Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 02:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
64fcbebb8d1a84215d651f610a4bccd0N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
64fcbebb8d1a84215d651f610a4bccd0N.exe
-
Size
58KB
-
MD5
64fcbebb8d1a84215d651f610a4bccd0
-
SHA1
e07a62258b0ba28b0faedf1887a46f477bb759ad
-
SHA256
31bed3e60ee4783cca526d5b5b4670eaf62d8b9eca904856e6952e68003dd1f7
-
SHA512
80523c973180751aff2602d69682276b19b9fa75e8296338fe017b7c51edb5b0e5f8045d7eaab3542167315d515835397ef9c70ca2381d136a23662dbc79c383
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgF0fN:ymb3NkkiQ3mdBjFIgF0fN
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2860-305-0x00000000775E0000-0x00000000776FF000-memory.dmp family_blackmoon behavioral1/memory/1236-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1656-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1876-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/980-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/536-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2260-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2180-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/952-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2796 ldpjp.exe 2832 frddlfh.exe 2612 hflpbbr.exe 2744 rdnrv.exe 2632 tbdrftt.exe 2496 vpfldt.exe 1736 bffnlr.exe 952 nhrhld.exe 2392 vxftp.exe 2936 dltnp.exe 1940 dpjnjh.exe 2912 rdvrf.exe 1324 fhnhtj.exe 1944 bptrlpd.exe 2180 ppjxvj.exe 2260 vbndptr.exe 2284 tnjdjdn.exe 1988 tbvfj.exe 536 jltnhd.exe 980 ldvtp.exe 1876 bbtrbtj.exe 1016 xnbrtjb.exe 1656 pvfvj.exe 1360 bndjt.exe 1236 dffdlnj.exe 2348 bbhnf.exe 2208 rdnddl.exe 2276 fbdlxrd.exe 1628 nnxxt.exe 1748 vrrxtp.exe 2860 njlnlxt.exe 2812 hhlftfr.exe 1568 ttvnn.exe 2736 ljntj.exe 2852 hnrdxf.exe 2624 btbnddl.exe 2572 xnntv.exe 3040 jbxtjh.exe 2632 bvpnv.exe 1720 jlvxbb.exe 1264 dprlvxv.exe 2868 nxbbxxv.exe 2352 xpxlhf.exe 952 ttdrbtt.exe 1884 rxvlb.exe 2628 rdxrrv.exe 1112 vltbb.exe 2672 vnbhb.exe 3032 bjxhblt.exe 1052 prtprf.exe 264 lrfjvl.exe 2992 jrvjhrn.exe 2220 vfrnfv.exe 1792 ndxprxd.exe 2472 vllnnj.exe 2468 hdtllpn.exe 848 nrjjdlt.exe 2160 hjdlfj.exe 1092 hpdpbr.exe 1876 xthvhtb.exe 972 bbbrvtb.exe 1496 ltjpbt.exe 1760 trfxj.exe 528 hdjdnph.exe -
resource yara_rule behavioral1/memory/1236-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1876-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/980-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/536-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2180-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/952-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/952-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/952-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-3-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvvtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtxbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhxdpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjfndp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrljjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhplbnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrpfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljvll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdvjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdvrrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnhlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljbvbdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdhnhbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbnvhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllnrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvnxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlptld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvrnxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lndjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvfhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbrrvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjrfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjbxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltnfpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndlvppn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhhdntr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltlbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpfxrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpblt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtfdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptvxlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2796 2716 64fcbebb8d1a84215d651f610a4bccd0N.exe 30 PID 2716 wrote to memory of 2796 2716 64fcbebb8d1a84215d651f610a4bccd0N.exe 30 PID 2716 wrote to memory of 2796 2716 64fcbebb8d1a84215d651f610a4bccd0N.exe 30 PID 2716 wrote to memory of 2796 2716 64fcbebb8d1a84215d651f610a4bccd0N.exe 30 PID 2796 wrote to memory of 2832 2796 ldpjp.exe 31 PID 2796 wrote to memory of 2832 2796 ldpjp.exe 31 PID 2796 wrote to memory of 2832 2796 ldpjp.exe 31 PID 2796 wrote to memory of 2832 2796 ldpjp.exe 31 PID 2832 wrote to memory of 2612 2832 frddlfh.exe 32 PID 2832 wrote to memory of 2612 2832 frddlfh.exe 32 PID 2832 wrote to memory of 2612 2832 frddlfh.exe 32 PID 2832 wrote to memory of 2612 2832 frddlfh.exe 32 PID 2612 wrote to memory of 2744 2612 hflpbbr.exe 33 PID 2612 wrote to memory of 2744 2612 hflpbbr.exe 33 PID 2612 wrote to memory of 2744 2612 hflpbbr.exe 33 PID 2612 wrote to memory of 2744 2612 hflpbbr.exe 33 PID 2744 wrote to memory of 2632 2744 rdnrv.exe 34 PID 2744 wrote to memory of 2632 2744 rdnrv.exe 34 PID 2744 wrote to memory of 2632 2744 rdnrv.exe 34 PID 2744 wrote to memory of 2632 2744 rdnrv.exe 34 PID 2632 wrote to memory of 2496 2632 tbdrftt.exe 35 PID 2632 wrote to memory of 2496 2632 tbdrftt.exe 35 PID 2632 wrote to memory of 2496 2632 tbdrftt.exe 35 PID 2632 wrote to memory of 2496 2632 tbdrftt.exe 35 PID 2496 wrote to memory of 1736 2496 vpfldt.exe 36 PID 2496 wrote to memory of 1736 2496 vpfldt.exe 36 PID 2496 wrote to memory of 1736 2496 vpfldt.exe 36 PID 2496 wrote to memory of 1736 2496 vpfldt.exe 36 PID 1736 wrote to memory of 952 1736 bffnlr.exe 37 PID 1736 wrote to memory of 952 1736 bffnlr.exe 37 PID 1736 wrote to memory of 952 1736 bffnlr.exe 37 PID 1736 wrote to memory of 952 1736 bffnlr.exe 37 PID 952 wrote to memory of 2392 952 nhrhld.exe 38 PID 952 wrote to memory of 2392 952 nhrhld.exe 38 PID 952 wrote to memory of 2392 952 nhrhld.exe 38 PID 952 wrote to memory of 2392 952 nhrhld.exe 38 PID 2392 wrote to memory of 2936 2392 vxftp.exe 39 PID 2392 wrote to memory of 2936 2392 vxftp.exe 39 PID 2392 wrote to memory of 2936 2392 vxftp.exe 39 PID 2392 wrote to memory of 2936 2392 vxftp.exe 39 PID 2936 wrote to memory of 1940 2936 dltnp.exe 40 PID 2936 wrote to memory of 1940 2936 dltnp.exe 40 PID 2936 wrote to memory of 1940 2936 dltnp.exe 40 PID 2936 wrote to memory of 1940 2936 dltnp.exe 40 PID 1940 wrote to memory of 2912 1940 dpjnjh.exe 41 PID 1940 wrote to memory of 2912 1940 dpjnjh.exe 41 PID 1940 wrote to memory of 2912 1940 dpjnjh.exe 41 PID 1940 wrote to memory of 2912 1940 dpjnjh.exe 41 PID 2912 wrote to memory of 1324 2912 rdvrf.exe 42 PID 2912 wrote to memory of 1324 2912 rdvrf.exe 42 PID 2912 wrote to memory of 1324 2912 rdvrf.exe 42 PID 2912 wrote to memory of 1324 2912 rdvrf.exe 42 PID 1324 wrote to memory of 1944 1324 fhnhtj.exe 43 PID 1324 wrote to memory of 1944 1324 fhnhtj.exe 43 PID 1324 wrote to memory of 1944 1324 fhnhtj.exe 43 PID 1324 wrote to memory of 1944 1324 fhnhtj.exe 43 PID 1944 wrote to memory of 2180 1944 bptrlpd.exe 44 PID 1944 wrote to memory of 2180 1944 bptrlpd.exe 44 PID 1944 wrote to memory of 2180 1944 bptrlpd.exe 44 PID 1944 wrote to memory of 2180 1944 bptrlpd.exe 44 PID 2180 wrote to memory of 2260 2180 ppjxvj.exe 45 PID 2180 wrote to memory of 2260 2180 ppjxvj.exe 45 PID 2180 wrote to memory of 2260 2180 ppjxvj.exe 45 PID 2180 wrote to memory of 2260 2180 ppjxvj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1614334282\zmstage.exeC:\Users\Admin\AppData\Local\Temp\1614334282\zmstage.exe1⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\64fcbebb8d1a84215d651f610a4bccd0N.exe"C:\Users\Admin\AppData\Local\Temp\64fcbebb8d1a84215d651f610a4bccd0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\ldpjp.exec:\ldpjp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\frddlfh.exec:\frddlfh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\hflpbbr.exec:\hflpbbr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\rdnrv.exec:\rdnrv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\tbdrftt.exec:\tbdrftt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\vpfldt.exec:\vpfldt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\bffnlr.exec:\bffnlr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\nhrhld.exec:\nhrhld.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\vxftp.exec:\vxftp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\dltnp.exec:\dltnp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\dpjnjh.exec:\dpjnjh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\rdvrf.exec:\rdvrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\fhnhtj.exec:\fhnhtj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\bptrlpd.exec:\bptrlpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\ppjxvj.exec:\ppjxvj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\vbndptr.exec:\vbndptr.exe17⤵
- Executes dropped EXE
PID:2260 -
\??\c:\tnjdjdn.exec:\tnjdjdn.exe18⤵
- Executes dropped EXE
PID:2284 -
\??\c:\tbvfj.exec:\tbvfj.exe19⤵
- Executes dropped EXE
PID:1988 -
\??\c:\jltnhd.exec:\jltnhd.exe20⤵
- Executes dropped EXE
PID:536 -
\??\c:\ldvtp.exec:\ldvtp.exe21⤵
- Executes dropped EXE
PID:980 -
\??\c:\bbtrbtj.exec:\bbtrbtj.exe22⤵
- Executes dropped EXE
PID:1876 -
\??\c:\xnbrtjb.exec:\xnbrtjb.exe23⤵
- Executes dropped EXE
PID:1016 -
\??\c:\pvfvj.exec:\pvfvj.exe24⤵
- Executes dropped EXE
PID:1656 -
\??\c:\bndjt.exec:\bndjt.exe25⤵
- Executes dropped EXE
PID:1360 -
\??\c:\dffdlnj.exec:\dffdlnj.exe26⤵
- Executes dropped EXE
PID:1236 -
\??\c:\bbhnf.exec:\bbhnf.exe27⤵
- Executes dropped EXE
PID:2348 -
\??\c:\rdnddl.exec:\rdnddl.exe28⤵
- Executes dropped EXE
PID:2208 -
\??\c:\fbdlxrd.exec:\fbdlxrd.exe29⤵
- Executes dropped EXE
PID:2276 -
\??\c:\nnxxt.exec:\nnxxt.exe30⤵
- Executes dropped EXE
PID:1628 -
\??\c:\vrrxtp.exec:\vrrxtp.exe31⤵
- Executes dropped EXE
PID:1748 -
\??\c:\njlnlxt.exec:\njlnlxt.exe32⤵
- Executes dropped EXE
PID:2860 -
\??\c:\dlljfbl.exec:\dlljfbl.exe33⤵PID:2780
-
\??\c:\hhlftfr.exec:\hhlftfr.exe34⤵
- Executes dropped EXE
PID:2812 -
\??\c:\ttvnn.exec:\ttvnn.exe35⤵
- Executes dropped EXE
PID:1568 -
\??\c:\ljntj.exec:\ljntj.exe36⤵
- Executes dropped EXE
PID:2736 -
\??\c:\hnrdxf.exec:\hnrdxf.exe37⤵
- Executes dropped EXE
PID:2852 -
\??\c:\btbnddl.exec:\btbnddl.exe38⤵
- Executes dropped EXE
PID:2624 -
\??\c:\xnntv.exec:\xnntv.exe39⤵
- Executes dropped EXE
PID:2572 -
\??\c:\jbxtjh.exec:\jbxtjh.exe40⤵
- Executes dropped EXE
PID:3040 -
\??\c:\bvpnv.exec:\bvpnv.exe41⤵
- Executes dropped EXE
PID:2632 -
\??\c:\jlvxbb.exec:\jlvxbb.exe42⤵
- Executes dropped EXE
PID:1720 -
\??\c:\dprlvxv.exec:\dprlvxv.exe43⤵
- Executes dropped EXE
PID:1264 -
\??\c:\nxbbxxv.exec:\nxbbxxv.exe44⤵
- Executes dropped EXE
PID:2868 -
\??\c:\xpxlhf.exec:\xpxlhf.exe45⤵
- Executes dropped EXE
PID:2352 -
\??\c:\ttdrbtt.exec:\ttdrbtt.exe46⤵
- Executes dropped EXE
PID:952 -
\??\c:\rxvlb.exec:\rxvlb.exe47⤵
- Executes dropped EXE
PID:1884 -
\??\c:\rdxrrv.exec:\rdxrrv.exe48⤵
- Executes dropped EXE
PID:2628 -
\??\c:\vltbb.exec:\vltbb.exe49⤵
- Executes dropped EXE
PID:1112 -
\??\c:\vnbhb.exec:\vnbhb.exe50⤵
- Executes dropped EXE
PID:2672 -
\??\c:\bjxhblt.exec:\bjxhblt.exe51⤵
- Executes dropped EXE
PID:3032 -
\??\c:\prtprf.exec:\prtprf.exe52⤵
- Executes dropped EXE
PID:1052 -
\??\c:\lrfjvl.exec:\lrfjvl.exe53⤵
- Executes dropped EXE
PID:264 -
\??\c:\jrvjhrn.exec:\jrvjhrn.exe54⤵
- Executes dropped EXE
PID:2992 -
\??\c:\vfrnfv.exec:\vfrnfv.exe55⤵
- Executes dropped EXE
PID:2220 -
\??\c:\ndxprxd.exec:\ndxprxd.exe56⤵
- Executes dropped EXE
PID:1792 -
\??\c:\vllnnj.exec:\vllnnj.exe57⤵
- Executes dropped EXE
PID:2472 -
\??\c:\hdtllpn.exec:\hdtllpn.exe58⤵
- Executes dropped EXE
PID:2468 -
\??\c:\nrjjdlt.exec:\nrjjdlt.exe59⤵
- Executes dropped EXE
PID:848 -
\??\c:\hjdlfj.exec:\hjdlfj.exe60⤵
- Executes dropped EXE
PID:2160 -
\??\c:\hpdpbr.exec:\hpdpbr.exe61⤵
- Executes dropped EXE
PID:1092 -
\??\c:\xthvhtb.exec:\xthvhtb.exe62⤵
- Executes dropped EXE
PID:1876 -
\??\c:\bbbrvtb.exec:\bbbrvtb.exe63⤵
- Executes dropped EXE
PID:972 -
\??\c:\ltjpbt.exec:\ltjpbt.exe64⤵
- Executes dropped EXE
PID:1496 -
\??\c:\trfxj.exec:\trfxj.exe65⤵
- Executes dropped EXE
PID:1760 -
\??\c:\hdjdnph.exec:\hdjdnph.exe66⤵
- Executes dropped EXE
PID:528 -
\??\c:\bhrdltf.exec:\bhrdltf.exe67⤵PID:1236
-
\??\c:\xpbthpn.exec:\xpbthpn.exe68⤵PID:2416
-
\??\c:\jtxltn.exec:\jtxltn.exe69⤵PID:1032
-
\??\c:\txbtld.exec:\txbtld.exe70⤵PID:1676
-
\??\c:\xjbxx.exec:\xjbxx.exe71⤵
- System Location Discovery: System Language Discovery
PID:1664 -
\??\c:\npffpxb.exec:\npffpxb.exe72⤵PID:2344
-
\??\c:\bxfjbf.exec:\bxfjbf.exe73⤵PID:1752
-
\??\c:\xdhfr.exec:\xdhfr.exe74⤵PID:2976
-
\??\c:\jdbrlb.exec:\jdbrlb.exe75⤵PID:2112
-
\??\c:\lfvtv.exec:\lfvtv.exe76⤵PID:2172
-
\??\c:\fjrpfhl.exec:\fjrpfhl.exe77⤵PID:1568
-
\??\c:\vphbrll.exec:\vphbrll.exe78⤵PID:2736
-
\??\c:\nxjpxx.exec:\nxjpxx.exe79⤵PID:2852
-
\??\c:\jxvdj.exec:\jxvdj.exe80⤵PID:2624
-
\??\c:\ltnjfjr.exec:\ltnjfjr.exe81⤵PID:2572
-
\??\c:\bfttxlj.exec:\bfttxlj.exe82⤵PID:3040
-
\??\c:\vpbth.exec:\vpbth.exe83⤵PID:2632
-
\??\c:\djftnjn.exec:\djftnjn.exe84⤵PID:1720
-
\??\c:\vdxrd.exec:\vdxrd.exe85⤵PID:1264
-
\??\c:\bxbrt.exec:\bxbrt.exe86⤵PID:2868
-
\??\c:\rvbdvv.exec:\rvbdvv.exe87⤵PID:2352
-
\??\c:\ldxnrfl.exec:\ldxnrfl.exe88⤵PID:952
-
\??\c:\lvxvr.exec:\lvxvr.exe89⤵PID:1884
-
\??\c:\vxtfnv.exec:\vxtfnv.exe90⤵PID:2484
-
\??\c:\bljbffx.exec:\bljbffx.exe91⤵PID:2428
-
\??\c:\djtdljd.exec:\djtdljd.exe92⤵PID:884
-
\??\c:\lnrlj.exec:\lnrlj.exe93⤵PID:584
-
\??\c:\fdxhxx.exec:\fdxhxx.exe94⤵PID:1944
-
\??\c:\hvjlt.exec:\hvjlt.exe95⤵PID:2436
-
\??\c:\jdnxh.exec:\jdnxh.exe96⤵PID:588
-
\??\c:\pxjtj.exec:\pxjtj.exe97⤵PID:1860
-
\??\c:\bhjvf.exec:\bhjvf.exe98⤵PID:1824
-
\??\c:\lxxrtjl.exec:\lxxrtjl.exe99⤵PID:1288
-
\??\c:\ttxfbb.exec:\ttxfbb.exe100⤵PID:1784
-
\??\c:\thvrdl.exec:\thvrdl.exe101⤵PID:2156
-
\??\c:\djhrtl.exec:\djhrtl.exe102⤵PID:2476
-
\??\c:\bldbpb.exec:\bldbpb.exe103⤵PID:1408
-
\??\c:\hrxphfx.exec:\hrxphfx.exe104⤵PID:1872
-
\??\c:\lfbvp.exec:\lfbvp.exe105⤵PID:1656
-
\??\c:\hhdprb.exec:\hhdprb.exe106⤵PID:1096
-
\??\c:\xlhbrdn.exec:\xlhbrdn.exe107⤵PID:776
-
\??\c:\pdbhhfn.exec:\pdbhhfn.exe108⤵PID:2296
-
\??\c:\bpvhj.exec:\bpvhj.exe109⤵PID:2996
-
\??\c:\jtjpd.exec:\jtjpd.exe110⤵PID:2416
-
\??\c:\nlrbv.exec:\nlrbv.exe111⤵PID:1032
-
\??\c:\xrrdntj.exec:\xrrdntj.exe112⤵PID:1676
-
\??\c:\ltlrttr.exec:\ltlrttr.exe113⤵PID:2540
-
\??\c:\rdxbbrn.exec:\rdxbbrn.exe114⤵PID:2848
-
\??\c:\bfxxdnr.exec:\bfxxdnr.exe115⤵PID:2780
-
\??\c:\nthdnf.exec:\nthdnf.exe116⤵PID:1680
-
\??\c:\tdvhthx.exec:\tdvhthx.exe117⤵PID:2964
-
\??\c:\rntrp.exec:\rntrp.exe118⤵PID:2928
-
\??\c:\lndjv.exec:\lndjv.exe119⤵
- System Location Discovery: System Language Discovery
PID:2604 -
\??\c:\brvvp.exec:\brvvp.exe120⤵PID:2712
-
\??\c:\bdftjd.exec:\bdftjd.exe121⤵PID:2596
-
\??\c:\dldln.exec:\dldln.exe122⤵PID:3056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-