Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e16fb3a3742dd1c0249e29e97970a20N.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
120 seconds
General
-
Target
3e16fb3a3742dd1c0249e29e97970a20N.exe
-
Size
63KB
-
MD5
3e16fb3a3742dd1c0249e29e97970a20
-
SHA1
be14a84027c02981fd69b0e8d443ef1c0745e431
-
SHA256
eccff248f1384eabaaccc58bcb8096c55dcc997944df6e278c38d52c262162c2
-
SHA512
03446ef885a2b57d8798b12b8acd78c28c2663dff4cf9a2c3717a9fcc942522d2e848a379f1a25270072d90e0d0ea1fc71d3199c8bd96923491fd792f4ef5e69
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDII9ZvHKEZ:ymb3NkkiQ3mdBjFII9ZvHKEZ
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/600-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2988-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2988-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2916-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2916-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3032-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-72-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2676-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-92-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1600-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2360-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2268-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1464-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1964-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-275-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1776-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1776-287-0x0000000076AE0000-0x0000000076BFF000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ntbttb.exedvpvj.exefxrfffr.exebbtbhn.exejvjjd.exerrfrxxr.exenntnbt.exe3dppv.exelxxxllr.exellrxffl.exe9bhbbt.exepdjjd.exexflrxrf.exexfrlfxl.exe5hbhtt.exebnhnbb.exepvvpd.exe1ffffxf.exelxxrxxl.exebthnnn.exedvdjv.exevdvvd.exefxfrxxr.exetnbhnb.exebnnhtn.exepvvpd.exevdpdj.exeflrlrfr.exe7jdpj.exellrxfxl.exebthhth.exe9xfffrf.exetthhth.exejddvp.exerlffxfx.exebhhbbt.exebbntbn.exe3xlrffr.exerxxrxrx.exenbhhhb.exevvjjp.exelrfffxx.exexfxrlll.exentbtbn.exe3jvvd.exedvjjj.exerfrfxxr.exetbbhtt.exetbbhhn.exevpdvj.exepjvdp.exe1rlfrxr.exehhhbbb.exebnbttn.exe1vvjv.exedddjd.exerllflrx.exexrrlfxl.exenhtbnb.exejjjvj.exe9vpvj.exe5llrffr.exetntthh.exehbnnth.exepid process 2988 ntbttb.exe 2448 dvpvj.exe 2916 fxrfffr.exe 2788 bbtbhn.exe 3032 jvjjd.exe 2828 rrfrxxr.exe 2676 nntnbt.exe 2408 3dppv.exe 1600 lxxxllr.exe 776 llrxffl.exe 2360 9bhbbt.exe 2848 pdjjd.exe 2732 xflrxrf.exe 3064 xfrlfxl.exe 332 5hbhtt.exe 2268 bnhnbb.exe 2872 pvvpd.exe 1688 1ffffxf.exe 2972 lxxrxxl.exe 2204 bthnnn.exe 2112 dvdjv.exe 1464 vdvvd.exe 924 fxfrxxr.exe 2620 tnbhnb.exe 1796 bnnhtn.exe 1964 pvvpd.exe 1660 vdpdj.exe 584 flrlrfr.exe 2220 7jdpj.exe 884 llrxfxl.exe 1776 bthhth.exe 2768 9xfffrf.exe 2812 tthhth.exe 2920 jddvp.exe 2148 rlffxfx.exe 2604 bhhbbt.exe 2688 bbntbn.exe 2800 3xlrffr.exe 2828 rxxrxrx.exe 2740 nbhhhb.exe 2684 vvjjp.exe 2680 lrfffxx.exe 1820 xfxrlll.exe 2108 ntbtbn.exe 876 3jvvd.exe 2368 dvjjj.exe 2472 rfrfxxr.exe 2864 tbbhtt.exe 3068 tbbhhn.exe 2856 vpdvj.exe 332 pjvdp.exe 2652 1rlfrxr.exe 1152 hhhbbb.exe 1764 bnbttn.exe 2236 1vvjv.exe 2468 dddjd.exe 2340 rllflrx.exe 380 xrrlfxl.exe 1472 nhtbnb.exe 1620 jjjvj.exe 1084 9vpvj.exe 2620 5llrffr.exe 1540 tntthh.exe 608 hbnnth.exe -
Processes:
resource yara_rule behavioral1/memory/600-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2988-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3032-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2360-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2268-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1464-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1964-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-275-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-286-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fxrllrr.exebbtbnb.exejpddp.exexflrxrf.exepvpdj.exehbtbbh.exetbhhtn.exevpjvp.exe1djdp.exehtnnhn.exerlxffrf.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1djdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxffrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3e16fb3a3742dd1c0249e29e97970a20N.exentbttb.exedvpvj.exefxrfffr.exebbtbhn.exejvjjd.exerrfrxxr.exenntnbt.exe3dppv.exelxxxllr.exellrxffl.exe9bhbbt.exepdjjd.exexflrxrf.exexfrlfxl.exe5hbhtt.exedescription pid process target process PID 600 wrote to memory of 2988 600 3e16fb3a3742dd1c0249e29e97970a20N.exe ntbttb.exe PID 600 wrote to memory of 2988 600 3e16fb3a3742dd1c0249e29e97970a20N.exe ntbttb.exe PID 600 wrote to memory of 2988 600 3e16fb3a3742dd1c0249e29e97970a20N.exe ntbttb.exe PID 600 wrote to memory of 2988 600 3e16fb3a3742dd1c0249e29e97970a20N.exe ntbttb.exe PID 2988 wrote to memory of 2448 2988 ntbttb.exe dvpvj.exe PID 2988 wrote to memory of 2448 2988 ntbttb.exe dvpvj.exe PID 2988 wrote to memory of 2448 2988 ntbttb.exe dvpvj.exe PID 2988 wrote to memory of 2448 2988 ntbttb.exe dvpvj.exe PID 2448 wrote to memory of 2916 2448 dvpvj.exe fxrfffr.exe PID 2448 wrote to memory of 2916 2448 dvpvj.exe fxrfffr.exe PID 2448 wrote to memory of 2916 2448 dvpvj.exe fxrfffr.exe PID 2448 wrote to memory of 2916 2448 dvpvj.exe fxrfffr.exe PID 2916 wrote to memory of 2788 2916 fxrfffr.exe bbtbhn.exe PID 2916 wrote to memory of 2788 2916 fxrfffr.exe bbtbhn.exe PID 2916 wrote to memory of 2788 2916 fxrfffr.exe bbtbhn.exe PID 2916 wrote to memory of 2788 2916 fxrfffr.exe bbtbhn.exe PID 2788 wrote to memory of 3032 2788 bbtbhn.exe jvjjd.exe PID 2788 wrote to memory of 3032 2788 bbtbhn.exe jvjjd.exe PID 2788 wrote to memory of 3032 2788 bbtbhn.exe jvjjd.exe PID 2788 wrote to memory of 3032 2788 bbtbhn.exe jvjjd.exe PID 3032 wrote to memory of 2828 3032 jvjjd.exe rrfrxxr.exe PID 3032 wrote to memory of 2828 3032 jvjjd.exe rrfrxxr.exe PID 3032 wrote to memory of 2828 3032 jvjjd.exe rrfrxxr.exe PID 3032 wrote to memory of 2828 3032 jvjjd.exe rrfrxxr.exe PID 2828 wrote to memory of 2676 2828 rrfrxxr.exe nntnbt.exe PID 2828 wrote to memory of 2676 2828 rrfrxxr.exe nntnbt.exe PID 2828 wrote to memory of 2676 2828 rrfrxxr.exe nntnbt.exe PID 2828 wrote to memory of 2676 2828 rrfrxxr.exe nntnbt.exe PID 2676 wrote to memory of 2408 2676 nntnbt.exe 3dppv.exe PID 2676 wrote to memory of 2408 2676 nntnbt.exe 3dppv.exe PID 2676 wrote to memory of 2408 2676 nntnbt.exe 3dppv.exe PID 2676 wrote to memory of 2408 2676 nntnbt.exe 3dppv.exe PID 2408 wrote to memory of 1600 2408 3dppv.exe lxxxllr.exe PID 2408 wrote to memory of 1600 2408 3dppv.exe lxxxllr.exe PID 2408 wrote to memory of 1600 2408 3dppv.exe lxxxllr.exe PID 2408 wrote to memory of 1600 2408 3dppv.exe lxxxllr.exe PID 1600 wrote to memory of 776 1600 lxxxllr.exe llrxffl.exe PID 1600 wrote to memory of 776 1600 lxxxllr.exe llrxffl.exe PID 1600 wrote to memory of 776 1600 lxxxllr.exe llrxffl.exe PID 1600 wrote to memory of 776 1600 lxxxllr.exe llrxffl.exe PID 776 wrote to memory of 2360 776 llrxffl.exe 9bhbbt.exe PID 776 wrote to memory of 2360 776 llrxffl.exe 9bhbbt.exe PID 776 wrote to memory of 2360 776 llrxffl.exe 9bhbbt.exe PID 776 wrote to memory of 2360 776 llrxffl.exe 9bhbbt.exe PID 2360 wrote to memory of 2848 2360 9bhbbt.exe pdjjd.exe PID 2360 wrote to memory of 2848 2360 9bhbbt.exe pdjjd.exe PID 2360 wrote to memory of 2848 2360 9bhbbt.exe pdjjd.exe PID 2360 wrote to memory of 2848 2360 9bhbbt.exe pdjjd.exe PID 2848 wrote to memory of 2732 2848 pdjjd.exe xflrxrf.exe PID 2848 wrote to memory of 2732 2848 pdjjd.exe xflrxrf.exe PID 2848 wrote to memory of 2732 2848 pdjjd.exe xflrxrf.exe PID 2848 wrote to memory of 2732 2848 pdjjd.exe xflrxrf.exe PID 2732 wrote to memory of 3064 2732 xflrxrf.exe xfrlfxl.exe PID 2732 wrote to memory of 3064 2732 xflrxrf.exe xfrlfxl.exe PID 2732 wrote to memory of 3064 2732 xflrxrf.exe xfrlfxl.exe PID 2732 wrote to memory of 3064 2732 xflrxrf.exe xfrlfxl.exe PID 3064 wrote to memory of 332 3064 xfrlfxl.exe 5hbhtt.exe PID 3064 wrote to memory of 332 3064 xfrlfxl.exe 5hbhtt.exe PID 3064 wrote to memory of 332 3064 xfrlfxl.exe 5hbhtt.exe PID 3064 wrote to memory of 332 3064 xfrlfxl.exe 5hbhtt.exe PID 332 wrote to memory of 2268 332 5hbhtt.exe bnhnbb.exe PID 332 wrote to memory of 2268 332 5hbhtt.exe bnhnbb.exe PID 332 wrote to memory of 2268 332 5hbhtt.exe bnhnbb.exe PID 332 wrote to memory of 2268 332 5hbhtt.exe bnhnbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e16fb3a3742dd1c0249e29e97970a20N.exe"C:\Users\Admin\AppData\Local\Temp\3e16fb3a3742dd1c0249e29e97970a20N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:600 -
\??\c:\ntbttb.exec:\ntbttb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\dvpvj.exec:\dvpvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\fxrfffr.exec:\fxrfffr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\bbtbhn.exec:\bbtbhn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\jvjjd.exec:\jvjjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\rrfrxxr.exec:\rrfrxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\nntnbt.exec:\nntnbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\3dppv.exec:\3dppv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\lxxxllr.exec:\lxxxllr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\llrxffl.exec:\llrxffl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\9bhbbt.exec:\9bhbbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\pdjjd.exec:\pdjjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\xflrxrf.exec:\xflrxrf.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\xfrlfxl.exec:\xfrlfxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\5hbhtt.exec:\5hbhtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
\??\c:\bnhnbb.exec:\bnhnbb.exe17⤵
- Executes dropped EXE
PID:2268 -
\??\c:\pvvpd.exec:\pvvpd.exe18⤵
- Executes dropped EXE
PID:2872 -
\??\c:\1ffffxf.exec:\1ffffxf.exe19⤵
- Executes dropped EXE
PID:1688 -
\??\c:\lxxrxxl.exec:\lxxrxxl.exe20⤵
- Executes dropped EXE
PID:2972 -
\??\c:\bthnnn.exec:\bthnnn.exe21⤵
- Executes dropped EXE
PID:2204 -
\??\c:\dvdjv.exec:\dvdjv.exe22⤵
- Executes dropped EXE
PID:2112 -
\??\c:\vdvvd.exec:\vdvvd.exe23⤵
- Executes dropped EXE
PID:1464 -
\??\c:\fxfrxxr.exec:\fxfrxxr.exe24⤵
- Executes dropped EXE
PID:924 -
\??\c:\tnbhnb.exec:\tnbhnb.exe25⤵
- Executes dropped EXE
PID:2620 -
\??\c:\bnnhtn.exec:\bnnhtn.exe26⤵
- Executes dropped EXE
PID:1796 -
\??\c:\pvvpd.exec:\pvvpd.exe27⤵
- Executes dropped EXE
PID:1964 -
\??\c:\vdpdj.exec:\vdpdj.exe28⤵
- Executes dropped EXE
PID:1660 -
\??\c:\flrlrfr.exec:\flrlrfr.exe29⤵
- Executes dropped EXE
PID:584 -
\??\c:\7jdpj.exec:\7jdpj.exe30⤵
- Executes dropped EXE
PID:2220 -
\??\c:\llrxfxl.exec:\llrxfxl.exe31⤵
- Executes dropped EXE
PID:884 -
\??\c:\bthhth.exec:\bthhth.exe32⤵
- Executes dropped EXE
PID:1776 -
\??\c:\3ppvj.exec:\3ppvj.exe33⤵PID:2196
-
\??\c:\9xfffrf.exec:\9xfffrf.exe34⤵
- Executes dropped EXE
PID:2768 -
\??\c:\tthhth.exec:\tthhth.exe35⤵
- Executes dropped EXE
PID:2812 -
\??\c:\jddvp.exec:\jddvp.exe36⤵
- Executes dropped EXE
PID:2920 -
\??\c:\rlffxfx.exec:\rlffxfx.exe37⤵
- Executes dropped EXE
PID:2148 -
\??\c:\bhhbbt.exec:\bhhbbt.exe38⤵
- Executes dropped EXE
PID:2604 -
\??\c:\bbntbn.exec:\bbntbn.exe39⤵
- Executes dropped EXE
PID:2688 -
\??\c:\3xlrffr.exec:\3xlrffr.exe40⤵
- Executes dropped EXE
PID:2800 -
\??\c:\rxxrxrx.exec:\rxxrxrx.exe41⤵
- Executes dropped EXE
PID:2828 -
\??\c:\nbhhhb.exec:\nbhhhb.exe42⤵
- Executes dropped EXE
PID:2740 -
\??\c:\vvjjp.exec:\vvjjp.exe43⤵
- Executes dropped EXE
PID:2684 -
\??\c:\lrfffxx.exec:\lrfffxx.exe44⤵
- Executes dropped EXE
PID:2680 -
\??\c:\xfxrlll.exec:\xfxrlll.exe45⤵
- Executes dropped EXE
PID:1820 -
\??\c:\ntbtbn.exec:\ntbtbn.exe46⤵
- Executes dropped EXE
PID:2108 -
\??\c:\3jvvd.exec:\3jvvd.exe47⤵
- Executes dropped EXE
PID:876 -
\??\c:\dvjjj.exec:\dvjjj.exe48⤵
- Executes dropped EXE
PID:2368 -
\??\c:\rfrfxxr.exec:\rfrfxxr.exe49⤵
- Executes dropped EXE
PID:2472 -
\??\c:\tbbhtt.exec:\tbbhtt.exe50⤵
- Executes dropped EXE
PID:2864 -
\??\c:\tbbhhn.exec:\tbbhhn.exe51⤵
- Executes dropped EXE
PID:3068 -
\??\c:\vpdvj.exec:\vpdvj.exe52⤵
- Executes dropped EXE
PID:2856 -
\??\c:\pjvdp.exec:\pjvdp.exe53⤵
- Executes dropped EXE
PID:332 -
\??\c:\1rlfrxr.exec:\1rlfrxr.exe54⤵
- Executes dropped EXE
PID:2652 -
\??\c:\hhhbbb.exec:\hhhbbb.exe55⤵
- Executes dropped EXE
PID:1152 -
\??\c:\bnbttn.exec:\bnbttn.exe56⤵
- Executes dropped EXE
PID:1764 -
\??\c:\1vvjv.exec:\1vvjv.exe57⤵
- Executes dropped EXE
PID:2236 -
\??\c:\dddjd.exec:\dddjd.exe58⤵
- Executes dropped EXE
PID:2468 -
\??\c:\rllflrx.exec:\rllflrx.exe59⤵
- Executes dropped EXE
PID:2340 -
\??\c:\xrrlfxl.exec:\xrrlfxl.exe60⤵
- Executes dropped EXE
PID:380 -
\??\c:\nhtbnb.exec:\nhtbnb.exe61⤵
- Executes dropped EXE
PID:1472 -
\??\c:\jjjvj.exec:\jjjvj.exe62⤵
- Executes dropped EXE
PID:1620 -
\??\c:\9vpvj.exec:\9vpvj.exe63⤵
- Executes dropped EXE
PID:1084 -
\??\c:\5llrffr.exec:\5llrffr.exe64⤵
- Executes dropped EXE
PID:2620 -
\??\c:\tntthh.exec:\tntthh.exe65⤵
- Executes dropped EXE
PID:1540 -
\??\c:\hbnnth.exec:\hbnnth.exe66⤵
- Executes dropped EXE
PID:608 -
\??\c:\jdjdp.exec:\jdjdp.exe67⤵PID:1660
-
\??\c:\xxfllff.exec:\xxfllff.exe68⤵PID:2160
-
\??\c:\tntbnn.exec:\tntbnn.exe69⤵PID:2584
-
\??\c:\9tthnh.exec:\9tthnh.exe70⤵PID:1976
-
\??\c:\9jppd.exec:\9jppd.exe71⤵PID:1076
-
\??\c:\rfrlxfr.exec:\rfrlxfr.exe72⤵PID:2212
-
\??\c:\ffxrlxf.exec:\ffxrlxf.exe73⤵PID:2636
-
\??\c:\hnhhtt.exec:\hnhhtt.exe74⤵PID:1580
-
\??\c:\nbhttb.exec:\nbhttb.exe75⤵PID:2812
-
\??\c:\vvjvj.exec:\vvjvj.exe76⤵PID:2672
-
\??\c:\lrxlxrx.exec:\lrxlxrx.exe77⤵PID:2148
-
\??\c:\7nhtth.exec:\7nhtth.exe78⤵PID:2796
-
\??\c:\tbhbbn.exec:\tbhbbn.exe79⤵PID:2688
-
\??\c:\dvpvv.exec:\dvpvv.exe80⤵PID:2968
-
\??\c:\vpjpp.exec:\vpjpp.exe81⤵PID:2980
-
\??\c:\lrrxfxr.exec:\lrrxfxr.exe82⤵PID:2740
-
\??\c:\hhbbnt.exec:\hhbbnt.exe83⤵PID:3000
-
\??\c:\vjjjd.exec:\vjjjd.exe84⤵PID:2552
-
\??\c:\pppvd.exec:\pppvd.exe85⤵PID:1820
-
\??\c:\lrrxxrf.exec:\lrrxxrf.exe86⤵PID:2088
-
\??\c:\xrrfrxl.exec:\xrrfrxl.exe87⤵PID:1036
-
\??\c:\hthntb.exec:\hthntb.exe88⤵PID:2360
-
\??\c:\pvdvv.exec:\pvdvv.exe89⤵PID:2472
-
\??\c:\llflxxl.exec:\llflxxl.exe90⤵PID:3056
-
\??\c:\lfffrxx.exec:\lfffrxx.exe91⤵PID:3068
-
\??\c:\btthtn.exec:\btthtn.exe92⤵PID:2152
-
\??\c:\bhtbbb.exec:\bhtbbb.exe93⤵PID:2256
-
\??\c:\1vvjp.exec:\1vvjp.exe94⤵PID:2644
-
\??\c:\1lrlfxx.exec:\1lrlfxx.exe95⤵PID:1524
-
\??\c:\hhnbnn.exec:\hhnbnn.exe96⤵PID:2180
-
\??\c:\dpppd.exec:\dpppd.exe97⤵PID:2320
-
\??\c:\pvpdj.exec:\pvpdj.exe98⤵
- System Location Discovery: System Language Discovery
PID:2608 -
\??\c:\xfffxxl.exec:\xfffxxl.exe99⤵PID:2340
-
\??\c:\7bttth.exec:\7bttth.exe100⤵PID:2288
-
\??\c:\bhhhnh.exec:\bhhhnh.exe101⤵PID:1472
-
\??\c:\dpvvd.exec:\dpvvd.exe102⤵PID:2004
-
\??\c:\7ffxfxl.exec:\7ffxfxl.exe103⤵PID:1084
-
\??\c:\nhhbnt.exec:\nhhbnt.exe104⤵PID:1916
-
\??\c:\bhhbbn.exec:\bhhbbn.exe105⤵PID:1540
-
\??\c:\dvdvp.exec:\dvdvp.exe106⤵PID:1760
-
\??\c:\3xxllxr.exec:\3xxllxr.exe107⤵PID:296
-
\??\c:\ffrrxlr.exec:\ffrrxlr.exe108⤵PID:2304
-
\??\c:\thntnb.exec:\thntnb.exe109⤵PID:2328
-
\??\c:\9pdvd.exec:\9pdvd.exe110⤵PID:2140
-
\??\c:\xrflrrr.exec:\xrflrrr.exe111⤵PID:2120
-
\??\c:\fxrllrr.exec:\fxrllrr.exe112⤵
- System Location Discovery: System Language Discovery
PID:2280 -
\??\c:\bbthbn.exec:\bbthbn.exe113⤵PID:2636
-
\??\c:\bbtnht.exec:\bbtnht.exe114⤵PID:1560
-
\??\c:\ppvjd.exec:\ppvjd.exe115⤵PID:2912
-
\??\c:\ppdjd.exec:\ppdjd.exe116⤵PID:2928
-
\??\c:\rlffrrf.exec:\rlffrrf.exe117⤵PID:2148
-
\??\c:\rxrlxfx.exec:\rxrlxfx.exe118⤵PID:2712
-
\??\c:\hhbnht.exec:\hhbnht.exe119⤵PID:2688
-
\??\c:\3thbbn.exec:\3thbbn.exe120⤵PID:2800
-
\??\c:\9vdpd.exec:\9vdpd.exe121⤵PID:2980
-
\??\c:\dvjvv.exec:\dvjvv.exe122⤵PID:532
-
\??\c:\rflrxfr.exec:\rflrxfr.exe123⤵PID:2760
-
\??\c:\rrxxfxx.exec:\rrxxfxx.exe124⤵PID:2680
-
\??\c:\5thbhb.exec:\5thbhb.exe125⤵PID:1820
-
\??\c:\djddj.exec:\djddj.exe126⤵PID:2108
-
\??\c:\jjjvp.exec:\jjjvp.exe127⤵PID:1036
-
\??\c:\lfxlxfx.exec:\lfxlxfx.exe128⤵PID:2368
-
\??\c:\9fxfrrf.exec:\9fxfrrf.exe129⤵PID:2472
-
\??\c:\lrrrxrr.exec:\lrrrxrr.exe130⤵PID:3056
-
\??\c:\hhthnh.exec:\hhthnh.exe131⤵PID:3068
-
\??\c:\pdjvj.exec:\pdjvj.exe132⤵PID:2856
-
\??\c:\rrfllrl.exec:\rrfllrl.exe133⤵PID:332
-
\??\c:\1rfrfxx.exec:\1rfrfxx.exe134⤵PID:2092
-
\??\c:\bhhbbn.exec:\bhhbbn.exe135⤵PID:1152
-
\??\c:\pdvjv.exec:\pdvjv.exe136⤵PID:1764
-
\??\c:\jpjpd.exec:\jpjpd.exe137⤵PID:2320
-
\??\c:\7lxllrl.exec:\7lxllrl.exe138⤵PID:892
-
\??\c:\ttbtnh.exec:\ttbtnh.exe139⤵PID:2476
-
\??\c:\tbhbtn.exec:\tbhbtn.exe140⤵PID:380
-
\??\c:\jpjpp.exec:\jpjpp.exe141⤵PID:1472
-
\??\c:\vpddp.exec:\vpddp.exe142⤵PID:1620
-
\??\c:\xxfxrrl.exec:\xxfxrrl.exe143⤵PID:1084
-
\??\c:\lxrrrxl.exec:\lxrrrxl.exe144⤵PID:2620
-
\??\c:\bbbbtb.exec:\bbbbtb.exe145⤵PID:1540
-
\??\c:\9vvvd.exec:\9vvvd.exe146⤵PID:608
-
\??\c:\djjpv.exec:\djjpv.exe147⤵PID:296
-
\??\c:\xxlxflf.exec:\xxlxflf.exe148⤵PID:2160
-
\??\c:\hnbnhh.exec:\hnbnhh.exe149⤵PID:2328
-
\??\c:\hnnttb.exec:\hnnttb.exe150⤵PID:1976
-
\??\c:\vddpv.exec:\vddpv.exe151⤵PID:1076
-
\??\c:\7djjd.exec:\7djjd.exe152⤵PID:2212
-
\??\c:\fxlxxfx.exec:\fxlxxfx.exe153⤵PID:2636
-
\??\c:\nhthbt.exec:\nhthbt.exe154⤵PID:1580
-
\??\c:\3tttbh.exec:\3tttbh.exe155⤵PID:2912
-
\??\c:\thtbht.exec:\thtbht.exe156⤵PID:2672
-
\??\c:\jjvjd.exec:\jjvjd.exe157⤵PID:2692
-
\??\c:\vdpdj.exec:\vdpdj.exe158⤵PID:2944
-
\??\c:\lrlxlxl.exec:\lrlxlxl.exe159⤵PID:2832
-
\??\c:\hnttbt.exec:\hnttbt.exe160⤵PID:2968
-
\??\c:\7nhtht.exec:\7nhtht.exe161⤵PID:2980
-
\??\c:\nntnth.exec:\nntnth.exe162⤵PID:1600
-
\??\c:\ppvjv.exec:\ppvjv.exe163⤵PID:2904
-
\??\c:\vpvvp.exec:\vpvvp.exe164⤵PID:2680
-
\??\c:\lflrlrf.exec:\lflrlrf.exe165⤵PID:1264
-
\??\c:\xlxxffl.exec:\xlxxffl.exe166⤵PID:2108
-
\??\c:\nhttnn.exec:\nhttnn.exe167⤵PID:2648
-
\??\c:\1nnhhb.exec:\1nnhhb.exe168⤵PID:2444
-
\??\c:\pdvvd.exec:\pdvvd.exe169⤵PID:2472
-
\??\c:\pdvjp.exec:\pdvjp.exe170⤵PID:2240
-
\??\c:\1rxxxfl.exec:\1rxxxfl.exe171⤵PID:3068
-
\??\c:\lrxxffl.exec:\lrxxffl.exe172⤵PID:2284
-
\??\c:\rrlrxrx.exec:\rrlrxrx.exe173⤵PID:2644
-
\??\c:\bnnhnh.exec:\bnnhnh.exe174⤵PID:628
-
\??\c:\hthhtt.exec:\hthhtt.exe175⤵PID:1152
-
\??\c:\dpddj.exec:\dpddj.exe176⤵PID:2180
-
\??\c:\pvddp.exec:\pvddp.exe177⤵PID:2504
-
\??\c:\lxxllrf.exec:\lxxllrf.exe178⤵PID:908
-
\??\c:\hntbht.exec:\hntbht.exe179⤵PID:2476
-
\??\c:\ttthbh.exec:\ttthbh.exe180⤵PID:2288
-
\??\c:\djvjd.exec:\djvjd.exe181⤵PID:2124
-
\??\c:\1vdjj.exec:\1vdjj.exe182⤵PID:2004
-
\??\c:\ffxxxll.exec:\ffxxxll.exe183⤵PID:2332
-
\??\c:\xlrxflr.exec:\xlrxflr.exe184⤵PID:1916
-
\??\c:\bbbhhb.exec:\bbbhhb.exe185⤵PID:984
-
\??\c:\tbhbtt.exec:\tbhbtt.exe186⤵PID:1760
-
\??\c:\ppjvj.exec:\ppjvj.exe187⤵PID:296
-
\??\c:\jvdjv.exec:\jvdjv.exe188⤵PID:2304
-
\??\c:\9lrrxrf.exec:\9lrrxrf.exe189⤵PID:2992
-
\??\c:\frxxffr.exec:\frxxffr.exe190⤵PID:2140
-
\??\c:\tnhnbh.exec:\tnhnbh.exe191⤵PID:1368
-
\??\c:\hthhtb.exec:\hthhtb.exe192⤵PID:2280
-
\??\c:\jvvvj.exec:\jvvvj.exe193⤵PID:2940
-
\??\c:\vvpdv.exec:\vvpdv.exe194⤵PID:1560
-
\??\c:\rlxxffr.exec:\rlxxffr.exe195⤵PID:2176
-
\??\c:\7ffrxfx.exec:\7ffrxfx.exe196⤵PID:2928
-
\??\c:\bbbtnt.exec:\bbbtnt.exe197⤵PID:2692
-
\??\c:\jvjpd.exec:\jvjpd.exe198⤵PID:3032
-
\??\c:\pppjv.exec:\pppjv.exe199⤵PID:1448
-
\??\c:\rlflffl.exec:\rlflffl.exe200⤵PID:2404
-
\??\c:\bbhnht.exec:\bbhnht.exe201⤵PID:2460
-
\??\c:\tbhtbt.exec:\tbhtbt.exe202⤵PID:1704
-
\??\c:\vvpvd.exec:\vvpvd.exe203⤵PID:944
-
\??\c:\rllllxr.exec:\rllllxr.exe204⤵PID:2900
-
\??\c:\lxflflr.exec:\lxflflr.exe205⤵PID:1036
-
\??\c:\bhbnbb.exec:\bhbnbb.exe206⤵PID:2752
-
\??\c:\ttthht.exec:\ttthht.exe207⤵PID:3064
-
\??\c:\5ttbnt.exec:\5ttbnt.exe208⤵PID:2840
-
\??\c:\pppjv.exec:\pppjv.exe209⤵PID:2000
-
\??\c:\fxrlfff.exec:\fxrlfff.exe210⤵PID:1564
-
\??\c:\lrrrrxf.exec:\lrrrrxf.exe211⤵PID:2872
-
\??\c:\bhttbb.exec:\bhttbb.exe212⤵PID:2652
-
\??\c:\ttnttt.exec:\ttnttt.exe213⤵PID:2972
-
\??\c:\7jjpj.exec:\7jjpj.exe214⤵PID:2236
-
\??\c:\djpjv.exec:\djpjv.exe215⤵PID:2464
-
\??\c:\rxxrxlr.exec:\rxxrxlr.exe216⤵PID:2468
-
\??\c:\rfflrrx.exec:\rfflrrx.exe217⤵PID:1532
-
\??\c:\htbtnb.exec:\htbtnb.exe218⤵PID:1128
-
\??\c:\bhhhtt.exec:\bhhhtt.exe219⤵PID:2228
-
\??\c:\djvpd.exec:\djvpd.exe220⤵PID:1796
-
\??\c:\jjjjj.exec:\jjjjj.exe221⤵PID:1980
-
\??\c:\lxrrrrx.exec:\lxrrrrx.exe222⤵PID:2548
-
\??\c:\flxrxrr.exec:\flxrxrr.exe223⤵PID:292
-
\??\c:\tbbhtb.exec:\tbbhtb.exe224⤵PID:1196
-
\??\c:\hntntt.exec:\hntntt.exe225⤵PID:2276
-
\??\c:\9vvdp.exec:\9vvdp.exe226⤵PID:884
-
\??\c:\lfrrxrl.exec:\lfrrxrl.exe227⤵PID:2456
-
\??\c:\5hnthh.exec:\5hnthh.exe228⤵PID:2496
-
\??\c:\jvdpp.exec:\jvdpp.exe229⤵PID:1880
-
\??\c:\pdvdv.exec:\pdvdv.exe230⤵PID:2140
-
\??\c:\xlxfrfx.exec:\xlxfrfx.exe231⤵PID:2920
-
\??\c:\flxrxrr.exec:\flxrxrr.exe232⤵PID:2916
-
\??\c:\nntbth.exec:\nntbth.exe233⤵PID:3044
-
\??\c:\jjvjj.exec:\jjvjj.exe234⤵PID:2996
-
\??\c:\jpvjv.exec:\jpvjv.exe235⤵PID:2720
-
\??\c:\rllfxxr.exec:\rllfxxr.exe236⤵PID:2660
-
\??\c:\hhthbh.exec:\hhthbh.exe237⤵PID:1932
-
\??\c:\ttnntn.exec:\ttnntn.exe238⤵PID:3008
-
\??\c:\pjdjd.exec:\pjdjd.exe239⤵PID:2968
-
\??\c:\flfrfrx.exec:\flfrfrx.exe240⤵PID:2628
-
\??\c:\xxrrflx.exec:\xxrrflx.exe241⤵PID:1984
-
\??\c:\nnhhbh.exec:\nnhhbh.exe242⤵PID:1752