Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 12:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
120 seconds
General
-
Target
0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe
-
Size
230KB
-
MD5
7dfb0b8bdefd2065aa6bf6706132ca20
-
SHA1
f3e4f7f1495b9246d3d5b7c007db9cee5d5e4b04
-
SHA256
0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58
-
SHA512
58eef338c4ede6ba3447d670ae1814bbe46d00c786141d78ed6e6505a03cd1d692c1c57bb53b096a556aaa1767a6aa01224d84f5128eb4f4d4f9a9d67268330d
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1ff:n3C9BRo7MlrWKo+lxKk1ff
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2432-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1672-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2860-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1144-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/112-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2452-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2024-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/564-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3024-225-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1776-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/948-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1836-279-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2436-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-297-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2432 rrflrxf.exe 2860 ttbthh.exe 2732 jvdjv.exe 2640 rrflxlx.exe 2744 thbttt.exe 2600 dppdv.exe 2160 hnhhnh.exe 1676 9bthth.exe 2052 rflffff.exe 1144 ffxxxlx.exe 1832 5jjpv.exe 2028 dpppv.exe 112 hhtthn.exe 2424 5tbbnh.exe 2452 rlrxfrx.exe 2024 nntnhb.exe 564 pvvjd.exe 2568 rfffxxx.exe 2296 nhbbhh.exe 2484 djdjp.exe 2128 rxrlfrr.exe 3024 nbhhnh.exe 1348 lrrflxl.exe 1776 bbtbbh.exe 948 1jvdj.exe 1252 1rfflrx.exe 2540 hnhbnt.exe 1836 pdvjv.exe 2436 5lxrffl.exe 2980 9nttbb.exe 2264 jjpdd.exe 2736 fllrlrl.exe 2316 nbhbhh.exe 2868 vdddp.exe 2944 5lrflfx.exe 2968 tbnbnt.exe 2928 btnhtt.exe 1872 ppjdd.exe 2684 3rrxlll.exe 3068 lfxfrxr.exe 2160 hththn.exe 2428 jvvjj.exe 2056 5xlflff.exe 2520 thbbbt.exe 476 thnhnb.exe 1832 vvvjd.exe 2804 rxxrlfx.exe 2352 rflffxr.exe 1128 5nbbhb.exe 2020 vpjvd.exe 2964 xxffflr.exe 1696 9hthtb.exe 2000 7bntbh.exe 2284 jvpjj.exe 1948 flxrrfr.exe 2296 rlrllff.exe 1884 tthbtn.exe 1864 1tnthb.exe 2092 dvvdj.exe 1540 djddp.exe 1760 3rxllfx.exe 2328 thtntt.exe 1440 hhtbtt.exe 2180 3pdvd.exe -
resource yara_rule behavioral1/memory/1672-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1672-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1144-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2452-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2024-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/564-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3024-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/948-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-270-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1836-279-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-288-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-297-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rfxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnthhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3djjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrxxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lfrxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hbbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnntnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7htbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllxffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxlxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrffrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2432 1672 0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe 30 PID 1672 wrote to memory of 2432 1672 0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe 30 PID 1672 wrote to memory of 2432 1672 0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe 30 PID 1672 wrote to memory of 2432 1672 0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe 30 PID 2432 wrote to memory of 2860 2432 rrflrxf.exe 31 PID 2432 wrote to memory of 2860 2432 rrflrxf.exe 31 PID 2432 wrote to memory of 2860 2432 rrflrxf.exe 31 PID 2432 wrote to memory of 2860 2432 rrflrxf.exe 31 PID 2860 wrote to memory of 2732 2860 ttbthh.exe 32 PID 2860 wrote to memory of 2732 2860 ttbthh.exe 32 PID 2860 wrote to memory of 2732 2860 ttbthh.exe 32 PID 2860 wrote to memory of 2732 2860 ttbthh.exe 32 PID 2732 wrote to memory of 2640 2732 jvdjv.exe 33 PID 2732 wrote to memory of 2640 2732 jvdjv.exe 33 PID 2732 wrote to memory of 2640 2732 jvdjv.exe 33 PID 2732 wrote to memory of 2640 2732 jvdjv.exe 33 PID 2640 wrote to memory of 2744 2640 rrflxlx.exe 34 PID 2640 wrote to memory of 2744 2640 rrflxlx.exe 34 PID 2640 wrote to memory of 2744 2640 rrflxlx.exe 34 PID 2640 wrote to memory of 2744 2640 rrflxlx.exe 34 PID 2744 wrote to memory of 2600 2744 thbttt.exe 35 PID 2744 wrote to memory of 2600 2744 thbttt.exe 35 PID 2744 wrote to memory of 2600 2744 thbttt.exe 35 PID 2744 wrote to memory of 2600 2744 thbttt.exe 35 PID 2600 wrote to memory of 2160 2600 dppdv.exe 36 PID 2600 wrote to memory of 2160 2600 dppdv.exe 36 PID 2600 wrote to memory of 2160 2600 dppdv.exe 36 PID 2600 wrote to memory of 2160 2600 dppdv.exe 36 PID 2160 wrote to memory of 1676 2160 hnhhnh.exe 37 PID 2160 wrote to memory of 1676 2160 hnhhnh.exe 37 PID 2160 wrote to memory of 1676 2160 hnhhnh.exe 37 PID 2160 wrote to memory of 1676 2160 hnhhnh.exe 37 PID 1676 wrote to memory of 2052 1676 9bthth.exe 38 PID 1676 wrote to memory of 2052 1676 9bthth.exe 38 PID 1676 wrote to memory of 2052 1676 9bthth.exe 38 PID 1676 wrote to memory of 2052 1676 9bthth.exe 38 PID 2052 wrote to memory of 1144 2052 rflffff.exe 39 PID 2052 wrote to memory of 1144 2052 rflffff.exe 39 PID 2052 wrote to memory of 1144 2052 rflffff.exe 39 PID 2052 wrote to memory of 1144 2052 rflffff.exe 39 PID 1144 wrote to memory of 1832 1144 ffxxxlx.exe 40 PID 1144 wrote to memory of 1832 1144 ffxxxlx.exe 40 PID 1144 wrote to memory of 1832 1144 ffxxxlx.exe 40 PID 1144 wrote to memory of 1832 1144 ffxxxlx.exe 40 PID 1832 wrote to memory of 2028 1832 5jjpv.exe 41 PID 1832 wrote to memory of 2028 1832 5jjpv.exe 41 PID 1832 wrote to memory of 2028 1832 5jjpv.exe 41 PID 1832 wrote to memory of 2028 1832 5jjpv.exe 41 PID 2028 wrote to memory of 112 2028 dpppv.exe 42 PID 2028 wrote to memory of 112 2028 dpppv.exe 42 PID 2028 wrote to memory of 112 2028 dpppv.exe 42 PID 2028 wrote to memory of 112 2028 dpppv.exe 42 PID 112 wrote to memory of 2424 112 hhtthn.exe 43 PID 112 wrote to memory of 2424 112 hhtthn.exe 43 PID 112 wrote to memory of 2424 112 hhtthn.exe 43 PID 112 wrote to memory of 2424 112 hhtthn.exe 43 PID 2424 wrote to memory of 2452 2424 5tbbnh.exe 44 PID 2424 wrote to memory of 2452 2424 5tbbnh.exe 44 PID 2424 wrote to memory of 2452 2424 5tbbnh.exe 44 PID 2424 wrote to memory of 2452 2424 5tbbnh.exe 44 PID 2452 wrote to memory of 2024 2452 rlrxfrx.exe 45 PID 2452 wrote to memory of 2024 2452 rlrxfrx.exe 45 PID 2452 wrote to memory of 2024 2452 rlrxfrx.exe 45 PID 2452 wrote to memory of 2024 2452 rlrxfrx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe"C:\Users\Admin\AppData\Local\Temp\0b4dfd2015d5cc1ab7c5be11f86b97df47765949bfefe8cfa2b45ccbf473ca58N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\rrflrxf.exec:\rrflrxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\ttbthh.exec:\ttbthh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\jvdjv.exec:\jvdjv.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\rrflxlx.exec:\rrflxlx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\thbttt.exec:\thbttt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\dppdv.exec:\dppdv.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\hnhhnh.exec:\hnhhnh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\9bthth.exec:\9bthth.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\rflffff.exec:\rflffff.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\ffxxxlx.exec:\ffxxxlx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\5jjpv.exec:\5jjpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\dpppv.exec:\dpppv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\hhtthn.exec:\hhtthn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\5tbbnh.exec:\5tbbnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\rlrxfrx.exec:\rlrxfrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\nntnhb.exec:\nntnhb.exe17⤵
- Executes dropped EXE
PID:2024 -
\??\c:\pvvjd.exec:\pvvjd.exe18⤵
- Executes dropped EXE
PID:564 -
\??\c:\rfffxxx.exec:\rfffxxx.exe19⤵
- Executes dropped EXE
PID:2568 -
\??\c:\nhbbhh.exec:\nhbbhh.exe20⤵
- Executes dropped EXE
PID:2296 -
\??\c:\djdjp.exec:\djdjp.exe21⤵
- Executes dropped EXE
PID:2484 -
\??\c:\rxrlfrr.exec:\rxrlfrr.exe22⤵
- Executes dropped EXE
PID:2128 -
\??\c:\nbhhnh.exec:\nbhhnh.exe23⤵
- Executes dropped EXE
PID:3024 -
\??\c:\lrrflxl.exec:\lrrflxl.exe24⤵
- Executes dropped EXE
PID:1348 -
\??\c:\bbtbbh.exec:\bbtbbh.exe25⤵
- Executes dropped EXE
PID:1776 -
\??\c:\1jvdj.exec:\1jvdj.exe26⤵
- Executes dropped EXE
PID:948 -
\??\c:\1rfflrx.exec:\1rfflrx.exe27⤵
- Executes dropped EXE
PID:1252 -
\??\c:\hnhbnt.exec:\hnhbnt.exe28⤵
- Executes dropped EXE
PID:2540 -
\??\c:\pdvjv.exec:\pdvjv.exe29⤵
- Executes dropped EXE
PID:1836 -
\??\c:\5lxrffl.exec:\5lxrffl.exe30⤵
- Executes dropped EXE
PID:2436 -
\??\c:\9nttbb.exec:\9nttbb.exe31⤵
- Executes dropped EXE
PID:2980 -
\??\c:\jjpdd.exec:\jjpdd.exe32⤵
- Executes dropped EXE
PID:2264 -
\??\c:\fllrlrl.exec:\fllrlrl.exe33⤵
- Executes dropped EXE
PID:2736 -
\??\c:\nbhbhh.exec:\nbhbhh.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316 -
\??\c:\vdddp.exec:\vdddp.exe35⤵
- Executes dropped EXE
PID:2868 -
\??\c:\5lrflfx.exec:\5lrflfx.exe36⤵
- Executes dropped EXE
PID:2944 -
\??\c:\tbnbnt.exec:\tbnbnt.exe37⤵
- Executes dropped EXE
PID:2968 -
\??\c:\btnhtt.exec:\btnhtt.exe38⤵
- Executes dropped EXE
PID:2928 -
\??\c:\ppjdd.exec:\ppjdd.exe39⤵
- Executes dropped EXE
PID:1872 -
\??\c:\3rrxlll.exec:\3rrxlll.exe40⤵
- Executes dropped EXE
PID:2684 -
\??\c:\lfxfrxr.exec:\lfxfrxr.exe41⤵
- Executes dropped EXE
PID:3068 -
\??\c:\hththn.exec:\hththn.exe42⤵
- Executes dropped EXE
PID:2160 -
\??\c:\jvvjj.exec:\jvvjj.exe43⤵
- Executes dropped EXE
PID:2428 -
\??\c:\5xlflff.exec:\5xlflff.exe44⤵
- Executes dropped EXE
PID:2056 -
\??\c:\thbbbt.exec:\thbbbt.exe45⤵
- Executes dropped EXE
PID:2520 -
\??\c:\thnhnb.exec:\thnhnb.exe46⤵
- Executes dropped EXE
PID:476 -
\??\c:\vvvjd.exec:\vvvjd.exe47⤵
- Executes dropped EXE
PID:1832 -
\??\c:\rxxrlfx.exec:\rxxrlfx.exe48⤵
- Executes dropped EXE
PID:2804 -
\??\c:\rflffxr.exec:\rflffxr.exe49⤵
- Executes dropped EXE
PID:2352 -
\??\c:\5nbbhb.exec:\5nbbhb.exe50⤵
- Executes dropped EXE
PID:1128 -
\??\c:\vpjvd.exec:\vpjvd.exe51⤵
- Executes dropped EXE
PID:2020 -
\??\c:\xxffflr.exec:\xxffflr.exe52⤵
- Executes dropped EXE
PID:2964 -
\??\c:\9hthtb.exec:\9hthtb.exe53⤵
- Executes dropped EXE
PID:1696 -
\??\c:\7bntbh.exec:\7bntbh.exe54⤵
- Executes dropped EXE
PID:2000 -
\??\c:\jvpjj.exec:\jvpjj.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284 -
\??\c:\flxrrfr.exec:\flxrrfr.exe56⤵
- Executes dropped EXE
PID:1948 -
\??\c:\rlrllff.exec:\rlrllff.exe57⤵
- Executes dropped EXE
PID:2296 -
\??\c:\tthbtn.exec:\tthbtn.exe58⤵
- Executes dropped EXE
PID:1884 -
\??\c:\1tnthb.exec:\1tnthb.exe59⤵
- Executes dropped EXE
PID:1864 -
\??\c:\dvvdj.exec:\dvvdj.exe60⤵
- Executes dropped EXE
PID:2092 -
\??\c:\djddp.exec:\djddp.exe61⤵
- Executes dropped EXE
PID:1540 -
\??\c:\3rxllfx.exec:\3rxllfx.exe62⤵
- Executes dropped EXE
PID:1760 -
\??\c:\thtntt.exec:\thtntt.exe63⤵
- Executes dropped EXE
PID:2328 -
\??\c:\hhtbtt.exec:\hhtbtt.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1440 -
\??\c:\3pdvd.exec:\3pdvd.exe65⤵
- Executes dropped EXE
PID:2180 -
\??\c:\rflflll.exec:\rflflll.exe66⤵PID:2088
-
\??\c:\9hntbt.exec:\9hntbt.exe67⤵PID:2512
-
\??\c:\tttnnn.exec:\tttnnn.exe68⤵PID:1692
-
\??\c:\pdjpp.exec:\pdjpp.exe69⤵PID:3032
-
\??\c:\pdjvj.exec:\pdjvj.exe70⤵PID:2416
-
\??\c:\7lrxfxx.exec:\7lrxfxx.exe71⤵PID:2980
-
\??\c:\tttbnb.exec:\tttbnb.exe72⤵PID:3008
-
\??\c:\jdjpv.exec:\jdjpv.exe73⤵PID:1424
-
\??\c:\ddpdv.exec:\ddpdv.exe74⤵PID:2612
-
\??\c:\lllxlxl.exec:\lllxlxl.exe75⤵PID:2204
-
\??\c:\nbnnnn.exec:\nbnnnn.exe76⤵PID:2828
-
\??\c:\9nbbtt.exec:\9nbbtt.exe77⤵
- System Location Discovery: System Language Discovery
PID:2908 -
\??\c:\djvdj.exec:\djvdj.exe78⤵PID:2608
-
\??\c:\1llxlfr.exec:\1llxlfr.exe79⤵PID:2680
-
\??\c:\nntbhh.exec:\nntbhh.exe80⤵PID:2616
-
\??\c:\5htnht.exec:\5htnht.exe81⤵PID:576
-
\??\c:\jjjjd.exec:\jjjjd.exe82⤵PID:888
-
\??\c:\xxfflrx.exec:\xxfflrx.exe83⤵PID:1676
-
\??\c:\bbhtth.exec:\bbhtth.exe84⤵PID:2052
-
\??\c:\1tbnth.exec:\1tbnth.exe85⤵PID:2832
-
\??\c:\pppvp.exec:\pppvp.exe86⤵PID:1396
-
\??\c:\flxlxrl.exec:\flxlxrl.exe87⤵PID:2952
-
\??\c:\frlllrx.exec:\frlllrx.exe88⤵PID:2836
-
\??\c:\nhbbnt.exec:\nhbbnt.exe89⤵PID:112
-
\??\c:\vpppd.exec:\vpppd.exe90⤵PID:1476
-
\??\c:\frxrxrr.exec:\frxrxrr.exe91⤵PID:2644
-
\??\c:\xlfxrff.exec:\xlfxrff.exe92⤵PID:620
-
\??\c:\7hnbtt.exec:\7hnbtt.exe93⤵PID:1316
-
\??\c:\7dpdp.exec:\7dpdp.exe94⤵
- System Location Discovery: System Language Discovery
PID:584 -
\??\c:\dpdjp.exec:\dpdjp.exe95⤵
- System Location Discovery: System Language Discovery
PID:2248 -
\??\c:\rrfxxlx.exec:\rrfxxlx.exe96⤵PID:2224
-
\??\c:\nhtbnb.exec:\nhtbnb.exe97⤵PID:2044
-
\??\c:\1nhntt.exec:\1nhntt.exe98⤵
- System Location Discovery: System Language Discovery
PID:2800 -
\??\c:\vdvvj.exec:\vdvvj.exe99⤵PID:1816
-
\??\c:\vjdvj.exec:\vjdvj.exe100⤵PID:1336
-
\??\c:\rrlrfrf.exec:\rrlrfrf.exe101⤵PID:2528
-
\??\c:\btttbb.exec:\btttbb.exe102⤵PID:688
-
\??\c:\bbnhbn.exec:\bbnhbn.exe103⤵PID:568
-
\??\c:\dvpvp.exec:\dvpvp.exe104⤵PID:920
-
\??\c:\llflxlx.exec:\llflxlx.exe105⤵PID:772
-
\??\c:\7fxfxfr.exec:\7fxfxfr.exe106⤵PID:1848
-
\??\c:\htbbtn.exec:\htbbtn.exe107⤵PID:1916
-
\??\c:\bbnhth.exec:\bbnhth.exe108⤵PID:2524
-
\??\c:\ppjvd.exec:\ppjvd.exe109⤵PID:2436
-
\??\c:\xfrxxfr.exec:\xfrxxfr.exe110⤵PID:1672
-
\??\c:\1bntbh.exec:\1bntbh.exe111⤵PID:2432
-
\??\c:\hhbnnh.exec:\hhbnnh.exe112⤵PID:1600
-
\??\c:\jvdvv.exec:\jvdvv.exe113⤵PID:2764
-
\??\c:\xlflllx.exec:\xlflllx.exe114⤵PID:2768
-
\??\c:\rffrxrx.exec:\rffrxrx.exe115⤵PID:2708
-
\??\c:\hthbhn.exec:\hthbhn.exe116⤵PID:2920
-
\??\c:\jjppd.exec:\jjppd.exe117⤵PID:2744
-
\??\c:\rrlfffx.exec:\rrlfffx.exe118⤵PID:2664
-
\??\c:\nbttbb.exec:\nbttbb.exe119⤵PID:2068
-
\??\c:\nbnntt.exec:\nbnntt.exe120⤵PID:800
-
\??\c:\jpvpj.exec:\jpvpj.exe121⤵PID:2592
-
\??\c:\jjvvj.exec:\jjvvj.exe122⤵PID:2124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-