Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 10:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe
-
Size
71KB
-
MD5
074ecd6894a7613dd0fd083864d3b5e0
-
SHA1
9eb0e7547db632f030a7c8f320e28562c635941d
-
SHA256
d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7
-
SHA512
7c3996cc09cebe77563b7b9a9ee07e932f4d135c2a95cfca5af72359e14845a00259ca8cce71aa818efef9d76492dae46c556067de3ab35cfe9229c0f14b1b44
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjf3:ymb3NkkiQ3mdBjFI4Vv3
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2720-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3044-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/388-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/568-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/896-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2184-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2452-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2956 fhblrb.exe 2740 fxbvb.exe 2976 rtjlvn.exe 2820 jjjprd.exe 2660 thlpp.exe 2632 vnnjnff.exe 3044 hpxpffv.exe 2680 jxxnvj.exe 388 bnlxd.exe 2268 xfptx.exe 2128 tdnttd.exe 2544 ljttlxj.exe 568 pxpjnr.exe 896 tbtfv.exe 1992 lbxtdh.exe 2184 dptvdn.exe 2992 nxrbd.exe 2452 rnvnfp.exe 2228 njttltl.exe 580 rdfhj.exe 2536 jlplxn.exe 360 hbfdnvp.exe 2080 xlvljbn.exe 1456 phvnflf.exe 2140 nhjpdr.exe 1676 jphftrl.exe 924 rtxpxb.exe 2068 vrjhrrl.exe 2980 plrpf.exe 2460 xnhdtj.exe 1244 nvvffj.exe 2728 tvjdr.exe 2848 nthjn.exe 1584 fjbxvh.exe 2784 jnbtlt.exe 2912 fnfvbh.exe 2920 nffbtvb.exe 2820 pvdfbp.exe 2812 vnnvd.exe 2660 rnjlx.exe 2828 dbrnn.exe 2708 ltxpplf.exe 2532 ljjlr.exe 1608 xhrpv.exe 2468 fbvtn.exe 2064 lvlpxfb.exe 2004 dvrvn.exe 1696 btjtndn.exe 2952 ldxffpt.exe 1604 bjhrn.exe 2988 hrhfvlv.exe 1636 rpdrrx.exe 2260 hdpjj.exe 1752 jjjhh.exe 2200 hnhdf.exe 2428 rrntfpx.exe 2244 dxdptt.exe 2228 hpxjn.exe 824 dflxt.exe 524 vtvnlft.exe 656 pdvprh.exe 2100 vrxvd.exe 1544 xtxbdt.exe 600 flxhbtn.exe -
resource yara_rule behavioral1/memory/2720-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/388-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/568-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/896-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2452-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-285-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvnfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrntfpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjxbhvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdrhrjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhlbjrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlbftv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xftvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thndpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjbvjrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvthnbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfrnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvldfvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxtrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dndfvlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlrnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdfld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfhdnhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2956 2720 d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe 29 PID 2720 wrote to memory of 2956 2720 d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe 29 PID 2720 wrote to memory of 2956 2720 d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe 29 PID 2720 wrote to memory of 2956 2720 d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe 29 PID 2956 wrote to memory of 2740 2956 fhblrb.exe 30 PID 2956 wrote to memory of 2740 2956 fhblrb.exe 30 PID 2956 wrote to memory of 2740 2956 fhblrb.exe 30 PID 2956 wrote to memory of 2740 2956 fhblrb.exe 30 PID 2740 wrote to memory of 2976 2740 fxbvb.exe 31 PID 2740 wrote to memory of 2976 2740 fxbvb.exe 31 PID 2740 wrote to memory of 2976 2740 fxbvb.exe 31 PID 2740 wrote to memory of 2976 2740 fxbvb.exe 31 PID 2976 wrote to memory of 2820 2976 rtjlvn.exe 32 PID 2976 wrote to memory of 2820 2976 rtjlvn.exe 32 PID 2976 wrote to memory of 2820 2976 rtjlvn.exe 32 PID 2976 wrote to memory of 2820 2976 rtjlvn.exe 32 PID 2820 wrote to memory of 2660 2820 jjjprd.exe 33 PID 2820 wrote to memory of 2660 2820 jjjprd.exe 33 PID 2820 wrote to memory of 2660 2820 jjjprd.exe 33 PID 2820 wrote to memory of 2660 2820 jjjprd.exe 33 PID 2660 wrote to memory of 2632 2660 thlpp.exe 34 PID 2660 wrote to memory of 2632 2660 thlpp.exe 34 PID 2660 wrote to memory of 2632 2660 thlpp.exe 34 PID 2660 wrote to memory of 2632 2660 thlpp.exe 34 PID 2632 wrote to memory of 3044 2632 vnnjnff.exe 35 PID 2632 wrote to memory of 3044 2632 vnnjnff.exe 35 PID 2632 wrote to memory of 3044 2632 vnnjnff.exe 35 PID 2632 wrote to memory of 3044 2632 vnnjnff.exe 35 PID 3044 wrote to memory of 2680 3044 hpxpffv.exe 36 PID 3044 wrote to memory of 2680 3044 hpxpffv.exe 36 PID 3044 wrote to memory of 2680 3044 hpxpffv.exe 36 PID 3044 wrote to memory of 2680 3044 hpxpffv.exe 36 PID 2680 wrote to memory of 388 2680 jxxnvj.exe 37 PID 2680 wrote to memory of 388 2680 jxxnvj.exe 37 PID 2680 wrote to memory of 388 2680 jxxnvj.exe 37 PID 2680 wrote to memory of 388 2680 jxxnvj.exe 37 PID 388 wrote to memory of 2268 388 bnlxd.exe 38 PID 388 wrote to memory of 2268 388 bnlxd.exe 38 PID 388 wrote to memory of 2268 388 bnlxd.exe 38 PID 388 wrote to memory of 2268 388 bnlxd.exe 38 PID 2268 wrote to memory of 2128 2268 xfptx.exe 39 PID 2268 wrote to memory of 2128 2268 xfptx.exe 39 PID 2268 wrote to memory of 2128 2268 xfptx.exe 39 PID 2268 wrote to memory of 2128 2268 xfptx.exe 39 PID 2128 wrote to memory of 2544 2128 tdnttd.exe 40 PID 2128 wrote to memory of 2544 2128 tdnttd.exe 40 PID 2128 wrote to memory of 2544 2128 tdnttd.exe 40 PID 2128 wrote to memory of 2544 2128 tdnttd.exe 40 PID 2544 wrote to memory of 568 2544 ljttlxj.exe 41 PID 2544 wrote to memory of 568 2544 ljttlxj.exe 41 PID 2544 wrote to memory of 568 2544 ljttlxj.exe 41 PID 2544 wrote to memory of 568 2544 ljttlxj.exe 41 PID 568 wrote to memory of 896 568 pxpjnr.exe 42 PID 568 wrote to memory of 896 568 pxpjnr.exe 42 PID 568 wrote to memory of 896 568 pxpjnr.exe 42 PID 568 wrote to memory of 896 568 pxpjnr.exe 42 PID 896 wrote to memory of 1992 896 tbtfv.exe 43 PID 896 wrote to memory of 1992 896 tbtfv.exe 43 PID 896 wrote to memory of 1992 896 tbtfv.exe 43 PID 896 wrote to memory of 1992 896 tbtfv.exe 43 PID 1992 wrote to memory of 2184 1992 lbxtdh.exe 44 PID 1992 wrote to memory of 2184 1992 lbxtdh.exe 44 PID 1992 wrote to memory of 2184 1992 lbxtdh.exe 44 PID 1992 wrote to memory of 2184 1992 lbxtdh.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe"C:\Users\Admin\AppData\Local\Temp\d563a043939763a3ea8939d2b98aa1ab026a6553bdf1af0c16a02619289293e7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\fhblrb.exec:\fhblrb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\fxbvb.exec:\fxbvb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\rtjlvn.exec:\rtjlvn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\jjjprd.exec:\jjjprd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\thlpp.exec:\thlpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\vnnjnff.exec:\vnnjnff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\hpxpffv.exec:\hpxpffv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\jxxnvj.exec:\jxxnvj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\bnlxd.exec:\bnlxd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\xfptx.exec:\xfptx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\tdnttd.exec:\tdnttd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\ljttlxj.exec:\ljttlxj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\pxpjnr.exec:\pxpjnr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
\??\c:\tbtfv.exec:\tbtfv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
\??\c:\lbxtdh.exec:\lbxtdh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\dptvdn.exec:\dptvdn.exe17⤵
- Executes dropped EXE
PID:2184 -
\??\c:\nxrbd.exec:\nxrbd.exe18⤵
- Executes dropped EXE
PID:2992 -
\??\c:\rnvnfp.exec:\rnvnfp.exe19⤵
- Executes dropped EXE
PID:2452 -
\??\c:\njttltl.exec:\njttltl.exe20⤵
- Executes dropped EXE
PID:2228 -
\??\c:\rdfhj.exec:\rdfhj.exe21⤵
- Executes dropped EXE
PID:580 -
\??\c:\jlplxn.exec:\jlplxn.exe22⤵
- Executes dropped EXE
PID:2536 -
\??\c:\hbfdnvp.exec:\hbfdnvp.exe23⤵
- Executes dropped EXE
PID:360 -
\??\c:\xlvljbn.exec:\xlvljbn.exe24⤵
- Executes dropped EXE
PID:2080 -
\??\c:\phvnflf.exec:\phvnflf.exe25⤵
- Executes dropped EXE
PID:1456 -
\??\c:\nhjpdr.exec:\nhjpdr.exe26⤵
- Executes dropped EXE
PID:2140 -
\??\c:\jphftrl.exec:\jphftrl.exe27⤵
- Executes dropped EXE
PID:1676 -
\??\c:\rtxpxb.exec:\rtxpxb.exe28⤵
- Executes dropped EXE
PID:924 -
\??\c:\vrjhrrl.exec:\vrjhrrl.exe29⤵
- Executes dropped EXE
PID:2068 -
\??\c:\plrpf.exec:\plrpf.exe30⤵
- Executes dropped EXE
PID:2980 -
\??\c:\xnhdtj.exec:\xnhdtj.exe31⤵
- Executes dropped EXE
PID:2460 -
\??\c:\nvvffj.exec:\nvvffj.exe32⤵
- Executes dropped EXE
PID:1244 -
\??\c:\tvjdr.exec:\tvjdr.exe33⤵
- Executes dropped EXE
PID:2728 -
\??\c:\nthjn.exec:\nthjn.exe34⤵
- Executes dropped EXE
PID:2848 -
\??\c:\fjbxvh.exec:\fjbxvh.exe35⤵
- Executes dropped EXE
PID:1584 -
\??\c:\jnbtlt.exec:\jnbtlt.exe36⤵
- Executes dropped EXE
PID:2784 -
\??\c:\fnfvbh.exec:\fnfvbh.exe37⤵
- Executes dropped EXE
PID:2912 -
\??\c:\nffbtvb.exec:\nffbtvb.exe38⤵
- Executes dropped EXE
PID:2920 -
\??\c:\pvdfbp.exec:\pvdfbp.exe39⤵
- Executes dropped EXE
PID:2820 -
\??\c:\vnnvd.exec:\vnnvd.exe40⤵
- Executes dropped EXE
PID:2812 -
\??\c:\rnjlx.exec:\rnjlx.exe41⤵
- Executes dropped EXE
PID:2660 -
\??\c:\dbrnn.exec:\dbrnn.exe42⤵
- Executes dropped EXE
PID:2828 -
\??\c:\ltxpplf.exec:\ltxpplf.exe43⤵
- Executes dropped EXE
PID:2708 -
\??\c:\ljjlr.exec:\ljjlr.exe44⤵
- Executes dropped EXE
PID:2532 -
\??\c:\xhrpv.exec:\xhrpv.exe45⤵
- Executes dropped EXE
PID:1608 -
\??\c:\fbvtn.exec:\fbvtn.exe46⤵
- Executes dropped EXE
PID:2468 -
\??\c:\lvlpxfb.exec:\lvlpxfb.exe47⤵
- Executes dropped EXE
PID:2064 -
\??\c:\dvrvn.exec:\dvrvn.exe48⤵
- Executes dropped EXE
PID:2004 -
\??\c:\btjtndn.exec:\btjtndn.exe49⤵
- Executes dropped EXE
PID:1696 -
\??\c:\ldxffpt.exec:\ldxffpt.exe50⤵
- Executes dropped EXE
PID:2952 -
\??\c:\bjhrn.exec:\bjhrn.exe51⤵
- Executes dropped EXE
PID:1604 -
\??\c:\hrhfvlv.exec:\hrhfvlv.exe52⤵
- Executes dropped EXE
PID:2988 -
\??\c:\rpdrrx.exec:\rpdrrx.exe53⤵
- Executes dropped EXE
PID:1636 -
\??\c:\hdpjj.exec:\hdpjj.exe54⤵
- Executes dropped EXE
PID:2260 -
\??\c:\jjjhh.exec:\jjjhh.exe55⤵
- Executes dropped EXE
PID:1752 -
\??\c:\hnhdf.exec:\hnhdf.exe56⤵
- Executes dropped EXE
PID:2200 -
\??\c:\rrntfpx.exec:\rrntfpx.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2428 -
\??\c:\dxdptt.exec:\dxdptt.exe58⤵
- Executes dropped EXE
PID:2244 -
\??\c:\hpxjn.exec:\hpxjn.exe59⤵
- Executes dropped EXE
PID:2228 -
\??\c:\dflxt.exec:\dflxt.exe60⤵
- Executes dropped EXE
PID:824 -
\??\c:\vtvnlft.exec:\vtvnlft.exe61⤵
- Executes dropped EXE
PID:524 -
\??\c:\pdvprh.exec:\pdvprh.exe62⤵
- Executes dropped EXE
PID:656 -
\??\c:\vrxvd.exec:\vrxvd.exe63⤵
- Executes dropped EXE
PID:2100 -
\??\c:\xtxbdt.exec:\xtxbdt.exe64⤵
- Executes dropped EXE
PID:1544 -
\??\c:\flxhbtn.exec:\flxhbtn.exe65⤵
- Executes dropped EXE
PID:600 -
\??\c:\rtjlj.exec:\rtjlj.exe66⤵PID:112
-
\??\c:\pvtnvxt.exec:\pvtnvxt.exe67⤵PID:1732
-
\??\c:\dxfhf.exec:\dxfhf.exe68⤵PID:956
-
\??\c:\jlvlhf.exec:\jlvlhf.exe69⤵PID:1624
-
\??\c:\hpjtljl.exec:\hpjtljl.exe70⤵PID:1516
-
\??\c:\dljxtbt.exec:\dljxtbt.exe71⤵PID:2980
-
\??\c:\hvpfrtf.exec:\hvpfrtf.exe72⤵PID:2460
-
\??\c:\lvvbv.exec:\lvvbv.exe73⤵PID:2416
-
\??\c:\vdjvdvp.exec:\vdjvdvp.exe74⤵PID:2860
-
\??\c:\pxdrlp.exec:\pxdrlp.exe75⤵PID:2744
-
\??\c:\tlvrt.exec:\tlvrt.exe76⤵
- System Location Discovery: System Language Discovery
PID:1592 -
\??\c:\rfhth.exec:\rfhth.exe77⤵PID:2884
-
\??\c:\vfvvjbv.exec:\vfvvjbv.exe78⤵PID:748
-
\??\c:\lbnxdf.exec:\lbnxdf.exe79⤵PID:2836
-
\??\c:\vnldjf.exec:\vnldjf.exe80⤵PID:2804
-
\??\c:\dltjlvp.exec:\dltjlvp.exe81⤵PID:2636
-
\??\c:\vtrjtn.exec:\vtrjtn.exe82⤵PID:2700
-
\??\c:\ndvbr.exec:\ndvbr.exe83⤵PID:2632
-
\??\c:\xfnldvv.exec:\xfnldvv.exe84⤵PID:3052
-
\??\c:\jrdlhff.exec:\jrdlhff.exe85⤵PID:3056
-
\??\c:\hlnpb.exec:\hlnpb.exe86⤵PID:1996
-
\??\c:\jvfptv.exec:\jvfptv.exe87⤵PID:388
-
\??\c:\dftjb.exec:\dftjb.exe88⤵PID:2156
-
\??\c:\tpffv.exec:\tpffv.exe89⤵PID:2120
-
\??\c:\bfljfhr.exec:\bfljfhr.exe90⤵PID:1944
-
\??\c:\btvtrv.exec:\btvtrv.exe91⤵PID:2336
-
\??\c:\nbbfl.exec:\nbbfl.exe92⤵
- System Location Discovery: System Language Discovery
PID:1084 -
\??\c:\dhlvrhl.exec:\dhlvrhl.exe93⤵PID:2008
-
\??\c:\rrpvrv.exec:\rrpvrv.exe94⤵PID:1200
-
\??\c:\btxlrnr.exec:\btxlrnr.exe95⤵PID:2816
-
\??\c:\fpbfpl.exec:\fpbfpl.exe96⤵PID:1708
-
\??\c:\ltphht.exec:\ltphht.exe97⤵PID:2992
-
\??\c:\tjfvnt.exec:\tjfvnt.exe98⤵PID:2224
-
\??\c:\tpbvlpd.exec:\tpbvlpd.exe99⤵PID:2232
-
\??\c:\xlvvxt.exec:\xlvvxt.exe100⤵PID:580
-
\??\c:\bvbnrd.exec:\bvbnrd.exe101⤵PID:796
-
\??\c:\lrtjjff.exec:\lrtjjff.exe102⤵PID:952
-
\??\c:\jnbvvrb.exec:\jnbvvrb.exe103⤵PID:2096
-
\??\c:\vjtpfj.exec:\vjtpfj.exe104⤵PID:2588
-
\??\c:\rjlbn.exec:\rjlbn.exe105⤵PID:1456
-
\??\c:\hjpxrhv.exec:\hjpxrhv.exe106⤵PID:1616
-
\??\c:\hlfplt.exec:\hlfplt.exe107⤵PID:1460
-
\??\c:\rvdlx.exec:\rvdlx.exe108⤵PID:828
-
\??\c:\fxfrdb.exec:\fxfrdb.exe109⤵PID:3064
-
\??\c:\lbthvl.exec:\lbthvl.exe110⤵PID:3036
-
\??\c:\xthxl.exec:\xthxl.exe111⤵PID:2180
-
\??\c:\fjjbtx.exec:\fjjbtx.exe112⤵PID:2568
-
\??\c:\fvnftdp.exec:\fvnftdp.exe113⤵PID:2716
-
\??\c:\jhhrv.exec:\jhhrv.exe114⤵PID:2196
-
\??\c:\dvlfh.exec:\dvlfh.exe115⤵PID:2956
-
\??\c:\rblptvt.exec:\rblptvt.exe116⤵PID:1716
-
\??\c:\vfdnn.exec:\vfdnn.exe117⤵PID:2760
-
\??\c:\dhxhbb.exec:\dhxhbb.exe118⤵PID:2852
-
\??\c:\bvdfp.exec:\bvdfp.exe119⤵PID:2672
-
\??\c:\fjxnfjv.exec:\fjxnfjv.exe120⤵PID:2808
-
\??\c:\ftptf.exec:\ftptf.exe121⤵PID:2800
-
\??\c:\tltxbj.exec:\tltxbj.exe122⤵PID:2668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-