Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 22:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
db1e03fa390f2aecbb5862318d6cda60N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
db1e03fa390f2aecbb5862318d6cda60N.exe
-
Size
82KB
-
MD5
db1e03fa390f2aecbb5862318d6cda60
-
SHA1
7a0d75492148cd9724300f91a5d39792d51c9519
-
SHA256
c123e2d3e7a3a6ff937f3e1646afdc14cf1ad55a088cfc86734c5efa41df822f
-
SHA512
573f6306678b9df5a493fa3e1932461478448eb4084778daa4aae99036faafdd42d722a999fa2dc2b90e603d5cb743c64fb81c8c35df0557600da18fb9d2e46d
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Qj:ymb3NkkiQ3mdBjFIIp9L9QrrA8G
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2672-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3032-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1004-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1204-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1300-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1560-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1672-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1756-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2212-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-317-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1744 bjlld.exe 2236 ntlrxb.exe 2228 ttbnxp.exe 2872 lxdxnr.exe 2884 hvfln.exe 2644 hxtjv.exe 1204 lxdtlxj.exe 1004 fvlbxl.exe 2312 jpplxlt.exe 1092 ptjxhfb.exe 3032 pfldrt.exe 2780 lppfblr.exe 2084 thldn.exe 1388 ptxhb.exe 2628 rrlnh.exe 1300 rhrfrnn.exe 2968 trlht.exe 1560 tjhrptp.exe 2372 ndvtd.exe 2240 ftxtppr.exe 2948 fvprtv.exe 1672 pfnhtfl.exe 1756 vbftfb.exe 2440 bttfxl.exe 1724 xlnfr.exe 584 jtjjxnp.exe 1588 dnxljbf.exe 2212 nttpblh.exe 456 lnhjr.exe 3068 lhhxfr.exe 2888 xbddvrt.exe 1748 hxxjjlp.exe 1324 brhrtjf.exe 2224 vrprnj.exe 2700 rfbhv.exe 2812 hfnvptb.exe 2868 pjljrp.exe 2832 pplxph.exe 2884 rdnldvt.exe 2728 txndhd.exe 2596 rpldrjx.exe 2108 ljvhfvv.exe 1516 fdfrdjf.exe 2068 nlpdjtd.exe 2092 rrtlll.exe 2412 bhxld.exe 3024 jrvjjl.exe 2196 lthlb.exe 3036 ppfvb.exe 2660 rtvpnr.exe 1816 vthrl.exe 1644 jfbrrdj.exe 700 xvrrlr.exe 1840 xppnvl.exe 1764 xhpjxb.exe 2964 njvll.exe 2156 httpft.exe 2060 vjlxdx.exe 2376 hphnr.exe 960 hvbjx.exe 2496 jjpvtpp.exe 2492 pxlpl.exe 860 xtxrvn.exe 1220 vdnhhn.exe -
resource yara_rule behavioral1/memory/2672-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1004-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3032-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1004-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1204-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1204-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1204-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1300-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1560-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1672-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1756-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2212-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-317-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhxtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxhhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtxvrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnfpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfjvxnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvhfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhhxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drdpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pprtbvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpbrtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvtrpxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjnbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbnpvll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbxnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbtnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpxjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnpvldf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnvrnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prrnntr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnbhxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vthrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvbjx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfrfbvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddbdlft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltppfvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djxltlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtrrjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvldttj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrjffrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvplp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fthpptl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbprpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnntbvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxbjntx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfplrpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjdlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpdlnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpxhdh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbjpdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddhdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptfpjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntfjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhttv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdvlhrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjlld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvhblhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpdnft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrprnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdflt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1744 2672 db1e03fa390f2aecbb5862318d6cda60N.exe 29 PID 2672 wrote to memory of 1744 2672 db1e03fa390f2aecbb5862318d6cda60N.exe 29 PID 2672 wrote to memory of 1744 2672 db1e03fa390f2aecbb5862318d6cda60N.exe 29 PID 2672 wrote to memory of 1744 2672 db1e03fa390f2aecbb5862318d6cda60N.exe 29 PID 1744 wrote to memory of 2236 1744 bjlld.exe 30 PID 1744 wrote to memory of 2236 1744 bjlld.exe 30 PID 1744 wrote to memory of 2236 1744 bjlld.exe 30 PID 1744 wrote to memory of 2236 1744 bjlld.exe 30 PID 2236 wrote to memory of 2228 2236 ntlrxb.exe 31 PID 2236 wrote to memory of 2228 2236 ntlrxb.exe 31 PID 2236 wrote to memory of 2228 2236 ntlrxb.exe 31 PID 2236 wrote to memory of 2228 2236 ntlrxb.exe 31 PID 2228 wrote to memory of 2872 2228 ttbnxp.exe 32 PID 2228 wrote to memory of 2872 2228 ttbnxp.exe 32 PID 2228 wrote to memory of 2872 2228 ttbnxp.exe 32 PID 2228 wrote to memory of 2872 2228 ttbnxp.exe 32 PID 2872 wrote to memory of 2884 2872 lxdxnr.exe 33 PID 2872 wrote to memory of 2884 2872 lxdxnr.exe 33 PID 2872 wrote to memory of 2884 2872 lxdxnr.exe 33 PID 2872 wrote to memory of 2884 2872 lxdxnr.exe 33 PID 2884 wrote to memory of 2644 2884 hvfln.exe 34 PID 2884 wrote to memory of 2644 2884 hvfln.exe 34 PID 2884 wrote to memory of 2644 2884 hvfln.exe 34 PID 2884 wrote to memory of 2644 2884 hvfln.exe 34 PID 2644 wrote to memory of 1204 2644 hxtjv.exe 35 PID 2644 wrote to memory of 1204 2644 hxtjv.exe 35 PID 2644 wrote to memory of 1204 2644 hxtjv.exe 35 PID 2644 wrote to memory of 1204 2644 hxtjv.exe 35 PID 1204 wrote to memory of 1004 1204 lxdtlxj.exe 36 PID 1204 wrote to memory of 1004 1204 lxdtlxj.exe 36 PID 1204 wrote to memory of 1004 1204 lxdtlxj.exe 36 PID 1204 wrote to memory of 1004 1204 lxdtlxj.exe 36 PID 1004 wrote to memory of 2312 1004 fvlbxl.exe 37 PID 1004 wrote to memory of 2312 1004 fvlbxl.exe 37 PID 1004 wrote to memory of 2312 1004 fvlbxl.exe 37 PID 1004 wrote to memory of 2312 1004 fvlbxl.exe 37 PID 2312 wrote to memory of 1092 2312 jpplxlt.exe 38 PID 2312 wrote to memory of 1092 2312 jpplxlt.exe 38 PID 2312 wrote to memory of 1092 2312 jpplxlt.exe 38 PID 2312 wrote to memory of 1092 2312 jpplxlt.exe 38 PID 1092 wrote to memory of 3032 1092 ptjxhfb.exe 39 PID 1092 wrote to memory of 3032 1092 ptjxhfb.exe 39 PID 1092 wrote to memory of 3032 1092 ptjxhfb.exe 39 PID 1092 wrote to memory of 3032 1092 ptjxhfb.exe 39 PID 3032 wrote to memory of 2780 3032 pfldrt.exe 40 PID 3032 wrote to memory of 2780 3032 pfldrt.exe 40 PID 3032 wrote to memory of 2780 3032 pfldrt.exe 40 PID 3032 wrote to memory of 2780 3032 pfldrt.exe 40 PID 2780 wrote to memory of 2084 2780 lppfblr.exe 41 PID 2780 wrote to memory of 2084 2780 lppfblr.exe 41 PID 2780 wrote to memory of 2084 2780 lppfblr.exe 41 PID 2780 wrote to memory of 2084 2780 lppfblr.exe 41 PID 2084 wrote to memory of 1388 2084 thldn.exe 42 PID 2084 wrote to memory of 1388 2084 thldn.exe 42 PID 2084 wrote to memory of 1388 2084 thldn.exe 42 PID 2084 wrote to memory of 1388 2084 thldn.exe 42 PID 1388 wrote to memory of 2628 1388 ptxhb.exe 43 PID 1388 wrote to memory of 2628 1388 ptxhb.exe 43 PID 1388 wrote to memory of 2628 1388 ptxhb.exe 43 PID 1388 wrote to memory of 2628 1388 ptxhb.exe 43 PID 2628 wrote to memory of 1300 2628 rrlnh.exe 44 PID 2628 wrote to memory of 1300 2628 rrlnh.exe 44 PID 2628 wrote to memory of 1300 2628 rrlnh.exe 44 PID 2628 wrote to memory of 1300 2628 rrlnh.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1e03fa390f2aecbb5862318d6cda60N.exe"C:\Users\Admin\AppData\Local\Temp\db1e03fa390f2aecbb5862318d6cda60N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\bjlld.exec:\bjlld.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\ntlrxb.exec:\ntlrxb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\ttbnxp.exec:\ttbnxp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\lxdxnr.exec:\lxdxnr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\hvfln.exec:\hvfln.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\hxtjv.exec:\hxtjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\lxdtlxj.exec:\lxdtlxj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\fvlbxl.exec:\fvlbxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\jpplxlt.exec:\jpplxlt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\ptjxhfb.exec:\ptjxhfb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
\??\c:\pfldrt.exec:\pfldrt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\lppfblr.exec:\lppfblr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\thldn.exec:\thldn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\ptxhb.exec:\ptxhb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\rrlnh.exec:\rrlnh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\rhrfrnn.exec:\rhrfrnn.exe17⤵
- Executes dropped EXE
PID:1300 -
\??\c:\trlht.exec:\trlht.exe18⤵
- Executes dropped EXE
PID:2968 -
\??\c:\tjhrptp.exec:\tjhrptp.exe19⤵
- Executes dropped EXE
PID:1560 -
\??\c:\ndvtd.exec:\ndvtd.exe20⤵
- Executes dropped EXE
PID:2372 -
\??\c:\ftxtppr.exec:\ftxtppr.exe21⤵
- Executes dropped EXE
PID:2240 -
\??\c:\fvprtv.exec:\fvprtv.exe22⤵
- Executes dropped EXE
PID:2948 -
\??\c:\pfnhtfl.exec:\pfnhtfl.exe23⤵
- Executes dropped EXE
PID:1672 -
\??\c:\vbftfb.exec:\vbftfb.exe24⤵
- Executes dropped EXE
PID:1756 -
\??\c:\bttfxl.exec:\bttfxl.exe25⤵
- Executes dropped EXE
PID:2440 -
\??\c:\xlnfr.exec:\xlnfr.exe26⤵
- Executes dropped EXE
PID:1724 -
\??\c:\jtjjxnp.exec:\jtjjxnp.exe27⤵
- Executes dropped EXE
PID:584 -
\??\c:\dnxljbf.exec:\dnxljbf.exe28⤵
- Executes dropped EXE
PID:1588 -
\??\c:\nttpblh.exec:\nttpblh.exe29⤵
- Executes dropped EXE
PID:2212 -
\??\c:\lnhjr.exec:\lnhjr.exe30⤵
- Executes dropped EXE
PID:456 -
\??\c:\lhhxfr.exec:\lhhxfr.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068 -
\??\c:\xbddvrt.exec:\xbddvrt.exe32⤵
- Executes dropped EXE
PID:2888 -
\??\c:\hxxjjlp.exec:\hxxjjlp.exe33⤵
- Executes dropped EXE
PID:1748 -
\??\c:\brhrtjf.exec:\brhrtjf.exe34⤵
- Executes dropped EXE
PID:1324 -
\??\c:\vrprnj.exec:\vrprnj.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224 -
\??\c:\rfbhv.exec:\rfbhv.exe36⤵
- Executes dropped EXE
PID:2700 -
\??\c:\hfnvptb.exec:\hfnvptb.exe37⤵
- Executes dropped EXE
PID:2812 -
\??\c:\pjljrp.exec:\pjljrp.exe38⤵
- Executes dropped EXE
PID:2868 -
\??\c:\pplxph.exec:\pplxph.exe39⤵
- Executes dropped EXE
PID:2832 -
\??\c:\rdnldvt.exec:\rdnldvt.exe40⤵
- Executes dropped EXE
PID:2884 -
\??\c:\txndhd.exec:\txndhd.exe41⤵
- Executes dropped EXE
PID:2728 -
\??\c:\rpldrjx.exec:\rpldrjx.exe42⤵
- Executes dropped EXE
PID:2596 -
\??\c:\ljvhfvv.exec:\ljvhfvv.exe43⤵
- Executes dropped EXE
PID:2108 -
\??\c:\fdfrdjf.exec:\fdfrdjf.exe44⤵
- Executes dropped EXE
PID:1516 -
\??\c:\nlpdjtd.exec:\nlpdjtd.exe45⤵
- Executes dropped EXE
PID:2068 -
\??\c:\rrtlll.exec:\rrtlll.exe46⤵
- Executes dropped EXE
PID:2092 -
\??\c:\bhxld.exec:\bhxld.exe47⤵
- Executes dropped EXE
PID:2412 -
\??\c:\jrvjjl.exec:\jrvjjl.exe48⤵
- Executes dropped EXE
PID:3024 -
\??\c:\lthlb.exec:\lthlb.exe49⤵
- Executes dropped EXE
PID:2196 -
\??\c:\ppfvb.exec:\ppfvb.exe50⤵
- Executes dropped EXE
PID:3036 -
\??\c:\rtvpnr.exec:\rtvpnr.exe51⤵
- Executes dropped EXE
PID:2660 -
\??\c:\vthrl.exec:\vthrl.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816 -
\??\c:\jfbrrdj.exec:\jfbrrdj.exe53⤵
- Executes dropped EXE
PID:1644 -
\??\c:\xvrrlr.exec:\xvrrlr.exe54⤵
- Executes dropped EXE
PID:700 -
\??\c:\xppnvl.exec:\xppnvl.exe55⤵
- Executes dropped EXE
PID:1840 -
\??\c:\xhpjxb.exec:\xhpjxb.exe56⤵
- Executes dropped EXE
PID:1764 -
\??\c:\njvll.exec:\njvll.exe57⤵
- Executes dropped EXE
PID:2964 -
\??\c:\httpft.exec:\httpft.exe58⤵
- Executes dropped EXE
PID:2156 -
\??\c:\vjlxdx.exec:\vjlxdx.exe59⤵
- Executes dropped EXE
PID:2060 -
\??\c:\hphnr.exec:\hphnr.exe60⤵
- Executes dropped EXE
PID:2376 -
\??\c:\hvbjx.exec:\hvbjx.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:960 -
\??\c:\jjpvtpp.exec:\jjpvtpp.exe62⤵
- Executes dropped EXE
PID:2496 -
\??\c:\pxlpl.exec:\pxlpl.exe63⤵
- Executes dropped EXE
PID:2492 -
\??\c:\xtxrvn.exec:\xtxrvn.exe64⤵
- Executes dropped EXE
PID:860 -
\??\c:\vdnhhn.exec:\vdnhhn.exe65⤵
- Executes dropped EXE
PID:1220 -
\??\c:\vntdjbt.exec:\vntdjbt.exe66⤵PID:1732
-
\??\c:\nvdlp.exec:\nvdlp.exe67⤵PID:1488
-
\??\c:\rjrbd.exec:\rjrbd.exe68⤵PID:2052
-
\??\c:\nldvp.exec:\nldvp.exe69⤵PID:2320
-
\??\c:\vdfppl.exec:\vdfppl.exe70⤵PID:1116
-
\??\c:\fnxdt.exec:\fnxdt.exe71⤵PID:1680
-
\??\c:\nbtxvdf.exec:\nbtxvdf.exe72⤵PID:2448
-
\??\c:\vdlhv.exec:\vdlhv.exe73⤵PID:3068
-
\??\c:\hpfhfdd.exec:\hpfhfdd.exe74⤵PID:660
-
\??\c:\vflhjpb.exec:\vflhjpb.exe75⤵PID:2796
-
\??\c:\prnrfvv.exec:\prnrfvv.exe76⤵PID:2204
-
\??\c:\htvxbpb.exec:\htvxbpb.exe77⤵PID:2696
-
\??\c:\tvpltb.exec:\tvpltb.exe78⤵PID:2740
-
\??\c:\dppplpt.exec:\dppplpt.exe79⤵PID:1856
-
\??\c:\jvdjptd.exec:\jvdjptd.exe80⤵PID:2624
-
\??\c:\dbrbjdv.exec:\dbrbjdv.exe81⤵PID:2160
-
\??\c:\vhhxx.exec:\vhhxx.exe82⤵PID:2724
-
\??\c:\pnttx.exec:\pnttx.exe83⤵PID:1800
-
\??\c:\xrphf.exec:\xrphf.exe84⤵PID:2640
-
\??\c:\vrrrxff.exec:\vrrrxff.exe85⤵PID:2568
-
\??\c:\txnldtx.exec:\txnldtx.exe86⤵PID:1052
-
\??\c:\ntxhjvt.exec:\ntxhjvt.exe87⤵PID:2416
-
\??\c:\thrpn.exec:\thrpn.exe88⤵PID:740
-
\??\c:\bfrfbvb.exec:\bfrfbvb.exe89⤵
- System Location Discovery: System Language Discovery
PID:2020 -
\??\c:\bfrnh.exec:\bfrnh.exe90⤵PID:2856
-
\??\c:\ndjvp.exec:\ndjvp.exe91⤵PID:2480
-
\??\c:\btdfbp.exec:\btdfbp.exe92⤵PID:2484
-
\??\c:\vtdlrhv.exec:\vtdlrhv.exe93⤵PID:2180
-
\??\c:\rfhhvx.exec:\rfhhvx.exe94⤵PID:2096
-
\??\c:\rvjhjn.exec:\rvjhjn.exe95⤵PID:2776
-
\??\c:\ndrbrt.exec:\ndrbrt.exe96⤵PID:2364
-
\??\c:\rlxrh.exec:\rlxrh.exe97⤵
- System Location Discovery: System Language Discovery
PID:1712 -
\??\c:\hbttv.exec:\hbttv.exe98⤵PID:2080
-
\??\c:\vfjxbr.exec:\vfjxbr.exe99⤵PID:1112
-
\??\c:\vlrbx.exec:\vlrbx.exe100⤵PID:2372
-
\??\c:\dpvlrv.exec:\dpvlrv.exe101⤵PID:2788
-
\??\c:\nftbxx.exec:\nftbxx.exe102⤵PID:3032
-
\??\c:\xlnbtnt.exec:\xlnbtnt.exe103⤵PID:920
-
\??\c:\rljpr.exec:\rljpr.exe104⤵PID:1520
-
\??\c:\pjfntj.exec:\pjfntj.exe105⤵PID:1444
-
\??\c:\hnflpbv.exec:\hnflpbv.exe106⤵PID:1976
-
\??\c:\vvdrjrr.exec:\vvdrjrr.exe107⤵PID:1416
-
\??\c:\ptvbhv.exec:\ptvbhv.exe108⤵PID:2288
-
\??\c:\njxtn.exec:\njxtn.exe109⤵PID:584
-
\??\c:\ttvdr.exec:\ttvdr.exe110⤵PID:2560
-
\??\c:\hxpttjv.exec:\hxpttjv.exe111⤵PID:2456
-
\??\c:\jlprt.exec:\jlprt.exe112⤵PID:680
-
\??\c:\rpblptp.exec:\rpblptp.exe113⤵PID:1308
-
\??\c:\hltvx.exec:\hltvx.exe114⤵PID:2064
-
\??\c:\rnpxllr.exec:\rnpxllr.exe115⤵PID:1372
-
\??\c:\tltlpdv.exec:\tltlpdv.exe116⤵PID:108
-
\??\c:\btdpr.exec:\btdpr.exe117⤵PID:2892
-
\??\c:\rpdljl.exec:\rpdljl.exe118⤵PID:1804
-
\??\c:\btbtrrp.exec:\btbtrrp.exe119⤵PID:2820
-
\??\c:\bvtrpxd.exec:\bvtrpxd.exe120⤵
- System Location Discovery: System Language Discovery
PID:2808 -
\??\c:\fpfnb.exec:\fpfnb.exe121⤵PID:2752
-
\??\c:\xdlbbx.exec:\xdlbbx.exe122⤵PID:2836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-