Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 15:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
85b079444830291d05cee2f07303fcb0N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
85b079444830291d05cee2f07303fcb0N.exe
-
Size
94KB
-
MD5
85b079444830291d05cee2f07303fcb0
-
SHA1
09c73299b8d3dfd0ad4ae34c2e129d08c54b18ed
-
SHA256
f18474547c14b5bfb35a63a3b33f62f2eaf59d9753941f7f34ee9f15b537185a
-
SHA512
89737d9d4cc6ac0663f49ffda9e8196507636cce65c19d82810bfda305ab6f9d0229a74bf80c03efdef381fcbe8988f9e5344aad0b76998b547834458b5df38b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73XH/YP1HFrJximAAxS1rj/2C1:ymb3NkkiQ3mdBjFo73PYP1lri3K8Gwr
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral1/memory/2432-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2188-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1292-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1368-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1780-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1588-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1276-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1532-295-0x0000000076FD0000-0x00000000770CA000-memory.dmp family_blackmoon behavioral1/memory/1532-294-0x0000000076EB0000-0x0000000076FCF000-memory.dmp family_blackmoon behavioral1/memory/2384-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2336-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1280-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1292-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2400-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2568 rbnvpr.exe 2136 vdlrdfp.exe 2940 pfdpvd.exe 2400 drdjxxj.exe 2188 vbndx.exe 2692 pfbtn.exe 2584 xpdrfh.exe 1292 frvfdh.exe 1600 ptdvt.exe 1368 vhvtfpp.exe 2684 blbxfnb.exe 2996 dllxlxd.exe 2196 fdnlh.exe 2192 pdjhxr.exe 1280 nxhdp.exe 2992 prdjbxj.exe 2856 fvphvl.exe 2336 jhdhxjn.exe 2872 lxrrt.exe 2384 jlvxhbh.exe 1512 dvthtbl.exe 1780 jdphd.exe 2228 lxhbxvt.exe 1592 hllvjd.exe 368 nvfnf.exe 2552 jrdft.exe 932 rhxrtjr.exe 1276 hxtrjdr.exe 1588 nhjjttr.exe 1532 dhvdlb.exe 1568 hpttxvl.exe 2892 jhptpt.exe 2792 rhvnxb.exe 968 hnnrrxf.exe 2132 rptln.exe 2772 jhtfjth.exe 2812 vlpfhx.exe 2836 pbfrjj.exe 2920 hhbdtl.exe 1016 nxfxxlp.exe 2516 rhbvjr.exe 1832 xphphth.exe 832 phdprrv.exe 980 bhthrhv.exe 840 hhtplrd.exe 1328 hrxvrrb.exe 2200 jrfjd.exe 3036 tbbxbnl.exe 2196 fpbrvp.exe 2192 lxvrftn.exe 1280 lltvxl.exe 2100 xxrbptt.exe 1672 pjtfbxp.exe 2588 jrltpxf.exe 2112 rtdpj.exe 2356 ldnrvd.exe 1816 prxljhv.exe 1684 frxpndf.exe 1524 xnbxr.exe 676 flxpdfj.exe 2228 vjpljjr.exe 1648 pbhlvx.exe 1724 tpbdrrv.exe 2512 llrdxfd.exe -
resource yara_rule behavioral1/memory/2432-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1368-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1780-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1588-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1276-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1532-294-0x0000000076EB0000-0x0000000076FCF000-memory.dmp upx behavioral1/memory/2384-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2336-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1280-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2400-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-42-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnpdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxnpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjnltj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtbbnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjflp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxptl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxxlhnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvthtbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntxdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlrxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdlflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnbxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rptln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rphrln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brhrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbprrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhptpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plbhpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdlxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvnbdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blpjdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftlrhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drpntjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptntdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddxlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prdjbxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjlhrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvlxvlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlhtlxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plhrhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxhlttl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttxdlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llntpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdnxj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2568 2432 85b079444830291d05cee2f07303fcb0N.exe 30 PID 2432 wrote to memory of 2568 2432 85b079444830291d05cee2f07303fcb0N.exe 30 PID 2432 wrote to memory of 2568 2432 85b079444830291d05cee2f07303fcb0N.exe 30 PID 2432 wrote to memory of 2568 2432 85b079444830291d05cee2f07303fcb0N.exe 30 PID 2568 wrote to memory of 2136 2568 rbnvpr.exe 31 PID 2568 wrote to memory of 2136 2568 rbnvpr.exe 31 PID 2568 wrote to memory of 2136 2568 rbnvpr.exe 31 PID 2568 wrote to memory of 2136 2568 rbnvpr.exe 31 PID 2136 wrote to memory of 2940 2136 vdlrdfp.exe 32 PID 2136 wrote to memory of 2940 2136 vdlrdfp.exe 32 PID 2136 wrote to memory of 2940 2136 vdlrdfp.exe 32 PID 2136 wrote to memory of 2940 2136 vdlrdfp.exe 32 PID 2940 wrote to memory of 2400 2940 pfdpvd.exe 33 PID 2940 wrote to memory of 2400 2940 pfdpvd.exe 33 PID 2940 wrote to memory of 2400 2940 pfdpvd.exe 33 PID 2940 wrote to memory of 2400 2940 pfdpvd.exe 33 PID 2400 wrote to memory of 2188 2400 drdjxxj.exe 34 PID 2400 wrote to memory of 2188 2400 drdjxxj.exe 34 PID 2400 wrote to memory of 2188 2400 drdjxxj.exe 34 PID 2400 wrote to memory of 2188 2400 drdjxxj.exe 34 PID 2188 wrote to memory of 2692 2188 vbndx.exe 35 PID 2188 wrote to memory of 2692 2188 vbndx.exe 35 PID 2188 wrote to memory of 2692 2188 vbndx.exe 35 PID 2188 wrote to memory of 2692 2188 vbndx.exe 35 PID 2692 wrote to memory of 2584 2692 pfbtn.exe 36 PID 2692 wrote to memory of 2584 2692 pfbtn.exe 36 PID 2692 wrote to memory of 2584 2692 pfbtn.exe 36 PID 2692 wrote to memory of 2584 2692 pfbtn.exe 36 PID 2584 wrote to memory of 1292 2584 xpdrfh.exe 37 PID 2584 wrote to memory of 1292 2584 xpdrfh.exe 37 PID 2584 wrote to memory of 1292 2584 xpdrfh.exe 37 PID 2584 wrote to memory of 1292 2584 xpdrfh.exe 37 PID 1292 wrote to memory of 1600 1292 frvfdh.exe 38 PID 1292 wrote to memory of 1600 1292 frvfdh.exe 38 PID 1292 wrote to memory of 1600 1292 frvfdh.exe 38 PID 1292 wrote to memory of 1600 1292 frvfdh.exe 38 PID 1600 wrote to memory of 1368 1600 ptdvt.exe 39 PID 1600 wrote to memory of 1368 1600 ptdvt.exe 39 PID 1600 wrote to memory of 1368 1600 ptdvt.exe 39 PID 1600 wrote to memory of 1368 1600 ptdvt.exe 39 PID 1368 wrote to memory of 2684 1368 vhvtfpp.exe 40 PID 1368 wrote to memory of 2684 1368 vhvtfpp.exe 40 PID 1368 wrote to memory of 2684 1368 vhvtfpp.exe 40 PID 1368 wrote to memory of 2684 1368 vhvtfpp.exe 40 PID 2684 wrote to memory of 2996 2684 blbxfnb.exe 41 PID 2684 wrote to memory of 2996 2684 blbxfnb.exe 41 PID 2684 wrote to memory of 2996 2684 blbxfnb.exe 41 PID 2684 wrote to memory of 2996 2684 blbxfnb.exe 41 PID 2996 wrote to memory of 2196 2996 dllxlxd.exe 42 PID 2996 wrote to memory of 2196 2996 dllxlxd.exe 42 PID 2996 wrote to memory of 2196 2996 dllxlxd.exe 42 PID 2996 wrote to memory of 2196 2996 dllxlxd.exe 42 PID 2196 wrote to memory of 2192 2196 fdnlh.exe 43 PID 2196 wrote to memory of 2192 2196 fdnlh.exe 43 PID 2196 wrote to memory of 2192 2196 fdnlh.exe 43 PID 2196 wrote to memory of 2192 2196 fdnlh.exe 43 PID 2192 wrote to memory of 1280 2192 pdjhxr.exe 44 PID 2192 wrote to memory of 1280 2192 pdjhxr.exe 44 PID 2192 wrote to memory of 1280 2192 pdjhxr.exe 44 PID 2192 wrote to memory of 1280 2192 pdjhxr.exe 44 PID 1280 wrote to memory of 2992 1280 nxhdp.exe 45 PID 1280 wrote to memory of 2992 1280 nxhdp.exe 45 PID 1280 wrote to memory of 2992 1280 nxhdp.exe 45 PID 1280 wrote to memory of 2992 1280 nxhdp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\85b079444830291d05cee2f07303fcb0N.exe"C:\Users\Admin\AppData\Local\Temp\85b079444830291d05cee2f07303fcb0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\rbnvpr.exec:\rbnvpr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\vdlrdfp.exec:\vdlrdfp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\pfdpvd.exec:\pfdpvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\drdjxxj.exec:\drdjxxj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\vbndx.exec:\vbndx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\pfbtn.exec:\pfbtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\xpdrfh.exec:\xpdrfh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\frvfdh.exec:\frvfdh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\ptdvt.exec:\ptdvt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\vhvtfpp.exec:\vhvtfpp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
\??\c:\blbxfnb.exec:\blbxfnb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\dllxlxd.exec:\dllxlxd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\fdnlh.exec:\fdnlh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\pdjhxr.exec:\pdjhxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\nxhdp.exec:\nxhdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\prdjbxj.exec:\prdjbxj.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
\??\c:\fvphvl.exec:\fvphvl.exe18⤵
- Executes dropped EXE
PID:2856 -
\??\c:\jhdhxjn.exec:\jhdhxjn.exe19⤵
- Executes dropped EXE
PID:2336 -
\??\c:\lxrrt.exec:\lxrrt.exe20⤵
- Executes dropped EXE
PID:2872 -
\??\c:\jlvxhbh.exec:\jlvxhbh.exe21⤵
- Executes dropped EXE
PID:2384 -
\??\c:\dvthtbl.exec:\dvthtbl.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
\??\c:\jdphd.exec:\jdphd.exe23⤵
- Executes dropped EXE
PID:1780 -
\??\c:\lxhbxvt.exec:\lxhbxvt.exe24⤵
- Executes dropped EXE
PID:2228 -
\??\c:\hllvjd.exec:\hllvjd.exe25⤵
- Executes dropped EXE
PID:1592 -
\??\c:\nvfnf.exec:\nvfnf.exe26⤵
- Executes dropped EXE
PID:368 -
\??\c:\jrdft.exec:\jrdft.exe27⤵
- Executes dropped EXE
PID:2552 -
\??\c:\rhxrtjr.exec:\rhxrtjr.exe28⤵
- Executes dropped EXE
PID:932 -
\??\c:\hxtrjdr.exec:\hxtrjdr.exe29⤵
- Executes dropped EXE
PID:1276 -
\??\c:\nhjjttr.exec:\nhjjttr.exe30⤵
- Executes dropped EXE
PID:1588 -
\??\c:\dhvdlb.exec:\dhvdlb.exe31⤵
- Executes dropped EXE
PID:1532 -
\??\c:\plhtl.exec:\plhtl.exe32⤵PID:1052
-
\??\c:\hpttxvl.exec:\hpttxvl.exe33⤵
- Executes dropped EXE
PID:1568 -
\??\c:\jhptpt.exec:\jhptpt.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892 -
\??\c:\rhvnxb.exec:\rhvnxb.exe35⤵
- Executes dropped EXE
PID:2792 -
\??\c:\hnnrrxf.exec:\hnnrrxf.exe36⤵
- Executes dropped EXE
PID:968 -
\??\c:\rptln.exec:\rptln.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132 -
\??\c:\jhtfjth.exec:\jhtfjth.exe38⤵
- Executes dropped EXE
PID:2772 -
\??\c:\vlpfhx.exec:\vlpfhx.exe39⤵
- Executes dropped EXE
PID:2812 -
\??\c:\pbfrjj.exec:\pbfrjj.exe40⤵
- Executes dropped EXE
PID:2836 -
\??\c:\hhbdtl.exec:\hhbdtl.exe41⤵
- Executes dropped EXE
PID:2920 -
\??\c:\nxfxxlp.exec:\nxfxxlp.exe42⤵
- Executes dropped EXE
PID:1016 -
\??\c:\rhbvjr.exec:\rhbvjr.exe43⤵
- Executes dropped EXE
PID:2516 -
\??\c:\xphphth.exec:\xphphth.exe44⤵
- Executes dropped EXE
PID:1832 -
\??\c:\phdprrv.exec:\phdprrv.exe45⤵
- Executes dropped EXE
PID:832 -
\??\c:\bhthrhv.exec:\bhthrhv.exe46⤵
- Executes dropped EXE
PID:980 -
\??\c:\hhtplrd.exec:\hhtplrd.exe47⤵
- Executes dropped EXE
PID:840 -
\??\c:\hrxvrrb.exec:\hrxvrrb.exe48⤵
- Executes dropped EXE
PID:1328 -
\??\c:\jrfjd.exec:\jrfjd.exe49⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tbbxbnl.exec:\tbbxbnl.exe50⤵
- Executes dropped EXE
PID:3036 -
\??\c:\fpbrvp.exec:\fpbrvp.exe51⤵
- Executes dropped EXE
PID:2196 -
\??\c:\lxvrftn.exec:\lxvrftn.exe52⤵
- Executes dropped EXE
PID:2192 -
\??\c:\lltvxl.exec:\lltvxl.exe53⤵
- Executes dropped EXE
PID:1280 -
\??\c:\xxrbptt.exec:\xxrbptt.exe54⤵
- Executes dropped EXE
PID:2100 -
\??\c:\pjtfbxp.exec:\pjtfbxp.exe55⤵
- Executes dropped EXE
PID:1672 -
\??\c:\jrltpxf.exec:\jrltpxf.exe56⤵
- Executes dropped EXE
PID:2588 -
\??\c:\rtdpj.exec:\rtdpj.exe57⤵
- Executes dropped EXE
PID:2112 -
\??\c:\ldnrvd.exec:\ldnrvd.exe58⤵
- Executes dropped EXE
PID:2356 -
\??\c:\prxljhv.exec:\prxljhv.exe59⤵
- Executes dropped EXE
PID:1816 -
\??\c:\frxpndf.exec:\frxpndf.exe60⤵
- Executes dropped EXE
PID:1684 -
\??\c:\xnbxr.exec:\xnbxr.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524 -
\??\c:\flxpdfj.exec:\flxpdfj.exe62⤵
- Executes dropped EXE
PID:676 -
\??\c:\vjpljjr.exec:\vjpljjr.exe63⤵
- Executes dropped EXE
PID:2228 -
\??\c:\pbhlvx.exec:\pbhlvx.exe64⤵
- Executes dropped EXE
PID:1648 -
\??\c:\tpbdrrv.exec:\tpbdrrv.exe65⤵
- Executes dropped EXE
PID:1724 -
\??\c:\llrdxfd.exec:\llrdxfd.exe66⤵
- Executes dropped EXE
PID:2512 -
\??\c:\xvvffb.exec:\xvvffb.exe67⤵PID:1596
-
\??\c:\ddrtnf.exec:\ddrtnf.exe68⤵PID:932
-
\??\c:\rbhrvfr.exec:\rbhrvfr.exe69⤵PID:884
-
\??\c:\pnxpx.exec:\pnxpx.exe70⤵PID:1988
-
\??\c:\xvdhlvd.exec:\xvdhlvd.exe71⤵PID:2016
-
\??\c:\hrdbrd.exec:\hrdbrd.exe72⤵PID:1544
-
\??\c:\nffrjjt.exec:\nffrjjt.exe73⤵PID:2436
-
\??\c:\pdrhvnx.exec:\pdrhvnx.exe74⤵PID:2484
-
\??\c:\ndblb.exec:\ndblb.exe75⤵PID:2908
-
\??\c:\tlplbvl.exec:\tlplbvl.exe76⤵PID:2792
-
\??\c:\rhfxxf.exec:\rhfxxf.exe77⤵PID:2800
-
\??\c:\bbxfrdd.exec:\bbxfrdd.exe78⤵PID:2756
-
\??\c:\xxxjx.exec:\xxxjx.exe79⤵PID:2644
-
\??\c:\jnxhjr.exec:\jnxhjr.exe80⤵PID:2292
-
\??\c:\thjvxf.exec:\thjvxf.exe81⤵PID:2268
-
\??\c:\trxttr.exec:\trxttr.exe82⤵PID:2692
-
\??\c:\nblxl.exec:\nblxl.exe83⤵PID:2628
-
\??\c:\ddxtl.exec:\ddxtl.exe84⤵PID:2516
-
\??\c:\rtdrlt.exec:\rtdrlt.exe85⤵PID:2104
-
\??\c:\pdllh.exec:\pdllh.exe86⤵PID:2072
-
\??\c:\npvhp.exec:\npvhp.exe87⤵PID:980
-
\??\c:\ntbbp.exec:\ntbbp.exe88⤵PID:1368
-
\??\c:\xphlxl.exec:\xphlxl.exe89⤵PID:1328
-
\??\c:\hndxpbb.exec:\hndxpbb.exe90⤵PID:3048
-
\??\c:\nvpvfhr.exec:\nvpvfhr.exe91⤵PID:3060
-
\??\c:\npvtjj.exec:\npvtjj.exe92⤵PID:2612
-
\??\c:\lxrhfn.exec:\lxrhfn.exe93⤵PID:888
-
\??\c:\ptxxvxd.exec:\ptxxvxd.exe94⤵PID:396
-
\??\c:\tlhfnj.exec:\tlhfnj.exe95⤵PID:2164
-
\??\c:\lnllxb.exec:\lnllxb.exe96⤵PID:1672
-
\??\c:\hdrvhh.exec:\hdrvhh.exe97⤵PID:2476
-
\??\c:\ftbxbl.exec:\ftbxbl.exe98⤵PID:2336
-
\??\c:\fhdhd.exec:\fhdhd.exe99⤵PID:2356
-
\??\c:\xvpnx.exec:\xvpnx.exe100⤵PID:1512
-
\??\c:\vlplxt.exec:\vlplxt.exe101⤵PID:1780
-
\??\c:\pjbxrnh.exec:\pjbxrnh.exe102⤵PID:1820
-
\??\c:\hlltrfb.exec:\hlltrfb.exe103⤵PID:676
-
\??\c:\nrfdplv.exec:\nrfdplv.exe104⤵PID:2228
-
\??\c:\tthxxj.exec:\tthxxj.exe105⤵PID:1592
-
\??\c:\ldnxv.exec:\ldnxv.exe106⤵PID:1724
-
\??\c:\nfhrrtt.exec:\nfhrrtt.exe107⤵PID:2512
-
\??\c:\xrjhdn.exec:\xrjhdn.exe108⤵PID:1576
-
\??\c:\nxlndv.exec:\nxlndv.exe109⤵PID:932
-
\??\c:\dtbdbv.exec:\dtbdbv.exe110⤵PID:1992
-
\??\c:\vnjfh.exec:\vnjfh.exe111⤵PID:1988
-
\??\c:\bprvff.exec:\bprvff.exe112⤵PID:2016
-
\??\c:\brfvj.exec:\brfvj.exe113⤵PID:1544
-
\??\c:\jfffd.exec:\jfffd.exe114⤵PID:2436
-
\??\c:\jpxrlpp.exec:\jpxrlpp.exe115⤵PID:2484
-
\??\c:\nflprr.exec:\nflprr.exe116⤵PID:2908
-
\??\c:\tjljntx.exec:\tjljntx.exe117⤵PID:2316
-
\??\c:\vlrxn.exec:\vlrxn.exe118⤵
- System Location Discovery: System Language Discovery
PID:2188 -
\??\c:\lblhxpf.exec:\lblhxpf.exe119⤵PID:2972
-
\??\c:\ntnlf.exec:\ntnlf.exe120⤵PID:2672
-
\??\c:\xfnrp.exec:\xfnrp.exe121⤵PID:2256
-
\??\c:\lvvpxbn.exec:\lvvpxbn.exe122⤵PID:3044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-