Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 08:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
120 seconds
General
-
Target
9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe
-
Size
436KB
-
MD5
0712e0b4c599d79044fb56d09b506390
-
SHA1
7a83fdf989ce43dc6c0e3f2f12cee8c79d61a272
-
SHA256
9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9
-
SHA512
84d5033fd8b39bb7b4f087bef9592b5132cc31b14fc546c659866c5b28c6c025e430c32d64bd9b83b6bb9f6ab98d315d0f0a4ec37c1f581797847faa39a794e9
-
SSDEEP
12288:n3C9uMPh2kkkkK4kXkkkkkkkkl888888888888888888nE:ShPh2kkkkK4kXkkkkkkkkm
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral2/memory/224-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/224-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2284-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2180-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3124-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2944-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1436-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4888-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1440-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2840-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1120-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2932-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4416-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2708-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2252 tnnhbb.exe 2284 1dvpv.exe 4748 xrxlfxr.exe 1540 1vdvp.exe 932 ttbbtt.exe 4668 lfxlxxr.exe 2180 dddvp.exe 3124 ffrrxxl.exe 2944 jjvvp.exe 5016 nbbthb.exe 1220 7vvpj.exe 4676 rlrlxxx.exe 1340 3ntnhh.exe 2236 bnhthh.exe 1436 3xrlrrf.exe 4888 fxfxxxx.exe 1804 hbnhbb.exe 1440 jpvpj.exe 2840 flxrllf.exe 3252 htnhhh.exe 4356 hththh.exe 4628 vddvv.exe 1120 llxlfrl.exe 4492 hbbnhb.exe 2932 rflfxxx.exe 692 nbnhbb.exe 4672 vjjdv.exe 5092 htbtnh.exe 4416 vjdvj.exe 2708 7rxrlfr.exe 1488 hnnhtt.exe 4924 lxxrffx.exe 1256 3xxfllf.exe 3564 vvdvp.exe 2868 xxxrfff.exe 4228 fffxlxr.exe 3796 nbnhbb.exe 3656 hbhbth.exe 5084 3ddpd.exe 4744 lrxlffr.exe 3488 ntthbt.exe 2160 hbbtbb.exe 4684 ppjdp.exe 3004 lrfrlfr.exe 1692 hhhbbt.exe 4296 vpdjv.exe 2808 9djvj.exe 2276 nbnbbt.exe 4568 vpvpv.exe 2112 fflflrx.exe 4760 9lxlxxx.exe 384 nhttht.exe 712 pdppd.exe 4640 5flxlll.exe 1748 llrrlfl.exe 2656 nbnnhb.exe 3332 ddvpd.exe 5080 xllxrlf.exe 2184 lfrrlll.exe 2288 tttnbb.exe 1796 dpddd.exe 1684 frrrlxr.exe 2644 nhnhhb.exe 3300 hhhhbb.exe -
resource yara_rule behavioral2/memory/224-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/224-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2284-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2180-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1436-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4888-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2840-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1120-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4416-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2708-209-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ttbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ttthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ffxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bhbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xfxrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 2252 224 9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe 82 PID 224 wrote to memory of 2252 224 9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe 82 PID 224 wrote to memory of 2252 224 9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe 82 PID 2252 wrote to memory of 2284 2252 tnnhbb.exe 83 PID 2252 wrote to memory of 2284 2252 tnnhbb.exe 83 PID 2252 wrote to memory of 2284 2252 tnnhbb.exe 83 PID 2284 wrote to memory of 4748 2284 1dvpv.exe 84 PID 2284 wrote to memory of 4748 2284 1dvpv.exe 84 PID 2284 wrote to memory of 4748 2284 1dvpv.exe 84 PID 4748 wrote to memory of 1540 4748 xrxlfxr.exe 85 PID 4748 wrote to memory of 1540 4748 xrxlfxr.exe 85 PID 4748 wrote to memory of 1540 4748 xrxlfxr.exe 85 PID 1540 wrote to memory of 932 1540 1vdvp.exe 86 PID 1540 wrote to memory of 932 1540 1vdvp.exe 86 PID 1540 wrote to memory of 932 1540 1vdvp.exe 86 PID 932 wrote to memory of 4668 932 ttbbtt.exe 87 PID 932 wrote to memory of 4668 932 ttbbtt.exe 87 PID 932 wrote to memory of 4668 932 ttbbtt.exe 87 PID 4668 wrote to memory of 2180 4668 lfxlxxr.exe 88 PID 4668 wrote to memory of 2180 4668 lfxlxxr.exe 88 PID 4668 wrote to memory of 2180 4668 lfxlxxr.exe 88 PID 2180 wrote to memory of 3124 2180 dddvp.exe 89 PID 2180 wrote to memory of 3124 2180 dddvp.exe 89 PID 2180 wrote to memory of 3124 2180 dddvp.exe 89 PID 3124 wrote to memory of 2944 3124 ffrrxxl.exe 90 PID 3124 wrote to memory of 2944 3124 ffrrxxl.exe 90 PID 3124 wrote to memory of 2944 3124 ffrrxxl.exe 90 PID 2944 wrote to memory of 5016 2944 jjvvp.exe 91 PID 2944 wrote to memory of 5016 2944 jjvvp.exe 91 PID 2944 wrote to memory of 5016 2944 jjvvp.exe 91 PID 5016 wrote to memory of 1220 5016 nbbthb.exe 92 PID 5016 wrote to memory of 1220 5016 nbbthb.exe 92 PID 5016 wrote to memory of 1220 5016 nbbthb.exe 92 PID 1220 wrote to memory of 4676 1220 7vvpj.exe 93 PID 1220 wrote to memory of 4676 1220 7vvpj.exe 93 PID 1220 wrote to memory of 4676 1220 7vvpj.exe 93 PID 4676 wrote to memory of 1340 4676 rlrlxxx.exe 94 PID 4676 wrote to memory of 1340 4676 rlrlxxx.exe 94 PID 4676 wrote to memory of 1340 4676 rlrlxxx.exe 94 PID 1340 wrote to memory of 2236 1340 3ntnhh.exe 95 PID 1340 wrote to memory of 2236 1340 3ntnhh.exe 95 PID 1340 wrote to memory of 2236 1340 3ntnhh.exe 95 PID 2236 wrote to memory of 1436 2236 bnhthh.exe 96 PID 2236 wrote to memory of 1436 2236 bnhthh.exe 96 PID 2236 wrote to memory of 1436 2236 bnhthh.exe 96 PID 1436 wrote to memory of 4888 1436 3xrlrrf.exe 97 PID 1436 wrote to memory of 4888 1436 3xrlrrf.exe 97 PID 1436 wrote to memory of 4888 1436 3xrlrrf.exe 97 PID 4888 wrote to memory of 1804 4888 fxfxxxx.exe 98 PID 4888 wrote to memory of 1804 4888 fxfxxxx.exe 98 PID 4888 wrote to memory of 1804 4888 fxfxxxx.exe 98 PID 1804 wrote to memory of 1440 1804 hbnhbb.exe 99 PID 1804 wrote to memory of 1440 1804 hbnhbb.exe 99 PID 1804 wrote to memory of 1440 1804 hbnhbb.exe 99 PID 1440 wrote to memory of 2840 1440 jpvpj.exe 100 PID 1440 wrote to memory of 2840 1440 jpvpj.exe 100 PID 1440 wrote to memory of 2840 1440 jpvpj.exe 100 PID 2840 wrote to memory of 3252 2840 flxrllf.exe 101 PID 2840 wrote to memory of 3252 2840 flxrllf.exe 101 PID 2840 wrote to memory of 3252 2840 flxrllf.exe 101 PID 3252 wrote to memory of 4356 3252 htnhhh.exe 102 PID 3252 wrote to memory of 4356 3252 htnhhh.exe 102 PID 3252 wrote to memory of 4356 3252 htnhhh.exe 102 PID 4356 wrote to memory of 4628 4356 hththh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe"C:\Users\Admin\AppData\Local\Temp\9752afb716058c6c11257512c9b965d92bd109326bd36256ff03023630ab73d9N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:224 -
\??\c:\tnnhbb.exec:\tnnhbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\1dvpv.exec:\1dvpv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\xrxlfxr.exec:\xrxlfxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\1vdvp.exec:\1vdvp.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\ttbbtt.exec:\ttbbtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\lfxlxxr.exec:\lfxlxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\dddvp.exec:\dddvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\ffrrxxl.exec:\ffrrxxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\jjvvp.exec:\jjvvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\nbbthb.exec:\nbbthb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\7vvpj.exec:\7vvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\rlrlxxx.exec:\rlrlxxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\3ntnhh.exec:\3ntnhh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
\??\c:\bnhthh.exec:\bnhthh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\3xrlrrf.exec:\3xrlrrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\fxfxxxx.exec:\fxfxxxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\hbnhbb.exec:\hbnhbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\jpvpj.exec:\jpvpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\flxrllf.exec:\flxrllf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\htnhhh.exec:\htnhhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\hththh.exec:\hththh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\vddvv.exec:\vddvv.exe23⤵
- Executes dropped EXE
PID:4628 -
\??\c:\llxlfrl.exec:\llxlfrl.exe24⤵
- Executes dropped EXE
PID:1120 -
\??\c:\hbbnhb.exec:\hbbnhb.exe25⤵
- Executes dropped EXE
PID:4492 -
\??\c:\rflfxxx.exec:\rflfxxx.exe26⤵
- Executes dropped EXE
PID:2932 -
\??\c:\nbnhbb.exec:\nbnhbb.exe27⤵
- Executes dropped EXE
PID:692 -
\??\c:\vjjdv.exec:\vjjdv.exe28⤵
- Executes dropped EXE
PID:4672 -
\??\c:\htbtnh.exec:\htbtnh.exe29⤵
- Executes dropped EXE
PID:5092 -
\??\c:\vjdvj.exec:\vjdvj.exe30⤵
- Executes dropped EXE
PID:4416 -
\??\c:\7rxrlfr.exec:\7rxrlfr.exe31⤵
- Executes dropped EXE
PID:2708 -
\??\c:\hnnhtt.exec:\hnnhtt.exe32⤵
- Executes dropped EXE
PID:1488 -
\??\c:\lxxrffx.exec:\lxxrffx.exe33⤵
- Executes dropped EXE
PID:4924 -
\??\c:\3xxfllf.exec:\3xxfllf.exe34⤵
- Executes dropped EXE
PID:1256 -
\??\c:\vvdvp.exec:\vvdvp.exe35⤵
- Executes dropped EXE
PID:3564 -
\??\c:\xxxrfff.exec:\xxxrfff.exe36⤵
- Executes dropped EXE
PID:2868 -
\??\c:\fffxlxr.exec:\fffxlxr.exe37⤵
- Executes dropped EXE
PID:4228 -
\??\c:\nbnhbb.exec:\nbnhbb.exe38⤵
- Executes dropped EXE
PID:3796 -
\??\c:\hbhbth.exec:\hbhbth.exe39⤵
- Executes dropped EXE
PID:3656 -
\??\c:\3ddpd.exec:\3ddpd.exe40⤵
- Executes dropped EXE
PID:5084 -
\??\c:\lrxlffr.exec:\lrxlffr.exe41⤵
- Executes dropped EXE
PID:4744 -
\??\c:\ntthbt.exec:\ntthbt.exe42⤵
- Executes dropped EXE
PID:3488 -
\??\c:\hbbtbb.exec:\hbbtbb.exe43⤵
- Executes dropped EXE
PID:2160 -
\??\c:\ppjdp.exec:\ppjdp.exe44⤵
- Executes dropped EXE
PID:4684 -
\??\c:\lrfrlfr.exec:\lrfrlfr.exe45⤵
- Executes dropped EXE
PID:3004 -
\??\c:\hhhbbt.exec:\hhhbbt.exe46⤵
- Executes dropped EXE
PID:1692 -
\??\c:\vpdjv.exec:\vpdjv.exe47⤵
- Executes dropped EXE
PID:4296 -
\??\c:\9djvj.exec:\9djvj.exe48⤵
- Executes dropped EXE
PID:2808 -
\??\c:\nbnbbt.exec:\nbnbbt.exe49⤵
- Executes dropped EXE
PID:2276 -
\??\c:\vpvpv.exec:\vpvpv.exe50⤵
- Executes dropped EXE
PID:4568 -
\??\c:\fflflrx.exec:\fflflrx.exe51⤵
- Executes dropped EXE
PID:2112 -
\??\c:\9lxlxxx.exec:\9lxlxxx.exe52⤵
- Executes dropped EXE
PID:4760 -
\??\c:\nhttht.exec:\nhttht.exe53⤵
- Executes dropped EXE
PID:384 -
\??\c:\pdppd.exec:\pdppd.exe54⤵
- Executes dropped EXE
PID:712 -
\??\c:\5flxlll.exec:\5flxlll.exe55⤵
- Executes dropped EXE
PID:4640 -
\??\c:\llrrlfl.exec:\llrrlfl.exe56⤵
- Executes dropped EXE
PID:1748 -
\??\c:\nbnnhb.exec:\nbnnhb.exe57⤵
- Executes dropped EXE
PID:2656 -
\??\c:\ddvpd.exec:\ddvpd.exe58⤵
- Executes dropped EXE
PID:3332 -
\??\c:\xllxrlf.exec:\xllxrlf.exe59⤵
- Executes dropped EXE
PID:5080 -
\??\c:\lfrrlll.exec:\lfrrlll.exe60⤵
- Executes dropped EXE
PID:2184 -
\??\c:\tttnbb.exec:\tttnbb.exe61⤵
- Executes dropped EXE
PID:2288 -
\??\c:\dpddd.exec:\dpddd.exe62⤵
- Executes dropped EXE
PID:1796 -
\??\c:\frrrlxr.exec:\frrrlxr.exe63⤵
- Executes dropped EXE
PID:1684 -
\??\c:\nhnhhb.exec:\nhnhhb.exe64⤵
- Executes dropped EXE
PID:2644 -
\??\c:\hhhhbb.exec:\hhhhbb.exe65⤵
- Executes dropped EXE
PID:3300 -
\??\c:\9jjdj.exec:\9jjdj.exe66⤵
- System Location Discovery: System Language Discovery
PID:3620 -
\??\c:\5xxlllr.exec:\5xxlllr.exe67⤵PID:4236
-
\??\c:\9nhhtt.exec:\9nhhtt.exe68⤵PID:4800
-
\??\c:\3bbnbt.exec:\3bbnbt.exe69⤵PID:1116
-
\??\c:\vpdpd.exec:\vpdpd.exe70⤵PID:1340
-
\??\c:\lffrllx.exec:\lffrllx.exe71⤵PID:3828
-
\??\c:\3nttnh.exec:\3nttnh.exe72⤵PID:4656
-
\??\c:\pdvjv.exec:\pdvjv.exe73⤵PID:3860
-
\??\c:\xffrlxr.exec:\xffrlxr.exe74⤵PID:3804
-
\??\c:\bnnhbb.exec:\bnnhbb.exe75⤵PID:1804
-
\??\c:\nthtbt.exec:\nthtbt.exe76⤵PID:5104
-
\??\c:\7ddpd.exec:\7ddpd.exe77⤵PID:3648
-
\??\c:\lxxllll.exec:\lxxllll.exe78⤵PID:3484
-
\??\c:\nttnbb.exec:\nttnbb.exe79⤵PID:1908
-
\??\c:\dpvpd.exec:\dpvpd.exe80⤵PID:2240
-
\??\c:\djjdv.exec:\djjdv.exe81⤵PID:2640
-
\??\c:\1fxrlff.exec:\1fxrlff.exe82⤵PID:4456
-
\??\c:\hntnbt.exec:\hntnbt.exe83⤵PID:5020
-
\??\c:\ppvjj.exec:\ppvjj.exe84⤵PID:5076
-
\??\c:\ffrlxxr.exec:\ffrlxxr.exe85⤵PID:2500
-
\??\c:\9hhbnh.exec:\9hhbnh.exe86⤵PID:1844
-
\??\c:\nbthhh.exec:\nbthhh.exe87⤵PID:2484
-
\??\c:\vjjjv.exec:\vjjjv.exe88⤵PID:852
-
\??\c:\xfrlfxr.exec:\xfrlfxr.exe89⤵PID:5092
-
\??\c:\tntttn.exec:\tntttn.exe90⤵PID:3552
-
\??\c:\3pvjj.exec:\3pvjj.exe91⤵PID:2928
-
\??\c:\ffxrfxr.exec:\ffxrfxr.exe92⤵PID:3436
-
\??\c:\flfrfxr.exec:\flfrfxr.exe93⤵PID:3440
-
\??\c:\3tnbtt.exec:\3tnbtt.exe94⤵PID:3288
-
\??\c:\dvdvp.exec:\dvdvp.exe95⤵PID:1252
-
\??\c:\rffxllf.exec:\rffxllf.exe96⤵PID:3564
-
\??\c:\rfllxxr.exec:\rfllxxr.exe97⤵PID:2904
-
\??\c:\thhbth.exec:\thhbth.exe98⤵PID:1564
-
\??\c:\pdppj.exec:\pdppj.exe99⤵
- System Location Discovery: System Language Discovery
PID:1280 -
\??\c:\fxfxrlf.exec:\fxfxrlf.exe100⤵PID:2260
-
\??\c:\lrlfxxr.exec:\lrlfxxr.exe101⤵PID:432
-
\??\c:\thnnhb.exec:\thnnhb.exe102⤵PID:2272
-
\??\c:\jvdvj.exec:\jvdvj.exe103⤵PID:3676
-
\??\c:\ffxlxxr.exec:\ffxlxxr.exe104⤵PID:3816
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe105⤵PID:5012
-
\??\c:\vdjvp.exec:\vdjvp.exe106⤵PID:4400
-
\??\c:\jddpd.exec:\jddpd.exe107⤵PID:1156
-
\??\c:\7lrlfff.exec:\7lrlfff.exe108⤵PID:3848
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe109⤵PID:4620
-
\??\c:\5hhbth.exec:\5hhbth.exe110⤵PID:2808
-
\??\c:\jddvv.exec:\jddvv.exe111⤵PID:3236
-
\??\c:\djvpd.exec:\djvpd.exe112⤵PID:2116
-
\??\c:\lflxffl.exec:\lflxffl.exe113⤵PID:3928
-
\??\c:\hbtbnb.exec:\hbtbnb.exe114⤵PID:3992
-
\??\c:\9jjvp.exec:\9jjvp.exe115⤵PID:384
-
\??\c:\jdpjj.exec:\jdpjj.exe116⤵PID:532
-
\??\c:\rrrlrlr.exec:\rrrlrlr.exe117⤵PID:4472
-
\??\c:\hntnhb.exec:\hntnhb.exe118⤵PID:4940
-
\??\c:\jdpjv.exec:\jdpjv.exe119⤵PID:4508
-
\??\c:\rffrffr.exec:\rffrffr.exe120⤵PID:3332
-
\??\c:\fxffrrr.exec:\fxffrrr.exe121⤵PID:4496
-
\??\c:\ntbbnn.exec:\ntbbnn.exe122⤵PID:2268
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-