Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 10:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eaf1f5a94189ec963d5692d428d5c390N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
eaf1f5a94189ec963d5692d428d5c390N.exe
-
Size
64KB
-
MD5
eaf1f5a94189ec963d5692d428d5c390
-
SHA1
ce250897becd6dc02da5e96bd28eebea707108f8
-
SHA256
9ac72314d261bcda0fd8e985fcca41c1f520fa36b985cdca4911f05c203441cd
-
SHA512
e86e47a830b969fba79aa9be3d21f219e9b8555f88eea9a9603ad5c8f730405397feb9ff23fbf697b65999fa61e4f064f11e391e2fac6cd92031c9f5ffb35999
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzkzNL:ymb3NkkiQ3mdBjFIvlpL
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/320-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2072-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1372-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1376-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1848-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3032-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1604-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1332-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/680-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1460-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1480-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 868 hbxtr.exe 2964 xjhhb.exe 2752 xlbdrp.exe 2908 tfjpbll.exe 2632 pdxdp.exe 2956 xjdlpnf.exe 2400 nftvfbb.exe 2684 rnbtl.exe 2072 jbrdnnl.exe 1372 dtnxn.exe 1376 rrbdttx.exe 2976 rjfpfl.exe 2676 jrntr.exe 2724 pdhppx.exe 1848 lhxhdln.exe 1640 tdtnvrv.exe 3032 rbrjtjl.exe 2080 jtxfvdr.exe 2480 dfdvrd.exe 2328 bljht.exe 1604 jbdjvl.exe 1664 jvtbfr.exe 1984 nnhhbp.exe 1332 pxvfdtf.exe 680 bthxhx.exe 1036 tjjxjhn.exe 2024 rpfntf.exe 2272 pjntnnb.exe 1460 dtrbjxb.exe 1480 rdfrjvl.exe 2568 ftbtbnp.exe 1704 dphttpd.exe 1964 bftlx.exe 2808 htvtnnx.exe 2780 tthhndl.exe 2728 ttvjb.exe 2776 nrlnb.exe 2740 jvxjlvh.exe 2984 jlhrlnd.exe 2788 jxjdd.exe 2700 jjndn.exe 1716 vjnntrx.exe 820 rrffbv.exe 2360 nbplh.exe 1572 dhjdbxr.exe 752 tpphhfx.exe 2692 vbrljnb.exe 1812 dvfltp.exe 1600 hfxldp.exe 2724 tjbdvd.exe 2836 npvrrnl.exe 900 bhhvb.exe 1640 fvjfdf.exe 2052 rhllfpx.exe 1924 trtpjlx.exe 2312 dnbxb.exe 432 hpphp.exe 1632 jrthdxp.exe 484 pftthxl.exe 2252 vxrlb.exe 1828 pfjrjr.exe 1756 dljnf.exe 2624 pdnlhrb.exe 3060 xtvph.exe -
resource yara_rule behavioral1/memory/320-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2072-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1372-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1376-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1848-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3032-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1604-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1332-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/680-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1460-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1480-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvnrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhdnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfljtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxffhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnrdtnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrxphl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtpnjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phlxdpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbdjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhhvbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfdbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlhpvjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnpjrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlvndnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrjnbjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drflvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdfrvfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrbph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrbrjvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtxfnpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpxxhxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbfpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxfjbdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brxhdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhrthv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjdvphv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjfjvfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npvrrnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdffjdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjhbdrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfjnlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxhdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 868 320 eaf1f5a94189ec963d5692d428d5c390N.exe 30 PID 320 wrote to memory of 868 320 eaf1f5a94189ec963d5692d428d5c390N.exe 30 PID 320 wrote to memory of 868 320 eaf1f5a94189ec963d5692d428d5c390N.exe 30 PID 320 wrote to memory of 868 320 eaf1f5a94189ec963d5692d428d5c390N.exe 30 PID 868 wrote to memory of 2964 868 hbxtr.exe 31 PID 868 wrote to memory of 2964 868 hbxtr.exe 31 PID 868 wrote to memory of 2964 868 hbxtr.exe 31 PID 868 wrote to memory of 2964 868 hbxtr.exe 31 PID 2964 wrote to memory of 2752 2964 xjhhb.exe 32 PID 2964 wrote to memory of 2752 2964 xjhhb.exe 32 PID 2964 wrote to memory of 2752 2964 xjhhb.exe 32 PID 2964 wrote to memory of 2752 2964 xjhhb.exe 32 PID 2752 wrote to memory of 2908 2752 xlbdrp.exe 33 PID 2752 wrote to memory of 2908 2752 xlbdrp.exe 33 PID 2752 wrote to memory of 2908 2752 xlbdrp.exe 33 PID 2752 wrote to memory of 2908 2752 xlbdrp.exe 33 PID 2908 wrote to memory of 2632 2908 tfjpbll.exe 34 PID 2908 wrote to memory of 2632 2908 tfjpbll.exe 34 PID 2908 wrote to memory of 2632 2908 tfjpbll.exe 34 PID 2908 wrote to memory of 2632 2908 tfjpbll.exe 34 PID 2632 wrote to memory of 2956 2632 pdxdp.exe 35 PID 2632 wrote to memory of 2956 2632 pdxdp.exe 35 PID 2632 wrote to memory of 2956 2632 pdxdp.exe 35 PID 2632 wrote to memory of 2956 2632 pdxdp.exe 35 PID 2956 wrote to memory of 2400 2956 xjdlpnf.exe 36 PID 2956 wrote to memory of 2400 2956 xjdlpnf.exe 36 PID 2956 wrote to memory of 2400 2956 xjdlpnf.exe 36 PID 2956 wrote to memory of 2400 2956 xjdlpnf.exe 36 PID 2400 wrote to memory of 2684 2400 nftvfbb.exe 37 PID 2400 wrote to memory of 2684 2400 nftvfbb.exe 37 PID 2400 wrote to memory of 2684 2400 nftvfbb.exe 37 PID 2400 wrote to memory of 2684 2400 nftvfbb.exe 37 PID 2684 wrote to memory of 2072 2684 rnbtl.exe 38 PID 2684 wrote to memory of 2072 2684 rnbtl.exe 38 PID 2684 wrote to memory of 2072 2684 rnbtl.exe 38 PID 2684 wrote to memory of 2072 2684 rnbtl.exe 38 PID 2072 wrote to memory of 1372 2072 jbrdnnl.exe 39 PID 2072 wrote to memory of 1372 2072 jbrdnnl.exe 39 PID 2072 wrote to memory of 1372 2072 jbrdnnl.exe 39 PID 2072 wrote to memory of 1372 2072 jbrdnnl.exe 39 PID 1372 wrote to memory of 1376 1372 dtnxn.exe 40 PID 1372 wrote to memory of 1376 1372 dtnxn.exe 40 PID 1372 wrote to memory of 1376 1372 dtnxn.exe 40 PID 1372 wrote to memory of 1376 1372 dtnxn.exe 40 PID 1376 wrote to memory of 2976 1376 rrbdttx.exe 41 PID 1376 wrote to memory of 2976 1376 rrbdttx.exe 41 PID 1376 wrote to memory of 2976 1376 rrbdttx.exe 41 PID 1376 wrote to memory of 2976 1376 rrbdttx.exe 41 PID 2976 wrote to memory of 2676 2976 rjfpfl.exe 42 PID 2976 wrote to memory of 2676 2976 rjfpfl.exe 42 PID 2976 wrote to memory of 2676 2976 rjfpfl.exe 42 PID 2976 wrote to memory of 2676 2976 rjfpfl.exe 42 PID 2676 wrote to memory of 2724 2676 jrntr.exe 43 PID 2676 wrote to memory of 2724 2676 jrntr.exe 43 PID 2676 wrote to memory of 2724 2676 jrntr.exe 43 PID 2676 wrote to memory of 2724 2676 jrntr.exe 43 PID 2724 wrote to memory of 1848 2724 pdhppx.exe 44 PID 2724 wrote to memory of 1848 2724 pdhppx.exe 44 PID 2724 wrote to memory of 1848 2724 pdhppx.exe 44 PID 2724 wrote to memory of 1848 2724 pdhppx.exe 44 PID 1848 wrote to memory of 1640 1848 lhxhdln.exe 45 PID 1848 wrote to memory of 1640 1848 lhxhdln.exe 45 PID 1848 wrote to memory of 1640 1848 lhxhdln.exe 45 PID 1848 wrote to memory of 1640 1848 lhxhdln.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf1f5a94189ec963d5692d428d5c390N.exe"C:\Users\Admin\AppData\Local\Temp\eaf1f5a94189ec963d5692d428d5c390N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\hbxtr.exec:\hbxtr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
\??\c:\xjhhb.exec:\xjhhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\xlbdrp.exec:\xlbdrp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\tfjpbll.exec:\tfjpbll.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\pdxdp.exec:\pdxdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\xjdlpnf.exec:\xjdlpnf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\nftvfbb.exec:\nftvfbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\rnbtl.exec:\rnbtl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\jbrdnnl.exec:\jbrdnnl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\dtnxn.exec:\dtnxn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\rrbdttx.exec:\rrbdttx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\rjfpfl.exec:\rjfpfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\jrntr.exec:\jrntr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\pdhppx.exec:\pdhppx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\lhxhdln.exec:\lhxhdln.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
\??\c:\tdtnvrv.exec:\tdtnvrv.exe17⤵
- Executes dropped EXE
PID:1640 -
\??\c:\rbrjtjl.exec:\rbrjtjl.exe18⤵
- Executes dropped EXE
PID:3032 -
\??\c:\jtxfvdr.exec:\jtxfvdr.exe19⤵
- Executes dropped EXE
PID:2080 -
\??\c:\dfdvrd.exec:\dfdvrd.exe20⤵
- Executes dropped EXE
PID:2480 -
\??\c:\bljht.exec:\bljht.exe21⤵
- Executes dropped EXE
PID:2328 -
\??\c:\jbdjvl.exec:\jbdjvl.exe22⤵
- Executes dropped EXE
PID:1604 -
\??\c:\jvtbfr.exec:\jvtbfr.exe23⤵
- Executes dropped EXE
PID:1664 -
\??\c:\nnhhbp.exec:\nnhhbp.exe24⤵
- Executes dropped EXE
PID:1984 -
\??\c:\pxvfdtf.exec:\pxvfdtf.exe25⤵
- Executes dropped EXE
PID:1332 -
\??\c:\bthxhx.exec:\bthxhx.exe26⤵
- Executes dropped EXE
PID:680 -
\??\c:\tjjxjhn.exec:\tjjxjhn.exe27⤵
- Executes dropped EXE
PID:1036 -
\??\c:\rpfntf.exec:\rpfntf.exe28⤵
- Executes dropped EXE
PID:2024 -
\??\c:\pjntnnb.exec:\pjntnnb.exe29⤵
- Executes dropped EXE
PID:2272 -
\??\c:\dtrbjxb.exec:\dtrbjxb.exe30⤵
- Executes dropped EXE
PID:1460 -
\??\c:\rdfrjvl.exec:\rdfrjvl.exe31⤵
- Executes dropped EXE
PID:1480 -
\??\c:\ftbtbnp.exec:\ftbtbnp.exe32⤵
- Executes dropped EXE
PID:2568 -
\??\c:\dphttpd.exec:\dphttpd.exe33⤵
- Executes dropped EXE
PID:1704 -
\??\c:\bftlx.exec:\bftlx.exe34⤵
- Executes dropped EXE
PID:1964 -
\??\c:\htvtnnx.exec:\htvtnnx.exe35⤵
- Executes dropped EXE
PID:2808 -
\??\c:\tthhndl.exec:\tthhndl.exe36⤵
- Executes dropped EXE
PID:2780 -
\??\c:\ttvjb.exec:\ttvjb.exe37⤵
- Executes dropped EXE
PID:2728 -
\??\c:\nrlnb.exec:\nrlnb.exe38⤵
- Executes dropped EXE
PID:2776 -
\??\c:\jvxjlvh.exec:\jvxjlvh.exe39⤵
- Executes dropped EXE
PID:2740 -
\??\c:\jlhrlnd.exec:\jlhrlnd.exe40⤵
- Executes dropped EXE
PID:2984 -
\??\c:\jxjdd.exec:\jxjdd.exe41⤵
- Executes dropped EXE
PID:2788 -
\??\c:\jjndn.exec:\jjndn.exe42⤵
- Executes dropped EXE
PID:2700 -
\??\c:\vjnntrx.exec:\vjnntrx.exe43⤵
- Executes dropped EXE
PID:1716 -
\??\c:\rrffbv.exec:\rrffbv.exe44⤵
- Executes dropped EXE
PID:820 -
\??\c:\nbplh.exec:\nbplh.exe45⤵
- Executes dropped EXE
PID:2360 -
\??\c:\dhjdbxr.exec:\dhjdbxr.exe46⤵
- Executes dropped EXE
PID:1572 -
\??\c:\tpphhfx.exec:\tpphhfx.exe47⤵
- Executes dropped EXE
PID:752 -
\??\c:\vbrljnb.exec:\vbrljnb.exe48⤵
- Executes dropped EXE
PID:2692 -
\??\c:\dvfltp.exec:\dvfltp.exe49⤵
- Executes dropped EXE
PID:1812 -
\??\c:\hfxldp.exec:\hfxldp.exe50⤵
- Executes dropped EXE
PID:1600 -
\??\c:\tjbdvd.exec:\tjbdvd.exe51⤵
- Executes dropped EXE
PID:2724 -
\??\c:\npvrrnl.exec:\npvrrnl.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836 -
\??\c:\bhhvb.exec:\bhhvb.exe53⤵
- Executes dropped EXE
PID:900 -
\??\c:\fvjfdf.exec:\fvjfdf.exe54⤵
- Executes dropped EXE
PID:1640 -
\??\c:\rhllfpx.exec:\rhllfpx.exe55⤵
- Executes dropped EXE
PID:2052 -
\??\c:\trtpjlx.exec:\trtpjlx.exe56⤵
- Executes dropped EXE
PID:1924 -
\??\c:\dnbxb.exec:\dnbxb.exe57⤵
- Executes dropped EXE
PID:2312 -
\??\c:\hpphp.exec:\hpphp.exe58⤵
- Executes dropped EXE
PID:432 -
\??\c:\jrthdxp.exec:\jrthdxp.exe59⤵
- Executes dropped EXE
PID:1632 -
\??\c:\pftthxl.exec:\pftthxl.exe60⤵
- Executes dropped EXE
PID:484 -
\??\c:\vxrlb.exec:\vxrlb.exe61⤵
- Executes dropped EXE
PID:2252 -
\??\c:\pfjrjr.exec:\pfjrjr.exe62⤵
- Executes dropped EXE
PID:1828 -
\??\c:\dljnf.exec:\dljnf.exe63⤵
- Executes dropped EXE
PID:1756 -
\??\c:\pdnlhrb.exec:\pdnlhrb.exe64⤵
- Executes dropped EXE
PID:2624 -
\??\c:\xtvph.exec:\xtvph.exe65⤵
- Executes dropped EXE
PID:3060 -
\??\c:\hhxhtv.exec:\hhxhtv.exe66⤵PID:1036
-
\??\c:\htrtt.exec:\htrtt.exe67⤵PID:2256
-
\??\c:\ndjvjn.exec:\ndjvjn.exe68⤵PID:1032
-
\??\c:\vdxbxd.exec:\vdxbxd.exe69⤵PID:1004
-
\??\c:\pfflh.exec:\pfflh.exe70⤵PID:880
-
\??\c:\lnxrbrb.exec:\lnxrbrb.exe71⤵PID:1480
-
\??\c:\xdjblvb.exec:\xdjblvb.exe72⤵PID:1148
-
\??\c:\hxpfxb.exec:\hxpfxb.exe73⤵PID:1596
-
\??\c:\nndjhx.exec:\nndjhx.exe74⤵PID:2228
-
\??\c:\tnntvh.exec:\tnntvh.exe75⤵PID:1964
-
\??\c:\hlnpt.exec:\hlnpt.exe76⤵PID:2944
-
\??\c:\bxlxhvv.exec:\bxlxhvv.exe77⤵PID:2752
-
\??\c:\bhbnpv.exec:\bhbnpv.exe78⤵PID:2728
-
\??\c:\vhfvfdd.exec:\vhfvfdd.exe79⤵PID:2776
-
\??\c:\lhffvl.exec:\lhffvl.exe80⤵PID:2992
-
\??\c:\ftbvlrb.exec:\ftbvlrb.exe81⤵PID:2984
-
\??\c:\xvlhl.exec:\xvlhl.exe82⤵PID:2788
-
\??\c:\tbjrttt.exec:\tbjrttt.exe83⤵PID:2700
-
\??\c:\xnntjd.exec:\xnntjd.exe84⤵PID:2608
-
\??\c:\nrdftn.exec:\nrdftn.exe85⤵PID:2628
-
\??\c:\hxthphp.exec:\hxthphp.exe86⤵PID:1932
-
\??\c:\vllhdr.exec:\vllhdr.exe87⤵PID:1572
-
\??\c:\tjptbt.exec:\tjptbt.exe88⤵PID:2848
-
\??\c:\rlbnd.exec:\rlbnd.exe89⤵PID:2692
-
\??\c:\rbxjd.exec:\rbxjd.exe90⤵PID:1812
-
\??\c:\bnrbr.exec:\bnrbr.exe91⤵PID:1600
-
\??\c:\bnxlxt.exec:\bnxlxt.exe92⤵PID:1648
-
\??\c:\dvhjd.exec:\dvhjd.exe93⤵PID:580
-
\??\c:\tdljt.exec:\tdljt.exe94⤵PID:864
-
\??\c:\ffflh.exec:\ffflh.exe95⤵PID:1640
-
\??\c:\pbdlxh.exec:\pbdlxh.exe96⤵PID:2068
-
\??\c:\jbxbv.exec:\jbxbv.exe97⤵PID:2176
-
\??\c:\dxvhdx.exec:\dxvhdx.exe98⤵PID:2320
-
\??\c:\hpfxp.exec:\hpfxp.exe99⤵PID:2032
-
\??\c:\vlvtt.exec:\vlvtt.exe100⤵PID:2596
-
\??\c:\jjlvjxx.exec:\jjlvjxx.exe101⤵PID:1240
-
\??\c:\nntnnhp.exec:\nntnnhp.exe102⤵PID:1568
-
\??\c:\bptvrtx.exec:\bptvrtx.exe103⤵PID:2028
-
\??\c:\bplrflh.exec:\bplrflh.exe104⤵PID:2580
-
\??\c:\vthxl.exec:\vthxl.exe105⤵PID:3056
-
\??\c:\dtxhljh.exec:\dtxhljh.exe106⤵PID:1464
-
\??\c:\dhhlxh.exec:\dhhlxh.exe107⤵PID:1276
-
\??\c:\nbrfxb.exec:\nbrfxb.exe108⤵PID:1788
-
\??\c:\jplvpnn.exec:\jplvpnn.exe109⤵PID:2560
-
\??\c:\pbbnltp.exec:\pbbnltp.exe110⤵PID:1316
-
\??\c:\hnnfjln.exec:\hnnfjln.exe111⤵PID:664
-
\??\c:\xflnbv.exec:\xflnbv.exe112⤵PID:2564
-
\??\c:\npxtpfd.exec:\npxtpfd.exe113⤵PID:2716
-
\??\c:\dpnntdp.exec:\dpnntdp.exe114⤵PID:1112
-
\??\c:\bpflhtx.exec:\bpflhtx.exe115⤵PID:2916
-
\??\c:\pptxft.exec:\pptxft.exe116⤵PID:2336
-
\??\c:\hdfffr.exec:\hdfffr.exe117⤵PID:2900
-
\??\c:\blxfjt.exec:\blxfjt.exe118⤵PID:2948
-
\??\c:\bjnfjjp.exec:\bjnfjjp.exe119⤵PID:2384
-
\??\c:\pbfxjlr.exec:\pbfxjlr.exe120⤵PID:2660
-
\??\c:\xvpfrx.exec:\xvpfrx.exe121⤵PID:2636
-
\??\c:\vjnjn.exec:\vjnjn.exe122⤵PID:1624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-