Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 02:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe
-
Size
66KB
-
MD5
a9a296070c202d7b11972db746be6b70
-
SHA1
4eb07e5f467464b7b7b20279520556b61f1d351c
-
SHA256
846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0
-
SHA512
52d1433fe4aa712771831b27edc6e43e0a04c788e5a91a7539c00ff3cc615db38d477d83799ee0d6bc2db90f4a6ea453f8078bc0966761a1163928a54314d5de
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27Bqfo4l:ymb3NkkiQ3mdBjFI9cqfVl
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
resource yara_rule behavioral1/memory/3064-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1540-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1296-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1420-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1732-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2740 nnxppl.exe 2636 fxvlfpt.exe 2628 rlddnb.exe 2648 phpthhx.exe 2524 bfvrddx.exe 2568 httvnbx.exe 1540 jlhpphr.exe 1300 bnddrtl.exe 2848 ttxvttt.exe 2572 vltbr.exe 1624 pfvvhrp.exe 1296 rrhfh.exe 2332 lhxvjnp.exe 1420 htjjf.exe 2056 bbhxf.exe 2976 ljrpxh.exe 2200 vljnddv.exe 2860 rfpxdr.exe 1796 xttffx.exe 780 nhvnrv.exe 2484 lrrdxvr.exe 3020 rrbvdhd.exe 2956 vlvftx.exe 1416 bxndbxp.exe 1788 dhvjhfx.exe 2456 ljbfjp.exe 2436 tjdhrpr.exe 2596 hnxvrrv.exe 1732 vrbrp.exe 876 lhdll.exe 2892 txxpdbd.exe 2744 vxrdt.exe 1708 nnhvnr.exe 2824 jhpdbj.exe 2612 ppftdj.exe 2804 dtttjdd.exe 1412 thlnxrp.exe 2560 xrrvt.exe 2528 tplrl.exe 1728 tphrvl.exe 2400 nrxdbb.exe 1544 vphpxxr.exe 1744 plpvpn.exe 2996 blpppd.exe 2836 jdrbrb.exe 1400 xjldtj.exe 1512 rvrvfdb.exe 2240 vjtdvl.exe 1296 dpbdf.exe 1656 rlxjt.exe 592 llfttbn.exe 2144 rxhlbjf.exe 2196 hbblvpx.exe 2192 flvjnvh.exe 2984 jfxdlhn.exe 2952 bfdvbnp.exe 636 dxtppl.exe 2412 fjtdvt.exe 1828 brplfpx.exe 2608 bhpthf.exe 3020 ptxbjb.exe 1864 hrdnxd.exe 832 pbtfntj.exe 1816 tjxvtlr.exe -
resource yara_rule behavioral1/memory/3064-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1540-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1540-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1296-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1420-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1732-291-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrpfxbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhxdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvhthjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvbtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httvnbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvbfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvflffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hplxrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfndt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnxjthd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rplfltl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxtjxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvlnjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rljpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbdnprr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrddrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvnbdrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrdjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nddxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hldjhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvjnpjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfhphdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrpbnpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thxnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbfrvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlbjjrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndnprrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbdhrpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drppt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvjxvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bljljdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnfxbxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfdtfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltvrbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plrth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxrhjj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2740 3064 846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe 30 PID 3064 wrote to memory of 2740 3064 846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe 30 PID 3064 wrote to memory of 2740 3064 846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe 30 PID 3064 wrote to memory of 2740 3064 846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe 30 PID 2740 wrote to memory of 2636 2740 nnxppl.exe 31 PID 2740 wrote to memory of 2636 2740 nnxppl.exe 31 PID 2740 wrote to memory of 2636 2740 nnxppl.exe 31 PID 2740 wrote to memory of 2636 2740 nnxppl.exe 31 PID 2636 wrote to memory of 2628 2636 fxvlfpt.exe 32 PID 2636 wrote to memory of 2628 2636 fxvlfpt.exe 32 PID 2636 wrote to memory of 2628 2636 fxvlfpt.exe 32 PID 2636 wrote to memory of 2628 2636 fxvlfpt.exe 32 PID 2628 wrote to memory of 2648 2628 rlddnb.exe 33 PID 2628 wrote to memory of 2648 2628 rlddnb.exe 33 PID 2628 wrote to memory of 2648 2628 rlddnb.exe 33 PID 2628 wrote to memory of 2648 2628 rlddnb.exe 33 PID 2648 wrote to memory of 2524 2648 phpthhx.exe 34 PID 2648 wrote to memory of 2524 2648 phpthhx.exe 34 PID 2648 wrote to memory of 2524 2648 phpthhx.exe 34 PID 2648 wrote to memory of 2524 2648 phpthhx.exe 34 PID 2524 wrote to memory of 2568 2524 bfvrddx.exe 35 PID 2524 wrote to memory of 2568 2524 bfvrddx.exe 35 PID 2524 wrote to memory of 2568 2524 bfvrddx.exe 35 PID 2524 wrote to memory of 2568 2524 bfvrddx.exe 35 PID 2568 wrote to memory of 1540 2568 httvnbx.exe 36 PID 2568 wrote to memory of 1540 2568 httvnbx.exe 36 PID 2568 wrote to memory of 1540 2568 httvnbx.exe 36 PID 2568 wrote to memory of 1540 2568 httvnbx.exe 36 PID 1540 wrote to memory of 1300 1540 jlhpphr.exe 37 PID 1540 wrote to memory of 1300 1540 jlhpphr.exe 37 PID 1540 wrote to memory of 1300 1540 jlhpphr.exe 37 PID 1540 wrote to memory of 1300 1540 jlhpphr.exe 37 PID 1300 wrote to memory of 2848 1300 bnddrtl.exe 38 PID 1300 wrote to memory of 2848 1300 bnddrtl.exe 38 PID 1300 wrote to memory of 2848 1300 bnddrtl.exe 38 PID 1300 wrote to memory of 2848 1300 bnddrtl.exe 38 PID 2848 wrote to memory of 2572 2848 ttxvttt.exe 39 PID 2848 wrote to memory of 2572 2848 ttxvttt.exe 39 PID 2848 wrote to memory of 2572 2848 ttxvttt.exe 39 PID 2848 wrote to memory of 2572 2848 ttxvttt.exe 39 PID 2572 wrote to memory of 1624 2572 vltbr.exe 40 PID 2572 wrote to memory of 1624 2572 vltbr.exe 40 PID 2572 wrote to memory of 1624 2572 vltbr.exe 40 PID 2572 wrote to memory of 1624 2572 vltbr.exe 40 PID 1624 wrote to memory of 1296 1624 pfvvhrp.exe 41 PID 1624 wrote to memory of 1296 1624 pfvvhrp.exe 41 PID 1624 wrote to memory of 1296 1624 pfvvhrp.exe 41 PID 1624 wrote to memory of 1296 1624 pfvvhrp.exe 41 PID 1296 wrote to memory of 2332 1296 rrhfh.exe 42 PID 1296 wrote to memory of 2332 1296 rrhfh.exe 42 PID 1296 wrote to memory of 2332 1296 rrhfh.exe 42 PID 1296 wrote to memory of 2332 1296 rrhfh.exe 42 PID 2332 wrote to memory of 1420 2332 lhxvjnp.exe 43 PID 2332 wrote to memory of 1420 2332 lhxvjnp.exe 43 PID 2332 wrote to memory of 1420 2332 lhxvjnp.exe 43 PID 2332 wrote to memory of 1420 2332 lhxvjnp.exe 43 PID 1420 wrote to memory of 2056 1420 htjjf.exe 44 PID 1420 wrote to memory of 2056 1420 htjjf.exe 44 PID 1420 wrote to memory of 2056 1420 htjjf.exe 44 PID 1420 wrote to memory of 2056 1420 htjjf.exe 44 PID 2056 wrote to memory of 2976 2056 bbhxf.exe 45 PID 2056 wrote to memory of 2976 2056 bbhxf.exe 45 PID 2056 wrote to memory of 2976 2056 bbhxf.exe 45 PID 2056 wrote to memory of 2976 2056 bbhxf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe"C:\Users\Admin\AppData\Local\Temp\846b91540e8cc22610c6ddb4db1ad05c281fc0a25cf53ebde54232f021726fc0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\nnxppl.exec:\nnxppl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\fxvlfpt.exec:\fxvlfpt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\rlddnb.exec:\rlddnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\phpthhx.exec:\phpthhx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\bfvrddx.exec:\bfvrddx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\httvnbx.exec:\httvnbx.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\jlhpphr.exec:\jlhpphr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\bnddrtl.exec:\bnddrtl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\ttxvttt.exec:\ttxvttt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\vltbr.exec:\vltbr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\pfvvhrp.exec:\pfvvhrp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\rrhfh.exec:\rrhfh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\lhxvjnp.exec:\lhxvjnp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\htjjf.exec:\htjjf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\bbhxf.exec:\bbhxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\ljrpxh.exec:\ljrpxh.exe17⤵
- Executes dropped EXE
PID:2976 -
\??\c:\vljnddv.exec:\vljnddv.exe18⤵
- Executes dropped EXE
PID:2200 -
\??\c:\rfpxdr.exec:\rfpxdr.exe19⤵
- Executes dropped EXE
PID:2860 -
\??\c:\xttffx.exec:\xttffx.exe20⤵
- Executes dropped EXE
PID:1796 -
\??\c:\nhvnrv.exec:\nhvnrv.exe21⤵
- Executes dropped EXE
PID:780 -
\??\c:\lrrdxvr.exec:\lrrdxvr.exe22⤵
- Executes dropped EXE
PID:2484 -
\??\c:\rrbvdhd.exec:\rrbvdhd.exe23⤵
- Executes dropped EXE
PID:3020 -
\??\c:\vlvftx.exec:\vlvftx.exe24⤵
- Executes dropped EXE
PID:2956 -
\??\c:\bxndbxp.exec:\bxndbxp.exe25⤵
- Executes dropped EXE
PID:1416 -
\??\c:\dhvjhfx.exec:\dhvjhfx.exe26⤵
- Executes dropped EXE
PID:1788 -
\??\c:\ljbfjp.exec:\ljbfjp.exe27⤵
- Executes dropped EXE
PID:2456 -
\??\c:\tjdhrpr.exec:\tjdhrpr.exe28⤵
- Executes dropped EXE
PID:2436 -
\??\c:\hnxvrrv.exec:\hnxvrrv.exe29⤵
- Executes dropped EXE
PID:2596 -
\??\c:\vrbrp.exec:\vrbrp.exe30⤵
- Executes dropped EXE
PID:1732 -
\??\c:\lhdll.exec:\lhdll.exe31⤵
- Executes dropped EXE
PID:876 -
\??\c:\txxpdbd.exec:\txxpdbd.exe32⤵
- Executes dropped EXE
PID:2892 -
\??\c:\xvtlx.exec:\xvtlx.exe33⤵PID:2736
-
\??\c:\vxrdt.exec:\vxrdt.exe34⤵
- Executes dropped EXE
PID:2744 -
\??\c:\nnhvnr.exec:\nnhvnr.exe35⤵
- Executes dropped EXE
PID:1708 -
\??\c:\jhpdbj.exec:\jhpdbj.exe36⤵
- Executes dropped EXE
PID:2824 -
\??\c:\ppftdj.exec:\ppftdj.exe37⤵
- Executes dropped EXE
PID:2612 -
\??\c:\dtttjdd.exec:\dtttjdd.exe38⤵
- Executes dropped EXE
PID:2804 -
\??\c:\thlnxrp.exec:\thlnxrp.exe39⤵
- Executes dropped EXE
PID:1412 -
\??\c:\xrrvt.exec:\xrrvt.exe40⤵
- Executes dropped EXE
PID:2560 -
\??\c:\tplrl.exec:\tplrl.exe41⤵
- Executes dropped EXE
PID:2528 -
\??\c:\tphrvl.exec:\tphrvl.exe42⤵
- Executes dropped EXE
PID:1728 -
\??\c:\nrxdbb.exec:\nrxdbb.exe43⤵
- Executes dropped EXE
PID:2400 -
\??\c:\vphpxxr.exec:\vphpxxr.exe44⤵
- Executes dropped EXE
PID:1544 -
\??\c:\plpvpn.exec:\plpvpn.exe45⤵
- Executes dropped EXE
PID:1744 -
\??\c:\blpppd.exec:\blpppd.exe46⤵
- Executes dropped EXE
PID:2996 -
\??\c:\jdrbrb.exec:\jdrbrb.exe47⤵
- Executes dropped EXE
PID:2836 -
\??\c:\xjldtj.exec:\xjldtj.exe48⤵
- Executes dropped EXE
PID:1400 -
\??\c:\rvrvfdb.exec:\rvrvfdb.exe49⤵
- Executes dropped EXE
PID:1512 -
\??\c:\vjtdvl.exec:\vjtdvl.exe50⤵
- Executes dropped EXE
PID:2240 -
\??\c:\dpbdf.exec:\dpbdf.exe51⤵
- Executes dropped EXE
PID:1296 -
\??\c:\rlxjt.exec:\rlxjt.exe52⤵
- Executes dropped EXE
PID:1656 -
\??\c:\llfttbn.exec:\llfttbn.exe53⤵
- Executes dropped EXE
PID:592 -
\??\c:\rxhlbjf.exec:\rxhlbjf.exe54⤵
- Executes dropped EXE
PID:2144 -
\??\c:\hbblvpx.exec:\hbblvpx.exe55⤵
- Executes dropped EXE
PID:2196 -
\??\c:\flvjnvh.exec:\flvjnvh.exe56⤵
- Executes dropped EXE
PID:2192 -
\??\c:\jfxdlhn.exec:\jfxdlhn.exe57⤵
- Executes dropped EXE
PID:2984 -
\??\c:\bfdvbnp.exec:\bfdvbnp.exe58⤵
- Executes dropped EXE
PID:2952 -
\??\c:\dxtppl.exec:\dxtppl.exe59⤵
- Executes dropped EXE
PID:636 -
\??\c:\fjtdvt.exec:\fjtdvt.exe60⤵
- Executes dropped EXE
PID:2412 -
\??\c:\brplfpx.exec:\brplfpx.exe61⤵
- Executes dropped EXE
PID:1828 -
\??\c:\bhpthf.exec:\bhpthf.exe62⤵
- Executes dropped EXE
PID:2608 -
\??\c:\ptxbjb.exec:\ptxbjb.exe63⤵
- Executes dropped EXE
PID:3020 -
\??\c:\hrdnxd.exec:\hrdnxd.exe64⤵
- Executes dropped EXE
PID:1864 -
\??\c:\pbtfntj.exec:\pbtfntj.exe65⤵
- Executes dropped EXE
PID:832 -
\??\c:\tjxvtlr.exec:\tjxvtlr.exe66⤵
- Executes dropped EXE
PID:1816 -
\??\c:\fprjlh.exec:\fprjlh.exe67⤵PID:2444
-
\??\c:\pfdflhp.exec:\pfdflhp.exe68⤵PID:1936
-
\??\c:\bbnxf.exec:\bbnxf.exe69⤵PID:1740
-
\??\c:\prtxr.exec:\prtxr.exe70⤵PID:764
-
\??\c:\fhbnd.exec:\fhbnd.exe71⤵PID:1956
-
\??\c:\xjfvn.exec:\xjfvn.exe72⤵PID:2888
-
\??\c:\fhxdj.exec:\fhxdj.exe73⤵
- System Location Discovery: System Language Discovery
PID:2988 -
\??\c:\fdjvr.exec:\fdjvr.exe74⤵PID:2736
-
\??\c:\tnldnj.exec:\tnldnj.exe75⤵PID:1584
-
\??\c:\phpfv.exec:\phpfv.exe76⤵PID:2656
-
\??\c:\vnnfxnf.exec:\vnnfxnf.exe77⤵PID:2636
-
\??\c:\bjlpnv.exec:\bjlpnv.exe78⤵PID:1724
-
\??\c:\nblpjv.exec:\nblpjv.exe79⤵PID:2684
-
\??\c:\lhtlbnv.exec:\lhtlbnv.exe80⤵PID:2508
-
\??\c:\xntlvvv.exec:\xntlvvv.exe81⤵PID:2932
-
\??\c:\tddvxhj.exec:\tddvxhj.exe82⤵PID:2632
-
\??\c:\jdvnpb.exec:\jdvnpb.exe83⤵PID:424
-
\??\c:\fptbtn.exec:\fptbtn.exe84⤵PID:912
-
\??\c:\fptdhv.exec:\fptdhv.exe85⤵PID:2060
-
\??\c:\fppjb.exec:\fppjb.exe86⤵PID:2096
-
\??\c:\hnxxtrv.exec:\hnxxtrv.exe87⤵PID:1744
-
\??\c:\vnxjthd.exec:\vnxjthd.exe88⤵
- System Location Discovery: System Language Discovery
PID:596 -
\??\c:\vtfhj.exec:\vtfhj.exe89⤵PID:1032
-
\??\c:\nrxvr.exec:\nrxvr.exe90⤵PID:2340
-
\??\c:\jrtjtdd.exec:\jrtjtdd.exe91⤵PID:1044
-
\??\c:\rdxldrx.exec:\rdxldrx.exe92⤵PID:2332
-
\??\c:\dnnnvl.exec:\dnnnvl.exe93⤵PID:580
-
\??\c:\rxtjjl.exec:\rxtjjl.exe94⤵PID:1656
-
\??\c:\fxbhxv.exec:\fxbhxv.exe95⤵PID:932
-
\??\c:\hxlnbdd.exec:\hxlnbdd.exe96⤵PID:3032
-
\??\c:\txrvxfd.exec:\txrvxfd.exe97⤵PID:2448
-
\??\c:\jxxxllh.exec:\jxxxllh.exe98⤵PID:1696
-
\??\c:\npjhrpp.exec:\npjhrpp.exe99⤵PID:2140
-
\??\c:\jffvp.exec:\jffvp.exe100⤵PID:708
-
\??\c:\rxjhpdj.exec:\rxjhpdj.exe101⤵PID:780
-
\??\c:\tnrfldp.exec:\tnrfldp.exe102⤵PID:1520
-
\??\c:\brnfvll.exec:\brnfvll.exe103⤵PID:2368
-
\??\c:\lljvht.exec:\lljvht.exe104⤵PID:1768
-
\??\c:\llrvf.exec:\llrvf.exe105⤵PID:2284
-
\??\c:\dhnfth.exec:\dhnfth.exe106⤵PID:768
-
\??\c:\fhpnb.exec:\fhpnb.exe107⤵PID:1788
-
\??\c:\rxbjptf.exec:\rxbjptf.exe108⤵PID:1816
-
\??\c:\hjfhn.exec:\hjfhn.exe109⤵PID:2692
-
\??\c:\vfxlnp.exec:\vfxlnp.exe110⤵PID:1552
-
\??\c:\hrpbnpp.exec:\hrpbnpp.exe111⤵
- System Location Discovery: System Language Discovery
PID:1964 -
\??\c:\jrftnbr.exec:\jrftnbr.exe112⤵PID:1568
-
\??\c:\ftxlph.exec:\ftxlph.exe113⤵PID:2936
-
\??\c:\trlfv.exec:\trlfv.exe114⤵PID:2640
-
\??\c:\bpdjtxj.exec:\bpdjtxj.exe115⤵PID:1604
-
\??\c:\lfnpv.exec:\lfnpv.exe116⤵PID:1612
-
\??\c:\pxnvpb.exec:\pxnvpb.exe117⤵PID:2724
-
\??\c:\rvbbp.exec:\rvbbp.exe118⤵PID:2752
-
\??\c:\nrntf.exec:\nrntf.exe119⤵PID:2748
-
\??\c:\nrrpnb.exec:\nrrpnb.exe120⤵PID:2520
-
\??\c:\pxtjxv.exec:\pxtjxv.exe121⤵
- System Location Discovery: System Language Discovery
PID:2588 -
\??\c:\xflpr.exec:\xflpr.exe122⤵PID:2576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-