Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe
Resource
win7-20241010-en
General
-
Target
37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe
-
Size
73KB
-
MD5
75ce39d43ef52bdf3215491a2e294a01
-
SHA1
a5fd26f0887dcbe3b07e039511c6d84839658891
-
SHA256
37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a
-
SHA512
d32db1f2f221aaee73a4bc7afdd531226357ab693689ad24e315aa0d6c2afde94c75b4fb4d432a4caa48b6e52fa60566ceab350533ca40b6a7d4ea170ca9971c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUPqrDZ5RxfVK5DTj:ymb3NkkiQ3mdBjF0yUmrfVcr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/1928-284-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1152-275-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/112-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1192-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1668-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1976-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1972-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2808-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/940-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/984-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-9-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2236 vrbhb.exe 2900 drdthx.exe 2096 rrjtn.exe 3068 rnfpfp.exe 2804 dbxhxj.exe 2820 lhjprp.exe 1744 jtjtdd.exe 592 bprpb.exe 984 hvdnbxf.exe 940 vtxbldd.exe 2808 ntvpv.exe 1972 rlfvx.exe 2932 xdlppdd.exe 1976 lnbtdlf.exe 2116 hlxtrxh.exe 2544 pbhff.exe 2524 tflfvt.exe 2424 fpxvtrh.exe 2432 xxddh.exe 2640 frtxx.exe 1668 trxltd.exe 792 xdptl.exe 1504 jprxhr.exe 1192 fnjdxj.exe 112 xxxjvvv.exe 2316 ptprl.exe 1152 fhhvlp.exe 1928 vtvhvjb.exe 1720 fpnpx.exe 928 nnftb.exe 2968 fxjjnh.exe 2984 btxbh.exe 2976 dvxxv.exe 1824 lvpxxn.exe 2556 ddlxv.exe 308 bxplf.exe 2672 nlldrjf.exe 2912 ndxlnx.exe 2620 xtlxnxx.exe 2604 nfrhnxx.exe 2824 bnhjj.exe 1936 bnhtfhd.exe 2068 rxflxhv.exe 588 tbtlpjt.exe 2692 ttxhxvn.exe 2188 vflrx.exe 1980 rvxxd.exe 2736 pbjnpr.exe 856 vtfbhlx.exe 836 fvhvnr.exe 612 dhddfp.exe 2252 jpptf.exe 2116 vhvpp.exe 1760 rxflhj.exe 2520 rljlhx.exe 1960 nfplhx.exe 1900 hxtxdf.exe 2160 hrxbtf.exe 2636 bpfdnvp.exe 236 bvpxdf.exe 1380 ntrhvd.exe 1552 vhphfnx.exe 676 hjbfvrl.exe 2668 jxfhbl.exe -
resource yara_rule behavioral1/memory/1928-284-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-275-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1192-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1668-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1976-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2808-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/940-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/984-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-10-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hddxvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhjhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfjdlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljhdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhrldhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvnfrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhxnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjxbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nllhll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldnfrpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrtdjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frnppl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbvxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlntj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhdhxnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbxrjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lddhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thxxvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpplf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtbnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtrhvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvndth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpffvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfhlhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpjfbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxnxxrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfdxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2236 2448 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 29 PID 2448 wrote to memory of 2236 2448 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 29 PID 2448 wrote to memory of 2236 2448 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 29 PID 2448 wrote to memory of 2236 2448 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 29 PID 2236 wrote to memory of 2900 2236 vrbhb.exe 30 PID 2236 wrote to memory of 2900 2236 vrbhb.exe 30 PID 2236 wrote to memory of 2900 2236 vrbhb.exe 30 PID 2236 wrote to memory of 2900 2236 vrbhb.exe 30 PID 2900 wrote to memory of 2096 2900 drdthx.exe 31 PID 2900 wrote to memory of 2096 2900 drdthx.exe 31 PID 2900 wrote to memory of 2096 2900 drdthx.exe 31 PID 2900 wrote to memory of 2096 2900 drdthx.exe 31 PID 2096 wrote to memory of 3068 2096 rrjtn.exe 32 PID 2096 wrote to memory of 3068 2096 rrjtn.exe 32 PID 2096 wrote to memory of 3068 2096 rrjtn.exe 32 PID 2096 wrote to memory of 3068 2096 rrjtn.exe 32 PID 3068 wrote to memory of 2804 3068 rnfpfp.exe 33 PID 3068 wrote to memory of 2804 3068 rnfpfp.exe 33 PID 3068 wrote to memory of 2804 3068 rnfpfp.exe 33 PID 3068 wrote to memory of 2804 3068 rnfpfp.exe 33 PID 2804 wrote to memory of 2820 2804 dbxhxj.exe 34 PID 2804 wrote to memory of 2820 2804 dbxhxj.exe 34 PID 2804 wrote to memory of 2820 2804 dbxhxj.exe 34 PID 2804 wrote to memory of 2820 2804 dbxhxj.exe 34 PID 2820 wrote to memory of 1744 2820 lhjprp.exe 35 PID 2820 wrote to memory of 1744 2820 lhjprp.exe 35 PID 2820 wrote to memory of 1744 2820 lhjprp.exe 35 PID 2820 wrote to memory of 1744 2820 lhjprp.exe 35 PID 1744 wrote to memory of 592 1744 jtjtdd.exe 36 PID 1744 wrote to memory of 592 1744 jtjtdd.exe 36 PID 1744 wrote to memory of 592 1744 jtjtdd.exe 36 PID 1744 wrote to memory of 592 1744 jtjtdd.exe 36 PID 592 wrote to memory of 984 592 bprpb.exe 37 PID 592 wrote to memory of 984 592 bprpb.exe 37 PID 592 wrote to memory of 984 592 bprpb.exe 37 PID 592 wrote to memory of 984 592 bprpb.exe 37 PID 984 wrote to memory of 940 984 hvdnbxf.exe 38 PID 984 wrote to memory of 940 984 hvdnbxf.exe 38 PID 984 wrote to memory of 940 984 hvdnbxf.exe 38 PID 984 wrote to memory of 940 984 hvdnbxf.exe 38 PID 940 wrote to memory of 2808 940 vtxbldd.exe 39 PID 940 wrote to memory of 2808 940 vtxbldd.exe 39 PID 940 wrote to memory of 2808 940 vtxbldd.exe 39 PID 940 wrote to memory of 2808 940 vtxbldd.exe 39 PID 2808 wrote to memory of 1972 2808 ntvpv.exe 40 PID 2808 wrote to memory of 1972 2808 ntvpv.exe 40 PID 2808 wrote to memory of 1972 2808 ntvpv.exe 40 PID 2808 wrote to memory of 1972 2808 ntvpv.exe 40 PID 1972 wrote to memory of 2932 1972 rlfvx.exe 41 PID 1972 wrote to memory of 2932 1972 rlfvx.exe 41 PID 1972 wrote to memory of 2932 1972 rlfvx.exe 41 PID 1972 wrote to memory of 2932 1972 rlfvx.exe 41 PID 2932 wrote to memory of 1976 2932 xdlppdd.exe 42 PID 2932 wrote to memory of 1976 2932 xdlppdd.exe 42 PID 2932 wrote to memory of 1976 2932 xdlppdd.exe 42 PID 2932 wrote to memory of 1976 2932 xdlppdd.exe 42 PID 1976 wrote to memory of 2116 1976 lnbtdlf.exe 81 PID 1976 wrote to memory of 2116 1976 lnbtdlf.exe 81 PID 1976 wrote to memory of 2116 1976 lnbtdlf.exe 81 PID 1976 wrote to memory of 2116 1976 lnbtdlf.exe 81 PID 2116 wrote to memory of 2544 2116 hlxtrxh.exe 44 PID 2116 wrote to memory of 2544 2116 hlxtrxh.exe 44 PID 2116 wrote to memory of 2544 2116 hlxtrxh.exe 44 PID 2116 wrote to memory of 2544 2116 hlxtrxh.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe"C:\Users\Admin\AppData\Local\Temp\37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\vrbhb.exec:\vrbhb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\drdthx.exec:\drdthx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\rrjtn.exec:\rrjtn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\rnfpfp.exec:\rnfpfp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\dbxhxj.exec:\dbxhxj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\lhjprp.exec:\lhjprp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\jtjtdd.exec:\jtjtdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\bprpb.exec:\bprpb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\hvdnbxf.exec:\hvdnbxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
\??\c:\vtxbldd.exec:\vtxbldd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\ntvpv.exec:\ntvpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\rlfvx.exec:\rlfvx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\xdlppdd.exec:\xdlppdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\lnbtdlf.exec:\lnbtdlf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\hlxtrxh.exec:\hlxtrxh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\pbhff.exec:\pbhff.exe17⤵
- Executes dropped EXE
PID:2544 -
\??\c:\tflfvt.exec:\tflfvt.exe18⤵
- Executes dropped EXE
PID:2524 -
\??\c:\fpxvtrh.exec:\fpxvtrh.exe19⤵
- Executes dropped EXE
PID:2424 -
\??\c:\xxddh.exec:\xxddh.exe20⤵
- Executes dropped EXE
PID:2432 -
\??\c:\frtxx.exec:\frtxx.exe21⤵
- Executes dropped EXE
PID:2640 -
\??\c:\trxltd.exec:\trxltd.exe22⤵
- Executes dropped EXE
PID:1668 -
\??\c:\xdptl.exec:\xdptl.exe23⤵
- Executes dropped EXE
PID:792 -
\??\c:\jprxhr.exec:\jprxhr.exe24⤵
- Executes dropped EXE
PID:1504 -
\??\c:\fnjdxj.exec:\fnjdxj.exe25⤵
- Executes dropped EXE
PID:1192 -
\??\c:\xxxjvvv.exec:\xxxjvvv.exe26⤵
- Executes dropped EXE
PID:112 -
\??\c:\ptprl.exec:\ptprl.exe27⤵
- Executes dropped EXE
PID:2316 -
\??\c:\fhhvlp.exec:\fhhvlp.exe28⤵
- Executes dropped EXE
PID:1152 -
\??\c:\vtvhvjb.exec:\vtvhvjb.exe29⤵
- Executes dropped EXE
PID:1928 -
\??\c:\fpnpx.exec:\fpnpx.exe30⤵
- Executes dropped EXE
PID:1720 -
\??\c:\nnftb.exec:\nnftb.exe31⤵
- Executes dropped EXE
PID:928 -
\??\c:\fxjjnh.exec:\fxjjnh.exe32⤵
- Executes dropped EXE
PID:2968 -
\??\c:\btxbh.exec:\btxbh.exe33⤵
- Executes dropped EXE
PID:2984 -
\??\c:\dvxxv.exec:\dvxxv.exe34⤵
- Executes dropped EXE
PID:2976 -
\??\c:\lvpxxn.exec:\lvpxxn.exe35⤵
- Executes dropped EXE
PID:1824 -
\??\c:\ddlxv.exec:\ddlxv.exe36⤵
- Executes dropped EXE
PID:2556 -
\??\c:\bxplf.exec:\bxplf.exe37⤵
- Executes dropped EXE
PID:308 -
\??\c:\nlldrjf.exec:\nlldrjf.exe38⤵
- Executes dropped EXE
PID:2672 -
\??\c:\ndxlnx.exec:\ndxlnx.exe39⤵
- Executes dropped EXE
PID:2912 -
\??\c:\xtlxnxx.exec:\xtlxnxx.exe40⤵
- Executes dropped EXE
PID:2620 -
\??\c:\nfrhnxx.exec:\nfrhnxx.exe41⤵
- Executes dropped EXE
PID:2604 -
\??\c:\bnhjj.exec:\bnhjj.exe42⤵
- Executes dropped EXE
PID:2824 -
\??\c:\bnhtfhd.exec:\bnhtfhd.exe43⤵
- Executes dropped EXE
PID:1936 -
\??\c:\rxflxhv.exec:\rxflxhv.exe44⤵
- Executes dropped EXE
PID:2068 -
\??\c:\tbtlpjt.exec:\tbtlpjt.exe45⤵
- Executes dropped EXE
PID:588 -
\??\c:\ttxhxvn.exec:\ttxhxvn.exe46⤵
- Executes dropped EXE
PID:2692 -
\??\c:\vflrx.exec:\vflrx.exe47⤵
- Executes dropped EXE
PID:2188 -
\??\c:\rvxxd.exec:\rvxxd.exe48⤵
- Executes dropped EXE
PID:1980 -
\??\c:\pbjnpr.exec:\pbjnpr.exe49⤵
- Executes dropped EXE
PID:2736 -
\??\c:\vtfbhlx.exec:\vtfbhlx.exe50⤵
- Executes dropped EXE
PID:856 -
\??\c:\fvhvnr.exec:\fvhvnr.exe51⤵
- Executes dropped EXE
PID:836 -
\??\c:\dhddfp.exec:\dhddfp.exe52⤵
- Executes dropped EXE
PID:612 -
\??\c:\jpptf.exec:\jpptf.exe53⤵
- Executes dropped EXE
PID:2252 -
\??\c:\vhvpp.exec:\vhvpp.exe54⤵
- Executes dropped EXE
PID:2116 -
\??\c:\rxflhj.exec:\rxflhj.exe55⤵
- Executes dropped EXE
PID:1760 -
\??\c:\rljlhx.exec:\rljlhx.exe56⤵
- Executes dropped EXE
PID:2520 -
\??\c:\nfplhx.exec:\nfplhx.exe57⤵
- Executes dropped EXE
PID:1960 -
\??\c:\hxtxdf.exec:\hxtxdf.exe58⤵
- Executes dropped EXE
PID:1900 -
\??\c:\hrxbtf.exec:\hrxbtf.exe59⤵
- Executes dropped EXE
PID:2160 -
\??\c:\bpfdnvp.exec:\bpfdnvp.exe60⤵
- Executes dropped EXE
PID:2636 -
\??\c:\bvpxdf.exec:\bvpxdf.exe61⤵
- Executes dropped EXE
PID:236 -
\??\c:\ntrhvd.exec:\ntrhvd.exe62⤵
- Executes dropped EXE
PID:1380 -
\??\c:\vhphfnx.exec:\vhphfnx.exe63⤵
- Executes dropped EXE
PID:1552 -
\??\c:\hjbfvrl.exec:\hjbfvrl.exe64⤵
- Executes dropped EXE
PID:676 -
\??\c:\jxfhbl.exec:\jxfhbl.exe65⤵
- Executes dropped EXE
PID:2668 -
\??\c:\bfplftl.exec:\bfplftl.exe66⤵PID:112
-
\??\c:\dxtlx.exec:\dxtlx.exe67⤵PID:2600
-
\??\c:\nxflbp.exec:\nxflbp.exe68⤵PID:1156
-
\??\c:\hprhv.exec:\hprhv.exe69⤵PID:2492
-
\??\c:\tlrbn.exec:\tlrbn.exe70⤵PID:752
-
\??\c:\ntjfpx.exec:\ntjfpx.exe71⤵PID:892
-
\??\c:\lljfflf.exec:\lljfflf.exe72⤵PID:2216
-
\??\c:\rvblxpj.exec:\rvblxpj.exe73⤵PID:2960
-
\??\c:\xftbx.exec:\xftbx.exe74⤵PID:2852
-
\??\c:\pfxdh.exec:\pfxdh.exe75⤵PID:3008
-
\??\c:\rtfvhvh.exec:\rtfvhvh.exe76⤵PID:2996
-
\??\c:\xfbhl.exec:\xfbhl.exe77⤵PID:2908
-
\??\c:\ffrhbd.exec:\ffrhbd.exe78⤵PID:2944
-
\??\c:\hbvxp.exec:\hbvxp.exe79⤵
- System Location Discovery: System Language Discovery
PID:2168 -
\??\c:\lftrl.exec:\lftrl.exe80⤵PID:2860
-
\??\c:\hrvbf.exec:\hrvbf.exe81⤵PID:2780
-
\??\c:\nflplr.exec:\nflplr.exe82⤵PID:2404
-
\??\c:\lpblfx.exec:\lpblfx.exe83⤵PID:2180
-
\??\c:\pjvxvf.exec:\pjvxvf.exe84⤵PID:868
-
\??\c:\xxldhtr.exec:\xxldhtr.exe85⤵PID:592
-
\??\c:\prntdt.exec:\prntdt.exe86⤵PID:1144
-
\??\c:\hpndrb.exec:\hpndrb.exe87⤵PID:1140
-
\??\c:\nnvhx.exec:\nnvhx.exe88⤵PID:2340
-
\??\c:\brvhvv.exec:\brvhvv.exe89⤵PID:1444
-
\??\c:\lxllrxj.exec:\lxllrxj.exe90⤵PID:2504
-
\??\c:\tftnl.exec:\tftnl.exe91⤵PID:1468
-
\??\c:\xfpjj.exec:\xfpjj.exe92⤵PID:840
-
\??\c:\lntnjff.exec:\lntnjff.exe93⤵PID:2308
-
\??\c:\bpdndl.exec:\bpdndl.exe94⤵PID:2200
-
\??\c:\lfttdln.exec:\lfttdln.exe95⤵PID:2280
-
\??\c:\xhxnh.exec:\xhxnh.exe96⤵
- System Location Discovery: System Language Discovery
PID:2288 -
\??\c:\hdrntlh.exec:\hdrntlh.exe97⤵PID:2476
-
\??\c:\tbxrrh.exec:\tbxrrh.exe98⤵PID:1844
-
\??\c:\bnxbvbb.exec:\bnxbvbb.exe99⤵PID:1096
-
\??\c:\jbjrl.exec:\jbjrl.exe100⤵PID:1848
-
\??\c:\vrbrx.exec:\vrbrx.exe101⤵PID:900
-
\??\c:\rhjvj.exec:\rhjvj.exe102⤵PID:1284
-
\??\c:\nhvfvpf.exec:\nhvfvpf.exe103⤵PID:1680
-
\??\c:\tjjfxbj.exec:\tjjfxbj.exe104⤵PID:1372
-
\??\c:\bhbhnj.exec:\bhbhnj.exe105⤵PID:2680
-
\??\c:\lhbdt.exec:\lhbdt.exe106⤵PID:1464
-
\??\c:\pvdthxf.exec:\pvdthxf.exe107⤵PID:2396
-
\??\c:\rptxvf.exec:\rptxvf.exe108⤵PID:2412
-
\??\c:\bdfrpx.exec:\bdfrpx.exe109⤵PID:1168
-
\??\c:\jfjpft.exec:\jfjpft.exe110⤵PID:1772
-
\??\c:\lrnhpjf.exec:\lrnhpjf.exe111⤵PID:2248
-
\??\c:\rvnlxrd.exec:\rvnlxrd.exe112⤵PID:2148
-
\??\c:\prrrpf.exec:\prrrpf.exe113⤵PID:1524
-
\??\c:\pvpdf.exec:\pvpdf.exe114⤵PID:2888
-
\??\c:\xjvjd.exec:\xjvjd.exe115⤵PID:1480
-
\??\c:\hlxxp.exec:\hlxxp.exe116⤵PID:2324
-
\??\c:\vtbnj.exec:\vtbnj.exe117⤵
- System Location Discovery: System Language Discovery
PID:1824 -
\??\c:\nnjfl.exec:\nnjfl.exe118⤵PID:2916
-
\??\c:\rfxhndn.exec:\rfxhndn.exe119⤵PID:308
-
\??\c:\lnlhx.exec:\lnlhx.exe120⤵PID:2616
-
\??\c:\fvbnp.exec:\fvbnp.exe121⤵PID:2804
-
\??\c:\hxvxhb.exec:\hxvxhb.exe122⤵PID:2648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-