Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 09:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b7d457ac6ce2011890e59f8e4adfa8f0N.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
120 seconds
General
-
Target
b7d457ac6ce2011890e59f8e4adfa8f0N.exe
-
Size
93KB
-
MD5
b7d457ac6ce2011890e59f8e4adfa8f0
-
SHA1
237d80849ae36d0fac03ea2df64e908d80de02ae
-
SHA256
9334c039f0d96ea2a57910598669eb6e4d6a24d7240a55c18b54405ddc281b95
-
SHA512
fbc1bc3f75b325450d2128d6b473bcd5c7b0d1b579f6fac1e0c0c79f580bc2cc28e82b41b320c7fd587ac4a5fbb9aa1651dde685aa0b75973c1248f4a49614dc
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo7xCkTsIRwnohZkmr:ymb3NkkiQ3mdBjFo7LAIRUohlr
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1224-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1224-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1100-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/648-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2656-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1272-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2092-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/892-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
thnnbn.exejvjjp.exe7rfxxxf.exebtnttb.exehbbbhh.exevvpvp.exefrffllr.exejdvvd.exevjddd.exe3xrxffl.exenbtbhh.exe7dpdj.exedpvjj.exerflxxrx.exe1xrxxfr.exebbbnth.exevjjpv.exefffrlxf.exe3lxfxfl.exe9nntbh.exejdvpp.exevjdjj.exelxflrrx.exe1tbbht.exenhtbhh.exejvppp.exedpppd.exellxrxrf.exebthnhh.exe9jdpd.exefrfrfff.exexfrrllf.exe9tntht.exebnnnhb.exevjppj.exexffrfxx.exe3lxllxf.exenbhhhh.exeppjpp.exeppjdp.exexrlxlxf.exe7flrxxl.exenbbhtt.exe3thttb.exevpjjj.exepdvdv.exe5lxlrrx.exefxrflrx.exetthntt.exebtnbtt.exedvddv.exevvvvj.exefxffllr.exe7rllfff.exehnnhnb.exe3jppv.exevpppd.exe1hbtbb.exe3hbntb.exevpdpp.exeddpdj.exe5rlllrx.exefxffrrl.exetbthnb.exepid process 2696 thnnbn.exe 2760 jvjjp.exe 2684 7rfxxxf.exe 2668 btnttb.exe 2788 hbbbhh.exe 2688 vvpvp.exe 1224 frffllr.exe 2404 jdvvd.exe 2432 vjddd.exe 1100 3xrxffl.exe 648 nbtbhh.exe 2832 7dpdj.exe 2656 dpvjj.exe 1400 rflxxrx.exe 1868 1xrxxfr.exe 588 bbbnth.exe 2176 vjjpv.exe 2136 fffrlxf.exe 3016 3lxfxfl.exe 2340 9nntbh.exe 3012 jdvpp.exe 1272 vjdjj.exe 2392 lxflrrx.exe 2092 1tbbht.exe 844 nhtbhh.exe 1824 jvppp.exe 2316 dpppd.exe 2492 llxrxrf.exe 892 bthnhh.exe 2756 9jdpd.exe 2708 frfrfff.exe 2780 xfrrllf.exe 2600 9tntht.exe 2868 bnnnhb.exe 2620 vjppj.exe 2576 xffrfxx.exe 2076 3lxllxf.exe 2632 nbhhhh.exe 2828 ppjpp.exe 2428 ppjdp.exe 2400 xrlxlxf.exe 1916 7flrxxl.exe 704 nbbhtt.exe 860 3thttb.exe 2628 vpjjj.exe 2800 pdvdv.exe 2808 5lxlrrx.exe 2036 fxrflrx.exe 1400 tthntt.exe 604 btnbtt.exe 2188 dvddv.exe 2128 vvvvj.exe 2116 fxffllr.exe 2136 7rllfff.exe 2256 hnnhnb.exe 2648 3jppv.exe 920 vpppd.exe 1272 1hbtbb.exe 2448 3hbntb.exe 1008 vpdpp.exe 2092 ddpdj.exe 2192 5rlllrx.exe 1968 fxffrrl.exe 2476 tbthnb.exe -
Processes:
resource yara_rule behavioral1/memory/2220-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1100-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/648-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1272-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2092-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/892-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3nbbhh.exe5pvjv.exevvpdp.exexrfxffl.exehhntbh.exebtnttb.exe9nbtnt.exettthth.exepjpdj.exeffxrflr.exevvvdp.exehhtthh.exepjjjv.exevpvjp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b7d457ac6ce2011890e59f8e4adfa8f0N.exethnnbn.exejvjjp.exe7rfxxxf.exebtnttb.exehbbbhh.exevvpvp.exefrffllr.exejdvvd.exevjddd.exe3xrxffl.exenbtbhh.exe7dpdj.exedpvjj.exerflxxrx.exe1xrxxfr.exedescription pid process target process PID 2220 wrote to memory of 2696 2220 b7d457ac6ce2011890e59f8e4adfa8f0N.exe thnnbn.exe PID 2220 wrote to memory of 2696 2220 b7d457ac6ce2011890e59f8e4adfa8f0N.exe thnnbn.exe PID 2220 wrote to memory of 2696 2220 b7d457ac6ce2011890e59f8e4adfa8f0N.exe thnnbn.exe PID 2220 wrote to memory of 2696 2220 b7d457ac6ce2011890e59f8e4adfa8f0N.exe thnnbn.exe PID 2696 wrote to memory of 2760 2696 thnnbn.exe jvjjp.exe PID 2696 wrote to memory of 2760 2696 thnnbn.exe jvjjp.exe PID 2696 wrote to memory of 2760 2696 thnnbn.exe jvjjp.exe PID 2696 wrote to memory of 2760 2696 thnnbn.exe jvjjp.exe PID 2760 wrote to memory of 2684 2760 jvjjp.exe 7rfxxxf.exe PID 2760 wrote to memory of 2684 2760 jvjjp.exe 7rfxxxf.exe PID 2760 wrote to memory of 2684 2760 jvjjp.exe 7rfxxxf.exe PID 2760 wrote to memory of 2684 2760 jvjjp.exe 7rfxxxf.exe PID 2684 wrote to memory of 2668 2684 7rfxxxf.exe btnttb.exe PID 2684 wrote to memory of 2668 2684 7rfxxxf.exe btnttb.exe PID 2684 wrote to memory of 2668 2684 7rfxxxf.exe btnttb.exe PID 2684 wrote to memory of 2668 2684 7rfxxxf.exe btnttb.exe PID 2668 wrote to memory of 2788 2668 btnttb.exe hbbbhh.exe PID 2668 wrote to memory of 2788 2668 btnttb.exe hbbbhh.exe PID 2668 wrote to memory of 2788 2668 btnttb.exe hbbbhh.exe PID 2668 wrote to memory of 2788 2668 btnttb.exe hbbbhh.exe PID 2788 wrote to memory of 2688 2788 hbbbhh.exe vvpvp.exe PID 2788 wrote to memory of 2688 2788 hbbbhh.exe vvpvp.exe PID 2788 wrote to memory of 2688 2788 hbbbhh.exe vvpvp.exe PID 2788 wrote to memory of 2688 2788 hbbbhh.exe vvpvp.exe PID 2688 wrote to memory of 1224 2688 vvpvp.exe frffllr.exe PID 2688 wrote to memory of 1224 2688 vvpvp.exe frffllr.exe PID 2688 wrote to memory of 1224 2688 vvpvp.exe frffllr.exe PID 2688 wrote to memory of 1224 2688 vvpvp.exe frffllr.exe PID 1224 wrote to memory of 2404 1224 frffllr.exe jdvvd.exe PID 1224 wrote to memory of 2404 1224 frffllr.exe jdvvd.exe PID 1224 wrote to memory of 2404 1224 frffllr.exe jdvvd.exe PID 1224 wrote to memory of 2404 1224 frffllr.exe jdvvd.exe PID 2404 wrote to memory of 2432 2404 jdvvd.exe vjddd.exe PID 2404 wrote to memory of 2432 2404 jdvvd.exe vjddd.exe PID 2404 wrote to memory of 2432 2404 jdvvd.exe vjddd.exe PID 2404 wrote to memory of 2432 2404 jdvvd.exe vjddd.exe PID 2432 wrote to memory of 1100 2432 vjddd.exe 3xrxffl.exe PID 2432 wrote to memory of 1100 2432 vjddd.exe 3xrxffl.exe PID 2432 wrote to memory of 1100 2432 vjddd.exe 3xrxffl.exe PID 2432 wrote to memory of 1100 2432 vjddd.exe 3xrxffl.exe PID 1100 wrote to memory of 648 1100 3xrxffl.exe nbtbhh.exe PID 1100 wrote to memory of 648 1100 3xrxffl.exe nbtbhh.exe PID 1100 wrote to memory of 648 1100 3xrxffl.exe nbtbhh.exe PID 1100 wrote to memory of 648 1100 3xrxffl.exe nbtbhh.exe PID 648 wrote to memory of 2832 648 nbtbhh.exe 7dpdj.exe PID 648 wrote to memory of 2832 648 nbtbhh.exe 7dpdj.exe PID 648 wrote to memory of 2832 648 nbtbhh.exe 7dpdj.exe PID 648 wrote to memory of 2832 648 nbtbhh.exe 7dpdj.exe PID 2832 wrote to memory of 2656 2832 7dpdj.exe dpvjj.exe PID 2832 wrote to memory of 2656 2832 7dpdj.exe dpvjj.exe PID 2832 wrote to memory of 2656 2832 7dpdj.exe dpvjj.exe PID 2832 wrote to memory of 2656 2832 7dpdj.exe dpvjj.exe PID 2656 wrote to memory of 1400 2656 dpvjj.exe rflxxrx.exe PID 2656 wrote to memory of 1400 2656 dpvjj.exe rflxxrx.exe PID 2656 wrote to memory of 1400 2656 dpvjj.exe rflxxrx.exe PID 2656 wrote to memory of 1400 2656 dpvjj.exe rflxxrx.exe PID 1400 wrote to memory of 1868 1400 rflxxrx.exe 1xrxxfr.exe PID 1400 wrote to memory of 1868 1400 rflxxrx.exe 1xrxxfr.exe PID 1400 wrote to memory of 1868 1400 rflxxrx.exe 1xrxxfr.exe PID 1400 wrote to memory of 1868 1400 rflxxrx.exe 1xrxxfr.exe PID 1868 wrote to memory of 588 1868 1xrxxfr.exe bbbnth.exe PID 1868 wrote to memory of 588 1868 1xrxxfr.exe bbbnth.exe PID 1868 wrote to memory of 588 1868 1xrxxfr.exe bbbnth.exe PID 1868 wrote to memory of 588 1868 1xrxxfr.exe bbbnth.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d457ac6ce2011890e59f8e4adfa8f0N.exe"C:\Users\Admin\AppData\Local\Temp\b7d457ac6ce2011890e59f8e4adfa8f0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\thnnbn.exec:\thnnbn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\jvjjp.exec:\jvjjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\7rfxxxf.exec:\7rfxxxf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\btnttb.exec:\btnttb.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\hbbbhh.exec:\hbbbhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\vvpvp.exec:\vvpvp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\frffllr.exec:\frffllr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
\??\c:\jdvvd.exec:\jdvvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\vjddd.exec:\vjddd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\3xrxffl.exec:\3xrxffl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
\??\c:\nbtbhh.exec:\nbtbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
\??\c:\7dpdj.exec:\7dpdj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\dpvjj.exec:\dpvjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\rflxxrx.exec:\rflxxrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
\??\c:\1xrxxfr.exec:\1xrxxfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
\??\c:\bbbnth.exec:\bbbnth.exe17⤵
- Executes dropped EXE
PID:588 -
\??\c:\vjjpv.exec:\vjjpv.exe18⤵
- Executes dropped EXE
PID:2176 -
\??\c:\fffrlxf.exec:\fffrlxf.exe19⤵
- Executes dropped EXE
PID:2136 -
\??\c:\3lxfxfl.exec:\3lxfxfl.exe20⤵
- Executes dropped EXE
PID:3016 -
\??\c:\9nntbh.exec:\9nntbh.exe21⤵
- Executes dropped EXE
PID:2340 -
\??\c:\jdvpp.exec:\jdvpp.exe22⤵
- Executes dropped EXE
PID:3012 -
\??\c:\vjdjj.exec:\vjdjj.exe23⤵
- Executes dropped EXE
PID:1272 -
\??\c:\lxflrrx.exec:\lxflrrx.exe24⤵
- Executes dropped EXE
PID:2392 -
\??\c:\1tbbht.exec:\1tbbht.exe25⤵
- Executes dropped EXE
PID:2092 -
\??\c:\nhtbhh.exec:\nhtbhh.exe26⤵
- Executes dropped EXE
PID:844 -
\??\c:\jvppp.exec:\jvppp.exe27⤵
- Executes dropped EXE
PID:1824 -
\??\c:\dpppd.exec:\dpppd.exe28⤵
- Executes dropped EXE
PID:2316 -
\??\c:\llxrxrf.exec:\llxrxrf.exe29⤵
- Executes dropped EXE
PID:2492 -
\??\c:\bthnhh.exec:\bthnhh.exe30⤵
- Executes dropped EXE
PID:892 -
\??\c:\9jdpd.exec:\9jdpd.exe31⤵
- Executes dropped EXE
PID:2756 -
\??\c:\frfrfff.exec:\frfrfff.exe32⤵
- Executes dropped EXE
PID:2708 -
\??\c:\xfrrllf.exec:\xfrrllf.exe33⤵
- Executes dropped EXE
PID:2780 -
\??\c:\9tntht.exec:\9tntht.exe34⤵
- Executes dropped EXE
PID:2600 -
\??\c:\bnnnhb.exec:\bnnnhb.exe35⤵
- Executes dropped EXE
PID:2868 -
\??\c:\vjppj.exec:\vjppj.exe36⤵
- Executes dropped EXE
PID:2620 -
\??\c:\xffrfxx.exec:\xffrfxx.exe37⤵
- Executes dropped EXE
PID:2576 -
\??\c:\3lxllxf.exec:\3lxllxf.exe38⤵
- Executes dropped EXE
PID:2076 -
\??\c:\nbhhhh.exec:\nbhhhh.exe39⤵
- Executes dropped EXE
PID:2632 -
\??\c:\ppjpp.exec:\ppjpp.exe40⤵
- Executes dropped EXE
PID:2828 -
\??\c:\ppjdp.exec:\ppjdp.exe41⤵
- Executes dropped EXE
PID:2428 -
\??\c:\xrlxlxf.exec:\xrlxlxf.exe42⤵
- Executes dropped EXE
PID:2400 -
\??\c:\7flrxxl.exec:\7flrxxl.exe43⤵
- Executes dropped EXE
PID:1916 -
\??\c:\nbbhtt.exec:\nbbhtt.exe44⤵
- Executes dropped EXE
PID:704 -
\??\c:\3thttb.exec:\3thttb.exe45⤵
- Executes dropped EXE
PID:860 -
\??\c:\vpjjj.exec:\vpjjj.exe46⤵
- Executes dropped EXE
PID:2628 -
\??\c:\pdvdv.exec:\pdvdv.exe47⤵
- Executes dropped EXE
PID:2800 -
\??\c:\5lxlrrx.exec:\5lxlrrx.exe48⤵
- Executes dropped EXE
PID:2808 -
\??\c:\fxrflrx.exec:\fxrflrx.exe49⤵
- Executes dropped EXE
PID:2036 -
\??\c:\tthntt.exec:\tthntt.exe50⤵
- Executes dropped EXE
PID:1400 -
\??\c:\btnbtt.exec:\btnbtt.exe51⤵
- Executes dropped EXE
PID:604 -
\??\c:\dvddv.exec:\dvddv.exe52⤵
- Executes dropped EXE
PID:2188 -
\??\c:\vvvvj.exec:\vvvvj.exe53⤵
- Executes dropped EXE
PID:2128 -
\??\c:\fxffllr.exec:\fxffllr.exe54⤵
- Executes dropped EXE
PID:2116 -
\??\c:\7rllfff.exec:\7rllfff.exe55⤵
- Executes dropped EXE
PID:2136 -
\??\c:\hnnhnb.exec:\hnnhnb.exe56⤵
- Executes dropped EXE
PID:2256 -
\??\c:\3jppv.exec:\3jppv.exe57⤵
- Executes dropped EXE
PID:2648 -
\??\c:\vpppd.exec:\vpppd.exe58⤵
- Executes dropped EXE
PID:920 -
\??\c:\1hbtbb.exec:\1hbtbb.exe59⤵
- Executes dropped EXE
PID:1272 -
\??\c:\3hbntb.exec:\3hbntb.exe60⤵
- Executes dropped EXE
PID:2448 -
\??\c:\vpdpp.exec:\vpdpp.exe61⤵
- Executes dropped EXE
PID:1008 -
\??\c:\ddpdj.exec:\ddpdj.exe62⤵
- Executes dropped EXE
PID:2092 -
\??\c:\5rlllrx.exec:\5rlllrx.exe63⤵
- Executes dropped EXE
PID:2192 -
\??\c:\fxffrrl.exec:\fxffrrl.exe64⤵
- Executes dropped EXE
PID:1968 -
\??\c:\tbthnb.exec:\tbthnb.exe65⤵
- Executes dropped EXE
PID:2476 -
\??\c:\nhtbnt.exec:\nhtbnt.exe66⤵PID:1756
-
\??\c:\vvjvp.exec:\vvjvp.exe67⤵PID:1744
-
\??\c:\vvdjj.exec:\vvdjj.exe68⤵PID:2772
-
\??\c:\5fxxrfr.exec:\5fxxrfr.exe69⤵PID:280
-
\??\c:\nhhbnn.exec:\nhhbnn.exe70⤵PID:2696
-
\??\c:\tnnttb.exec:\tnnttb.exe71⤵PID:1600
-
\??\c:\nhttbt.exec:\nhttbt.exe72⤵PID:1988
-
\??\c:\7dpdj.exec:\7dpdj.exe73⤵PID:2988
-
\??\c:\vjdjj.exec:\vjdjj.exe74⤵PID:640
-
\??\c:\frlrrxx.exec:\frlrrxx.exe75⤵PID:2608
-
\??\c:\9rrrxlf.exec:\9rrrxlf.exe76⤵PID:2584
-
\??\c:\tnbhht.exec:\tnbhht.exe77⤵PID:2596
-
\??\c:\nnbtbb.exec:\nnbtbb.exe78⤵PID:2624
-
\??\c:\1pvdd.exec:\1pvdd.exe79⤵PID:2436
-
\??\c:\3vpjj.exec:\3vpjj.exe80⤵PID:2320
-
\??\c:\3rlxlrf.exec:\3rlxlrf.exe81⤵PID:1300
-
\??\c:\ffxfllx.exec:\ffxfllx.exe82⤵PID:2804
-
\??\c:\rlflxfl.exec:\rlflxfl.exe83⤵PID:1100
-
\??\c:\hbnttt.exec:\hbnttt.exe84⤵PID:1488
-
\??\c:\btbtbh.exec:\btbtbh.exe85⤵PID:2832
-
\??\c:\ppdpd.exec:\ppdpd.exe86⤵PID:1144
-
\??\c:\1pdvd.exec:\1pdvd.exe87⤵PID:1032
-
\??\c:\1rrxflr.exec:\1rrxflr.exe88⤵PID:1048
-
\??\c:\lfrxlrf.exec:\lfrxlrf.exe89⤵PID:1308
-
\??\c:\hhthnh.exec:\hhthnh.exe90⤵PID:1800
-
\??\c:\bnnnhh.exec:\bnnnhh.exe91⤵PID:2156
-
\??\c:\vjppv.exec:\vjppv.exe92⤵PID:1516
-
\??\c:\1dvvd.exec:\1dvvd.exe93⤵PID:1288
-
\??\c:\rllrxxf.exec:\rllrxxf.exe94⤵PID:2260
-
\??\c:\lfrxflr.exec:\lfrxflr.exe95⤵PID:408
-
\??\c:\rrlrxfl.exec:\rrlrxfl.exe96⤵PID:2084
-
\??\c:\nnbbhn.exec:\nnbbhn.exe97⤵PID:1636
-
\??\c:\3bthnn.exec:\3bthnn.exe98⤵PID:1872
-
\??\c:\dvjpp.exec:\dvjpp.exe99⤵PID:3008
-
\??\c:\3vpvj.exec:\3vpvj.exe100⤵PID:1008
-
\??\c:\9frrrlx.exec:\9frrrlx.exe101⤵PID:2532
-
\??\c:\ffxrxfr.exec:\ffxrxfr.exe102⤵PID:844
-
\??\c:\tnbhnt.exec:\tnbhnt.exe103⤵PID:1640
-
\??\c:\1hbtbb.exec:\1hbtbb.exe104⤵PID:1956
-
\??\c:\vjvvv.exec:\vjvvv.exe105⤵PID:1680
-
\??\c:\vpvvd.exec:\vpvvd.exe106⤵PID:2480
-
\??\c:\7rrfxrl.exec:\7rrfxrl.exe107⤵PID:2764
-
\??\c:\xxlflrf.exec:\xxlflrf.exe108⤵PID:2676
-
\??\c:\htbbnh.exec:\htbbnh.exe109⤵PID:2976
-
\??\c:\nhnthh.exec:\nhnthh.exe110⤵PID:2720
-
\??\c:\vjvvd.exec:\vjvvd.exe111⤵PID:2572
-
\??\c:\dpdpv.exec:\dpdpv.exe112⤵PID:1196
-
\??\c:\ffffxxf.exec:\ffffxxf.exe113⤵PID:2620
-
\??\c:\3hbhnb.exec:\3hbhnb.exe114⤵PID:2908
-
\??\c:\nhtbbh.exec:\nhtbbh.exe115⤵PID:2740
-
\??\c:\3jdpv.exec:\3jdpv.exe116⤵PID:2640
-
\??\c:\jdvdp.exec:\jdvdp.exe117⤵PID:2828
-
\??\c:\rlfrrxf.exec:\rlfrrxf.exe118⤵PID:2436
-
\??\c:\fxrlxlr.exec:\fxrlxlr.exe119⤵PID:2400
-
\??\c:\tnnhbh.exec:\tnnhbh.exe120⤵PID:2404
-
\??\c:\hnhnht.exec:\hnhnht.exe121⤵PID:704
-
\??\c:\jjvdv.exec:\jjvdv.exe122⤵PID:1100
-
\??\c:\pjvjp.exec:\pjvjp.exe123⤵PID:2956
-
\??\c:\xlxfrrf.exec:\xlxfrrf.exe124⤵PID:2800
-
\??\c:\lrrlxxl.exec:\lrrlxxl.exe125⤵PID:2808
-
\??\c:\1hbbth.exec:\1hbbth.exe126⤵PID:2816
-
\??\c:\vjddj.exec:\vjddj.exe127⤵PID:1400
-
\??\c:\ddpdd.exec:\ddpdd.exe128⤵PID:2444
-
\??\c:\5jvvv.exec:\5jvvv.exe129⤵PID:2344
-
\??\c:\5rlxfrx.exec:\5rlxfrx.exe130⤵PID:1684
-
\??\c:\rlfrxfl.exec:\rlfrxfl.exe131⤵PID:2116
-
\??\c:\ttntht.exec:\ttntht.exe132⤵PID:1104
-
\??\c:\1nhbbt.exec:\1nhbbt.exe133⤵PID:2256
-
\??\c:\dvjjp.exec:\dvjjp.exe134⤵PID:3056
-
\??\c:\ffxrxxl.exec:\ffxrxxl.exe135⤵PID:920
-
\??\c:\lflfrxl.exec:\lflfrxl.exe136⤵PID:928
-
\??\c:\hhtthh.exec:\hhtthh.exe137⤵
- System Location Discovery: System Language Discovery
PID:2448 -
\??\c:\9bnnbh.exec:\9bnnbh.exe138⤵PID:2396
-
\??\c:\7vdjj.exec:\7vdjj.exe139⤵PID:2092
-
\??\c:\7djpp.exec:\7djpp.exe140⤵PID:2100
-
\??\c:\fxlrrxl.exec:\fxlrrxl.exe141⤵PID:1968
-
\??\c:\rfllrlr.exec:\rfllrlr.exe142⤵PID:2476
-
\??\c:\tntbhb.exec:\tntbhb.exe143⤵PID:1756
-
\??\c:\hhbbnn.exec:\hhbbnn.exe144⤵PID:852
-
\??\c:\hbhhnb.exec:\hbhhnb.exe145⤵PID:892
-
\??\c:\7pppd.exec:\7pppd.exe146⤵PID:1428
-
\??\c:\lxrrxrx.exec:\lxrrxrx.exe147⤵PID:2708
-
\??\c:\1nbnnh.exec:\1nbnnh.exe148⤵PID:2780
-
\??\c:\bntntt.exec:\bntntt.exe149⤵PID:2864
-
\??\c:\jvdpp.exec:\jvdpp.exe150⤵PID:2988
-
\??\c:\jvdvd.exec:\jvdvd.exe151⤵PID:2560
-
\??\c:\rlxxflx.exec:\rlxxflx.exe152⤵PID:2580
-
\??\c:\3lffxff.exec:\3lffxff.exe153⤵PID:2360
-
\??\c:\1nnhhh.exec:\1nnhhh.exe154⤵PID:1532
-
\??\c:\thttnn.exec:\thttnn.exe155⤵PID:1736
-
\??\c:\jdjvd.exec:\jdjvd.exe156⤵PID:2664
-
\??\c:\pdvdd.exec:\pdvdd.exe157⤵PID:1552
-
\??\c:\1lxxxxx.exec:\1lxxxxx.exe158⤵PID:1020
-
\??\c:\nntbtt.exec:\nntbtt.exe159⤵PID:2196
-
\??\c:\tnbbtb.exec:\tnbbtb.exe160⤵PID:2804
-
\??\c:\ppdvd.exec:\ppdvd.exe161⤵PID:2836
-
\??\c:\jdjpv.exec:\jdjpv.exe162⤵PID:2628
-
\??\c:\fxrrrrx.exec:\fxrrrrx.exe163⤵PID:2552
-
\??\c:\rflfflr.exec:\rflfflr.exe164⤵PID:328
-
\??\c:\bthbnn.exec:\bthbnn.exe165⤵PID:2348
-
\??\c:\tnbbbb.exec:\tnbbbb.exe166⤵PID:1628
-
\??\c:\vvvvj.exec:\vvvvj.exe167⤵PID:1192
-
\??\c:\jdjdv.exec:\jdjdv.exe168⤵PID:2188
-
\??\c:\xlfflrx.exec:\xlfflrx.exe169⤵PID:2984
-
\??\c:\lfrrrxx.exec:\lfrrrxx.exe170⤵PID:2112
-
\??\c:\btnnhb.exec:\btnnhb.exe171⤵PID:3036
-
\??\c:\dpppv.exec:\dpppv.exe172⤵PID:3064
-
\??\c:\jvdjd.exec:\jvdjd.exe173⤵PID:3012
-
\??\c:\rfrrrlr.exec:\rfrrrlr.exe174⤵PID:2944
-
\??\c:\xrffllr.exec:\xrffllr.exe175⤵PID:2072
-
\??\c:\hthnnt.exec:\hthnnt.exe176⤵PID:2200
-
\??\c:\hbntnh.exec:\hbntnh.exe177⤵PID:1964
-
\??\c:\jvjpp.exec:\jvjpp.exe178⤵PID:1716
-
\??\c:\1jdjp.exec:\1jdjp.exe179⤵PID:992
-
\??\c:\1xxllrf.exec:\1xxllrf.exe180⤵PID:2512
-
\??\c:\rlfrrrx.exec:\rlfrrrx.exe181⤵PID:2888
-
\??\c:\7hhbbb.exec:\7hhbbb.exe182⤵PID:900
-
\??\c:\ppjpd.exec:\ppjpd.exe183⤵PID:2704
-
\??\c:\9jvjj.exec:\9jvjj.exe184⤵PID:2772
-
\??\c:\xrxrxrx.exec:\xrxrxrx.exe185⤵PID:2700
-
\??\c:\xxllflx.exec:\xxllflx.exe186⤵PID:2856
-
\??\c:\3bbhnn.exec:\3bbhnn.exe187⤵PID:2760
-
\??\c:\1nhhhh.exec:\1nhhhh.exe188⤵PID:2880
-
\??\c:\hbnbbn.exec:\hbnbbn.exe189⤵PID:2668
-
\??\c:\dpddd.exec:\dpddd.exe190⤵PID:2924
-
\??\c:\pjdjp.exec:\pjdjp.exe191⤵PID:1336
-
\??\c:\lflflrr.exec:\lflflrr.exe192⤵PID:2812
-
\??\c:\lllfxrf.exec:\lllfxrf.exe193⤵PID:1936
-
\??\c:\thttnh.exec:\thttnh.exe194⤵PID:2408
-
\??\c:\tntbhn.exec:\tntbhn.exe195⤵PID:1692
-
\??\c:\vvjvd.exec:\vvjvd.exe196⤵PID:1748
-
\??\c:\btbhnt.exec:\btbhnt.exe197⤵PID:1520
-
\??\c:\btnnhh.exec:\btnnhh.exe198⤵PID:2196
-
\??\c:\7jpvv.exec:\7jpvv.exe199⤵PID:1100
-
\??\c:\pjvdj.exec:\pjvdj.exe200⤵PID:2836
-
\??\c:\ffxrxfl.exec:\ffxrxfl.exe201⤵PID:2840
-
\??\c:\fxlrxxr.exec:\fxlrxxr.exe202⤵PID:2552
-
\??\c:\9tnntn.exec:\9tnntn.exe203⤵PID:1032
-
\??\c:\nbnhnn.exec:\nbnhnn.exe204⤵PID:2348
-
\??\c:\dvppv.exec:\dvppv.exe205⤵PID:1800
-
\??\c:\dvjjv.exec:\dvjjv.exe206⤵PID:2160
-
\??\c:\fxfllrx.exec:\fxfllrx.exe207⤵PID:2148
-
\??\c:\xxrllrf.exec:\xxrllrf.exe208⤵PID:2984
-
\??\c:\5htbhn.exec:\5htbhn.exe209⤵PID:444
-
\??\c:\ttntht.exec:\ttntht.exe210⤵PID:2960
-
\??\c:\dvddj.exec:\dvddj.exe211⤵PID:3016
-
\??\c:\pjdvd.exec:\pjdvd.exe212⤵PID:3012
-
\??\c:\ffrrflx.exec:\ffrrflx.exe213⤵PID:1120
-
\??\c:\frxxflr.exec:\frxxflr.exe214⤵PID:1096
-
\??\c:\nbhbnt.exec:\nbhbnt.exe215⤵PID:2152
-
\??\c:\tnhbht.exec:\tnhbht.exe216⤵PID:1160
-
\??\c:\ppdpv.exec:\ppdpv.exe217⤵PID:2092
-
\??\c:\dvjjp.exec:\dvjjp.exe218⤵PID:1948
-
\??\c:\9lflllr.exec:\9lflllr.exe219⤵PID:2284
-
\??\c:\rrflrrl.exec:\rrflrrl.exe220⤵PID:2888
-
\??\c:\5nhttn.exec:\5nhttn.exe221⤵PID:2692
-
\??\c:\btbbhn.exec:\btbbhn.exe222⤵PID:2704
-
\??\c:\vdvdj.exec:\vdvdj.exe223⤵PID:2768
-
\??\c:\dvppv.exec:\dvppv.exe224⤵PID:2696
-
\??\c:\1ddjp.exec:\1ddjp.exe225⤵PID:2796
-
\??\c:\fflfffl.exec:\fflfffl.exe226⤵PID:2760
-
\??\c:\rxflxfx.exec:\rxflxfx.exe227⤵PID:2864
-
\??\c:\bthnbb.exec:\bthnbb.exe228⤵PID:2668
-
\??\c:\bthnnt.exec:\bthnnt.exe229⤵PID:2560
-
\??\c:\9dvvv.exec:\9dvvv.exe230⤵PID:2276
-
\??\c:\9rfxxxx.exec:\9rfxxxx.exe231⤵PID:2596
-
\??\c:\xlxfrrx.exec:\xlxfrrx.exe232⤵PID:2140
-
\??\c:\nbhhnn.exec:\nbhhnn.exe233⤵PID:1736
-
\??\c:\bnhhhn.exec:\bnhhhn.exe234⤵PID:1692
-
\??\c:\7vddp.exec:\7vddp.exe235⤵PID:1552
-
\??\c:\1pjpd.exec:\1pjpd.exe236⤵PID:1248
-
\??\c:\xrrrrrl.exec:\xrrrrrl.exe237⤵PID:996
-
\??\c:\fxlrrxf.exec:\fxlrrxf.exe238⤵PID:2824
-
\??\c:\3hbhnt.exec:\3hbhnt.exe239⤵PID:2264
-
\??\c:\tnnntt.exec:\tnnntt.exe240⤵PID:2840
-
\??\c:\pvpvd.exec:\pvpvd.exe241⤵PID:2552
-
\??\c:\fflfrrr.exec:\fflfrrr.exe242⤵PID:600