Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe
Resource
win7-20240704-en
General
-
Target
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe
-
Size
590KB
-
MD5
b99d38b0727cd3aa4179792df9f2aada
-
SHA1
eceed0c49b6fd652aea1964a521735379dce2013
-
SHA256
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e
-
SHA512
9db1905ac72d899ddcc8eb23560b661e06ee0ec7465b9b991e55bc9b86eeb60706f4635ac3f1fe1082b2c71bc6877bf56b625666fe4a9e2bba7c901af16c1e8d
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayu:n3C9Lebz+xt4vFeFmgayu
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1800-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1912-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3004-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2620-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2736-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1384-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/808-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/744-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/752-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2016-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1788-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1964-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/880-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
xjdlpnn.exeltxxh.exehrxnn.exerjvhr.exetfjdx.exejbjtbh.exexnpljlj.exelvdhfrr.exevtbhp.exepvjjrn.exextvpb.exeptjfvbd.exernljf.exexjhvn.exephxhpx.exebvjxv.exednddr.exexxpllvp.exepjfjjv.exetfhbt.exedrdrd.exejbjrphn.exehxbjblx.exebtdprfj.exeptvffbl.exeppnvrj.exebjjthjh.exefxlbjhn.exetltfjfh.exerbbljb.exervjnnvp.exelrvjxfl.exetxjhr.exedvnfht.exefpvrrh.exetblxx.exepvbvj.exehdpfhb.exebrpxp.exehpdjb.exehdjlnfx.exexhlrvjr.exefrnxvj.exebjrjht.exejjddvbx.exeldnrx.exehxprjd.exebhhjnf.exevltnlnv.exelndnb.exefrtdn.exehfprph.exejtbrtxv.exebdjxrj.exefxtdbh.exebrvflt.exebtfhr.exepfvfr.exexdthrnf.exefbflr.exerjjnrt.exepbbpnrd.exejjdldl.exetpffbn.exepid process 1800 xjdlpnn.exe 1912 ltxxh.exe 2864 hrxnn.exe 3004 rjvhr.exe 2940 tfjdx.exe 2904 jbjtbh.exe 2760 xnpljlj.exe 2620 lvdhfrr.exe 2352 vtbhp.exe 2736 pvjjrn.exe 1724 xtvpb.exe 1384 ptjfvbd.exe 2952 rnljf.exe 772 xjhvn.exe 2976 phxhpx.exe 868 bvjxv.exe 524 dnddr.exe 2220 xxpllvp.exe 2156 pjfjjv.exe 1992 tfhbt.exe 1956 drdrd.exe 808 jbjrphn.exe 744 hxbjblx.exe 940 btdprfj.exe 752 ptvffbl.exe 2720 ppnvrj.exe 2444 bjjthjh.exe 2016 fxlbjhn.exe 1788 tltfjfh.exe 1964 rbbljb.exe 880 rvjnnvp.exe 2024 lrvjxfl.exe 1344 txjhr.exe 2276 dvnfht.exe 2732 fpvrrh.exe 2836 tblxx.exe 2764 pvbvj.exe 2908 hdpfhb.exe 1640 brpxp.exe 2860 hpdjb.exe 1660 hdjlnfx.exe 2716 xhlrvjr.exe 1920 frnxvj.exe 2760 bjrjht.exe 2116 jjddvbx.exe 2272 ldnrx.exe 692 hxprjd.exe 2560 bhhjnf.exe 2964 vltnlnv.exe 1512 lndnb.exe 2420 frtdn.exe 2256 hfprph.exe 1628 jtbrtxv.exe 2976 bdjxrj.exe 908 fxtdbh.exe 2224 brvflt.exe 2200 btfhr.exe 1984 pfvfr.exe 2172 xdthrnf.exe 1736 fbflr.exe 1956 rjjnrt.exe 1572 pbbpnrd.exe 2216 jjdldl.exe 1532 tpffbn.exe -
Processes:
resource yara_rule behavioral1/memory/2296-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1800-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1384-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/808-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/744-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/752-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2016-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1788-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1964-295-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/880-304-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
tnvdvf.exexvdjfb.exeflplnnx.exepfdnl.exebrdvndp.exerfnbrpb.exehfdlhf.exevvbnbp.exexnbdld.exelvnhnrf.exebhhjnf.exebxxnx.exebdfrdjv.exeplfftv.exehjrxnf.exejnrnf.exebrbrjj.exertpjbrd.exefhxbf.exejvnxl.exeflplfxj.exerxxrp.exenlrdf.exexvddx.exejfplbt.exendnjj.exedvjlx.exefbdxrn.exebhnhn.exevnnvdb.exedpjjl.exerpthh.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnvdvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvdjfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flplnnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfdnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brdvndp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfnbrpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfdlhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvbnbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnbdld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvnhnrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhjnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxxnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdfrdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plfftv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjrxnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnrnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brbrjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtpjbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhxbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvnxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flplfxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlrdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvddx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfplbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndnjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbdxrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnnvdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exexjdlpnn.exeltxxh.exehrxnn.exerjvhr.exetfjdx.exejbjtbh.exexnpljlj.exelvdhfrr.exevtbhp.exepvjjrn.exextvpb.exeptjfvbd.exernljf.exexjhvn.exephxhpx.exedescription pid process target process PID 2296 wrote to memory of 1800 2296 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe xjdlpnn.exe PID 2296 wrote to memory of 1800 2296 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe xjdlpnn.exe PID 2296 wrote to memory of 1800 2296 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe xjdlpnn.exe PID 2296 wrote to memory of 1800 2296 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe xjdlpnn.exe PID 1800 wrote to memory of 1912 1800 xjdlpnn.exe ltxxh.exe PID 1800 wrote to memory of 1912 1800 xjdlpnn.exe ltxxh.exe PID 1800 wrote to memory of 1912 1800 xjdlpnn.exe ltxxh.exe PID 1800 wrote to memory of 1912 1800 xjdlpnn.exe ltxxh.exe PID 1912 wrote to memory of 2864 1912 ltxxh.exe hrxnn.exe PID 1912 wrote to memory of 2864 1912 ltxxh.exe hrxnn.exe PID 1912 wrote to memory of 2864 1912 ltxxh.exe hrxnn.exe PID 1912 wrote to memory of 2864 1912 ltxxh.exe hrxnn.exe PID 2864 wrote to memory of 3004 2864 hrxnn.exe rjvhr.exe PID 2864 wrote to memory of 3004 2864 hrxnn.exe rjvhr.exe PID 2864 wrote to memory of 3004 2864 hrxnn.exe rjvhr.exe PID 2864 wrote to memory of 3004 2864 hrxnn.exe rjvhr.exe PID 3004 wrote to memory of 2940 3004 rjvhr.exe tfjdx.exe PID 3004 wrote to memory of 2940 3004 rjvhr.exe tfjdx.exe PID 3004 wrote to memory of 2940 3004 rjvhr.exe tfjdx.exe PID 3004 wrote to memory of 2940 3004 rjvhr.exe tfjdx.exe PID 2940 wrote to memory of 2904 2940 tfjdx.exe jbjtbh.exe PID 2940 wrote to memory of 2904 2940 tfjdx.exe jbjtbh.exe PID 2940 wrote to memory of 2904 2940 tfjdx.exe jbjtbh.exe PID 2940 wrote to memory of 2904 2940 tfjdx.exe jbjtbh.exe PID 2904 wrote to memory of 2760 2904 jbjtbh.exe xnpljlj.exe PID 2904 wrote to memory of 2760 2904 jbjtbh.exe xnpljlj.exe PID 2904 wrote to memory of 2760 2904 jbjtbh.exe xnpljlj.exe PID 2904 wrote to memory of 2760 2904 jbjtbh.exe xnpljlj.exe PID 2760 wrote to memory of 2620 2760 xnpljlj.exe lvdhfrr.exe PID 2760 wrote to memory of 2620 2760 xnpljlj.exe lvdhfrr.exe PID 2760 wrote to memory of 2620 2760 xnpljlj.exe lvdhfrr.exe PID 2760 wrote to memory of 2620 2760 xnpljlj.exe lvdhfrr.exe PID 2620 wrote to memory of 2352 2620 lvdhfrr.exe vtbhp.exe PID 2620 wrote to memory of 2352 2620 lvdhfrr.exe vtbhp.exe PID 2620 wrote to memory of 2352 2620 lvdhfrr.exe vtbhp.exe PID 2620 wrote to memory of 2352 2620 lvdhfrr.exe vtbhp.exe PID 2352 wrote to memory of 2736 2352 vtbhp.exe pvjjrn.exe PID 2352 wrote to memory of 2736 2352 vtbhp.exe pvjjrn.exe PID 2352 wrote to memory of 2736 2352 vtbhp.exe pvjjrn.exe PID 2352 wrote to memory of 2736 2352 vtbhp.exe pvjjrn.exe PID 2736 wrote to memory of 1724 2736 pvjjrn.exe xtvpb.exe PID 2736 wrote to memory of 1724 2736 pvjjrn.exe xtvpb.exe PID 2736 wrote to memory of 1724 2736 pvjjrn.exe xtvpb.exe PID 2736 wrote to memory of 1724 2736 pvjjrn.exe xtvpb.exe PID 1724 wrote to memory of 1384 1724 xtvpb.exe ptjfvbd.exe PID 1724 wrote to memory of 1384 1724 xtvpb.exe ptjfvbd.exe PID 1724 wrote to memory of 1384 1724 xtvpb.exe ptjfvbd.exe PID 1724 wrote to memory of 1384 1724 xtvpb.exe ptjfvbd.exe PID 1384 wrote to memory of 2952 1384 ptjfvbd.exe rnljf.exe PID 1384 wrote to memory of 2952 1384 ptjfvbd.exe rnljf.exe PID 1384 wrote to memory of 2952 1384 ptjfvbd.exe rnljf.exe PID 1384 wrote to memory of 2952 1384 ptjfvbd.exe rnljf.exe PID 2952 wrote to memory of 772 2952 rnljf.exe xjhvn.exe PID 2952 wrote to memory of 772 2952 rnljf.exe xjhvn.exe PID 2952 wrote to memory of 772 2952 rnljf.exe xjhvn.exe PID 2952 wrote to memory of 772 2952 rnljf.exe xjhvn.exe PID 772 wrote to memory of 2976 772 xjhvn.exe phxhpx.exe PID 772 wrote to memory of 2976 772 xjhvn.exe phxhpx.exe PID 772 wrote to memory of 2976 772 xjhvn.exe phxhpx.exe PID 772 wrote to memory of 2976 772 xjhvn.exe phxhpx.exe PID 2976 wrote to memory of 868 2976 phxhpx.exe bvjxv.exe PID 2976 wrote to memory of 868 2976 phxhpx.exe bvjxv.exe PID 2976 wrote to memory of 868 2976 phxhpx.exe bvjxv.exe PID 2976 wrote to memory of 868 2976 phxhpx.exe bvjxv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe"C:\Users\Admin\AppData\Local\Temp\f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
\??\c:\xjdlpnn.exec:\xjdlpnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\ltxxh.exec:\ltxxh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\hrxnn.exec:\hrxnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\rjvhr.exec:\rjvhr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\tfjdx.exec:\tfjdx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\jbjtbh.exec:\jbjtbh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\xnpljlj.exec:\xnpljlj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\lvdhfrr.exec:\lvdhfrr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\vtbhp.exec:\vtbhp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\pvjjrn.exec:\pvjjrn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\xtvpb.exec:\xtvpb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\ptjfvbd.exec:\ptjfvbd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
\??\c:\rnljf.exec:\rnljf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\xjhvn.exec:\xjhvn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\phxhpx.exec:\phxhpx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\bvjxv.exec:\bvjxv.exe17⤵
- Executes dropped EXE
PID:868 -
\??\c:\dnddr.exec:\dnddr.exe18⤵
- Executes dropped EXE
PID:524 -
\??\c:\xxpllvp.exec:\xxpllvp.exe19⤵
- Executes dropped EXE
PID:2220 -
\??\c:\pjfjjv.exec:\pjfjjv.exe20⤵
- Executes dropped EXE
PID:2156 -
\??\c:\tfhbt.exec:\tfhbt.exe21⤵
- Executes dropped EXE
PID:1992 -
\??\c:\drdrd.exec:\drdrd.exe22⤵
- Executes dropped EXE
PID:1956 -
\??\c:\jbjrphn.exec:\jbjrphn.exe23⤵
- Executes dropped EXE
PID:808 -
\??\c:\hxbjblx.exec:\hxbjblx.exe24⤵
- Executes dropped EXE
PID:744 -
\??\c:\btdprfj.exec:\btdprfj.exe25⤵
- Executes dropped EXE
PID:940 -
\??\c:\ptvffbl.exec:\ptvffbl.exe26⤵
- Executes dropped EXE
PID:752 -
\??\c:\ppnvrj.exec:\ppnvrj.exe27⤵
- Executes dropped EXE
PID:2720 -
\??\c:\bjjthjh.exec:\bjjthjh.exe28⤵
- Executes dropped EXE
PID:2444 -
\??\c:\fxlbjhn.exec:\fxlbjhn.exe29⤵
- Executes dropped EXE
PID:2016 -
\??\c:\tltfjfh.exec:\tltfjfh.exe30⤵
- Executes dropped EXE
PID:1788 -
\??\c:\rbbljb.exec:\rbbljb.exe31⤵
- Executes dropped EXE
PID:1964 -
\??\c:\rvjnnvp.exec:\rvjnnvp.exe32⤵
- Executes dropped EXE
PID:880 -
\??\c:\lrvjxfl.exec:\lrvjxfl.exe33⤵
- Executes dropped EXE
PID:2024 -
\??\c:\txjhr.exec:\txjhr.exe34⤵
- Executes dropped EXE
PID:1344 -
\??\c:\dvnfht.exec:\dvnfht.exe35⤵
- Executes dropped EXE
PID:2276 -
\??\c:\fpvrrh.exec:\fpvrrh.exe36⤵
- Executes dropped EXE
PID:2732 -
\??\c:\tblxx.exec:\tblxx.exe37⤵
- Executes dropped EXE
PID:2836 -
\??\c:\pvbvj.exec:\pvbvj.exe38⤵
- Executes dropped EXE
PID:2764 -
\??\c:\hdpfhb.exec:\hdpfhb.exe39⤵
- Executes dropped EXE
PID:2908 -
\??\c:\brpxp.exec:\brpxp.exe40⤵
- Executes dropped EXE
PID:1640 -
\??\c:\hpdjb.exec:\hpdjb.exe41⤵
- Executes dropped EXE
PID:2860 -
\??\c:\hdjlnfx.exec:\hdjlnfx.exe42⤵
- Executes dropped EXE
PID:1660 -
\??\c:\xhlrvjr.exec:\xhlrvjr.exe43⤵
- Executes dropped EXE
PID:2716 -
\??\c:\frnxvj.exec:\frnxvj.exe44⤵
- Executes dropped EXE
PID:1920 -
\??\c:\bjrjht.exec:\bjrjht.exe45⤵
- Executes dropped EXE
PID:2760 -
\??\c:\jjddvbx.exec:\jjddvbx.exe46⤵
- Executes dropped EXE
PID:2116 -
\??\c:\ldnrx.exec:\ldnrx.exe47⤵
- Executes dropped EXE
PID:2272 -
\??\c:\hxprjd.exec:\hxprjd.exe48⤵
- Executes dropped EXE
PID:692 -
\??\c:\bhhjnf.exec:\bhhjnf.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2560 -
\??\c:\vltnlnv.exec:\vltnlnv.exe50⤵
- Executes dropped EXE
PID:2964 -
\??\c:\lndnb.exec:\lndnb.exe51⤵
- Executes dropped EXE
PID:1512 -
\??\c:\frtdn.exec:\frtdn.exe52⤵
- Executes dropped EXE
PID:2420 -
\??\c:\hfprph.exec:\hfprph.exe53⤵
- Executes dropped EXE
PID:2256 -
\??\c:\jtbrtxv.exec:\jtbrtxv.exe54⤵
- Executes dropped EXE
PID:1628 -
\??\c:\bdjxrj.exec:\bdjxrj.exe55⤵
- Executes dropped EXE
PID:2976 -
\??\c:\fxtdbh.exec:\fxtdbh.exe56⤵
- Executes dropped EXE
PID:908 -
\??\c:\brvflt.exec:\brvflt.exe57⤵
- Executes dropped EXE
PID:2224 -
\??\c:\btfhr.exec:\btfhr.exe58⤵
- Executes dropped EXE
PID:2200 -
\??\c:\pfvfr.exec:\pfvfr.exe59⤵
- Executes dropped EXE
PID:1984 -
\??\c:\xdthrnf.exec:\xdthrnf.exe60⤵
- Executes dropped EXE
PID:2172 -
\??\c:\fbflr.exec:\fbflr.exe61⤵
- Executes dropped EXE
PID:1736 -
\??\c:\rjjnrt.exec:\rjjnrt.exe62⤵
- Executes dropped EXE
PID:1956 -
\??\c:\pbbpnrd.exec:\pbbpnrd.exe63⤵
- Executes dropped EXE
PID:1572 -
\??\c:\jjdldl.exec:\jjdldl.exe64⤵
- Executes dropped EXE
PID:2216 -
\??\c:\tpffbn.exec:\tpffbn.exe65⤵
- Executes dropped EXE
PID:1532 -
\??\c:\vdjfdlj.exec:\vdjfdlj.exe66⤵PID:1492
-
\??\c:\bdjnhp.exec:\bdjnhp.exe67⤵PID:560
-
\??\c:\xpvtf.exec:\xpvtf.exe68⤵PID:1260
-
\??\c:\bjtfdn.exec:\bjtfdn.exe69⤵PID:1744
-
\??\c:\rbvjp.exec:\rbvjp.exe70⤵PID:3060
-
\??\c:\xnfxnnj.exec:\xnfxnnj.exe71⤵PID:864
-
\??\c:\dnrxlf.exec:\dnrxlf.exe72⤵PID:2460
-
\??\c:\lrdtftb.exec:\lrdtftb.exe73⤵PID:2484
-
\??\c:\dpvtjhp.exec:\dpvtjhp.exe74⤵PID:1896
-
\??\c:\vlfbhfd.exec:\vlfbhfd.exe75⤵PID:2024
-
\??\c:\xhtnn.exec:\xhtnn.exe76⤵PID:1584
-
\??\c:\ldnpvh.exec:\ldnpvh.exe77⤵PID:1664
-
\??\c:\jddlhfr.exec:\jddlhfr.exe78⤵PID:1912
-
\??\c:\htllxfn.exec:\htllxfn.exe79⤵PID:2884
-
\??\c:\vrpbpnl.exec:\vrpbpnl.exe80⤵PID:3008
-
\??\c:\pjtnxt.exec:\pjtnxt.exe81⤵PID:2948
-
\??\c:\fbbxrbn.exec:\fbbxrbn.exe82⤵PID:2572
-
\??\c:\thhrfvn.exec:\thhrfvn.exe83⤵PID:2640
-
\??\c:\xlvxbr.exec:\xlvxbr.exe84⤵PID:2668
-
\??\c:\pfnljrf.exec:\pfnljrf.exe85⤵PID:2124
-
\??\c:\lhxrtxt.exec:\lhxrtxt.exe86⤵PID:2064
-
\??\c:\bbbbp.exec:\bbbbp.exe87⤵PID:2620
-
\??\c:\jvjvv.exec:\jvjvv.exe88⤵PID:2320
-
\??\c:\xrvvr.exec:\xrvvr.exe89⤵PID:2280
-
\??\c:\xlvrr.exec:\xlvrr.exe90⤵PID:2728
-
\??\c:\fxxdnj.exec:\fxxdnj.exe91⤵PID:1036
-
\??\c:\dpbvpjj.exec:\dpbvpjj.exe92⤵PID:1608
-
\??\c:\lxjjl.exec:\lxjjl.exe93⤵PID:1780
-
\??\c:\dnhbbpb.exec:\dnhbbpb.exe94⤵PID:1620
-
\??\c:\rvnpvt.exec:\rvnpvt.exe95⤵PID:2968
-
\??\c:\jlffbrn.exec:\jlffbrn.exe96⤵PID:1092
-
\??\c:\rxxrp.exec:\rxxrp.exe97⤵
- System Location Discovery: System Language Discovery
PID:432 -
\??\c:\thrnx.exec:\thrnx.exe98⤵PID:3016
-
\??\c:\ljnlltl.exec:\ljnlltl.exe99⤵PID:3036
-
\??\c:\htpbd.exec:\htpbd.exe100⤵PID:2092
-
\??\c:\tvtrtth.exec:\tvtrtth.exe101⤵PID:2488
-
\??\c:\xvbvf.exec:\xvbvf.exe102⤵PID:2176
-
\??\c:\nrphndb.exec:\nrphndb.exe103⤵PID:1304
-
\??\c:\pfrttdb.exec:\pfrttdb.exe104⤵PID:2228
-
\??\c:\xhvdl.exec:\xhvdl.exe105⤵PID:2608
-
\??\c:\pljxfh.exec:\pljxfh.exe106⤵PID:272
-
\??\c:\lrvhtp.exec:\lrvhtp.exe107⤵PID:1336
-
\??\c:\pbtjph.exec:\pbtjph.exe108⤵PID:2324
-
\??\c:\vjjfvt.exec:\vjjfvt.exe109⤵PID:2480
-
\??\c:\fftvdff.exec:\fftvdff.exe110⤵PID:1652
-
\??\c:\dhnjrnp.exec:\dhnjrnp.exe111⤵PID:3052
-
\??\c:\fxxjrjh.exec:\fxxjrjh.exe112⤵PID:1704
-
\??\c:\jtjxddv.exec:\jtjxddv.exe113⤵PID:2088
-
\??\c:\nxblrbh.exec:\nxblrbh.exe114⤵PID:1964
-
\??\c:\ldfxxjx.exec:\ldfxxjx.exe115⤵PID:2464
-
\??\c:\pltvn.exec:\pltvn.exe116⤵PID:2468
-
\??\c:\bbnfv.exec:\bbnfv.exe117⤵PID:1624
-
\??\c:\dpjrhp.exec:\dpjrhp.exe118⤵PID:2128
-
\??\c:\fbdtbbl.exec:\fbdtbbl.exe119⤵PID:2788
-
\??\c:\lfbntf.exec:\lfbntf.exe120⤵PID:2848
-
\??\c:\dlhnhjj.exec:\dlhnhjj.exe121⤵PID:2844
-
\??\c:\hrtnrhf.exec:\hrtnrhf.exe122⤵PID:3004
-
\??\c:\bjnvfjp.exec:\bjnvfjp.exe123⤵PID:2672
-
\??\c:\bddflf.exec:\bddflf.exe124⤵PID:2684
-
\??\c:\lrbnt.exec:\lrbnt.exe125⤵PID:2632
-
\??\c:\lntvthv.exec:\lntvthv.exe126⤵PID:2076
-
\??\c:\dhvrpv.exec:\dhvrpv.exe127⤵PID:2080
-
\??\c:\dxhrtn.exec:\dxhrtn.exe128⤵PID:2004
-
\??\c:\tbltbt.exec:\tbltbt.exe129⤵PID:2000
-
\??\c:\hhttv.exec:\hhttv.exe130⤵PID:972
-
\??\c:\bdpdr.exec:\bdpdr.exe131⤵PID:1828
-
\??\c:\rbhlptp.exec:\rbhlptp.exe132⤵PID:636
-
\??\c:\bjrlb.exec:\bjrlb.exe133⤵PID:2972
-
\??\c:\rnjvx.exec:\rnjvx.exe134⤵PID:1840
-
\??\c:\ndjvprx.exec:\ndjvprx.exe135⤵PID:1364
-
\??\c:\jlxrjxf.exec:\jlxrjxf.exe136⤵PID:1712
-
\??\c:\vhldfl.exec:\vhldfl.exe137⤵PID:2040
-
\??\c:\vdnpbjp.exec:\vdnpbjp.exe138⤵PID:1628
-
\??\c:\nnrtt.exec:\nnrtt.exe139⤵PID:2240
-
\??\c:\bvvtp.exec:\bvvtp.exe140⤵PID:2332
-
\??\c:\jpxhf.exec:\jpxhf.exe141⤵PID:2164
-
\??\c:\hpxhff.exec:\hpxhff.exe142⤵PID:2200
-
\??\c:\rhhdnjj.exec:\rhhdnjj.exe143⤵PID:1984
-
\??\c:\lthbjv.exec:\lthbjv.exe144⤵PID:1784
-
\??\c:\plpxj.exec:\plpxj.exe145⤵PID:484
-
\??\c:\hrbjbpj.exec:\hrbjbpj.exe146⤵PID:1692
-
\??\c:\fpfbt.exec:\fpfbt.exe147⤵PID:744
-
\??\c:\rvdlff.exec:\rvdlff.exe148⤵PID:1272
-
\??\c:\nnxnnt.exec:\nnxnnt.exe149⤵PID:776
-
\??\c:\jttnt.exec:\jttnt.exe150⤵PID:2992
-
\??\c:\fxfjr.exec:\fxfjr.exe151⤵PID:2184
-
\??\c:\vtljp.exec:\vtljp.exe152⤵PID:2204
-
\??\c:\vvfrb.exec:\vvfrb.exe153⤵PID:276
-
\??\c:\pfnvhv.exec:\pfnvhv.exe154⤵PID:3060
-
\??\c:\rrnjddn.exec:\rrnjddn.exe155⤵PID:1516
-
\??\c:\tdbxvnf.exec:\tdbxvnf.exe156⤵PID:2304
-
\??\c:\llfjl.exec:\llfjl.exe157⤵PID:1536
-
\??\c:\bpbbh.exec:\bpbbh.exe158⤵PID:2464
-
\??\c:\dtfrl.exec:\dtfrl.exe159⤵PID:2828
-
\??\c:\nlrdf.exec:\nlrdf.exe160⤵
- System Location Discovery: System Language Discovery
PID:1588 -
\??\c:\dvtxlht.exec:\dvtxlht.exe161⤵PID:2868
-
\??\c:\hfplff.exec:\hfplff.exe162⤵PID:2756
-
\??\c:\pnxpj.exec:\pnxpj.exe163⤵PID:2764
-
\??\c:\xfrbff.exec:\xfrbff.exe164⤵PID:2804
-
\??\c:\pbvtlv.exec:\pbvtlv.exe165⤵PID:1640
-
\??\c:\lxthr.exec:\lxthr.exe166⤵PID:2656
-
\??\c:\rnpfhhl.exec:\rnpfhhl.exe167⤵PID:1900
-
\??\c:\plrvpnx.exec:\plrvpnx.exe168⤵PID:1004
-
\??\c:\dpnlj.exec:\dpnlj.exe169⤵PID:2296
-
\??\c:\lhhrrjf.exec:\lhhrrjf.exe170⤵PID:1928
-
\??\c:\jrnfh.exec:\jrnfh.exe171⤵PID:2620
-
\??\c:\hrfjj.exec:\hrfjj.exe172⤵PID:2736
-
\??\c:\dtvvfj.exec:\dtvvfj.exe173⤵PID:792
-
\??\c:\bppvlp.exec:\bppvlp.exe174⤵PID:2708
-
\??\c:\dtfnf.exec:\dtfnf.exe175⤵PID:2696
-
\??\c:\pllrbvr.exec:\pllrbvr.exe176⤵PID:2924
-
\??\c:\pxtplbv.exec:\pxtplbv.exe177⤵PID:1432
-
\??\c:\dprpb.exec:\dprpb.exe178⤵PID:2256
-
\??\c:\bjvjfb.exec:\bjvjfb.exe179⤵PID:3024
-
\??\c:\vvhxh.exec:\vvhxh.exe180⤵PID:2976
-
\??\c:\frxftnt.exec:\frxftnt.exe181⤵PID:1324
-
\??\c:\hrlttd.exec:\hrlttd.exe182⤵PID:2028
-
\??\c:\rjjhxrt.exec:\rjjhxrt.exe183⤵PID:2168
-
\??\c:\xtrph.exec:\xtrph.exe184⤵PID:1500
-
\??\c:\bjntv.exec:\bjntv.exe185⤵PID:2084
-
\??\c:\rnfbrxn.exec:\rnfbrxn.exe186⤵PID:2176
-
\??\c:\fxdtv.exec:\fxdtv.exe187⤵PID:1940
-
\??\c:\xxdvvr.exec:\xxdvvr.exe188⤵PID:808
-
\??\c:\ffbhhvj.exec:\ffbhhvj.exe189⤵PID:1688
-
\??\c:\bphhpvx.exec:\bphhpvx.exe190⤵PID:1532
-
\??\c:\tjvxvvv.exec:\tjvxvvv.exe191⤵PID:1832
-
\??\c:\xftjdr.exec:\xftjdr.exe192⤵PID:560
-
\??\c:\xptnbvl.exec:\xptnbvl.exe193⤵PID:1260
-
\??\c:\vtjrjn.exec:\vtjrjn.exe194⤵PID:1744
-
\??\c:\xbpnjp.exec:\xbpnjp.exe195⤵PID:2612
-
\??\c:\plrpdh.exec:\plrpdh.exe196⤵PID:1788
-
\??\c:\ttnfx.exec:\ttnfx.exe197⤵PID:876
-
\??\c:\lfnhv.exec:\lfnhv.exe198⤵PID:1964
-
\??\c:\vplfr.exec:\vplfr.exe199⤵PID:1848
-
\??\c:\pldfj.exec:\pldfj.exe200⤵PID:800
-
\??\c:\frpfxp.exec:\frpfxp.exe201⤵PID:1996
-
\??\c:\hpjjnt.exec:\hpjjnt.exe202⤵PID:2128
-
\??\c:\vfldfhl.exec:\vfldfhl.exe203⤵PID:2856
-
\??\c:\nrdhbpv.exec:\nrdhbpv.exe204⤵PID:2920
-
\??\c:\vnhvvj.exec:\vnhvvj.exe205⤵PID:2892
-
\??\c:\tvhxvdj.exec:\tvhxvdj.exe206⤵PID:2812
-
\??\c:\rjfbl.exec:\rjfbl.exe207⤵PID:2672
-
\??\c:\lhfbh.exec:\lhfbh.exe208⤵PID:960
-
\??\c:\vbhbp.exec:\vbhbp.exe209⤵PID:1660
-
\??\c:\pxhjvpt.exec:\pxhjvpt.exe210⤵PID:2716
-
\??\c:\rrxdbll.exec:\rrxdbll.exe211⤵PID:2124
-
\??\c:\jdtfxfp.exec:\jdtfxfp.exe212⤵PID:2384
-
\??\c:\bpdjf.exec:\bpdjf.exe213⤵PID:2412
-
\??\c:\lhddx.exec:\lhddx.exe214⤵PID:2320
-
\??\c:\rjblndx.exec:\rjblndx.exe215⤵PID:692
-
\??\c:\phvvf.exec:\phvvf.exe216⤵PID:576
-
\??\c:\hhhvf.exec:\hhhvf.exe217⤵PID:1036
-
\??\c:\vpphh.exec:\vpphh.exe218⤵PID:1384
-
\??\c:\rjvbrlj.exec:\rjvbrlj.exe219⤵PID:2420
-
\??\c:\rvfdvjb.exec:\rvfdvjb.exe220⤵PID:1620
-
\??\c:\hhdhd.exec:\hhdhd.exe221⤵PID:2968
-
\??\c:\xjjnrvf.exec:\xjjnrvf.exe222⤵PID:1504
-
\??\c:\dtttnl.exec:\dtttnl.exe223⤵PID:3032
-
\??\c:\ppnjb.exec:\ppnjb.exe224⤵PID:2336
-
\??\c:\fpbrhp.exec:\fpbrhp.exe225⤵PID:1936
-
\??\c:\nbjvv.exec:\nbjvv.exe226⤵PID:2092
-
\??\c:\dpjfrfl.exec:\dpjfrfl.exe227⤵PID:2340
-
\??\c:\hrxfpf.exec:\hrxfpf.exe228⤵PID:1648
-
\??\c:\lhrbhp.exec:\lhrbhp.exe229⤵PID:1956
-
\??\c:\tlnxnf.exec:\tlnxnf.exe230⤵PID:2520
-
\??\c:\hhnrvb.exec:\hhnrvb.exe231⤵PID:904
-
\??\c:\nfpfntj.exec:\nfpfntj.exe232⤵PID:1424
-
\??\c:\hndtx.exec:\hndtx.exe233⤵PID:1688
-
\??\c:\ltvrxjl.exec:\ltvrxjl.exe234⤵PID:1680
-
\??\c:\jhtrtj.exec:\jhtrtj.exe235⤵PID:1716
-
\??\c:\dppnvd.exec:\dppnvd.exe236⤵PID:832
-
\??\c:\jtjbphh.exec:\jtjbphh.exe237⤵PID:3052
-
\??\c:\xfrhl.exec:\xfrhl.exe238⤵PID:1152
-
\??\c:\dpjjl.exec:\dpjjl.exe239⤵
- System Location Discovery: System Language Discovery
PID:2428 -
\??\c:\jjfrxpn.exec:\jjfrxpn.exe240⤵PID:2308
-
\??\c:\jhrxfht.exec:\jhrxfht.exe241⤵PID:1896
-
\??\c:\hbhlf.exec:\hbhlf.exe242⤵PID:2916