Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 13:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe
-
Size
230KB
-
MD5
2dd1e3632c6935aebbf9567fdb7c97a0
-
SHA1
509cd9d604f2dc3b2f5ed27813e4a1c23f16f12f
-
SHA256
6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3
-
SHA512
6db7c7b36b2197a124c6c742d4f09633c71367def2e61c198dcf1561b8490904c137c3da193ef78077601f64f6b9dc709eac57faa9a09e969ddbe603970d3f9f
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLjBeG+F:n3C9BRo7MlrWKo+lxK6
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2272-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2016-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2736-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/524-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1904-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1040-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2104-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/676-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1232-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2132-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1908-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1992-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1528-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2016 bptvfh.exe 2532 hxthvv.exe 2384 nvfjnj.exe 2736 lbvlf.exe 2696 blxjrnl.exe 524 dlhnlt.exe 2972 tvffpd.exe 2588 flfvl.exe 2108 dbvjndr.exe 1680 llndp.exe 2684 tvxpnd.exe 360 hxjdp.exe 2880 nxblbxl.exe 2372 pfvfftx.exe 1904 fntjlbb.exe 1040 nvprl.exe 2884 jlblf.exe 2104 pptnv.exe 2040 jnbpb.exe 676 ndpvl.exe 1036 lntln.exe 2508 jjtpjf.exe 1812 jlpfd.exe 1232 bfnhpp.exe 2132 jfjbrp.exe 1908 dhltf.exe 284 xppplx.exe 1992 fblxfd.exe 3052 vbpdrh.exe 1528 dbfjrfd.exe 2524 rrptdf.exe 2292 dxbrrn.exe 2088 xxpdlb.exe 1628 nbxtdnf.exe 1716 bvxnx.exe 2140 hxdhx.exe 2384 xrfrv.exe 2728 vxbfpx.exe 2740 rvlntpl.exe 3012 bvtlj.exe 2764 bnpljp.exe 524 vlhrplf.exe 2752 bxfbl.exe 2640 ljjdtr.exe 2576 pdtrxd.exe 2248 lvfxnr.exe 1820 lfhfrt.exe 2096 brdbl.exe 1076 pftnptj.exe 1964 vjxdtjd.exe 1648 pfxvjtf.exe 1112 bnbvhjb.exe 2044 xjvhlh.exe 2768 hvbpn.exe 2944 thttjr.exe 2160 fhflt.exe 2128 hvdjpdj.exe 1980 hfxdp.exe 1128 hlbxr.exe 1152 vnffhlh.exe 1168 fvvrxj.exe 2924 xjvhbb.exe 1776 rtnfr.exe 2432 jflbjxv.exe -
resource yara_rule behavioral1/memory/2272-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2272-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2016-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/524-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/524-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/524-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/524-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1904-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1040-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2104-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/676-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1232-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2132-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1908-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1992-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1528-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbftx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jphdhpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtnxhxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjvhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjphd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frblr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnfxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpvvlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlvhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtpfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnxdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvxvbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttjlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlddhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvprll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nflbvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhlnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvprl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvbbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbbrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptjnnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbrnrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhrrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvdnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nldtdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntxlbhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbvpnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxnbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlfrlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnvffrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbntrjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbbdhll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfrrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpfnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbphr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2016 2272 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 30 PID 2272 wrote to memory of 2016 2272 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 30 PID 2272 wrote to memory of 2016 2272 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 30 PID 2272 wrote to memory of 2016 2272 6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe 30 PID 2016 wrote to memory of 2532 2016 bptvfh.exe 31 PID 2016 wrote to memory of 2532 2016 bptvfh.exe 31 PID 2016 wrote to memory of 2532 2016 bptvfh.exe 31 PID 2016 wrote to memory of 2532 2016 bptvfh.exe 31 PID 2532 wrote to memory of 2384 2532 hxthvv.exe 32 PID 2532 wrote to memory of 2384 2532 hxthvv.exe 32 PID 2532 wrote to memory of 2384 2532 hxthvv.exe 32 PID 2532 wrote to memory of 2384 2532 hxthvv.exe 32 PID 2384 wrote to memory of 2736 2384 nvfjnj.exe 33 PID 2384 wrote to memory of 2736 2384 nvfjnj.exe 33 PID 2384 wrote to memory of 2736 2384 nvfjnj.exe 33 PID 2384 wrote to memory of 2736 2384 nvfjnj.exe 33 PID 2736 wrote to memory of 2696 2736 lbvlf.exe 34 PID 2736 wrote to memory of 2696 2736 lbvlf.exe 34 PID 2736 wrote to memory of 2696 2736 lbvlf.exe 34 PID 2736 wrote to memory of 2696 2736 lbvlf.exe 34 PID 2696 wrote to memory of 524 2696 blxjrnl.exe 35 PID 2696 wrote to memory of 524 2696 blxjrnl.exe 35 PID 2696 wrote to memory of 524 2696 blxjrnl.exe 35 PID 2696 wrote to memory of 524 2696 blxjrnl.exe 35 PID 524 wrote to memory of 2972 524 dlhnlt.exe 36 PID 524 wrote to memory of 2972 524 dlhnlt.exe 36 PID 524 wrote to memory of 2972 524 dlhnlt.exe 36 PID 524 wrote to memory of 2972 524 dlhnlt.exe 36 PID 2972 wrote to memory of 2588 2972 tvffpd.exe 37 PID 2972 wrote to memory of 2588 2972 tvffpd.exe 37 PID 2972 wrote to memory of 2588 2972 tvffpd.exe 37 PID 2972 wrote to memory of 2588 2972 tvffpd.exe 37 PID 2588 wrote to memory of 2108 2588 flfvl.exe 38 PID 2588 wrote to memory of 2108 2588 flfvl.exe 38 PID 2588 wrote to memory of 2108 2588 flfvl.exe 38 PID 2588 wrote to memory of 2108 2588 flfvl.exe 38 PID 2108 wrote to memory of 1680 2108 dbvjndr.exe 39 PID 2108 wrote to memory of 1680 2108 dbvjndr.exe 39 PID 2108 wrote to memory of 1680 2108 dbvjndr.exe 39 PID 2108 wrote to memory of 1680 2108 dbvjndr.exe 39 PID 1680 wrote to memory of 2684 1680 llndp.exe 40 PID 1680 wrote to memory of 2684 1680 llndp.exe 40 PID 1680 wrote to memory of 2684 1680 llndp.exe 40 PID 1680 wrote to memory of 2684 1680 llndp.exe 40 PID 2684 wrote to memory of 360 2684 tvxpnd.exe 41 PID 2684 wrote to memory of 360 2684 tvxpnd.exe 41 PID 2684 wrote to memory of 360 2684 tvxpnd.exe 41 PID 2684 wrote to memory of 360 2684 tvxpnd.exe 41 PID 360 wrote to memory of 2880 360 hxjdp.exe 42 PID 360 wrote to memory of 2880 360 hxjdp.exe 42 PID 360 wrote to memory of 2880 360 hxjdp.exe 42 PID 360 wrote to memory of 2880 360 hxjdp.exe 42 PID 2880 wrote to memory of 2372 2880 nxblbxl.exe 43 PID 2880 wrote to memory of 2372 2880 nxblbxl.exe 43 PID 2880 wrote to memory of 2372 2880 nxblbxl.exe 43 PID 2880 wrote to memory of 2372 2880 nxblbxl.exe 43 PID 2372 wrote to memory of 1904 2372 pfvfftx.exe 44 PID 2372 wrote to memory of 1904 2372 pfvfftx.exe 44 PID 2372 wrote to memory of 1904 2372 pfvfftx.exe 44 PID 2372 wrote to memory of 1904 2372 pfvfftx.exe 44 PID 1904 wrote to memory of 1040 1904 fntjlbb.exe 45 PID 1904 wrote to memory of 1040 1904 fntjlbb.exe 45 PID 1904 wrote to memory of 1040 1904 fntjlbb.exe 45 PID 1904 wrote to memory of 1040 1904 fntjlbb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe"C:\Users\Admin\AppData\Local\Temp\6d1ae5d95a3c234f7954ce9fe10ad704842a863f8544d5156ecac8bcea68aed3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\bptvfh.exec:\bptvfh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\hxthvv.exec:\hxthvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\nvfjnj.exec:\nvfjnj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\lbvlf.exec:\lbvlf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\blxjrnl.exec:\blxjrnl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\dlhnlt.exec:\dlhnlt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\tvffpd.exec:\tvffpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\flfvl.exec:\flfvl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\dbvjndr.exec:\dbvjndr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\llndp.exec:\llndp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\tvxpnd.exec:\tvxpnd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\hxjdp.exec:\hxjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:360 -
\??\c:\nxblbxl.exec:\nxblbxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\pfvfftx.exec:\pfvfftx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\fntjlbb.exec:\fntjlbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\nvprl.exec:\nvprl.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040 -
\??\c:\jlblf.exec:\jlblf.exe18⤵
- Executes dropped EXE
PID:2884 -
\??\c:\pptnv.exec:\pptnv.exe19⤵
- Executes dropped EXE
PID:2104 -
\??\c:\jnbpb.exec:\jnbpb.exe20⤵
- Executes dropped EXE
PID:2040 -
\??\c:\ndpvl.exec:\ndpvl.exe21⤵
- Executes dropped EXE
PID:676 -
\??\c:\lntln.exec:\lntln.exe22⤵
- Executes dropped EXE
PID:1036 -
\??\c:\jjtpjf.exec:\jjtpjf.exe23⤵
- Executes dropped EXE
PID:2508 -
\??\c:\jlpfd.exec:\jlpfd.exe24⤵
- Executes dropped EXE
PID:1812 -
\??\c:\bfnhpp.exec:\bfnhpp.exe25⤵
- Executes dropped EXE
PID:1232 -
\??\c:\jfjbrp.exec:\jfjbrp.exe26⤵
- Executes dropped EXE
PID:2132 -
\??\c:\dhltf.exec:\dhltf.exe27⤵
- Executes dropped EXE
PID:1908 -
\??\c:\xppplx.exec:\xppplx.exe28⤵
- Executes dropped EXE
PID:284 -
\??\c:\fblxfd.exec:\fblxfd.exe29⤵
- Executes dropped EXE
PID:1992 -
\??\c:\vbpdrh.exec:\vbpdrh.exe30⤵
- Executes dropped EXE
PID:3052 -
\??\c:\dbfjrfd.exec:\dbfjrfd.exe31⤵
- Executes dropped EXE
PID:1528 -
\??\c:\rrptdf.exec:\rrptdf.exe32⤵
- Executes dropped EXE
PID:2524 -
\??\c:\dxbrrn.exec:\dxbrrn.exe33⤵
- Executes dropped EXE
PID:2292 -
\??\c:\xxpdlb.exec:\xxpdlb.exe34⤵
- Executes dropped EXE
PID:2088 -
\??\c:\nbxtdnf.exec:\nbxtdnf.exe35⤵
- Executes dropped EXE
PID:1628 -
\??\c:\bvxnx.exec:\bvxnx.exe36⤵
- Executes dropped EXE
PID:1716 -
\??\c:\hxdhx.exec:\hxdhx.exe37⤵
- Executes dropped EXE
PID:2140 -
\??\c:\xrfrv.exec:\xrfrv.exe38⤵
- Executes dropped EXE
PID:2384 -
\??\c:\vxbfpx.exec:\vxbfpx.exe39⤵
- Executes dropped EXE
PID:2728 -
\??\c:\rvlntpl.exec:\rvlntpl.exe40⤵
- Executes dropped EXE
PID:2740 -
\??\c:\bvtlj.exec:\bvtlj.exe41⤵
- Executes dropped EXE
PID:3012 -
\??\c:\bnpljp.exec:\bnpljp.exe42⤵
- Executes dropped EXE
PID:2764 -
\??\c:\vlhrplf.exec:\vlhrplf.exe43⤵
- Executes dropped EXE
PID:524 -
\??\c:\bxfbl.exec:\bxfbl.exe44⤵
- Executes dropped EXE
PID:2752 -
\??\c:\ljjdtr.exec:\ljjdtr.exe45⤵
- Executes dropped EXE
PID:2640 -
\??\c:\pdtrxd.exec:\pdtrxd.exe46⤵
- Executes dropped EXE
PID:2576 -
\??\c:\lvfxnr.exec:\lvfxnr.exe47⤵
- Executes dropped EXE
PID:2248 -
\??\c:\lfhfrt.exec:\lfhfrt.exe48⤵
- Executes dropped EXE
PID:1820 -
\??\c:\brdbl.exec:\brdbl.exe49⤵
- Executes dropped EXE
PID:2096 -
\??\c:\pftnptj.exec:\pftnptj.exe50⤵
- Executes dropped EXE
PID:1076 -
\??\c:\vjxdtjd.exec:\vjxdtjd.exe51⤵
- Executes dropped EXE
PID:1964 -
\??\c:\pfxvjtf.exec:\pfxvjtf.exe52⤵
- Executes dropped EXE
PID:1648 -
\??\c:\bnbvhjb.exec:\bnbvhjb.exe53⤵
- Executes dropped EXE
PID:1112 -
\??\c:\xjvhlh.exec:\xjvhlh.exe54⤵
- Executes dropped EXE
PID:2044 -
\??\c:\hvbpn.exec:\hvbpn.exe55⤵
- Executes dropped EXE
PID:2768 -
\??\c:\thttjr.exec:\thttjr.exe56⤵
- Executes dropped EXE
PID:2944 -
\??\c:\fhflt.exec:\fhflt.exe57⤵
- Executes dropped EXE
PID:2160 -
\??\c:\hvdjpdj.exec:\hvdjpdj.exe58⤵
- Executes dropped EXE
PID:2128 -
\??\c:\hfxdp.exec:\hfxdp.exe59⤵
- Executes dropped EXE
PID:1980 -
\??\c:\hlbxr.exec:\hlbxr.exe60⤵
- Executes dropped EXE
PID:1128 -
\??\c:\vnffhlh.exec:\vnffhlh.exe61⤵
- Executes dropped EXE
PID:1152 -
\??\c:\fvvrxj.exec:\fvvrxj.exe62⤵
- Executes dropped EXE
PID:1168 -
\??\c:\xjvhbb.exec:\xjvhbb.exe63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
\??\c:\rtnfr.exec:\rtnfr.exe64⤵
- Executes dropped EXE
PID:1776 -
\??\c:\jflbjxv.exec:\jflbjxv.exe65⤵
- Executes dropped EXE
PID:2432 -
\??\c:\fvppv.exec:\fvppv.exe66⤵PID:1752
-
\??\c:\pbdhnxv.exec:\pbdhnxv.exe67⤵PID:1568
-
\??\c:\tjtjdpj.exec:\tjtjdpj.exe68⤵PID:1908
-
\??\c:\llpvd.exec:\llpvd.exe69⤵PID:2120
-
\??\c:\bvtrlpl.exec:\bvtrlpl.exe70⤵PID:3048
-
\??\c:\llvlp.exec:\llvlp.exe71⤵PID:3052
-
\??\c:\pprfr.exec:\pprfr.exe72⤵PID:1932
-
\??\c:\bnhrhvd.exec:\bnhrhvd.exe73⤵PID:1552
-
\??\c:\dbnvn.exec:\dbnvn.exe74⤵PID:2548
-
\??\c:\vdlxn.exec:\vdlxn.exe75⤵PID:2292
-
\??\c:\hpfpjtx.exec:\hpfpjtx.exe76⤵PID:2064
-
\??\c:\hrvnpj.exec:\hrvnpj.exe77⤵PID:2664
-
\??\c:\thnlj.exec:\thnlj.exe78⤵PID:2080
-
\??\c:\htjhpfv.exec:\htjhpfv.exe79⤵PID:2716
-
\??\c:\rhnttnp.exec:\rhnttnp.exe80⤵PID:1400
-
\??\c:\jplvvh.exec:\jplvvh.exe81⤵PID:2712
-
\??\c:\hfptlj.exec:\hfptlj.exe82⤵PID:2732
-
\??\c:\xjlttbv.exec:\xjlttbv.exe83⤵PID:2960
-
\??\c:\bjhht.exec:\bjhht.exe84⤵PID:2620
-
\??\c:\pnttpfl.exec:\pnttpfl.exe85⤵PID:2124
-
\??\c:\dpxld.exec:\dpxld.exe86⤵PID:2024
-
\??\c:\hflhptj.exec:\hflhptj.exe87⤵PID:2144
-
\??\c:\htdlphf.exec:\htdlphf.exe88⤵PID:2480
-
\??\c:\ptfppp.exec:\ptfppp.exe89⤵PID:1224
-
\??\c:\ndflhxv.exec:\ndflhxv.exe90⤵PID:1820
-
\??\c:\xfvdn.exec:\xfvdn.exe91⤵PID:1456
-
\??\c:\flbrx.exec:\flbrx.exe92⤵PID:2320
-
\??\c:\ndrrddh.exec:\ndrrddh.exe93⤵PID:2880
-
\??\c:\ltjdff.exec:\ltjdff.exe94⤵PID:2020
-
\??\c:\dvhdnx.exec:\dvhdnx.exe95⤵PID:1112
-
\??\c:\jdrpfxj.exec:\jdrpfxj.exe96⤵PID:1904
-
\??\c:\rfdpdtr.exec:\rfdpdtr.exe97⤵PID:2892
-
\??\c:\xxltdb.exec:\xxltdb.exe98⤵PID:2944
-
\??\c:\ptvrxb.exec:\ptvrxb.exe99⤵PID:2160
-
\??\c:\hrfdhrd.exec:\hrfdhrd.exe100⤵PID:2104
-
\??\c:\pljfv.exec:\pljfv.exe101⤵PID:1980
-
\??\c:\dlxnd.exec:\dlxnd.exe102⤵PID:1512
-
\??\c:\xlxnt.exec:\xlxnt.exe103⤵PID:1516
-
\??\c:\xvjdbpb.exec:\xvjdbpb.exe104⤵PID:1168
-
\??\c:\ndxbdt.exec:\ndxbdt.exe105⤵PID:1540
-
\??\c:\jddtlr.exec:\jddtlr.exe106⤵PID:980
-
\??\c:\vlntl.exec:\vlntl.exe107⤵PID:1748
-
\??\c:\dhnjbrb.exec:\dhnjbrb.exe108⤵PID:1428
-
\??\c:\ttljp.exec:\ttljp.exe109⤵PID:1576
-
\??\c:\dnlpxtf.exec:\dnlpxtf.exe110⤵PID:1908
-
\??\c:\fpdjxvr.exec:\fpdjxvr.exe111⤵PID:1988
-
\??\c:\rphvf.exec:\rphvf.exe112⤵PID:3048
-
\??\c:\tplnp.exec:\tplnp.exe113⤵PID:2000
-
\??\c:\lhrrv.exec:\lhrrv.exe114⤵PID:2172
-
\??\c:\dbjljj.exec:\dbjljj.exe115⤵PID:632
-
\??\c:\bfbvhxr.exec:\bfbvhxr.exe116⤵PID:2500
-
\??\c:\bnfvrr.exec:\bnfvrr.exe117⤵PID:2324
-
\??\c:\bblth.exec:\bblth.exe118⤵PID:2532
-
\??\c:\xjfhjjx.exec:\xjfhjjx.exe119⤵PID:2140
-
\??\c:\nhrlnj.exec:\nhrlnj.exe120⤵PID:2808
-
\??\c:\rppxvvb.exec:\rppxvvb.exe121⤵PID:2384
-
\??\c:\vhvnf.exec:\vhvnf.exe122⤵PID:2856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-