Analysis
-
max time kernel
115s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 19:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
150 seconds
General
-
Target
192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe
-
Size
56KB
-
MD5
2b61bddc27abfd9f5f94e0187881f47f
-
SHA1
188e85435737d7f91ac3357e591b5281d6d40b13
-
SHA256
192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f
-
SHA512
9dd609a28898720bb16786cafa7e5c6bea6e16b0f3b9cd4bd9aa18e814122e0189808ffae991cf2de6b869451aac9d03564edd79c1c03cecfd5cd10b28cd6e0b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIYgEWX:ymb3NkkiQ3mdBjFI3EWX
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/708-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-30-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2336-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1240-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3024-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2492-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1016-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1828-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1248-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1232-256-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1244-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/836-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2124-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2328 fxjjdd.exe 2896 xpdjj.exe 2336 bndrvp.exe 1240 xxljvt.exe 2644 frjht.exe 876 xhdxb.exe 2628 hhrprpf.exe 2408 nhbxndf.exe 3024 hrjlnx.exe 2492 rtjvh.exe 2952 rdtlvt.exe 2984 trjvn.exe 1016 brbrrh.exe 2592 nvpjfbf.exe 2012 jjtbn.exe 2024 bvnxrl.exe 2284 blbnhb.exe 2324 ffhlpdt.exe 2216 hjjnxrt.exe 1828 ltnnbjj.exe 1248 xfdnbpl.exe 2372 xffbl.exe 288 hnrjfbt.exe 3048 rvjvb.exe 1232 pnbln.exe 1244 nvfnn.exe 1820 xxpntdl.exe 1640 blndbpp.exe 836 hbfldp.exe 2124 rjvnjhv.exe 1536 jfbvnj.exe 2196 nfbrn.exe 1592 jdfbfv.exe 2788 fnrrvx.exe 2748 rjdlnd.exe 2776 fnpfdtn.exe 3008 bvrxbbn.exe 2932 jjnfttf.exe 2700 rjvbtj.exe 2676 lhbnnbf.exe 2696 frlrx.exe 976 lpppdtl.exe 1160 fbbprlh.exe 2096 ppflh.exe 1312 rvtblj.exe 3036 llxdpr.exe 3024 vxnhx.exe 2908 pbljph.exe 2936 fhxptb.exe 1708 njnrjv.exe 2136 ttftf.exe 2512 bnhnhdb.exe 2592 jxvff.exe 2012 bpxbt.exe 2208 jrfptxl.exe 2240 bnbrnrp.exe 2476 pnrjbx.exe 2428 fjnrf.exe 2216 hxlvl.exe 700 rhfxrr.exe 1056 jhrpf.exe 1884 dbfflh.exe 3056 dllbl.exe 956 djtdj.exe -
resource yara_rule behavioral1/memory/708-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/708-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2336-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1240-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3024-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1016-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1828-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1248-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-247-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1232-256-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1244-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/836-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-301-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnnvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxtjbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvfvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npxprxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhnhdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjfhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnnndxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhrfdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnrbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnrjbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdpxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxtdbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbrbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvdjphf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhllxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxpntdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnfjdbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlrjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbhjjfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrjrptn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbjxnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhjbrvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btvdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvxjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htlxhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvrfdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpjlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltpxxrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lththj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjrphbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpffn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hljlpbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvvnftl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjdvd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 708 wrote to memory of 2328 708 192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe 29 PID 708 wrote to memory of 2328 708 192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe 29 PID 708 wrote to memory of 2328 708 192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe 29 PID 708 wrote to memory of 2328 708 192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe 29 PID 2328 wrote to memory of 2896 2328 fxjjdd.exe 30 PID 2328 wrote to memory of 2896 2328 fxjjdd.exe 30 PID 2328 wrote to memory of 2896 2328 fxjjdd.exe 30 PID 2328 wrote to memory of 2896 2328 fxjjdd.exe 30 PID 2896 wrote to memory of 2336 2896 xpdjj.exe 31 PID 2896 wrote to memory of 2336 2896 xpdjj.exe 31 PID 2896 wrote to memory of 2336 2896 xpdjj.exe 31 PID 2896 wrote to memory of 2336 2896 xpdjj.exe 31 PID 2336 wrote to memory of 1240 2336 bndrvp.exe 32 PID 2336 wrote to memory of 1240 2336 bndrvp.exe 32 PID 2336 wrote to memory of 1240 2336 bndrvp.exe 32 PID 2336 wrote to memory of 1240 2336 bndrvp.exe 32 PID 1240 wrote to memory of 2644 1240 xxljvt.exe 33 PID 1240 wrote to memory of 2644 1240 xxljvt.exe 33 PID 1240 wrote to memory of 2644 1240 xxljvt.exe 33 PID 1240 wrote to memory of 2644 1240 xxljvt.exe 33 PID 2644 wrote to memory of 876 2644 frjht.exe 34 PID 2644 wrote to memory of 876 2644 frjht.exe 34 PID 2644 wrote to memory of 876 2644 frjht.exe 34 PID 2644 wrote to memory of 876 2644 frjht.exe 34 PID 876 wrote to memory of 2628 876 xhdxb.exe 35 PID 876 wrote to memory of 2628 876 xhdxb.exe 35 PID 876 wrote to memory of 2628 876 xhdxb.exe 35 PID 876 wrote to memory of 2628 876 xhdxb.exe 35 PID 2628 wrote to memory of 2408 2628 hhrprpf.exe 36 PID 2628 wrote to memory of 2408 2628 hhrprpf.exe 36 PID 2628 wrote to memory of 2408 2628 hhrprpf.exe 36 PID 2628 wrote to memory of 2408 2628 hhrprpf.exe 36 PID 2408 wrote to memory of 3024 2408 nhbxndf.exe 37 PID 2408 wrote to memory of 3024 2408 nhbxndf.exe 37 PID 2408 wrote to memory of 3024 2408 nhbxndf.exe 37 PID 2408 wrote to memory of 3024 2408 nhbxndf.exe 37 PID 3024 wrote to memory of 2492 3024 hrjlnx.exe 38 PID 3024 wrote to memory of 2492 3024 hrjlnx.exe 38 PID 3024 wrote to memory of 2492 3024 hrjlnx.exe 38 PID 3024 wrote to memory of 2492 3024 hrjlnx.exe 38 PID 2492 wrote to memory of 2952 2492 rtjvh.exe 39 PID 2492 wrote to memory of 2952 2492 rtjvh.exe 39 PID 2492 wrote to memory of 2952 2492 rtjvh.exe 39 PID 2492 wrote to memory of 2952 2492 rtjvh.exe 39 PID 2952 wrote to memory of 2984 2952 rdtlvt.exe 40 PID 2952 wrote to memory of 2984 2952 rdtlvt.exe 40 PID 2952 wrote to memory of 2984 2952 rdtlvt.exe 40 PID 2952 wrote to memory of 2984 2952 rdtlvt.exe 40 PID 2984 wrote to memory of 1016 2984 trjvn.exe 41 PID 2984 wrote to memory of 1016 2984 trjvn.exe 41 PID 2984 wrote to memory of 1016 2984 trjvn.exe 41 PID 2984 wrote to memory of 1016 2984 trjvn.exe 41 PID 1016 wrote to memory of 2592 1016 brbrrh.exe 42 PID 1016 wrote to memory of 2592 1016 brbrrh.exe 42 PID 1016 wrote to memory of 2592 1016 brbrrh.exe 42 PID 1016 wrote to memory of 2592 1016 brbrrh.exe 42 PID 2592 wrote to memory of 2012 2592 nvpjfbf.exe 43 PID 2592 wrote to memory of 2012 2592 nvpjfbf.exe 43 PID 2592 wrote to memory of 2012 2592 nvpjfbf.exe 43 PID 2592 wrote to memory of 2012 2592 nvpjfbf.exe 43 PID 2012 wrote to memory of 2024 2012 jjtbn.exe 44 PID 2012 wrote to memory of 2024 2012 jjtbn.exe 44 PID 2012 wrote to memory of 2024 2012 jjtbn.exe 44 PID 2012 wrote to memory of 2024 2012 jjtbn.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe"C:\Users\Admin\AppData\Local\Temp\192a878f4c5354a6e99045e71380f8b632f63df32f5973a5b198ad7c3ecfa95f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:708 -
\??\c:\fxjjdd.exec:\fxjjdd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\xpdjj.exec:\xpdjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\bndrvp.exec:\bndrvp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\xxljvt.exec:\xxljvt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\frjht.exec:\frjht.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\xhdxb.exec:\xhdxb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\hhrprpf.exec:\hhrprpf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\nhbxndf.exec:\nhbxndf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\hrjlnx.exec:\hrjlnx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\rtjvh.exec:\rtjvh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\rdtlvt.exec:\rdtlvt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\trjvn.exec:\trjvn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\brbrrh.exec:\brbrrh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\nvpjfbf.exec:\nvpjfbf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\jjtbn.exec:\jjtbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\bvnxrl.exec:\bvnxrl.exe17⤵
- Executes dropped EXE
PID:2024 -
\??\c:\blbnhb.exec:\blbnhb.exe18⤵
- Executes dropped EXE
PID:2284 -
\??\c:\ffhlpdt.exec:\ffhlpdt.exe19⤵
- Executes dropped EXE
PID:2324 -
\??\c:\hjjnxrt.exec:\hjjnxrt.exe20⤵
- Executes dropped EXE
PID:2216 -
\??\c:\ltnnbjj.exec:\ltnnbjj.exe21⤵
- Executes dropped EXE
PID:1828 -
\??\c:\xfdnbpl.exec:\xfdnbpl.exe22⤵
- Executes dropped EXE
PID:1248 -
\??\c:\xffbl.exec:\xffbl.exe23⤵
- Executes dropped EXE
PID:2372 -
\??\c:\hnrjfbt.exec:\hnrjfbt.exe24⤵
- Executes dropped EXE
PID:288 -
\??\c:\rvjvb.exec:\rvjvb.exe25⤵
- Executes dropped EXE
PID:3048 -
\??\c:\pnbln.exec:\pnbln.exe26⤵
- Executes dropped EXE
PID:1232 -
\??\c:\nvfnn.exec:\nvfnn.exe27⤵
- Executes dropped EXE
PID:1244 -
\??\c:\xxpntdl.exec:\xxpntdl.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1820 -
\??\c:\blndbpp.exec:\blndbpp.exe29⤵
- Executes dropped EXE
PID:1640 -
\??\c:\hbfldp.exec:\hbfldp.exe30⤵
- Executes dropped EXE
PID:836 -
\??\c:\rjvnjhv.exec:\rjvnjhv.exe31⤵
- Executes dropped EXE
PID:2124 -
\??\c:\jfbvnj.exec:\jfbvnj.exe32⤵
- Executes dropped EXE
PID:1536 -
\??\c:\nfbrn.exec:\nfbrn.exe33⤵
- Executes dropped EXE
PID:2196 -
\??\c:\jdfbfv.exec:\jdfbfv.exe34⤵
- Executes dropped EXE
PID:1592 -
\??\c:\fnrrvx.exec:\fnrrvx.exe35⤵
- Executes dropped EXE
PID:2788 -
\??\c:\rjdlnd.exec:\rjdlnd.exe36⤵
- Executes dropped EXE
PID:2748 -
\??\c:\fnpfdtn.exec:\fnpfdtn.exe37⤵
- Executes dropped EXE
PID:2776 -
\??\c:\bvrxbbn.exec:\bvrxbbn.exe38⤵
- Executes dropped EXE
PID:3008 -
\??\c:\jjnfttf.exec:\jjnfttf.exe39⤵
- Executes dropped EXE
PID:2932 -
\??\c:\rjvbtj.exec:\rjvbtj.exe40⤵
- Executes dropped EXE
PID:2700 -
\??\c:\lhbnnbf.exec:\lhbnnbf.exe41⤵
- Executes dropped EXE
PID:2676 -
\??\c:\frlrx.exec:\frlrx.exe42⤵
- Executes dropped EXE
PID:2696 -
\??\c:\lpppdtl.exec:\lpppdtl.exe43⤵
- Executes dropped EXE
PID:976 -
\??\c:\fbbprlh.exec:\fbbprlh.exe44⤵
- Executes dropped EXE
PID:1160 -
\??\c:\ppflh.exec:\ppflh.exe45⤵
- Executes dropped EXE
PID:2096 -
\??\c:\rvtblj.exec:\rvtblj.exe46⤵
- Executes dropped EXE
PID:1312 -
\??\c:\llxdpr.exec:\llxdpr.exe47⤵
- Executes dropped EXE
PID:3036 -
\??\c:\vxnhx.exec:\vxnhx.exe48⤵
- Executes dropped EXE
PID:3024 -
\??\c:\pbljph.exec:\pbljph.exe49⤵
- Executes dropped EXE
PID:2908 -
\??\c:\fhxptb.exec:\fhxptb.exe50⤵
- Executes dropped EXE
PID:2936 -
\??\c:\njnrjv.exec:\njnrjv.exe51⤵
- Executes dropped EXE
PID:1708 -
\??\c:\ttftf.exec:\ttftf.exe52⤵
- Executes dropped EXE
PID:2136 -
\??\c:\bnhnhdb.exec:\bnhnhdb.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512 -
\??\c:\jxvff.exec:\jxvff.exe54⤵
- Executes dropped EXE
PID:2592 -
\??\c:\bpxbt.exec:\bpxbt.exe55⤵
- Executes dropped EXE
PID:2012 -
\??\c:\jrfptxl.exec:\jrfptxl.exe56⤵
- Executes dropped EXE
PID:2208 -
\??\c:\bnbrnrp.exec:\bnbrnrp.exe57⤵
- Executes dropped EXE
PID:2240 -
\??\c:\pnrjbx.exec:\pnrjbx.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2476 -
\??\c:\fjnrf.exec:\fjnrf.exe59⤵
- Executes dropped EXE
PID:2428 -
\??\c:\hxlvl.exec:\hxlvl.exe60⤵
- Executes dropped EXE
PID:2216 -
\??\c:\rhfxrr.exec:\rhfxrr.exe61⤵
- Executes dropped EXE
PID:700 -
\??\c:\jhrpf.exec:\jhrpf.exe62⤵
- Executes dropped EXE
PID:1056 -
\??\c:\dbfflh.exec:\dbfflh.exe63⤵
- Executes dropped EXE
PID:1884 -
\??\c:\dllbl.exec:\dllbl.exe64⤵
- Executes dropped EXE
PID:3056 -
\??\c:\djtdj.exec:\djtdj.exe65⤵
- Executes dropped EXE
PID:956 -
\??\c:\tlvbfp.exec:\tlvbfp.exe66⤵PID:1552
-
\??\c:\bndrr.exec:\bndrr.exe67⤵PID:2340
-
\??\c:\fjbpp.exec:\fjbpp.exe68⤵PID:1564
-
\??\c:\fnfjdbx.exec:\fnfjdbx.exe69⤵
- System Location Discovery: System Language Discovery
PID:2532 -
\??\c:\btdrb.exec:\btdrb.exe70⤵PID:1820
-
\??\c:\bfpnjn.exec:\bfpnjn.exe71⤵PID:2152
-
\??\c:\vxbvtb.exec:\vxbvtb.exe72⤵PID:3012
-
\??\c:\hjppbll.exec:\hjppbll.exe73⤵PID:888
-
\??\c:\hvhdlbp.exec:\hvhdlbp.exe74⤵PID:2548
-
\??\c:\vhbfvrj.exec:\vhbfvrj.exe75⤵PID:2468
-
\??\c:\lnfjjbr.exec:\lnfjjbr.exe76⤵PID:1732
-
\??\c:\pjfxl.exec:\pjfxl.exe77⤵PID:2328
-
\??\c:\rlxpdh.exec:\rlxpdh.exe78⤵PID:2844
-
\??\c:\rtbvbrp.exec:\rtbvbrp.exe79⤵PID:2896
-
\??\c:\xrfhb.exec:\xrfhb.exe80⤵PID:2824
-
\??\c:\ffrnll.exec:\ffrnll.exe81⤵PID:2756
-
\??\c:\xxnpbv.exec:\xxnpbv.exe82⤵PID:1240
-
\??\c:\bhrjdl.exec:\bhrjdl.exe83⤵PID:2648
-
\??\c:\hjvtpj.exec:\hjvtpj.exe84⤵PID:2764
-
\??\c:\fjpbnp.exec:\fjpbnp.exe85⤵PID:2940
-
\??\c:\vlvrv.exec:\vlvrv.exe86⤵PID:2392
-
\??\c:\hnjxj.exec:\hnjxj.exe87⤵PID:1020
-
\??\c:\xdfbpxh.exec:\xdfbpxh.exe88⤵PID:2504
-
\??\c:\rfjdlvn.exec:\rfjdlvn.exe89⤵PID:1312
-
\??\c:\pjdjvnt.exec:\pjdjvnt.exe90⤵PID:2176
-
\??\c:\hfvrxdr.exec:\hfvrxdr.exe91⤵PID:2876
-
\??\c:\rrnhvx.exec:\rrnhvx.exe92⤵PID:1728
-
\??\c:\dldbjdn.exec:\dldbjdn.exe93⤵PID:2984
-
\??\c:\xnbfj.exec:\xnbfj.exe94⤵PID:2508
-
\??\c:\jvxrf.exec:\jvxrf.exe95⤵PID:2516
-
\??\c:\llppph.exec:\llppph.exe96⤵PID:2132
-
\??\c:\trdbj.exec:\trdbj.exe97⤵PID:2592
-
\??\c:\hjjdp.exec:\hjjdp.exe98⤵PID:2480
-
\??\c:\rdjdvf.exec:\rdjdvf.exe99⤵PID:2248
-
\??\c:\vjfjnt.exec:\vjfjnt.exe100⤵PID:2424
-
\??\c:\jbrbpn.exec:\jbrbpn.exe101⤵PID:2828
-
\??\c:\xjjxxhb.exec:\xjjxxhb.exe102⤵PID:2232
-
\??\c:\ffjhlf.exec:\ffjhlf.exe103⤵PID:2216
-
\??\c:\jhnjrxx.exec:\jhnjrxx.exe104⤵PID:1248
-
\??\c:\dthftfl.exec:\dthftfl.exe105⤵PID:1528
-
\??\c:\jftfvfl.exec:\jftfvfl.exe106⤵PID:3052
-
\??\c:\xrnbjlb.exec:\xrnbjlb.exe107⤵PID:368
-
\??\c:\ddtldnj.exec:\ddtldnj.exe108⤵PID:2568
-
\??\c:\jjjdjrt.exec:\jjjdjrt.exe109⤵PID:1716
-
\??\c:\lpdvb.exec:\lpdvb.exe110⤵PID:1496
-
\??\c:\vfbfx.exec:\vfbfx.exe111⤵PID:1888
-
\??\c:\dflftnn.exec:\dflftnn.exe112⤵PID:656
-
\??\c:\jltprxt.exec:\jltprxt.exe113⤵PID:2396
-
\??\c:\fvtjvt.exec:\fvtjvt.exe114⤵PID:528
-
\??\c:\bllrjbt.exec:\bllrjbt.exe115⤵PID:2124
-
\??\c:\rbbnbfn.exec:\rbbnbfn.exe116⤵PID:1536
-
\??\c:\vvhpd.exec:\vvhpd.exe117⤵PID:1616
-
\??\c:\jpxpxdd.exec:\jpxpxdd.exe118⤵PID:1620
-
\??\c:\nbvdldl.exec:\nbvdldl.exe119⤵PID:2800
-
\??\c:\dvnflft.exec:\dvnflft.exe120⤵PID:2268
-
\??\c:\xfhbbp.exec:\xfhbbp.exe121⤵PID:2420
-
\??\c:\prbrp.exec:\prbrp.exe122⤵PID:2780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-