Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe
-
Size
67KB
-
MD5
4ec5e556585cf8ab72044074b67564f0
-
SHA1
9f93105757004fa91d5115070e6c19ac3b1575c8
-
SHA256
3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829
-
SHA512
26ea00f1e73d697cc80150cb23d737c0079fb5ee9b31a30cacf667d254cc2394abd34f99c8e16a20d02ab6e7b8132540d092abb7e5f7e6cfc9db7a7b4f365e86
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxe7:ymb3NkkiQ3mdBjF0y7kbU7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2772-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1580-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2052-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/772-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2944-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1156-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2400-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2100-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/236-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2004-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1080-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2772 jlfvr.exe 2748 hppbrf.exe 2744 dvdpfp.exe 2716 lpntjlh.exe 2052 bxtpx.exe 2644 ndthh.exe 3064 tjtrrvl.exe 872 pnxht.exe 3008 dxtdppp.exe 772 tnjlvf.exe 2944 lxxrrp.exe 1156 llxtldh.exe 2220 rxbjvh.exe 2320 vdrjb.exe 1968 lpbjlvh.exe 600 drlbxfd.exe 1216 hxplhl.exe 2404 rrbpf.exe 2400 xnvnnvp.exe 2100 dhbtl.exe 2176 ldhbln.exe 236 jdxtbn.exe 2028 jvjdlh.exe 2004 tnxpjd.exe 1080 jtrphtv.exe 3028 nfpnpdx.exe 364 tlhdhb.exe 1616 pvfvhn.exe 2676 vxxpr.exe 2672 hlndjj.exe 2012 rddpfhx.exe 1980 vtfbf.exe 2684 plfhpbf.exe 2720 ntbxlpp.exe 2800 nrnhf.exe 1592 tnlvj.exe 2788 vftpfx.exe 2884 ldrrpxh.exe 2752 ppjvrrf.exe 2716 rllhp.exe 2728 pjjprht.exe 2648 htjvvhn.exe 1200 dttljhf.exe 1660 bllpp.exe 396 hdpntn.exe 872 rhjttx.exe 2948 vdbndv.exe 2904 hdtnhdf.exe 1992 fnhhhht.exe 2944 jrxdxfp.exe 832 xtdbb.exe 3036 dpjbvr.exe 812 vffjrbj.exe 524 ptlxr.exe 2428 xjljdpp.exe 1056 blnpfn.exe 2352 fjjbxnj.exe 2404 ddhdd.exe 1808 pfttxh.exe 1704 nlvhbj.exe 708 dbhvt.exe 1600 vfbrhp.exe 236 ppfllj.exe 1120 hbndr.exe -
resource yara_rule behavioral1/memory/2772-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1580-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2052-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/872-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/872-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3008-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/772-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1156-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2100-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/236-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1080-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-296-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjtbttp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbbtntx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tptdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdtlthd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plvvllt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdbhdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhxnjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbpvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thlnrfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjxvbnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjjbxnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxntdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtpvxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdttfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npjlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnxpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxtdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdjlxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllndb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhfdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnxlvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtjrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plrvhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvfxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddnjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxntpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpvlhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxvnvbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pntjhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thphdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdhfntd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpbtbrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbhhlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lphtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bldvpvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddbxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrthx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrndvtj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhlxplj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phtbpvl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2772 1580 3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe 30 PID 1580 wrote to memory of 2772 1580 3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe 30 PID 1580 wrote to memory of 2772 1580 3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe 30 PID 1580 wrote to memory of 2772 1580 3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe 30 PID 2772 wrote to memory of 2748 2772 jlfvr.exe 31 PID 2772 wrote to memory of 2748 2772 jlfvr.exe 31 PID 2772 wrote to memory of 2748 2772 jlfvr.exe 31 PID 2772 wrote to memory of 2748 2772 jlfvr.exe 31 PID 2748 wrote to memory of 2744 2748 hppbrf.exe 32 PID 2748 wrote to memory of 2744 2748 hppbrf.exe 32 PID 2748 wrote to memory of 2744 2748 hppbrf.exe 32 PID 2748 wrote to memory of 2744 2748 hppbrf.exe 32 PID 2744 wrote to memory of 2716 2744 dvdpfp.exe 33 PID 2744 wrote to memory of 2716 2744 dvdpfp.exe 33 PID 2744 wrote to memory of 2716 2744 dvdpfp.exe 33 PID 2744 wrote to memory of 2716 2744 dvdpfp.exe 33 PID 2716 wrote to memory of 2052 2716 lpntjlh.exe 34 PID 2716 wrote to memory of 2052 2716 lpntjlh.exe 34 PID 2716 wrote to memory of 2052 2716 lpntjlh.exe 34 PID 2716 wrote to memory of 2052 2716 lpntjlh.exe 34 PID 2052 wrote to memory of 2644 2052 bxtpx.exe 35 PID 2052 wrote to memory of 2644 2052 bxtpx.exe 35 PID 2052 wrote to memory of 2644 2052 bxtpx.exe 35 PID 2052 wrote to memory of 2644 2052 bxtpx.exe 35 PID 2644 wrote to memory of 3064 2644 ndthh.exe 36 PID 2644 wrote to memory of 3064 2644 ndthh.exe 36 PID 2644 wrote to memory of 3064 2644 ndthh.exe 36 PID 2644 wrote to memory of 3064 2644 ndthh.exe 36 PID 3064 wrote to memory of 872 3064 tjtrrvl.exe 37 PID 3064 wrote to memory of 872 3064 tjtrrvl.exe 37 PID 3064 wrote to memory of 872 3064 tjtrrvl.exe 37 PID 3064 wrote to memory of 872 3064 tjtrrvl.exe 37 PID 872 wrote to memory of 3008 872 pnxht.exe 38 PID 872 wrote to memory of 3008 872 pnxht.exe 38 PID 872 wrote to memory of 3008 872 pnxht.exe 38 PID 872 wrote to memory of 3008 872 pnxht.exe 38 PID 3008 wrote to memory of 772 3008 dxtdppp.exe 39 PID 3008 wrote to memory of 772 3008 dxtdppp.exe 39 PID 3008 wrote to memory of 772 3008 dxtdppp.exe 39 PID 3008 wrote to memory of 772 3008 dxtdppp.exe 39 PID 772 wrote to memory of 2944 772 tnjlvf.exe 40 PID 772 wrote to memory of 2944 772 tnjlvf.exe 40 PID 772 wrote to memory of 2944 772 tnjlvf.exe 40 PID 772 wrote to memory of 2944 772 tnjlvf.exe 40 PID 2944 wrote to memory of 1156 2944 lxxrrp.exe 41 PID 2944 wrote to memory of 1156 2944 lxxrrp.exe 41 PID 2944 wrote to memory of 1156 2944 lxxrrp.exe 41 PID 2944 wrote to memory of 1156 2944 lxxrrp.exe 41 PID 1156 wrote to memory of 2220 1156 llxtldh.exe 42 PID 1156 wrote to memory of 2220 1156 llxtldh.exe 42 PID 1156 wrote to memory of 2220 1156 llxtldh.exe 42 PID 1156 wrote to memory of 2220 1156 llxtldh.exe 42 PID 2220 wrote to memory of 2320 2220 rxbjvh.exe 43 PID 2220 wrote to memory of 2320 2220 rxbjvh.exe 43 PID 2220 wrote to memory of 2320 2220 rxbjvh.exe 43 PID 2220 wrote to memory of 2320 2220 rxbjvh.exe 43 PID 2320 wrote to memory of 1968 2320 vdrjb.exe 44 PID 2320 wrote to memory of 1968 2320 vdrjb.exe 44 PID 2320 wrote to memory of 1968 2320 vdrjb.exe 44 PID 2320 wrote to memory of 1968 2320 vdrjb.exe 44 PID 1968 wrote to memory of 600 1968 lpbjlvh.exe 45 PID 1968 wrote to memory of 600 1968 lpbjlvh.exe 45 PID 1968 wrote to memory of 600 1968 lpbjlvh.exe 45 PID 1968 wrote to memory of 600 1968 lpbjlvh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe"C:\Users\Admin\AppData\Local\Temp\3e916277ce2cead7ba5d6c904646e89d28d5103e4c7e91b8a960ecd32bf2e829N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\jlfvr.exec:\jlfvr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\hppbrf.exec:\hppbrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\dvdpfp.exec:\dvdpfp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\lpntjlh.exec:\lpntjlh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\bxtpx.exec:\bxtpx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\ndthh.exec:\ndthh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\tjtrrvl.exec:\tjtrrvl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\pnxht.exec:\pnxht.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\dxtdppp.exec:\dxtdppp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\tnjlvf.exec:\tnjlvf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\lxxrrp.exec:\lxxrrp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\llxtldh.exec:\llxtldh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
\??\c:\rxbjvh.exec:\rxbjvh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\vdrjb.exec:\vdrjb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\lpbjlvh.exec:\lpbjlvh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\drlbxfd.exec:\drlbxfd.exe17⤵
- Executes dropped EXE
PID:600 -
\??\c:\hxplhl.exec:\hxplhl.exe18⤵
- Executes dropped EXE
PID:1216 -
\??\c:\rrbpf.exec:\rrbpf.exe19⤵
- Executes dropped EXE
PID:2404 -
\??\c:\xnvnnvp.exec:\xnvnnvp.exe20⤵
- Executes dropped EXE
PID:2400 -
\??\c:\dhbtl.exec:\dhbtl.exe21⤵
- Executes dropped EXE
PID:2100 -
\??\c:\ldhbln.exec:\ldhbln.exe22⤵
- Executes dropped EXE
PID:2176 -
\??\c:\jdxtbn.exec:\jdxtbn.exe23⤵
- Executes dropped EXE
PID:236 -
\??\c:\jvjdlh.exec:\jvjdlh.exe24⤵
- Executes dropped EXE
PID:2028 -
\??\c:\tnxpjd.exec:\tnxpjd.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004 -
\??\c:\jtrphtv.exec:\jtrphtv.exe26⤵
- Executes dropped EXE
PID:1080 -
\??\c:\nfpnpdx.exec:\nfpnpdx.exe27⤵
- Executes dropped EXE
PID:3028 -
\??\c:\tlhdhb.exec:\tlhdhb.exe28⤵
- Executes dropped EXE
PID:364 -
\??\c:\pvfvhn.exec:\pvfvhn.exe29⤵
- Executes dropped EXE
PID:1616 -
\??\c:\vxxpr.exec:\vxxpr.exe30⤵
- Executes dropped EXE
PID:2676 -
\??\c:\hlndjj.exec:\hlndjj.exe31⤵
- Executes dropped EXE
PID:2672 -
\??\c:\rddpfhx.exec:\rddpfhx.exe32⤵
- Executes dropped EXE
PID:2012 -
\??\c:\vtfbf.exec:\vtfbf.exe33⤵
- Executes dropped EXE
PID:1980 -
\??\c:\plfhpbf.exec:\plfhpbf.exe34⤵
- Executes dropped EXE
PID:2684 -
\??\c:\ntbxlpp.exec:\ntbxlpp.exe35⤵
- Executes dropped EXE
PID:2720 -
\??\c:\nrnhf.exec:\nrnhf.exe36⤵
- Executes dropped EXE
PID:2800 -
\??\c:\tnlvj.exec:\tnlvj.exe37⤵
- Executes dropped EXE
PID:1592 -
\??\c:\vftpfx.exec:\vftpfx.exe38⤵
- Executes dropped EXE
PID:2788 -
\??\c:\ldrrpxh.exec:\ldrrpxh.exe39⤵
- Executes dropped EXE
PID:2884 -
\??\c:\ppjvrrf.exec:\ppjvrrf.exe40⤵
- Executes dropped EXE
PID:2752 -
\??\c:\rllhp.exec:\rllhp.exe41⤵
- Executes dropped EXE
PID:2716 -
\??\c:\pjjprht.exec:\pjjprht.exe42⤵
- Executes dropped EXE
PID:2728 -
\??\c:\htjvvhn.exec:\htjvvhn.exe43⤵
- Executes dropped EXE
PID:2648 -
\??\c:\dttljhf.exec:\dttljhf.exe44⤵
- Executes dropped EXE
PID:1200 -
\??\c:\bllpp.exec:\bllpp.exe45⤵
- Executes dropped EXE
PID:1660 -
\??\c:\hdpntn.exec:\hdpntn.exe46⤵
- Executes dropped EXE
PID:396 -
\??\c:\rhjttx.exec:\rhjttx.exe47⤵
- Executes dropped EXE
PID:872 -
\??\c:\vdbndv.exec:\vdbndv.exe48⤵
- Executes dropped EXE
PID:2948 -
\??\c:\hdtnhdf.exec:\hdtnhdf.exe49⤵
- Executes dropped EXE
PID:2904 -
\??\c:\fnhhhht.exec:\fnhhhht.exe50⤵
- Executes dropped EXE
PID:1992 -
\??\c:\jrxdxfp.exec:\jrxdxfp.exe51⤵
- Executes dropped EXE
PID:2944 -
\??\c:\xtdbb.exec:\xtdbb.exe52⤵
- Executes dropped EXE
PID:832 -
\??\c:\dpjbvr.exec:\dpjbvr.exe53⤵
- Executes dropped EXE
PID:3036 -
\??\c:\vffjrbj.exec:\vffjrbj.exe54⤵
- Executes dropped EXE
PID:812 -
\??\c:\ptlxr.exec:\ptlxr.exe55⤵
- Executes dropped EXE
PID:524 -
\??\c:\xjljdpp.exec:\xjljdpp.exe56⤵
- Executes dropped EXE
PID:2428 -
\??\c:\blnpfn.exec:\blnpfn.exe57⤵
- Executes dropped EXE
PID:1056 -
\??\c:\fjjbxnj.exec:\fjjbxnj.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352 -
\??\c:\ddhdd.exec:\ddhdd.exe59⤵
- Executes dropped EXE
PID:2404 -
\??\c:\pfttxh.exec:\pfttxh.exe60⤵
- Executes dropped EXE
PID:1808 -
\??\c:\nlvhbj.exec:\nlvhbj.exe61⤵
- Executes dropped EXE
PID:1704 -
\??\c:\dbhvt.exec:\dbhvt.exe62⤵
- Executes dropped EXE
PID:708 -
\??\c:\vfbrhp.exec:\vfbrhp.exe63⤵
- Executes dropped EXE
PID:1600 -
\??\c:\ppfllj.exec:\ppfllj.exe64⤵
- Executes dropped EXE
PID:236 -
\??\c:\hbndr.exec:\hbndr.exe65⤵
- Executes dropped EXE
PID:1120 -
\??\c:\rvjlbt.exec:\rvjlbt.exe66⤵PID:1940
-
\??\c:\vthlln.exec:\vthlln.exe67⤵PID:1220
-
\??\c:\nnlnhj.exec:\nnlnhj.exe68⤵PID:3024
-
\??\c:\tpfdvl.exec:\tpfdvl.exe69⤵PID:2040
-
\??\c:\xbdjpj.exec:\xbdjpj.exe70⤵PID:620
-
\??\c:\pvbdtt.exec:\pvbdtt.exe71⤵PID:1248
-
\??\c:\frvdvtx.exec:\frvdvtx.exe72⤵PID:2232
-
\??\c:\hvjxlhr.exec:\hvjxlhr.exe73⤵PID:2504
-
\??\c:\dvvrxf.exec:\dvvrxf.exe74⤵PID:1480
-
\??\c:\frtbplx.exec:\frtbplx.exe75⤵PID:2248
-
\??\c:\ttntbl.exec:\ttntbl.exe76⤵PID:1980
-
\??\c:\ntdhl.exec:\ntdhl.exe77⤵PID:2696
-
\??\c:\nbnvnph.exec:\nbnvnph.exe78⤵PID:1588
-
\??\c:\xvxdphr.exec:\xvxdphr.exe79⤵PID:1744
-
\??\c:\xphvdv.exec:\xphvdv.exe80⤵PID:1592
-
\??\c:\ltlldt.exec:\ltlldt.exe81⤵PID:2976
-
\??\c:\ftrbn.exec:\ftrbn.exe82⤵PID:2848
-
\??\c:\dnjnnfl.exec:\dnjnnfl.exe83⤵PID:2752
-
\??\c:\jljhj.exec:\jljhj.exe84⤵PID:2716
-
\??\c:\tjrfbh.exec:\tjrfbh.exe85⤵PID:2728
-
\??\c:\lphtb.exec:\lphtb.exe86⤵
- System Location Discovery: System Language Discovery
PID:2648 -
\??\c:\nvbptr.exec:\nvbptr.exe87⤵PID:432
-
\??\c:\bttfbt.exec:\bttfbt.exe88⤵PID:2932
-
\??\c:\lpvjfxn.exec:\lpvjfxn.exe89⤵PID:2496
-
\??\c:\rvtdnf.exec:\rvtdnf.exe90⤵PID:2836
-
\??\c:\lvttdj.exec:\lvttdj.exe91⤵PID:1728
-
\??\c:\bldvpvb.exec:\bldvpvb.exe92⤵
- System Location Discovery: System Language Discovery
PID:2396 -
\??\c:\tnlfhxt.exec:\tnlfhxt.exe93⤵PID:1796
-
\??\c:\tvxxxl.exec:\tvxxxl.exe94⤵PID:2944
-
\??\c:\jnxvph.exec:\jnxvph.exe95⤵PID:1768
-
\??\c:\djjtjrr.exec:\djjtjrr.exe96⤵PID:2136
-
\??\c:\pjnll.exec:\pjnll.exe97⤵PID:812
-
\??\c:\rpppnjv.exec:\rpppnjv.exe98⤵PID:1732
-
\??\c:\ttfltd.exec:\ttfltd.exe99⤵PID:2084
-
\??\c:\jflvfdf.exec:\jflvfdf.exe100⤵PID:2116
-
\??\c:\lnxtb.exec:\lnxtb.exe101⤵PID:2128
-
\??\c:\lldvp.exec:\lldvp.exe102⤵PID:1360
-
\??\c:\tbpbnv.exec:\tbpbnv.exe103⤵PID:2440
-
\??\c:\pbnfnbp.exec:\pbnfnbp.exe104⤵PID:2176
-
\??\c:\nnhrrbp.exec:\nnhrrbp.exe105⤵PID:2568
-
\??\c:\ndvbltl.exec:\ndvbltl.exe106⤵PID:1536
-
\??\c:\dvfplrb.exec:\dvfplrb.exe107⤵PID:1772
-
\??\c:\xllnd.exec:\xllnd.exe108⤵PID:1120
-
\??\c:\xvtjt.exec:\xvtjt.exe109⤵PID:1920
-
\??\c:\vbntj.exec:\vbntj.exe110⤵PID:1508
-
\??\c:\hlrpxnr.exec:\hlrpxnr.exe111⤵PID:3024
-
\??\c:\vllnxt.exec:\vllnxt.exe112⤵PID:2080
-
\??\c:\pjtlnfd.exec:\pjtlnfd.exe113⤵PID:584
-
\??\c:\pnlhxx.exec:\pnlhxx.exe114⤵PID:1616
-
\??\c:\djlvr.exec:\djlvr.exe115⤵PID:1332
-
\??\c:\tlptftv.exec:\tlptftv.exe116⤵PID:1664
-
\??\c:\bvvdn.exec:\bvvdn.exe117⤵PID:2256
-
\??\c:\jlxnrff.exec:\jlxnrff.exe118⤵PID:2248
-
\??\c:\xbvjv.exec:\xbvjv.exe119⤵PID:2300
-
\??\c:\ppbpxv.exec:\ppbpxv.exe120⤵PID:2736
-
\??\c:\bnrjdf.exec:\bnrjdf.exe121⤵PID:2792
-
\??\c:\lhpnrf.exec:\lhpnrf.exe122⤵PID:1788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-