Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe
-
Size
593KB
-
MD5
8f565607d5530311f703566cfe7dd910
-
SHA1
41c76e769a9e6d5384bab95ae9b9a75a0da3b7ed
-
SHA256
a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5d
-
SHA512
5399fc7c02c8f7b514af95651e5b47d914ef3325cb4d1908e7eac400c63f1fe48ad510737e38effbc67adbaad39afb2822a5f86c5e74422b0c0418b734f67bbc
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayLo:n3C9Lebz+xt4vFeFmgayU
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2388-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1648-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/560-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-284-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1548-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/536-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/584-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/860-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2748 7hhttt.exe 1648 rlxrrll.exe 2716 tnttbh.exe 2976 thbbtn.exe 860 vvjvj.exe 2580 xlrffrx.exe 2392 3ntthn.exe 2100 pjpdp.exe 1624 fxffxxx.exe 1676 pdpvv.exe 560 xlrfflr.exe 2664 lfllrxx.exe 584 3hhnhb.exe 2920 vjpvv.exe 2400 xrlrxlr.exe 536 nntthb.exe 2432 pjpvd.exe 1636 rlflrfr.exe 1632 5bbnbb.exe 908 rfxflrf.exe 2952 7hnttb.exe 1368 9jjpv.exe 2528 9jpjv.exe 1516 frlxflx.exe 1548 7pjvp.exe 2264 xrrflxx.exe 372 thbbhn.exe 2480 5vpvd.exe 884 1rxxxrx.exe 2344 vpvjp.exe 1708 lfxflrx.exe 2812 thntbh.exe 2668 5pddv.exe 2848 xlllrlf.exe 2600 bnbtht.exe 2988 3jvdj.exe 2596 fxxflrx.exe 2584 9bnttb.exe 2940 1jvvd.exe 2588 7lxflxx.exe 2484 nhbbhb.exe 1260 jdvvd.exe 1712 lfllrfl.exe 2800 9xfflll.exe 1348 7htbbh.exe 2620 7pjjp.exe 2684 llxrxfl.exe 1860 hbttbh.exe 2128 5vvdp.exe 1764 rlrrxfl.exe 536 5nnbht.exe 2432 dvddd.exe 1732 1pjvd.exe 1100 ffxflxf.exe 3048 hbnthn.exe 972 7btbhb.exe 1864 7jdjd.exe 956 llxlrfl.exe 2448 lfxxfll.exe 2284 1hbtnt.exe 1956 ttnbnt.exe 2652 5vdjj.exe 696 lfxlrfx.exe 1816 hbtbhn.exe -
resource yara_rule behavioral1/memory/2388-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/860-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/860-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2100-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2100-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/560-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-302-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-284-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1548-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/536-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/584-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/860-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-45-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bthbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frflrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rxxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtht.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2748 2388 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 30 PID 2388 wrote to memory of 2748 2388 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 30 PID 2388 wrote to memory of 2748 2388 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 30 PID 2388 wrote to memory of 2748 2388 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 30 PID 2748 wrote to memory of 1648 2748 7hhttt.exe 31 PID 2748 wrote to memory of 1648 2748 7hhttt.exe 31 PID 2748 wrote to memory of 1648 2748 7hhttt.exe 31 PID 2748 wrote to memory of 1648 2748 7hhttt.exe 31 PID 1648 wrote to memory of 2716 1648 rlxrrll.exe 140 PID 1648 wrote to memory of 2716 1648 rlxrrll.exe 140 PID 1648 wrote to memory of 2716 1648 rlxrrll.exe 140 PID 1648 wrote to memory of 2716 1648 rlxrrll.exe 140 PID 2716 wrote to memory of 2976 2716 tnttbh.exe 33 PID 2716 wrote to memory of 2976 2716 tnttbh.exe 33 PID 2716 wrote to memory of 2976 2716 tnttbh.exe 33 PID 2716 wrote to memory of 2976 2716 tnttbh.exe 33 PID 2976 wrote to memory of 860 2976 thbbtn.exe 34 PID 2976 wrote to memory of 860 2976 thbbtn.exe 34 PID 2976 wrote to memory of 860 2976 thbbtn.exe 34 PID 2976 wrote to memory of 860 2976 thbbtn.exe 34 PID 860 wrote to memory of 2580 860 vvjvj.exe 145 PID 860 wrote to memory of 2580 860 vvjvj.exe 145 PID 860 wrote to memory of 2580 860 vvjvj.exe 145 PID 860 wrote to memory of 2580 860 vvjvj.exe 145 PID 2580 wrote to memory of 2392 2580 xlrffrx.exe 36 PID 2580 wrote to memory of 2392 2580 xlrffrx.exe 36 PID 2580 wrote to memory of 2392 2580 xlrffrx.exe 36 PID 2580 wrote to memory of 2392 2580 xlrffrx.exe 36 PID 2392 wrote to memory of 2100 2392 3ntthn.exe 37 PID 2392 wrote to memory of 2100 2392 3ntthn.exe 37 PID 2392 wrote to memory of 2100 2392 3ntthn.exe 37 PID 2392 wrote to memory of 2100 2392 3ntthn.exe 37 PID 2100 wrote to memory of 1624 2100 pjpdp.exe 148 PID 2100 wrote to memory of 1624 2100 pjpdp.exe 148 PID 2100 wrote to memory of 1624 2100 pjpdp.exe 148 PID 2100 wrote to memory of 1624 2100 pjpdp.exe 148 PID 1624 wrote to memory of 1676 1624 fxffxxx.exe 39 PID 1624 wrote to memory of 1676 1624 fxffxxx.exe 39 PID 1624 wrote to memory of 1676 1624 fxffxxx.exe 39 PID 1624 wrote to memory of 1676 1624 fxffxxx.exe 39 PID 1676 wrote to memory of 560 1676 pdpvv.exe 40 PID 1676 wrote to memory of 560 1676 pdpvv.exe 40 PID 1676 wrote to memory of 560 1676 pdpvv.exe 40 PID 1676 wrote to memory of 560 1676 pdpvv.exe 40 PID 560 wrote to memory of 2664 560 xlrfflr.exe 41 PID 560 wrote to memory of 2664 560 xlrfflr.exe 41 PID 560 wrote to memory of 2664 560 xlrfflr.exe 41 PID 560 wrote to memory of 2664 560 xlrfflr.exe 41 PID 2664 wrote to memory of 584 2664 lfllrxx.exe 154 PID 2664 wrote to memory of 584 2664 lfllrxx.exe 154 PID 2664 wrote to memory of 584 2664 lfllrxx.exe 154 PID 2664 wrote to memory of 584 2664 lfllrxx.exe 154 PID 584 wrote to memory of 2920 584 3hhnhb.exe 43 PID 584 wrote to memory of 2920 584 3hhnhb.exe 43 PID 584 wrote to memory of 2920 584 3hhnhb.exe 43 PID 584 wrote to memory of 2920 584 3hhnhb.exe 43 PID 2920 wrote to memory of 2400 2920 vjpvv.exe 44 PID 2920 wrote to memory of 2400 2920 vjpvv.exe 44 PID 2920 wrote to memory of 2400 2920 vjpvv.exe 44 PID 2920 wrote to memory of 2400 2920 vjpvv.exe 44 PID 2400 wrote to memory of 536 2400 xrlrxlr.exe 45 PID 2400 wrote to memory of 536 2400 xrlrxlr.exe 45 PID 2400 wrote to memory of 536 2400 xrlrxlr.exe 45 PID 2400 wrote to memory of 536 2400 xrlrxlr.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe"C:\Users\Admin\AppData\Local\Temp\a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\7hhttt.exec:\7hhttt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\rlxrrll.exec:\rlxrrll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\tnttbh.exec:\tnttbh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\thbbtn.exec:\thbbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\vvjvj.exec:\vvjvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\xlrffrx.exec:\xlrffrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\3ntthn.exec:\3ntthn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\pjpdp.exec:\pjpdp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\fxffxxx.exec:\fxffxxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\pdpvv.exec:\pdpvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\xlrfflr.exec:\xlrfflr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
\??\c:\lfllrxx.exec:\lfllrxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\3hhnhb.exec:\3hhnhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
\??\c:\vjpvv.exec:\vjpvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\xrlrxlr.exec:\xrlrxlr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\nntthb.exec:\nntthb.exe17⤵
- Executes dropped EXE
PID:536 -
\??\c:\pjpvd.exec:\pjpvd.exe18⤵
- Executes dropped EXE
PID:2432 -
\??\c:\rlflrfr.exec:\rlflrfr.exe19⤵
- Executes dropped EXE
PID:1636 -
\??\c:\5bbnbb.exec:\5bbnbb.exe20⤵
- Executes dropped EXE
PID:1632 -
\??\c:\rfxflrf.exec:\rfxflrf.exe21⤵
- Executes dropped EXE
PID:908 -
\??\c:\7hnttb.exec:\7hnttb.exe22⤵
- Executes dropped EXE
PID:2952 -
\??\c:\9jjpv.exec:\9jjpv.exe23⤵
- Executes dropped EXE
PID:1368 -
\??\c:\9jpjv.exec:\9jpjv.exe24⤵
- Executes dropped EXE
PID:2528 -
\??\c:\frlxflx.exec:\frlxflx.exe25⤵
- Executes dropped EXE
PID:1516 -
\??\c:\7pjvp.exec:\7pjvp.exe26⤵
- Executes dropped EXE
PID:1548 -
\??\c:\xrrflxx.exec:\xrrflxx.exe27⤵
- Executes dropped EXE
PID:2264 -
\??\c:\thbbhn.exec:\thbbhn.exe28⤵
- Executes dropped EXE
PID:372 -
\??\c:\5vpvd.exec:\5vpvd.exe29⤵
- Executes dropped EXE
PID:2480 -
\??\c:\1rxxxrx.exec:\1rxxxrx.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:884 -
\??\c:\vpvjp.exec:\vpvjp.exe31⤵
- Executes dropped EXE
PID:2344 -
\??\c:\lfxflrx.exec:\lfxflrx.exe32⤵
- Executes dropped EXE
PID:1708 -
\??\c:\thntbh.exec:\thntbh.exe33⤵
- Executes dropped EXE
PID:2812 -
\??\c:\5pddv.exec:\5pddv.exe34⤵
- Executes dropped EXE
PID:2668 -
\??\c:\xlllrlf.exec:\xlllrlf.exe35⤵
- Executes dropped EXE
PID:2848 -
\??\c:\bnbtht.exec:\bnbtht.exe36⤵
- Executes dropped EXE
PID:2600 -
\??\c:\3jvdj.exec:\3jvdj.exe37⤵
- Executes dropped EXE
PID:2988 -
\??\c:\fxxflrx.exec:\fxxflrx.exe38⤵
- Executes dropped EXE
PID:2596 -
\??\c:\9bnttb.exec:\9bnttb.exe39⤵
- Executes dropped EXE
PID:2584 -
\??\c:\1jvvd.exec:\1jvvd.exe40⤵
- Executes dropped EXE
PID:2940 -
\??\c:\7lxflxx.exec:\7lxflxx.exe41⤵
- Executes dropped EXE
PID:2588 -
\??\c:\nhbbhb.exec:\nhbbhb.exe42⤵
- Executes dropped EXE
PID:2484 -
\??\c:\jdvvd.exec:\jdvvd.exe43⤵
- Executes dropped EXE
PID:1260 -
\??\c:\lfllrfl.exec:\lfllrfl.exe44⤵
- Executes dropped EXE
PID:1712 -
\??\c:\9xfflll.exec:\9xfflll.exe45⤵
- Executes dropped EXE
PID:2800 -
\??\c:\7htbbh.exec:\7htbbh.exe46⤵
- Executes dropped EXE
PID:1348 -
\??\c:\7pjjp.exec:\7pjjp.exe47⤵
- Executes dropped EXE
PID:2620 -
\??\c:\llxrxfl.exec:\llxrxfl.exe48⤵
- Executes dropped EXE
PID:2684 -
\??\c:\hbttbh.exec:\hbttbh.exe49⤵
- Executes dropped EXE
PID:1860 -
\??\c:\5vvdp.exec:\5vvdp.exe50⤵
- Executes dropped EXE
PID:2128 -
\??\c:\rlrrxfl.exec:\rlrrxfl.exe51⤵
- Executes dropped EXE
PID:1764 -
\??\c:\5nnbht.exec:\5nnbht.exe52⤵
- Executes dropped EXE
PID:536 -
\??\c:\dvddd.exec:\dvddd.exe53⤵
- Executes dropped EXE
PID:2432 -
\??\c:\1pjvd.exec:\1pjvd.exe54⤵
- Executes dropped EXE
PID:1732 -
\??\c:\ffxflxf.exec:\ffxflxf.exe55⤵
- Executes dropped EXE
PID:1100 -
\??\c:\hbnthn.exec:\hbnthn.exe56⤵
- Executes dropped EXE
PID:3048 -
\??\c:\7btbhb.exec:\7btbhb.exe57⤵
- Executes dropped EXE
PID:972 -
\??\c:\7jdjd.exec:\7jdjd.exe58⤵
- Executes dropped EXE
PID:1864 -
\??\c:\llxlrfl.exec:\llxlrfl.exe59⤵
- Executes dropped EXE
PID:956 -
\??\c:\lfxxfll.exec:\lfxxfll.exe60⤵
- Executes dropped EXE
PID:2448 -
\??\c:\1hbtnt.exec:\1hbtnt.exe61⤵
- Executes dropped EXE
PID:2284 -
\??\c:\ttnbnt.exec:\ttnbnt.exe62⤵
- Executes dropped EXE
PID:1956 -
\??\c:\5vdjj.exec:\5vdjj.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2652 -
\??\c:\lfxlrfx.exec:\lfxlrfx.exe64⤵
- Executes dropped EXE
PID:696 -
\??\c:\hbtbhn.exec:\hbtbhn.exe65⤵
- Executes dropped EXE
PID:1816 -
\??\c:\hbnttt.exec:\hbnttt.exe66⤵PID:884
-
\??\c:\3ppjv.exec:\3ppjv.exe67⤵PID:1328
-
\??\c:\9xrxxlf.exec:\9xrxxlf.exe68⤵PID:1580
-
\??\c:\3rfrlfx.exec:\3rfrlfx.exe69⤵PID:2064
-
\??\c:\hbthth.exec:\hbthth.exe70⤵PID:2980
-
\??\c:\jdpdp.exec:\jdpdp.exe71⤵PID:2268
-
\??\c:\3vdjj.exec:\3vdjj.exe72⤵PID:2668
-
\??\c:\xxflfrx.exec:\xxflfrx.exe73⤵PID:2908
-
\??\c:\nhbtnn.exec:\nhbtnn.exe74⤵PID:2856
-
\??\c:\bbtbnb.exec:\bbtbnb.exe75⤵PID:2976
-
\??\c:\3vddv.exec:\3vddv.exe76⤵PID:1008
-
\??\c:\xxrfrxl.exec:\xxrfrxl.exe77⤵PID:2164
-
\??\c:\hhhbhn.exec:\hhhbhn.exe78⤵PID:2412
-
\??\c:\tntbhn.exec:\tntbhn.exe79⤵PID:2380
-
\??\c:\5pvdj.exec:\5pvdj.exe80⤵PID:1172
-
\??\c:\7rflllf.exec:\7rflllf.exe81⤵PID:2020
-
\??\c:\rllrxrr.exec:\rllrxrr.exe82⤵PID:2352
-
\??\c:\nnhtht.exec:\nnhtht.exe83⤵
- System Location Discovery: System Language Discovery
PID:2792 -
\??\c:\jdjpp.exec:\jdjpp.exe84⤵PID:2564
-
\??\c:\1bthnn.exec:\1bthnn.exe85⤵PID:2092
-
\??\c:\dvvjv.exec:\dvvjv.exe86⤵PID:2932
-
\??\c:\jdpdj.exec:\jdpdj.exe87⤵PID:2936
-
\??\c:\fxfllfl.exec:\fxfllfl.exe88⤵PID:2920
-
\??\c:\thtbht.exec:\thtbht.exe89⤵PID:604
-
\??\c:\jjvdp.exec:\jjvdp.exe90⤵PID:2128
-
\??\c:\rrrrrrx.exec:\rrrrrrx.exe91⤵PID:2200
-
\??\c:\7xxllfl.exec:\7xxllfl.exe92⤵PID:2160
-
\??\c:\nhthnt.exec:\nhthnt.exe93⤵PID:1316
-
\??\c:\bhbtht.exec:\bhbtht.exe94⤵PID:3040
-
\??\c:\pdjvd.exec:\pdjvd.exe95⤵PID:1668
-
\??\c:\rflllfl.exec:\rflllfl.exe96⤵PID:1960
-
\??\c:\fxrrrlr.exec:\fxrrrlr.exe97⤵PID:2276
-
\??\c:\tnbhnt.exec:\tnbhnt.exe98⤵PID:912
-
\??\c:\dpjpv.exec:\dpjpv.exe99⤵PID:2964
-
\??\c:\3ppdd.exec:\3ppdd.exe100⤵PID:1792
-
\??\c:\1xlrfrx.exec:\1xlrfrx.exe101⤵PID:1744
-
\??\c:\xrxxfxx.exec:\xrxxfxx.exe102⤵PID:1548
-
\??\c:\tntnnn.exec:\tntnnn.exe103⤵PID:2328
-
\??\c:\htthhh.exec:\htthhh.exe104⤵PID:708
-
\??\c:\ddddj.exec:\ddddj.exe105⤵PID:892
-
\??\c:\3rfllrx.exec:\3rfllrx.exe106⤵PID:1448
-
\??\c:\fxlrxll.exec:\fxlrxll.exe107⤵PID:2216
-
\??\c:\hnbbth.exec:\hnbbth.exe108⤵PID:2436
-
\??\c:\pddjd.exec:\pddjd.exe109⤵PID:2836
-
\??\c:\vppvj.exec:\vppvj.exe110⤵PID:2896
-
\??\c:\frfffff.exec:\frfffff.exe111⤵
- System Location Discovery: System Language Discovery
PID:1168 -
\??\c:\rflxfrf.exec:\rflxfrf.exe112⤵PID:2716
-
\??\c:\bnhhnn.exec:\bnhhnn.exe113⤵PID:2668
-
\??\c:\dpjjp.exec:\dpjjp.exe114⤵PID:2808
-
\??\c:\7dvdv.exec:\7dvdv.exe115⤵PID:2856
-
\??\c:\xxrlrfx.exec:\xxrlrfx.exe116⤵PID:764
-
\??\c:\btntbn.exec:\btntbn.exe117⤵PID:2580
-
\??\c:\hbnbhb.exec:\hbnbhb.exe118⤵PID:2164
-
\??\c:\dvvdj.exec:\dvvdj.exe119⤵PID:1592
-
\??\c:\jjdjv.exec:\jjdjv.exe120⤵PID:1624
-
\??\c:\rllrxxl.exec:\rllrxxl.exe121⤵PID:2300
-
\??\c:\hhbtbn.exec:\hhbtbn.exe122⤵PID:2916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-