Analysis
-
max time kernel
117s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 09:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b7d457ac6ce2011890e59f8e4adfa8f0N.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
120 seconds
General
-
Target
b7d457ac6ce2011890e59f8e4adfa8f0N.exe
-
Size
93KB
-
MD5
b7d457ac6ce2011890e59f8e4adfa8f0
-
SHA1
237d80849ae36d0fac03ea2df64e908d80de02ae
-
SHA256
9334c039f0d96ea2a57910598669eb6e4d6a24d7240a55c18b54405ddc281b95
-
SHA512
fbc1bc3f75b325450d2128d6b473bcd5c7b0d1b579f6fac1e0c0c79f580bc2cc28e82b41b320c7fd587ac4a5fbb9aa1651dde685aa0b75973c1248f4a49614dc
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo7xCkTsIRwnohZkmr:ymb3NkkiQ3mdBjFo7LAIRUohlr
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/1572-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1192-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5056-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4548-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3060-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3888-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1176-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3864-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4776-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2260-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3952-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2472-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2784-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3620-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1604-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4132-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
nbhtnn.exeddjdv.exexxrlfxr.exetbhthn.exenbhbbn.exerrfxxxx.exe7tnhbt.exeddvvj.exellrffrl.exebttnbt.exevjjdv.exevjpdv.exe9flfrrx.exetntnnh.exenhbttt.exevpjdv.exe1lrlllf.exe1xrrlll.exehbbttt.exeddjjd.exe5xxrlll.exerlfrlll.exebntnnn.exevpppv.exefrrrlrf.exelffxxxr.exetnnnhb.exejdjvv.exepppjj.exetbhbnn.exevppjj.exe5djdd.exerrrlfff.exe9nbnht.exedjdvp.exedddvp.exerffrfrf.exefrxffff.exe5hhbtt.exevppjv.exe9vvjd.exerlllxxr.exefrxxrrl.exetnttnh.exevdddv.exevpvjd.exeflxrlrl.exehtbttn.exenhhtnh.exe3dddv.exejdvvj.exe5rrrlll.exehbbbbb.exehtnhbb.exe3vdvp.exe1pvdp.exefxxrllx.exe9flfxxl.exebtnnhh.exenttnbh.exejddpp.exepdvdp.exelrxlfff.exexfxlffx.exepid process 1192 nbhtnn.exe 4704 ddjdv.exe 4548 xxrlfxr.exe 5056 tbhthn.exe 1768 nbhbbn.exe 2568 rrfxxxx.exe 3060 7tnhbt.exe 1804 ddvvj.exe 3888 llrffrl.exe 4364 bttnbt.exe 2484 vjjdv.exe 1176 vjpdv.exe 3656 9flfrrx.exe 416 tntnnh.exe 3864 nhbttt.exe 2004 vpjdv.exe 4036 1lrlllf.exe 4860 1xrrlll.exe 4776 hbbttt.exe 2260 ddjjd.exe 3952 5xxrlll.exe 4352 rlfrlll.exe 2472 bntnnn.exe 1448 vpppv.exe 2784 frrrlrf.exe 3620 lffxxxr.exe 1604 tnnnhb.exe 1816 jdjvv.exe 1400 pppjj.exe 2156 tbhbnn.exe 4132 vppjj.exe 1728 5djdd.exe 3644 rrrlfff.exe 4676 9nbnht.exe 4600 djdvp.exe 2960 dddvp.exe 3876 rffrfrf.exe 2040 frxffff.exe 2428 5hhbtt.exe 4972 vppjv.exe 4644 9vvjd.exe 3964 rlllxxr.exe 3564 frxxrrl.exe 3028 tnttnh.exe 2220 vdddv.exe 2588 vpvjd.exe 3384 flxrlrl.exe 3632 htbttn.exe 2496 nhhtnh.exe 2132 3dddv.exe 4848 jdvvj.exe 5100 5rrrlll.exe 4560 hbbbbb.exe 4364 htnhbb.exe 4696 3vdvp.exe 3792 1pvdp.exe 2264 fxxrllx.exe 3624 9flfxxl.exe 2916 btnnhh.exe 3040 nttnbh.exe 2164 jddpp.exe 3188 pdvdp.exe 828 lrxlfff.exe 916 xfxlffx.exe -
Processes:
resource yara_rule behavioral2/memory/1572-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2568-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2568-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2568-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3060-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3888-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3864-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4776-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2260-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3952-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2472-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2784-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3620-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1604-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4132-207-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5bhbhh.exehhhbbb.exefxrrrrf.exe5rfxffl.exehhbbtn.exenhbhbn.exeppjjp.exellflffl.exe7vdvp.exeddjjv.exehbtbbb.exexxrxllf.exebtttnt.exerrxxrrl.exe9bhbbb.exelxrrffx.exevppjd.exeflxrrrr.exexfrxrxx.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rfxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llflffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrxrxx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b7d457ac6ce2011890e59f8e4adfa8f0N.exenbhtnn.exeddjdv.exexxrlfxr.exetbhthn.exenbhbbn.exerrfxxxx.exe7tnhbt.exeddvvj.exellrffrl.exebttnbt.exevjjdv.exevjpdv.exe9flfrrx.exetntnnh.exenhbttt.exevpjdv.exe1lrlllf.exe1xrrlll.exehbbttt.exeddjjd.exe5xxrlll.exedescription pid process target process PID 1572 wrote to memory of 1192 1572 b7d457ac6ce2011890e59f8e4adfa8f0N.exe nbhtnn.exe PID 1572 wrote to memory of 1192 1572 b7d457ac6ce2011890e59f8e4adfa8f0N.exe nbhtnn.exe PID 1572 wrote to memory of 1192 1572 b7d457ac6ce2011890e59f8e4adfa8f0N.exe nbhtnn.exe PID 1192 wrote to memory of 4704 1192 nbhtnn.exe ddjdv.exe PID 1192 wrote to memory of 4704 1192 nbhtnn.exe ddjdv.exe PID 1192 wrote to memory of 4704 1192 nbhtnn.exe ddjdv.exe PID 4704 wrote to memory of 4548 4704 ddjdv.exe xxrlfxr.exe PID 4704 wrote to memory of 4548 4704 ddjdv.exe xxrlfxr.exe PID 4704 wrote to memory of 4548 4704 ddjdv.exe xxrlfxr.exe PID 4548 wrote to memory of 5056 4548 xxrlfxr.exe tbhthn.exe PID 4548 wrote to memory of 5056 4548 xxrlfxr.exe tbhthn.exe PID 4548 wrote to memory of 5056 4548 xxrlfxr.exe tbhthn.exe PID 5056 wrote to memory of 1768 5056 tbhthn.exe nbhbbn.exe PID 5056 wrote to memory of 1768 5056 tbhthn.exe nbhbbn.exe PID 5056 wrote to memory of 1768 5056 tbhthn.exe nbhbbn.exe PID 1768 wrote to memory of 2568 1768 nbhbbn.exe rrfxxxx.exe PID 1768 wrote to memory of 2568 1768 nbhbbn.exe rrfxxxx.exe PID 1768 wrote to memory of 2568 1768 nbhbbn.exe rrfxxxx.exe PID 2568 wrote to memory of 3060 2568 rrfxxxx.exe 7tnhbt.exe PID 2568 wrote to memory of 3060 2568 rrfxxxx.exe 7tnhbt.exe PID 2568 wrote to memory of 3060 2568 rrfxxxx.exe 7tnhbt.exe PID 3060 wrote to memory of 1804 3060 7tnhbt.exe ddvvj.exe PID 3060 wrote to memory of 1804 3060 7tnhbt.exe ddvvj.exe PID 3060 wrote to memory of 1804 3060 7tnhbt.exe ddvvj.exe PID 1804 wrote to memory of 3888 1804 ddvvj.exe llrffrl.exe PID 1804 wrote to memory of 3888 1804 ddvvj.exe llrffrl.exe PID 1804 wrote to memory of 3888 1804 ddvvj.exe llrffrl.exe PID 3888 wrote to memory of 4364 3888 llrffrl.exe bttnbt.exe PID 3888 wrote to memory of 4364 3888 llrffrl.exe bttnbt.exe PID 3888 wrote to memory of 4364 3888 llrffrl.exe bttnbt.exe PID 4364 wrote to memory of 2484 4364 bttnbt.exe vjjdv.exe PID 4364 wrote to memory of 2484 4364 bttnbt.exe vjjdv.exe PID 4364 wrote to memory of 2484 4364 bttnbt.exe vjjdv.exe PID 2484 wrote to memory of 1176 2484 vjjdv.exe vjpdv.exe PID 2484 wrote to memory of 1176 2484 vjjdv.exe vjpdv.exe PID 2484 wrote to memory of 1176 2484 vjjdv.exe vjpdv.exe PID 1176 wrote to memory of 3656 1176 vjpdv.exe 9flfrrx.exe PID 1176 wrote to memory of 3656 1176 vjpdv.exe 9flfrrx.exe PID 1176 wrote to memory of 3656 1176 vjpdv.exe 9flfrrx.exe PID 3656 wrote to memory of 416 3656 9flfrrx.exe tntnnh.exe PID 3656 wrote to memory of 416 3656 9flfrrx.exe tntnnh.exe PID 3656 wrote to memory of 416 3656 9flfrrx.exe tntnnh.exe PID 416 wrote to memory of 3864 416 tntnnh.exe nhbttt.exe PID 416 wrote to memory of 3864 416 tntnnh.exe nhbttt.exe PID 416 wrote to memory of 3864 416 tntnnh.exe nhbttt.exe PID 3864 wrote to memory of 2004 3864 nhbttt.exe vpjdv.exe PID 3864 wrote to memory of 2004 3864 nhbttt.exe vpjdv.exe PID 3864 wrote to memory of 2004 3864 nhbttt.exe vpjdv.exe PID 2004 wrote to memory of 4036 2004 vpjdv.exe 1lrlllf.exe PID 2004 wrote to memory of 4036 2004 vpjdv.exe 1lrlllf.exe PID 2004 wrote to memory of 4036 2004 vpjdv.exe 1lrlllf.exe PID 4036 wrote to memory of 4860 4036 1lrlllf.exe 1xrrlll.exe PID 4036 wrote to memory of 4860 4036 1lrlllf.exe 1xrrlll.exe PID 4036 wrote to memory of 4860 4036 1lrlllf.exe 1xrrlll.exe PID 4860 wrote to memory of 4776 4860 1xrrlll.exe hbbttt.exe PID 4860 wrote to memory of 4776 4860 1xrrlll.exe hbbttt.exe PID 4860 wrote to memory of 4776 4860 1xrrlll.exe hbbttt.exe PID 4776 wrote to memory of 2260 4776 hbbttt.exe ddjjd.exe PID 4776 wrote to memory of 2260 4776 hbbttt.exe ddjjd.exe PID 4776 wrote to memory of 2260 4776 hbbttt.exe ddjjd.exe PID 2260 wrote to memory of 3952 2260 ddjjd.exe 5xxrlll.exe PID 2260 wrote to memory of 3952 2260 ddjjd.exe 5xxrlll.exe PID 2260 wrote to memory of 3952 2260 ddjjd.exe 5xxrlll.exe PID 3952 wrote to memory of 4352 3952 5xxrlll.exe rlfrlll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d457ac6ce2011890e59f8e4adfa8f0N.exe"C:\Users\Admin\AppData\Local\Temp\b7d457ac6ce2011890e59f8e4adfa8f0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\nbhtnn.exec:\nbhtnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\ddjdv.exec:\ddjdv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\xxrlfxr.exec:\xxrlfxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\tbhthn.exec:\tbhthn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\nbhbbn.exec:\nbhbbn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\rrfxxxx.exec:\rrfxxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\7tnhbt.exec:\7tnhbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\ddvvj.exec:\ddvvj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\llrffrl.exec:\llrffrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
\??\c:\bttnbt.exec:\bttnbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\vjjdv.exec:\vjjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\vjpdv.exec:\vjpdv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\9flfrrx.exec:\9flfrrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
\??\c:\tntnnh.exec:\tntnnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:416 -
\??\c:\nhbttt.exec:\nhbttt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\vpjdv.exec:\vpjdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\1lrlllf.exec:\1lrlllf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
\??\c:\1xrrlll.exec:\1xrrlll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\hbbttt.exec:\hbbttt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
\??\c:\ddjjd.exec:\ddjjd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\5xxrlll.exec:\5xxrlll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
\??\c:\rlfrlll.exec:\rlfrlll.exe23⤵
- Executes dropped EXE
PID:4352 -
\??\c:\bntnnn.exec:\bntnnn.exe24⤵
- Executes dropped EXE
PID:2472 -
\??\c:\vpppv.exec:\vpppv.exe25⤵
- Executes dropped EXE
PID:1448 -
\??\c:\frrrlrf.exec:\frrrlrf.exe26⤵
- Executes dropped EXE
PID:2784 -
\??\c:\lffxxxr.exec:\lffxxxr.exe27⤵
- Executes dropped EXE
PID:3620 -
\??\c:\tnnnhb.exec:\tnnnhb.exe28⤵
- Executes dropped EXE
PID:1604 -
\??\c:\jdjvv.exec:\jdjvv.exe29⤵
- Executes dropped EXE
PID:1816 -
\??\c:\pppjj.exec:\pppjj.exe30⤵
- Executes dropped EXE
PID:1400 -
\??\c:\tbhbnn.exec:\tbhbnn.exe31⤵
- Executes dropped EXE
PID:2156 -
\??\c:\vppjj.exec:\vppjj.exe32⤵
- Executes dropped EXE
PID:4132 -
\??\c:\5djdd.exec:\5djdd.exe33⤵
- Executes dropped EXE
PID:1728 -
\??\c:\rrrlfff.exec:\rrrlfff.exe34⤵
- Executes dropped EXE
PID:3644 -
\??\c:\9nbnht.exec:\9nbnht.exe35⤵
- Executes dropped EXE
PID:4676 -
\??\c:\djdvp.exec:\djdvp.exe36⤵
- Executes dropped EXE
PID:4600 -
\??\c:\dddvp.exec:\dddvp.exe37⤵
- Executes dropped EXE
PID:2960 -
\??\c:\rffrfrf.exec:\rffrfrf.exe38⤵
- Executes dropped EXE
PID:3876 -
\??\c:\frxffff.exec:\frxffff.exe39⤵
- Executes dropped EXE
PID:2040 -
\??\c:\5hhbtt.exec:\5hhbtt.exe40⤵
- Executes dropped EXE
PID:2428 -
\??\c:\vppjv.exec:\vppjv.exe41⤵
- Executes dropped EXE
PID:4972 -
\??\c:\9vvjd.exec:\9vvjd.exe42⤵
- Executes dropped EXE
PID:4644 -
\??\c:\rlllxxr.exec:\rlllxxr.exe43⤵
- Executes dropped EXE
PID:3964 -
\??\c:\frxxrrl.exec:\frxxrrl.exe44⤵
- Executes dropped EXE
PID:3564 -
\??\c:\tnttnh.exec:\tnttnh.exe45⤵
- Executes dropped EXE
PID:3028 -
\??\c:\vdddv.exec:\vdddv.exe46⤵
- Executes dropped EXE
PID:2220 -
\??\c:\vpvjd.exec:\vpvjd.exe47⤵
- Executes dropped EXE
PID:2588 -
\??\c:\flxrlrl.exec:\flxrlrl.exe48⤵
- Executes dropped EXE
PID:3384 -
\??\c:\htbttn.exec:\htbttn.exe49⤵
- Executes dropped EXE
PID:3632 -
\??\c:\nhhtnh.exec:\nhhtnh.exe50⤵
- Executes dropped EXE
PID:2496 -
\??\c:\3dddv.exec:\3dddv.exe51⤵
- Executes dropped EXE
PID:2132 -
\??\c:\jdvvj.exec:\jdvvj.exe52⤵
- Executes dropped EXE
PID:4848 -
\??\c:\5rrrlll.exec:\5rrrlll.exe53⤵
- Executes dropped EXE
PID:5100 -
\??\c:\hbbbbb.exec:\hbbbbb.exe54⤵
- Executes dropped EXE
PID:4560 -
\??\c:\htnhbb.exec:\htnhbb.exe55⤵
- Executes dropped EXE
PID:4364 -
\??\c:\3vdvp.exec:\3vdvp.exe56⤵
- Executes dropped EXE
PID:4696 -
\??\c:\1pvdp.exec:\1pvdp.exe57⤵
- Executes dropped EXE
PID:3792 -
\??\c:\fxxrllx.exec:\fxxrllx.exe58⤵
- Executes dropped EXE
PID:2264 -
\??\c:\9flfxxl.exec:\9flfxxl.exe59⤵
- Executes dropped EXE
PID:3624 -
\??\c:\btnnhh.exec:\btnnhh.exe60⤵
- Executes dropped EXE
PID:2916 -
\??\c:\nttnbh.exec:\nttnbh.exe61⤵
- Executes dropped EXE
PID:3040 -
\??\c:\jddpp.exec:\jddpp.exe62⤵
- Executes dropped EXE
PID:2164 -
\??\c:\pdvdp.exec:\pdvdp.exe63⤵
- Executes dropped EXE
PID:3188 -
\??\c:\lrxlfff.exec:\lrxlfff.exe64⤵
- Executes dropped EXE
PID:828 -
\??\c:\xfxlffx.exec:\xfxlffx.exe65⤵
- Executes dropped EXE
PID:916 -
\??\c:\ttnbth.exec:\ttnbth.exe66⤵PID:3680
-
\??\c:\nnntnn.exec:\nnntnn.exe67⤵PID:3960
-
\??\c:\1vdvv.exec:\1vdvv.exe68⤵PID:4144
-
\??\c:\ddjjv.exec:\ddjjv.exe69⤵PID:3484
-
\??\c:\3xrlxxr.exec:\3xrlxxr.exe70⤵PID:4100
-
\??\c:\rlrrlll.exec:\rlrrlll.exe71⤵PID:376
-
\??\c:\hbbtnn.exec:\hbbtnn.exe72⤵PID:2836
-
\??\c:\dpvvj.exec:\dpvvj.exe73⤵PID:1088
-
\??\c:\pdvjp.exec:\pdvjp.exe74⤵PID:5068
-
\??\c:\7llfrlf.exec:\7llfrlf.exe75⤵PID:3436
-
\??\c:\7lfxrrr.exec:\7lfxrrr.exe76⤵PID:1912
-
\??\c:\btbbtb.exec:\btbbtb.exe77⤵PID:1856
-
\??\c:\bnhbht.exec:\bnhbht.exe78⤵PID:2072
-
\??\c:\vjjjv.exec:\vjjjv.exe79⤵PID:4084
-
\??\c:\vppjd.exec:\vppjd.exe80⤵PID:452
-
\??\c:\xxrlxxr.exec:\xxrlxxr.exe81⤵PID:4936
-
\??\c:\bnnnhb.exec:\bnnnhb.exe82⤵PID:3588
-
\??\c:\7tbtnn.exec:\7tbtnn.exe83⤵PID:868
-
\??\c:\dpppd.exec:\dpppd.exe84⤵PID:4320
-
\??\c:\7djdd.exec:\7djdd.exe85⤵PID:1588
-
\??\c:\lxrlffx.exec:\lxrlffx.exe86⤵PID:3056
-
\??\c:\hthhhn.exec:\hthhhn.exe87⤵PID:1756
-
\??\c:\pvpjd.exec:\pvpjd.exe88⤵PID:4072
-
\??\c:\3vpjd.exec:\3vpjd.exe89⤵PID:412
-
\??\c:\5xrlxfx.exec:\5xrlxfx.exe90⤵PID:448
-
\??\c:\rfxrllf.exec:\rfxrllf.exe91⤵PID:3444
-
\??\c:\bhntnn.exec:\bhntnn.exe92⤵PID:1688
-
\??\c:\xxfxrlf.exec:\xxfxrlf.exe93⤵PID:1496
-
\??\c:\xfffxfx.exec:\xfffxfx.exe94⤵PID:2608
-
\??\c:\3hnhbb.exec:\3hnhbb.exe95⤵PID:4548
-
\??\c:\vvddp.exec:\vvddp.exe96⤵PID:3000
-
\??\c:\djppp.exec:\djppp.exe97⤵PID:728
-
\??\c:\fxllxlf.exec:\fxllxlf.exe98⤵PID:2064
-
\??\c:\bnntnh.exec:\bnntnh.exe99⤵PID:5036
-
\??\c:\dvdvv.exec:\dvdvv.exe100⤵PID:2844
-
\??\c:\lflfrrl.exec:\lflfrrl.exe101⤵PID:4848
-
\??\c:\lxxrxxf.exec:\lxxrxxf.exe102⤵PID:3888
-
\??\c:\nttnhb.exec:\nttnhb.exe103⤵PID:3480
-
\??\c:\ddppp.exec:\ddppp.exe104⤵PID:2896
-
\??\c:\vvvjd.exec:\vvvjd.exe105⤵PID:4200
-
\??\c:\lfrxrlf.exec:\lfrxrlf.exe106⤵PID:4928
-
\??\c:\1lfxrrl.exec:\1lfxrrl.exe107⤵PID:3256
-
\??\c:\bthhbh.exec:\bthhbh.exe108⤵PID:4516
-
\??\c:\nbhhbb.exec:\nbhhbb.exe109⤵PID:2920
-
\??\c:\pvdjp.exec:\pvdjp.exe110⤵PID:3048
-
\??\c:\pjdvp.exec:\pjdvp.exe111⤵PID:736
-
\??\c:\7ffxlfl.exec:\7ffxlfl.exe112⤵PID:3204
-
\??\c:\httnhh.exec:\httnhh.exe113⤵PID:4860
-
\??\c:\btbttt.exec:\btbttt.exe114⤵PID:3276
-
\??\c:\vvppd.exec:\vvppd.exe115⤵PID:3684
-
\??\c:\vddvj.exec:\vddvj.exe116⤵PID:4900
-
\??\c:\lxxrlff.exec:\lxxrlff.exe117⤵PID:1852
-
\??\c:\1llfxxr.exec:\1llfxxr.exe118⤵PID:1664
-
\??\c:\llxlxxx.exec:\llxlxxx.exe119⤵PID:4640
-
\??\c:\tbttnh.exec:\tbttnh.exe120⤵PID:372
-
\??\c:\7tbtnh.exec:\7tbtnh.exe121⤵PID:3844
-
\??\c:\9pvjv.exec:\9pvjv.exe122⤵PID:1312
-
\??\c:\jddvv.exec:\jddvv.exe123⤵PID:4412
-
\??\c:\lfffxxr.exec:\lfffxxr.exe124⤵PID:1816
-
\??\c:\fxfxrxr.exec:\fxfxrxr.exe125⤵PID:2912
-
\??\c:\bnbbbt.exec:\bnbbbt.exe126⤵PID:4324
-
\??\c:\nhbthh.exec:\nhbthh.exe127⤵PID:2728
-
\??\c:\pvdvp.exec:\pvdvp.exe128⤵PID:1728
-
\??\c:\xfxxlrr.exec:\xfxxlrr.exe129⤵PID:5064
-
\??\c:\5xxrllf.exec:\5xxrllf.exe130⤵PID:1324
-
\??\c:\tbtttt.exec:\tbtttt.exe131⤵PID:2528
-
\??\c:\vddvp.exec:\vddvp.exe132⤵PID:4320
-
\??\c:\lxlrrxx.exec:\lxlrrxx.exe133⤵PID:944
-
\??\c:\hntbtb.exec:\hntbtb.exe134⤵PID:3056
-
\??\c:\tnnnhn.exec:\tnnnhn.exe135⤵PID:2428
-
\??\c:\5ppjd.exec:\5ppjd.exe136⤵PID:2416
-
\??\c:\vvpjp.exec:\vvpjp.exe137⤵PID:540
-
\??\c:\rrrlxrx.exec:\rrrlxrx.exe138⤵PID:60
-
\??\c:\3ffrlff.exec:\3ffrlff.exe139⤵PID:1240
-
\??\c:\bbhbtt.exec:\bbhbtt.exe140⤵PID:4872
-
\??\c:\5nbhbb.exec:\5nbhbb.exe141⤵PID:544
-
\??\c:\vvdvv.exec:\vvdvv.exe142⤵PID:4660
-
\??\c:\vvpjj.exec:\vvpjj.exe143⤵PID:728
-
\??\c:\lxxxllf.exec:\lxxxllf.exe144⤵PID:2496
-
\??\c:\fflflfl.exec:\fflflfl.exe145⤵PID:1548
-
\??\c:\tntnhh.exec:\tntnhh.exe146⤵PID:4468
-
\??\c:\vdjjd.exec:\vdjjd.exe147⤵PID:3888
-
\??\c:\1djdv.exec:\1djdv.exe148⤵PID:1444
-
\??\c:\frrrfxf.exec:\frrrfxf.exe149⤵PID:4964
-
\??\c:\fflfxxr.exec:\fflfxxr.exe150⤵PID:4928
-
\??\c:\hhhbbb.exec:\hhhbbb.exe151⤵PID:556
-
\??\c:\vvvvp.exec:\vvvvp.exe152⤵PID:2004
-
\??\c:\dddjd.exec:\dddjd.exe153⤵PID:3048
-
\??\c:\xxrffff.exec:\xxrffff.exe154⤵PID:4856
-
\??\c:\xxrrllf.exec:\xxrrllf.exe155⤵PID:916
-
\??\c:\hhhbbb.exec:\hhhbbb.exe156⤵PID:2260
-
\??\c:\ppjjd.exec:\ppjjd.exe157⤵PID:904
-
\??\c:\dpvpj.exec:\dpvpj.exe158⤵PID:4900
-
\??\c:\xlxlrrx.exec:\xlxlrrx.exe159⤵PID:380
-
\??\c:\nnnttt.exec:\nnnttt.exe160⤵PID:4124
-
\??\c:\btttnt.exec:\btttnt.exe161⤵
- System Location Discovery: System Language Discovery
PID:2816 -
\??\c:\jjdvp.exec:\jjdvp.exe162⤵PID:1088
-
\??\c:\ppvpp.exec:\ppvpp.exe163⤵PID:4192
-
\??\c:\lxflxff.exec:\lxflxff.exe164⤵PID:3772
-
\??\c:\lffxrlf.exec:\lffxrlf.exe165⤵PID:1912
-
\??\c:\hbhbhh.exec:\hbhbhh.exe166⤵PID:2300
-
\??\c:\bhnbnn.exec:\bhnbnn.exe167⤵PID:2912
-
\??\c:\vppjd.exec:\vppjd.exe168⤵PID:960
-
\??\c:\lflfxxr.exec:\lflfxxr.exe169⤵PID:2120
-
\??\c:\httnhh.exec:\httnhh.exe170⤵PID:2976
-
\??\c:\1hnhhb.exec:\1hnhhb.exe171⤵PID:5064
-
\??\c:\vpvvd.exec:\vpvvd.exe172⤵PID:1324
-
\??\c:\lllfxxr.exec:\lllfxxr.exe173⤵PID:2528
-
\??\c:\rllrrxx.exec:\rllrrxx.exe174⤵PID:4320
-
\??\c:\1hnnth.exec:\1hnnth.exe175⤵PID:3876
-
\??\c:\pjppp.exec:\pjppp.exe176⤵PID:3056
-
\??\c:\1jpjv.exec:\1jpjv.exe177⤵PID:1192
-
\??\c:\rlffrfx.exec:\rlffrfx.exe178⤵PID:1256
-
\??\c:\nbhbtt.exec:\nbhbtt.exe179⤵PID:4992
-
\??\c:\ddjjj.exec:\ddjjj.exe180⤵PID:3940
-
\??\c:\lrxxxff.exec:\lrxxxff.exe181⤵PID:436
-
\??\c:\9hnnnn.exec:\9hnnnn.exe182⤵PID:3000
-
\??\c:\ddjjd.exec:\ddjjd.exe183⤵PID:3776
-
\??\c:\lxllxrl.exec:\lxllxrl.exe184⤵PID:32
-
\??\c:\nnntnh.exec:\nnntnh.exe185⤵PID:5036
-
\??\c:\7dppp.exec:\7dppp.exe186⤵PID:2844
-
\??\c:\xfllfff.exec:\xfllfff.exe187⤵PID:4560
-
\??\c:\ttbbhh.exec:\ttbbhh.exe188⤵PID:4180
-
\??\c:\vjpvp.exec:\vjpvp.exe189⤵PID:3656
-
\??\c:\fxfxrrf.exec:\fxfxrrf.exe190⤵PID:4876
-
\??\c:\nntttn.exec:\nntttn.exe191⤵PID:1528
-
\??\c:\nhnnbb.exec:\nhnnbb.exe192⤵PID:688
-
\??\c:\pjjdv.exec:\pjjdv.exe193⤵PID:2012
-
\??\c:\xxrlllf.exec:\xxrlllf.exe194⤵PID:3048
-
\??\c:\rfrfxxr.exec:\rfrfxxr.exe195⤵PID:1776
-
\??\c:\tnbbhh.exec:\tnbbhh.exe196⤵PID:3260
-
\??\c:\hnhbbb.exec:\hnhbbb.exe197⤵PID:3960
-
\??\c:\nhhbtt.exec:\nhhbtt.exe198⤵PID:3484
-
\??\c:\pdpjj.exec:\pdpjj.exe199⤵PID:4900
-
\??\c:\lfflfll.exec:\lfflfll.exe200⤵PID:3112
-
\??\c:\fxrlxxf.exec:\fxrlxxf.exe201⤵PID:4124
-
\??\c:\nbthnb.exec:\nbthnb.exe202⤵PID:1532
-
\??\c:\httnhh.exec:\httnhh.exe203⤵PID:1088
-
\??\c:\vpddd.exec:\vpddd.exe204⤵PID:3996
-
\??\c:\pjjjj.exec:\pjjjj.exe205⤵PID:3772
-
\??\c:\lflfxxx.exec:\lflfxxx.exe206⤵PID:1408
-
\??\c:\frllxxr.exec:\frllxxr.exe207⤵PID:4112
-
\??\c:\7hbbtt.exec:\7hbbtt.exe208⤵PID:2912
-
\??\c:\9nhbtn.exec:\9nhbtn.exe209⤵PID:2876
-
\??\c:\vjdpj.exec:\vjdpj.exe210⤵PID:3644
-
\??\c:\pppjd.exec:\pppjd.exe211⤵PID:3872
-
\??\c:\lxlfrrf.exec:\lxlfrrf.exe212⤵PID:5064
-
\??\c:\lxlfrrf.exec:\lxlfrrf.exe213⤵PID:1544
-
\??\c:\tbtnbn.exec:\tbtnbn.exe214⤵PID:4724
-
\??\c:\nnhtnn.exec:\nnhtnn.exe215⤵PID:3768
-
\??\c:\vpvvj.exec:\vpvvj.exe216⤵PID:1756
-
\??\c:\jvdvp.exec:\jvdvp.exe217⤵PID:1116
-
\??\c:\fflfffx.exec:\fflfffx.exe218⤵PID:5000
-
\??\c:\ffxlllf.exec:\ffxlllf.exe219⤵PID:4104
-
\??\c:\tbbtnh.exec:\tbbtnh.exe220⤵PID:60
-
\??\c:\9nnhbb.exec:\9nnhbb.exe221⤵PID:2880
-
\??\c:\jddjd.exec:\jddjd.exe222⤵PID:4872
-
\??\c:\lflffff.exec:\lflffff.exe223⤵PID:544
-
\??\c:\nbnnhb.exec:\nbnnhb.exe224⤵PID:3100
-
\??\c:\pddvj.exec:\pddvj.exe225⤵PID:4580
-
\??\c:\ddvpj.exec:\ddvpj.exe226⤵PID:2868
-
\??\c:\xrlfrxr.exec:\xrlfrxr.exe227⤵PID:3380
-
\??\c:\lffxrrl.exec:\lffxrrl.exe228⤵PID:3480
-
\??\c:\hhbbbb.exec:\hhbbbb.exe229⤵PID:2180
-
\??\c:\vpjvp.exec:\vpjvp.exe230⤵PID:4796
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe231⤵PID:364
-
\??\c:\xxrxfff.exec:\xxrxfff.exe232⤵PID:1772
-
\??\c:\5nnnnn.exec:\5nnnnn.exe233⤵PID:2692
-
\??\c:\hbbthh.exec:\hbbthh.exe234⤵PID:4004
-
\??\c:\vpjjd.exec:\vpjjd.exe235⤵PID:4496
-
\??\c:\lllffxx.exec:\lllffxx.exe236⤵PID:3532
-
\??\c:\3bnnnt.exec:\3bnnnt.exe237⤵PID:1272
-
\??\c:\5hnhtt.exec:\5hnhtt.exe238⤵PID:2260
-
\??\c:\pjpjd.exec:\pjpjd.exe239⤵PID:2472
-
\??\c:\llrlfff.exec:\llrlfff.exe240⤵PID:3500
-
\??\c:\bttnhh.exec:\bttnhh.exe241⤵PID:2836
-
\??\c:\bhtttt.exec:\bhtttt.exe242⤵PID:3972