Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe
Resource
win7-20241010-en
6 signatures
120 seconds
General
-
Target
2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe
-
Size
69KB
-
MD5
5a41971162bd74866ed0cdcea4acb2d0
-
SHA1
47edb1a711bed541854c1898d4544b6678eb6a28
-
SHA256
2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bc
-
SHA512
ac0a0371a325430f7fa02a35efaad70a1374077b86c28aabc9a95c38ac431620309867cb2096493d3e763d93e4034e32e77dc8fab1693778ac6153886341775f
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+Luvdp:ymb3NkkiQ3mdBjF0yMlip
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/1968-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1480-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1472-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2088-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2800-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1660-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2072-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/760-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1052-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2180-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2536-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1480 vhxtnhp.exe 1472 ljdjpb.exe 2552 jtrlhvb.exe 2852 rrphhd.exe 2088 ndjjf.exe 2760 djnvd.exe 2920 rnvhd.exe 2800 jlrtfh.exe 1632 pvxvtj.exe 2508 tphdr.exe 1660 ljvnnb.exe 2964 lvxtx.exe 2548 rbtpt.exe 2072 jdhpx.exe 1676 fffxj.exe 2256 bdprftl.exe 760 rlljt.exe 2276 nhlhx.exe 1052 xrvbh.exe 2180 ftrfp.exe 744 xpnjh.exe 1120 hnvvnjp.exe 2528 jfdnj.exe 2536 xbxvrr.exe 1704 xnxtf.exe 1004 prxlrpv.exe 940 rbjvt.exe 2224 lptvtd.exe 2608 jdtfjx.exe 2824 rxrpn.exe 1596 pxnltb.exe 1968 jlbjtr.exe 1476 thbjbl.exe 2104 lxxbn.exe 3008 bfdvrd.exe 1124 frtld.exe 2868 lhdvthh.exe 2940 jltljn.exe 2732 djrjd.exe 644 flltp.exe 2984 hplrlll.exe 2724 xbfxv.exe 2776 xvlvn.exe 2376 rptjb.exe 2704 nhlxfh.exe 2352 vrptpln.exe 2272 vfpfv.exe 1316 dxblt.exe 2812 lnvvbvt.exe 1876 tfxtrnr.exe 3016 hlddh.exe 2548 jhpft.exe 2072 nrttlrd.exe 432 fdvltf.exe 1748 flpbnn.exe 640 xdljrt.exe 836 ffnvxtt.exe 2496 xxnjn.exe 2316 rrdtbf.exe 2180 rbttxb.exe 1912 tfhdvfj.exe 1500 lnjjtrj.exe 1508 hdhdn.exe 272 tlpnd.exe -
resource yara_rule behavioral1/memory/1968-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1480-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1472-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1472-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1660-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2072-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1052-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2180-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2536-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-296-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxvxnnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtdxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrrrjfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxlbdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llbtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttlndp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dttbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpnrpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftxtf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txhjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xntjrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thdpjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjnrfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfthvff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbdhrxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txtxdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltjhrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfpfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbldnjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrthpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxtljn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpdrdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbtjtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxjtfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjxfdvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpjjtxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djbrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdnfdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhtrttd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfnfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvlln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxhdt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1480 1968 2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe 30 PID 1968 wrote to memory of 1480 1968 2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe 30 PID 1968 wrote to memory of 1480 1968 2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe 30 PID 1968 wrote to memory of 1480 1968 2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe 30 PID 1480 wrote to memory of 1472 1480 vhxtnhp.exe 31 PID 1480 wrote to memory of 1472 1480 vhxtnhp.exe 31 PID 1480 wrote to memory of 1472 1480 vhxtnhp.exe 31 PID 1480 wrote to memory of 1472 1480 vhxtnhp.exe 31 PID 1472 wrote to memory of 2552 1472 ljdjpb.exe 32 PID 1472 wrote to memory of 2552 1472 ljdjpb.exe 32 PID 1472 wrote to memory of 2552 1472 ljdjpb.exe 32 PID 1472 wrote to memory of 2552 1472 ljdjpb.exe 32 PID 2552 wrote to memory of 2852 2552 jtrlhvb.exe 33 PID 2552 wrote to memory of 2852 2552 jtrlhvb.exe 33 PID 2552 wrote to memory of 2852 2552 jtrlhvb.exe 33 PID 2552 wrote to memory of 2852 2552 jtrlhvb.exe 33 PID 2852 wrote to memory of 2088 2852 rrphhd.exe 34 PID 2852 wrote to memory of 2088 2852 rrphhd.exe 34 PID 2852 wrote to memory of 2088 2852 rrphhd.exe 34 PID 2852 wrote to memory of 2088 2852 rrphhd.exe 34 PID 2088 wrote to memory of 2760 2088 ndjjf.exe 35 PID 2088 wrote to memory of 2760 2088 ndjjf.exe 35 PID 2088 wrote to memory of 2760 2088 ndjjf.exe 35 PID 2088 wrote to memory of 2760 2088 ndjjf.exe 35 PID 2760 wrote to memory of 2920 2760 djnvd.exe 36 PID 2760 wrote to memory of 2920 2760 djnvd.exe 36 PID 2760 wrote to memory of 2920 2760 djnvd.exe 36 PID 2760 wrote to memory of 2920 2760 djnvd.exe 36 PID 2920 wrote to memory of 2800 2920 rnvhd.exe 37 PID 2920 wrote to memory of 2800 2920 rnvhd.exe 37 PID 2920 wrote to memory of 2800 2920 rnvhd.exe 37 PID 2920 wrote to memory of 2800 2920 rnvhd.exe 37 PID 2800 wrote to memory of 1632 2800 jlrtfh.exe 38 PID 2800 wrote to memory of 1632 2800 jlrtfh.exe 38 PID 2800 wrote to memory of 1632 2800 jlrtfh.exe 38 PID 2800 wrote to memory of 1632 2800 jlrtfh.exe 38 PID 1632 wrote to memory of 2508 1632 pvxvtj.exe 39 PID 1632 wrote to memory of 2508 1632 pvxvtj.exe 39 PID 1632 wrote to memory of 2508 1632 pvxvtj.exe 39 PID 1632 wrote to memory of 2508 1632 pvxvtj.exe 39 PID 2508 wrote to memory of 1660 2508 tphdr.exe 40 PID 2508 wrote to memory of 1660 2508 tphdr.exe 40 PID 2508 wrote to memory of 1660 2508 tphdr.exe 40 PID 2508 wrote to memory of 1660 2508 tphdr.exe 40 PID 1660 wrote to memory of 2964 1660 ljvnnb.exe 41 PID 1660 wrote to memory of 2964 1660 ljvnnb.exe 41 PID 1660 wrote to memory of 2964 1660 ljvnnb.exe 41 PID 1660 wrote to memory of 2964 1660 ljvnnb.exe 41 PID 2964 wrote to memory of 2548 2964 lvxtx.exe 42 PID 2964 wrote to memory of 2548 2964 lvxtx.exe 42 PID 2964 wrote to memory of 2548 2964 lvxtx.exe 42 PID 2964 wrote to memory of 2548 2964 lvxtx.exe 42 PID 2548 wrote to memory of 2072 2548 rbtpt.exe 43 PID 2548 wrote to memory of 2072 2548 rbtpt.exe 43 PID 2548 wrote to memory of 2072 2548 rbtpt.exe 43 PID 2548 wrote to memory of 2072 2548 rbtpt.exe 43 PID 2072 wrote to memory of 1676 2072 jdhpx.exe 44 PID 2072 wrote to memory of 1676 2072 jdhpx.exe 44 PID 2072 wrote to memory of 1676 2072 jdhpx.exe 44 PID 2072 wrote to memory of 1676 2072 jdhpx.exe 44 PID 1676 wrote to memory of 2256 1676 fffxj.exe 45 PID 1676 wrote to memory of 2256 1676 fffxj.exe 45 PID 1676 wrote to memory of 2256 1676 fffxj.exe 45 PID 1676 wrote to memory of 2256 1676 fffxj.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe"C:\Users\Admin\AppData\Local\Temp\2b6e3c1c4bde62efa441de16fedc9988811e3ca0f3fc24728b336ba5986661bcN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\vhxtnhp.exec:\vhxtnhp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
\??\c:\ljdjpb.exec:\ljdjpb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\jtrlhvb.exec:\jtrlhvb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\rrphhd.exec:\rrphhd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\ndjjf.exec:\ndjjf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\djnvd.exec:\djnvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\rnvhd.exec:\rnvhd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\jlrtfh.exec:\jlrtfh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\pvxvtj.exec:\pvxvtj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\tphdr.exec:\tphdr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\ljvnnb.exec:\ljvnnb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\lvxtx.exec:\lvxtx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\rbtpt.exec:\rbtpt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\jdhpx.exec:\jdhpx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\fffxj.exec:\fffxj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\bdprftl.exec:\bdprftl.exe17⤵
- Executes dropped EXE
PID:2256 -
\??\c:\rlljt.exec:\rlljt.exe18⤵
- Executes dropped EXE
PID:760 -
\??\c:\nhlhx.exec:\nhlhx.exe19⤵
- Executes dropped EXE
PID:2276 -
\??\c:\xrvbh.exec:\xrvbh.exe20⤵
- Executes dropped EXE
PID:1052 -
\??\c:\ftrfp.exec:\ftrfp.exe21⤵
- Executes dropped EXE
PID:2180 -
\??\c:\xpnjh.exec:\xpnjh.exe22⤵
- Executes dropped EXE
PID:744 -
\??\c:\hnvvnjp.exec:\hnvvnjp.exe23⤵
- Executes dropped EXE
PID:1120 -
\??\c:\jfdnj.exec:\jfdnj.exe24⤵
- Executes dropped EXE
PID:2528 -
\??\c:\xbxvrr.exec:\xbxvrr.exe25⤵
- Executes dropped EXE
PID:2536 -
\??\c:\xnxtf.exec:\xnxtf.exe26⤵
- Executes dropped EXE
PID:1704 -
\??\c:\prxlrpv.exec:\prxlrpv.exe27⤵
- Executes dropped EXE
PID:1004 -
\??\c:\rbjvt.exec:\rbjvt.exe28⤵
- Executes dropped EXE
PID:940 -
\??\c:\lptvtd.exec:\lptvtd.exe29⤵
- Executes dropped EXE
PID:2224 -
\??\c:\jdtfjx.exec:\jdtfjx.exe30⤵
- Executes dropped EXE
PID:2608 -
\??\c:\rxrpn.exec:\rxrpn.exe31⤵
- Executes dropped EXE
PID:2824 -
\??\c:\pxnltb.exec:\pxnltb.exe32⤵
- Executes dropped EXE
PID:1596 -
\??\c:\jlbjtr.exec:\jlbjtr.exe33⤵
- Executes dropped EXE
PID:1968 -
\??\c:\thbjbl.exec:\thbjbl.exe34⤵
- Executes dropped EXE
PID:1476 -
\??\c:\lxxbn.exec:\lxxbn.exe35⤵
- Executes dropped EXE
PID:2104 -
\??\c:\bfdvrd.exec:\bfdvrd.exe36⤵
- Executes dropped EXE
PID:3008 -
\??\c:\frtld.exec:\frtld.exe37⤵
- Executes dropped EXE
PID:1124 -
\??\c:\lhdvthh.exec:\lhdvthh.exe38⤵
- Executes dropped EXE
PID:2868 -
\??\c:\jltljn.exec:\jltljn.exe39⤵
- Executes dropped EXE
PID:2940 -
\??\c:\djrjd.exec:\djrjd.exe40⤵
- Executes dropped EXE
PID:2732 -
\??\c:\flltp.exec:\flltp.exe41⤵
- Executes dropped EXE
PID:644 -
\??\c:\hplrlll.exec:\hplrlll.exe42⤵
- Executes dropped EXE
PID:2984 -
\??\c:\xbfxv.exec:\xbfxv.exe43⤵
- Executes dropped EXE
PID:2724 -
\??\c:\xvlvn.exec:\xvlvn.exe44⤵
- Executes dropped EXE
PID:2776 -
\??\c:\rptjb.exec:\rptjb.exe45⤵
- Executes dropped EXE
PID:2376 -
\??\c:\nhlxfh.exec:\nhlxfh.exe46⤵
- Executes dropped EXE
PID:2704 -
\??\c:\vrptpln.exec:\vrptpln.exe47⤵
- Executes dropped EXE
PID:2352 -
\??\c:\vfpfv.exec:\vfpfv.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
\??\c:\dxblt.exec:\dxblt.exe49⤵
- Executes dropped EXE
PID:1316 -
\??\c:\lnvvbvt.exec:\lnvvbvt.exe50⤵
- Executes dropped EXE
PID:2812 -
\??\c:\tfxtrnr.exec:\tfxtrnr.exe51⤵
- Executes dropped EXE
PID:1876 -
\??\c:\hlddh.exec:\hlddh.exe52⤵
- Executes dropped EXE
PID:3016 -
\??\c:\jhpft.exec:\jhpft.exe53⤵
- Executes dropped EXE
PID:2548 -
\??\c:\nrttlrd.exec:\nrttlrd.exe54⤵
- Executes dropped EXE
PID:2072 -
\??\c:\fdvltf.exec:\fdvltf.exe55⤵
- Executes dropped EXE
PID:432 -
\??\c:\flpbnn.exec:\flpbnn.exe56⤵
- Executes dropped EXE
PID:1748 -
\??\c:\xdljrt.exec:\xdljrt.exe57⤵
- Executes dropped EXE
PID:640 -
\??\c:\ffnvxtt.exec:\ffnvxtt.exe58⤵
- Executes dropped EXE
PID:836 -
\??\c:\xxnjn.exec:\xxnjn.exe59⤵
- Executes dropped EXE
PID:2496 -
\??\c:\rrdtbf.exec:\rrdtbf.exe60⤵
- Executes dropped EXE
PID:2316 -
\??\c:\rbttxb.exec:\rbttxb.exe61⤵
- Executes dropped EXE
PID:2180 -
\??\c:\tfhdvfj.exec:\tfhdvfj.exe62⤵
- Executes dropped EXE
PID:1912 -
\??\c:\lnjjtrj.exec:\lnjjtrj.exe63⤵
- Executes dropped EXE
PID:1500 -
\??\c:\hdhdn.exec:\hdhdn.exe64⤵
- Executes dropped EXE
PID:1508 -
\??\c:\tlpnd.exec:\tlpnd.exe65⤵
- Executes dropped EXE
PID:272 -
\??\c:\bhfjjjh.exec:\bhfjjjh.exe66⤵PID:1788
-
\??\c:\pbtdlx.exec:\pbtdlx.exe67⤵PID:1372
-
\??\c:\lxfbx.exec:\lxfbx.exe68⤵PID:2700
-
\??\c:\rbtvtpt.exec:\rbtvtpt.exe69⤵PID:1664
-
\??\c:\pbhblxt.exec:\pbhblxt.exe70⤵PID:2252
-
\??\c:\rtjdjh.exec:\rtjdjh.exe71⤵PID:2224
-
\??\c:\lntbdv.exec:\lntbdv.exe72⤵PID:1032
-
\??\c:\bdbfphd.exec:\bdbfphd.exe73⤵PID:2300
-
\??\c:\jdtrl.exec:\jdtrl.exe74⤵PID:1036
-
\??\c:\pxfhbx.exec:\pxfhbx.exe75⤵PID:2308
-
\??\c:\fddhltp.exec:\fddhltp.exe76⤵PID:2200
-
\??\c:\xvplhxl.exec:\xvplhxl.exe77⤵PID:2396
-
\??\c:\nxlpvdl.exec:\nxlpvdl.exe78⤵PID:2104
-
\??\c:\xddbh.exec:\xddbh.exe79⤵PID:2912
-
\??\c:\bvjddrx.exec:\bvjddrx.exe80⤵PID:2616
-
\??\c:\hxfxn.exec:\hxfxn.exe81⤵PID:2868
-
\??\c:\pbpnd.exec:\pbpnd.exe82⤵PID:2928
-
\??\c:\vrtnvt.exec:\vrtnvt.exe83⤵PID:2680
-
\??\c:\fjbdf.exec:\fjbdf.exe84⤵PID:3068
-
\??\c:\pldxd.exec:\pldxd.exe85⤵PID:2736
-
\??\c:\ddtdnv.exec:\ddtdnv.exe86⤵PID:2788
-
\??\c:\vrbrldj.exec:\vrbrldj.exe87⤵PID:1956
-
\??\c:\tjjnvfl.exec:\tjjnvfl.exe88⤵PID:1796
-
\??\c:\jtxjtbr.exec:\jtxjtbr.exe89⤵PID:1740
-
\??\c:\fnjfrld.exec:\fnjfrld.exe90⤵PID:1884
-
\??\c:\jtnpbvd.exec:\jtnpbvd.exe91⤵PID:1660
-
\??\c:\dndld.exec:\dndld.exe92⤵PID:3060
-
\??\c:\dptnptr.exec:\dptnptr.exe93⤵PID:3064
-
\??\c:\vjfjrv.exec:\vjfjrv.exe94⤵PID:2820
-
\??\c:\fddpf.exec:\fddpf.exe95⤵PID:2112
-
\??\c:\xjrnn.exec:\xjrnn.exe96⤵PID:320
-
\??\c:\pfjltdd.exec:\pfjltdd.exe97⤵PID:2072
-
\??\c:\nlprxnj.exec:\nlprxnj.exe98⤵PID:2424
-
\??\c:\tvhvtbt.exec:\tvhvtbt.exe99⤵PID:1612
-
\??\c:\trlbbl.exec:\trlbbl.exe100⤵PID:2172
-
\??\c:\fxbrtxn.exec:\fxbrtxn.exe101⤵PID:2488
-
\??\c:\rfjft.exec:\rfjft.exe102⤵PID:1336
-
\??\c:\xdftdv.exec:\xdftdv.exe103⤵PID:960
-
\??\c:\nfvjb.exec:\nfvjb.exe104⤵PID:2128
-
\??\c:\rdrpl.exec:\rdrpl.exe105⤵PID:1776
-
\??\c:\xpvpvh.exec:\xpvpvh.exe106⤵PID:788
-
\??\c:\jfxfbh.exec:\jfxfbh.exe107⤵PID:2592
-
\??\c:\xhrvtff.exec:\xhrvtff.exe108⤵PID:2484
-
\??\c:\vxhttt.exec:\vxhttt.exe109⤵PID:1704
-
\??\c:\pvprbtd.exec:\pvprbtd.exe110⤵PID:1724
-
\??\c:\jvtltlp.exec:\jvtltlp.exe111⤵PID:1800
-
\??\c:\tljrjx.exec:\tljrjx.exe112⤵PID:2564
-
\??\c:\htdllj.exec:\htdllj.exe113⤵PID:1928
-
\??\c:\pvhbtvn.exec:\pvhbtvn.exe114⤵PID:896
-
\??\c:\dfdln.exec:\dfdln.exe115⤵PID:2824
-
\??\c:\flvjjjh.exec:\flvjjjh.exe116⤵PID:2284
-
\??\c:\plxpl.exec:\plxpl.exe117⤵PID:2560
-
\??\c:\rfhjj.exec:\rfhjj.exe118⤵PID:756
-
\??\c:\txtxdr.exec:\txtxdr.exe119⤵
- System Location Discovery: System Language Discovery
PID:1640 -
\??\c:\nlvbrvv.exec:\nlvbrvv.exe120⤵PID:1212
-
\??\c:\rxpph.exec:\rxpph.exe121⤵PID:2196
-
\??\c:\xphjl.exec:\xphjl.exe122⤵PID:668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-