Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 11:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe
-
Size
71KB
-
MD5
2d1eda0583a0529c32914b37309aa3b0
-
SHA1
3fd92faaf59997ee433ea1d11812dd6a89819c3a
-
SHA256
b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99f
-
SHA512
8e92de592388de0c4332faa3c1fd10d47b37a40531aad4556f7ae683372a867b0779b53af60938815a36c2cb2e475dda0777fb5e93465972ccb50dfe718de2ac
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjnv:ymb3NkkiQ3mdBjFI4VXv
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral1/memory/664-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-32-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2972-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2288-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2648-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1064-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2200-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/864-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/976-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/376-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1628-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3068-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-310-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2728 tlrvt.exe 2872 vhddnh.exe 2972 nrrpbv.exe 2920 djllr.exe 2288 dhlttlf.exe 2648 nfrvd.exe 3048 lpprf.exe 2532 jfjnnnb.exe 1064 lvxxbv.exe 2724 ldfbxt.exe 3028 ptlfld.exe 1940 vnrxtj.exe 2448 xhfnjnp.exe 2988 rtltlpt.exe 1136 xnrlj.exe 2240 jnfrnf.exe 2200 drrnb.exe 2316 tvvnvn.exe 976 lxbjl.exe 864 bdppjh.exe 376 fvxft.exe 1000 bjrpd.exe 2108 htpfv.exe 1544 nppnl.exe 1628 pdfrbnp.exe 548 lrftd.exe 560 pvvprll.exe 3068 rrrfrfx.exe 2960 nlxjn.exe 1724 fhxfhxl.exe 1960 ldnfrfn.exe 3024 jtrhv.exe 2872 tnbjrnr.exe 2848 ltndrh.exe 2768 vllbb.exe 2864 flxhrh.exe 2836 fxntvh.exe 2800 vdpvvh.exe 2632 fllrb.exe 2708 bdlbtl.exe 2292 dpplxbl.exe 3060 lhjdd.exe 1120 rxnxjdf.exe 2468 drhnl.exe 2472 ndpfj.exe 1980 ffdtjln.exe 2528 pnxlhd.exe 1944 fljnv.exe 968 vlbbnjr.exe 2420 pvrljlx.exe 1084 vvxhp.exe 2988 hlltj.exe 1752 fllvrrh.exe 2436 dlpxdvl.exe 2428 rjfdv.exe 2328 jllbnb.exe 1936 bvnnvfl.exe 1180 bllhxf.exe 2508 rnrlbd.exe 360 dlrhj.exe 1448 hppjd.exe 1456 frfnv.exe 2024 jhrhjjj.exe 1568 trrvpj.exe -
resource yara_rule behavioral1/memory/664-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2648-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1064-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2200-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/864-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/976-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/376-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-310-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlnrpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfvxnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlprp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbxhxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrrtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdhfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvtpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlpnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvjpvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnvtxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhbjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrxdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnvhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrltx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blbxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfnrbnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhtptd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfdffbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtnjblv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vntxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpvvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxdrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnllth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhfjjxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvxrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpnxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbvfbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrjnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxrdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxrjft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnvdvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvttr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nltxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnftb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bftft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrjrbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 664 wrote to memory of 2728 664 b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe 29 PID 664 wrote to memory of 2728 664 b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe 29 PID 664 wrote to memory of 2728 664 b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe 29 PID 664 wrote to memory of 2728 664 b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe 29 PID 2728 wrote to memory of 2872 2728 tlrvt.exe 30 PID 2728 wrote to memory of 2872 2728 tlrvt.exe 30 PID 2728 wrote to memory of 2872 2728 tlrvt.exe 30 PID 2728 wrote to memory of 2872 2728 tlrvt.exe 30 PID 2872 wrote to memory of 2972 2872 vhddnh.exe 31 PID 2872 wrote to memory of 2972 2872 vhddnh.exe 31 PID 2872 wrote to memory of 2972 2872 vhddnh.exe 31 PID 2872 wrote to memory of 2972 2872 vhddnh.exe 31 PID 2972 wrote to memory of 2920 2972 nrrpbv.exe 32 PID 2972 wrote to memory of 2920 2972 nrrpbv.exe 32 PID 2972 wrote to memory of 2920 2972 nrrpbv.exe 32 PID 2972 wrote to memory of 2920 2972 nrrpbv.exe 32 PID 2920 wrote to memory of 2288 2920 djllr.exe 33 PID 2920 wrote to memory of 2288 2920 djllr.exe 33 PID 2920 wrote to memory of 2288 2920 djllr.exe 33 PID 2920 wrote to memory of 2288 2920 djllr.exe 33 PID 2288 wrote to memory of 2648 2288 dhlttlf.exe 34 PID 2288 wrote to memory of 2648 2288 dhlttlf.exe 34 PID 2288 wrote to memory of 2648 2288 dhlttlf.exe 34 PID 2288 wrote to memory of 2648 2288 dhlttlf.exe 34 PID 2648 wrote to memory of 3048 2648 nfrvd.exe 35 PID 2648 wrote to memory of 3048 2648 nfrvd.exe 35 PID 2648 wrote to memory of 3048 2648 nfrvd.exe 35 PID 2648 wrote to memory of 3048 2648 nfrvd.exe 35 PID 3048 wrote to memory of 2532 3048 lpprf.exe 36 PID 3048 wrote to memory of 2532 3048 lpprf.exe 36 PID 3048 wrote to memory of 2532 3048 lpprf.exe 36 PID 3048 wrote to memory of 2532 3048 lpprf.exe 36 PID 2532 wrote to memory of 1064 2532 jfjnnnb.exe 37 PID 2532 wrote to memory of 1064 2532 jfjnnnb.exe 37 PID 2532 wrote to memory of 1064 2532 jfjnnnb.exe 37 PID 2532 wrote to memory of 1064 2532 jfjnnnb.exe 37 PID 1064 wrote to memory of 2724 1064 lvxxbv.exe 38 PID 1064 wrote to memory of 2724 1064 lvxxbv.exe 38 PID 1064 wrote to memory of 2724 1064 lvxxbv.exe 38 PID 1064 wrote to memory of 2724 1064 lvxxbv.exe 38 PID 2724 wrote to memory of 3028 2724 ldfbxt.exe 39 PID 2724 wrote to memory of 3028 2724 ldfbxt.exe 39 PID 2724 wrote to memory of 3028 2724 ldfbxt.exe 39 PID 2724 wrote to memory of 3028 2724 ldfbxt.exe 39 PID 3028 wrote to memory of 1940 3028 ptlfld.exe 40 PID 3028 wrote to memory of 1940 3028 ptlfld.exe 40 PID 3028 wrote to memory of 1940 3028 ptlfld.exe 40 PID 3028 wrote to memory of 1940 3028 ptlfld.exe 40 PID 1940 wrote to memory of 2448 1940 vnrxtj.exe 41 PID 1940 wrote to memory of 2448 1940 vnrxtj.exe 41 PID 1940 wrote to memory of 2448 1940 vnrxtj.exe 41 PID 1940 wrote to memory of 2448 1940 vnrxtj.exe 41 PID 2448 wrote to memory of 2988 2448 xhfnjnp.exe 42 PID 2448 wrote to memory of 2988 2448 xhfnjnp.exe 42 PID 2448 wrote to memory of 2988 2448 xhfnjnp.exe 42 PID 2448 wrote to memory of 2988 2448 xhfnjnp.exe 42 PID 2988 wrote to memory of 1136 2988 rtltlpt.exe 43 PID 2988 wrote to memory of 1136 2988 rtltlpt.exe 43 PID 2988 wrote to memory of 1136 2988 rtltlpt.exe 43 PID 2988 wrote to memory of 1136 2988 rtltlpt.exe 43 PID 1136 wrote to memory of 2240 1136 xnrlj.exe 44 PID 1136 wrote to memory of 2240 1136 xnrlj.exe 44 PID 1136 wrote to memory of 2240 1136 xnrlj.exe 44 PID 1136 wrote to memory of 2240 1136 xnrlj.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe"C:\Users\Admin\AppData\Local\Temp\b92e3b51c753c2ec49850a44c0e9f66ffa6c4a65867269654dc7f6fd389cc99fN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:664 -
\??\c:\tlrvt.exec:\tlrvt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\vhddnh.exec:\vhddnh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\nrrpbv.exec:\nrrpbv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\djllr.exec:\djllr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\dhlttlf.exec:\dhlttlf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\nfrvd.exec:\nfrvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\lpprf.exec:\lpprf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\jfjnnnb.exec:\jfjnnnb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\lvxxbv.exec:\lvxxbv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\ldfbxt.exec:\ldfbxt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\ptlfld.exec:\ptlfld.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\vnrxtj.exec:\vnrxtj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\xhfnjnp.exec:\xhfnjnp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\rtltlpt.exec:\rtltlpt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\xnrlj.exec:\xnrlj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\jnfrnf.exec:\jnfrnf.exe17⤵
- Executes dropped EXE
PID:2240 -
\??\c:\drrnb.exec:\drrnb.exe18⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tvvnvn.exec:\tvvnvn.exe19⤵
- Executes dropped EXE
PID:2316 -
\??\c:\lxbjl.exec:\lxbjl.exe20⤵
- Executes dropped EXE
PID:976 -
\??\c:\bdppjh.exec:\bdppjh.exe21⤵
- Executes dropped EXE
PID:864 -
\??\c:\fvxft.exec:\fvxft.exe22⤵
- Executes dropped EXE
PID:376 -
\??\c:\bjrpd.exec:\bjrpd.exe23⤵
- Executes dropped EXE
PID:1000 -
\??\c:\htpfv.exec:\htpfv.exe24⤵
- Executes dropped EXE
PID:2108 -
\??\c:\nppnl.exec:\nppnl.exe25⤵
- Executes dropped EXE
PID:1544 -
\??\c:\pdfrbnp.exec:\pdfrbnp.exe26⤵
- Executes dropped EXE
PID:1628 -
\??\c:\lrftd.exec:\lrftd.exe27⤵
- Executes dropped EXE
PID:548 -
\??\c:\pvvprll.exec:\pvvprll.exe28⤵
- Executes dropped EXE
PID:560 -
\??\c:\rrrfrfx.exec:\rrrfrfx.exe29⤵
- Executes dropped EXE
PID:3068 -
\??\c:\nlxjn.exec:\nlxjn.exe30⤵
- Executes dropped EXE
PID:2960 -
\??\c:\fhxfhxl.exec:\fhxfhxl.exe31⤵
- Executes dropped EXE
PID:1724 -
\??\c:\ldnfrfn.exec:\ldnfrfn.exe32⤵
- Executes dropped EXE
PID:1960 -
\??\c:\jtrhv.exec:\jtrhv.exe33⤵
- Executes dropped EXE
PID:3024 -
\??\c:\tnbjrnr.exec:\tnbjrnr.exe34⤵
- Executes dropped EXE
PID:2872 -
\??\c:\ltndrh.exec:\ltndrh.exe35⤵
- Executes dropped EXE
PID:2848 -
\??\c:\vllbb.exec:\vllbb.exe36⤵
- Executes dropped EXE
PID:2768 -
\??\c:\flxhrh.exec:\flxhrh.exe37⤵
- Executes dropped EXE
PID:2864 -
\??\c:\fxntvh.exec:\fxntvh.exe38⤵
- Executes dropped EXE
PID:2836 -
\??\c:\vdpvvh.exec:\vdpvvh.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800 -
\??\c:\fllrb.exec:\fllrb.exe40⤵
- Executes dropped EXE
PID:2632 -
\??\c:\bdlbtl.exec:\bdlbtl.exe41⤵
- Executes dropped EXE
PID:2708 -
\??\c:\dpplxbl.exec:\dpplxbl.exe42⤵
- Executes dropped EXE
PID:2292 -
\??\c:\lhjdd.exec:\lhjdd.exe43⤵
- Executes dropped EXE
PID:3060 -
\??\c:\rxnxjdf.exec:\rxnxjdf.exe44⤵
- Executes dropped EXE
PID:1120 -
\??\c:\drhnl.exec:\drhnl.exe45⤵
- Executes dropped EXE
PID:2468 -
\??\c:\ndpfj.exec:\ndpfj.exe46⤵
- Executes dropped EXE
PID:2472 -
\??\c:\ffdtjln.exec:\ffdtjln.exe47⤵
- Executes dropped EXE
PID:1980 -
\??\c:\pnxlhd.exec:\pnxlhd.exe48⤵
- Executes dropped EXE
PID:2528 -
\??\c:\fljnv.exec:\fljnv.exe49⤵
- Executes dropped EXE
PID:1944 -
\??\c:\vlbbnjr.exec:\vlbbnjr.exe50⤵
- Executes dropped EXE
PID:968 -
\??\c:\pvrljlx.exec:\pvrljlx.exe51⤵
- Executes dropped EXE
PID:2420 -
\??\c:\vvxhp.exec:\vvxhp.exe52⤵
- Executes dropped EXE
PID:1084 -
\??\c:\hlltj.exec:\hlltj.exe53⤵
- Executes dropped EXE
PID:2988 -
\??\c:\fllvrrh.exec:\fllvrrh.exe54⤵
- Executes dropped EXE
PID:1752 -
\??\c:\dlpxdvl.exec:\dlpxdvl.exe55⤵
- Executes dropped EXE
PID:2436 -
\??\c:\rjfdv.exec:\rjfdv.exe56⤵
- Executes dropped EXE
PID:2428 -
\??\c:\jllbnb.exec:\jllbnb.exe57⤵
- Executes dropped EXE
PID:2328 -
\??\c:\bvnnvfl.exec:\bvnnvfl.exe58⤵
- Executes dropped EXE
PID:1936 -
\??\c:\bllhxf.exec:\bllhxf.exe59⤵
- Executes dropped EXE
PID:1180 -
\??\c:\rnrlbd.exec:\rnrlbd.exe60⤵
- Executes dropped EXE
PID:2508 -
\??\c:\dlrhj.exec:\dlrhj.exe61⤵
- Executes dropped EXE
PID:360 -
\??\c:\hppjd.exec:\hppjd.exe62⤵
- Executes dropped EXE
PID:1448 -
\??\c:\frfnv.exec:\frfnv.exe63⤵
- Executes dropped EXE
PID:1456 -
\??\c:\jhrhjjj.exec:\jhrhjjj.exe64⤵
- Executes dropped EXE
PID:2024 -
\??\c:\trrvpj.exec:\trrvpj.exe65⤵
- Executes dropped EXE
PID:1568 -
\??\c:\ndrxd.exec:\ndrxd.exe66⤵PID:1500
-
\??\c:\xddfl.exec:\xddfl.exe67⤵PID:2484
-
\??\c:\hrtnb.exec:\hrtnb.exe68⤵PID:944
-
\??\c:\hpnrpvx.exec:\hpnrpvx.exe69⤵PID:692
-
\??\c:\xfbht.exec:\xfbht.exe70⤵PID:3068
-
\??\c:\phjjndf.exec:\phjjndf.exe71⤵PID:2980
-
\??\c:\dpdvr.exec:\dpdvr.exe72⤵PID:2572
-
\??\c:\fbthxd.exec:\fbthxd.exe73⤵PID:2956
-
\??\c:\hdtbp.exec:\hdtbp.exe74⤵PID:2196
-
\??\c:\lrldb.exec:\lrldb.exe75⤵PID:2792
-
\??\c:\prvtr.exec:\prvtr.exe76⤵PID:2872
-
\??\c:\xlnrl.exec:\xlnrl.exe77⤵PID:2848
-
\??\c:\rplpr.exec:\rplpr.exe78⤵PID:2768
-
\??\c:\njxlxx.exec:\njxlxx.exe79⤵PID:2972
-
\??\c:\xfxtb.exec:\xfxtb.exe80⤵PID:2836
-
\??\c:\vjdjvf.exec:\vjdjvf.exe81⤵PID:2800
-
\??\c:\dhxlr.exec:\dhxlr.exe82⤵PID:2632
-
\??\c:\thdrfnt.exec:\thdrfnt.exe83⤵PID:2708
-
\??\c:\vrpfpr.exec:\vrpfpr.exe84⤵PID:688
-
\??\c:\jttntv.exec:\jttntv.exe85⤵PID:388
-
\??\c:\pfpxf.exec:\pfpxf.exe86⤵PID:1120
-
\??\c:\rntbnbn.exec:\rntbnbn.exe87⤵PID:2564
-
\??\c:\lnftb.exec:\lnftb.exe88⤵
- System Location Discovery: System Language Discovery
PID:2064 -
\??\c:\fnvbn.exec:\fnvbn.exe89⤵PID:2400
-
\??\c:\brbpnxb.exec:\brbpnxb.exe90⤵PID:1604
-
\??\c:\fxvjrbh.exec:\fxvjrbh.exe91⤵PID:1944
-
\??\c:\npjfr.exec:\npjfr.exe92⤵PID:908
-
\??\c:\jrrjb.exec:\jrrjb.exe93⤵PID:2420
-
\??\c:\hrjjfbv.exec:\hrjjfbv.exe94⤵PID:1364
-
\??\c:\vlrnrbv.exec:\vlrnrbv.exe95⤵PID:1136
-
\??\c:\fdvlf.exec:\fdvlf.exe96⤵PID:1752
-
\??\c:\nvlbdpf.exec:\nvlbdpf.exe97⤵PID:2200
-
\??\c:\vpdrpbd.exec:\vpdrpbd.exe98⤵PID:2308
-
\??\c:\fbvfbv.exec:\fbvfbv.exe99⤵
- System Location Discovery: System Language Discovery
PID:2432 -
\??\c:\rdnpf.exec:\rdnpf.exe100⤵PID:2040
-
\??\c:\jlxdhf.exec:\jlxdhf.exe101⤵PID:1352
-
\??\c:\vvnhnd.exec:\vvnhnd.exe102⤵PID:2296
-
\??\c:\hhfdnnl.exec:\hhfdnnl.exe103⤵PID:1768
-
\??\c:\nnjbpnt.exec:\nnjbpnt.exe104⤵PID:1448
-
\??\c:\rldxjbf.exec:\rldxjbf.exe105⤵PID:2604
-
\??\c:\dtvxb.exec:\dtvxb.exe106⤵PID:1928
-
\??\c:\hjvtl.exec:\hjvtl.exe107⤵PID:1688
-
\??\c:\jtjrn.exec:\jtjrn.exe108⤵PID:940
-
\??\c:\jffnv.exec:\jffnv.exe109⤵PID:2392
-
\??\c:\xjbbjp.exec:\xjbbjp.exe110⤵PID:2212
-
\??\c:\xtfxf.exec:\xtfxf.exe111⤵PID:1204
-
\??\c:\xpxldn.exec:\xpxldn.exe112⤵PID:3068
-
\??\c:\xndbhb.exec:\xndbhb.exe113⤵PID:2824
-
\??\c:\ntlrvx.exec:\ntlrvx.exe114⤵PID:2572
-
\??\c:\tvjnjfr.exec:\tvjnjfr.exe115⤵PID:2332
-
\??\c:\fnfhnjx.exec:\fnfhnjx.exe116⤵PID:2860
-
\??\c:\bxrbbv.exec:\bxrbbv.exe117⤵PID:1592
-
\??\c:\rhfbfn.exec:\rhfbfn.exe118⤵PID:2752
-
\??\c:\pxhvnt.exec:\pxhvnt.exe119⤵PID:2672
-
\??\c:\dlxlvl.exec:\dlxlvl.exe120⤵PID:2920
-
\??\c:\xfhxn.exec:\xfhxn.exe121⤵PID:2896
-
\??\c:\lnxnrxt.exec:\lnxnrxt.exe122⤵PID:2700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-