Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 14:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe
-
Size
69KB
-
MD5
4a8039cf581bbec82ee1fd8d9743cc77
-
SHA1
1cb69dd2513e70ae1f0644007ac9343e350df2da
-
SHA256
b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a
-
SHA512
23b61816860e13ba4b573bce98cdfa21437d5b051547d43215ac154b32a37094c64aacbdde9881eefb6142da861c2f1b061c69143561ec68956d05beaba561f7
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIoAch:ymb3NkkiQ3mdBjFIsIVch
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2808-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1036-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1460-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2504-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2324-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2876 lpxvpjr.exe 2676 thvlf.exe 2904 dtnxbx.exe 2896 xjxbp.exe 2688 nhjbnt.exe 2720 lpjjfhp.exe 2972 tltlxhl.exe 1036 ldrldf.exe 1872 pxhbpb.exe 2524 jxbvn.exe 2928 lddrdff.exe 2728 pddvf.exe 1460 bldphh.exe 2024 hpljvh.exe 2220 rhttpd.exe 2008 lrlbdvt.exe 2232 hfhntjf.exe 2504 vdxfbr.exe 1292 rffxpx.exe 1552 pxlxp.exe 2088 rlrltf.exe 2560 pdbjddv.exe 1512 rtnrnxx.exe 2536 nrnbjpd.exe 1736 lrtld.exe 2432 tfbjpjl.exe 2324 lltptrf.exe 2664 lnrjf.exe 1768 brvxldb.exe 1708 jlhfrd.exe 2808 lftblbb.exe 2872 rpdft.exe 2828 hplxh.exe 2848 vlrbf.exe 2948 trftn.exe 2904 jddlnl.exe 2884 hjlvdb.exe 2680 ftdxb.exe 2700 bfdnxt.exe 316 bfrjx.exe 2720 fvvtrhh.exe 2004 rfrfdnd.exe 1184 fxxpttt.exe 1880 ntnplfp.exe 1872 dtvbf.exe 1644 thbdl.exe 2512 xjldtn.exe 2960 fxpblhj.exe 2420 hrrdd.exe 760 xfljljn.exe 524 ptnfdj.exe 2392 rtjlvx.exe 2384 rxnpxx.exe 2008 nxhfpr.exe 2608 xhhdbd.exe 1280 flhtpj.exe 2320 jjtxj.exe 2400 jxfxtxx.exe 1960 dtbxh.exe 2272 vvhbf.exe 2040 bttlh.exe 740 ftjrf.exe 324 xptnnvn.exe 2120 xndnbdb.exe -
resource yara_rule behavioral1/memory/2808-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1036-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1036-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1460-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2504-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2324-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-280-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxbjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjfvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxppxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhnfxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njtdrdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnfpdnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blhxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnblrfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxjrdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfdhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfblh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djhlfpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdxfbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvlbpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvfhnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbllj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvrlvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjtrpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xprfhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvfntpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvhbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxlhdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfndbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbjhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjbpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fblbfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjffpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfhbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbnhjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npprh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drllvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdlbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtljx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blbvbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfdtvvd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2876 2808 b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe 30 PID 2808 wrote to memory of 2876 2808 b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe 30 PID 2808 wrote to memory of 2876 2808 b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe 30 PID 2808 wrote to memory of 2876 2808 b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe 30 PID 2876 wrote to memory of 2676 2876 lpxvpjr.exe 31 PID 2876 wrote to memory of 2676 2876 lpxvpjr.exe 31 PID 2876 wrote to memory of 2676 2876 lpxvpjr.exe 31 PID 2876 wrote to memory of 2676 2876 lpxvpjr.exe 31 PID 2676 wrote to memory of 2904 2676 thvlf.exe 32 PID 2676 wrote to memory of 2904 2676 thvlf.exe 32 PID 2676 wrote to memory of 2904 2676 thvlf.exe 32 PID 2676 wrote to memory of 2904 2676 thvlf.exe 32 PID 2904 wrote to memory of 2896 2904 dtnxbx.exe 33 PID 2904 wrote to memory of 2896 2904 dtnxbx.exe 33 PID 2904 wrote to memory of 2896 2904 dtnxbx.exe 33 PID 2904 wrote to memory of 2896 2904 dtnxbx.exe 33 PID 2896 wrote to memory of 2688 2896 xjxbp.exe 34 PID 2896 wrote to memory of 2688 2896 xjxbp.exe 34 PID 2896 wrote to memory of 2688 2896 xjxbp.exe 34 PID 2896 wrote to memory of 2688 2896 xjxbp.exe 34 PID 2688 wrote to memory of 2720 2688 nhjbnt.exe 35 PID 2688 wrote to memory of 2720 2688 nhjbnt.exe 35 PID 2688 wrote to memory of 2720 2688 nhjbnt.exe 35 PID 2688 wrote to memory of 2720 2688 nhjbnt.exe 35 PID 2720 wrote to memory of 2972 2720 lpjjfhp.exe 36 PID 2720 wrote to memory of 2972 2720 lpjjfhp.exe 36 PID 2720 wrote to memory of 2972 2720 lpjjfhp.exe 36 PID 2720 wrote to memory of 2972 2720 lpjjfhp.exe 36 PID 2972 wrote to memory of 1036 2972 tltlxhl.exe 37 PID 2972 wrote to memory of 1036 2972 tltlxhl.exe 37 PID 2972 wrote to memory of 1036 2972 tltlxhl.exe 37 PID 2972 wrote to memory of 1036 2972 tltlxhl.exe 37 PID 1036 wrote to memory of 1872 1036 ldrldf.exe 38 PID 1036 wrote to memory of 1872 1036 ldrldf.exe 38 PID 1036 wrote to memory of 1872 1036 ldrldf.exe 38 PID 1036 wrote to memory of 1872 1036 ldrldf.exe 38 PID 1872 wrote to memory of 2524 1872 pxhbpb.exe 39 PID 1872 wrote to memory of 2524 1872 pxhbpb.exe 39 PID 1872 wrote to memory of 2524 1872 pxhbpb.exe 39 PID 1872 wrote to memory of 2524 1872 pxhbpb.exe 39 PID 2524 wrote to memory of 2928 2524 jxbvn.exe 40 PID 2524 wrote to memory of 2928 2524 jxbvn.exe 40 PID 2524 wrote to memory of 2928 2524 jxbvn.exe 40 PID 2524 wrote to memory of 2928 2524 jxbvn.exe 40 PID 2928 wrote to memory of 2728 2928 lddrdff.exe 41 PID 2928 wrote to memory of 2728 2928 lddrdff.exe 41 PID 2928 wrote to memory of 2728 2928 lddrdff.exe 41 PID 2928 wrote to memory of 2728 2928 lddrdff.exe 41 PID 2728 wrote to memory of 1460 2728 pddvf.exe 42 PID 2728 wrote to memory of 1460 2728 pddvf.exe 42 PID 2728 wrote to memory of 1460 2728 pddvf.exe 42 PID 2728 wrote to memory of 1460 2728 pddvf.exe 42 PID 1460 wrote to memory of 2024 1460 bldphh.exe 43 PID 1460 wrote to memory of 2024 1460 bldphh.exe 43 PID 1460 wrote to memory of 2024 1460 bldphh.exe 43 PID 1460 wrote to memory of 2024 1460 bldphh.exe 43 PID 2024 wrote to memory of 2220 2024 hpljvh.exe 44 PID 2024 wrote to memory of 2220 2024 hpljvh.exe 44 PID 2024 wrote to memory of 2220 2024 hpljvh.exe 44 PID 2024 wrote to memory of 2220 2024 hpljvh.exe 44 PID 2220 wrote to memory of 2008 2220 rhttpd.exe 45 PID 2220 wrote to memory of 2008 2220 rhttpd.exe 45 PID 2220 wrote to memory of 2008 2220 rhttpd.exe 45 PID 2220 wrote to memory of 2008 2220 rhttpd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe"C:\Users\Admin\AppData\Local\Temp\b99586c3fc6e0f48f064ac8a49ddc657ab932b3c9a7b71ff8e0ceecf9494a70a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\lpxvpjr.exec:\lpxvpjr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\thvlf.exec:\thvlf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\dtnxbx.exec:\dtnxbx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\xjxbp.exec:\xjxbp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\nhjbnt.exec:\nhjbnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\lpjjfhp.exec:\lpjjfhp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\tltlxhl.exec:\tltlxhl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\ldrldf.exec:\ldrldf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\pxhbpb.exec:\pxhbpb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\jxbvn.exec:\jxbvn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\lddrdff.exec:\lddrdff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\pddvf.exec:\pddvf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\bldphh.exec:\bldphh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\hpljvh.exec:\hpljvh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
\??\c:\rhttpd.exec:\rhttpd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\lrlbdvt.exec:\lrlbdvt.exe17⤵
- Executes dropped EXE
PID:2008 -
\??\c:\hfhntjf.exec:\hfhntjf.exe18⤵
- Executes dropped EXE
PID:2232 -
\??\c:\vdxfbr.exec:\vdxfbr.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2504 -
\??\c:\rffxpx.exec:\rffxpx.exe20⤵
- Executes dropped EXE
PID:1292 -
\??\c:\pxlxp.exec:\pxlxp.exe21⤵
- Executes dropped EXE
PID:1552 -
\??\c:\rlrltf.exec:\rlrltf.exe22⤵
- Executes dropped EXE
PID:2088 -
\??\c:\pdbjddv.exec:\pdbjddv.exe23⤵
- Executes dropped EXE
PID:2560 -
\??\c:\rtnrnxx.exec:\rtnrnxx.exe24⤵
- Executes dropped EXE
PID:1512 -
\??\c:\nrnbjpd.exec:\nrnbjpd.exe25⤵
- Executes dropped EXE
PID:2536 -
\??\c:\lrtld.exec:\lrtld.exe26⤵
- Executes dropped EXE
PID:1736 -
\??\c:\tfbjpjl.exec:\tfbjpjl.exe27⤵
- Executes dropped EXE
PID:2432 -
\??\c:\lltptrf.exec:\lltptrf.exe28⤵
- Executes dropped EXE
PID:2324 -
\??\c:\lnrjf.exec:\lnrjf.exe29⤵
- Executes dropped EXE
PID:2664 -
\??\c:\brvxldb.exec:\brvxldb.exe30⤵
- Executes dropped EXE
PID:1768 -
\??\c:\jlhfrd.exec:\jlhfrd.exe31⤵
- Executes dropped EXE
PID:1708 -
\??\c:\lftblbb.exec:\lftblbb.exe32⤵
- Executes dropped EXE
PID:2808 -
\??\c:\rpdft.exec:\rpdft.exe33⤵
- Executes dropped EXE
PID:2872 -
\??\c:\hplxh.exec:\hplxh.exe34⤵
- Executes dropped EXE
PID:2828 -
\??\c:\vlrbf.exec:\vlrbf.exe35⤵
- Executes dropped EXE
PID:2848 -
\??\c:\trftn.exec:\trftn.exe36⤵
- Executes dropped EXE
PID:2948 -
\??\c:\jddlnl.exec:\jddlnl.exe37⤵
- Executes dropped EXE
PID:2904 -
\??\c:\hjlvdb.exec:\hjlvdb.exe38⤵
- Executes dropped EXE
PID:2884 -
\??\c:\ftdxb.exec:\ftdxb.exe39⤵
- Executes dropped EXE
PID:2680 -
\??\c:\bfdnxt.exec:\bfdnxt.exe40⤵
- Executes dropped EXE
PID:2700 -
\??\c:\bfrjx.exec:\bfrjx.exe41⤵
- Executes dropped EXE
PID:316 -
\??\c:\fvvtrhh.exec:\fvvtrhh.exe42⤵
- Executes dropped EXE
PID:2720 -
\??\c:\rfrfdnd.exec:\rfrfdnd.exe43⤵
- Executes dropped EXE
PID:2004 -
\??\c:\fxxpttt.exec:\fxxpttt.exe44⤵
- Executes dropped EXE
PID:1184 -
\??\c:\ntnplfp.exec:\ntnplfp.exe45⤵
- Executes dropped EXE
PID:1880 -
\??\c:\dtvbf.exec:\dtvbf.exe46⤵
- Executes dropped EXE
PID:1872 -
\??\c:\thbdl.exec:\thbdl.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
\??\c:\xjldtn.exec:\xjldtn.exe48⤵
- Executes dropped EXE
PID:2512 -
\??\c:\fxpblhj.exec:\fxpblhj.exe49⤵
- Executes dropped EXE
PID:2960 -
\??\c:\hrrdd.exec:\hrrdd.exe50⤵
- Executes dropped EXE
PID:2420 -
\??\c:\xfljljn.exec:\xfljljn.exe51⤵
- Executes dropped EXE
PID:760 -
\??\c:\ptnfdj.exec:\ptnfdj.exe52⤵
- Executes dropped EXE
PID:524 -
\??\c:\rtjlvx.exec:\rtjlvx.exe53⤵
- Executes dropped EXE
PID:2392 -
\??\c:\rxnpxx.exec:\rxnpxx.exe54⤵
- Executes dropped EXE
PID:2384 -
\??\c:\nxhfpr.exec:\nxhfpr.exe55⤵
- Executes dropped EXE
PID:2008 -
\??\c:\xhhdbd.exec:\xhhdbd.exe56⤵
- Executes dropped EXE
PID:2608 -
\??\c:\flhtpj.exec:\flhtpj.exe57⤵
- Executes dropped EXE
PID:1280 -
\??\c:\jjtxj.exec:\jjtxj.exe58⤵
- Executes dropped EXE
PID:2320 -
\??\c:\jxfxtxx.exec:\jxfxtxx.exe59⤵
- Executes dropped EXE
PID:2400 -
\??\c:\dtbxh.exec:\dtbxh.exe60⤵
- Executes dropped EXE
PID:1960 -
\??\c:\vvhbf.exec:\vvhbf.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
\??\c:\bttlh.exec:\bttlh.exe62⤵
- Executes dropped EXE
PID:2040 -
\??\c:\ftjrf.exec:\ftjrf.exe63⤵
- Executes dropped EXE
PID:740 -
\??\c:\xptnnvn.exec:\xptnnvn.exe64⤵
- Executes dropped EXE
PID:324 -
\??\c:\xndnbdb.exec:\xndnbdb.exe65⤵
- Executes dropped EXE
PID:2120 -
\??\c:\dhpxdx.exec:\dhpxdx.exe66⤵PID:1580
-
\??\c:\jvvvd.exec:\jvvvd.exe67⤵PID:2432
-
\??\c:\vnhbljf.exec:\vnhbljf.exe68⤵PID:2468
-
\??\c:\fblbfv.exec:\fblbfv.exe69⤵
- System Location Discovery: System Language Discovery
PID:1056 -
\??\c:\prbblp.exec:\prbblp.exe70⤵PID:864
-
\??\c:\ddpffrb.exec:\ddpffrb.exe71⤵PID:2332
-
\??\c:\plbdtlh.exec:\plbdtlh.exe72⤵PID:2892
-
\??\c:\lnrvlbf.exec:\lnrvlbf.exe73⤵PID:2776
-
\??\c:\rhdjvnp.exec:\rhdjvnp.exe74⤵PID:1536
-
\??\c:\hdbdddr.exec:\hdbdddr.exe75⤵PID:1564
-
\??\c:\pbvdtt.exec:\pbvdtt.exe76⤵PID:2676
-
\??\c:\fnrjn.exec:\fnrjn.exe77⤵PID:2708
-
\??\c:\xnpfvvn.exec:\xnpfvvn.exe78⤵PID:2832
-
\??\c:\drtrfft.exec:\drtrfft.exe79⤵PID:2668
-
\??\c:\pnvfrrt.exec:\pnvfrrt.exe80⤵PID:2104
-
\??\c:\lbndd.exec:\lbndd.exe81⤵PID:2688
-
\??\c:\lrpvhr.exec:\lrpvhr.exe82⤵PID:2288
-
\??\c:\lthrfpb.exec:\lthrfpb.exe83⤵PID:1076
-
\??\c:\jhfhtxr.exec:\jhfhtxr.exe84⤵PID:1932
-
\??\c:\bpblrlr.exec:\bpblrlr.exe85⤵PID:3068
-
\??\c:\bxhdj.exec:\bxhdj.exe86⤵PID:2616
-
\??\c:\trphr.exec:\trphr.exe87⤵PID:2952
-
\??\c:\xfxbvt.exec:\xfxbvt.exe88⤵PID:1672
-
\??\c:\jbfdt.exec:\jbfdt.exe89⤵PID:3008
-
\??\c:\lbnbjtf.exec:\lbnbjtf.exe90⤵PID:648
-
\??\c:\djbxjl.exec:\djbxjl.exe91⤵PID:2160
-
\??\c:\nndnjnv.exec:\nndnjnv.exe92⤵PID:2224
-
\??\c:\jtnrfd.exec:\jtnrfd.exe93⤵PID:2248
-
\??\c:\txdrx.exec:\txdrx.exe94⤵PID:2180
-
\??\c:\dplvrpx.exec:\dplvrpx.exe95⤵PID:2528
-
\??\c:\nbjxvh.exec:\nbjxvh.exe96⤵PID:1856
-
\??\c:\xrfrj.exec:\xrfrj.exe97⤵PID:2232
-
\??\c:\dltrttx.exec:\dltrttx.exe98⤵PID:2244
-
\??\c:\xhfhdl.exec:\xhfhdl.exe99⤵PID:936
-
\??\c:\vrfrtp.exec:\vrfrtp.exe100⤵PID:816
-
\??\c:\dlvbnd.exec:\dlvbnd.exe101⤵PID:788
-
\??\c:\frtflhv.exec:\frtflhv.exe102⤵PID:1916
-
\??\c:\nfrbrvx.exec:\nfrbrvx.exe103⤵PID:1884
-
\??\c:\vvdhxpt.exec:\vvdhxpt.exe104⤵PID:784
-
\??\c:\rrbjx.exec:\rrbjx.exe105⤵PID:2556
-
\??\c:\lpvpbf.exec:\lpvpbf.exe106⤵PID:2120
-
\??\c:\dnjxt.exec:\dnjxt.exe107⤵PID:2624
-
\??\c:\fhtbfl.exec:\fhtbfl.exe108⤵PID:2432
-
\??\c:\vfhhbb.exec:\vfhhbb.exe109⤵PID:2468
-
\??\c:\fxrxp.exec:\fxrxp.exe110⤵PID:1056
-
\??\c:\jljprr.exec:\jljprr.exe111⤵PID:864
-
\??\c:\djrdlrd.exec:\djrdlrd.exe112⤵PID:2332
-
\??\c:\pxtvntn.exec:\pxtvntn.exe113⤵PID:2892
-
\??\c:\xhpbhh.exec:\xhpbhh.exe114⤵PID:2776
-
\??\c:\xfxlr.exec:\xfxlr.exe115⤵PID:1536
-
\??\c:\jvrtl.exec:\jvrtl.exe116⤵PID:2916
-
\??\c:\ffjbltb.exec:\ffjbltb.exe117⤵PID:2756
-
\??\c:\lxhdpp.exec:\lxhdpp.exe118⤵PID:2708
-
\??\c:\ldfvjrh.exec:\ldfvjrh.exe119⤵PID:2832
-
\??\c:\rfvxpx.exec:\rfvxpx.exe120⤵PID:2668
-
\??\c:\dljpth.exec:\dljpth.exe121⤵PID:2096
-
\??\c:\vjrlnbh.exec:\vjrlnbh.exe122⤵PID:316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-