Analysis
-
max time kernel
118s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe
Resource
win7-20240903-en
General
-
Target
78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe
-
Size
74KB
-
MD5
a99ea0baaff098042eb0cf15c7f5e1e0
-
SHA1
38b575dce409c5fae6017c3f60910836c386ac51
-
SHA256
78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5
-
SHA512
0b1afa913d14e66aac7bd9c70fd3a543822d5efe207e04b8213d7e1c8524b660624986fe0ecfaec0739980bb3fc79285141085ee797fc8a5479ba3e0765e9691
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmPK:ymb3NkkiQ3mdBjFIvl358nLA89OMFVHX
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/1592-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2112-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2836-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2072-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3012-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1196-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1472-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1824-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1568-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1592-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2112 bpvnbp.exe 2836 nlftbh.exe 2956 xpdplrx.exe 2960 npxrj.exe 2996 lldvl.exe 2896 jjpdvbd.exe 2828 bnrpf.exe 2228 lxdtxx.exe 2476 hxlhdjr.exe 2072 hnfnjr.exe 2096 bldnl.exe 3012 vnthjl.exe 2312 xfnffl.exe 3060 phfnbnx.exe 632 nbjnh.exe 1196 dffbn.exe 1896 hvppxnb.exe 2788 jvdnbnr.exe 2520 txjrpp.exe 892 jrrdhl.exe 952 vjnpjhr.exe 1472 ftrjln.exe 692 tffnjhf.exe 1824 rhvfn.exe 772 nvxpv.exe 1980 nvppj.exe 1568 jbtdj.exe 1672 xvplx.exe 2636 lvljhp.exe 1468 frnlrb.exe 1592 pndhxbr.exe 2136 thfnrl.exe 2924 jthjh.exe 2860 pnxxbxd.exe 2428 vhrhrb.exe 2120 thnvj.exe 2964 vptrxpp.exe 1220 bhfnd.exe 2712 vlnhl.exe 2896 bfnxn.exe 2624 ntvntj.exe 2748 btdjvhb.exe 1712 ftrhxlj.exe 1912 lvjthpx.exe 2156 hnvdxpl.exe 2216 frfld.exe 2268 lrrbprd.exe 1432 rbdpdp.exe 2388 rbvxpx.exe 2280 vllhj.exe 576 tbtjblx.exe 972 frhdjbl.exe 2060 rphrvp.exe 1148 tdrdb.exe 264 rjtnr.exe 2804 rbxjbl.exe 588 brjlfbl.exe 1588 rrxdt.exe 2472 htfnd.exe 2596 lnlnpj.exe 1956 xlxvdxt.exe 1164 bxjfhvx.exe 2168 nrrnj.exe 1932 tpbjh.exe -
resource yara_rule behavioral1/memory/1592-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2072-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3012-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1196-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1472-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1824-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1568-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1592-304-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxvbxjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjhdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdtjptx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbxpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndfffvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrlpntl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpbnvxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdfdbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdptrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdlbnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnbpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjnpjhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlpjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnxhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbjxdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbpln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxhfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjrxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxnfnxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrdvhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlffprl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxllj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dffbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtvbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xthbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvbnjhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbvnxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjlhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbfhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frtvbbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2112 1592 78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe 30 PID 1592 wrote to memory of 2112 1592 78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe 30 PID 1592 wrote to memory of 2112 1592 78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe 30 PID 1592 wrote to memory of 2112 1592 78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe 30 PID 2112 wrote to memory of 2836 2112 bpvnbp.exe 31 PID 2112 wrote to memory of 2836 2112 bpvnbp.exe 31 PID 2112 wrote to memory of 2836 2112 bpvnbp.exe 31 PID 2112 wrote to memory of 2836 2112 bpvnbp.exe 31 PID 2836 wrote to memory of 2956 2836 nlftbh.exe 32 PID 2836 wrote to memory of 2956 2836 nlftbh.exe 32 PID 2836 wrote to memory of 2956 2836 nlftbh.exe 32 PID 2836 wrote to memory of 2956 2836 nlftbh.exe 32 PID 2956 wrote to memory of 2960 2956 xpdplrx.exe 33 PID 2956 wrote to memory of 2960 2956 xpdplrx.exe 33 PID 2956 wrote to memory of 2960 2956 xpdplrx.exe 33 PID 2956 wrote to memory of 2960 2956 xpdplrx.exe 33 PID 2960 wrote to memory of 2996 2960 npxrj.exe 34 PID 2960 wrote to memory of 2996 2960 npxrj.exe 34 PID 2960 wrote to memory of 2996 2960 npxrj.exe 34 PID 2960 wrote to memory of 2996 2960 npxrj.exe 34 PID 2996 wrote to memory of 2896 2996 lldvl.exe 35 PID 2996 wrote to memory of 2896 2996 lldvl.exe 35 PID 2996 wrote to memory of 2896 2996 lldvl.exe 35 PID 2996 wrote to memory of 2896 2996 lldvl.exe 35 PID 2896 wrote to memory of 2828 2896 jjpdvbd.exe 36 PID 2896 wrote to memory of 2828 2896 jjpdvbd.exe 36 PID 2896 wrote to memory of 2828 2896 jjpdvbd.exe 36 PID 2896 wrote to memory of 2828 2896 jjpdvbd.exe 36 PID 2828 wrote to memory of 2228 2828 bnrpf.exe 37 PID 2828 wrote to memory of 2228 2828 bnrpf.exe 37 PID 2828 wrote to memory of 2228 2828 bnrpf.exe 37 PID 2828 wrote to memory of 2228 2828 bnrpf.exe 37 PID 2228 wrote to memory of 2476 2228 lxdtxx.exe 38 PID 2228 wrote to memory of 2476 2228 lxdtxx.exe 38 PID 2228 wrote to memory of 2476 2228 lxdtxx.exe 38 PID 2228 wrote to memory of 2476 2228 lxdtxx.exe 38 PID 2476 wrote to memory of 2072 2476 hxlhdjr.exe 39 PID 2476 wrote to memory of 2072 2476 hxlhdjr.exe 39 PID 2476 wrote to memory of 2072 2476 hxlhdjr.exe 39 PID 2476 wrote to memory of 2072 2476 hxlhdjr.exe 39 PID 2072 wrote to memory of 2096 2072 hnfnjr.exe 40 PID 2072 wrote to memory of 2096 2072 hnfnjr.exe 40 PID 2072 wrote to memory of 2096 2072 hnfnjr.exe 40 PID 2072 wrote to memory of 2096 2072 hnfnjr.exe 40 PID 2096 wrote to memory of 3012 2096 bldnl.exe 41 PID 2096 wrote to memory of 3012 2096 bldnl.exe 41 PID 2096 wrote to memory of 3012 2096 bldnl.exe 41 PID 2096 wrote to memory of 3012 2096 bldnl.exe 41 PID 3012 wrote to memory of 2312 3012 vnthjl.exe 42 PID 3012 wrote to memory of 2312 3012 vnthjl.exe 42 PID 3012 wrote to memory of 2312 3012 vnthjl.exe 42 PID 3012 wrote to memory of 2312 3012 vnthjl.exe 42 PID 2312 wrote to memory of 3060 2312 xfnffl.exe 43 PID 2312 wrote to memory of 3060 2312 xfnffl.exe 43 PID 2312 wrote to memory of 3060 2312 xfnffl.exe 43 PID 2312 wrote to memory of 3060 2312 xfnffl.exe 43 PID 3060 wrote to memory of 632 3060 phfnbnx.exe 44 PID 3060 wrote to memory of 632 3060 phfnbnx.exe 44 PID 3060 wrote to memory of 632 3060 phfnbnx.exe 44 PID 3060 wrote to memory of 632 3060 phfnbnx.exe 44 PID 632 wrote to memory of 1196 632 nbjnh.exe 45 PID 632 wrote to memory of 1196 632 nbjnh.exe 45 PID 632 wrote to memory of 1196 632 nbjnh.exe 45 PID 632 wrote to memory of 1196 632 nbjnh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe"C:\Users\Admin\AppData\Local\Temp\78a35712bea1d4d5764b2961204229ffb58eb5164771e264310750a0be6be2b5N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\bpvnbp.exec:\bpvnbp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\nlftbh.exec:\nlftbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\xpdplrx.exec:\xpdplrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\npxrj.exec:\npxrj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\lldvl.exec:\lldvl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\jjpdvbd.exec:\jjpdvbd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\bnrpf.exec:\bnrpf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\lxdtxx.exec:\lxdtxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\hxlhdjr.exec:\hxlhdjr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\hnfnjr.exec:\hnfnjr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\bldnl.exec:\bldnl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\vnthjl.exec:\vnthjl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\xfnffl.exec:\xfnffl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\phfnbnx.exec:\phfnbnx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\nbjnh.exec:\nbjnh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\dffbn.exec:\dffbn.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1196 -
\??\c:\hvppxnb.exec:\hvppxnb.exe18⤵
- Executes dropped EXE
PID:1896 -
\??\c:\jvdnbnr.exec:\jvdnbnr.exe19⤵
- Executes dropped EXE
PID:2788 -
\??\c:\txjrpp.exec:\txjrpp.exe20⤵
- Executes dropped EXE
PID:2520 -
\??\c:\jrrdhl.exec:\jrrdhl.exe21⤵
- Executes dropped EXE
PID:892 -
\??\c:\vjnpjhr.exec:\vjnpjhr.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952 -
\??\c:\ftrjln.exec:\ftrjln.exe23⤵
- Executes dropped EXE
PID:1472 -
\??\c:\tffnjhf.exec:\tffnjhf.exe24⤵
- Executes dropped EXE
PID:692 -
\??\c:\rhvfn.exec:\rhvfn.exe25⤵
- Executes dropped EXE
PID:1824 -
\??\c:\nvxpv.exec:\nvxpv.exe26⤵
- Executes dropped EXE
PID:772 -
\??\c:\nvppj.exec:\nvppj.exe27⤵
- Executes dropped EXE
PID:1980 -
\??\c:\jbtdj.exec:\jbtdj.exe28⤵
- Executes dropped EXE
PID:1568 -
\??\c:\xvplx.exec:\xvplx.exe29⤵
- Executes dropped EXE
PID:1672 -
\??\c:\lvljhp.exec:\lvljhp.exe30⤵
- Executes dropped EXE
PID:2636 -
\??\c:\frnlrb.exec:\frnlrb.exe31⤵
- Executes dropped EXE
PID:1468 -
\??\c:\pndhxbr.exec:\pndhxbr.exe32⤵
- Executes dropped EXE
PID:1592 -
\??\c:\thfnrl.exec:\thfnrl.exe33⤵
- Executes dropped EXE
PID:2136 -
\??\c:\jthjh.exec:\jthjh.exe34⤵
- Executes dropped EXE
PID:2924 -
\??\c:\pnxxbxd.exec:\pnxxbxd.exe35⤵
- Executes dropped EXE
PID:2860 -
\??\c:\vhrhrb.exec:\vhrhrb.exe36⤵
- Executes dropped EXE
PID:2428 -
\??\c:\thnvj.exec:\thnvj.exe37⤵
- Executes dropped EXE
PID:2120 -
\??\c:\vptrxpp.exec:\vptrxpp.exe38⤵
- Executes dropped EXE
PID:2964 -
\??\c:\bhfnd.exec:\bhfnd.exe39⤵
- Executes dropped EXE
PID:1220 -
\??\c:\vlnhl.exec:\vlnhl.exe40⤵
- Executes dropped EXE
PID:2712 -
\??\c:\bfnxn.exec:\bfnxn.exe41⤵
- Executes dropped EXE
PID:2896 -
\??\c:\ntvntj.exec:\ntvntj.exe42⤵
- Executes dropped EXE
PID:2624 -
\??\c:\btdjvhb.exec:\btdjvhb.exe43⤵
- Executes dropped EXE
PID:2748 -
\??\c:\ftrhxlj.exec:\ftrhxlj.exe44⤵
- Executes dropped EXE
PID:1712 -
\??\c:\lvjthpx.exec:\lvjthpx.exe45⤵
- Executes dropped EXE
PID:1912 -
\??\c:\hnvdxpl.exec:\hnvdxpl.exe46⤵
- Executes dropped EXE
PID:2156 -
\??\c:\frfld.exec:\frfld.exe47⤵
- Executes dropped EXE
PID:2216 -
\??\c:\lrrbprd.exec:\lrrbprd.exe48⤵
- Executes dropped EXE
PID:2268 -
\??\c:\rbdpdp.exec:\rbdpdp.exe49⤵
- Executes dropped EXE
PID:1432 -
\??\c:\rbvxpx.exec:\rbvxpx.exe50⤵
- Executes dropped EXE
PID:2388 -
\??\c:\vllhj.exec:\vllhj.exe51⤵
- Executes dropped EXE
PID:2280 -
\??\c:\tbtjblx.exec:\tbtjblx.exe52⤵
- Executes dropped EXE
PID:576 -
\??\c:\frhdjbl.exec:\frhdjbl.exe53⤵
- Executes dropped EXE
PID:972 -
\??\c:\rphrvp.exec:\rphrvp.exe54⤵
- Executes dropped EXE
PID:2060 -
\??\c:\tdrdb.exec:\tdrdb.exe55⤵
- Executes dropped EXE
PID:1148 -
\??\c:\rjtnr.exec:\rjtnr.exe56⤵
- Executes dropped EXE
PID:264 -
\??\c:\rbxjbl.exec:\rbxjbl.exe57⤵
- Executes dropped EXE
PID:2804 -
\??\c:\brjlfbl.exec:\brjlfbl.exe58⤵
- Executes dropped EXE
PID:588 -
\??\c:\rrxdt.exec:\rrxdt.exe59⤵
- Executes dropped EXE
PID:1588 -
\??\c:\htfnd.exec:\htfnd.exe60⤵
- Executes dropped EXE
PID:2472 -
\??\c:\lnlnpj.exec:\lnlnpj.exe61⤵
- Executes dropped EXE
PID:2596 -
\??\c:\xlxvdxt.exec:\xlxvdxt.exe62⤵
- Executes dropped EXE
PID:1956 -
\??\c:\bxjfhvx.exec:\bxjfhvx.exe63⤵
- Executes dropped EXE
PID:1164 -
\??\c:\nrrnj.exec:\nrrnj.exe64⤵
- Executes dropped EXE
PID:2168 -
\??\c:\tpbjh.exec:\tpbjh.exe65⤵
- Executes dropped EXE
PID:1932 -
\??\c:\tnxvfjp.exec:\tnxvfjp.exe66⤵PID:772
-
\??\c:\jjjdxhl.exec:\jjjdxhl.exe67⤵PID:1980
-
\??\c:\vrndlf.exec:\vrndlf.exe68⤵PID:2564
-
\??\c:\bnvph.exec:\bnvph.exe69⤵PID:1456
-
\??\c:\pffblt.exec:\pffblt.exe70⤵PID:1104
-
\??\c:\bxhphh.exec:\bxhphh.exe71⤵PID:1488
-
\??\c:\njdtt.exec:\njdtt.exe72⤵PID:1116
-
\??\c:\pnpxflt.exec:\pnpxflt.exe73⤵PID:2064
-
\??\c:\phpfpnr.exec:\phpfpnr.exe74⤵PID:2912
-
\??\c:\xhvfjfj.exec:\xhvfjfj.exe75⤵PID:2936
-
\??\c:\nhnvjd.exec:\nhnvjd.exe76⤵PID:2560
-
\??\c:\dxjnnx.exec:\dxjnnx.exe77⤵PID:2832
-
\??\c:\nhhxl.exec:\nhhxl.exe78⤵PID:2968
-
\??\c:\rlfxj.exec:\rlfxj.exe79⤵PID:3056
-
\??\c:\dnbxhxr.exec:\dnbxhxr.exe80⤵PID:2652
-
\??\c:\bjbtxfl.exec:\bjbtxfl.exe81⤵PID:1716
-
\??\c:\brhnl.exec:\brhnl.exe82⤵PID:2080
-
\??\c:\ldphhlb.exec:\ldphhlb.exe83⤵PID:2000
-
\??\c:\tnhfnt.exec:\tnhfnt.exe84⤵PID:2764
-
\??\c:\vlbrftj.exec:\vlbrftj.exe85⤵PID:2272
-
\??\c:\xfnrlpt.exec:\xfnrlpt.exe86⤵PID:2068
-
\??\c:\ffdrht.exec:\ffdrht.exe87⤵PID:2680
-
\??\c:\vtfrp.exec:\vtfrp.exe88⤵PID:2796
-
\??\c:\pjvnntx.exec:\pjvnntx.exe89⤵PID:1656
-
\??\c:\fjjfpd.exec:\fjjfpd.exe90⤵PID:1968
-
\??\c:\ltptx.exec:\ltptx.exe91⤵PID:2312
-
\??\c:\phptnp.exec:\phptnp.exe92⤵PID:1080
-
\??\c:\bjnjv.exec:\bjnjv.exe93⤵PID:2900
-
\??\c:\xlpnxb.exec:\xlpnxb.exe94⤵PID:1188
-
\??\c:\drbddx.exec:\drbddx.exe95⤵PID:2356
-
\??\c:\njndh.exec:\njndh.exe96⤵PID:1144
-
\??\c:\bhlppdh.exec:\bhlppdh.exe97⤵PID:2304
-
\??\c:\bnfnnrb.exec:\bnfnnrb.exe98⤵PID:2004
-
\??\c:\jpxbpd.exec:\jpxbpd.exe99⤵PID:1008
-
\??\c:\htvxjr.exec:\htvxjr.exe100⤵PID:968
-
\??\c:\fbflh.exec:\fbflh.exe101⤵PID:480
-
\??\c:\frdttf.exec:\frdttf.exe102⤵PID:1544
-
\??\c:\fjnlj.exec:\fjnlj.exe103⤵PID:1820
-
\??\c:\dhnlptf.exec:\dhnlptf.exe104⤵PID:2552
-
\??\c:\rhrfd.exec:\rhrfd.exe105⤵PID:1984
-
\??\c:\lpdpt.exec:\lpdpt.exe106⤵PID:1492
-
\??\c:\tbfjl.exec:\tbfjl.exe107⤵PID:1484
-
\??\c:\xtdxfnr.exec:\xtdxfnr.exe108⤵PID:2580
-
\??\c:\vbrrh.exec:\vbrrh.exe109⤵PID:1668
-
\??\c:\jrtnvb.exec:\jrtnvb.exe110⤵PID:1660
-
\??\c:\xpxnbnr.exec:\xpxnbnr.exe111⤵PID:2636
-
\??\c:\hpphnx.exec:\hpphnx.exe112⤵PID:2324
-
\??\c:\dxdbh.exec:\dxdbh.exe113⤵PID:1688
-
\??\c:\bdpprl.exec:\bdpprl.exe114⤵PID:1136
-
\??\c:\vxvbvv.exec:\vxvbvv.exe115⤵PID:2136
-
\??\c:\thxtl.exec:\thxtl.exe116⤵PID:2920
-
\??\c:\bntdl.exec:\bntdl.exe117⤵PID:1704
-
\??\c:\dvxtjj.exec:\dvxtjj.exe118⤵PID:2944
-
\??\c:\fvnhptr.exec:\fvnhptr.exe119⤵PID:2832
-
\??\c:\nbprv.exec:\nbprv.exe120⤵PID:2656
-
\??\c:\hnnnrr.exec:\hnnnrr.exe121⤵PID:2880
-
\??\c:\vvvjfxl.exec:\vvvjfxl.exe122⤵PID:2124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-