exe 31 PID 2740 wrote to memory of 2948 2740 jjjvj.exe 31 PID 2740 wrote to memory of 2948 2740 jjjvj.exe 31 PID 2740 wrote to memory of 2948 2740 jjjvj.exe 31 PID 2948 wrote to memory of 2760 2948 5llxlxx.exe 32 PID 2948 wrote to memory of 2760 2948 5llxlxx.exe 32 PID 2948 wrote to memory of 2760 2948 5llxlxx.exe 32 PID 2948 wrote to memory of 2760 2948 5llxlxx.exe 32 PID 2760 wrote to memory of 3056 2760 9djdd.exe 33 PID 2760 wrote to memory of 3056 2760 9djdd.exe 33 PID 2760 wrote to memory of 3056 2760 9djdd.exe 33 PID 2760 wrote to memory of 3056 2760 9djdd.exe 33 PID 3056 wrote to memory of 2528 3056 7nhnbh.exe 34 PID 3056 wrote to memory of 2528 3056 7nhnbh.exe 34 PID 3056 wrote to memory of 2528 3056 7nhnbh.exe 34 PID 3056 wrote to memory of 2528 3056 7nhnbh.exe 34 PID 2528 wrote to memory of 2124 2528 ppdpv.exe 35 PID 2528 wrote to memory of 2124 2528 ppdpv.exe 35 PID 2528 wrote to memory of 2124 2528 ppdpv.exe 35 PID 2528 wrote to memory of 2124 2528 ppdpv.exe 35 PID 2124 wrote to memory of 1576 2124 3frrffl.exe 36 PID 2124 wrote to memory of 1576 2124 3frrffl.exe 36 PID 2124 wrote to memory of 1576 2124 3frrffl.exe 36 PID 2124 wrote to memory of 1576 2124 3frrffl.exe 36 PID 1576 wrote to memory of 2900 1576 1vvvp.exe 37 PID 1576 wrote to memory of 2900 1576 1vvvp.exe 37 PID 1576 wrote to memory of 2900 1576 1vvvp.exe 37 PID 1576 wrote to memory of 2900 1576 1vvvp.exe 37 PID 2900 wrote to memory of 2568 2900 3llrrxl.exe 38 PID 2900 wrote to memory of 2568 2900 3llrrxl.exe 38 PID 2900 wrote to memory of 2568 2900 3llrrxl.exe 38 PID 2900 wrote to memory of 2568 2900 3llrrxl.exe 38 PID 2568 wrote to memory of 2224 2568 vvvdp.exe 39 PID 2568 wrote to memory of 2224 2568 vvvdp.exe 39 PID 2568 wrote to memory of 2224 2568 vvvdp.exe 39 PID 2568 wrote to memory of 2224 2568 vvvdp.exe 39 PID 2224 wrote to memory of 1840 2224 lfxlxfl.exe 40 PID 2224 wrote to memory of 1840 2224 lfxlxfl.exe 40 PID 2224 wrote to memory of 1840 2224 lfxlxfl.exe 40 PID 2224 wrote to memory of 1840 2224 lfxlxfl.exe 40 PID 1840 wrote to memory of 352 1840 1bhnbt.exe 41 PID 1840 wrote to memory of 352 1840 1bhnbt.exe 41 PID 1840 wrote to memory of 352 1840 1bhnbt.exe 41 PID 1840 wrote to memory of 352 1840 1bhnbt.exe 41 PID 352 wrote to memory of 1084 352 jjjpv.exe 42 PID 352 wrote to memory of 1084 352 jjjpv.exe 42 PID 352 wrote to memory of 1084 352 jjjpv.exe 42 PID 352 wrote to memory of 1084 352 jjjpv.exe 42 PID 1084 wrote to memory of 300 1084 fxlrxfr.exe 43 PID 1084 wrote to memory of 300 1084 fxlrxfr.exe 43 PID 1084 wrote to memory of 300 1084 fxlrxfr.exe 43 PID 1084 wrote to memory of 300 1084 fxlrxfr.exe 43 PID 300 wrote to memory of 764 300 dvjpd.exe 44 PID 300 wrote to memory of 764 300 dvjpd.exe 44 PID 300 wrote to memory of 764 300 dvjpd.exe 44 PID 300 wrote to memory of 764 300 dvjpd.exe 44 PID 764 wrote to memory of 1792 764 xxflrxl.exe 45 PID 764 wrote to memory of 1792 764 xxflrxl.exe 45 PID 764 wrote to memory of 1792 764 xxflrxl.exe 45 PID 764 wrote to memory of 1792 764 xxflrxl.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe"C:\Users\Admin\AppData\Local\Temp\8f66ece1f20b14b5cd671ca36adb3c7bd154b31ec0e863ba17f51e9ddfeee0bd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\jjjvj.exec:\jjjvj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\5llxlxx.exec:\5llxlxx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\9djdd.exec:\9djdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\7nhnbh.exec:\7nhnbh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\ppdpv.exec:\ppdpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\3frrffl.exec:\3frrffl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\1vvvp.exec:\1vvvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\3llrrxl.exec:\3llrrxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\vvvdp.exec:\vvvdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\lfxlxfl.exec:\lfxlxfl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\1bhnbt.exec:\1bhnbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
\??\c:\jjjpv.exec:\jjjpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\fxlrxfr.exec:\fxlrxfr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
\??\c:\dvjpd.exec:\dvjpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:300 -
\??\c:\xxflrxl.exec:\xxflrxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\ddjvp.exec:\ddjvp.exe17⤵
- Executes dropped EXE
PID:1792 -
\??\c:\lxxxlll.exec:\lxxxlll.exe18⤵
- Executes dropped EXE
PID:2244 -
\??\c:\bttnth.exec:\bttnth.exe19⤵
- Executes dropped EXE
PID:2100 -
\??\c:\5vvjv.exec:\5vvjv.exe20⤵
- Executes dropped EXE
PID:2364 -
\??\c:\btbnbh.exec:\btbnbh.exe21⤵
- Executes dropped EXE
PID:824 -
\??\c:\bnnhhn.exec:\bnnhhn.exe22⤵
- Executes dropped EXE
PID:2084 -
\??\c:\lrxlxxf.exec:\lrxlxxf.exe23⤵
- Executes dropped EXE
PID:1644 -
\??\c:\bttthh.exec:\bttthh.exe24⤵
- Executes dropped EXE
PID:2984 -
\??\c:\jjjpd.exec:\jjjpd.exe25⤵
- Executes dropped EXE
PID:2152 -
\??\c:\rlrlxrl.exec:\rlrlxrl.exe26⤵
- Executes dropped EXE
PID:3048 -
\??\c:\vpppj.exec:\vpppj.exe27⤵
- Executes dropped EXE
PID:2608 -
\??\c:\llxxllx.exec:\llxxllx.exe28⤵
- Executes dropped EXE
PID:884 -
\??\c:\bthhnn.exec:\bthhnn.exe29⤵
- Executes dropped EXE
PID:2932 -
\??\c:\3dvdv.exec:\3dvdv.exe30⤵
- Executes dropped EXE
PID:2324 -
\??\c:\htbbht.exec:\htbbht.exe31⤵
- Executes dropped EXE
PID:2784 -
\??\c:\7dvvp.exec:\7dvvp.exe32⤵
- Executes dropped EXE
PID:2960 -
\??\c:\fxlxfll.exec:\fxlxfll.exe33⤵
- Executes dropped EXE
PID:2676 -
\??\c:\9nhhtb.exec:\9nhhtb.exe34⤵
- Executes dropped EXE
PID:2836 -
\??\c:\ddjjd.exec:\ddjjd.exe35⤵
- Executes dropped EXE
PID:2692 -
\??\c:\rrxflrf.exec:\rrxflrf.exe36⤵
- Executes dropped EXE
PID:2316 -
\??\c:\bbhhtb.exec:\bbhhtb.exe37⤵
- Executes dropped EXE
PID:2576 -
\??\c:\dvjjj.exec:\dvjjj.exe38⤵
- Executes dropped EXE
PID:2320 -
\??\c:\vpjpd.exec:\vpjpd.exe39⤵
- Executes dropped EXE
PID:1128 -
\??\c:\7xllrfl.exec:\7xllrfl.exe40⤵
- Executes dropped EXE
PID:2580 -
\??\c:\5bntbb.exec:\5bntbb.exe41⤵
- Executes dropped EXE
PID:1764 -
\??\c:\7vvjp.exec:\7vvjp.exe42⤵
- Executes dropped EXE
PID:2904 -
\??\c:\lxxflrl.exec:\lxxflrl.exe43⤵
- Executes dropped EXE
PID:1348 -
\??\c:\rrlrllx.exec:\rrlrllx.exe44⤵
- Executes dropped EXE
PID:1344 -
\??\c:\bnbbbb.exec:\bnbbbb.exe45⤵
- Executes dropped EXE
PID:2224 -
\??\c:\vpppv.exec:\vpppv.exe46⤵
- Executes dropped EXE
PID:1552 -
\??\c:\frffllr.exec:\frffllr.exe47⤵
- Executes dropped EXE
PID:2840 -
\??\c:\flxlrrx.exec:\flxlrrx.exe48⤵
- Executes dropped EXE
PID:2756 -
\??\c:\nnbbtt.exec:\nnbbtt.exe49⤵
- Executes dropped EXE
PID:2824 -
\??\c:\vvppv.exec:\vvppv.exe50⤵
- Executes dropped EXE
PID:300 -
\??\c:\3rxxflr.exec:\3rxxflr.exe51⤵
- Executes dropped EXE
PID:1312 -
\??\c:\btbnnn.exec:\btbnnn.exe52⤵
- Executes dropped EXE
PID:868 -
\??\c:\pvvpv.exec:\pvvpv.exe53⤵
- Executes dropped EXE
PID:2396 -
\??\c:\ddvdp.exec:\ddvdp.exe54⤵
- Executes dropped EXE
PID:1712 -
\??\c:\rxflrrr.exec:\rxflrrr.exe55⤵
- Executes dropped EXE
PID:2360 -
\??\c:\hhntbh.exec:\hhntbh.exe56⤵
- Executes dropped EXE
PID:1708 -
\??\c:\hhtthh.exec:\hhtthh.exe57⤵
- Executes dropped EXE
PID:664 -
\??\c:\9pddj.exec:\9pddj.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208 -
\??\c:\xrflrrf.exec:\xrflrrf.exe59⤵
- Executes dropped EXE
PID:1844 -
\??\c:\ntthbh.exec:\ntthbh.exe60⤵
- Executes dropped EXE
PID:1468 -
\??\c:\ttbnhn.exec:\ttbnhn.exe61⤵
- Executes dropped EXE
PID:1580 -
\??\c:\1pdpp.exec:\1pdpp.exe62⤵
- Executes dropped EXE
PID:2452 -
\??\c:\5flrflr.exec:\5flrflr.exe63⤵
- Executes dropped EXE
PID:2464 -
\??\c:\7nhnbn.exec:\7nhnbn.exe64⤵
- Executes dropped EXE
PID:2456 -
\??\c:\7jjpv.exec:\7jjpv.exe65⤵
- Executes dropped EXE
PID:2492 -
\??\c:\pjdjv.exec:\pjdjv.exe66⤵PID:1072
-
\??\c:\rrrlrxl.exec:\rrrlrxl.exe67⤵PID:1992
-
\??\c:\hbnthn.exec:\hbnthn.exe68⤵PID:2772
-
\??\c:\5ntbbh.exec:\5ntbbh.exe69⤵PID:2656
-
\??\c:\7pvdj.exec:\7pvdj.exe70⤵PID:2752
-
\??\c:\9xxflxf.exec:\9xxflxf.exe71⤵PID:2724
-
\??\c:\rlxrxfr.exec:\rlxrxfr.exe72⤵PID:2912
-
\??\c:\tthbnn.exec:\tthbnn.exe73⤵PID:2768
-
\??\c:\5ddvj.exec:\5ddvj.exe74⤵PID:2804
-
\??\c:\ppdpj.exec:\ppdpj.exe75⤵PID:2336
-
\??\c:\1rllrrf.exec:\1rllrrf.exe76⤵PID:3024
-
\??\c:\bbhhnt.exec:\bbhhnt.exe77⤵PID:2648
-
\??\c:\vdvjv.exec:\vdvjv.exe78⤵PID:544
-
\??\c:\pppvd.exec:\pppvd.exe79⤵PID:2880
-
\??\c:\fxffrxl.exec:\fxffrxl.exe80⤵PID:2616
-
\??\c:\xfrlrfr.exec:\xfrlrfr.exe81⤵PID:580
-
\??\c:\1thbhn.exec:\1thbhn.exe82⤵PID:2568
-
\??\c:\dvpvp.exec:\dvpvp.exe83⤵PID:1928
-
\??\c:\pdpvv.exec:\pdpvv.exe84⤵PID:1848
-
\??\c:\fxrllxr.exec:\fxrllxr.exe85⤵PID:1916
-
\??\c:\7tbtnb.exec:\7tbtnb.exe86⤵PID:1500
-
\??\c:\hbbnbh.exec:\hbbnbh.exe87⤵PID:2816
-
\??\c:\djjjv.exec:\djjjv.exe88⤵PID:548
-
\??\c:\ffflxxr.exec:\ffflxxr.exe89⤵PID:2028
-
\??\c:\lflrfxf.exec:\lflrfxf.exe90⤵PID:2408
-
\??\c:\hbtthh.exec:\hbtthh.exe91⤵PID:2148
-
\??\c:\vvjvd.exec:\vvjvd.exe92⤵PID:1120
-
\??\c:\ppjpp.exec:\ppjpp.exe93⤵PID:1752
-
\??\c:\ffrfxll.exec:\ffrfxll.exe94⤵PID:980
-
\??\c:\7hbntt.exec:\7hbntt.exe95⤵PID:444
-
\??\c:\bthnnn.exec:\bthnnn.exe96⤵PID:944
-
\??\c:\vvpjp.exec:\vvpjp.exe97⤵PID:2084
-
\??\c:\jpjjv.exec:\jpjjv.exe98⤵PID:1296
-
\??\c:\9lxxxrl.exec:\9lxxxrl.exe99⤵PID:1464
-
\??\c:\ttnnbb.exec:\ttnnbb.exe100⤵PID:2132
-
\??\c:\bhhttt.exec:\bhhttt.exe101⤵PID:896
-
\??\c:\5pjpv.exec:\5pjpv.exe102⤵PID:3048
-
\??\c:\rfrrllx.exec:\rfrrllx.exe103⤵PID:2608
-
\??\c:\xrfrlrr.exec:\xrfrlrr.exe104⤵PID:1968
-
\??\c:\tnhhtt.exec:\tnhhtt.exe105⤵PID:1972
-
\??\c:\bntthn.exec:\bntthn.exe106⤵PID:2672
-
\??\c:\vvvjd.exec:\vvvjd.exe107⤵PID:2324
-
\??\c:\ffrflrf.exec:\ffrflrf.exe108⤵PID:2536
-
\??\c:\tnbhtb.exec:\tnbhtb.exe109⤵PID:2780
-
\??\c:\bhnhth.exec:\bhnhth.exe110⤵PID:2748
-
\??\c:\5vpjd.exec:\5vpjd.exe111⤵PID:2652
-
\??\c:\lfrxflx.exec:\lfrxflx.exe112⤵PID:2760
-
\??\c:\frlxffl.exec:\frlxffl.exe113⤵PID:2544
-
\??\c:\tnhhtb.exec:\tnhhtb.exe114⤵PID:2532
-
\??\c:\jjjvj.exec:\jjjvj.exe115⤵PID:2592
-
\??\c:\vpddj.exec:\vpddj.exe116⤵PID:1780
-
\??\c:\lxlfllx.exec:\lxlfllx.exe117⤵PID:2892
-
\??\c:\hbtntb.exec:\hbtntb.exe118⤵PID:2908
-
\??\c:\hnnttt.exec:\hnnttt.exe119⤵PID:2192
-
\??\c:\5vdpj.exec:\5vdpj.exe120⤵PID:1544
-
\??\c:\xrxrrrf.exec:\xrxrrrf.exe121⤵PID:1944
-
\??\c:\xfxrlxr.exec:\xfxrlxr.exe122⤵PID:1548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-