Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 18:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
55d6b6925120b116003fc18a8322f100N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
55d6b6925120b116003fc18a8322f100N.exe
-
Size
82KB
-
MD5
55d6b6925120b116003fc18a8322f100
-
SHA1
84e585a2b0fe8c17336ebeaff5a608cfa69ba42d
-
SHA256
1958a150d822437e5e69d40abe790b33afa692bb572b26fe511ce022723fa8c9
-
SHA512
706c797b500d162f6e4b94d3fc2f47c1aa1c22e0ffa951757790c984a7b417e71a4f337d09ff27231b07f3f1c6dbf93e1a1e9a2ee9315f26841fc6f2dd575e25
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q+:ymb3NkkiQ3mdBjFIIp9L9QrrA8/
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/1348-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2204-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1856-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1516-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1092-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2092-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/924-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2288-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2412-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2620-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2888 xrtxlfd.exe 2204 nblhltt.exe 2256 lndjn.exe 2816 lxflb.exe 1856 phhlnd.exe 2768 tnhjbx.exe 2764 lppdb.exe 2620 hlxdl.exe 2412 xdpfftl.exe 1516 xthpbtt.exe 2092 fhnxb.exe 1092 hljtrvb.exe 3032 ldttlb.exe 2780 rfxdph.exe 2084 fnddjv.exe 1388 bfbbjb.exe 2628 hljxltl.exe 1300 jrjrdlf.exe 2968 tvfjp.exe 1560 jfhxphj.exe 2496 lhnptfp.exe 924 fflhhnb.exe 1376 fxjplbd.exe 2356 hxpbl.exe 2288 pjnvb.exe 1872 hffbl.exe 2524 dnvprp.exe 820 jrdllnb.exe 892 jjjph.exe 2176 tdhjrpj.exe 2924 tjpvh.exe 2116 dttdblb.exe 2224 llvpdfn.exe 1980 xnxrx.exe 2748 bpttdtf.exe 2896 bhrth.exe 2836 ljrbl.exe 2616 tnvlf.exe 2636 bftpt.exe 2832 nnltrx.exe 2620 fnbxf.exe 2728 fndrf.exe 2592 ltrfnj.exe 1096 hdxlvp.exe 2416 dnxtrvt.exe 2360 tdppfh.exe 2784 txdxr.exe 3044 ndfnbhb.exe 936 nxjnl.exe 2180 jhhfv.exe 2476 vnjth.exe 2364 pdnfx.exe 604 rxtnpb.exe 1712 jtvlfvf.exe 2964 npljrr.exe 1560 ptvlrlp.exe 2492 jntxnp.exe 1444 trjft.exe 2268 hbvfnt.exe 288 fnffnnn.exe 2132 jfxtfr.exe 644 ldlvvp.exe 1736 ptrrn.exe 1628 lfxblb.exe -
resource yara_rule behavioral1/memory/1348-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1348-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1516-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1092-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2092-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/924-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-36-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djxpbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpppr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpjdvhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drbvxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbdvpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnxrprv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhnfthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pphntr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvbvtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfpnhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxjbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbvlxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxvbrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxjrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnfdxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlvlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjprd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pltxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxxphr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtrprt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdnxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpvrrpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhpnfhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrjjfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhpfvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvpfxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbpthl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtvddlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfbbjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxvfb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2888 1348 55d6b6925120b116003fc18a8322f100N.exe 29 PID 1348 wrote to memory of 2888 1348 55d6b6925120b116003fc18a8322f100N.exe 29 PID 1348 wrote to memory of 2888 1348 55d6b6925120b116003fc18a8322f100N.exe 29 PID 1348 wrote to memory of 2888 1348 55d6b6925120b116003fc18a8322f100N.exe 29 PID 2888 wrote to memory of 2204 2888 xrtxlfd.exe 30 PID 2888 wrote to memory of 2204 2888 xrtxlfd.exe 30 PID 2888 wrote to memory of 2204 2888 xrtxlfd.exe 30 PID 2888 wrote to memory of 2204 2888 xrtxlfd.exe 30 PID 2204 wrote to memory of 2256 2204 nblhltt.exe 31 PID 2204 wrote to memory of 2256 2204 nblhltt.exe 31 PID 2204 wrote to memory of 2256 2204 nblhltt.exe 31 PID 2204 wrote to memory of 2256 2204 nblhltt.exe 31 PID 2256 wrote to memory of 2816 2256 lndjn.exe 32 PID 2256 wrote to memory of 2816 2256 lndjn.exe 32 PID 2256 wrote to memory of 2816 2256 lndjn.exe 32 PID 2256 wrote to memory of 2816 2256 lndjn.exe 32 PID 2816 wrote to memory of 1856 2816 lxflb.exe 33 PID 2816 wrote to memory of 1856 2816 lxflb.exe 33 PID 2816 wrote to memory of 1856 2816 lxflb.exe 33 PID 2816 wrote to memory of 1856 2816 lxflb.exe 33 PID 1856 wrote to memory of 2768 1856 phhlnd.exe 34 PID 1856 wrote to memory of 2768 1856 phhlnd.exe 34 PID 1856 wrote to memory of 2768 1856 phhlnd.exe 34 PID 1856 wrote to memory of 2768 1856 phhlnd.exe 34 PID 2768 wrote to memory of 2764 2768 tnhjbx.exe 35 PID 2768 wrote to memory of 2764 2768 tnhjbx.exe 35 PID 2768 wrote to memory of 2764 2768 tnhjbx.exe 35 PID 2768 wrote to memory of 2764 2768 tnhjbx.exe 35 PID 2764 wrote to memory of 2620 2764 lppdb.exe 69 PID 2764 wrote to memory of 2620 2764 lppdb.exe 69 PID 2764 wrote to memory of 2620 2764 lppdb.exe 69 PID 2764 wrote to memory of 2620 2764 lppdb.exe 69 PID 2620 wrote to memory of 2412 2620 hlxdl.exe 37 PID 2620 wrote to memory of 2412 2620 hlxdl.exe 37 PID 2620 wrote to memory of 2412 2620 hlxdl.exe 37 PID 2620 wrote to memory of 2412 2620 hlxdl.exe 37 PID 2412 wrote to memory of 1516 2412 xdpfftl.exe 38 PID 2412 wrote to memory of 1516 2412 xdpfftl.exe 38 PID 2412 wrote to memory of 1516 2412 xdpfftl.exe 38 PID 2412 wrote to memory of 1516 2412 xdpfftl.exe 38 PID 1516 wrote to memory of 2092 1516 xthpbtt.exe 39 PID 1516 wrote to memory of 2092 1516 xthpbtt.exe 39 PID 1516 wrote to memory of 2092 1516 xthpbtt.exe 39 PID 1516 wrote to memory of 2092 1516 xthpbtt.exe 39 PID 2092 wrote to memory of 1092 2092 fhnxb.exe 40 PID 2092 wrote to memory of 1092 2092 fhnxb.exe 40 PID 2092 wrote to memory of 1092 2092 fhnxb.exe 40 PID 2092 wrote to memory of 1092 2092 fhnxb.exe 40 PID 1092 wrote to memory of 3032 1092 hljtrvb.exe 41 PID 1092 wrote to memory of 3032 1092 hljtrvb.exe 41 PID 1092 wrote to memory of 3032 1092 hljtrvb.exe 41 PID 1092 wrote to memory of 3032 1092 hljtrvb.exe 41 PID 3032 wrote to memory of 2780 3032 ldttlb.exe 42 PID 3032 wrote to memory of 2780 3032 ldttlb.exe 42 PID 3032 wrote to memory of 2780 3032 ldttlb.exe 42 PID 3032 wrote to memory of 2780 3032 ldttlb.exe 42 PID 2780 wrote to memory of 2084 2780 rfxdph.exe 43 PID 2780 wrote to memory of 2084 2780 rfxdph.exe 43 PID 2780 wrote to memory of 2084 2780 rfxdph.exe 43 PID 2780 wrote to memory of 2084 2780 rfxdph.exe 43 PID 2084 wrote to memory of 1388 2084 fnddjv.exe 44 PID 2084 wrote to memory of 1388 2084 fnddjv.exe 44 PID 2084 wrote to memory of 1388 2084 fnddjv.exe 44 PID 2084 wrote to memory of 1388 2084 fnddjv.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\55d6b6925120b116003fc18a8322f100N.exe"C:\Users\Admin\AppData\Local\Temp\55d6b6925120b116003fc18a8322f100N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\xrtxlfd.exec:\xrtxlfd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\nblhltt.exec:\nblhltt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\lndjn.exec:\lndjn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\lxflb.exec:\lxflb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\phhlnd.exec:\phhlnd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\tnhjbx.exec:\tnhjbx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\lppdb.exec:\lppdb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\hlxdl.exec:\hlxdl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\xdpfftl.exec:\xdpfftl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\xthpbtt.exec:\xthpbtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\fhnxb.exec:\fhnxb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\hljtrvb.exec:\hljtrvb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
\??\c:\ldttlb.exec:\ldttlb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\rfxdph.exec:\rfxdph.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\fnddjv.exec:\fnddjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\bfbbjb.exec:\bfbbjb.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1388 -
\??\c:\hljxltl.exec:\hljxltl.exe18⤵
- Executes dropped EXE
PID:2628 -
\??\c:\jrjrdlf.exec:\jrjrdlf.exe19⤵
- Executes dropped EXE
PID:1300 -
\??\c:\tvfjp.exec:\tvfjp.exe20⤵
- Executes dropped EXE
PID:2968 -
\??\c:\jfhxphj.exec:\jfhxphj.exe21⤵
- Executes dropped EXE
PID:1560 -
\??\c:\lhnptfp.exec:\lhnptfp.exe22⤵
- Executes dropped EXE
PID:2496 -
\??\c:\fflhhnb.exec:\fflhhnb.exe23⤵
- Executes dropped EXE
PID:924 -
\??\c:\fxjplbd.exec:\fxjplbd.exe24⤵
- Executes dropped EXE
PID:1376 -
\??\c:\hxpbl.exec:\hxpbl.exe25⤵
- Executes dropped EXE
PID:2356 -
\??\c:\pjnvb.exec:\pjnvb.exe26⤵
- Executes dropped EXE
PID:2288 -
\??\c:\hffbl.exec:\hffbl.exe27⤵
- Executes dropped EXE
PID:1872 -
\??\c:\dnvprp.exec:\dnvprp.exe28⤵
- Executes dropped EXE
PID:2524 -
\??\c:\jrdllnb.exec:\jrdllnb.exe29⤵
- Executes dropped EXE
PID:820 -
\??\c:\jjjph.exec:\jjjph.exe30⤵
- Executes dropped EXE
PID:892 -
\??\c:\tdhjrpj.exec:\tdhjrpj.exe31⤵
- Executes dropped EXE
PID:2176 -
\??\c:\tjpvh.exec:\tjpvh.exe32⤵
- Executes dropped EXE
PID:2924 -
\??\c:\dttdblb.exec:\dttdblb.exe33⤵
- Executes dropped EXE
PID:2116 -
\??\c:\llvpdfn.exec:\llvpdfn.exe34⤵
- Executes dropped EXE
PID:2224 -
\??\c:\xnxrx.exec:\xnxrx.exe35⤵
- Executes dropped EXE
PID:1980 -
\??\c:\bpttdtf.exec:\bpttdtf.exe36⤵
- Executes dropped EXE
PID:2748 -
\??\c:\bhrth.exec:\bhrth.exe37⤵
- Executes dropped EXE
PID:2896 -
\??\c:\ljrbl.exec:\ljrbl.exe38⤵
- Executes dropped EXE
PID:2836 -
\??\c:\tnvlf.exec:\tnvlf.exe39⤵
- Executes dropped EXE
PID:2616 -
\??\c:\bftpt.exec:\bftpt.exe40⤵
- Executes dropped EXE
PID:2636 -
\??\c:\nnltrx.exec:\nnltrx.exe41⤵
- Executes dropped EXE
PID:2832 -
\??\c:\fnbxf.exec:\fnbxf.exe42⤵
- Executes dropped EXE
PID:2620 -
\??\c:\fndrf.exec:\fndrf.exe43⤵
- Executes dropped EXE
PID:2728 -
\??\c:\ltrfnj.exec:\ltrfnj.exe44⤵
- Executes dropped EXE
PID:2592 -
\??\c:\hdxlvp.exec:\hdxlvp.exe45⤵
- Executes dropped EXE
PID:1096 -
\??\c:\dnxtrvt.exec:\dnxtrvt.exe46⤵
- Executes dropped EXE
PID:2416 -
\??\c:\tdppfh.exec:\tdppfh.exe47⤵
- Executes dropped EXE
PID:2360 -
\??\c:\txdxr.exec:\txdxr.exe48⤵
- Executes dropped EXE
PID:2784 -
\??\c:\ndfnbhb.exec:\ndfnbhb.exe49⤵
- Executes dropped EXE
PID:3044 -
\??\c:\nxjnl.exec:\nxjnl.exe50⤵
- Executes dropped EXE
PID:936 -
\??\c:\jhhfv.exec:\jhhfv.exe51⤵
- Executes dropped EXE
PID:2180 -
\??\c:\vnjth.exec:\vnjth.exe52⤵
- Executes dropped EXE
PID:2476 -
\??\c:\pdnfx.exec:\pdnfx.exe53⤵
- Executes dropped EXE
PID:2364 -
\??\c:\rxtnpb.exec:\rxtnpb.exe54⤵
- Executes dropped EXE
PID:604 -
\??\c:\jtvlfvf.exec:\jtvlfvf.exe55⤵
- Executes dropped EXE
PID:1712 -
\??\c:\npljrr.exec:\npljrr.exe56⤵
- Executes dropped EXE
PID:2964 -
\??\c:\ptvlrlp.exec:\ptvlrlp.exe57⤵
- Executes dropped EXE
PID:1560 -
\??\c:\jntxnp.exec:\jntxnp.exe58⤵
- Executes dropped EXE
PID:2492 -
\??\c:\trjft.exec:\trjft.exe59⤵
- Executes dropped EXE
PID:1444 -
\??\c:\hbvfnt.exec:\hbvfnt.exe60⤵
- Executes dropped EXE
PID:2268 -
\??\c:\fnffnnn.exec:\fnffnnn.exe61⤵
- Executes dropped EXE
PID:288 -
\??\c:\jfxtfr.exec:\jfxtfr.exe62⤵
- Executes dropped EXE
PID:2132 -
\??\c:\ldlvvp.exec:\ldlvvp.exe63⤵
- Executes dropped EXE
PID:644 -
\??\c:\ptrrn.exec:\ptrrn.exe64⤵
- Executes dropped EXE
PID:1736 -
\??\c:\lfxblb.exec:\lfxblb.exe65⤵
- Executes dropped EXE
PID:1628 -
\??\c:\nflfd.exec:\nflfd.exe66⤵PID:2512
-
\??\c:\hpthllv.exec:\hpthllv.exe67⤵PID:680
-
\??\c:\tbblnbh.exec:\tbblnbh.exe68⤵PID:1280
-
\??\c:\jxvfb.exec:\jxvfb.exe69⤵PID:1744
-
\??\c:\bvjnrtb.exec:\bvjnrtb.exe70⤵PID:2176
-
\??\c:\nlvvl.exec:\nlvvl.exe71⤵PID:2888
-
\??\c:\fhllx.exec:\fhllx.exe72⤵PID:1372
-
\??\c:\dnntjv.exec:\dnntjv.exe73⤵PID:2144
-
\??\c:\ffrhffn.exec:\ffrhffn.exe74⤵PID:2256
-
\??\c:\pxjpvbf.exec:\pxjpvbf.exe75⤵PID:2816
-
\??\c:\vbphn.exec:\vbphn.exe76⤵PID:1856
-
\??\c:\rnvdl.exec:\rnvdl.exe77⤵PID:2876
-
\??\c:\xrlnxtb.exec:\xrlnxtb.exe78⤵PID:2836
-
\??\c:\drprd.exec:\drprd.exe79⤵PID:1204
-
\??\c:\rlhlxpn.exec:\rlhlxpn.exe80⤵PID:1948
-
\??\c:\rxxjh.exec:\rxxjh.exe81⤵PID:3016
-
\??\c:\nhftl.exec:\nhftl.exe82⤵PID:2840
-
\??\c:\vlhxtt.exec:\vlhxtt.exe83⤵PID:2600
-
\??\c:\bjjnt.exec:\bjjnt.exe84⤵PID:3020
-
\??\c:\fpjrtnn.exec:\fpjrtnn.exe85⤵PID:2092
-
\??\c:\vdlvd.exec:\vdlvd.exe86⤵PID:2192
-
\??\c:\tpbjvdn.exec:\tpbjvdn.exe87⤵PID:2856
-
\??\c:\jlnhln.exec:\jlnhln.exe88⤵PID:1140
-
\??\c:\vrlfhb.exec:\vrlfhb.exe89⤵PID:2484
-
\??\c:\ltlhltp.exec:\ltlhltp.exe90⤵PID:2248
-
\??\c:\lhjflp.exec:\lhjflp.exe91⤵PID:3040
-
\??\c:\rvrvd.exec:\rvrvd.exe92⤵PID:1084
-
\??\c:\nvnvl.exec:\nvnvl.exe93⤵PID:2960
-
\??\c:\rljlrb.exec:\rljlrb.exe94⤵PID:1320
-
\??\c:\bntjhjt.exec:\bntjhjt.exe95⤵PID:2272
-
\??\c:\vjnpbb.exec:\vjnpbb.exe96⤵PID:568
-
\??\c:\jddvt.exec:\jddvt.exe97⤵PID:1756
-
\??\c:\llvvv.exec:\llvvv.exe98⤵PID:2788
-
\??\c:\btljd.exec:\btljd.exe99⤵PID:1728
-
\??\c:\fxtjrnf.exec:\fxtjrnf.exe100⤵PID:1536
-
\??\c:\nbtxft.exec:\nbtxft.exe101⤵PID:316
-
\??\c:\pnnhjl.exec:\pnnhjl.exe102⤵PID:1652
-
\??\c:\lhblpt.exec:\lhblpt.exe103⤵PID:2456
-
\??\c:\jhhtr.exec:\jhhtr.exe104⤵PID:2212
-
\??\c:\xnnhxlt.exec:\xnnhxlt.exe105⤵PID:1572
-
\??\c:\ttjlxf.exec:\ttjlxf.exe106⤵PID:820
-
\??\c:\lbrvd.exec:\lbrvd.exe107⤵PID:2100
-
\??\c:\nllnrh.exec:\nllnrh.exe108⤵PID:1720
-
\??\c:\thfxpx.exec:\thfxpx.exe109⤵PID:2276
-
\??\c:\bvlvttd.exec:\bvlvttd.exe110⤵PID:2924
-
\??\c:\vfjbhbl.exec:\vfjbhbl.exe111⤵PID:2116
-
\??\c:\vnnnn.exec:\vnnnn.exe112⤵PID:2280
-
\??\c:\vpdbrpr.exec:\vpdbrpr.exe113⤵PID:2724
-
\??\c:\ffhbxdx.exec:\ffhbxdx.exe114⤵PID:2864
-
\??\c:\vjfxf.exec:\vjfxf.exe115⤵PID:2904
-
\??\c:\rdrjjb.exec:\rdrjjb.exe116⤵PID:2828
-
\??\c:\pfptt.exec:\pfptt.exe117⤵PID:2076
-
\??\c:\jvjnp.exec:\jvjnp.exe118⤵
- System Location Discovery: System Language Discovery
PID:2764 -
\??\c:\hpdrr.exec:\hpdrr.exe119⤵PID:1800
-
\??\c:\hjtpf.exec:\hjtpf.exe120⤵PID:2632
-
\??\c:\nnnfppp.exec:\nnnfppp.exe121⤵PID:3012
-
\??\c:\rbndxrl.exec:\rbndxrl.exe122⤵PID:1052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-