Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe
Resource
win7-20241010-en
General
-
Target
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe
-
Size
72KB
-
MD5
9b505f1dcf02dab70d5bfbcd3ddba70e
-
SHA1
437694a0e4a803b48e19716b00713a22f097970c
-
SHA256
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394
-
SHA512
72a81776859465374cc6c6ed1b2ccc7a375dac80beb03f17447b615c5e985fc14680860cf97dd116ba69367824b6c9c22cb7e16ae7e9b9f3cf87e54b6e72aa76
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfUcicP/fG:ymb3NkkiQ3mdBjFI4V4ci2/fG
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2860-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1996-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/928-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2044-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/580-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1884-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/840-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1568-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-256-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1468-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tfbrrb.exetdprr.exejtjll.exerjhhth.exebvhdtb.exejrvvtlt.exebtnjdl.exevxndbt.exendtrdlt.exejpbltr.exefbvjlrd.exedtjxx.exeptjrtxn.exebpdjbt.exehhvvhjx.exettnttxh.exehjlxtdr.exerttppd.exeftxdd.exehtbtv.exejtnddb.exellxxp.exejxtvjnr.exeddxpdrd.exexppjnjx.exendfpdh.exexppdpt.exeppbvf.exebbdld.exephlrpb.exefbjfjp.exetrlnhp.exetdfxnb.exenbbfd.exeftfhjv.exetvdrdf.exerrtddlx.exepfhrplh.exexxtln.exehvfvfb.exednvfxh.exetxdtph.exeppvnj.exedrtpj.exepbnxltn.exepffnjt.exexxnrx.exenlpnr.exejvbpx.exephdbbhr.exepdxbpbd.exefvfhrl.exebhjnf.exehlhddh.exeflxvhn.exenbrxnd.exevrvtlr.exebtdvbxv.exenbllj.exellvxv.exervppbd.exenpjpv.exeddbbp.exexvjdlbn.exepid Process 2872 tfbrrb.exe 2140 tdprr.exe 1996 jtjll.exe 1744 rjhhth.exe 2932 bvhdtb.exe 2788 jrvvtlt.exe 2356 btnjdl.exe 2752 vxndbt.exe 928 ndtrdlt.exe 2548 jpbltr.exe 1136 fbvjlrd.exe 2436 dtjxx.exe 2428 ptjrtxn.exe 2044 bpdjbt.exe 580 hhvvhjx.exe 1928 ttnttxh.exe 2108 hjlxtdr.exe 1884 rttppd.exe 1940 ftxdd.exe 840 htbtv.exe 1056 jtnddb.exe 908 llxxp.exe 2636 jxtvjnr.exe 2952 ddxpdrd.exe 1568 xppjnjx.exe 2744 ndfpdh.exe 2624 xppdpt.exe 1468 ppbvf.exe 1936 bbdld.exe 2544 phlrpb.exe 2868 fbjfjp.exe 1636 trlnhp.exe 2872 tdfxnb.exe 3068 nbbfd.exe 2964 ftfhjv.exe 3016 tvdrdf.exe 2876 rrtddlx.exe 2764 pfhrplh.exe 2884 xxtln.exe 2064 hvfvfb.exe 2516 dnvfxh.exe 2752 txdtph.exe 2552 ppvnj.exe 1664 drtpj.exe 264 pbnxltn.exe 2420 pffnjt.exe 2208 xxnrx.exe 2344 nlpnr.exe 884 jvbpx.exe 2044 phdbbhr.exe 580 pdxbpbd.exe 1312 fvfhrl.exe 2496 bhjnf.exe 2588 hlhddh.exe 1840 flxvhn.exe 456 nbrxnd.exe 1832 vrvtlr.exe 956 btdvbxv.exe 2008 nbllj.exe 1564 llvxv.exe 2676 rvppbd.exe 2952 npjpv.exe 1444 ddbbp.exe 592 xvjdlbn.exe -
Processes:
resource yara_rule behavioral1/memory/2860-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/928-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2044-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/580-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1884-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/840-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1568-247-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-256-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1468-274-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
jlbbf.exeflljb.exehbdbtrj.exendrxbbt.exethjhlrf.exefllrbl.exelhphpvn.exelxjbx.exehvxnxlp.exebbdld.exejxnflpv.exejnbnjbn.exetdvvpb.exejnjvdnl.exenjxbnnj.exernxvxrd.exeljxtjtt.exehjhnp.exeddlprvv.exexxtprbt.exehpjvtjl.exeprptfv.exepbvjv.exevpdfftb.exexltrh.exejdhjt.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlbbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flljb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbdbtrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndrxbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thjhlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhphpvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxjbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvxnxlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbdld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxnflpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnbnjbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvvpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnjvdnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njxbnnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnxvxrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljxtjtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjhnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddlprvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxtprbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpjvtjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prptfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdfftb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xltrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdhjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exetfbrrb.exetdprr.exejtjll.exerjhhth.exebvhdtb.exejrvvtlt.exebtnjdl.exevxndbt.exendtrdlt.exejpbltr.exefbvjlrd.exedtjxx.exeptjrtxn.exebpdjbt.exehhvvhjx.exedescription pid Process procid_target PID 2860 wrote to memory of 2872 2860 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 30 PID 2860 wrote to memory of 2872 2860 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 30 PID 2860 wrote to memory of 2872 2860 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 30 PID 2860 wrote to memory of 2872 2860 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 30 PID 2872 wrote to memory of 2140 2872 tfbrrb.exe 31 PID 2872 wrote to memory of 2140 2872 tfbrrb.exe 31 PID 2872 wrote to memory of 2140 2872 tfbrrb.exe 31 PID 2872 wrote to memory of 2140 2872 tfbrrb.exe 31 PID 2140 wrote to memory of 1996 2140 tdprr.exe 32 PID 2140 wrote to memory of 1996 2140 tdprr.exe 32 PID 2140 wrote to memory of 1996 2140 tdprr.exe 32 PID 2140 wrote to memory of 1996 2140 tdprr.exe 32 PID 1996 wrote to memory of 1744 1996 jtjll.exe 33 PID 1996 wrote to memory of 1744 1996 jtjll.exe 33 PID 1996 wrote to memory of 1744 1996 jtjll.exe 33 PID 1996 wrote to memory of 1744 1996 jtjll.exe 33 PID 1744 wrote to memory of 2932 1744 rjhhth.exe 34 PID 1744 wrote to memory of 2932 1744 rjhhth.exe 34 PID 1744 wrote to memory of 2932 1744 rjhhth.exe 34 PID 1744 wrote to memory of 2932 1744 rjhhth.exe 34 PID 2932 wrote to memory of 2788 2932 bvhdtb.exe 35 PID 2932 wrote to memory of 2788 2932 bvhdtb.exe 35 PID 2932 wrote to memory of 2788 2932 bvhdtb.exe 35 PID 2932 wrote to memory of 2788 2932 bvhdtb.exe 35 PID 2788 wrote to memory of 2356 2788 jrvvtlt.exe 36 PID 2788 wrote to memory of 2356 2788 jrvvtlt.exe 36 PID 2788 wrote to memory of 2356 2788 jrvvtlt.exe 36 PID 2788 wrote to memory of 2356 2788 jrvvtlt.exe 36 PID 2356 wrote to memory of 2752 2356 btnjdl.exe 37 PID 2356 wrote to memory of 2752 2356 btnjdl.exe 37 PID 2356 wrote to memory of 2752 2356 btnjdl.exe 37 PID 2356 wrote to memory of 2752 2356 btnjdl.exe 37 PID 2752 wrote to memory of 928 2752 vxndbt.exe 38 PID 2752 wrote to memory of 928 2752 vxndbt.exe 38 PID 2752 wrote to memory of 928 2752 vxndbt.exe 38 PID 2752 wrote to memory of 928 2752 vxndbt.exe 38 PID 928 wrote to memory of 2548 928 ndtrdlt.exe 39 PID 928 wrote to memory of 2548 928 ndtrdlt.exe 39 PID 928 wrote to memory of 2548 928 ndtrdlt.exe 39 PID 928 wrote to memory of 2548 928 ndtrdlt.exe 39 PID 2548 wrote to memory of 1136 2548 jpbltr.exe 40 PID 2548 wrote to memory of 1136 2548 jpbltr.exe 40 PID 2548 wrote to memory of 1136 2548 jpbltr.exe 40 PID 2548 wrote to memory of 1136 2548 jpbltr.exe 40 PID 1136 wrote to memory of 2436 1136 fbvjlrd.exe 41 PID 1136 wrote to memory of 2436 1136 fbvjlrd.exe 41 PID 1136 wrote to memory of 2436 1136 fbvjlrd.exe 41 PID 1136 wrote to memory of 2436 1136 fbvjlrd.exe 41 PID 2436 wrote to memory of 2428 2436 dtjxx.exe 42 PID 2436 wrote to memory of 2428 2436 dtjxx.exe 42 PID 2436 wrote to memory of 2428 2436 dtjxx.exe 42 PID 2436 wrote to memory of 2428 2436 dtjxx.exe 42 PID 2428 wrote to memory of 2044 2428 ptjrtxn.exe 43 PID 2428 wrote to memory of 2044 2428 ptjrtxn.exe 43 PID 2428 wrote to memory of 2044 2428 ptjrtxn.exe 43 PID 2428 wrote to memory of 2044 2428 ptjrtxn.exe 43 PID 2044 wrote to memory of 580 2044 bpdjbt.exe 44 PID 2044 wrote to memory of 580 2044 bpdjbt.exe 44 PID 2044 wrote to memory of 580 2044 bpdjbt.exe 44 PID 2044 wrote to memory of 580 2044 bpdjbt.exe 44 PID 580 wrote to memory of 1928 580 hhvvhjx.exe 45 PID 580 wrote to memory of 1928 580 hhvvhjx.exe 45 PID 580 wrote to memory of 1928 580 hhvvhjx.exe 45 PID 580 wrote to memory of 1928 580 hhvvhjx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe"C:\Users\Admin\AppData\Local\Temp\fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\tfbrrb.exec:\tfbrrb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\tdprr.exec:\tdprr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\jtjll.exec:\jtjll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\rjhhth.exec:\rjhhth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\bvhdtb.exec:\bvhdtb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\jrvvtlt.exec:\jrvvtlt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\btnjdl.exec:\btnjdl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\vxndbt.exec:\vxndbt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\ndtrdlt.exec:\ndtrdlt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\jpbltr.exec:\jpbltr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\fbvjlrd.exec:\fbvjlrd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\dtjxx.exec:\dtjxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\ptjrtxn.exec:\ptjrtxn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\bpdjbt.exec:\bpdjbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\hhvvhjx.exec:\hhvvhjx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:580 -
\??\c:\ttnttxh.exec:\ttnttxh.exe17⤵
- Executes dropped EXE
PID:1928 -
\??\c:\hjlxtdr.exec:\hjlxtdr.exe18⤵
- Executes dropped EXE
PID:2108 -
\??\c:\rttppd.exec:\rttppd.exe19⤵
- Executes dropped EXE
PID:1884 -
\??\c:\ftxdd.exec:\ftxdd.exe20⤵
- Executes dropped EXE
PID:1940 -
\??\c:\htbtv.exec:\htbtv.exe21⤵
- Executes dropped EXE
PID:840 -
\??\c:\jtnddb.exec:\jtnddb.exe22⤵
- Executes dropped EXE
PID:1056 -
\??\c:\llxxp.exec:\llxxp.exe23⤵
- Executes dropped EXE
PID:908 -
\??\c:\jxtvjnr.exec:\jxtvjnr.exe24⤵
- Executes dropped EXE
PID:2636 -
\??\c:\ddxpdrd.exec:\ddxpdrd.exe25⤵
- Executes dropped EXE
PID:2952 -
\??\c:\xppjnjx.exec:\xppjnjx.exe26⤵
- Executes dropped EXE
PID:1568 -
\??\c:\ndfpdh.exec:\ndfpdh.exe27⤵
- Executes dropped EXE
PID:2744 -
\??\c:\xppdpt.exec:\xppdpt.exe28⤵
- Executes dropped EXE
PID:2624 -
\??\c:\ppbvf.exec:\ppbvf.exe29⤵
- Executes dropped EXE
PID:1468 -
\??\c:\bbdld.exec:\bbdld.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936 -
\??\c:\phlrpb.exec:\phlrpb.exe31⤵
- Executes dropped EXE
PID:2544 -
\??\c:\fbjfjp.exec:\fbjfjp.exe32⤵
- Executes dropped EXE
PID:2868 -
\??\c:\trlnhp.exec:\trlnhp.exe33⤵
- Executes dropped EXE
PID:1636 -
\??\c:\tdfxnb.exec:\tdfxnb.exe34⤵
- Executes dropped EXE
PID:2872 -
\??\c:\nbbfd.exec:\nbbfd.exe35⤵
- Executes dropped EXE
PID:3068 -
\??\c:\ftfhjv.exec:\ftfhjv.exe36⤵
- Executes dropped EXE
PID:2964 -
\??\c:\tvdrdf.exec:\tvdrdf.exe37⤵
- Executes dropped EXE
PID:3016 -
\??\c:\rrtddlx.exec:\rrtddlx.exe38⤵
- Executes dropped EXE
PID:2876 -
\??\c:\pfhrplh.exec:\pfhrplh.exe39⤵
- Executes dropped EXE
PID:2764 -
\??\c:\xxtln.exec:\xxtln.exe40⤵
- Executes dropped EXE
PID:2884 -
\??\c:\hvfvfb.exec:\hvfvfb.exe41⤵
- Executes dropped EXE
PID:2064 -
\??\c:\dnvfxh.exec:\dnvfxh.exe42⤵
- Executes dropped EXE
PID:2516 -
\??\c:\txdtph.exec:\txdtph.exe43⤵
- Executes dropped EXE
PID:2752 -
\??\c:\ppvnj.exec:\ppvnj.exe44⤵
- Executes dropped EXE
PID:2552 -
\??\c:\drtpj.exec:\drtpj.exe45⤵
- Executes dropped EXE
PID:1664 -
\??\c:\pbnxltn.exec:\pbnxltn.exe46⤵
- Executes dropped EXE
PID:264 -
\??\c:\pffnjt.exec:\pffnjt.exe47⤵
- Executes dropped EXE
PID:2420 -
\??\c:\xxnrx.exec:\xxnrx.exe48⤵
- Executes dropped EXE
PID:2208 -
\??\c:\nlpnr.exec:\nlpnr.exe49⤵
- Executes dropped EXE
PID:2344 -
\??\c:\jvbpx.exec:\jvbpx.exe50⤵
- Executes dropped EXE
PID:884 -
\??\c:\phdbbhr.exec:\phdbbhr.exe51⤵
- Executes dropped EXE
PID:2044 -
\??\c:\pdxbpbd.exec:\pdxbpbd.exe52⤵
- Executes dropped EXE
PID:580 -
\??\c:\fvfhrl.exec:\fvfhrl.exe53⤵
- Executes dropped EXE
PID:1312 -
\??\c:\bhjnf.exec:\bhjnf.exe54⤵
- Executes dropped EXE
PID:2496 -
\??\c:\hlhddh.exec:\hlhddh.exe55⤵
- Executes dropped EXE
PID:2588 -
\??\c:\flxvhn.exec:\flxvhn.exe56⤵
- Executes dropped EXE
PID:1840 -
\??\c:\nbrxnd.exec:\nbrxnd.exe57⤵
- Executes dropped EXE
PID:456 -
\??\c:\vrvtlr.exec:\vrvtlr.exe58⤵
- Executes dropped EXE
PID:1832 -
\??\c:\btdvbxv.exec:\btdvbxv.exe59⤵
- Executes dropped EXE
PID:956 -
\??\c:\nbllj.exec:\nbllj.exe60⤵
- Executes dropped EXE
PID:2008 -
\??\c:\llvxv.exec:\llvxv.exe61⤵
- Executes dropped EXE
PID:1564 -
\??\c:\rvppbd.exec:\rvppbd.exe62⤵
- Executes dropped EXE
PID:2676 -
\??\c:\npjpv.exec:\npjpv.exe63⤵
- Executes dropped EXE
PID:2952 -
\??\c:\ddbbp.exec:\ddbbp.exe64⤵
- Executes dropped EXE
PID:1444 -
\??\c:\xvjdlbn.exec:\xvjdlbn.exe65⤵
- Executes dropped EXE
PID:592 -
\??\c:\rbrdt.exec:\rbrdt.exe66⤵PID:2060
-
\??\c:\hhvhbb.exec:\hhvhbb.exe67⤵PID:1700
-
\??\c:\brltn.exec:\brltn.exe68⤵PID:2248
-
\??\c:\hpdrlr.exec:\hpdrlr.exe69⤵PID:872
-
\??\c:\frdnn.exec:\frdnn.exe70⤵PID:2200
-
\??\c:\vjdxtp.exec:\vjdxtp.exe71⤵PID:1888
-
\??\c:\rtvpl.exec:\rtvpl.exe72⤵PID:2192
-
\??\c:\lnvhnt.exec:\lnvhnt.exe73⤵PID:1716
-
\??\c:\hlxhtrp.exec:\hlxhtrp.exe74⤵PID:2916
-
\??\c:\lbbnd.exec:\lbbnd.exe75⤵PID:2596
-
\??\c:\npdxb.exec:\npdxb.exe76⤵PID:2792
-
\??\c:\jnxtxt.exec:\jnxtxt.exe77⤵PID:2812
-
\??\c:\httll.exec:\httll.exe78⤵PID:2780
-
\??\c:\fdplhhb.exec:\fdplhhb.exe79⤵PID:2840
-
\??\c:\dvplnbb.exec:\dvplnbb.exe80⤵PID:2844
-
\??\c:\xtnxbtv.exec:\xtnxbtv.exe81⤵PID:1680
-
\??\c:\thtrbrr.exec:\thtrbrr.exe82⤵PID:1920
-
\??\c:\ttfhd.exec:\ttfhd.exe83⤵PID:2984
-
\??\c:\jlflxj.exec:\jlflxj.exe84⤵PID:2328
-
\??\c:\fxlth.exec:\fxlth.exe85⤵PID:2548
-
\??\c:\fbfhx.exec:\fbfhx.exe86⤵PID:2280
-
\??\c:\nrhrfl.exec:\nrhrfl.exe87⤵PID:2232
-
\??\c:\rftrx.exec:\rftrx.exe88⤵PID:2392
-
\??\c:\rrbrx.exec:\rrbrx.exe89⤵PID:2348
-
\??\c:\xjbnn.exec:\xjbnn.exe90⤵PID:1672
-
\??\c:\pxxtvt.exec:\pxxtvt.exe91⤵PID:2044
-
\??\c:\vbhjvjh.exec:\vbhjvjh.exe92⤵PID:2176
-
\??\c:\vplvxx.exec:\vplvxx.exe93⤵PID:1424
-
\??\c:\hhxdr.exec:\hhxdr.exe94⤵PID:1956
-
\??\c:\lhxrj.exec:\lhxrj.exe95⤵PID:1712
-
\??\c:\tpvfnlx.exec:\tpvfnlx.exe96⤵PID:2076
-
\??\c:\nbplpn.exec:\nbplpn.exe97⤵PID:968
-
\??\c:\dfhnjh.exec:\dfhnjh.exe98⤵PID:1132
-
\??\c:\vrnrjj.exec:\vrnrjj.exe99⤵PID:1668
-
\??\c:\hxthlb.exec:\hxthlb.exe100⤵PID:1992
-
\??\c:\dbdxt.exec:\dbdxt.exe101⤵PID:2472
-
\??\c:\ndbfltf.exec:\ndbfltf.exe102⤵PID:1064
-
\??\c:\xpbbhn.exec:\xpbbhn.exe103⤵PID:2952
-
\??\c:\jdrptbb.exec:\jdrptbb.exe104⤵PID:576
-
\??\c:\rvvrn.exec:\rvvrn.exe105⤵PID:1220
-
\??\c:\nvfvrl.exec:\nvfvrl.exe106⤵PID:1660
-
\??\c:\hljtd.exec:\hljtd.exe107⤵PID:1508
-
\??\c:\vttxhhv.exec:\vttxhhv.exe108⤵PID:2116
-
\??\c:\fvrfdl.exec:\fvrfdl.exe109⤵PID:1936
-
\??\c:\vdpvn.exec:\vdpvn.exe110⤵PID:2912
-
\??\c:\dlbrd.exec:\dlbrd.exe111⤵PID:3028
-
\??\c:\bldlbt.exec:\bldlbt.exe112⤵PID:2868
-
\??\c:\dlxlfl.exec:\dlxlfl.exe113⤵PID:2872
-
\??\c:\llpdj.exec:\llpdj.exe114⤵PID:2488
-
\??\c:\hdhrn.exec:\hdhrn.exe115⤵PID:3068
-
\??\c:\ljrhf.exec:\ljrhf.exe116⤵PID:2792
-
\??\c:\nvvjb.exec:\nvvjb.exe117⤵PID:2772
-
\??\c:\dprrnj.exec:\dprrnj.exe118⤵PID:2120
-
\??\c:\rhbxld.exec:\rhbxld.exe119⤵PID:1784
-
\??\c:\xhphvr.exec:\xhphvr.exe120⤵PID:2356
-
\??\c:\dvprl.exec:\dvprl.exe121⤵PID:2748
-
\??\c:\xfpxht.exec:\xfpxht.exe122⤵PID:1212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-