Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe
Resource
win7-20241010-en
General
-
Target
84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe
-
Size
70KB
-
MD5
5460e8f86f5cb913e24c019de9eaefd0
-
SHA1
c869024f828b4f6a88b5a3199436f7e104a3d5ac
-
SHA256
84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538
-
SHA512
75f0fa202907e462c4539e567db3d30d6086223c6a8d7e927cab0fcf2a3c39b5b28e8925bc1e6ff5b1dc5a4d45c3815619d04c963de1077da77ac7b5560104d6
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6Mu/ePS3Ag:ymb3NkkiQ3mdBjFI46TQg
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/844-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2800-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2712-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3068-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/700-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1120-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1472-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1152-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vxhnhrl.exebbljtdn.exerhtrtn.exelftthx.exevlrjlr.exelfnxnh.exejjvft.exerprnfxb.exevffxltn.exebvrnnbr.exepdvxhj.exexnlfx.exepbxntv.exednjbbnx.exebtvlxbp.exetddnvfb.exebbjbdrd.exexpprbhn.exedvbbd.exexhhrr.exefhfpbh.exevrdrvn.exephnjfd.exexhdtb.exejxfjrj.exelnrjd.exedjpbfdr.exebtjjh.exebxlbjv.exednrtth.exexdhlv.exebbhtj.exevbxbxn.exevpdrh.exejftxf.exelnvrdl.exebvxtjjt.exebdxbln.exevnftfnx.exelbrtlvv.exejtlnhtj.exevbhxx.exepxfthf.exeffdrdhn.exephrlr.exefpftpf.exejbvfpj.exenxbvbb.exeftpfn.exextnvt.exexrvrh.exernhvh.exedltnbx.exerbflxl.exenjlrlp.exentxld.exerxpvhl.exexlvdf.exerrffnbv.exejvtpl.exehnjnp.exefxfxl.exepdjrnbb.exerlbbntt.exepid Process 2684 vxhnhrl.exe 2800 bbljtdn.exe 2600 rhtrtn.exe 2896 lftthx.exe 2820 vlrjlr.exe 2712 lfnxnh.exe 3068 jjvft.exe 2168 rprnfxb.exe 2948 vffxltn.exe 2392 bvrnnbr.exe 1796 pdvxhj.exe 2632 xnlfx.exe 700 pbxntv.exe 524 dnjbbnx.exe 2472 btvlxbp.exe 1412 tddnvfb.exe 1760 bbjbdrd.exe 2108 xpprbhn.exe 1704 dvbbd.exe 2480 xhhrr.exe 2880 fhfpbh.exe 1120 vrdrvn.exe 1472 phnjfd.exe 1964 xhdtb.exe 1624 jxfjrj.exe 3040 lnrjd.exe 1152 djpbfdr.exe 2024 btjjh.exe 2000 bxlbjv.exe 2260 dnrtth.exe 2200 xdhlv.exe 2792 bbhtj.exe 2804 vbxbxn.exe 2744 vpdrh.exe 2752 jftxf.exe 2180 lnvrdl.exe 2728 bvxtjjt.exe 2916 bdxbln.exe 2644 vnftfnx.exe 3060 lbrtlvv.exe 1200 jtlnhtj.exe 1072 vbhxx.exe 576 pxfthf.exe 2932 ffdrdhn.exe 2496 phrlr.exe 2680 fpftpf.exe 1784 jbvfpj.exe 2240 nxbvbb.exe 2632 ftpfn.exe 1968 xtnvt.exe 2460 xrvrh.exe 1184 rnhvh.exe 2196 dltnbx.exe 2312 rbflxl.exe 2400 njlrlp.exe 2476 ntxld.exe 2176 rxpvhl.exe 2568 xlvdf.exe 280 rrffnbv.exe 828 jvtpl.exe 2004 hnjnp.exe 1508 fxfxl.exe 620 pdjrnbb.exe 3028 rlbbntt.exe -
Processes:
resource yara_rule behavioral1/memory/844-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/700-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1120-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1472-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-277-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lbnbhl.exerjntj.exelbbhhj.exefrvtv.exelxpvtph.exejftxf.exernlrdd.exehtfthht.exetjlndpd.exeblxhtxl.exepflxfr.exerxhjr.exejjpfd.exehrrtjph.exetrhfn.exejjldbt.exenxfbnnl.exejrflb.exehfntvj.exejvtpl.exelbfld.exevddjtb.exevvlnrnr.exepbxntv.exerjttthj.exetvrhbdf.exefxxnvrr.exexdbprhv.exenplfbbv.exelbxxrf.exepvvjbr.exedvvvn.exebthnnx.exefltnlx.exeblrtvvf.exefhjnb.exetjxlh.exejxrvhr.exettvltp.exedvfpr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbnbhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjntj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbbhhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frvtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxpvtph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jftxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnlrdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htfthht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjlndpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blxhtxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pflxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxhjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrrtjph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trhfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjldbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxfbnnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrflb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfntvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvtpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbfld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddjtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvlnrnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbxntv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjttthj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvrhbdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxnvrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdbprhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nplfbbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbxxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltnlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blrtvvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhjnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjxlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxrvhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttvltp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvfpr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exevxhnhrl.exebbljtdn.exerhtrtn.exelftthx.exevlrjlr.exelfnxnh.exejjvft.exerprnfxb.exevffxltn.exebvrnnbr.exepdvxhj.exexnlfx.exepbxntv.exednjbbnx.exebtvlxbp.exedescription pid Process procid_target PID 844 wrote to memory of 2684 844 84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe 30 PID 844 wrote to memory of 2684 844 84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe 30 PID 844 wrote to memory of 2684 844 84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe 30 PID 844 wrote to memory of 2684 844 84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe 30 PID 2684 wrote to memory of 2800 2684 vxhnhrl.exe 31 PID 2684 wrote to memory of 2800 2684 vxhnhrl.exe 31 PID 2684 wrote to memory of 2800 2684 vxhnhrl.exe 31 PID 2684 wrote to memory of 2800 2684 vxhnhrl.exe 31 PID 2800 wrote to memory of 2600 2800 bbljtdn.exe 32 PID 2800 wrote to memory of 2600 2800 bbljtdn.exe 32 PID 2800 wrote to memory of 2600 2800 bbljtdn.exe 32 PID 2800 wrote to memory of 2600 2800 bbljtdn.exe 32 PID 2600 wrote to memory of 2896 2600 rhtrtn.exe 33 PID 2600 wrote to memory of 2896 2600 rhtrtn.exe 33 PID 2600 wrote to memory of 2896 2600 rhtrtn.exe 33 PID 2600 wrote to memory of 2896 2600 rhtrtn.exe 33 PID 2896 wrote to memory of 2820 2896 lftthx.exe 34 PID 2896 wrote to memory of 2820 2896 lftthx.exe 34 PID 2896 wrote to memory of 2820 2896 lftthx.exe 34 PID 2896 wrote to memory of 2820 2896 lftthx.exe 34 PID 2820 wrote to memory of 2712 2820 vlrjlr.exe 35 PID 2820 wrote to memory of 2712 2820 vlrjlr.exe 35 PID 2820 wrote to memory of 2712 2820 vlrjlr.exe 35 PID 2820 wrote to memory of 2712 2820 vlrjlr.exe 35 PID 2712 wrote to memory of 3068 2712 lfnxnh.exe 36 PID 2712 wrote to memory of 3068 2712 lfnxnh.exe 36 PID 2712 wrote to memory of 3068 2712 lfnxnh.exe 36 PID 2712 wrote to memory of 3068 2712 lfnxnh.exe 36 PID 3068 wrote to memory of 2168 3068 jjvft.exe 37 PID 3068 wrote to memory of 2168 3068 jjvft.exe 37 PID 3068 wrote to memory of 2168 3068 jjvft.exe 37 PID 3068 wrote to memory of 2168 3068 jjvft.exe 37 PID 2168 wrote to memory of 2948 2168 rprnfxb.exe 38 PID 2168 wrote to memory of 2948 2168 rprnfxb.exe 38 PID 2168 wrote to memory of 2948 2168 rprnfxb.exe 38 PID 2168 wrote to memory of 2948 2168 rprnfxb.exe 38 PID 2948 wrote to memory of 2392 2948 vffxltn.exe 39 PID 2948 wrote to memory of 2392 2948 vffxltn.exe 39 PID 2948 wrote to memory of 2392 2948 vffxltn.exe 39 PID 2948 wrote to memory of 2392 2948 vffxltn.exe 39 PID 2392 wrote to memory of 1796 2392 bvrnnbr.exe 40 PID 2392 wrote to memory of 1796 2392 bvrnnbr.exe 40 PID 2392 wrote to memory of 1796 2392 bvrnnbr.exe 40 PID 2392 wrote to memory of 1796 2392 bvrnnbr.exe 40 PID 1796 wrote to memory of 2632 1796 pdvxhj.exe 41 PID 1796 wrote to memory of 2632 1796 pdvxhj.exe 41 PID 1796 wrote to memory of 2632 1796 pdvxhj.exe 41 PID 1796 wrote to memory of 2632 1796 pdvxhj.exe 41 PID 2632 wrote to memory of 700 2632 xnlfx.exe 42 PID 2632 wrote to memory of 700 2632 xnlfx.exe 42 PID 2632 wrote to memory of 700 2632 xnlfx.exe 42 PID 2632 wrote to memory of 700 2632 xnlfx.exe 42 PID 700 wrote to memory of 524 700 pbxntv.exe 43 PID 700 wrote to memory of 524 700 pbxntv.exe 43 PID 700 wrote to memory of 524 700 pbxntv.exe 43 PID 700 wrote to memory of 524 700 pbxntv.exe 43 PID 524 wrote to memory of 2472 524 dnjbbnx.exe 44 PID 524 wrote to memory of 2472 524 dnjbbnx.exe 44 PID 524 wrote to memory of 2472 524 dnjbbnx.exe 44 PID 524 wrote to memory of 2472 524 dnjbbnx.exe 44 PID 2472 wrote to memory of 1412 2472 btvlxbp.exe 45 PID 2472 wrote to memory of 1412 2472 btvlxbp.exe 45 PID 2472 wrote to memory of 1412 2472 btvlxbp.exe 45 PID 2472 wrote to memory of 1412 2472 btvlxbp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe"C:\Users\Admin\AppData\Local\Temp\84d0f15d3fb2cb31e1c2b24712dcb5c9bd7c1d3231c4349955d1bf3a8c2b7538N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:844 -
\??\c:\vxhnhrl.exec:\vxhnhrl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\bbljtdn.exec:\bbljtdn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\rhtrtn.exec:\rhtrtn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\lftthx.exec:\lftthx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\vlrjlr.exec:\vlrjlr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\lfnxnh.exec:\lfnxnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\jjvft.exec:\jjvft.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\rprnfxb.exec:\rprnfxb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\vffxltn.exec:\vffxltn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\bvrnnbr.exec:\bvrnnbr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\pdvxhj.exec:\pdvxhj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\xnlfx.exec:\xnlfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\pbxntv.exec:\pbxntv.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
\??\c:\dnjbbnx.exec:\dnjbbnx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\btvlxbp.exec:\btvlxbp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\tddnvfb.exec:\tddnvfb.exe17⤵
- Executes dropped EXE
PID:1412 -
\??\c:\bbjbdrd.exec:\bbjbdrd.exe18⤵
- Executes dropped EXE
PID:1760 -
\??\c:\xpprbhn.exec:\xpprbhn.exe19⤵
- Executes dropped EXE
PID:2108 -
\??\c:\dvbbd.exec:\dvbbd.exe20⤵
- Executes dropped EXE
PID:1704 -
\??\c:\xhhrr.exec:\xhhrr.exe21⤵
- Executes dropped EXE
PID:2480 -
\??\c:\fhfpbh.exec:\fhfpbh.exe22⤵
- Executes dropped EXE
PID:2880 -
\??\c:\vrdrvn.exec:\vrdrvn.exe23⤵
- Executes dropped EXE
PID:1120 -
\??\c:\phnjfd.exec:\phnjfd.exe24⤵
- Executes dropped EXE
PID:1472 -
\??\c:\xhdtb.exec:\xhdtb.exe25⤵
- Executes dropped EXE
PID:1964 -
\??\c:\jxfjrj.exec:\jxfjrj.exe26⤵
- Executes dropped EXE
PID:1624 -
\??\c:\lnrjd.exec:\lnrjd.exe27⤵
- Executes dropped EXE
PID:3040 -
\??\c:\djpbfdr.exec:\djpbfdr.exe28⤵
- Executes dropped EXE
PID:1152 -
\??\c:\btjjh.exec:\btjjh.exe29⤵
- Executes dropped EXE
PID:2024 -
\??\c:\bxlbjv.exec:\bxlbjv.exe30⤵
- Executes dropped EXE
PID:2000 -
\??\c:\dnrtth.exec:\dnrtth.exe31⤵
- Executes dropped EXE
PID:2260 -
\??\c:\xdhlv.exec:\xdhlv.exe32⤵
- Executes dropped EXE
PID:2200 -
\??\c:\bbhtj.exec:\bbhtj.exe33⤵
- Executes dropped EXE
PID:2792 -
\??\c:\vbxbxn.exec:\vbxbxn.exe34⤵
- Executes dropped EXE
PID:2804 -
\??\c:\vpdrh.exec:\vpdrh.exe35⤵
- Executes dropped EXE
PID:2744 -
\??\c:\jftxf.exec:\jftxf.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752 -
\??\c:\lnvrdl.exec:\lnvrdl.exe37⤵
- Executes dropped EXE
PID:2180 -
\??\c:\bvxtjjt.exec:\bvxtjjt.exe38⤵
- Executes dropped EXE
PID:2728 -
\??\c:\bdxbln.exec:\bdxbln.exe39⤵
- Executes dropped EXE
PID:2916 -
\??\c:\vnftfnx.exec:\vnftfnx.exe40⤵
- Executes dropped EXE
PID:2644 -
\??\c:\lbrtlvv.exec:\lbrtlvv.exe41⤵
- Executes dropped EXE
PID:3060 -
\??\c:\jtlnhtj.exec:\jtlnhtj.exe42⤵
- Executes dropped EXE
PID:1200 -
\??\c:\vbhxx.exec:\vbhxx.exe43⤵
- Executes dropped EXE
PID:1072 -
\??\c:\pxfthf.exec:\pxfthf.exe44⤵
- Executes dropped EXE
PID:576 -
\??\c:\ffdrdhn.exec:\ffdrdhn.exe45⤵
- Executes dropped EXE
PID:2932 -
\??\c:\phrlr.exec:\phrlr.exe46⤵
- Executes dropped EXE
PID:2496 -
\??\c:\fpftpf.exec:\fpftpf.exe47⤵
- Executes dropped EXE
PID:2680 -
\??\c:\jbvfpj.exec:\jbvfpj.exe48⤵
- Executes dropped EXE
PID:1784 -
\??\c:\nxbvbb.exec:\nxbvbb.exe49⤵
- Executes dropped EXE
PID:2240 -
\??\c:\ftpfn.exec:\ftpfn.exe50⤵
- Executes dropped EXE
PID:2632 -
\??\c:\xtnvt.exec:\xtnvt.exe51⤵
- Executes dropped EXE
PID:1968 -
\??\c:\xrvrh.exec:\xrvrh.exe52⤵
- Executes dropped EXE
PID:2460 -
\??\c:\rnhvh.exec:\rnhvh.exe53⤵
- Executes dropped EXE
PID:1184 -
\??\c:\dltnbx.exec:\dltnbx.exe54⤵
- Executes dropped EXE
PID:2196 -
\??\c:\rbflxl.exec:\rbflxl.exe55⤵
- Executes dropped EXE
PID:2312 -
\??\c:\njlrlp.exec:\njlrlp.exe56⤵
- Executes dropped EXE
PID:2400 -
\??\c:\ntxld.exec:\ntxld.exe57⤵
- Executes dropped EXE
PID:2476 -
\??\c:\rxpvhl.exec:\rxpvhl.exe58⤵
- Executes dropped EXE
PID:2176 -
\??\c:\xlvdf.exec:\xlvdf.exe59⤵
- Executes dropped EXE
PID:2568 -
\??\c:\rrffnbv.exec:\rrffnbv.exe60⤵
- Executes dropped EXE
PID:280 -
\??\c:\jvtpl.exec:\jvtpl.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:828 -
\??\c:\hnjnp.exec:\hnjnp.exe62⤵
- Executes dropped EXE
PID:2004 -
\??\c:\fxfxl.exec:\fxfxl.exe63⤵
- Executes dropped EXE
PID:1508 -
\??\c:\pdjrnbb.exec:\pdjrnbb.exe64⤵
- Executes dropped EXE
PID:620 -
\??\c:\rlbbntt.exec:\rlbbntt.exe65⤵
- Executes dropped EXE
PID:3028 -
\??\c:\nxfhn.exec:\nxfhn.exe66⤵PID:1312
-
\??\c:\pfrrj.exec:\pfrrj.exe67⤵PID:3040
-
\??\c:\hllpjj.exec:\hllpjj.exe68⤵PID:2528
-
\??\c:\jlhnt.exec:\jlhnt.exe69⤵PID:2012
-
\??\c:\hvxtdb.exec:\hvxtdb.exe70⤵PID:1696
-
\??\c:\frnjvl.exec:\frnjvl.exe71⤵PID:2876
-
\??\c:\bprrxjh.exec:\bprrxjh.exe72⤵PID:2740
-
\??\c:\ftttdp.exec:\ftttdp.exe73⤵PID:2736
-
\??\c:\fbfvbfv.exec:\fbfvbfv.exe74⤵PID:2812
-
\??\c:\prtfbhn.exec:\prtfbhn.exe75⤵PID:2732
-
\??\c:\xxvljl.exec:\xxvljl.exe76⤵PID:2708
-
\??\c:\nfhvxxd.exec:\nfhvxxd.exe77⤵PID:2928
-
\??\c:\lvrlhfb.exec:\lvrlhfb.exe78⤵PID:2764
-
\??\c:\bjnrdjx.exec:\bjnrdjx.exe79⤵PID:2728
-
\??\c:\hrtdrbd.exec:\hrtdrbd.exe80⤵PID:2656
-
\??\c:\xpnfvt.exec:\xpnfvt.exe81⤵PID:3056
-
\??\c:\bxjlfff.exec:\bxjlfff.exe82⤵PID:2712
-
\??\c:\jnrjb.exec:\jnrjb.exe83⤵PID:1200
-
\??\c:\vpdtph.exec:\vpdtph.exe84⤵PID:2908
-
\??\c:\xxllrp.exec:\xxllrp.exe85⤵PID:2940
-
\??\c:\tntvx.exec:\tntvx.exe86⤵PID:2936
-
\??\c:\vfhxlrh.exec:\vfhxlrh.exe87⤵PID:2132
-
\??\c:\rpxhn.exec:\rpxhn.exe88⤵PID:1768
-
\??\c:\njjvt.exec:\njjvt.exe89⤵PID:2184
-
\??\c:\ddlhjpt.exec:\ddlhjpt.exe90⤵PID:592
-
\??\c:\frpvdj.exec:\frpvdj.exe91⤵PID:548
-
\??\c:\dxvjn.exec:\dxvjn.exe92⤵PID:2432
-
\??\c:\xphlrtb.exec:\xphlrtb.exe93⤵PID:2192
-
\??\c:\bdnfbn.exec:\bdnfbn.exe94⤵PID:2152
-
\??\c:\xfptlh.exec:\xfptlh.exe95⤵PID:1904
-
\??\c:\pvxxxh.exec:\pvxxxh.exe96⤵PID:1808
-
\??\c:\bvbppn.exec:\bvbppn.exe97⤵PID:2100
-
\??\c:\nffvht.exec:\nffvht.exe98⤵PID:1276
-
\??\c:\rvrnvn.exec:\rvrnvn.exe99⤵PID:1704
-
\??\c:\jfrpl.exec:\jfrpl.exe100⤵PID:2156
-
\??\c:\nntvbp.exec:\nntvbp.exe101⤵PID:1908
-
\??\c:\lfpnnvb.exec:\lfpnnvb.exe102⤵PID:1940
-
\??\c:\pbrxjn.exec:\pbrxjn.exe103⤵PID:1220
-
\??\c:\ttlxdl.exec:\ttlxdl.exe104⤵PID:1504
-
\??\c:\ljpltpt.exec:\ljpltpt.exe105⤵PID:364
-
\??\c:\hddhfv.exec:\hddhfv.exe106⤵PID:1008
-
\??\c:\ldfhp.exec:\ldfhp.exe107⤵PID:1484
-
\??\c:\drxbvdt.exec:\drxbvdt.exe108⤵PID:1628
-
\??\c:\thvllrb.exec:\thvllrb.exe109⤵PID:1152
-
\??\c:\nfbhprb.exec:\nfbhprb.exe110⤵PID:1612
-
\??\c:\frffvb.exec:\frffvb.exe111⤵PID:844
-
\??\c:\tnjpjlh.exec:\tnjpjlh.exe112⤵PID:2448
-
\??\c:\lbvnhvl.exec:\lbvnhvl.exe113⤵PID:1564
-
\??\c:\jfjlrf.exec:\jfjlrf.exe114⤵PID:1584
-
\??\c:\jdfdxpn.exec:\jdfdxpn.exe115⤵PID:2816
-
\??\c:\jpvhd.exec:\jpvhd.exe116⤵PID:2716
-
\??\c:\tvrhbdf.exec:\tvrhbdf.exe117⤵
- System Location Discovery: System Language Discovery
PID:2752 -
\??\c:\vfptf.exec:\vfptf.exe118⤵PID:2628
-
\??\c:\xlxllhj.exec:\xlxllhj.exe119⤵PID:2588
-
\??\c:\lfvptf.exec:\lfvptf.exe120⤵PID:2916
-
\??\c:\httvhpx.exec:\httvhpx.exe121⤵PID:2644
-
\??\c:\pnjvdx.exec:\pnjvdx.exe122⤵PID:1364
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-