Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe
Resource
win7-20241010-en
General
-
Target
e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe
-
Size
82KB
-
MD5
acae12dc9085ea2dde270e9af4e1fd8c
-
SHA1
2afcfb4da423537df8765513dcbc7bdb292274f4
-
SHA256
e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70
-
SHA512
837fecc45c3f29720879657e8e2e3314c7e1b2639ef333004183db677ecb2bfced574c273c2f2abfb8d8bd5bd52193cf80aebe12431e2c91e76cee813d1e23fb
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgygQwKjiawEmB5GtJ:ymb3NkkiQ3mdBjFo73thgQ/wEko
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2368-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2536-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2188-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2188-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2808-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/660-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1708-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2184-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1772-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/748-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2488-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2808-1495-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2536 ffttfb.exe 1684 pxhtj.exe 2528 xdfjn.exe 2424 hfrxtx.exe 2188 fxhvd.exe 2808 rjvhj.exe 2688 txvnbv.exe 2968 dxjvtp.exe 2672 vhftxr.exe 1676 hxtbb.exe 2632 pbbxt.exe 1256 lbpfpll.exe 2340 xnpddvp.exe 660 vdlfxh.exe 1484 xfnhrhx.exe 1764 lxdtnl.exe 3052 dnjpbdb.exe 2432 lldpx.exe 3048 nblvjv.exe 1708 nhvfv.exe 2184 tjtblpd.exe 1836 vhbblxl.exe 960 btrldd.exe 1772 jvjrvb.exe 1680 vtrfvfp.exe 748 npjhr.exe 2240 vddvv.exe 2300 vtfnr.exe 672 tljjnbp.exe 2488 jxnpf.exe 768 phlrfl.exe 1796 lrjjpt.exe 2836 xbhnvh.exe 2500 tlfpfrr.exe 2212 nxbvl.exe 2440 vppdh.exe 2792 blvrhbh.exe 2756 nxxpf.exe 2248 bptvb.exe 1356 drrnjbb.exe 2980 fxlhn.exe 2844 vrvpr.exe 2764 fdfnx.exe 2652 nbnjpr.exe 1868 fvlfpx.exe 1388 lfttnvh.exe 1984 prlbn.exe 2632 rddrnf.exe 1784 drrnth.exe 1488 nxjxhnv.exe 1964 dfvlxpl.exe 1148 ljtxt.exe 2964 dpxtjvj.exe 2868 jvbfd.exe 2420 nxpvrhl.exe 1028 thbpjp.exe 2384 tjplb.exe 1864 ttxtlpt.exe 616 pdljt.exe 2548 lrllxf.exe 1872 drbxd.exe 1736 xdvnxfx.exe 580 dvnhtj.exe 888 ttdrv.exe -
resource yara_rule behavioral1/memory/2368-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2536-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/660-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1708-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1772-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/748-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-300-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-1495-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjnhbhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjbvdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvffjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnxrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrjhfbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldhxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntrvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xddjnrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xljxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjfhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdthnll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjnrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbjbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bptpjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxrptd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrjhnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhphv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prfdfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnrfld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhndp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntvfhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhjrht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjvfbjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbfhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlxjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvprxhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvxfppl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxvvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlxvfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lldpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbvjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhhdpjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2536 2368 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 30 PID 2368 wrote to memory of 2536 2368 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 30 PID 2368 wrote to memory of 2536 2368 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 30 PID 2368 wrote to memory of 2536 2368 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 30 PID 2536 wrote to memory of 1684 2536 ffttfb.exe 31 PID 2536 wrote to memory of 1684 2536 ffttfb.exe 31 PID 2536 wrote to memory of 1684 2536 ffttfb.exe 31 PID 2536 wrote to memory of 1684 2536 ffttfb.exe 31 PID 1684 wrote to memory of 2528 1684 pxhtj.exe 32 PID 1684 wrote to memory of 2528 1684 pxhtj.exe 32 PID 1684 wrote to memory of 2528 1684 pxhtj.exe 32 PID 1684 wrote to memory of 2528 1684 pxhtj.exe 32 PID 2528 wrote to memory of 2424 2528 xdfjn.exe 33 PID 2528 wrote to memory of 2424 2528 xdfjn.exe 33 PID 2528 wrote to memory of 2424 2528 xdfjn.exe 33 PID 2528 wrote to memory of 2424 2528 xdfjn.exe 33 PID 2424 wrote to memory of 2188 2424 hfrxtx.exe 34 PID 2424 wrote to memory of 2188 2424 hfrxtx.exe 34 PID 2424 wrote to memory of 2188 2424 hfrxtx.exe 34 PID 2424 wrote to memory of 2188 2424 hfrxtx.exe 34 PID 2188 wrote to memory of 2808 2188 fxhvd.exe 35 PID 2188 wrote to memory of 2808 2188 fxhvd.exe 35 PID 2188 wrote to memory of 2808 2188 fxhvd.exe 35 PID 2188 wrote to memory of 2808 2188 fxhvd.exe 35 PID 2808 wrote to memory of 2688 2808 rjvhj.exe 36 PID 2808 wrote to memory of 2688 2808 rjvhj.exe 36 PID 2808 wrote to memory of 2688 2808 rjvhj.exe 36 PID 2808 wrote to memory of 2688 2808 rjvhj.exe 36 PID 2688 wrote to memory of 2968 2688 txvnbv.exe 37 PID 2688 wrote to memory of 2968 2688 txvnbv.exe 37 PID 2688 wrote to memory of 2968 2688 txvnbv.exe 37 PID 2688 wrote to memory of 2968 2688 txvnbv.exe 37 PID 2968 wrote to memory of 2672 2968 dxjvtp.exe 38 PID 2968 wrote to memory of 2672 2968 dxjvtp.exe 38 PID 2968 wrote to memory of 2672 2968 dxjvtp.exe 38 PID 2968 wrote to memory of 2672 2968 dxjvtp.exe 38 PID 2672 wrote to memory of 1676 2672 vhftxr.exe 39 PID 2672 wrote to memory of 1676 2672 vhftxr.exe 39 PID 2672 wrote to memory of 1676 2672 vhftxr.exe 39 PID 2672 wrote to memory of 1676 2672 vhftxr.exe 39 PID 1676 wrote to memory of 2632 1676 hxtbb.exe 40 PID 1676 wrote to memory of 2632 1676 hxtbb.exe 40 PID 1676 wrote to memory of 2632 1676 hxtbb.exe 40 PID 1676 wrote to memory of 2632 1676 hxtbb.exe 40 PID 2632 wrote to memory of 1256 2632 pbbxt.exe 41 PID 2632 wrote to memory of 1256 2632 pbbxt.exe 41 PID 2632 wrote to memory of 1256 2632 pbbxt.exe 41 PID 2632 wrote to memory of 1256 2632 pbbxt.exe 41 PID 1256 wrote to memory of 2340 1256 lbpfpll.exe 42 PID 1256 wrote to memory of 2340 1256 lbpfpll.exe 42 PID 1256 wrote to memory of 2340 1256 lbpfpll.exe 42 PID 1256 wrote to memory of 2340 1256 lbpfpll.exe 42 PID 2340 wrote to memory of 660 2340 xnpddvp.exe 43 PID 2340 wrote to memory of 660 2340 xnpddvp.exe 43 PID 2340 wrote to memory of 660 2340 xnpddvp.exe 43 PID 2340 wrote to memory of 660 2340 xnpddvp.exe 43 PID 660 wrote to memory of 1484 660 vdlfxh.exe 44 PID 660 wrote to memory of 1484 660 vdlfxh.exe 44 PID 660 wrote to memory of 1484 660 vdlfxh.exe 44 PID 660 wrote to memory of 1484 660 vdlfxh.exe 44 PID 1484 wrote to memory of 1764 1484 xfnhrhx.exe 45 PID 1484 wrote to memory of 1764 1484 xfnhrhx.exe 45 PID 1484 wrote to memory of 1764 1484 xfnhrhx.exe 45 PID 1484 wrote to memory of 1764 1484 xfnhrhx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe"C:\Users\Admin\AppData\Local\Temp\e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\ffttfb.exec:\ffttfb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\pxhtj.exec:\pxhtj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\xdfjn.exec:\xdfjn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\hfrxtx.exec:\hfrxtx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\fxhvd.exec:\fxhvd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\rjvhj.exec:\rjvhj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\txvnbv.exec:\txvnbv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\dxjvtp.exec:\dxjvtp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\vhftxr.exec:\vhftxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\hxtbb.exec:\hxtbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\pbbxt.exec:\pbbxt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\lbpfpll.exec:\lbpfpll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
\??\c:\xnpddvp.exec:\xnpddvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\vdlfxh.exec:\vdlfxh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
\??\c:\xfnhrhx.exec:\xfnhrhx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
\??\c:\lxdtnl.exec:\lxdtnl.exe17⤵
- Executes dropped EXE
PID:1764 -
\??\c:\dnjpbdb.exec:\dnjpbdb.exe18⤵
- Executes dropped EXE
PID:3052 -
\??\c:\lldpx.exec:\lldpx.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432 -
\??\c:\nblvjv.exec:\nblvjv.exe20⤵
- Executes dropped EXE
PID:3048 -
\??\c:\nhvfv.exec:\nhvfv.exe21⤵
- Executes dropped EXE
PID:1708 -
\??\c:\tjtblpd.exec:\tjtblpd.exe22⤵
- Executes dropped EXE
PID:2184 -
\??\c:\vhbblxl.exec:\vhbblxl.exe23⤵
- Executes dropped EXE
PID:1836 -
\??\c:\btrldd.exec:\btrldd.exe24⤵
- Executes dropped EXE
PID:960 -
\??\c:\jvjrvb.exec:\jvjrvb.exe25⤵
- Executes dropped EXE
PID:1772 -
\??\c:\vtrfvfp.exec:\vtrfvfp.exe26⤵
- Executes dropped EXE
PID:1680 -
\??\c:\npjhr.exec:\npjhr.exe27⤵
- Executes dropped EXE
PID:748 -
\??\c:\vddvv.exec:\vddvv.exe28⤵
- Executes dropped EXE
PID:2240 -
\??\c:\vtfnr.exec:\vtfnr.exe29⤵
- Executes dropped EXE
PID:2300 -
\??\c:\tljjnbp.exec:\tljjnbp.exe30⤵
- Executes dropped EXE
PID:672 -
\??\c:\jxnpf.exec:\jxnpf.exe31⤵
- Executes dropped EXE
PID:2488 -
\??\c:\phlrfl.exec:\phlrfl.exe32⤵
- Executes dropped EXE
PID:768 -
\??\c:\lrjjpt.exec:\lrjjpt.exe33⤵
- Executes dropped EXE
PID:1796 -
\??\c:\xbhnvh.exec:\xbhnvh.exe34⤵
- Executes dropped EXE
PID:2836 -
\??\c:\tlfpfrr.exec:\tlfpfrr.exe35⤵
- Executes dropped EXE
PID:2500 -
\??\c:\nxbvl.exec:\nxbvl.exe36⤵
- Executes dropped EXE
PID:2212 -
\??\c:\vppdh.exec:\vppdh.exe37⤵
- Executes dropped EXE
PID:2440 -
\??\c:\blvrhbh.exec:\blvrhbh.exe38⤵
- Executes dropped EXE
PID:2792 -
\??\c:\nxxpf.exec:\nxxpf.exe39⤵
- Executes dropped EXE
PID:2756 -
\??\c:\bptvb.exec:\bptvb.exe40⤵
- Executes dropped EXE
PID:2248 -
\??\c:\drrnjbb.exec:\drrnjbb.exe41⤵
- Executes dropped EXE
PID:1356 -
\??\c:\fxlhn.exec:\fxlhn.exe42⤵
- Executes dropped EXE
PID:2980 -
\??\c:\vrvpr.exec:\vrvpr.exe43⤵
- Executes dropped EXE
PID:2844 -
\??\c:\fdfnx.exec:\fdfnx.exe44⤵
- Executes dropped EXE
PID:2764 -
\??\c:\nbnjpr.exec:\nbnjpr.exe45⤵
- Executes dropped EXE
PID:2652 -
\??\c:\fvlfpx.exec:\fvlfpx.exe46⤵
- Executes dropped EXE
PID:1868 -
\??\c:\lfttnvh.exec:\lfttnvh.exe47⤵
- Executes dropped EXE
PID:1388 -
\??\c:\prlbn.exec:\prlbn.exe48⤵
- Executes dropped EXE
PID:1984 -
\??\c:\rddrnf.exec:\rddrnf.exe49⤵
- Executes dropped EXE
PID:2632 -
\??\c:\drrnth.exec:\drrnth.exe50⤵
- Executes dropped EXE
PID:1784 -
\??\c:\nxjxhnv.exec:\nxjxhnv.exe51⤵
- Executes dropped EXE
PID:1488 -
\??\c:\dfvlxpl.exec:\dfvlxpl.exe52⤵
- Executes dropped EXE
PID:1964 -
\??\c:\ljtxt.exec:\ljtxt.exe53⤵
- Executes dropped EXE
PID:1148 -
\??\c:\dpxtjvj.exec:\dpxtjvj.exe54⤵
- Executes dropped EXE
PID:2964 -
\??\c:\jvbfd.exec:\jvbfd.exe55⤵
- Executes dropped EXE
PID:2868 -
\??\c:\nxpvrhl.exec:\nxpvrhl.exe56⤵
- Executes dropped EXE
PID:2420 -
\??\c:\thbpjp.exec:\thbpjp.exe57⤵
- Executes dropped EXE
PID:1028 -
\??\c:\tjplb.exec:\tjplb.exe58⤵
- Executes dropped EXE
PID:2384 -
\??\c:\ttxtlpt.exec:\ttxtlpt.exe59⤵
- Executes dropped EXE
PID:1864 -
\??\c:\pdljt.exec:\pdljt.exe60⤵
- Executes dropped EXE
PID:616 -
\??\c:\lrllxf.exec:\lrllxf.exe61⤵
- Executes dropped EXE
PID:2548 -
\??\c:\drbxd.exec:\drbxd.exe62⤵
- Executes dropped EXE
PID:1872 -
\??\c:\xdvnxfx.exec:\xdvnxfx.exe63⤵
- Executes dropped EXE
PID:1736 -
\??\c:\dvnhtj.exec:\dvnhtj.exe64⤵
- Executes dropped EXE
PID:580 -
\??\c:\ttdrv.exec:\ttdrv.exe65⤵
- Executes dropped EXE
PID:888 -
\??\c:\fnjnxhn.exec:\fnjnxhn.exe66⤵PID:1672
-
\??\c:\htnbjj.exec:\htnbjj.exe67⤵PID:1248
-
\??\c:\tbrnfhb.exec:\tbrnfhb.exe68⤵PID:2116
-
\??\c:\hvfvln.exec:\hvfvln.exe69⤵PID:868
-
\??\c:\vrxpl.exec:\vrxpl.exe70⤵PID:2628
-
\??\c:\flbtj.exec:\flbtj.exe71⤵PID:1740
-
\??\c:\fpjhndb.exec:\fpjhndb.exe72⤵PID:2228
-
\??\c:\bpnhnvr.exec:\bpnhnvr.exe73⤵PID:832
-
\??\c:\hldxtdb.exec:\hldxtdb.exe74⤵PID:1972
-
\??\c:\dxddn.exec:\dxddn.exe75⤵PID:2600
-
\??\c:\ppbldvn.exec:\ppbldvn.exe76⤵PID:2396
-
\??\c:\xfxbpj.exec:\xfxbpj.exe77⤵PID:1576
-
\??\c:\vffnljf.exec:\vffnljf.exe78⤵PID:2744
-
\??\c:\lnnvdf.exec:\lnnvdf.exe79⤵PID:2520
-
\??\c:\xhphv.exec:\xhphv.exe80⤵
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\fljbb.exec:\fljbb.exe81⤵PID:2660
-
\??\c:\rnbtd.exec:\rnbtd.exe82⤵PID:2812
-
\??\c:\vdpvbt.exec:\vdpvbt.exe83⤵PID:2944
-
\??\c:\jflrfh.exec:\jflrfh.exe84⤵PID:2700
-
\??\c:\tbnlfp.exec:\tbnlfp.exe85⤵PID:2648
-
\??\c:\rfjjxxb.exec:\rfjjxxb.exe86⤵PID:2820
-
\??\c:\bjnvrt.exec:\bjnvrt.exe87⤵PID:2408
-
\??\c:\pddvl.exec:\pddvl.exe88⤵PID:2636
-
\??\c:\xdrbjtj.exec:\xdrbjtj.exe89⤵PID:1140
-
\??\c:\nnlxf.exec:\nnlxf.exe90⤵PID:1256
-
\??\c:\dbjfxj.exec:\dbjfxj.exe91⤵PID:1780
-
\??\c:\pdbxfbj.exec:\pdbxfbj.exe92⤵PID:2340
-
\??\c:\rjlbb.exec:\rjlbb.exe93⤵PID:660
-
\??\c:\tvxnfrf.exec:\tvxnfrf.exe94⤵PID:3004
-
\??\c:\xhjphb.exec:\xhjphb.exe95⤵PID:2864
-
\??\c:\lrnjxjb.exec:\lrnjxjb.exe96⤵PID:2324
-
\??\c:\tvjhpjv.exec:\tvjhpjv.exe97⤵PID:2360
-
\??\c:\bdrljfl.exec:\bdrljfl.exe98⤵PID:1476
-
\??\c:\pjrjnjb.exec:\pjrjnjb.exe99⤵PID:2256
-
\??\c:\vthpp.exec:\vthpp.exe100⤵PID:820
-
\??\c:\frlpv.exec:\frlpv.exe101⤵PID:1104
-
\??\c:\xdnfr.exec:\xdnfr.exe102⤵PID:1836
-
\??\c:\vbljbb.exec:\vbljbb.exe103⤵PID:960
-
\??\c:\xdvvpbf.exec:\xdvvpbf.exe104⤵PID:3000
-
\??\c:\ndfrhdd.exec:\ndfrhdd.exe105⤵PID:648
-
\??\c:\vdxdvpv.exec:\vdxdvpv.exe106⤵PID:264
-
\??\c:\jlnnfr.exec:\jlnnfr.exe107⤵PID:2260
-
\??\c:\dpvrn.exec:\dpvrn.exe108⤵PID:2240
-
\??\c:\bpdld.exec:\bpdld.exe109⤵PID:2524
-
\??\c:\tvdjx.exec:\tvdjx.exe110⤵PID:2372
-
\??\c:\tbdvfnd.exec:\tbdvfnd.exe111⤵PID:2064
-
\??\c:\phtfh.exec:\phtfh.exe112⤵PID:2036
-
\??\c:\hrrpnhb.exec:\hrrpnhb.exe113⤵PID:2984
-
\??\c:\hptjhv.exec:\hptjhv.exe114⤵PID:2620
-
\??\c:\plntjf.exec:\plntjf.exe115⤵PID:2492
-
\??\c:\vhjpvlt.exec:\vhjpvlt.exe116⤵PID:1800
-
\??\c:\rxxbl.exec:\rxxbl.exe117⤵PID:1564
-
\??\c:\thtljb.exec:\thtljb.exe118⤵PID:2900
-
\??\c:\nvdnx.exec:\nvdnx.exe119⤵PID:2916
-
\??\c:\pjhjb.exec:\pjhjb.exe120⤵PID:2784
-
\??\c:\jdjnxtb.exec:\jdjnxtb.exe121⤵PID:2248
-
\??\c:\jltrrd.exec:\jltrrd.exe122⤵PID:2196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-