Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 12:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
-
Size
298KB
-
MD5
c48150ae1df943cec9e198000905216a
-
SHA1
5291d5b56a928717af19a756cdacde64cd9c0fdd
-
SHA256
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb
-
SHA512
565c590c3a124b9016ee1fb2d0f3686146c0d1511f90c8825f1f3d83d5291b42b11a4f40e1d70444f5bd179688cf6b31b96557a5a4146ac48ff73cd5db1be379
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvU:n3C9uDVOXLmHBKWyn+PgvU
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2548-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1272-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2288-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1988-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2056-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1468-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1392-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/792-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/840-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1868-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1536-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1272 hpldpfh.exe 2928 jrtdvj.exe 2288 fthrjvd.exe 3000 trrxtbl.exe 1988 lnlxjdf.exe 2772 bbtrt.exe 2056 nllfft.exe 832 hhhbtlf.exe 1468 lftltn.exe 1392 phbtxlh.exe 2416 xtbrnvt.exe 2960 hxhhtx.exe 3052 bjjdjff.exe 2348 hfxhb.exe 792 vrnfxvd.exe 1768 fjddlb.exe 1524 jtrxjv.exe 2148 phdfl.exe 2440 thrlhxj.exe 2492 thfxb.exe 840 xtnlv.exe 2004 dpnfpd.exe 2140 nfvnh.exe 1868 nnfblbf.exe 680 dfjfr.exe 1536 nfphvd.exe 2664 frvjt.exe 1668 vnvtrh.exe 620 xbnfvx.exe 1680 xnpjbl.exe 804 brrjv.exe 2912 rxpjh.exe 2880 rptrdnb.exe 2916 tpbvxlp.exe 2904 bpdpvfl.exe 2996 xrpjdb.exe 3060 dprltdb.exe 3000 rxlnbt.exe 2760 lpfnh.exe 2836 nnbhh.exe 2756 nphlph.exe 1156 vnvrn.exe 2748 jrhjjxh.exe 836 nfhbhh.exe 1948 jxftpjr.exe 316 lrndhl.exe 1944 prfxl.exe 1120 tlbvjrr.exe 1352 vvfhvr.exe 2336 rxtvxj.exe 284 ldrbdh.exe 1872 vxpvbfl.exe 368 fhxlrl.exe 2408 ndrff.exe 2248 nlpxxlr.exe 2632 vlprp.exe 2068 frvrtb.exe 2188 pdnlhfp.exe 2132 vnfvtx.exe 840 tlvxnlj.exe 2016 dbhpvlv.exe 1508 bpvjj.exe 1932 vrxtxj.exe 1812 xjvbhxh.exe -
resource yara_rule behavioral1/memory/2548-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1272-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1988-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/832-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/832-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1468-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1392-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/792-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/840-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1868-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-270-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnnvpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjjxlnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbphbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtnhrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpbnfhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxdjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvrnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdtjbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhbjpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxtrbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnpxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trhhjhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxrvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjbndv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btxbpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trtnxnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbrdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpptjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfvhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnnbfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvflb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnjrfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlttpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pttjnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbvhxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbjbvvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rldjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxrpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1272 2548 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 2548 wrote to memory of 1272 2548 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 2548 wrote to memory of 1272 2548 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 2548 wrote to memory of 1272 2548 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 1272 wrote to memory of 2928 1272 hpldpfh.exe 31 PID 1272 wrote to memory of 2928 1272 hpldpfh.exe 31 PID 1272 wrote to memory of 2928 1272 hpldpfh.exe 31 PID 1272 wrote to memory of 2928 1272 hpldpfh.exe 31 PID 2928 wrote to memory of 2288 2928 jrtdvj.exe 32 PID 2928 wrote to memory of 2288 2928 jrtdvj.exe 32 PID 2928 wrote to memory of 2288 2928 jrtdvj.exe 32 PID 2928 wrote to memory of 2288 2928 jrtdvj.exe 32 PID 2288 wrote to memory of 3000 2288 fthrjvd.exe 33 PID 2288 wrote to memory of 3000 2288 fthrjvd.exe 33 PID 2288 wrote to memory of 3000 2288 fthrjvd.exe 33 PID 2288 wrote to memory of 3000 2288 fthrjvd.exe 33 PID 3000 wrote to memory of 1988 3000 trrxtbl.exe 34 PID 3000 wrote to memory of 1988 3000 trrxtbl.exe 34 PID 3000 wrote to memory of 1988 3000 trrxtbl.exe 34 PID 3000 wrote to memory of 1988 3000 trrxtbl.exe 34 PID 1988 wrote to memory of 2772 1988 lnlxjdf.exe 35 PID 1988 wrote to memory of 2772 1988 lnlxjdf.exe 35 PID 1988 wrote to memory of 2772 1988 lnlxjdf.exe 35 PID 1988 wrote to memory of 2772 1988 lnlxjdf.exe 35 PID 2772 wrote to memory of 2056 2772 bbtrt.exe 36 PID 2772 wrote to memory of 2056 2772 bbtrt.exe 36 PID 2772 wrote to memory of 2056 2772 bbtrt.exe 36 PID 2772 wrote to memory of 2056 2772 bbtrt.exe 36 PID 2056 wrote to memory of 832 2056 nllfft.exe 37 PID 2056 wrote to memory of 832 2056 nllfft.exe 37 PID 2056 wrote to memory of 832 2056 nllfft.exe 37 PID 2056 wrote to memory of 832 2056 nllfft.exe 37 PID 832 wrote to memory of 1468 832 hhhbtlf.exe 38 PID 832 wrote to memory of 1468 832 hhhbtlf.exe 38 PID 832 wrote to memory of 1468 832 hhhbtlf.exe 38 PID 832 wrote to memory of 1468 832 hhhbtlf.exe 38 PID 1468 wrote to memory of 1392 1468 lftltn.exe 39 PID 1468 wrote to memory of 1392 1468 lftltn.exe 39 PID 1468 wrote to memory of 1392 1468 lftltn.exe 39 PID 1468 wrote to memory of 1392 1468 lftltn.exe 39 PID 1392 wrote to memory of 2416 1392 phbtxlh.exe 40 PID 1392 wrote to memory of 2416 1392 phbtxlh.exe 40 PID 1392 wrote to memory of 2416 1392 phbtxlh.exe 40 PID 1392 wrote to memory of 2416 1392 phbtxlh.exe 40 PID 2416 wrote to memory of 2960 2416 xtbrnvt.exe 41 PID 2416 wrote to memory of 2960 2416 xtbrnvt.exe 41 PID 2416 wrote to memory of 2960 2416 xtbrnvt.exe 41 PID 2416 wrote to memory of 2960 2416 xtbrnvt.exe 41 PID 2960 wrote to memory of 3052 2960 hxhhtx.exe 42 PID 2960 wrote to memory of 3052 2960 hxhhtx.exe 42 PID 2960 wrote to memory of 3052 2960 hxhhtx.exe 42 PID 2960 wrote to memory of 3052 2960 hxhhtx.exe 42 PID 3052 wrote to memory of 2348 3052 bjjdjff.exe 43 PID 3052 wrote to memory of 2348 3052 bjjdjff.exe 43 PID 3052 wrote to memory of 2348 3052 bjjdjff.exe 43 PID 3052 wrote to memory of 2348 3052 bjjdjff.exe 43 PID 2348 wrote to memory of 792 2348 hfxhb.exe 44 PID 2348 wrote to memory of 792 2348 hfxhb.exe 44 PID 2348 wrote to memory of 792 2348 hfxhb.exe 44 PID 2348 wrote to memory of 792 2348 hfxhb.exe 44 PID 792 wrote to memory of 1768 792 vrnfxvd.exe 45 PID 792 wrote to memory of 1768 792 vrnfxvd.exe 45 PID 792 wrote to memory of 1768 792 vrnfxvd.exe 45 PID 792 wrote to memory of 1768 792 vrnfxvd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\hpldpfh.exec:\hpldpfh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\jrtdvj.exec:\jrtdvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\fthrjvd.exec:\fthrjvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\trrxtbl.exec:\trrxtbl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\lnlxjdf.exec:\lnlxjdf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\bbtrt.exec:\bbtrt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\nllfft.exec:\nllfft.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\hhhbtlf.exec:\hhhbtlf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
\??\c:\lftltn.exec:\lftltn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
\??\c:\phbtxlh.exec:\phbtxlh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
\??\c:\xtbrnvt.exec:\xtbrnvt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\hxhhtx.exec:\hxhhtx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\bjjdjff.exec:\bjjdjff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\hfxhb.exec:\hfxhb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\vrnfxvd.exec:\vrnfxvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
\??\c:\fjddlb.exec:\fjddlb.exe17⤵
- Executes dropped EXE
PID:1768 -
\??\c:\jtrxjv.exec:\jtrxjv.exe18⤵
- Executes dropped EXE
PID:1524 -
\??\c:\phdfl.exec:\phdfl.exe19⤵
- Executes dropped EXE
PID:2148 -
\??\c:\thrlhxj.exec:\thrlhxj.exe20⤵
- Executes dropped EXE
PID:2440 -
\??\c:\thfxb.exec:\thfxb.exe21⤵
- Executes dropped EXE
PID:2492 -
\??\c:\xtnlv.exec:\xtnlv.exe22⤵
- Executes dropped EXE
PID:840 -
\??\c:\dpnfpd.exec:\dpnfpd.exe23⤵
- Executes dropped EXE
PID:2004 -
\??\c:\nfvnh.exec:\nfvnh.exe24⤵
- Executes dropped EXE
PID:2140 -
\??\c:\nnfblbf.exec:\nnfblbf.exe25⤵
- Executes dropped EXE
PID:1868 -
\??\c:\dfjfr.exec:\dfjfr.exe26⤵
- Executes dropped EXE
PID:680 -
\??\c:\nfphvd.exec:\nfphvd.exe27⤵
- Executes dropped EXE
PID:1536 -
\??\c:\frvjt.exec:\frvjt.exe28⤵
- Executes dropped EXE
PID:2664 -
\??\c:\vnvtrh.exec:\vnvtrh.exe29⤵
- Executes dropped EXE
PID:1668 -
\??\c:\xbnfvx.exec:\xbnfvx.exe30⤵
- Executes dropped EXE
PID:620 -
\??\c:\xnpjbl.exec:\xnpjbl.exe31⤵
- Executes dropped EXE
PID:1680 -
\??\c:\brrjv.exec:\brrjv.exe32⤵
- Executes dropped EXE
PID:804 -
\??\c:\rxpjh.exec:\rxpjh.exe33⤵
- Executes dropped EXE
PID:2912 -
\??\c:\rptrdnb.exec:\rptrdnb.exe34⤵
- Executes dropped EXE
PID:2880 -
\??\c:\tpbvxlp.exec:\tpbvxlp.exe35⤵
- Executes dropped EXE
PID:2916 -
\??\c:\bpdpvfl.exec:\bpdpvfl.exe36⤵
- Executes dropped EXE
PID:2904 -
\??\c:\xrpjdb.exec:\xrpjdb.exe37⤵
- Executes dropped EXE
PID:2996 -
\??\c:\dprltdb.exec:\dprltdb.exe38⤵
- Executes dropped EXE
PID:3060 -
\??\c:\rxlnbt.exec:\rxlnbt.exe39⤵
- Executes dropped EXE
PID:3000 -
\??\c:\lpfnh.exec:\lpfnh.exe40⤵
- Executes dropped EXE
PID:2760 -
\??\c:\nnbhh.exec:\nnbhh.exe41⤵
- Executes dropped EXE
PID:2836 -
\??\c:\nphlph.exec:\nphlph.exe42⤵
- Executes dropped EXE
PID:2756 -
\??\c:\vnvrn.exec:\vnvrn.exe43⤵
- Executes dropped EXE
PID:1156 -
\??\c:\jrhjjxh.exec:\jrhjjxh.exe44⤵
- Executes dropped EXE
PID:2748 -
\??\c:\nfhbhh.exec:\nfhbhh.exe45⤵
- Executes dropped EXE
PID:836 -
\??\c:\jxftpjr.exec:\jxftpjr.exe46⤵
- Executes dropped EXE
PID:1948 -
\??\c:\lrndhl.exec:\lrndhl.exe47⤵
- Executes dropped EXE
PID:316 -
\??\c:\prfxl.exec:\prfxl.exe48⤵
- Executes dropped EXE
PID:1944 -
\??\c:\tlbvjrr.exec:\tlbvjrr.exe49⤵
- Executes dropped EXE
PID:1120 -
\??\c:\vvfhvr.exec:\vvfhvr.exe50⤵
- Executes dropped EXE
PID:1352 -
\??\c:\rxtvxj.exec:\rxtvxj.exe51⤵
- Executes dropped EXE
PID:2336 -
\??\c:\ldrbdh.exec:\ldrbdh.exe52⤵
- Executes dropped EXE
PID:284 -
\??\c:\vxpvbfl.exec:\vxpvbfl.exe53⤵
- Executes dropped EXE
PID:1872 -
\??\c:\fhxlrl.exec:\fhxlrl.exe54⤵
- Executes dropped EXE
PID:368 -
\??\c:\ndrff.exec:\ndrff.exe55⤵
- Executes dropped EXE
PID:2408 -
\??\c:\nlpxxlr.exec:\nlpxxlr.exe56⤵
- Executes dropped EXE
PID:2248 -
\??\c:\vlprp.exec:\vlprp.exe57⤵
- Executes dropped EXE
PID:2632 -
\??\c:\frvrtb.exec:\frvrtb.exe58⤵
- Executes dropped EXE
PID:2068 -
\??\c:\pdnlhfp.exec:\pdnlhfp.exe59⤵
- Executes dropped EXE
PID:2188 -
\??\c:\vnfvtx.exec:\vnfvtx.exe60⤵
- Executes dropped EXE
PID:2132 -
\??\c:\tlvxnlj.exec:\tlvxnlj.exe61⤵
- Executes dropped EXE
PID:840 -
\??\c:\dbhpvlv.exec:\dbhpvlv.exe62⤵
- Executes dropped EXE
PID:2016 -
\??\c:\bpvjj.exec:\bpvjj.exe63⤵
- Executes dropped EXE
PID:1508 -
\??\c:\vrxtxj.exec:\vrxtxj.exe64⤵
- Executes dropped EXE
PID:1932 -
\??\c:\xjvbhxh.exec:\xjvbhxh.exe65⤵
- Executes dropped EXE
PID:1812 -
\??\c:\hddvb.exec:\hddvb.exe66⤵PID:1544
-
\??\c:\rxddxhd.exec:\rxddxhd.exe67⤵PID:1536
-
\??\c:\nllbhld.exec:\nllbhld.exe68⤵PID:1060
-
\??\c:\hxrvnhr.exec:\hxrvnhr.exe69⤵PID:1028
-
\??\c:\dvhnld.exec:\dvhnld.exe70⤵PID:940
-
\??\c:\lfjhxx.exec:\lfjhxx.exe71⤵PID:772
-
\??\c:\vtrfx.exec:\vtrfx.exe72⤵PID:2616
-
\??\c:\trxjbtv.exec:\trxjbtv.exe73⤵PID:2244
-
\??\c:\hptvvtj.exec:\hptvvtj.exe74⤵PID:2976
-
\??\c:\tdnbxtj.exec:\tdnbxtj.exe75⤵PID:1620
-
\??\c:\ppjfvd.exec:\ppjfvd.exe76⤵PID:2896
-
\??\c:\tvxbt.exec:\tvxbt.exe77⤵PID:3020
-
\??\c:\ttpnpv.exec:\ttpnpv.exe78⤵PID:2964
-
\??\c:\bpdxfx.exec:\bpdxfx.exe79⤵PID:2796
-
\??\c:\bfdjnjt.exec:\bfdjnjt.exe80⤵PID:2944
-
\??\c:\ptplbdh.exec:\ptplbdh.exe81⤵PID:2828
-
\??\c:\rhfvl.exec:\rhfvl.exe82⤵PID:2552
-
\??\c:\ndjdl.exec:\ndjdl.exe83⤵PID:2424
-
\??\c:\dvftp.exec:\dvftp.exe84⤵PID:1388
-
\??\c:\nhlrlt.exec:\nhlrlt.exe85⤵PID:2352
-
\??\c:\lxdfdpp.exec:\lxdfdpp.exe86⤵PID:2252
-
\??\c:\nrrttdv.exec:\nrrttdv.exe87⤵PID:1828
-
\??\c:\nbnnbfn.exec:\nbnnbfn.exe88⤵
- System Location Discovery: System Language Discovery
PID:1952 -
\??\c:\ntpjtdh.exec:\ntpjtdh.exe89⤵PID:2860
-
\??\c:\nvvrnb.exec:\nvvrnb.exe90⤵PID:2960
-
\??\c:\tvljh.exec:\tvljh.exe91⤵PID:2024
-
\??\c:\plllvhb.exec:\plllvhb.exe92⤵PID:1800
-
\??\c:\xnhfph.exec:\xnhfph.exe93⤵PID:1540
-
\??\c:\vvjfb.exec:\vvjfb.exe94⤵PID:2184
-
\??\c:\lvrnf.exec:\lvrnf.exe95⤵
- System Location Discovery: System Language Discovery
PID:1768 -
\??\c:\vhrfrfp.exec:\vhrfrfp.exe96⤵PID:1204
-
\??\c:\pdvtx.exec:\pdvtx.exe97⤵PID:2236
-
\??\c:\hjjbdpb.exec:\hjjbdpb.exe98⤵PID:960
-
\??\c:\lptdv.exec:\lptdv.exe99⤵PID:904
-
\??\c:\xlvvdj.exec:\xlvvdj.exe100⤵PID:1636
-
\??\c:\vdptrbb.exec:\vdptrbb.exe101⤵PID:864
-
\??\c:\rbnvrn.exec:\rbnvrn.exe102⤵PID:2572
-
\??\c:\lhbjpn.exec:\lhbjpn.exe103⤵
- System Location Discovery: System Language Discovery
PID:2228 -
\??\c:\jvlnlh.exec:\jvlnlh.exe104⤵PID:1052
-
\??\c:\bddnprl.exec:\bddnprl.exe105⤵PID:1284
-
\??\c:\nptdhln.exec:\nptdhln.exe106⤵PID:1172
-
\??\c:\pxdbvnb.exec:\pxdbvnb.exe107⤵PID:1300
-
\??\c:\brpnl.exec:\brpnl.exe108⤵PID:816
-
\??\c:\bpdlt.exec:\bpdlt.exe109⤵PID:2008
-
\??\c:\rnbxpb.exec:\rnbxpb.exe110⤵PID:1332
-
\??\c:\hfjdt.exec:\hfjdt.exe111⤵PID:2320
-
\??\c:\flptdl.exec:\flptdl.exe112⤵PID:2076
-
\??\c:\ndxvd.exec:\ndxvd.exe113⤵PID:2616
-
\??\c:\bhlrht.exec:\bhlrht.exe114⤵PID:2620
-
\??\c:\hxnbd.exec:\hxnbd.exe115⤵PID:1708
-
\??\c:\vbjrhf.exec:\vbjrhf.exe116⤵PID:3036
-
\??\c:\dxbtjh.exec:\dxbtjh.exe117⤵PID:568
-
\??\c:\tblfjj.exec:\tblfjj.exe118⤵PID:1048
-
\??\c:\fjhvv.exec:\fjhvv.exe119⤵PID:2792
-
\??\c:\dtfbvd.exec:\dtfbvd.exe120⤵PID:536
-
\??\c:\xtrrtl.exec:\xtrrtl.exe121⤵PID:2788
-
\??\c:\pjnnfvr.exec:\pjnnfvr.exe122⤵PID:2992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-