Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 13:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
14f97be87339871369dceaa3d3107520N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
14f97be87339871369dceaa3d3107520N.exe
-
Size
261KB
-
MD5
14f97be87339871369dceaa3d3107520
-
SHA1
58421b7eab5fdea7350aac75196538af9c430a9d
-
SHA256
461ec328c30a3cefb1be61ba9f7dd0569a861dc696c9cd5294626a0d4ced3a47
-
SHA512
61654cf5f3216dcb01532a2fa4159399a16a0d3cf0d5522c66f8259f3732dcbb06eaa3d5a2a6f488b5bbbea050c434df272eb1420ae72c61135eddaa29564ebf
-
SSDEEP
6144:n3C9BRo7tvnJ9Fywhk/T4i37K3BoKg0qS:n3C9ytvn8whkb4i3e3GF/S
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2480-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2112-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/292-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/812-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/916-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1812-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/552-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1508-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2728 thbxn.exe 2744 lbfdbt.exe 2788 rplxtrf.exe 2824 fffnnl.exe 2900 rxdnlx.exe 2692 plbtbtj.exe 2432 lrjvv.exe 2404 bjvxfvd.exe 2112 lrvlf.exe 2952 xfvfn.exe 2100 fjptdn.exe 332 fnjrjjv.exe 1884 dnjpf.exe 292 ffrnbnr.exe 812 jjvndlv.exe 1980 njfrffr.exe 2468 ntvlx.exe 2356 rrbjnlh.exe 2136 ddbftd.exe 2240 vpjfjd.exe 916 xnlptbd.exe 1812 xnrbtbb.exe 552 rldvphb.exe 2376 trbxxbp.exe 1548 lnlbtlh.exe 1488 vpttx.exe 1372 vjjbtd.exe 1188 pxhvf.exe 2028 vlhllt.exe 1688 tdjtdnl.exe 1508 jbfjdxh.exe 2848 djjrl.exe 2416 drvhjbv.exe 1600 hxbfdj.exe 2188 flhrrnr.exe 2780 jjvhnd.exe 2924 lpbhj.exe 2772 dpvrrh.exe 2852 xrtnbh.exe 2664 hndjjn.exe 3056 rbflh.exe 2692 xntptr.exe 2432 xdhjtxv.exe 1328 hpnplbd.exe 2516 tlfvhlx.exe 2064 xrrjxl.exe 2132 npdhjrn.exe 1460 jxpbnn.exe 1128 btxxjd.exe 2880 vlhtfjl.exe 1276 vhrnlr.exe 2044 xpfld.exe 944 npdjhf.exe 1912 fnjpfpf.exe 1152 xdvdf.exe 2236 lrtlxd.exe 1716 lvrdp.exe 1196 jpdnvvv.exe 2184 rppljt.exe 1940 fjpbtrf.exe 2008 bltbbb.exe 1868 fxlnv.exe 992 hlnrv.exe 2968 xvtvxbf.exe -
resource yara_rule behavioral1/memory/2480-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/292-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/812-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/916-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1812-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/552-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-288-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-305-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjnxhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvxnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbjtnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djxpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbllhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfxxxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbdvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npjjjfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrbln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdfdhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rddfhtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvbln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrhnrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnlbtlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdhnhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhjhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxtlhhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhpjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prvxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brhxlbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnpvjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llblnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njfrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hndjjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlnddf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhjjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvfvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttfhhdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpbxtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htrhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdbpjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffnnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtxrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdfxtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvhfnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbjlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrdxbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttlbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2728 2480 14f97be87339871369dceaa3d3107520N.exe 30 PID 2480 wrote to memory of 2728 2480 14f97be87339871369dceaa3d3107520N.exe 30 PID 2480 wrote to memory of 2728 2480 14f97be87339871369dceaa3d3107520N.exe 30 PID 2480 wrote to memory of 2728 2480 14f97be87339871369dceaa3d3107520N.exe 30 PID 2728 wrote to memory of 2744 2728 thbxn.exe 31 PID 2728 wrote to memory of 2744 2728 thbxn.exe 31 PID 2728 wrote to memory of 2744 2728 thbxn.exe 31 PID 2728 wrote to memory of 2744 2728 thbxn.exe 31 PID 2744 wrote to memory of 2788 2744 lbfdbt.exe 32 PID 2744 wrote to memory of 2788 2744 lbfdbt.exe 32 PID 2744 wrote to memory of 2788 2744 lbfdbt.exe 32 PID 2744 wrote to memory of 2788 2744 lbfdbt.exe 32 PID 2788 wrote to memory of 2824 2788 rplxtrf.exe 33 PID 2788 wrote to memory of 2824 2788 rplxtrf.exe 33 PID 2788 wrote to memory of 2824 2788 rplxtrf.exe 33 PID 2788 wrote to memory of 2824 2788 rplxtrf.exe 33 PID 2824 wrote to memory of 2900 2824 fffnnl.exe 34 PID 2824 wrote to memory of 2900 2824 fffnnl.exe 34 PID 2824 wrote to memory of 2900 2824 fffnnl.exe 34 PID 2824 wrote to memory of 2900 2824 fffnnl.exe 34 PID 2900 wrote to memory of 2692 2900 rxdnlx.exe 35 PID 2900 wrote to memory of 2692 2900 rxdnlx.exe 35 PID 2900 wrote to memory of 2692 2900 rxdnlx.exe 35 PID 2900 wrote to memory of 2692 2900 rxdnlx.exe 35 PID 2692 wrote to memory of 2432 2692 plbtbtj.exe 36 PID 2692 wrote to memory of 2432 2692 plbtbtj.exe 36 PID 2692 wrote to memory of 2432 2692 plbtbtj.exe 36 PID 2692 wrote to memory of 2432 2692 plbtbtj.exe 36 PID 2432 wrote to memory of 2404 2432 lrjvv.exe 37 PID 2432 wrote to memory of 2404 2432 lrjvv.exe 37 PID 2432 wrote to memory of 2404 2432 lrjvv.exe 37 PID 2432 wrote to memory of 2404 2432 lrjvv.exe 37 PID 2404 wrote to memory of 2112 2404 bjvxfvd.exe 38 PID 2404 wrote to memory of 2112 2404 bjvxfvd.exe 38 PID 2404 wrote to memory of 2112 2404 bjvxfvd.exe 38 PID 2404 wrote to memory of 2112 2404 bjvxfvd.exe 38 PID 2112 wrote to memory of 2952 2112 lrvlf.exe 39 PID 2112 wrote to memory of 2952 2112 lrvlf.exe 39 PID 2112 wrote to memory of 2952 2112 lrvlf.exe 39 PID 2112 wrote to memory of 2952 2112 lrvlf.exe 39 PID 2952 wrote to memory of 2100 2952 xfvfn.exe 40 PID 2952 wrote to memory of 2100 2952 xfvfn.exe 40 PID 2952 wrote to memory of 2100 2952 xfvfn.exe 40 PID 2952 wrote to memory of 2100 2952 xfvfn.exe 40 PID 2100 wrote to memory of 332 2100 fjptdn.exe 41 PID 2100 wrote to memory of 332 2100 fjptdn.exe 41 PID 2100 wrote to memory of 332 2100 fjptdn.exe 41 PID 2100 wrote to memory of 332 2100 fjptdn.exe 41 PID 332 wrote to memory of 1884 332 fnjrjjv.exe 42 PID 332 wrote to memory of 1884 332 fnjrjjv.exe 42 PID 332 wrote to memory of 1884 332 fnjrjjv.exe 42 PID 332 wrote to memory of 1884 332 fnjrjjv.exe 42 PID 1884 wrote to memory of 292 1884 dnjpf.exe 43 PID 1884 wrote to memory of 292 1884 dnjpf.exe 43 PID 1884 wrote to memory of 292 1884 dnjpf.exe 43 PID 1884 wrote to memory of 292 1884 dnjpf.exe 43 PID 292 wrote to memory of 812 292 ffrnbnr.exe 44 PID 292 wrote to memory of 812 292 ffrnbnr.exe 44 PID 292 wrote to memory of 812 292 ffrnbnr.exe 44 PID 292 wrote to memory of 812 292 ffrnbnr.exe 44 PID 812 wrote to memory of 1980 812 jjvndlv.exe 45 PID 812 wrote to memory of 1980 812 jjvndlv.exe 45 PID 812 wrote to memory of 1980 812 jjvndlv.exe 45 PID 812 wrote to memory of 1980 812 jjvndlv.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f97be87339871369dceaa3d3107520N.exe"C:\Users\Admin\AppData\Local\Temp\14f97be87339871369dceaa3d3107520N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\thbxn.exec:\thbxn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\lbfdbt.exec:\lbfdbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\rplxtrf.exec:\rplxtrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\fffnnl.exec:\fffnnl.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\rxdnlx.exec:\rxdnlx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\plbtbtj.exec:\plbtbtj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\lrjvv.exec:\lrjvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\bjvxfvd.exec:\bjvxfvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\lrvlf.exec:\lrvlf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\xfvfn.exec:\xfvfn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\fjptdn.exec:\fjptdn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\fnjrjjv.exec:\fnjrjjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
\??\c:\dnjpf.exec:\dnjpf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\ffrnbnr.exec:\ffrnbnr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:292 -
\??\c:\jjvndlv.exec:\jjvndlv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\njfrffr.exec:\njfrffr.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
\??\c:\ntvlx.exec:\ntvlx.exe18⤵
- Executes dropped EXE
PID:2468 -
\??\c:\rrbjnlh.exec:\rrbjnlh.exe19⤵
- Executes dropped EXE
PID:2356 -
\??\c:\ddbftd.exec:\ddbftd.exe20⤵
- Executes dropped EXE
PID:2136 -
\??\c:\vpjfjd.exec:\vpjfjd.exe21⤵
- Executes dropped EXE
PID:2240 -
\??\c:\xnlptbd.exec:\xnlptbd.exe22⤵
- Executes dropped EXE
PID:916 -
\??\c:\xnrbtbb.exec:\xnrbtbb.exe23⤵
- Executes dropped EXE
PID:1812 -
\??\c:\rldvphb.exec:\rldvphb.exe24⤵
- Executes dropped EXE
PID:552 -
\??\c:\trbxxbp.exec:\trbxxbp.exe25⤵
- Executes dropped EXE
PID:2376 -
\??\c:\lnlbtlh.exec:\lnlbtlh.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548 -
\??\c:\vpttx.exec:\vpttx.exe27⤵
- Executes dropped EXE
PID:1488 -
\??\c:\vjjbtd.exec:\vjjbtd.exe28⤵
- Executes dropped EXE
PID:1372 -
\??\c:\pxhvf.exec:\pxhvf.exe29⤵
- Executes dropped EXE
PID:1188 -
\??\c:\vlhllt.exec:\vlhllt.exe30⤵
- Executes dropped EXE
PID:2028 -
\??\c:\tdjtdnl.exec:\tdjtdnl.exe31⤵
- Executes dropped EXE
PID:1688 -
\??\c:\jbfjdxh.exec:\jbfjdxh.exe32⤵
- Executes dropped EXE
PID:1508 -
\??\c:\djjrl.exec:\djjrl.exe33⤵
- Executes dropped EXE
PID:2848 -
\??\c:\drvhjbv.exec:\drvhjbv.exe34⤵
- Executes dropped EXE
PID:2416 -
\??\c:\hxbfdj.exec:\hxbfdj.exe35⤵
- Executes dropped EXE
PID:1600 -
\??\c:\flhrrnr.exec:\flhrrnr.exe36⤵
- Executes dropped EXE
PID:2188 -
\??\c:\jjvhnd.exec:\jjvhnd.exe37⤵
- Executes dropped EXE
PID:2780 -
\??\c:\lpbhj.exec:\lpbhj.exe38⤵
- Executes dropped EXE
PID:2924 -
\??\c:\dpvrrh.exec:\dpvrrh.exe39⤵
- Executes dropped EXE
PID:2772 -
\??\c:\xrtnbh.exec:\xrtnbh.exe40⤵
- Executes dropped EXE
PID:2852 -
\??\c:\hndjjn.exec:\hndjjn.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
\??\c:\rbflh.exec:\rbflh.exe42⤵
- Executes dropped EXE
PID:3056 -
\??\c:\xntptr.exec:\xntptr.exe43⤵
- Executes dropped EXE
PID:2692 -
\??\c:\xdhjtxv.exec:\xdhjtxv.exe44⤵
- Executes dropped EXE
PID:2432 -
\??\c:\hpnplbd.exec:\hpnplbd.exe45⤵
- Executes dropped EXE
PID:1328 -
\??\c:\tlfvhlx.exec:\tlfvhlx.exe46⤵
- Executes dropped EXE
PID:2516 -
\??\c:\xrrjxl.exec:\xrrjxl.exe47⤵
- Executes dropped EXE
PID:2064 -
\??\c:\npdhjrn.exec:\npdhjrn.exe48⤵
- Executes dropped EXE
PID:2132 -
\??\c:\jxpbnn.exec:\jxpbnn.exe49⤵
- Executes dropped EXE
PID:1460 -
\??\c:\btxxjd.exec:\btxxjd.exe50⤵
- Executes dropped EXE
PID:1128 -
\??\c:\vlhtfjl.exec:\vlhtfjl.exe51⤵
- Executes dropped EXE
PID:2880 -
\??\c:\vhrnlr.exec:\vhrnlr.exe52⤵
- Executes dropped EXE
PID:1276 -
\??\c:\xpfld.exec:\xpfld.exe53⤵
- Executes dropped EXE
PID:2044 -
\??\c:\npdjhf.exec:\npdjhf.exe54⤵
- Executes dropped EXE
PID:944 -
\??\c:\fnjpfpf.exec:\fnjpfpf.exe55⤵
- Executes dropped EXE
PID:1912 -
\??\c:\xdvdf.exec:\xdvdf.exe56⤵
- Executes dropped EXE
PID:1152 -
\??\c:\lrtlxd.exec:\lrtlxd.exe57⤵
- Executes dropped EXE
PID:2236 -
\??\c:\lvrdp.exec:\lvrdp.exe58⤵
- Executes dropped EXE
PID:1716 -
\??\c:\jpdnvvv.exec:\jpdnvvv.exe59⤵
- Executes dropped EXE
PID:1196 -
\??\c:\rppljt.exec:\rppljt.exe60⤵
- Executes dropped EXE
PID:2184 -
\??\c:\fjpbtrf.exec:\fjpbtrf.exe61⤵
- Executes dropped EXE
PID:1940 -
\??\c:\bltbbb.exec:\bltbbb.exe62⤵
- Executes dropped EXE
PID:2008 -
\??\c:\fxlnv.exec:\fxlnv.exe63⤵
- Executes dropped EXE
PID:1868 -
\??\c:\hlnrv.exec:\hlnrv.exe64⤵
- Executes dropped EXE
PID:992 -
\??\c:\xvtvxbf.exec:\xvtvxbf.exe65⤵
- Executes dropped EXE
PID:2968 -
\??\c:\fldbp.exec:\fldbp.exe66⤵PID:2560
-
\??\c:\ffvvr.exec:\ffvvr.exe67⤵PID:1544
-
\??\c:\bvxfdpb.exec:\bvxfdpb.exe68⤵PID:856
-
\??\c:\hpbbn.exec:\hpbbn.exe69⤵PID:2368
-
\??\c:\hlhph.exec:\hlhph.exe70⤵PID:2456
-
\??\c:\hlfrnnt.exec:\hlfrnnt.exe71⤵PID:1188
-
\??\c:\brrbv.exec:\brrbv.exe72⤵PID:1044
-
\??\c:\jbnflr.exec:\jbnflr.exe73⤵PID:2352
-
\??\c:\ftfht.exec:\ftfht.exe74⤵PID:2244
-
\??\c:\htfndb.exec:\htfndb.exe75⤵PID:2300
-
\??\c:\tdnvdvj.exec:\tdnvdvj.exe76⤵PID:1568
-
\??\c:\vnhvtb.exec:\vnhvtb.exe77⤵PID:2868
-
\??\c:\nnrjlp.exec:\nnrjlp.exe78⤵PID:2828
-
\??\c:\pfhflh.exec:\pfhflh.exe79⤵PID:2784
-
\??\c:\ltrxtn.exec:\ltrxtn.exe80⤵PID:2436
-
\??\c:\vtdnrll.exec:\vtdnrll.exe81⤵PID:2808
-
\??\c:\btdlfhf.exec:\btdlfhf.exe82⤵PID:2824
-
\??\c:\brjtx.exec:\brjtx.exe83⤵PID:1660
-
\??\c:\dnvtrb.exec:\dnvtrb.exe84⤵PID:2160
-
\??\c:\xllfrb.exec:\xllfrb.exe85⤵PID:2616
-
\??\c:\lplxh.exec:\lplxh.exe86⤵PID:1432
-
\??\c:\nfhbnrl.exec:\nfhbnrl.exe87⤵PID:948
-
\??\c:\ndlpp.exec:\ndlpp.exe88⤵PID:2484
-
\??\c:\hvthftf.exec:\hvthftf.exe89⤵PID:2816
-
\??\c:\pnnfbfp.exec:\pnnfbfp.exe90⤵PID:660
-
\??\c:\jvbjft.exec:\jvbjft.exe91⤵PID:936
-
\??\c:\lrhfxd.exec:\lrhfxd.exe92⤵PID:2100
-
\??\c:\tvbrjxv.exec:\tvbrjxv.exe93⤵PID:2936
-
\??\c:\btfvxxf.exec:\btfvxxf.exe94⤵PID:1884
-
\??\c:\rbjxj.exec:\rbjxj.exe95⤵PID:940
-
\??\c:\ppbvh.exec:\ppbvh.exe96⤵PID:1560
-
\??\c:\bfdlttd.exec:\bfdlttd.exe97⤵PID:1996
-
\??\c:\xthttjd.exec:\xthttjd.exe98⤵PID:2876
-
\??\c:\rrxvj.exec:\rrxvj.exe99⤵PID:1152
-
\??\c:\hntvpv.exec:\hntvpv.exe100⤵PID:2180
-
\??\c:\lfrpvl.exec:\lfrpvl.exe101⤵PID:2228
-
\??\c:\vjnnnj.exec:\vjnnnj.exe102⤵PID:972
-
\??\c:\ttndfnp.exec:\ttndfnp.exe103⤵PID:1928
-
\??\c:\lfljxr.exec:\lfljxr.exe104⤵PID:1008
-
\??\c:\nrjbjv.exec:\nrjbjv.exe105⤵PID:2428
-
\??\c:\rhrpxr.exec:\rhrpxr.exe106⤵PID:1384
-
\??\c:\bbhrfhb.exec:\bbhrfhb.exe107⤵PID:436
-
\??\c:\trxdlrb.exec:\trxdlrb.exe108⤵PID:684
-
\??\c:\dpbtnn.exec:\dpbtnn.exe109⤵PID:2724
-
\??\c:\xjfjxt.exec:\xjfjxt.exe110⤵PID:1820
-
\??\c:\lxpnbdr.exec:\lxpnbdr.exe111⤵PID:1636
-
\??\c:\pxthrtn.exec:\pxthrtn.exe112⤵PID:3036
-
\??\c:\jntdnd.exec:\jntdnd.exe113⤵PID:2456
-
\??\c:\dvxtf.exec:\dvxtf.exe114⤵PID:2496
-
\??\c:\dxtrr.exec:\dxtrr.exe115⤵PID:2504
-
\??\c:\thvdxjt.exec:\thvdxjt.exe116⤵PID:2480
-
\??\c:\vptrpp.exec:\vptrpp.exe117⤵PID:2168
-
\??\c:\jvfdrv.exec:\jvfdrv.exe118⤵PID:2728
-
\??\c:\tbtnxxv.exec:\tbtnxxv.exe119⤵PID:2764
-
\??\c:\rtdtl.exec:\rtdtl.exe120⤵PID:2768
-
\??\c:\ddnlrx.exec:\ddnlrx.exe121⤵PID:2668
-
\??\c:\lbppn.exec:\lbppn.exe122⤵PID:2924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-