Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 09:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b540de8b959a83b7eb41a847df63eff0N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
b540de8b959a83b7eb41a847df63eff0N.exe
-
Size
151KB
-
MD5
b540de8b959a83b7eb41a847df63eff0
-
SHA1
4c86ea27c659b074c0e3828fce0e333214750c0d
-
SHA256
6e710baa1c8179377512abf70491b75765d871e39669bcfc09faa123ac789fe5
-
SHA512
9c8e1e26af5843c74bd5d7487d8a7e4a4a74dec8cc7af887a92f967a1be0c2f9a92055ab88233cfe758f79de43057990477c768ed194eceb6a0f0489054b357b
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LAIRUohDmRG08fKkZEU5hkVaqaK6qa50iKVb:n3C9BRo/AIuuOmfDZEU5OVFii
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral1/memory/2184-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2844-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2776-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2444-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/748-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/660-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-97-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2784-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2360-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1840-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1052-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1656-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/324-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1352-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3pjvv.exefllxxll.exehbtnht.exelxlxffr.exepppvj.exejpddd.exelllxrxl.exenhbhtt.exejjdjd.exe9lflrxl.exe7fxxxfr.exehbtnbh.exettnbtt.exe1jjpv.exe7pddp.exerlxfrxf.exehhttbh.exebtthhb.exe9ppvj.exelrrfxlf.exehhbnhh.exennhtnh.exevpjjp.exe3vjjp.exe3lflrrf.exerrlrxlr.exetnnntb.exepdvvv.exexxlrrrx.exefxlrxxl.exettntnn.exennhnth.exevjvpp.exevvpvj.exelfxrrff.exellxlxxl.exehhhntt.exebbtbtb.exe1vpjv.exevppvv.exejdppd.exerrxxrfr.exe1thntb.exejdpvd.exevpdjp.exerrxflxf.exepvdpd.exe5lrrxfx.exe3lrflrx.exehbnbnt.exeddpdd.exerlxflxf.exe1tnbnn.exevvjjd.exebtnbtn.exeppjpj.exedddjp.exetbnbht.exejdpjj.exejppdd.exexlfxllx.exehhthth.exe9hbhtb.exe7jpdv.exepid process 2844 3pjvv.exe 2184 fllxxll.exe 2776 hbtnht.exe 2640 lxlxffr.exe 2444 pppvj.exe 748 jpddd.exe 660 lllxrxl.exe 2216 nhbhtt.exe 2080 jjdjd.exe 2784 9lflrxl.exe 1508 7fxxxfr.exe 2820 hbtnbh.exe 2360 ttnbtt.exe 2796 1jjpv.exe 352 7pddp.exe 1768 rlxfrxf.exe 2076 hhttbh.exe 2096 btthhb.exe 1928 9ppvj.exe 2496 lrrfxlf.exe 1840 hhbnhh.exe 1352 nnhtnh.exe 1052 vpjjp.exe 2996 3vjjp.exe 324 3lflrrf.exe 2560 rrlrxlr.exe 1704 tnnntb.exe 2532 pdvvv.exe 1656 xxlrrrx.exe 1636 fxlrxxl.exe 2192 ttntnn.exe 1708 nnhnth.exe 2748 vjvpp.exe 2720 vvpvj.exe 1960 lfxrrff.exe 2620 llxlxxl.exe 600 hhhntt.exe 480 bbtbtb.exe 1500 1vpjv.exe 820 vppvv.exe 1644 jdppd.exe 2216 rrxxrfr.exe 2144 1thntb.exe 2592 jdpvd.exe 1520 vpdjp.exe 1388 rrxflxf.exe 2820 pvdpd.exe 2952 5lrrxfx.exe 1640 3lrflrx.exe 2028 hbnbnt.exe 2008 ddpdd.exe 3032 rlxflxf.exe 2196 1tnbnn.exe 1156 vvjjd.exe 2480 btnbtn.exe 2460 ppjpj.exe 1700 dddjp.exe 2380 tbnbht.exe 1976 jdpjj.exe 2000 jppdd.exe 1376 xlfxllx.exe 324 hhthth.exe 1628 9hbhtb.exe 336 7jpdv.exe -
Processes:
resource yara_rule behavioral1/memory/2852-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/748-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/660-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/660-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/660-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/660-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2360-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1840-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1052-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-294-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/324-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1352-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-169-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1tnbnn.exexrlxxfl.exejjvjj.exenhntbb.exeppddp.exevpdvd.exexrfxflx.exennbntb.exe1fxfllr.exerlrfrrx.exeppjpj.exenhbhtb.exepjdpj.exepdjvd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1tnbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fxfllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b540de8b959a83b7eb41a847df63eff0N.exe3pjvv.exefllxxll.exehbtnht.exelxlxffr.exepppvj.exejpddd.exelllxrxl.exenhbhtt.exejjdjd.exe9lflrxl.exe7fxxxfr.exehbtnbh.exettnbtt.exe1jjpv.exe7pddp.exedescription pid process target process PID 2852 wrote to memory of 2844 2852 b540de8b959a83b7eb41a847df63eff0N.exe 3pjvv.exe PID 2852 wrote to memory of 2844 2852 b540de8b959a83b7eb41a847df63eff0N.exe 3pjvv.exe PID 2852 wrote to memory of 2844 2852 b540de8b959a83b7eb41a847df63eff0N.exe 3pjvv.exe PID 2852 wrote to memory of 2844 2852 b540de8b959a83b7eb41a847df63eff0N.exe 3pjvv.exe PID 2844 wrote to memory of 2184 2844 3pjvv.exe fllxxll.exe PID 2844 wrote to memory of 2184 2844 3pjvv.exe fllxxll.exe PID 2844 wrote to memory of 2184 2844 3pjvv.exe fllxxll.exe PID 2844 wrote to memory of 2184 2844 3pjvv.exe fllxxll.exe PID 2184 wrote to memory of 2776 2184 fllxxll.exe hbtnht.exe PID 2184 wrote to memory of 2776 2184 fllxxll.exe hbtnht.exe PID 2184 wrote to memory of 2776 2184 fllxxll.exe hbtnht.exe PID 2184 wrote to memory of 2776 2184 fllxxll.exe hbtnht.exe PID 2776 wrote to memory of 2640 2776 hbtnht.exe lxlxffr.exe PID 2776 wrote to memory of 2640 2776 hbtnht.exe lxlxffr.exe PID 2776 wrote to memory of 2640 2776 hbtnht.exe lxlxffr.exe PID 2776 wrote to memory of 2640 2776 hbtnht.exe lxlxffr.exe PID 2640 wrote to memory of 2444 2640 lxlxffr.exe pppvj.exe PID 2640 wrote to memory of 2444 2640 lxlxffr.exe pppvj.exe PID 2640 wrote to memory of 2444 2640 lxlxffr.exe pppvj.exe PID 2640 wrote to memory of 2444 2640 lxlxffr.exe pppvj.exe PID 2444 wrote to memory of 748 2444 pppvj.exe jpddd.exe PID 2444 wrote to memory of 748 2444 pppvj.exe jpddd.exe PID 2444 wrote to memory of 748 2444 pppvj.exe jpddd.exe PID 2444 wrote to memory of 748 2444 pppvj.exe jpddd.exe PID 748 wrote to memory of 660 748 jpddd.exe lllxrxl.exe PID 748 wrote to memory of 660 748 jpddd.exe lllxrxl.exe PID 748 wrote to memory of 660 748 jpddd.exe lllxrxl.exe PID 748 wrote to memory of 660 748 jpddd.exe lllxrxl.exe PID 660 wrote to memory of 2216 660 lllxrxl.exe nhbhtt.exe PID 660 wrote to memory of 2216 660 lllxrxl.exe nhbhtt.exe PID 660 wrote to memory of 2216 660 lllxrxl.exe nhbhtt.exe PID 660 wrote to memory of 2216 660 lllxrxl.exe nhbhtt.exe PID 2216 wrote to memory of 2080 2216 nhbhtt.exe jjdjd.exe PID 2216 wrote to memory of 2080 2216 nhbhtt.exe jjdjd.exe PID 2216 wrote to memory of 2080 2216 nhbhtt.exe jjdjd.exe PID 2216 wrote to memory of 2080 2216 nhbhtt.exe jjdjd.exe PID 2080 wrote to memory of 2784 2080 jjdjd.exe 9lflrxl.exe PID 2080 wrote to memory of 2784 2080 jjdjd.exe 9lflrxl.exe PID 2080 wrote to memory of 2784 2080 jjdjd.exe 9lflrxl.exe PID 2080 wrote to memory of 2784 2080 jjdjd.exe 9lflrxl.exe PID 2784 wrote to memory of 1508 2784 9lflrxl.exe 7fxxxfr.exe PID 2784 wrote to memory of 1508 2784 9lflrxl.exe 7fxxxfr.exe PID 2784 wrote to memory of 1508 2784 9lflrxl.exe 7fxxxfr.exe PID 2784 wrote to memory of 1508 2784 9lflrxl.exe 7fxxxfr.exe PID 1508 wrote to memory of 2820 1508 7fxxxfr.exe hbtnbh.exe PID 1508 wrote to memory of 2820 1508 7fxxxfr.exe hbtnbh.exe PID 1508 wrote to memory of 2820 1508 7fxxxfr.exe hbtnbh.exe PID 1508 wrote to memory of 2820 1508 7fxxxfr.exe hbtnbh.exe PID 2820 wrote to memory of 2360 2820 hbtnbh.exe ttnbtt.exe PID 2820 wrote to memory of 2360 2820 hbtnbh.exe ttnbtt.exe PID 2820 wrote to memory of 2360 2820 hbtnbh.exe ttnbtt.exe PID 2820 wrote to memory of 2360 2820 hbtnbh.exe ttnbtt.exe PID 2360 wrote to memory of 2796 2360 ttnbtt.exe 1jjpv.exe PID 2360 wrote to memory of 2796 2360 ttnbtt.exe 1jjpv.exe PID 2360 wrote to memory of 2796 2360 ttnbtt.exe 1jjpv.exe PID 2360 wrote to memory of 2796 2360 ttnbtt.exe 1jjpv.exe PID 2796 wrote to memory of 352 2796 1jjpv.exe 7pddp.exe PID 2796 wrote to memory of 352 2796 1jjpv.exe 7pddp.exe PID 2796 wrote to memory of 352 2796 1jjpv.exe 7pddp.exe PID 2796 wrote to memory of 352 2796 1jjpv.exe 7pddp.exe PID 352 wrote to memory of 1768 352 7pddp.exe rlxfrxf.exe PID 352 wrote to memory of 1768 352 7pddp.exe rlxfrxf.exe PID 352 wrote to memory of 1768 352 7pddp.exe rlxfrxf.exe PID 352 wrote to memory of 1768 352 7pddp.exe rlxfrxf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b540de8b959a83b7eb41a847df63eff0N.exe"C:\Users\Admin\AppData\Local\Temp\b540de8b959a83b7eb41a847df63eff0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\3pjvv.exec:\3pjvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\fllxxll.exec:\fllxxll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\hbtnht.exec:\hbtnht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\lxlxffr.exec:\lxlxffr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\pppvj.exec:\pppvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\jpddd.exec:\jpddd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\lllxrxl.exec:\lllxrxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
\??\c:\nhbhtt.exec:\nhbhtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\jjdjd.exec:\jjdjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\9lflrxl.exec:\9lflrxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\7fxxxfr.exec:\7fxxxfr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\hbtnbh.exec:\hbtnbh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\ttnbtt.exec:\ttnbtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\1jjpv.exec:\1jjpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\7pddp.exec:\7pddp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\rlxfrxf.exec:\rlxfrxf.exe17⤵
- Executes dropped EXE
PID:1768 -
\??\c:\hhttbh.exec:\hhttbh.exe18⤵
- Executes dropped EXE
PID:2076 -
\??\c:\btthhb.exec:\btthhb.exe19⤵
- Executes dropped EXE
PID:2096 -
\??\c:\9ppvj.exec:\9ppvj.exe20⤵
- Executes dropped EXE
PID:1928 -
\??\c:\lrrfxlf.exec:\lrrfxlf.exe21⤵
- Executes dropped EXE
PID:2496 -
\??\c:\hhbnhh.exec:\hhbnhh.exe22⤵
- Executes dropped EXE
PID:1840 -
\??\c:\nnhtnh.exec:\nnhtnh.exe23⤵
- Executes dropped EXE
PID:1352 -
\??\c:\vpjjp.exec:\vpjjp.exe24⤵
- Executes dropped EXE
PID:1052 -
\??\c:\3vjjp.exec:\3vjjp.exe25⤵
- Executes dropped EXE
PID:2996 -
\??\c:\3lflrrf.exec:\3lflrrf.exe26⤵
- Executes dropped EXE
PID:324 -
\??\c:\rrlrxlr.exec:\rrlrxlr.exe27⤵
- Executes dropped EXE
PID:2560 -
\??\c:\tnnntb.exec:\tnnntb.exe28⤵
- Executes dropped EXE
PID:1704 -
\??\c:\pdvvv.exec:\pdvvv.exe29⤵
- Executes dropped EXE
PID:2532 -
\??\c:\xxlrrrx.exec:\xxlrrrx.exe30⤵
- Executes dropped EXE
PID:1656 -
\??\c:\fxlrxxl.exec:\fxlrxxl.exe31⤵
- Executes dropped EXE
PID:1636 -
\??\c:\ttntnn.exec:\ttntnn.exe32⤵
- Executes dropped EXE
PID:2192 -
\??\c:\nnhnth.exec:\nnhnth.exe33⤵
- Executes dropped EXE
PID:1708 -
\??\c:\vjvpp.exec:\vjvpp.exe34⤵
- Executes dropped EXE
PID:2748 -
\??\c:\vvpvj.exec:\vvpvj.exe35⤵
- Executes dropped EXE
PID:2720 -
\??\c:\lfxrrff.exec:\lfxrrff.exe36⤵
- Executes dropped EXE
PID:1960 -
\??\c:\llxlxxl.exec:\llxlxxl.exe37⤵
- Executes dropped EXE
PID:2620 -
\??\c:\hhhntt.exec:\hhhntt.exe38⤵
- Executes dropped EXE
PID:600 -
\??\c:\bbtbtb.exec:\bbtbtb.exe39⤵
- Executes dropped EXE
PID:480 -
\??\c:\1vpjv.exec:\1vpjv.exe40⤵
- Executes dropped EXE
PID:1500 -
\??\c:\vppvv.exec:\vppvv.exe41⤵
- Executes dropped EXE
PID:820 -
\??\c:\jdppd.exec:\jdppd.exe42⤵
- Executes dropped EXE
PID:1644 -
\??\c:\rrxxrfr.exec:\rrxxrfr.exe43⤵
- Executes dropped EXE
PID:2216 -
\??\c:\1thntb.exec:\1thntb.exe44⤵
- Executes dropped EXE
PID:2144 -
\??\c:\jdpvd.exec:\jdpvd.exe45⤵
- Executes dropped EXE
PID:2592 -
\??\c:\vpdjp.exec:\vpdjp.exe46⤵
- Executes dropped EXE
PID:1520 -
\??\c:\rrxflxf.exec:\rrxflxf.exe47⤵
- Executes dropped EXE
PID:1388 -
\??\c:\pvdpd.exec:\pvdpd.exe48⤵
- Executes dropped EXE
PID:2820 -
\??\c:\5lrrxfx.exec:\5lrrxfx.exe49⤵
- Executes dropped EXE
PID:2952 -
\??\c:\3lrflrx.exec:\3lrflrx.exe50⤵
- Executes dropped EXE
PID:1640 -
\??\c:\hbnbnt.exec:\hbnbnt.exe51⤵
- Executes dropped EXE
PID:2028 -
\??\c:\ddpdd.exec:\ddpdd.exe52⤵
- Executes dropped EXE
PID:2008 -
\??\c:\rlxflxf.exec:\rlxflxf.exe53⤵
- Executes dropped EXE
PID:3032 -
\??\c:\1tnbnn.exec:\1tnbnn.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196 -
\??\c:\vvjjd.exec:\vvjjd.exe55⤵
- Executes dropped EXE
PID:1156 -
\??\c:\btnbtn.exec:\btnbtn.exe56⤵
- Executes dropped EXE
PID:2480 -
\??\c:\ppjpj.exec:\ppjpj.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2460 -
\??\c:\dddjp.exec:\dddjp.exe58⤵
- Executes dropped EXE
PID:1700 -
\??\c:\tbnbht.exec:\tbnbht.exe59⤵
- Executes dropped EXE
PID:2380 -
\??\c:\jdpjj.exec:\jdpjj.exe60⤵
- Executes dropped EXE
PID:1976 -
\??\c:\jppdd.exec:\jppdd.exe61⤵
- Executes dropped EXE
PID:2000 -
\??\c:\xlfxllx.exec:\xlfxllx.exe62⤵
- Executes dropped EXE
PID:1376 -
\??\c:\hhthth.exec:\hhthth.exe63⤵
- Executes dropped EXE
PID:324 -
\??\c:\9hbhtb.exec:\9hbhtb.exe64⤵
- Executes dropped EXE
PID:1628 -
\??\c:\7jpdv.exec:\7jpdv.exe65⤵
- Executes dropped EXE
PID:336 -
\??\c:\xrxfxrf.exec:\xrxfxrf.exe66⤵PID:2528
-
\??\c:\lrfrrrr.exec:\lrfrrrr.exe67⤵PID:2848
-
\??\c:\ttntbh.exec:\ttntbh.exe68⤵PID:2060
-
\??\c:\ddjdd.exec:\ddjdd.exe69⤵PID:2764
-
\??\c:\dvpvp.exec:\dvpvp.exe70⤵PID:1636
-
\??\c:\rxxxrlf.exec:\rxxxrlf.exe71⤵PID:2192
-
\??\c:\hhbthh.exec:\hhbthh.exe72⤵PID:2884
-
\??\c:\bnbtbh.exec:\bnbtbh.exe73⤵PID:2760
-
\??\c:\vvppd.exec:\vvppd.exe74⤵PID:2744
-
\??\c:\1llflxr.exec:\1llflxr.exe75⤵PID:1440
-
\??\c:\ffxlrxr.exec:\ffxlrxr.exe76⤵PID:2776
-
\??\c:\hhhbhn.exec:\hhhbhn.exe77⤵PID:1936
-
\??\c:\jdvdj.exec:\jdvdj.exe78⤵PID:1060
-
\??\c:\frrrffr.exec:\frrrffr.exe79⤵PID:532
-
\??\c:\rflrxrr.exec:\rflrxrr.exe80⤵PID:1552
-
\??\c:\ttnbht.exec:\ttnbht.exe81⤵PID:2492
-
\??\c:\bttbnt.exec:\bttbnt.exe82⤵PID:2116
-
\??\c:\djddp.exec:\djddp.exe83⤵PID:2148
-
\??\c:\ffxfrxl.exec:\ffxfrxl.exe84⤵PID:2208
-
\??\c:\rlfflxf.exec:\rlfflxf.exe85⤵PID:1096
-
\??\c:\bbhnbn.exec:\bbhnbn.exe86⤵PID:1160
-
\??\c:\5tnttt.exec:\5tnttt.exe87⤵PID:2436
-
\??\c:\vpvpd.exec:\vpvpd.exe88⤵PID:2588
-
\??\c:\1jddv.exec:\1jddv.exe89⤵PID:2676
-
\??\c:\1xxlrfr.exec:\1xxlrfr.exe90⤵PID:2596
-
\??\c:\fxlrxxl.exec:\fxlrxxl.exe91⤵PID:352
-
\??\c:\1nhntb.exec:\1nhntb.exe92⤵PID:1768
-
\??\c:\nhtbhn.exec:\nhtbhn.exe93⤵PID:2580
-
\??\c:\ppjdd.exec:\ppjdd.exe94⤵PID:2236
-
\??\c:\ppjdp.exec:\ppjdp.exe95⤵PID:680
-
\??\c:\rlxflxl.exec:\rlxflxl.exe96⤵PID:2268
-
\??\c:\9jjvd.exec:\9jjvd.exe97⤵PID:376
-
\??\c:\jdpdd.exec:\jdpdd.exe98⤵PID:2224
-
\??\c:\xxrxflr.exec:\xxrxflr.exe99⤵PID:1796
-
\??\c:\lrrfrxf.exec:\lrrfrxf.exe100⤵PID:1680
-
\??\c:\nhttbb.exec:\nhttbb.exe101⤵PID:2464
-
\??\c:\1nnthh.exec:\1nnthh.exe102⤵PID:1296
-
\??\c:\1vjpv.exec:\1vjpv.exe103⤵PID:1192
-
\??\c:\vvjpv.exec:\vvjpv.exe104⤵PID:2552
-
\??\c:\7fxrffx.exec:\7fxrffx.exe105⤵PID:1876
-
\??\c:\fxrxfrf.exec:\fxrxfrf.exe106⤵PID:1076
-
\??\c:\3thhnt.exec:\3thhnt.exe107⤵PID:2388
-
\??\c:\nnnbhn.exec:\nnnbhn.exe108⤵PID:1716
-
\??\c:\7vvjp.exec:\7vvjp.exe109⤵PID:2024
-
\??\c:\1pjvd.exec:\1pjvd.exe110⤵PID:2816
-
\??\c:\lfrllrf.exec:\lfrllrf.exe111⤵PID:2296
-
\??\c:\rrfrffx.exec:\rrfrffx.exe112⤵PID:2768
-
\??\c:\5btthh.exec:\5btthh.exe113⤵PID:2748
-
\??\c:\nhbhtb.exec:\nhbhtb.exe114⤵PID:2680
-
\??\c:\dvpdj.exec:\dvpdj.exe115⤵PID:2220
-
\??\c:\pjjvv.exec:\pjjvv.exe116⤵PID:2640
-
\??\c:\xrlrrrf.exec:\xrlrrrf.exe117⤵PID:2724
-
\??\c:\rlfrxfr.exec:\rlfrxfr.exe118⤵PID:600
-
\??\c:\tnthtt.exec:\tnthtt.exe119⤵PID:552
-
\??\c:\btbnhh.exec:\btbnhh.exe120⤵PID:572
-
\??\c:\pdvdp.exec:\pdvdp.exe121⤵PID:820
-
\??\c:\pjjvd.exec:\pjjvd.exe122⤵PID:2536
-
\??\c:\fxlxlrx.exec:\fxlxlrx.exe123⤵PID:2088
-
\??\c:\rlrrrrr.exec:\rlrrrrr.exe124⤵PID:1948
-
\??\c:\9bhhbb.exec:\9bhhbb.exe125⤵PID:2592
-
\??\c:\7ttbth.exec:\7ttbth.exe126⤵PID:1520
-
\??\c:\jjvvd.exec:\jjvvd.exe127⤵PID:1388
-
\??\c:\vvpvj.exec:\vvpvj.exe128⤵PID:2968
-
\??\c:\lfxfrrf.exec:\lfxfrrf.exe129⤵PID:2952
-
\??\c:\fflxxrl.exec:\fflxxrl.exe130⤵PID:1828
-
\??\c:\tnnthn.exec:\tnnthn.exe131⤵PID:2028
-
\??\c:\dpjvj.exec:\dpjvj.exe132⤵PID:2092
-
\??\c:\pdjvd.exec:\pdjvd.exe133⤵
- System Location Discovery: System Language Discovery
PID:3032 -
\??\c:\3pjpd.exec:\3pjpd.exe134⤵PID:2196
-
\??\c:\llflxxl.exec:\llflxxl.exe135⤵PID:1880
-
\??\c:\bbntbh.exec:\bbntbh.exe136⤵PID:2472
-
\??\c:\hthhbt.exec:\hthhbt.exe137⤵PID:2460
-
\??\c:\djvvv.exec:\djvvv.exe138⤵PID:1740
-
\??\c:\1vpdp.exec:\1vpdp.exe139⤵PID:2380
-
\??\c:\lfxrfxl.exec:\lfxrfxl.exe140⤵PID:1976
-
\??\c:\nbntbb.exec:\nbntbb.exe141⤵PID:1052
-
\??\c:\nnhtbb.exec:\nnhtbb.exe142⤵PID:1376
-
\??\c:\pjppp.exec:\pjppp.exe143⤵PID:324
-
\??\c:\vpvvd.exec:\vpvvd.exe144⤵PID:1068
-
\??\c:\7lxxxrx.exec:\7lxxxrx.exe145⤵PID:336
-
\??\c:\nnhnhh.exec:\nnhnhh.exe146⤵PID:1876
-
\??\c:\htnthn.exec:\htnthn.exe147⤵PID:2848
-
\??\c:\dvjvj.exec:\dvjvj.exe148⤵PID:3020
-
\??\c:\9pddd.exec:\9pddd.exe149⤵PID:2764
-
\??\c:\3lffrrf.exec:\3lffrrf.exe150⤵PID:1592
-
\??\c:\llfxflx.exec:\llfxflx.exe151⤵PID:2192
-
\??\c:\9hnnbn.exec:\9hnnbn.exe152⤵PID:2612
-
\??\c:\bthnnt.exec:\bthnnt.exe153⤵PID:2760
-
\??\c:\5pvpv.exec:\5pvpv.exe154⤵PID:2744
-
\??\c:\vpjdv.exec:\vpjdv.exe155⤵PID:1440
-
\??\c:\lrfrxrr.exec:\lrfrxrr.exe156⤵PID:2620
-
\??\c:\htnntn.exec:\htnntn.exe157⤵PID:596
-
\??\c:\5nnntt.exec:\5nnntt.exe158⤵PID:588
-
\??\c:\7vvdj.exec:\7vvdj.exe159⤵PID:784
-
\??\c:\vvpvd.exec:\vvpvd.exe160⤵PID:2264
-
\??\c:\9rfrxlr.exec:\9rfrxlr.exe161⤵PID:2504
-
\??\c:\rlrxffl.exec:\rlrxffl.exe162⤵PID:2948
-
\??\c:\tnbhnb.exec:\tnbhnb.exe163⤵PID:2148
-
\??\c:\nhnhnn.exec:\nhnhnn.exe164⤵PID:2812
-
\??\c:\ppjpv.exec:\ppjpv.exe165⤵PID:1096
-
\??\c:\pdpvd.exec:\pdpvd.exe166⤵PID:1160
-
\??\c:\fxllrrr.exec:\fxllrrr.exe167⤵PID:2820
-
\??\c:\nhtbhh.exec:\nhtbhh.exe168⤵PID:2588
-
\??\c:\dvpvp.exec:\dvpvp.exe169⤵PID:2676
-
\??\c:\jvjjd.exec:\jvjjd.exe170⤵PID:1384
-
\??\c:\xxffxxx.exec:\xxffxxx.exe171⤵PID:352
-
\??\c:\rlxflrx.exec:\rlxflrx.exe172⤵PID:3036
-
\??\c:\tthnnn.exec:\tthnnn.exe173⤵PID:2580
-
\??\c:\3ddjj.exec:\3ddjj.exe174⤵PID:2512
-
\??\c:\rrlllxl.exec:\rrlllxl.exe175⤵PID:680
-
\??\c:\fxllllr.exec:\fxllllr.exe176⤵PID:848
-
\??\c:\3tnnbb.exec:\3tnnbb.exe177⤵PID:376
-
\??\c:\bbbhbt.exec:\bbbhbt.exe178⤵PID:2484
-
\??\c:\ppdjv.exec:\ppdjv.exe179⤵PID:1796
-
\??\c:\vpjvp.exec:\vpjvp.exe180⤵PID:1680
-
\??\c:\9fffllx.exec:\9fffllx.exe181⤵PID:2464
-
\??\c:\nbtbhn.exec:\nbtbhn.exe182⤵PID:1296
-
\??\c:\3htnnn.exec:\3htnnn.exe183⤵PID:1192
-
\??\c:\1pppv.exec:\1pppv.exe184⤵PID:2552
-
\??\c:\5pdjp.exec:\5pdjp.exe185⤵PID:828
-
\??\c:\rlrlrlr.exec:\rlrlrlr.exe186⤵PID:1308
-
\??\c:\1lfrlrf.exec:\1lfrlrf.exe187⤵PID:2388
-
\??\c:\bttthn.exec:\bttthn.exe188⤵PID:1324
-
\??\c:\pdjdp.exec:\pdjdp.exe189⤵PID:2752
-
\??\c:\pjvdd.exec:\pjvdd.exe190⤵PID:1588
-
\??\c:\3rfxffl.exec:\3rfxffl.exe191⤵PID:2656
-
\??\c:\xxlxlfl.exec:\xxlxlfl.exe192⤵PID:2840
-
\??\c:\7hbtbb.exec:\7hbtbb.exe193⤵PID:2720
-
\??\c:\9thtbb.exec:\9thtbb.exe194⤵PID:2652
-
\??\c:\1pjdj.exec:\1pjdj.exe195⤵PID:1944
-
\??\c:\vjdjv.exec:\vjdjv.exe196⤵PID:2624
-
\??\c:\fxrrxrf.exec:\fxrrxrf.exe197⤵PID:2336
-
\??\c:\hhhntt.exec:\hhhntt.exe198⤵PID:1564
-
\??\c:\bbhnbh.exec:\bbhnbh.exe199⤵PID:1864
-
\??\c:\vpdvv.exec:\vpdvv.exe200⤵PID:1644
-
\??\c:\jdpjj.exec:\jdpjj.exe201⤵PID:1816
-
\??\c:\1fxfllr.exec:\1fxfllr.exe202⤵
- System Location Discovery: System Language Discovery
PID:2144 -
\??\c:\3lxfllr.exec:\3lxfllr.exe203⤵PID:2784
-
\??\c:\5nhhnn.exec:\5nhhnn.exe204⤵PID:2156
-
\??\c:\1btbnh.exec:\1btbnh.exe205⤵PID:1696
-
\??\c:\jdjdj.exec:\jdjdj.exe206⤵PID:2900
-
\??\c:\jvjjj.exec:\jvjjj.exe207⤵PID:2796
-
\??\c:\xxlrfrf.exec:\xxlrfrf.exe208⤵PID:1832
-
\??\c:\xlrlffl.exec:\xlrlffl.exe209⤵PID:3044
-
\??\c:\hbbhtn.exec:\hbbhtn.exe210⤵PID:2132
-
\??\c:\vpjjv.exec:\vpjjv.exe211⤵PID:3040
-
\??\c:\pjvjv.exec:\pjvjv.exe212⤵PID:2076
-
\??\c:\lfxxlfr.exec:\lfxxlfr.exe213⤵PID:2236
-
\??\c:\xrlrxxf.exec:\xrlrxxf.exe214⤵PID:2084
-
\??\c:\7tnthh.exec:\7tnthh.exe215⤵PID:1164
-
\??\c:\nbnhhh.exec:\nbnhhh.exe216⤵PID:2072
-
\??\c:\vpppd.exec:\vpppd.exe217⤵PID:708
-
\??\c:\5jdjd.exec:\5jdjd.exe218⤵PID:1352
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe219⤵PID:1952
-
\??\c:\fxlrxfx.exec:\fxlrxfx.exe220⤵PID:1368
-
\??\c:\bhnnhb.exec:\bhnnhb.exe221⤵PID:1660
-
\??\c:\1hnntn.exec:\1hnntn.exe222⤵PID:1744
-
\??\c:\1djpd.exec:\1djpd.exe223⤵PID:816
-
\??\c:\5xrxlrl.exec:\5xrxlrl.exe224⤵PID:2528
-
\??\c:\rfffflr.exec:\rfffflr.exe225⤵PID:896
-
\??\c:\bnhntt.exec:\bnhntt.exe226⤵PID:2688
-
\??\c:\9bhbbb.exec:\9bhbbb.exe227⤵PID:2732
-
\??\c:\7jddj.exec:\7jddj.exe228⤵PID:1636
-
\??\c:\7dvvd.exec:\7dvvd.exe229⤵PID:1576
-
\??\c:\1xrfrlx.exec:\1xrfrlx.exe230⤵PID:2884
-
\??\c:\fxrxxrl.exec:\fxrxxrl.exe231⤵PID:2392
-
\??\c:\htnnnn.exec:\htnnnn.exe232⤵PID:2604
-
\??\c:\hnhnnn.exec:\hnhnnn.exe233⤵PID:2608
-
\??\c:\ppdjv.exec:\ppdjv.exe234⤵PID:2776
-
\??\c:\jdjpp.exec:\jdjpp.exe235⤵PID:2444
-
\??\c:\7rffffl.exec:\7rffffl.exe236⤵PID:580
-
\??\c:\ffrxrxl.exec:\ffrxrxl.exe237⤵PID:264
-
\??\c:\hbnbht.exec:\hbnbht.exe238⤵PID:2648
-
\??\c:\3thntb.exec:\3thntb.exe239⤵PID:2668
-
\??\c:\jdjpv.exec:\jdjpv.exe240⤵PID:2116
-
\??\c:\7pjjj.exec:\7pjjj.exe241⤵PID:2108
-
\??\c:\9rlxlxf.exec:\9rlxlxf.exe242⤵PID:2708