Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 00:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
746d8660e21a8867d0d9335182dbf5d0N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
746d8660e21a8867d0d9335182dbf5d0N.exe
-
Size
147KB
-
MD5
746d8660e21a8867d0d9335182dbf5d0
-
SHA1
9d783e9ca1c439ba9a29f4c12ac97d44e226ee02
-
SHA256
35b8cc3b83ed52a7fa9177f2e75b0e4b034d4102d3dff73002bbc422d740f20d
-
SHA512
1677476359e29b2474e84bbdbaf85587f0fa6f4adb30907ae812f26e16e06fcb1a81cb429efe579f6828d666db3590a79e8674f3ea5af13f129da763eeb4a3de
-
SSDEEP
3072:ymb3NkkiQ3mdBjFosxXGPXbXQMFHLgDWSmklgQ2:n3C9BRosxW8MFHLMW7Q2
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/2868-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1528-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1528-30-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2132-40-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-19-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1912-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1196-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1396-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1524-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/548-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1124-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/468-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-308-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-5836-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
nbhnnn.exejppdd.exelrlxlrr.exehbhttn.exehbtthh.exetnbntb.exejjdvp.exenhnnbh.exehtbnnh.exelrffxxl.exellrrffl.exevpdjv.exelrrflfl.exe5nbbnh.exepvjdd.exebbthtb.exejjdjv.exe9rrffxr.exehhthnh.exe5jpjv.exefxxffff.exe7rlxlxl.exethhhnn.exe9vpdp.exexfrlrxx.exe3xxfrfx.exe9nnbnb.exerxrlrrl.exenbhbtn.exedddjp.exeffxfrxl.exebhbhtn.exevvpjv.exe9ddjd.exefrfrxlf.exebhhhht.exe1tthht.exepjdvd.exefrfrlrx.exerlrrxfr.exetbbhbt.exejjdpp.exepvpvp.exe7xllflf.exetbhhht.exenhbnbb.exedjpdv.exeffxrlxx.exerrrxflr.exentnhnt.exebbthbb.exepvvpv.exe1rffrlr.exellxfxrr.exebbbnbn.exebtnthn.exeppvdd.exe7xrxrlf.exexrfxlxf.exettbtbb.exejjvjp.exejpjjj.exelfflflf.exehtnthh.exepid process 2564 nbhnnn.exe 1528 jppdd.exe 2132 lrlxlrr.exe 2868 hbhttn.exe 2812 hbtthh.exe 2920 tnbntb.exe 2932 jjdvp.exe 2672 nhnnbh.exe 2316 htbnnh.exe 1912 lrffxxl.exe 676 llrrffl.exe 1196 vpdjv.exe 2900 lrrflfl.exe 2432 5nbbnh.exe 2424 pvjdd.exe 2284 bbthtb.exe 1396 jjdjv.exe 2312 9rrffxr.exe 332 hhthnh.exe 1524 5jpjv.exe 1060 fxxffff.exe 548 7rlxlxl.exe 2468 thhhnn.exe 1124 9vpdp.exe 1984 xfrlrxx.exe 468 3xxfrfx.exe 2392 9nnbnb.exe 304 rxrlrrl.exe 2156 nbhbtn.exe 1868 dddjp.exe 1980 ffxfrxl.exe 2564 bhbhtn.exe 2076 vvpjv.exe 2872 9ddjd.exe 2120 frfrxlf.exe 2668 bhhhht.exe 2460 1tthht.exe 2856 pjdvd.exe 2604 frfrlrx.exe 2828 rlrrxfr.exe 2940 tbbhbt.exe 2932 jjdpp.exe 1996 pvpvp.exe 2832 7xllflf.exe 2752 tbhhht.exe 1452 nhbnbb.exe 676 djpdv.exe 2964 ffxrlxx.exe 2300 rrrxflr.exe 2844 ntnhnt.exe 1844 bbthbb.exe 1636 pvvpv.exe 1688 1rffrlr.exe 2152 llxfxrr.exe 536 bbbnbn.exe 600 btnthn.exe 1704 ppvdd.exe 1644 7xrxrlf.exe 2188 xrfxlxf.exe 1720 ttbtbb.exe 1244 jjvjp.exe 1296 jpjjj.exe 292 lfflflf.exe 1712 htnthh.exe -
Processes:
resource yara_rule behavioral1/memory/2564-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1528-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1912-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1196-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1396-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1524-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/548-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1124-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/468-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-308-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-5836-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
jjpdj.exettthth.exebbbnth.exejjdvp.exexfxxrxf.exepppjv.exevjvpp.exedddjv.exe3bnhbh.exenhbtht.exe5jppd.exexlxxflx.exe1xllxll.exejdvvp.exedddjv.exexrfrxfr.exedvvdv.exenhtbbn.exexxxxflx.exedjjpp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxxrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xllxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjpp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
746d8660e21a8867d0d9335182dbf5d0N.exenbhnnn.exejppdd.exelrlxlrr.exehbhttn.exehbtthh.exetnbntb.exejjdvp.exenhnnbh.exehtbnnh.exelrffxxl.exellrrffl.exevpdjv.exelrrflfl.exe5nbbnh.exepvjdd.exedescription pid process target process PID 2948 wrote to memory of 2564 2948 746d8660e21a8867d0d9335182dbf5d0N.exe nbhnnn.exe PID 2948 wrote to memory of 2564 2948 746d8660e21a8867d0d9335182dbf5d0N.exe nbhnnn.exe PID 2948 wrote to memory of 2564 2948 746d8660e21a8867d0d9335182dbf5d0N.exe nbhnnn.exe PID 2948 wrote to memory of 2564 2948 746d8660e21a8867d0d9335182dbf5d0N.exe nbhnnn.exe PID 2564 wrote to memory of 1528 2564 nbhnnn.exe jppdd.exe PID 2564 wrote to memory of 1528 2564 nbhnnn.exe jppdd.exe PID 2564 wrote to memory of 1528 2564 nbhnnn.exe jppdd.exe PID 2564 wrote to memory of 1528 2564 nbhnnn.exe jppdd.exe PID 1528 wrote to memory of 2132 1528 jppdd.exe lrlxlrr.exe PID 1528 wrote to memory of 2132 1528 jppdd.exe lrlxlrr.exe PID 1528 wrote to memory of 2132 1528 jppdd.exe lrlxlrr.exe PID 1528 wrote to memory of 2132 1528 jppdd.exe lrlxlrr.exe PID 2132 wrote to memory of 2868 2132 lrlxlrr.exe hbhttn.exe PID 2132 wrote to memory of 2868 2132 lrlxlrr.exe hbhttn.exe PID 2132 wrote to memory of 2868 2132 lrlxlrr.exe hbhttn.exe PID 2132 wrote to memory of 2868 2132 lrlxlrr.exe hbhttn.exe PID 2868 wrote to memory of 2812 2868 hbhttn.exe hbtthh.exe PID 2868 wrote to memory of 2812 2868 hbhttn.exe hbtthh.exe PID 2868 wrote to memory of 2812 2868 hbhttn.exe hbtthh.exe PID 2868 wrote to memory of 2812 2868 hbhttn.exe hbtthh.exe PID 2812 wrote to memory of 2920 2812 hbtthh.exe tnbntb.exe PID 2812 wrote to memory of 2920 2812 hbtthh.exe tnbntb.exe PID 2812 wrote to memory of 2920 2812 hbtthh.exe tnbntb.exe PID 2812 wrote to memory of 2920 2812 hbtthh.exe tnbntb.exe PID 2920 wrote to memory of 2932 2920 tnbntb.exe jjdvp.exe PID 2920 wrote to memory of 2932 2920 tnbntb.exe jjdvp.exe PID 2920 wrote to memory of 2932 2920 tnbntb.exe jjdvp.exe PID 2920 wrote to memory of 2932 2920 tnbntb.exe jjdvp.exe PID 2932 wrote to memory of 2672 2932 jjdvp.exe nhnnbh.exe PID 2932 wrote to memory of 2672 2932 jjdvp.exe nhnnbh.exe PID 2932 wrote to memory of 2672 2932 jjdvp.exe nhnnbh.exe PID 2932 wrote to memory of 2672 2932 jjdvp.exe nhnnbh.exe PID 2672 wrote to memory of 2316 2672 nhnnbh.exe htbnnh.exe PID 2672 wrote to memory of 2316 2672 nhnnbh.exe htbnnh.exe PID 2672 wrote to memory of 2316 2672 nhnnbh.exe htbnnh.exe PID 2672 wrote to memory of 2316 2672 nhnnbh.exe htbnnh.exe PID 2316 wrote to memory of 1912 2316 htbnnh.exe lrffxxl.exe PID 2316 wrote to memory of 1912 2316 htbnnh.exe lrffxxl.exe PID 2316 wrote to memory of 1912 2316 htbnnh.exe lrffxxl.exe PID 2316 wrote to memory of 1912 2316 htbnnh.exe lrffxxl.exe PID 1912 wrote to memory of 676 1912 lrffxxl.exe llrrffl.exe PID 1912 wrote to memory of 676 1912 lrffxxl.exe llrrffl.exe PID 1912 wrote to memory of 676 1912 lrffxxl.exe llrrffl.exe PID 1912 wrote to memory of 676 1912 lrffxxl.exe llrrffl.exe PID 676 wrote to memory of 1196 676 llrrffl.exe vpdjv.exe PID 676 wrote to memory of 1196 676 llrrffl.exe vpdjv.exe PID 676 wrote to memory of 1196 676 llrrffl.exe vpdjv.exe PID 676 wrote to memory of 1196 676 llrrffl.exe vpdjv.exe PID 1196 wrote to memory of 2900 1196 vpdjv.exe lrrflfl.exe PID 1196 wrote to memory of 2900 1196 vpdjv.exe lrrflfl.exe PID 1196 wrote to memory of 2900 1196 vpdjv.exe lrrflfl.exe PID 1196 wrote to memory of 2900 1196 vpdjv.exe lrrflfl.exe PID 2900 wrote to memory of 2432 2900 lrrflfl.exe 5nbbnh.exe PID 2900 wrote to memory of 2432 2900 lrrflfl.exe 5nbbnh.exe PID 2900 wrote to memory of 2432 2900 lrrflfl.exe 5nbbnh.exe PID 2900 wrote to memory of 2432 2900 lrrflfl.exe 5nbbnh.exe PID 2432 wrote to memory of 2424 2432 5nbbnh.exe pvjdd.exe PID 2432 wrote to memory of 2424 2432 5nbbnh.exe pvjdd.exe PID 2432 wrote to memory of 2424 2432 5nbbnh.exe pvjdd.exe PID 2432 wrote to memory of 2424 2432 5nbbnh.exe pvjdd.exe PID 2424 wrote to memory of 2284 2424 pvjdd.exe bbthtb.exe PID 2424 wrote to memory of 2284 2424 pvjdd.exe bbthtb.exe PID 2424 wrote to memory of 2284 2424 pvjdd.exe bbthtb.exe PID 2424 wrote to memory of 2284 2424 pvjdd.exe bbthtb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\746d8660e21a8867d0d9335182dbf5d0N.exe"C:\Users\Admin\AppData\Local\Temp\746d8660e21a8867d0d9335182dbf5d0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\nbhnnn.exec:\nbhnnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\jppdd.exec:\jppdd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\lrlxlrr.exec:\lrlxlrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\hbhttn.exec:\hbhttn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\hbtthh.exec:\hbtthh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\tnbntb.exec:\tnbntb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\jjdvp.exec:\jjdvp.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\nhnnbh.exec:\nhnnbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\htbnnh.exec:\htbnnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\lrffxxl.exec:\lrffxxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\llrrffl.exec:\llrrffl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
\??\c:\vpdjv.exec:\vpdjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\lrrflfl.exec:\lrrflfl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\5nbbnh.exec:\5nbbnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\pvjdd.exec:\pvjdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\bbthtb.exec:\bbthtb.exe17⤵
- Executes dropped EXE
PID:2284 -
\??\c:\jjdjv.exec:\jjdjv.exe18⤵
- Executes dropped EXE
PID:1396 -
\??\c:\9rrffxr.exec:\9rrffxr.exe19⤵
- Executes dropped EXE
PID:2312 -
\??\c:\hhthnh.exec:\hhthnh.exe20⤵
- Executes dropped EXE
PID:332 -
\??\c:\5jpjv.exec:\5jpjv.exe21⤵
- Executes dropped EXE
PID:1524 -
\??\c:\fxxffff.exec:\fxxffff.exe22⤵
- Executes dropped EXE
PID:1060 -
\??\c:\7rlxlxl.exec:\7rlxlxl.exe23⤵
- Executes dropped EXE
PID:548 -
\??\c:\thhhnn.exec:\thhhnn.exe24⤵
- Executes dropped EXE
PID:2468 -
\??\c:\9vpdp.exec:\9vpdp.exe25⤵
- Executes dropped EXE
PID:1124 -
\??\c:\xfrlrxx.exec:\xfrlrxx.exe26⤵
- Executes dropped EXE
PID:1984 -
\??\c:\3xxfrfx.exec:\3xxfrfx.exe27⤵
- Executes dropped EXE
PID:468 -
\??\c:\9nnbnb.exec:\9nnbnb.exe28⤵
- Executes dropped EXE
PID:2392 -
\??\c:\rxrlrrl.exec:\rxrlrrl.exe29⤵
- Executes dropped EXE
PID:304 -
\??\c:\nbhbtn.exec:\nbhbtn.exe30⤵
- Executes dropped EXE
PID:2156 -
\??\c:\dddjp.exec:\dddjp.exe31⤵
- Executes dropped EXE
PID:1868 -
\??\c:\ffxfrxl.exec:\ffxfrxl.exe32⤵
- Executes dropped EXE
PID:1980 -
\??\c:\bhbhtn.exec:\bhbhtn.exe33⤵
- Executes dropped EXE
PID:2564 -
\??\c:\vvpjv.exec:\vvpjv.exe34⤵
- Executes dropped EXE
PID:2076 -
\??\c:\9ddjd.exec:\9ddjd.exe35⤵
- Executes dropped EXE
PID:2872 -
\??\c:\frfrxlf.exec:\frfrxlf.exe36⤵
- Executes dropped EXE
PID:2120 -
\??\c:\bhhhht.exec:\bhhhht.exe37⤵
- Executes dropped EXE
PID:2668 -
\??\c:\1tthht.exec:\1tthht.exe38⤵
- Executes dropped EXE
PID:2460 -
\??\c:\pjdvd.exec:\pjdvd.exe39⤵
- Executes dropped EXE
PID:2856 -
\??\c:\frfrlrx.exec:\frfrlrx.exe40⤵
- Executes dropped EXE
PID:2604 -
\??\c:\rlrrxfr.exec:\rlrrxfr.exe41⤵
- Executes dropped EXE
PID:2828 -
\??\c:\tbbhbt.exec:\tbbhbt.exe42⤵
- Executes dropped EXE
PID:2940 -
\??\c:\jjdpp.exec:\jjdpp.exe43⤵
- Executes dropped EXE
PID:2932 -
\??\c:\pvpvp.exec:\pvpvp.exe44⤵
- Executes dropped EXE
PID:1996 -
\??\c:\7xllflf.exec:\7xllflf.exe45⤵
- Executes dropped EXE
PID:2832 -
\??\c:\tbhhht.exec:\tbhhht.exe46⤵
- Executes dropped EXE
PID:2752 -
\??\c:\nhbnbb.exec:\nhbnbb.exe47⤵
- Executes dropped EXE
PID:1452 -
\??\c:\djpdv.exec:\djpdv.exe48⤵
- Executes dropped EXE
PID:676 -
\??\c:\ffxrlxx.exec:\ffxrlxx.exe49⤵
- Executes dropped EXE
PID:2964 -
\??\c:\rrrxflr.exec:\rrrxflr.exe50⤵
- Executes dropped EXE
PID:2300 -
\??\c:\ntnhnt.exec:\ntnhnt.exe51⤵
- Executes dropped EXE
PID:2844 -
\??\c:\bbthbb.exec:\bbthbb.exe52⤵
- Executes dropped EXE
PID:1844 -
\??\c:\pvvpv.exec:\pvvpv.exe53⤵
- Executes dropped EXE
PID:1636 -
\??\c:\1rffrlr.exec:\1rffrlr.exe54⤵
- Executes dropped EXE
PID:1688 -
\??\c:\llxfxrr.exec:\llxfxrr.exe55⤵
- Executes dropped EXE
PID:2152 -
\??\c:\bbbnbn.exec:\bbbnbn.exe56⤵
- Executes dropped EXE
PID:536 -
\??\c:\btnthn.exec:\btnthn.exe57⤵
- Executes dropped EXE
PID:600 -
\??\c:\ppvdd.exec:\ppvdd.exe58⤵
- Executes dropped EXE
PID:1704 -
\??\c:\7xrxrlf.exec:\7xrxrlf.exe59⤵
- Executes dropped EXE
PID:1644 -
\??\c:\xrfxlxf.exec:\xrfxlxf.exe60⤵
- Executes dropped EXE
PID:2188 -
\??\c:\ttbtbb.exec:\ttbtbb.exe61⤵
- Executes dropped EXE
PID:1720 -
\??\c:\jjvjp.exec:\jjvjp.exe62⤵
- Executes dropped EXE
PID:1244 -
\??\c:\jpjjj.exec:\jpjjj.exe63⤵
- Executes dropped EXE
PID:1296 -
\??\c:\lfflflf.exec:\lfflflf.exe64⤵
- Executes dropped EXE
PID:292 -
\??\c:\htnthh.exec:\htnthh.exe65⤵
- Executes dropped EXE
PID:1712 -
\??\c:\5hbhnt.exec:\5hbhnt.exe66⤵PID:2204
-
\??\c:\pvvvj.exec:\pvvvj.exe67⤵PID:1716
-
\??\c:\rrlxrfl.exec:\rrlxrfl.exe68⤵PID:2408
-
\??\c:\9fflflf.exec:\9fflflf.exe69⤵PID:2268
-
\??\c:\hbhtbh.exec:\hbhtbh.exe70⤵PID:1900
-
\??\c:\tbhnnb.exec:\tbhnnb.exe71⤵PID:2100
-
\??\c:\ppdvj.exec:\ppdvj.exe72⤵PID:328
-
\??\c:\jjdpj.exec:\jjdpj.exe73⤵PID:2436
-
\??\c:\lfflrrx.exec:\lfflrrx.exe74⤵PID:2528
-
\??\c:\ffxfrxl.exec:\ffxfrxl.exe75⤵PID:2076
-
\??\c:\ttnntt.exec:\ttnntt.exe76⤵PID:2872
-
\??\c:\1jvpj.exec:\1jvpj.exe77⤵PID:2296
-
\??\c:\dddvd.exec:\dddvd.exe78⤵PID:2444
-
\??\c:\xfllllx.exec:\xfllllx.exe79⤵PID:1484
-
\??\c:\7fxrfxl.exec:\7fxrfxl.exe80⤵PID:2856
-
\??\c:\btnbnt.exec:\btnbnt.exe81⤵PID:2924
-
\??\c:\9vppd.exec:\9vppd.exe82⤵PID:2828
-
\??\c:\jjvvv.exec:\jjvvv.exe83⤵PID:2848
-
\??\c:\7xxrfrf.exec:\7xxrfrf.exe84⤵PID:2728
-
\??\c:\5xrlxrf.exec:\5xrlxrf.exe85⤵PID:2524
-
\??\c:\nbbbhb.exec:\nbbbhb.exe86⤵PID:2832
-
\??\c:\9dvjp.exec:\9dvjp.exe87⤵PID:2320
-
\??\c:\5ddvj.exec:\5ddvj.exe88⤵PID:2732
-
\??\c:\rrlfxlx.exec:\rrlfxlx.exe89⤵PID:1164
-
\??\c:\rxrlxlx.exec:\rxrlxlx.exe90⤵PID:2964
-
\??\c:\1hhbbb.exec:\1hhbbb.exe91⤵PID:2420
-
\??\c:\pvdjp.exec:\pvdjp.exe92⤵PID:2844
-
\??\c:\pvdpp.exec:\pvdpp.exe93⤵PID:1844
-
\??\c:\flfflff.exec:\flfflff.exe94⤵PID:1636
-
\??\c:\xxrrfrf.exec:\xxrrfrf.exe95⤵PID:2760
-
\??\c:\nhtbbn.exec:\nhtbbn.exe96⤵
- System Location Discovery: System Language Discovery
PID:2152 -
\??\c:\9jdpd.exec:\9jdpd.exe97⤵PID:2536
-
\??\c:\ppjdd.exec:\ppjdd.exe98⤵PID:320
-
\??\c:\rrrfrrl.exec:\rrrfrrl.exe99⤵PID:2644
-
\??\c:\1tnbnn.exec:\1tnbnn.exe100⤵PID:1644
-
\??\c:\ppdvp.exec:\ppdvp.exe101⤵PID:564
-
\??\c:\jvvdj.exec:\jvvdj.exe102⤵PID:1720
-
\??\c:\xxxlxfr.exec:\xxxlxfr.exe103⤵PID:1556
-
\??\c:\bbbnth.exec:\bbbnth.exe104⤵
- System Location Discovery: System Language Discovery
PID:1296 -
\??\c:\5hhtht.exec:\5hhtht.exe105⤵PID:2492
-
\??\c:\9vpdj.exec:\9vpdj.exe106⤵PID:1712
-
\??\c:\fxrfrxl.exec:\fxrfrxl.exe107⤵PID:1696
-
\??\c:\xxrfrlf.exec:\xxrfrlf.exe108⤵PID:1716
-
\??\c:\9ttbnn.exec:\9ttbnn.exe109⤵PID:2400
-
\??\c:\ttnbhn.exec:\ttnbhn.exe110⤵PID:2268
-
\??\c:\vvddv.exec:\vvddv.exe111⤵PID:2168
-
\??\c:\5ffxrfx.exec:\5ffxrfx.exe112⤵PID:2100
-
\??\c:\ffxxrxr.exec:\ffxxrxr.exe113⤵PID:2288
-
\??\c:\hnhbnn.exec:\hnhbnn.exe114⤵PID:2584
-
\??\c:\jdpvd.exec:\jdpvd.exe115⤵PID:2864
-
\??\c:\9pjvj.exec:\9pjvj.exe116⤵PID:2076
-
\??\c:\fxfrflx.exec:\fxfrflx.exe117⤵PID:2820
-
\??\c:\hhtnhh.exec:\hhtnhh.exe118⤵PID:2668
-
\??\c:\bttnbn.exec:\bttnbn.exe119⤵PID:1468
-
\??\c:\jjpdd.exec:\jjpdd.exe120⤵PID:1484
-
\??\c:\djpjd.exec:\djpjd.exe121⤵PID:2696
-
\??\c:\llflllx.exec:\llflllx.exe122⤵PID:2924
-
\??\c:\7hbhtb.exec:\7hbhtb.exe123⤵PID:2684
-
\??\c:\btnthn.exec:\btnthn.exe124⤵PID:2848
-
\??\c:\pppjd.exec:\pppjd.exe125⤵PID:2932
-
\??\c:\lrrrflx.exec:\lrrrflx.exe126⤵PID:2524
-
\??\c:\tbnnbb.exec:\tbnnbb.exe127⤵PID:1932
-
\??\c:\nhnhnn.exec:\nhnhnn.exe128⤵PID:2320
-
\??\c:\1vpjv.exec:\1vpjv.exe129⤵PID:2904
-
\??\c:\dvpdj.exec:\dvpdj.exe130⤵PID:2900
-
\??\c:\fxrlxrx.exec:\fxrlxrx.exe131⤵PID:1516
-
\??\c:\hbttnt.exec:\hbttnt.exe132⤵PID:2300
-
\??\c:\tbhtth.exec:\tbhtth.exe133⤵PID:2984
-
\??\c:\5vddp.exec:\5vddp.exe134⤵PID:1740
-
\??\c:\7jjpd.exec:\7jjpd.exe135⤵PID:2256
-
\??\c:\rrrllff.exec:\rrrllff.exe136⤵PID:2760
-
\??\c:\btbnbb.exec:\btbnbb.exe137⤵PID:840
-
\??\c:\ntntbn.exec:\ntntbn.exe138⤵PID:2536
-
\??\c:\pppjj.exec:\pppjj.exe139⤵PID:332
-
\??\c:\ppdjd.exec:\ppdjd.exe140⤵PID:2644
-
\??\c:\lfxlxfx.exec:\lfxlxfx.exe141⤵PID:1884
-
\??\c:\nnnhhn.exec:\nnnhhn.exe142⤵PID:1992
-
\??\c:\9thttb.exec:\9thttb.exe143⤵PID:3060
-
\??\c:\5jjdp.exec:\5jjdp.exe144⤵PID:980
-
\??\c:\ddvjv.exec:\ddvjv.exe145⤵PID:1792
-
\??\c:\9lxlrfr.exec:\9lxlrfr.exe146⤵PID:2492
-
\??\c:\5btbnn.exec:\5btbnn.exe147⤵PID:2068
-
\??\c:\nhbhnt.exec:\nhbhnt.exe148⤵PID:2204
-
\??\c:\htbbhn.exec:\htbbhn.exe149⤵PID:2612
-
\??\c:\dvvdv.exec:\dvvdv.exe150⤵PID:2408
-
\??\c:\rrfrflx.exec:\rrfrflx.exe151⤵PID:2156
-
\??\c:\flxfffr.exec:\flxfffr.exe152⤵PID:1900
-
\??\c:\bbtbbn.exec:\bbtbbn.exe153⤵PID:2592
-
\??\c:\xflxrff.exec:\xflxrff.exe154⤵PID:328
-
\??\c:\tnhthb.exec:\tnhthb.exe155⤵PID:2436
-
\??\c:\jjddp.exec:\jjddp.exe156⤵PID:2528
-
\??\c:\jvdjp.exec:\jvdjp.exe157⤵PID:2952
-
\??\c:\lrrrlxl.exec:\lrrrlxl.exe158⤵PID:2296
-
\??\c:\hntnhh.exec:\hntnhh.exe159⤵PID:2668
-
\??\c:\1tbhbt.exec:\1tbhbt.exe160⤵PID:2824
-
\??\c:\djvpj.exec:\djvpj.exe161⤵PID:2988
-
\??\c:\ppdjj.exec:\ppdjj.exe162⤵PID:2856
-
\??\c:\lrfrxrx.exec:\lrfrxrx.exe163⤵PID:2664
-
\??\c:\ttbhbb.exec:\ttbhbb.exe164⤵PID:1976
-
\??\c:\3ttthh.exec:\3ttthh.exe165⤵PID:1956
-
\??\c:\ppjvd.exec:\ppjvd.exe166⤵PID:2932
-
\??\c:\pvjvj.exec:\pvjvj.exe167⤵PID:1748
-
\??\c:\lllffxf.exec:\lllffxf.exe168⤵PID:1932
-
\??\c:\nnhbnt.exec:\nnhbnt.exe169⤵PID:1560
-
\??\c:\bhhnhh.exec:\bhhnhh.exe170⤵PID:2732
-
\??\c:\jddjv.exec:\jddjv.exe171⤵PID:676
-
\??\c:\9ppvd.exec:\9ppvd.exe172⤵PID:2992
-
\??\c:\rxrffxx.exec:\rxrffxx.exe173⤵PID:2420
-
\??\c:\nnhthh.exec:\nnhthh.exe174⤵PID:2984
-
\??\c:\htbnnh.exec:\htbnnh.exe175⤵PID:2700
-
\??\c:\7pdpj.exec:\7pdpj.exe176⤵PID:1688
-
\??\c:\7flxlrr.exec:\7flxlrr.exe177⤵PID:2368
-
\??\c:\lfxfxxf.exec:\lfxfxxf.exe178⤵PID:536
-
\??\c:\nnntnt.exec:\nnntnt.exe179⤵PID:1056
-
\??\c:\hhbnbn.exec:\hhbnbn.exe180⤵PID:332
-
\??\c:\djvdp.exec:\djvdp.exe181⤵PID:2484
-
\??\c:\xfxrllx.exec:\xfxrllx.exe182⤵PID:3064
-
\??\c:\lfrflrx.exec:\lfrflrx.exe183⤵PID:1128
-
\??\c:\hhbtht.exec:\hhbtht.exe184⤵PID:3060
-
\??\c:\hnhtnb.exec:\hnhtnb.exe185⤵PID:468
-
\??\c:\vdjdd.exec:\vdjdd.exe186⤵PID:1792
-
\??\c:\xxrfxfl.exec:\xxrfxfl.exe187⤵PID:2492
-
\??\c:\xxrfxlx.exec:\xxrfxlx.exe188⤵PID:2068
-
\??\c:\hnhntn.exec:\hnhntn.exe189⤵PID:1916
-
\??\c:\jdvdv.exec:\jdvdv.exe190⤵PID:1008
-
\??\c:\9pdvd.exec:\9pdvd.exe191⤵PID:2408
-
\??\c:\llfxrxr.exec:\llfxrxr.exe192⤵PID:2156
-
\??\c:\btntht.exec:\btntht.exe193⤵PID:1900
-
\??\c:\hhbhtt.exec:\hhbhtt.exe194⤵PID:2456
-
\??\c:\ddpdv.exec:\ddpdv.exe195⤵PID:328
-
\??\c:\lfrfrlx.exec:\lfrfrlx.exe196⤵PID:2796
-
\??\c:\rrllrfr.exec:\rrllrfr.exe197⤵PID:2528
-
\??\c:\3tbhbb.exec:\3tbhbb.exe198⤵PID:2108
-
\??\c:\hbbbnb.exec:\hbbbnb.exe199⤵PID:2296
-
\??\c:\pjvjd.exec:\pjvjd.exe200⤵PID:2444
-
\??\c:\5lflxfr.exec:\5lflxfr.exe201⤵PID:2824
-
\??\c:\lxllxfx.exec:\lxllxfx.exe202⤵PID:2680
-
\??\c:\nnnhth.exec:\nnnhth.exe203⤵PID:2856
-
\??\c:\9nthnt.exec:\9nthnt.exe204⤵PID:2828
-
\??\c:\pvjpd.exec:\pvjpd.exe205⤵PID:344
-
\??\c:\vvvpp.exec:\vvvpp.exe206⤵PID:1912
-
\??\c:\rlrllxx.exec:\rlrllxx.exe207⤵PID:2932
-
\??\c:\ttnbbh.exec:\ttnbbh.exe208⤵PID:1748
-
\??\c:\ttnbbh.exec:\ttnbbh.exe209⤵PID:1452
-
\??\c:\vdvjd.exec:\vdvjd.exe210⤵PID:2128
-
\??\c:\pjdpp.exec:\pjdpp.exe211⤵PID:2432
-
\??\c:\5xfxrxl.exec:\5xfxrxl.exe212⤵PID:1188
-
\??\c:\9frrrlr.exec:\9frrrlr.exe213⤵PID:1628
-
\??\c:\bnbnnn.exec:\bnbnnn.exe214⤵PID:896
-
\??\c:\pvjjd.exec:\pvjjd.exe215⤵PID:2324
-
\??\c:\dvpjd.exec:\dvpjd.exe216⤵PID:1636
-
\??\c:\lllxrfx.exec:\lllxrfx.exe217⤵PID:2140
-
\??\c:\1hhnbt.exec:\1hhnbt.exe218⤵PID:2388
-
\??\c:\tnhhtb.exec:\tnhhtb.exe219⤵PID:1756
-
\??\c:\7ppdp.exec:\7ppdp.exe220⤵PID:1700
-
\??\c:\xrlfxfl.exec:\xrlfxfl.exe221⤵PID:1120
-
\??\c:\lfrxlrl.exec:\lfrxlrl.exe222⤵PID:2072
-
\??\c:\nttnnn.exec:\nttnnn.exe223⤵PID:1260
-
\??\c:\ttnbtt.exec:\ttnbtt.exe224⤵PID:964
-
\??\c:\pjdjd.exec:\pjdjd.exe225⤵PID:580
-
\??\c:\pjjvp.exec:\pjjvp.exe226⤵PID:1772
-
\??\c:\3rxlxfr.exec:\3rxlxfr.exe227⤵PID:876
-
\??\c:\1hbhnb.exec:\1hbhnb.exe228⤵PID:2392
-
\??\c:\btthbn.exec:\btthbn.exe229⤵PID:612
-
\??\c:\1pvdp.exec:\1pvdp.exe230⤵PID:2748
-
\??\c:\vdvjd.exec:\vdvjd.exe231⤵PID:1732
-
\??\c:\ffrfxll.exec:\ffrfxll.exe232⤵PID:2628
-
\??\c:\fllxfxr.exec:\fllxfxr.exe233⤵PID:2440
-
\??\c:\ntnhtb.exec:\ntnhtb.exe234⤵PID:2100
-
\??\c:\ttthhn.exec:\ttthhn.exe235⤵PID:2792
-
\??\c:\jjvjd.exec:\jjvjd.exe236⤵PID:2584
-
\??\c:\rxrxlrr.exec:\rxrxlrr.exe237⤵PID:3040
-
\??\c:\tnbtbt.exec:\tnbtbt.exe238⤵PID:1968
-
\??\c:\1htnnn.exec:\1htnnn.exe239⤵PID:2240
-
\??\c:\pdpjd.exec:\pdpjd.exe240⤵PID:2208
-
\??\c:\vpvjv.exec:\vpvjv.exe241⤵PID:2892
-
\??\c:\ffflffr.exec:\ffflffr.exe242⤵PID:2708