Analysis
-
max time kernel
151s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe
-
Size
7.0MB
-
MD5
140d6af2f3437ac8739850591bc0bb30
-
SHA1
061d6e2da3e6dc2eca5c92ca11918a46b2bd98c6
-
SHA256
4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8
-
SHA512
2765392b8e3a5d42dab7e7c610821e89ad25f10b80d86085c703927e18ba0f0a7e34d202a2feabf18408c647479a26646f1c6bfa4ecc4e1bbb3c73d014f41748
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkxk8EZk:ymb3NkkiQ3mdBjFIkxkpZk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2824-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2184-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/952-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2172-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2056-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/396-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1516-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1580-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2840 vrxph.exe 2992 dxfdn.exe 2768 brbhxd.exe 1384 tdbrn.exe 2732 frllhpd.exe 2232 tljbtr.exe 1016 fphnxlb.exe 2184 vfljhlt.exe 2648 dvddj.exe 3020 tlbxxtp.exe 2144 vnftrpd.exe 1624 pdbxtj.exe 952 rdflnd.exe 2908 pjnfp.exe 1196 fpnrptr.exe 1232 vprdrlf.exe 2172 lbnxhpb.exe 2056 vjdnl.exe 2624 vrhrjdt.exe 608 jxfxxd.exe 1724 xdrdrj.exe 2300 tnnlhth.exe 396 bhtprll.exe 1352 phtfvvd.exe 1516 fbvnd.exe 1832 dprfndp.exe 2044 xnjhn.exe 964 bxvpf.exe 2664 xftxlp.exe 1636 thxhd.exe 1580 jldnjt.exe 2456 dhnjdlj.exe 2484 dhrdv.exe 2952 jjvtt.exe 2840 bntxprt.exe 2912 fvbdl.exe 1740 xhnrpd.exe 2728 nvddb.exe 2852 pxjjtjp.exe 2096 hhrrjtt.exe 2168 hpbxvnh.exe 2828 fpprbh.exe 2688 lhdxvb.exe 796 nxjlj.exe 2308 vtxbjl.exe 984 blxhdj.exe 1880 vvlfl.exe 2788 jfjvpt.exe 1808 bnljn.exe 2136 trbffrv.exe 940 lbdjdp.exe 1752 xxprppr.exe 2280 xtldjvd.exe 2260 hhlxxx.exe 2256 nlxdxhp.exe 2336 fxhvtr.exe 2244 jfdbthf.exe 1256 ttbjhr.exe 2272 jpjvfvf.exe 2480 trvfnh.exe 1496 lvjxn.exe 1820 tfdjxx.exe 1360 rfbbp.exe 1784 fpfbf.exe -
resource yara_rule behavioral1/memory/2824-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1016-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1016-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/952-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2172-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/396-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1516-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1580-305-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phtfvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnnjrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trbdld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrxph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbdjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhfjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prfhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rljhff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnxrpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrhprt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvblf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpnpnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjvxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrbblh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhnthjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvfhtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjpdpnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjbbnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfjvpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phrjbld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppbtrlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjrtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvtjbxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpttrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vldpxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrpbbjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxdnxrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prjnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnxrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnrxfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbdhrnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhrdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjrnrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxjjtjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dldxldx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nljxbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjpjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhbjjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbrvbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trvnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndjrvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxdxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptbtxrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnjvld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldphfbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdvjhvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfxlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phvtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpjfjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrrfjnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htpjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvdjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdptdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xftxlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxjxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxrrfvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvjfnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxrjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhrdv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2840 2824 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 29 PID 2824 wrote to memory of 2840 2824 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 29 PID 2824 wrote to memory of 2840 2824 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 29 PID 2824 wrote to memory of 2840 2824 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 29 PID 2840 wrote to memory of 2992 2840 vrxph.exe 30 PID 2840 wrote to memory of 2992 2840 vrxph.exe 30 PID 2840 wrote to memory of 2992 2840 vrxph.exe 30 PID 2840 wrote to memory of 2992 2840 vrxph.exe 30 PID 2992 wrote to memory of 2768 2992 dxfdn.exe 31 PID 2992 wrote to memory of 2768 2992 dxfdn.exe 31 PID 2992 wrote to memory of 2768 2992 dxfdn.exe 31 PID 2992 wrote to memory of 2768 2992 dxfdn.exe 31 PID 2768 wrote to memory of 1384 2768 brbhxd.exe 32 PID 2768 wrote to memory of 1384 2768 brbhxd.exe 32 PID 2768 wrote to memory of 1384 2768 brbhxd.exe 32 PID 2768 wrote to memory of 1384 2768 brbhxd.exe 32 PID 1384 wrote to memory of 2732 1384 tdbrn.exe 33 PID 1384 wrote to memory of 2732 1384 tdbrn.exe 33 PID 1384 wrote to memory of 2732 1384 tdbrn.exe 33 PID 1384 wrote to memory of 2732 1384 tdbrn.exe 33 PID 2732 wrote to memory of 2232 2732 frllhpd.exe 34 PID 2732 wrote to memory of 2232 2732 frllhpd.exe 34 PID 2732 wrote to memory of 2232 2732 frllhpd.exe 34 PID 2732 wrote to memory of 2232 2732 frllhpd.exe 34 PID 2232 wrote to memory of 1016 2232 tljbtr.exe 35 PID 2232 wrote to memory of 1016 2232 tljbtr.exe 35 PID 2232 wrote to memory of 1016 2232 tljbtr.exe 35 PID 2232 wrote to memory of 1016 2232 tljbtr.exe 35 PID 1016 wrote to memory of 2184 1016 fphnxlb.exe 36 PID 1016 wrote to memory of 2184 1016 fphnxlb.exe 36 PID 1016 wrote to memory of 2184 1016 fphnxlb.exe 36 PID 1016 wrote to memory of 2184 1016 fphnxlb.exe 36 PID 2184 wrote to memory of 2648 2184 vfljhlt.exe 37 PID 2184 wrote to memory of 2648 2184 vfljhlt.exe 37 PID 2184 wrote to memory of 2648 2184 vfljhlt.exe 37 PID 2184 wrote to memory of 2648 2184 vfljhlt.exe 37 PID 2648 wrote to memory of 3020 2648 dvddj.exe 38 PID 2648 wrote to memory of 3020 2648 dvddj.exe 38 PID 2648 wrote to memory of 3020 2648 dvddj.exe 38 PID 2648 wrote to memory of 3020 2648 dvddj.exe 38 PID 3020 wrote to memory of 2144 3020 tlbxxtp.exe 39 PID 3020 wrote to memory of 2144 3020 tlbxxtp.exe 39 PID 3020 wrote to memory of 2144 3020 tlbxxtp.exe 39 PID 3020 wrote to memory of 2144 3020 tlbxxtp.exe 39 PID 2144 wrote to memory of 1624 2144 vnftrpd.exe 40 PID 2144 wrote to memory of 1624 2144 vnftrpd.exe 40 PID 2144 wrote to memory of 1624 2144 vnftrpd.exe 40 PID 2144 wrote to memory of 1624 2144 vnftrpd.exe 40 PID 1624 wrote to memory of 952 1624 pdbxtj.exe 41 PID 1624 wrote to memory of 952 1624 pdbxtj.exe 41 PID 1624 wrote to memory of 952 1624 pdbxtj.exe 41 PID 1624 wrote to memory of 952 1624 pdbxtj.exe 41 PID 952 wrote to memory of 2908 952 rdflnd.exe 42 PID 952 wrote to memory of 2908 952 rdflnd.exe 42 PID 952 wrote to memory of 2908 952 rdflnd.exe 42 PID 952 wrote to memory of 2908 952 rdflnd.exe 42 PID 2908 wrote to memory of 1196 2908 pjnfp.exe 43 PID 2908 wrote to memory of 1196 2908 pjnfp.exe 43 PID 2908 wrote to memory of 1196 2908 pjnfp.exe 43 PID 2908 wrote to memory of 1196 2908 pjnfp.exe 43 PID 1196 wrote to memory of 1232 1196 fpnrptr.exe 44 PID 1196 wrote to memory of 1232 1196 fpnrptr.exe 44 PID 1196 wrote to memory of 1232 1196 fpnrptr.exe 44 PID 1196 wrote to memory of 1232 1196 fpnrptr.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe"C:\Users\Admin\AppData\Local\Temp\4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\vrxph.exec:\vrxph.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\dxfdn.exec:\dxfdn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\brbhxd.exec:\brbhxd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\tdbrn.exec:\tdbrn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
\??\c:\frllhpd.exec:\frllhpd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\tljbtr.exec:\tljbtr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\fphnxlb.exec:\fphnxlb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\vfljhlt.exec:\vfljhlt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\dvddj.exec:\dvddj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\tlbxxtp.exec:\tlbxxtp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vnftrpd.exec:\vnftrpd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\pdbxtj.exec:\pdbxtj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\rdflnd.exec:\rdflnd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\pjnfp.exec:\pjnfp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\fpnrptr.exec:\fpnrptr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\vprdrlf.exec:\vprdrlf.exe17⤵
- Executes dropped EXE
PID:1232 -
\??\c:\lbnxhpb.exec:\lbnxhpb.exe18⤵
- Executes dropped EXE
PID:2172 -
\??\c:\vjdnl.exec:\vjdnl.exe19⤵
- Executes dropped EXE
PID:2056 -
\??\c:\vrhrjdt.exec:\vrhrjdt.exe20⤵
- Executes dropped EXE
PID:2624 -
\??\c:\jxfxxd.exec:\jxfxxd.exe21⤵
- Executes dropped EXE
PID:608 -
\??\c:\xdrdrj.exec:\xdrdrj.exe22⤵
- Executes dropped EXE
PID:1724 -
\??\c:\tnnlhth.exec:\tnnlhth.exe23⤵
- Executes dropped EXE
PID:2300 -
\??\c:\bhtprll.exec:\bhtprll.exe24⤵
- Executes dropped EXE
PID:396 -
\??\c:\phtfvvd.exec:\phtfvvd.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1352 -
\??\c:\fbvnd.exec:\fbvnd.exe26⤵
- Executes dropped EXE
PID:1516 -
\??\c:\dprfndp.exec:\dprfndp.exe27⤵
- Executes dropped EXE
PID:1832 -
\??\c:\xnjhn.exec:\xnjhn.exe28⤵
- Executes dropped EXE
PID:2044 -
\??\c:\bxvpf.exec:\bxvpf.exe29⤵
- Executes dropped EXE
PID:964 -
\??\c:\xftxlp.exec:\xftxlp.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
\??\c:\thxhd.exec:\thxhd.exe31⤵
- Executes dropped EXE
PID:1636 -
\??\c:\jldnjt.exec:\jldnjt.exe32⤵
- Executes dropped EXE
PID:1580 -
\??\c:\dhnjdlj.exec:\dhnjdlj.exe33⤵
- Executes dropped EXE
PID:2456 -
\??\c:\dhrdv.exec:\dhrdv.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484 -
\??\c:\jjvtt.exec:\jjvtt.exe35⤵
- Executes dropped EXE
PID:2952 -
\??\c:\bntxprt.exec:\bntxprt.exe36⤵
- Executes dropped EXE
PID:2840 -
\??\c:\fvbdl.exec:\fvbdl.exe37⤵
- Executes dropped EXE
PID:2912 -
\??\c:\xhnrpd.exec:\xhnrpd.exe38⤵
- Executes dropped EXE
PID:1740 -
\??\c:\nvddb.exec:\nvddb.exe39⤵
- Executes dropped EXE
PID:2728 -
\??\c:\pxjjtjp.exec:\pxjjtjp.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852 -
\??\c:\hhrrjtt.exec:\hhrrjtt.exe41⤵
- Executes dropped EXE
PID:2096 -
\??\c:\hpbxvnh.exec:\hpbxvnh.exe42⤵
- Executes dropped EXE
PID:2168 -
\??\c:\fpprbh.exec:\fpprbh.exe43⤵
- Executes dropped EXE
PID:2828 -
\??\c:\lhdxvb.exec:\lhdxvb.exe44⤵
- Executes dropped EXE
PID:2688 -
\??\c:\nxjlj.exec:\nxjlj.exe45⤵
- Executes dropped EXE
PID:796 -
\??\c:\vtxbjl.exec:\vtxbjl.exe46⤵
- Executes dropped EXE
PID:2308 -
\??\c:\blxhdj.exec:\blxhdj.exe47⤵
- Executes dropped EXE
PID:984 -
\??\c:\vvlfl.exec:\vvlfl.exe48⤵
- Executes dropped EXE
PID:1880 -
\??\c:\jfjvpt.exec:\jfjvpt.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788 -
\??\c:\bnljn.exec:\bnljn.exe50⤵
- Executes dropped EXE
PID:1808 -
\??\c:\trbffrv.exec:\trbffrv.exe51⤵
- Executes dropped EXE
PID:2136 -
\??\c:\lbdjdp.exec:\lbdjdp.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:940 -
\??\c:\xxprppr.exec:\xxprppr.exe53⤵
- Executes dropped EXE
PID:1752 -
\??\c:\xtldjvd.exec:\xtldjvd.exe54⤵
- Executes dropped EXE
PID:2280 -
\??\c:\hhlxxx.exec:\hhlxxx.exe55⤵
- Executes dropped EXE
PID:2260 -
\??\c:\nlxdxhp.exec:\nlxdxhp.exe56⤵
- Executes dropped EXE
PID:2256 -
\??\c:\fxhvtr.exec:\fxhvtr.exe57⤵
- Executes dropped EXE
PID:2336 -
\??\c:\jfdbthf.exec:\jfdbthf.exe58⤵
- Executes dropped EXE
PID:2244 -
\??\c:\ttbjhr.exec:\ttbjhr.exe59⤵
- Executes dropped EXE
PID:1256 -
\??\c:\jpjvfvf.exec:\jpjvfvf.exe60⤵
- Executes dropped EXE
PID:2272 -
\??\c:\trvfnh.exec:\trvfnh.exe61⤵
- Executes dropped EXE
PID:2480 -
\??\c:\lvjxn.exec:\lvjxn.exe62⤵
- Executes dropped EXE
PID:1496 -
\??\c:\tfdjxx.exec:\tfdjxx.exe63⤵
- Executes dropped EXE
PID:1820 -
\??\c:\rfbbp.exec:\rfbbp.exe64⤵
- Executes dropped EXE
PID:1360 -
\??\c:\fpfbf.exec:\fpfbf.exe65⤵
- Executes dropped EXE
PID:1784 -
\??\c:\bdxfr.exec:\bdxfr.exe66⤵PID:1280
-
\??\c:\bfhttnl.exec:\bfhttnl.exe67⤵PID:2224
-
\??\c:\fpddx.exec:\fpddx.exe68⤵PID:1052
-
\??\c:\nndrf.exec:\nndrf.exe69⤵PID:1548
-
\??\c:\pbrvbf.exec:\pbrvbf.exe70⤵
- System Location Discovery: System Language Discovery
PID:2040 -
\??\c:\pbrxbvd.exec:\pbrxbvd.exe71⤵PID:2248
-
\??\c:\jnxbfx.exec:\jnxbfx.exe72⤵PID:2412
-
\??\c:\vvrnr.exec:\vvrnr.exe73⤵PID:752
-
\??\c:\xlfvb.exec:\xlfvb.exe74⤵PID:1596
-
\??\c:\jbxjjr.exec:\jbxjjr.exe75⤵PID:2860
-
\??\c:\lxlbhbp.exec:\lxlbhbp.exe76⤵PID:2888
-
\??\c:\hnxrpf.exec:\hnxrpf.exe77⤵
- System Location Discovery: System Language Discovery
PID:2872 -
\??\c:\rddjb.exec:\rddjb.exe78⤵PID:2988
-
\??\c:\bvpjhnv.exec:\bvpjhnv.exe79⤵PID:2756
-
\??\c:\rbdjp.exec:\rbdjp.exe80⤵PID:2868
-
\??\c:\vdxbrdd.exec:\vdxbrdd.exe81⤵PID:2936
-
\??\c:\vvdfb.exec:\vvdfb.exe82⤵PID:472
-
\??\c:\fhjbplr.exec:\fhjbplr.exe83⤵PID:2692
-
\??\c:\lrfxnjx.exec:\lrfxnjx.exe84⤵PID:1612
-
\??\c:\rthffx.exec:\rthffx.exe85⤵PID:2312
-
\??\c:\ftbvdv.exec:\ftbvdv.exe86⤵PID:2452
-
\??\c:\dlddbp.exec:\dlddbp.exe87⤵PID:1648
-
\??\c:\tpvrlxj.exec:\tpvrlxj.exe88⤵PID:2648
-
\??\c:\xxblplv.exec:\xxblplv.exe89⤵PID:2556
-
\??\c:\rtnnp.exec:\rtnnp.exe90⤵PID:2356
-
\??\c:\ttbhrvx.exec:\ttbhrvx.exe91⤵PID:1500
-
\??\c:\nthrbn.exec:\nthrbn.exe92⤵PID:784
-
\??\c:\nbttv.exec:\nbttv.exe93⤵PID:2304
-
\??\c:\fptflfx.exec:\fptflfx.exe94⤵PID:2220
-
\??\c:\lnhnbj.exec:\lnhnbj.exe95⤵PID:2136
-
\??\c:\lfrtvph.exec:\lfrtvph.exe96⤵PID:2596
-
\??\c:\hjvxb.exec:\hjvxb.exe97⤵
- System Location Discovery: System Language Discovery
PID:2192 -
\??\c:\ldlpxfx.exec:\ldlpxfx.exe98⤵PID:1748
-
\??\c:\vvlbxhr.exec:\vvlbxhr.exe99⤵PID:2080
-
\??\c:\xvjbvl.exec:\xvjbvl.exe100⤵PID:908
-
\??\c:\hrtnthv.exec:\hrtnthv.exe101⤵PID:1852
-
\??\c:\lphnt.exec:\lphnt.exe102⤵PID:2244
-
\??\c:\rndbdbl.exec:\rndbdbl.exe103⤵PID:1944
-
\??\c:\phrjbld.exec:\phrjbld.exe104⤵
- System Location Discovery: System Language Discovery
PID:976 -
\??\c:\rbjfdf.exec:\rbjfdf.exe105⤵PID:2812
-
\??\c:\ljdfjh.exec:\ljdfjh.exe106⤵PID:1496
-
\??\c:\dtfbbjj.exec:\dtfbbjj.exe107⤵PID:1352
-
\??\c:\xjtlfhr.exec:\xjtlfhr.exe108⤵PID:1360
-
\??\c:\xfvrdxp.exec:\xfvrdxp.exe109⤵PID:1856
-
\??\c:\nhpxnjj.exec:\nhpxnjj.exe110⤵PID:1280
-
\??\c:\vbddjf.exec:\vbddjf.exe111⤵PID:916
-
\??\c:\bxjxd.exec:\bxjxd.exe112⤵
- System Location Discovery: System Language Discovery
PID:840 -
\??\c:\frvfnh.exec:\frvfnh.exe113⤵PID:2616
-
\??\c:\plbtt.exec:\plbtt.exe114⤵PID:2040
-
\??\c:\fbbtxtt.exec:\fbbtxtt.exe115⤵PID:2248
-
\??\c:\prhrrd.exec:\prhrrd.exe116⤵PID:2500
-
\??\c:\vtlbfjb.exec:\vtlbfjb.exe117⤵PID:2456
-
\??\c:\lpvxrnj.exec:\lpvxrnj.exe118⤵PID:1596
-
\??\c:\pvtjbxb.exec:\pvtjbxb.exe119⤵
- System Location Discovery: System Language Discovery
PID:1836 -
\??\c:\dfvnx.exec:\dfvnx.exe120⤵PID:2888
-
\??\c:\vdljv.exec:\vdljv.exe121⤵PID:2872
-
\??\c:\hbfvr.exec:\hbfvr.exe122⤵PID:2988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-