Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 05:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe
-
Size
454KB
-
MD5
353d3c1170ee6c5ee5cf0972a414cc91
-
SHA1
91a90cff4960757f85e460bbc593dc6980ab0033
-
SHA256
73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7
-
SHA512
6c69ca11d86995751308a28f2b2a74c875f0e1db6ae067d317de3a5f0bdcae8826e95209f292c47f37a4e0c9cc07cfdfa350bd99cc8e8e119c57f88931c30c23
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeV:q7Tc2NYHUrAwfMp3CDV
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 38 IoCs
resource yara_rule behavioral1/memory/1740-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2364-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1224-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2168-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3060-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2820-67-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2564-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1968-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2908-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2276-122-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1548-162-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/764-171-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2508-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2656-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1540-237-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2208-253-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1744-262-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2368-303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2040-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2128-336-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2168-341-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2968-351-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2512-365-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2540-380-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1040-393-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2992-413-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2340-420-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3036-435-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2028-442-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2052-467-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2052-488-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/972-495-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1204-544-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1708-551-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1628-588-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2912-624-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/1016-742-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/520-749-0x0000000001C70000-0x0000000001C9A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2364 xdnvht.exe 1224 txbvtv.exe 2912 dpbfxl.exe 2168 bdddntp.exe 3060 rdldv.exe 2512 hhnntx.exe 2820 hlplxn.exe 2564 jnbdpx.exe 1968 xnbjlt.exe 940 pblpvf.exe 2984 xfltlj.exe 2908 brnpblr.exe 2276 dnpnbbb.exe 2560 rvnll.exe 980 xlpltd.exe 2088 bxbrpx.exe 1548 hldlt.exe 764 rrrxhtj.exe 2508 lphvh.exe 2656 bdvtxnt.exe 2404 xddtt.exe 2328 lbrflf.exe 912 hxvllbl.exe 2148 ljhpd.exe 1208 jlhxtn.exe 1540 tdrjr.exe 2208 dlxfpx.exe 1744 jplvvhb.exe 2636 rdvrj.exe 1668 hhfdhp.exe 1808 fxltbd.exe 1720 tlftx.exe 2368 bprbdl.exe 2396 tdjdv.exe 2212 tdbnrlh.exe 2424 vprjp.exe 2040 ffhhppr.exe 2128 hlflh.exe 2168 lvbrrfl.exe 2304 xbltdv.exe 2968 bdtlrh.exe 2512 rxhhrvl.exe 2524 tbbhxp.exe 2540 vdrnd.exe 3004 xdtvfh.exe 1040 rbxrld.exe 1692 htjjtnn.exe 2984 bbplbl.exe 2992 dbbfpl.exe 2340 fprjvt.exe 1496 dltthj.exe 3036 lpxht.exe 2028 bnvft.exe 2032 prljldx.exe 564 tvplt.exe 2240 bbdbv.exe 2052 ljnrh.exe 2508 xfhjhn.exe 2464 nptdpbb.exe 2284 xxvln.exe 972 fnjdlp.exe 1164 hvfbnd.exe 1800 jrbxh.exe 2732 jxtrttd.exe -
resource yara_rule behavioral1/memory/1740-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2364-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1224-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2168-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2168-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3060-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2512-56-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2820-67-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1968-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1968-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2908-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2276-122-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1548-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/764-171-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2508-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2656-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1540-237-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1744-254-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2208-253-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1744-262-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2368-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2040-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2128-336-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2168-341-0x00000000003C0000-0x00000000003EA000-memory.dmp upx behavioral1/memory/2968-351-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2512-365-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2540-380-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1040-393-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2984-400-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2340-420-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3036-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3036-435-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2028-442-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2052-467-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/972-495-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1204-544-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1628-588-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/520-749-0x0000000001C70000-0x0000000001C9A000-memory.dmp upx behavioral1/memory/1800-787-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2056-819-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxtxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhltfnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppndxdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fttftlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhftfnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjdhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpfptf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpbdxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntpdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxxfvxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdpnpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lprfpnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpdfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnlfxvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnjhpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frthr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvlvbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtnbhjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxpth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdvlnhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdnpxfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpldl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbhfpnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djppfdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnxpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvlhxht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbdjnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxtptv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdnxnjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhtjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfblbdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvxlfft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbjrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfddrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tptdhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbhxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxblj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxjbxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhjxhxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbbvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdnfnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2364 1740 73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe 30 PID 1740 wrote to memory of 2364 1740 73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe 30 PID 1740 wrote to memory of 2364 1740 73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe 30 PID 1740 wrote to memory of 2364 1740 73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe 30 PID 2364 wrote to memory of 1224 2364 xdnvht.exe 31 PID 2364 wrote to memory of 1224 2364 xdnvht.exe 31 PID 2364 wrote to memory of 1224 2364 xdnvht.exe 31 PID 2364 wrote to memory of 1224 2364 xdnvht.exe 31 PID 1224 wrote to memory of 2912 1224 txbvtv.exe 32 PID 1224 wrote to memory of 2912 1224 txbvtv.exe 32 PID 1224 wrote to memory of 2912 1224 txbvtv.exe 32 PID 1224 wrote to memory of 2912 1224 txbvtv.exe 32 PID 2912 wrote to memory of 2168 2912 dpbfxl.exe 33 PID 2912 wrote to memory of 2168 2912 dpbfxl.exe 33 PID 2912 wrote to memory of 2168 2912 dpbfxl.exe 33 PID 2912 wrote to memory of 2168 2912 dpbfxl.exe 33 PID 2168 wrote to memory of 3060 2168 bdddntp.exe 34 PID 2168 wrote to memory of 3060 2168 bdddntp.exe 34 PID 2168 wrote to memory of 3060 2168 bdddntp.exe 34 PID 2168 wrote to memory of 3060 2168 bdddntp.exe 34 PID 3060 wrote to memory of 2512 3060 rdldv.exe 35 PID 3060 wrote to memory of 2512 3060 rdldv.exe 35 PID 3060 wrote to memory of 2512 3060 rdldv.exe 35 PID 3060 wrote to memory of 2512 3060 rdldv.exe 35 PID 2512 wrote to memory of 2820 2512 hhnntx.exe 36 PID 2512 wrote to memory of 2820 2512 hhnntx.exe 36 PID 2512 wrote to memory of 2820 2512 hhnntx.exe 36 PID 2512 wrote to memory of 2820 2512 hhnntx.exe 36 PID 2820 wrote to memory of 2564 2820 hlplxn.exe 37 PID 2820 wrote to memory of 2564 2820 hlplxn.exe 37 PID 2820 wrote to memory of 2564 2820 hlplxn.exe 37 PID 2820 wrote to memory of 2564 2820 hlplxn.exe 37 PID 2564 wrote to memory of 1968 2564 jnbdpx.exe 38 PID 2564 wrote to memory of 1968 2564 jnbdpx.exe 38 PID 2564 wrote to memory of 1968 2564 jnbdpx.exe 38 PID 2564 wrote to memory of 1968 2564 jnbdpx.exe 38 PID 1968 wrote to memory of 940 1968 xnbjlt.exe 39 PID 1968 wrote to memory of 940 1968 xnbjlt.exe 39 PID 1968 wrote to memory of 940 1968 xnbjlt.exe 39 PID 1968 wrote to memory of 940 1968 xnbjlt.exe 39 PID 940 wrote to memory of 2984 940 pblpvf.exe 40 PID 940 wrote to memory of 2984 940 pblpvf.exe 40 PID 940 wrote to memory of 2984 940 pblpvf.exe 40 PID 940 wrote to memory of 2984 940 pblpvf.exe 40 PID 2984 wrote to memory of 2908 2984 xfltlj.exe 41 PID 2984 wrote to memory of 2908 2984 xfltlj.exe 41 PID 2984 wrote to memory of 2908 2984 xfltlj.exe 41 PID 2984 wrote to memory of 2908 2984 xfltlj.exe 41 PID 2908 wrote to memory of 2276 2908 brnpblr.exe 42 PID 2908 wrote to memory of 2276 2908 brnpblr.exe 42 PID 2908 wrote to memory of 2276 2908 brnpblr.exe 42 PID 2908 wrote to memory of 2276 2908 brnpblr.exe 42 PID 2276 wrote to memory of 2560 2276 dnpnbbb.exe 43 PID 2276 wrote to memory of 2560 2276 dnpnbbb.exe 43 PID 2276 wrote to memory of 2560 2276 dnpnbbb.exe 43 PID 2276 wrote to memory of 2560 2276 dnpnbbb.exe 43 PID 2560 wrote to memory of 980 2560 rvnll.exe 44 PID 2560 wrote to memory of 980 2560 rvnll.exe 44 PID 2560 wrote to memory of 980 2560 rvnll.exe 44 PID 2560 wrote to memory of 980 2560 rvnll.exe 44 PID 980 wrote to memory of 2088 980 xlpltd.exe 45 PID 980 wrote to memory of 2088 980 xlpltd.exe 45 PID 980 wrote to memory of 2088 980 xlpltd.exe 45 PID 980 wrote to memory of 2088 980 xlpltd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe"C:\Users\Admin\AppData\Local\Temp\73aaf61e78dd18a4984b2315770ce403ab95defa37049d79de21871ec7b97ef7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\xdnvht.exec:\xdnvht.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\txbvtv.exec:\txbvtv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
\??\c:\dpbfxl.exec:\dpbfxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\bdddntp.exec:\bdddntp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\rdldv.exec:\rdldv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\hhnntx.exec:\hhnntx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\hlplxn.exec:\hlplxn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\jnbdpx.exec:\jnbdpx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\xnbjlt.exec:\xnbjlt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\pblpvf.exec:\pblpvf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\xfltlj.exec:\xfltlj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\brnpblr.exec:\brnpblr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\dnpnbbb.exec:\dnpnbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\rvnll.exec:\rvnll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\xlpltd.exec:\xlpltd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\bxbrpx.exec:\bxbrpx.exe17⤵
- Executes dropped EXE
PID:2088 -
\??\c:\hldlt.exec:\hldlt.exe18⤵
- Executes dropped EXE
PID:1548 -
\??\c:\rrrxhtj.exec:\rrrxhtj.exe19⤵
- Executes dropped EXE
PID:764 -
\??\c:\lphvh.exec:\lphvh.exe20⤵
- Executes dropped EXE
PID:2508 -
\??\c:\bdvtxnt.exec:\bdvtxnt.exe21⤵
- Executes dropped EXE
PID:2656 -
\??\c:\xddtt.exec:\xddtt.exe22⤵
- Executes dropped EXE
PID:2404 -
\??\c:\lbrflf.exec:\lbrflf.exe23⤵
- Executes dropped EXE
PID:2328 -
\??\c:\hxvllbl.exec:\hxvllbl.exe24⤵
- Executes dropped EXE
PID:912 -
\??\c:\ljhpd.exec:\ljhpd.exe25⤵
- Executes dropped EXE
PID:2148 -
\??\c:\jlhxtn.exec:\jlhxtn.exe26⤵
- Executes dropped EXE
PID:1208 -
\??\c:\tdrjr.exec:\tdrjr.exe27⤵
- Executes dropped EXE
PID:1540 -
\??\c:\dlxfpx.exec:\dlxfpx.exe28⤵
- Executes dropped EXE
PID:2208 -
\??\c:\jplvvhb.exec:\jplvvhb.exe29⤵
- Executes dropped EXE
PID:1744 -
\??\c:\rdvrj.exec:\rdvrj.exe30⤵
- Executes dropped EXE
PID:2636 -
\??\c:\hhfdhp.exec:\hhfdhp.exe31⤵
- Executes dropped EXE
PID:1668 -
\??\c:\fxltbd.exec:\fxltbd.exe32⤵
- Executes dropped EXE
PID:1808 -
\??\c:\tlftx.exec:\tlftx.exe33⤵
- Executes dropped EXE
PID:1720 -
\??\c:\bprbdl.exec:\bprbdl.exe34⤵
- Executes dropped EXE
PID:2368 -
\??\c:\tdjdv.exec:\tdjdv.exe35⤵
- Executes dropped EXE
PID:2396 -
\??\c:\tdbnrlh.exec:\tdbnrlh.exe36⤵
- Executes dropped EXE
PID:2212 -
\??\c:\vprjp.exec:\vprjp.exe37⤵
- Executes dropped EXE
PID:2424 -
\??\c:\ffhhppr.exec:\ffhhppr.exe38⤵
- Executes dropped EXE
PID:2040 -
\??\c:\hlflh.exec:\hlflh.exe39⤵
- Executes dropped EXE
PID:2128 -
\??\c:\lvbrrfl.exec:\lvbrrfl.exe40⤵
- Executes dropped EXE
PID:2168 -
\??\c:\xbltdv.exec:\xbltdv.exe41⤵
- Executes dropped EXE
PID:2304 -
\??\c:\bdtlrh.exec:\bdtlrh.exe42⤵
- Executes dropped EXE
PID:2968 -
\??\c:\rxhhrvl.exec:\rxhhrvl.exe43⤵
- Executes dropped EXE
PID:2512 -
\??\c:\tbbhxp.exec:\tbbhxp.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524 -
\??\c:\vdrnd.exec:\vdrnd.exe45⤵
- Executes dropped EXE
PID:2540 -
\??\c:\xdtvfh.exec:\xdtvfh.exe46⤵
- Executes dropped EXE
PID:3004 -
\??\c:\rbxrld.exec:\rbxrld.exe47⤵
- Executes dropped EXE
PID:1040 -
\??\c:\htjjtnn.exec:\htjjtnn.exe48⤵
- Executes dropped EXE
PID:1692 -
\??\c:\bbplbl.exec:\bbplbl.exe49⤵
- Executes dropped EXE
PID:2984 -
\??\c:\dbbfpl.exec:\dbbfpl.exe50⤵
- Executes dropped EXE
PID:2992 -
\??\c:\fprjvt.exec:\fprjvt.exe51⤵
- Executes dropped EXE
PID:2340 -
\??\c:\dltthj.exec:\dltthj.exe52⤵
- Executes dropped EXE
PID:1496 -
\??\c:\lpxht.exec:\lpxht.exe53⤵
- Executes dropped EXE
PID:3036 -
\??\c:\bnvft.exec:\bnvft.exe54⤵
- Executes dropped EXE
PID:2028 -
\??\c:\prljldx.exec:\prljldx.exe55⤵
- Executes dropped EXE
PID:2032 -
\??\c:\tvplt.exec:\tvplt.exe56⤵
- Executes dropped EXE
PID:564 -
\??\c:\bbdbv.exec:\bbdbv.exe57⤵
- Executes dropped EXE
PID:2240 -
\??\c:\ljnrh.exec:\ljnrh.exe58⤵
- Executes dropped EXE
PID:2052 -
\??\c:\xfhjhn.exec:\xfhjhn.exe59⤵
- Executes dropped EXE
PID:2508 -
\??\c:\nptdpbb.exec:\nptdpbb.exe60⤵
- Executes dropped EXE
PID:2464 -
\??\c:\xxvln.exec:\xxvln.exe61⤵
- Executes dropped EXE
PID:2284 -
\??\c:\fnjdlp.exec:\fnjdlp.exe62⤵
- Executes dropped EXE
PID:972 -
\??\c:\hvfbnd.exec:\hvfbnd.exe63⤵
- Executes dropped EXE
PID:1164 -
\??\c:\jrbxh.exec:\jrbxh.exe64⤵
- Executes dropped EXE
PID:1800 -
\??\c:\jxtrttd.exec:\jxtrttd.exe65⤵
- Executes dropped EXE
PID:2732 -
\??\c:\brvtn.exec:\brvtn.exe66⤵PID:1564
-
\??\c:\ffvdf.exec:\ffvdf.exe67⤵PID:2576
-
\??\c:\ldrrjvr.exec:\ldrrjvr.exe68⤵PID:1308
-
\??\c:\jnnbtj.exec:\jnnbtj.exe69⤵PID:1204
-
\??\c:\rvfldjf.exec:\rvfldjf.exe70⤵PID:1708
-
\??\c:\ddlxpfl.exec:\ddlxpfl.exe71⤵PID:2616
-
\??\c:\tlrblfb.exec:\tlrblfb.exe72⤵PID:2140
-
\??\c:\fhpprd.exec:\fhpprd.exe73⤵PID:1828
-
\??\c:\ltnjrlt.exec:\ltnjrlt.exe74⤵PID:1528
-
\??\c:\dhthx.exec:\dhthx.exe75⤵PID:888
-
\??\c:\lhjnb.exec:\lhjnb.exe76⤵PID:1628
-
\??\c:\hdnnltx.exec:\hdnnltx.exe77⤵PID:2916
-
\??\c:\nvxdtjh.exec:\nvxdtjh.exe78⤵PID:1984
-
\??\c:\nfftf.exec:\nfftf.exe79⤵PID:2020
-
\??\c:\xlhfrf.exec:\xlhfrf.exe80⤵PID:3068
-
\??\c:\npltnv.exec:\npltnv.exe81⤵PID:2912
-
\??\c:\pfpjvt.exec:\pfpjvt.exe82⤵PID:2168
-
\??\c:\nxhvr.exec:\nxhvr.exe83⤵PID:2152
-
\??\c:\dltpn.exec:\dltpn.exe84⤵PID:2880
-
\??\c:\vjdxllp.exec:\vjdxllp.exe85⤵PID:2820
-
\??\c:\nbtbffd.exec:\nbtbffd.exe86⤵PID:2548
-
\??\c:\xdtdtj.exec:\xdtdtj.exe87⤵PID:2856
-
\??\c:\hhfddvf.exec:\hhfddvf.exe88⤵PID:1492
-
\??\c:\xjrfv.exec:\xjrfv.exe89⤵PID:2332
-
\??\c:\tlrvf.exec:\tlrvf.exe90⤵PID:1248
-
\??\c:\djppfdr.exec:\djppfdr.exe91⤵
- System Location Discovery: System Language Discovery
PID:1516 -
\??\c:\rjpthr.exec:\rjpthr.exe92⤵PID:3024
-
\??\c:\xtttvln.exec:\xtttvln.exe93⤵PID:1660
-
\??\c:\frppvr.exec:\frppvr.exe94⤵PID:1324
-
\??\c:\lnxbv.exec:\lnxbv.exe95⤵PID:2676
-
\??\c:\rfbtvp.exec:\rfbtvp.exe96⤵PID:580
-
\??\c:\hdfhnhr.exec:\hdfhnhr.exe97⤵PID:1348
-
\??\c:\bxnxhb.exec:\bxnxhb.exe98⤵PID:2032
-
\??\c:\xfjtlpd.exec:\xfjtlpd.exe99⤵PID:1016
-
\??\c:\llxlxj.exec:\llxlxj.exe100⤵PID:520
-
\??\c:\dbnpbl.exec:\dbnpbl.exe101⤵PID:1964
-
\??\c:\prlphfb.exec:\prlphfb.exe102⤵PID:2244
-
\??\c:\rppht.exec:\rppht.exe103⤵PID:2200
-
\??\c:\flnjjh.exec:\flnjjh.exe104⤵PID:1716
-
\??\c:\tjdjd.exec:\tjdjd.exe105⤵PID:972
-
\??\c:\dxxbp.exec:\dxxbp.exe106⤵PID:820
-
\??\c:\llbdlh.exec:\llbdlh.exe107⤵PID:1800
-
\??\c:\dbpbr.exec:\dbpbr.exe108⤵PID:1320
-
\??\c:\hdrxlff.exec:\hdrxlff.exe109⤵PID:2264
-
\??\c:\xdrlnp.exec:\xdrlnp.exe110⤵PID:2300
-
\??\c:\lnxxdll.exec:\lnxxdll.exe111⤵PID:2072
-
\??\c:\drvjd.exec:\drvjd.exe112⤵PID:2056
-
\??\c:\vxxhp.exec:\vxxhp.exe113⤵PID:1744
-
\??\c:\htptxn.exec:\htptxn.exe114⤵PID:536
-
\??\c:\nbxhnxt.exec:\nbxhnxt.exe115⤵PID:1748
-
\??\c:\ppjxbnx.exec:\ppjxbnx.exe116⤵PID:892
-
\??\c:\ttpdfxl.exec:\ttpdfxl.exe117⤵PID:1740
-
\??\c:\pxlnlp.exec:\pxlnlp.exe118⤵PID:1720
-
\??\c:\bldxfxf.exec:\bldxfxf.exe119⤵PID:2396
-
\??\c:\prdpd.exec:\prdpd.exe120⤵PID:872
-
\??\c:\drtbbtr.exec:\drtbbtr.exe121⤵PID:2036
-
\??\c:\dldpnl.exec:\dldpnl.exe122⤵PID:2964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-