Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 11:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8ac1ad16495beda8738c4b9a5938e2a0N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
120 seconds
General
-
Target
8ac1ad16495beda8738c4b9a5938e2a0N.exe
-
Size
58KB
-
MD5
8ac1ad16495beda8738c4b9a5938e2a0
-
SHA1
4e95a7e3bdc33b21b3bffe176e31dea163f26b29
-
SHA256
f6dde091806c8e2c73bd1fb198615c6cb9fb1ab46668d9f4147d2256baa0eace
-
SHA512
2c313950783354f30399e3151949a22711981d9ffee467a530ade6de35351339b9cf6201830b97605e3948de1a984bd95912fb38eb19f5cac6e8f415ef9ef22e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAw:ymb3NkkiQ3mdBjFoh
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1044-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3024-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2656-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1740-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/108-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1248-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1144-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2420-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-308-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2320 vhpxjd.exe 3052 ndhblhx.exe 1044 rxnfhrr.exe 2840 bvxnvl.exe 2416 dvjjnd.exe 3024 jdfnr.exe 2656 lhjbhp.exe 2676 vvrnxpb.exe 1740 pfvdrlj.exe 2848 hntbrvt.exe 3016 hltlljl.exe 2996 dhjdb.exe 108 hpdjr.exe 1248 nxxdv.exe 1144 pfrfvlv.exe 2140 ljhttjd.exe 2576 rpprnpd.exe 2396 xppnj.exe 984 lvnpnpf.exe 2200 dtrjfhr.exe 2128 vbbpdn.exe 660 vjhrd.exe 1296 pjjbxtn.exe 1688 brbhb.exe 1708 pfxdx.exe 2420 ntvrvxn.exe 932 xhthn.exe 1340 jdjfrpb.exe 2308 ndtvfd.exe 1804 dbhrh.exe 1796 hdfldnv.exe 1232 vfvxrhd.exe 1716 vpnrnl.exe 2916 vtrbvrh.exe 2804 hvrdxb.exe 2832 dpdlt.exe 2772 rtpbrjt.exe 2884 rrblbpn.exe 2912 pfdnpp.exe 2780 jrxnn.exe 3024 vtvnf.exe 2688 xtthdbv.exe 2312 ljnbfjv.exe 2408 rdhpl.exe 2992 lxnlnvb.exe 2704 bxtvtdl.exe 1316 blddv.exe 2852 bfvnnvf.exe 1868 djvvd.exe 940 fdltv.exe 1360 hdtxfxr.exe 1536 nrbnrvp.exe 1848 tlhjb.exe 2140 xdtvrbr.exe 2352 tjfbjb.exe 2096 lxxpxpx.exe 1412 vrvtlfj.exe 1444 rvfhtd.exe 2284 xbdltfx.exe 1616 vtlfvdf.exe 2480 vvvph.exe 2508 vfdpddf.exe 1028 jjlnh.exe 1572 bhfdhhf.exe -
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3024-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1740-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/108-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1248-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1144-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-308-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntvrvxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhfnlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blrjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxpjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfbbvrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbdrnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhnpdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thffltv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnfdfxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpxvfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htjhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddrljbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhntrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjrhdfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvrnvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpnvnrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnbxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnlhndd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlprhvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjhhbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thdfjjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpnrnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvbnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbtbfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtfvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfrlfnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtnxdtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvldjff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pphnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjvdph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvhjnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbtjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjprrnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfbjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfnbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2320 2532 8ac1ad16495beda8738c4b9a5938e2a0N.exe 29 PID 2532 wrote to memory of 2320 2532 8ac1ad16495beda8738c4b9a5938e2a0N.exe 29 PID 2532 wrote to memory of 2320 2532 8ac1ad16495beda8738c4b9a5938e2a0N.exe 29 PID 2532 wrote to memory of 2320 2532 8ac1ad16495beda8738c4b9a5938e2a0N.exe 29 PID 2320 wrote to memory of 3052 2320 vhpxjd.exe 30 PID 2320 wrote to memory of 3052 2320 vhpxjd.exe 30 PID 2320 wrote to memory of 3052 2320 vhpxjd.exe 30 PID 2320 wrote to memory of 3052 2320 vhpxjd.exe 30 PID 3052 wrote to memory of 1044 3052 ndhblhx.exe 31 PID 3052 wrote to memory of 1044 3052 ndhblhx.exe 31 PID 3052 wrote to memory of 1044 3052 ndhblhx.exe 31 PID 3052 wrote to memory of 1044 3052 ndhblhx.exe 31 PID 1044 wrote to memory of 2840 1044 rxnfhrr.exe 32 PID 1044 wrote to memory of 2840 1044 rxnfhrr.exe 32 PID 1044 wrote to memory of 2840 1044 rxnfhrr.exe 32 PID 1044 wrote to memory of 2840 1044 rxnfhrr.exe 32 PID 2840 wrote to memory of 2416 2840 bvxnvl.exe 33 PID 2840 wrote to memory of 2416 2840 bvxnvl.exe 33 PID 2840 wrote to memory of 2416 2840 bvxnvl.exe 33 PID 2840 wrote to memory of 2416 2840 bvxnvl.exe 33 PID 2416 wrote to memory of 3024 2416 dvjjnd.exe 34 PID 2416 wrote to memory of 3024 2416 dvjjnd.exe 34 PID 2416 wrote to memory of 3024 2416 dvjjnd.exe 34 PID 2416 wrote to memory of 3024 2416 dvjjnd.exe 34 PID 3024 wrote to memory of 2656 3024 jdfnr.exe 35 PID 3024 wrote to memory of 2656 3024 jdfnr.exe 35 PID 3024 wrote to memory of 2656 3024 jdfnr.exe 35 PID 3024 wrote to memory of 2656 3024 jdfnr.exe 35 PID 2656 wrote to memory of 2676 2656 lhjbhp.exe 36 PID 2656 wrote to memory of 2676 2656 lhjbhp.exe 36 PID 2656 wrote to memory of 2676 2656 lhjbhp.exe 36 PID 2656 wrote to memory of 2676 2656 lhjbhp.exe 36 PID 2676 wrote to memory of 1740 2676 vvrnxpb.exe 37 PID 2676 wrote to memory of 1740 2676 vvrnxpb.exe 37 PID 2676 wrote to memory of 1740 2676 vvrnxpb.exe 37 PID 2676 wrote to memory of 1740 2676 vvrnxpb.exe 37 PID 1740 wrote to memory of 2848 1740 pfvdrlj.exe 38 PID 1740 wrote to memory of 2848 1740 pfvdrlj.exe 38 PID 1740 wrote to memory of 2848 1740 pfvdrlj.exe 38 PID 1740 wrote to memory of 2848 1740 pfvdrlj.exe 38 PID 2848 wrote to memory of 3016 2848 hntbrvt.exe 39 PID 2848 wrote to memory of 3016 2848 hntbrvt.exe 39 PID 2848 wrote to memory of 3016 2848 hntbrvt.exe 39 PID 2848 wrote to memory of 3016 2848 hntbrvt.exe 39 PID 3016 wrote to memory of 2996 3016 hltlljl.exe 40 PID 3016 wrote to memory of 2996 3016 hltlljl.exe 40 PID 3016 wrote to memory of 2996 3016 hltlljl.exe 40 PID 3016 wrote to memory of 2996 3016 hltlljl.exe 40 PID 2996 wrote to memory of 108 2996 dhjdb.exe 41 PID 2996 wrote to memory of 108 2996 dhjdb.exe 41 PID 2996 wrote to memory of 108 2996 dhjdb.exe 41 PID 2996 wrote to memory of 108 2996 dhjdb.exe 41 PID 108 wrote to memory of 1248 108 hpdjr.exe 42 PID 108 wrote to memory of 1248 108 hpdjr.exe 42 PID 108 wrote to memory of 1248 108 hpdjr.exe 42 PID 108 wrote to memory of 1248 108 hpdjr.exe 42 PID 1248 wrote to memory of 1144 1248 nxxdv.exe 43 PID 1248 wrote to memory of 1144 1248 nxxdv.exe 43 PID 1248 wrote to memory of 1144 1248 nxxdv.exe 43 PID 1248 wrote to memory of 1144 1248 nxxdv.exe 43 PID 1144 wrote to memory of 2140 1144 pfrfvlv.exe 44 PID 1144 wrote to memory of 2140 1144 pfrfvlv.exe 44 PID 1144 wrote to memory of 2140 1144 pfrfvlv.exe 44 PID 1144 wrote to memory of 2140 1144 pfrfvlv.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac1ad16495beda8738c4b9a5938e2a0N.exe"C:\Users\Admin\AppData\Local\Temp\8ac1ad16495beda8738c4b9a5938e2a0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\vhpxjd.exec:\vhpxjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\ndhblhx.exec:\ndhblhx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\rxnfhrr.exec:\rxnfhrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\bvxnvl.exec:\bvxnvl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\dvjjnd.exec:\dvjjnd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\jdfnr.exec:\jdfnr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\lhjbhp.exec:\lhjbhp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\vvrnxpb.exec:\vvrnxpb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\pfvdrlj.exec:\pfvdrlj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\hntbrvt.exec:\hntbrvt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\hltlljl.exec:\hltlljl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\dhjdb.exec:\dhjdb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\hpdjr.exec:\hpdjr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:108 -
\??\c:\nxxdv.exec:\nxxdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\pfrfvlv.exec:\pfrfvlv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\ljhttjd.exec:\ljhttjd.exe17⤵
- Executes dropped EXE
PID:2140 -
\??\c:\rpprnpd.exec:\rpprnpd.exe18⤵
- Executes dropped EXE
PID:2576 -
\??\c:\xppnj.exec:\xppnj.exe19⤵
- Executes dropped EXE
PID:2396 -
\??\c:\lvnpnpf.exec:\lvnpnpf.exe20⤵
- Executes dropped EXE
PID:984 -
\??\c:\dtrjfhr.exec:\dtrjfhr.exe21⤵
- Executes dropped EXE
PID:2200 -
\??\c:\vbbpdn.exec:\vbbpdn.exe22⤵
- Executes dropped EXE
PID:2128 -
\??\c:\vjhrd.exec:\vjhrd.exe23⤵
- Executes dropped EXE
PID:660 -
\??\c:\pjjbxtn.exec:\pjjbxtn.exe24⤵
- Executes dropped EXE
PID:1296 -
\??\c:\brbhb.exec:\brbhb.exe25⤵
- Executes dropped EXE
PID:1688 -
\??\c:\pfxdx.exec:\pfxdx.exe26⤵
- Executes dropped EXE
PID:1708 -
\??\c:\ntvrvxn.exec:\ntvrvxn.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420 -
\??\c:\xhthn.exec:\xhthn.exe28⤵
- Executes dropped EXE
PID:932 -
\??\c:\jdjfrpb.exec:\jdjfrpb.exe29⤵
- Executes dropped EXE
PID:1340 -
\??\c:\ndtvfd.exec:\ndtvfd.exe30⤵
- Executes dropped EXE
PID:2308 -
\??\c:\dbhrh.exec:\dbhrh.exe31⤵
- Executes dropped EXE
PID:1804 -
\??\c:\hdfldnv.exec:\hdfldnv.exe32⤵
- Executes dropped EXE
PID:1796 -
\??\c:\vfvxrhd.exec:\vfvxrhd.exe33⤵
- Executes dropped EXE
PID:1232 -
\??\c:\vpnrnl.exec:\vpnrnl.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716 -
\??\c:\vtrbvrh.exec:\vtrbvrh.exe35⤵
- Executes dropped EXE
PID:2916 -
\??\c:\hvrdxb.exec:\hvrdxb.exe36⤵
- Executes dropped EXE
PID:2804 -
\??\c:\dpdlt.exec:\dpdlt.exe37⤵
- Executes dropped EXE
PID:2832 -
\??\c:\rtpbrjt.exec:\rtpbrjt.exe38⤵
- Executes dropped EXE
PID:2772 -
\??\c:\rrblbpn.exec:\rrblbpn.exe39⤵
- Executes dropped EXE
PID:2884 -
\??\c:\pfdnpp.exec:\pfdnpp.exe40⤵
- Executes dropped EXE
PID:2912 -
\??\c:\jrxnn.exec:\jrxnn.exe41⤵
- Executes dropped EXE
PID:2780 -
\??\c:\vtvnf.exec:\vtvnf.exe42⤵
- Executes dropped EXE
PID:3024 -
\??\c:\xtthdbv.exec:\xtthdbv.exe43⤵
- Executes dropped EXE
PID:2688 -
\??\c:\ljnbfjv.exec:\ljnbfjv.exe44⤵
- Executes dropped EXE
PID:2312 -
\??\c:\rdhpl.exec:\rdhpl.exe45⤵
- Executes dropped EXE
PID:2408 -
\??\c:\lxnlnvb.exec:\lxnlnvb.exe46⤵
- Executes dropped EXE
PID:2992 -
\??\c:\bxtvtdl.exec:\bxtvtdl.exe47⤵
- Executes dropped EXE
PID:2704 -
\??\c:\blddv.exec:\blddv.exe48⤵
- Executes dropped EXE
PID:1316 -
\??\c:\bfvnnvf.exec:\bfvnnvf.exe49⤵
- Executes dropped EXE
PID:2852 -
\??\c:\djvvd.exec:\djvvd.exe50⤵
- Executes dropped EXE
PID:1868 -
\??\c:\fdltv.exec:\fdltv.exe51⤵
- Executes dropped EXE
PID:940 -
\??\c:\hdtxfxr.exec:\hdtxfxr.exe52⤵
- Executes dropped EXE
PID:1360 -
\??\c:\nrbnrvp.exec:\nrbnrvp.exe53⤵
- Executes dropped EXE
PID:1536 -
\??\c:\tlhjb.exec:\tlhjb.exe54⤵
- Executes dropped EXE
PID:1848 -
\??\c:\xdtvrbr.exec:\xdtvrbr.exe55⤵
- Executes dropped EXE
PID:2140 -
\??\c:\tjfbjb.exec:\tjfbjb.exe56⤵
- Executes dropped EXE
PID:2352 -
\??\c:\lxxpxpx.exec:\lxxpxpx.exe57⤵
- Executes dropped EXE
PID:2096 -
\??\c:\vrvtlfj.exec:\vrvtlfj.exe58⤵
- Executes dropped EXE
PID:1412 -
\??\c:\rvfhtd.exec:\rvfhtd.exe59⤵
- Executes dropped EXE
PID:1444 -
\??\c:\xbdltfx.exec:\xbdltfx.exe60⤵
- Executes dropped EXE
PID:2284 -
\??\c:\vtlfvdf.exec:\vtlfvdf.exe61⤵
- Executes dropped EXE
PID:1616 -
\??\c:\vvvph.exec:\vvvph.exe62⤵
- Executes dropped EXE
PID:2480 -
\??\c:\vfdpddf.exec:\vfdpddf.exe63⤵
- Executes dropped EXE
PID:2508 -
\??\c:\jjlnh.exec:\jjlnh.exe64⤵
- Executes dropped EXE
PID:1028 -
\??\c:\bhfdhhf.exec:\bhfdhhf.exe65⤵
- Executes dropped EXE
PID:1572 -
\??\c:\rnnjjvn.exec:\rnnjjvn.exe66⤵PID:1488
-
\??\c:\ptbvp.exec:\ptbvp.exe67⤵PID:2028
-
\??\c:\vpxvnlf.exec:\vpxvnlf.exe68⤵PID:2568
-
\??\c:\bvthfvd.exec:\bvthfvd.exe69⤵PID:1952
-
\??\c:\rvhljf.exec:\rvhljf.exe70⤵PID:576
-
\??\c:\rrlvl.exec:\rrlvl.exe71⤵PID:2228
-
\??\c:\frvnrrp.exec:\frvnrrp.exe72⤵PID:1676
-
\??\c:\xplfrt.exec:\xplfrt.exe73⤵PID:1600
-
\??\c:\dhnjbxt.exec:\dhnjbxt.exe74⤵PID:2700
-
\??\c:\btfnht.exec:\btfnht.exe75⤵PID:2320
-
\??\c:\vdlhjn.exec:\vdlhjn.exe76⤵PID:2164
-
\??\c:\fjvxvj.exec:\fjvxvj.exe77⤵PID:2812
-
\??\c:\dxbdbtd.exec:\dxbdbtd.exe78⤵PID:2768
-
\??\c:\tdvlb.exec:\tdvlb.exe79⤵PID:1700
-
\??\c:\xrnfnh.exec:\xrnfnh.exe80⤵PID:2908
-
\??\c:\thrpxf.exec:\thrpxf.exe81⤵PID:2900
-
\??\c:\tfpvfnp.exec:\tfpvfnp.exe82⤵PID:2728
-
\??\c:\jlrnp.exec:\jlrnp.exe83⤵PID:2612
-
\??\c:\ttvvvtb.exec:\ttvvvtb.exe84⤵PID:2632
-
\??\c:\fbtjf.exec:\fbtjf.exe85⤵
- System Location Discovery: System Language Discovery
PID:1856 -
\??\c:\nvhrjnp.exec:\nvhrjnp.exe86⤵PID:832
-
\??\c:\xvldr.exec:\xvldr.exe87⤵PID:2972
-
\??\c:\jhbjfvn.exec:\jhbjfvn.exe88⤵PID:3000
-
\??\c:\rrxnp.exec:\rrxnp.exe89⤵PID:2856
-
\??\c:\hdrxh.exec:\hdrxh.exe90⤵PID:2796
-
\??\c:\frrjb.exec:\frrjb.exe91⤵PID:2184
-
\??\c:\ftjnd.exec:\ftjnd.exe92⤵PID:2712
-
\??\c:\nrjlrh.exec:\nrjlrh.exe93⤵PID:2188
-
\??\c:\flbjbv.exec:\flbjbv.exe94⤵PID:960
-
\??\c:\lfdhbbx.exec:\lfdhbbx.exe95⤵PID:1332
-
\??\c:\fxptddl.exec:\fxptddl.exe96⤵PID:2244
-
\??\c:\dfnnh.exec:\dfnnh.exe97⤵PID:2576
-
\??\c:\vnbxjj.exec:\vnbxjj.exe98⤵PID:2264
-
\??\c:\jnbxp.exec:\jnbxp.exe99⤵
- System Location Discovery: System Language Discovery
PID:1092 -
\??\c:\hrjnnnj.exec:\hrjnnnj.exe100⤵PID:2428
-
\??\c:\xrvnn.exec:\xrvnn.exe101⤵PID:588
-
\??\c:\xdrjllb.exec:\xdrjllb.exe102⤵PID:2160
-
\??\c:\vvfvfnr.exec:\vvfvfnr.exe103⤵PID:2344
-
\??\c:\npffh.exec:\npffh.exe104⤵PID:1380
-
\??\c:\hhrfpnb.exec:\hhrfpnb.exe105⤵PID:1688
-
\??\c:\phlvhv.exec:\phlvhv.exe106⤵PID:2032
-
\??\c:\jfljv.exec:\jfljv.exe107⤵PID:936
-
\??\c:\vxlpf.exec:\vxlpf.exe108⤵PID:2552
-
\??\c:\xvfhbnt.exec:\xvfhbnt.exe109⤵PID:3056
-
\??\c:\jdpbt.exec:\jdpbt.exe110⤵PID:1340
-
\??\c:\vdrjn.exec:\vdrjn.exe111⤵PID:2308
-
\??\c:\txndbd.exec:\txndbd.exe112⤵PID:2316
-
\??\c:\hlfhv.exec:\hlfhv.exe113⤵PID:2532
-
\??\c:\vjnjnj.exec:\vjnjnj.exe114⤵PID:1796
-
\??\c:\vrvvf.exec:\vrvvf.exe115⤵PID:1232
-
\??\c:\bdfdrdp.exec:\bdfdrdp.exe116⤵PID:912
-
\??\c:\pxdlpnr.exec:\pxdlpnr.exe117⤵PID:2724
-
\??\c:\vnvvv.exec:\vnvvv.exe118⤵PID:2804
-
\??\c:\flfhrv.exec:\flfhrv.exe119⤵PID:2744
-
\??\c:\xdxhdj.exec:\xdxhdj.exe120⤵PID:2748
-
\??\c:\njfrnbf.exec:\njfrnbf.exe121⤵PID:2884
-
\??\c:\fdjftf.exec:\fdjftf.exe122⤵PID:2008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-