Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe
Resource
win7-20240903-en
General
-
Target
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe
-
Size
81KB
-
MD5
d2f821cac4d7cb591b05b998eeb065d8
-
SHA1
c5f55765f4cb8a55895509b7eb30b78879a8e40c
-
SHA256
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c
-
SHA512
7b2217ed103eea8f69b45f7ef46887970b5209fde5306ff0b316bf00bf83ae6fef53362119c20b8fb7632cd0ff5f37f2d75a91f92703ee6e0cf2de7488584894
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qoHrnZHaY3DLELsn8:ymb3NkkiQ3mdBjFIj+qYjhaoLD8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral1/memory/2228-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-54-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2832-40-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2832-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1204-63-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1204-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2044-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1376-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/484-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1480-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/540-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2280-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1800-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1120-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1940-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ntthtn.exedvppj.exexlxxrlr.exebtbbhb.exe9tthtt.exedvppj.exexflllrl.exetnnbnt.exenhtnbb.exejvddp.exefxflxlx.exetthhbt.exetnbntt.exepdjvd.exexlffxxx.exe1bthnb.exetnhbnn.exevpjdj.exepjjdv.exelfrfllr.exebtntnt.exehbbnbb.exe1jjpd.exerlxxlll.exe1rrfxrl.exehbbbnt.exe1htntt.exejjvjp.exexxllxfr.exetnhnbb.exennbnhh.exe1dpvv.exepdpvd.exexrxffll.exebtnttb.exebnhhtb.exe1tbhtt.exe5pjvj.exedvppd.exefxxfllf.exerlxlrrx.exerllrrxf.exebbhtht.exetnhthh.exeppjvp.exejdvdv.exerlxxrxr.exerllxflx.exennnbtt.exetththh.exeppjdd.exepdpdd.exe9lrxffr.exexrxllxf.exe3tbhtn.exe9tntnt.exevpvdp.exe1jdjj.exerlxlrfr.exexxrflxf.exenbntbn.exe3dpjj.exejdvvp.exejdpdv.exepid process 2692 ntthtn.exe 2824 dvppj.exe 2832 xlxxrlr.exe 2828 btbbhb.exe 2664 9tthtt.exe 1204 dvppj.exe 2672 xflllrl.exe 3020 tnnbnt.exe 3052 nhtnbb.exe 2096 jvddp.exe 2772 fxflxlx.exe 2044 tthhbt.exe 1376 tnbntt.exe 484 pdjvd.exe 1480 xlffxxx.exe 896 1bthnb.exe 540 tnhbnn.exe 2280 vpjdj.exe 1800 pjjdv.exe 1600 lfrfllr.exe 2176 btntnt.exe 2036 hbbnbb.exe 2168 1jjpd.exe 952 rlxxlll.exe 1640 1rrfxrl.exe 2268 hbbbnt.exe 1980 1htntt.exe 1120 jjvjp.exe 1940 xxllxfr.exe 892 tnhnbb.exe 2228 nnbnhh.exe 2804 1dpvv.exe 2676 pdpvd.exe 2832 xrxffll.exe 1560 btnttb.exe 2384 bnhhtb.exe 2712 1tbhtt.exe 2564 5pjvj.exe 1204 dvppd.exe 2600 fxxfllf.exe 1856 rlxlrrx.exe 3012 rllrrxf.exe 2360 bbhtht.exe 2356 tnhthh.exe 816 ppjvp.exe 1764 jdvdv.exe 2860 rlxxrxr.exe 1704 rllxflx.exe 1240 nnnbtt.exe 2888 tththh.exe 1480 ppjdd.exe 604 pdpdd.exe 3060 9lrxffr.exe 2280 xrxllxf.exe 1788 3tbhtn.exe 2320 9tntnt.exe 2316 vpvdp.exe 2116 1jdjj.exe 1792 rlxlrfr.exe 1672 xxrflxf.exe 1500 nbntbn.exe 2432 3dpjj.exe 1360 jdvvp.exe 2000 jdpdv.exe -
Processes:
resource yara_rule behavioral1/memory/2228-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1204-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2044-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1376-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/484-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1480-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/540-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1800-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1120-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1940-272-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
nnbhth.exexrrflrx.exelxxfllx.exefxrxrxf.exenbnhnb.exedpjjv.exerlxflrl.exejdpvv.exebthbhn.exellxfxxf.exethbtht.exefxxrxxl.exe5bhntt.exevpvdv.exelxrrxlx.exe1vddj.exepdpvd.exexrflfff.exelllxrrx.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxfllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxflrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxfxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrrxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrflfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllxrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exentthtn.exedvppj.exexlxxrlr.exebtbbhb.exe9tthtt.exedvppj.exexflllrl.exetnnbnt.exenhtnbb.exejvddp.exefxflxlx.exetthhbt.exetnbntt.exepdjvd.exexlffxxx.exedescription pid process target process PID 2228 wrote to memory of 2692 2228 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe ntthtn.exe PID 2228 wrote to memory of 2692 2228 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe ntthtn.exe PID 2228 wrote to memory of 2692 2228 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe ntthtn.exe PID 2228 wrote to memory of 2692 2228 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe ntthtn.exe PID 2692 wrote to memory of 2824 2692 ntthtn.exe dvppj.exe PID 2692 wrote to memory of 2824 2692 ntthtn.exe dvppj.exe PID 2692 wrote to memory of 2824 2692 ntthtn.exe dvppj.exe PID 2692 wrote to memory of 2824 2692 ntthtn.exe dvppj.exe PID 2824 wrote to memory of 2832 2824 dvppj.exe xlxxrlr.exe PID 2824 wrote to memory of 2832 2824 dvppj.exe xlxxrlr.exe PID 2824 wrote to memory of 2832 2824 dvppj.exe xlxxrlr.exe PID 2824 wrote to memory of 2832 2824 dvppj.exe xlxxrlr.exe PID 2832 wrote to memory of 2828 2832 xlxxrlr.exe btbbhb.exe PID 2832 wrote to memory of 2828 2832 xlxxrlr.exe btbbhb.exe PID 2832 wrote to memory of 2828 2832 xlxxrlr.exe btbbhb.exe PID 2832 wrote to memory of 2828 2832 xlxxrlr.exe btbbhb.exe PID 2828 wrote to memory of 2664 2828 btbbhb.exe 9tthtt.exe PID 2828 wrote to memory of 2664 2828 btbbhb.exe 9tthtt.exe PID 2828 wrote to memory of 2664 2828 btbbhb.exe 9tthtt.exe PID 2828 wrote to memory of 2664 2828 btbbhb.exe 9tthtt.exe PID 2664 wrote to memory of 1204 2664 9tthtt.exe dvppj.exe PID 2664 wrote to memory of 1204 2664 9tthtt.exe dvppj.exe PID 2664 wrote to memory of 1204 2664 9tthtt.exe dvppj.exe PID 2664 wrote to memory of 1204 2664 9tthtt.exe dvppj.exe PID 1204 wrote to memory of 2672 1204 dvppj.exe xflllrl.exe PID 1204 wrote to memory of 2672 1204 dvppj.exe xflllrl.exe PID 1204 wrote to memory of 2672 1204 dvppj.exe xflllrl.exe PID 1204 wrote to memory of 2672 1204 dvppj.exe xflllrl.exe PID 2672 wrote to memory of 3020 2672 xflllrl.exe tnnbnt.exe PID 2672 wrote to memory of 3020 2672 xflllrl.exe tnnbnt.exe PID 2672 wrote to memory of 3020 2672 xflllrl.exe tnnbnt.exe PID 2672 wrote to memory of 3020 2672 xflllrl.exe tnnbnt.exe PID 3020 wrote to memory of 3052 3020 tnnbnt.exe nhtnbb.exe PID 3020 wrote to memory of 3052 3020 tnnbnt.exe nhtnbb.exe PID 3020 wrote to memory of 3052 3020 tnnbnt.exe nhtnbb.exe PID 3020 wrote to memory of 3052 3020 tnnbnt.exe nhtnbb.exe PID 3052 wrote to memory of 2096 3052 nhtnbb.exe jvddp.exe PID 3052 wrote to memory of 2096 3052 nhtnbb.exe jvddp.exe PID 3052 wrote to memory of 2096 3052 nhtnbb.exe jvddp.exe PID 3052 wrote to memory of 2096 3052 nhtnbb.exe jvddp.exe PID 2096 wrote to memory of 2772 2096 jvddp.exe fxflxlx.exe PID 2096 wrote to memory of 2772 2096 jvddp.exe fxflxlx.exe PID 2096 wrote to memory of 2772 2096 jvddp.exe fxflxlx.exe PID 2096 wrote to memory of 2772 2096 jvddp.exe fxflxlx.exe PID 2772 wrote to memory of 2044 2772 fxflxlx.exe tthhbt.exe PID 2772 wrote to memory of 2044 2772 fxflxlx.exe tthhbt.exe PID 2772 wrote to memory of 2044 2772 fxflxlx.exe tthhbt.exe PID 2772 wrote to memory of 2044 2772 fxflxlx.exe tthhbt.exe PID 2044 wrote to memory of 1376 2044 tthhbt.exe tnbntt.exe PID 2044 wrote to memory of 1376 2044 tthhbt.exe tnbntt.exe PID 2044 wrote to memory of 1376 2044 tthhbt.exe tnbntt.exe PID 2044 wrote to memory of 1376 2044 tthhbt.exe tnbntt.exe PID 1376 wrote to memory of 484 1376 tnbntt.exe pdjvd.exe PID 1376 wrote to memory of 484 1376 tnbntt.exe pdjvd.exe PID 1376 wrote to memory of 484 1376 tnbntt.exe pdjvd.exe PID 1376 wrote to memory of 484 1376 tnbntt.exe pdjvd.exe PID 484 wrote to memory of 1480 484 pdjvd.exe xlffxxx.exe PID 484 wrote to memory of 1480 484 pdjvd.exe xlffxxx.exe PID 484 wrote to memory of 1480 484 pdjvd.exe xlffxxx.exe PID 484 wrote to memory of 1480 484 pdjvd.exe xlffxxx.exe PID 1480 wrote to memory of 896 1480 xlffxxx.exe 1bthnb.exe PID 1480 wrote to memory of 896 1480 xlffxxx.exe 1bthnb.exe PID 1480 wrote to memory of 896 1480 xlffxxx.exe 1bthnb.exe PID 1480 wrote to memory of 896 1480 xlffxxx.exe 1bthnb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe"C:\Users\Admin\AppData\Local\Temp\e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\ntthtn.exec:\ntthtn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\dvppj.exec:\dvppj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\xlxxrlr.exec:\xlxxrlr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\btbbhb.exec:\btbbhb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\9tthtt.exec:\9tthtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\dvppj.exec:\dvppj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\xflllrl.exec:\xflllrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\tnnbnt.exec:\tnnbnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\nhtnbb.exec:\nhtnbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\jvddp.exec:\jvddp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\fxflxlx.exec:\fxflxlx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\tthhbt.exec:\tthhbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\tnbntt.exec:\tnbntt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\pdjvd.exec:\pdjvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
\??\c:\xlffxxx.exec:\xlffxxx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
\??\c:\1bthnb.exec:\1bthnb.exe17⤵
- Executes dropped EXE
PID:896 -
\??\c:\tnhbnn.exec:\tnhbnn.exe18⤵
- Executes dropped EXE
PID:540 -
\??\c:\vpjdj.exec:\vpjdj.exe19⤵
- Executes dropped EXE
PID:2280 -
\??\c:\pjjdv.exec:\pjjdv.exe20⤵
- Executes dropped EXE
PID:1800 -
\??\c:\lfrfllr.exec:\lfrfllr.exe21⤵
- Executes dropped EXE
PID:1600 -
\??\c:\btntnt.exec:\btntnt.exe22⤵
- Executes dropped EXE
PID:2176 -
\??\c:\hbbnbb.exec:\hbbnbb.exe23⤵
- Executes dropped EXE
PID:2036 -
\??\c:\1jjpd.exec:\1jjpd.exe24⤵
- Executes dropped EXE
PID:2168 -
\??\c:\rlxxlll.exec:\rlxxlll.exe25⤵
- Executes dropped EXE
PID:952 -
\??\c:\1rrfxrl.exec:\1rrfxrl.exe26⤵
- Executes dropped EXE
PID:1640 -
\??\c:\hbbbnt.exec:\hbbbnt.exe27⤵
- Executes dropped EXE
PID:2268 -
\??\c:\1htntt.exec:\1htntt.exe28⤵
- Executes dropped EXE
PID:1980 -
\??\c:\jjvjp.exec:\jjvjp.exe29⤵
- Executes dropped EXE
PID:1120 -
\??\c:\xxllxfr.exec:\xxllxfr.exe30⤵
- Executes dropped EXE
PID:1940 -
\??\c:\tnhnbb.exec:\tnhnbb.exe31⤵
- Executes dropped EXE
PID:892 -
\??\c:\nnbnhh.exec:\nnbnhh.exe32⤵
- Executes dropped EXE
PID:2228 -
\??\c:\1dpvv.exec:\1dpvv.exe33⤵
- Executes dropped EXE
PID:2804 -
\??\c:\pdpvd.exec:\pdpvd.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676 -
\??\c:\xrxffll.exec:\xrxffll.exe35⤵
- Executes dropped EXE
PID:2832 -
\??\c:\btnttb.exec:\btnttb.exe36⤵
- Executes dropped EXE
PID:1560 -
\??\c:\bnhhtb.exec:\bnhhtb.exe37⤵
- Executes dropped EXE
PID:2384 -
\??\c:\1tbhtt.exec:\1tbhtt.exe38⤵
- Executes dropped EXE
PID:2712 -
\??\c:\5pjvj.exec:\5pjvj.exe39⤵
- Executes dropped EXE
PID:2564 -
\??\c:\dvppd.exec:\dvppd.exe40⤵
- Executes dropped EXE
PID:1204 -
\??\c:\fxxfllf.exec:\fxxfllf.exe41⤵
- Executes dropped EXE
PID:2600 -
\??\c:\rlxlrrx.exec:\rlxlrrx.exe42⤵
- Executes dropped EXE
PID:1856 -
\??\c:\rllrrxf.exec:\rllrrxf.exe43⤵
- Executes dropped EXE
PID:3012 -
\??\c:\bbhtht.exec:\bbhtht.exe44⤵
- Executes dropped EXE
PID:2360 -
\??\c:\tnhthh.exec:\tnhthh.exe45⤵
- Executes dropped EXE
PID:2356 -
\??\c:\ppjvp.exec:\ppjvp.exe46⤵
- Executes dropped EXE
PID:816 -
\??\c:\jdvdv.exec:\jdvdv.exe47⤵
- Executes dropped EXE
PID:1764 -
\??\c:\rlxxrxr.exec:\rlxxrxr.exe48⤵
- Executes dropped EXE
PID:2860 -
\??\c:\rllxflx.exec:\rllxflx.exe49⤵
- Executes dropped EXE
PID:1704 -
\??\c:\nnnbtt.exec:\nnnbtt.exe50⤵
- Executes dropped EXE
PID:1240 -
\??\c:\tththh.exec:\tththh.exe51⤵
- Executes dropped EXE
PID:2888 -
\??\c:\ppjdd.exec:\ppjdd.exe52⤵
- Executes dropped EXE
PID:1480 -
\??\c:\pdpdd.exec:\pdpdd.exe53⤵
- Executes dropped EXE
PID:604 -
\??\c:\9lrxffr.exec:\9lrxffr.exe54⤵
- Executes dropped EXE
PID:3060 -
\??\c:\xrxllxf.exec:\xrxllxf.exe55⤵
- Executes dropped EXE
PID:2280 -
\??\c:\3tbhtn.exec:\3tbhtn.exe56⤵
- Executes dropped EXE
PID:1788 -
\??\c:\9tntnt.exec:\9tntnt.exe57⤵
- Executes dropped EXE
PID:2320 -
\??\c:\vpvdp.exec:\vpvdp.exe58⤵
- Executes dropped EXE
PID:2316 -
\??\c:\1jdjj.exec:\1jdjj.exe59⤵
- Executes dropped EXE
PID:2116 -
\??\c:\rlxlrfr.exec:\rlxlrfr.exe60⤵
- Executes dropped EXE
PID:1792 -
\??\c:\xxrflxf.exec:\xxrflxf.exe61⤵
- Executes dropped EXE
PID:1672 -
\??\c:\nbntbn.exec:\nbntbn.exe62⤵
- Executes dropped EXE
PID:1500 -
\??\c:\3dpjj.exec:\3dpjj.exe63⤵
- Executes dropped EXE
PID:2432 -
\??\c:\jdvvp.exec:\jdvvp.exe64⤵
- Executes dropped EXE
PID:1360 -
\??\c:\jdpdv.exec:\jdpdv.exe65⤵
- Executes dropped EXE
PID:2000 -
\??\c:\rlflrrx.exec:\rlflrrx.exe66⤵PID:2972
-
\??\c:\hbnnhh.exec:\hbnnhh.exe67⤵PID:992
-
\??\c:\tnbhtt.exec:\tnbhtt.exe68⤵PID:1944
-
\??\c:\pjppv.exec:\pjppv.exe69⤵PID:1940
-
\??\c:\dvvvj.exec:\dvvvj.exe70⤵PID:1848
-
\??\c:\xrfrxfr.exec:\xrfrxfr.exe71⤵PID:2120
-
\??\c:\frfflrx.exec:\frfflrx.exe72⤵PID:2708
-
\??\c:\nhbhbt.exec:\nhbhbt.exe73⤵PID:2780
-
\??\c:\thtbtt.exec:\thtbtt.exe74⤵PID:2736
-
\??\c:\vpjjp.exec:\vpjjp.exe75⤵PID:2668
-
\??\c:\vjjpv.exec:\vjjpv.exe76⤵PID:2808
-
\??\c:\lfflrrx.exec:\lfflrrx.exe77⤵PID:2584
-
\??\c:\5rrllrl.exec:\5rrllrl.exe78⤵PID:2568
-
\??\c:\3tnntb.exec:\3tnntb.exe79⤵PID:2052
-
\??\c:\hbnnhh.exec:\hbnnhh.exe80⤵PID:2892
-
\??\c:\pjddv.exec:\pjddv.exe81⤵PID:2900
-
\??\c:\vpjjj.exec:\vpjjj.exe82⤵PID:2648
-
\??\c:\1rxfrfl.exec:\1rxfrfl.exe83⤵PID:2148
-
\??\c:\btbntb.exec:\btbntb.exe84⤵PID:2732
-
\??\c:\nhtbbh.exec:\nhtbbh.exe85⤵PID:2308
-
\??\c:\jdjpd.exec:\jdjpd.exe86⤵PID:344
-
\??\c:\vpjvj.exec:\vpjvj.exe87⤵PID:1628
-
\??\c:\lfrrffl.exec:\lfrrffl.exe88⤵PID:1424
-
\??\c:\1fxfrxr.exec:\1fxfrxr.exe89⤵PID:2880
-
\??\c:\tntnbh.exec:\tntnbh.exe90⤵PID:2652
-
\??\c:\hbnntb.exec:\hbnntb.exe91⤵PID:2888
-
\??\c:\jvjjp.exec:\jvjjp.exe92⤵PID:1040
-
\??\c:\jjdjd.exec:\jjdjd.exe93⤵PID:2404
-
\??\c:\9rrxllx.exec:\9rrxllx.exe94⤵PID:2172
-
\??\c:\bthbhh.exec:\bthbhh.exe95⤵PID:1444
-
\??\c:\tnhntt.exec:\tnhntt.exe96⤵PID:1984
-
\??\c:\7djjj.exec:\7djjj.exe97⤵PID:1132
-
\??\c:\dvdpv.exec:\dvdpv.exe98⤵PID:1920
-
\??\c:\xlflrxf.exec:\xlflrxf.exe99⤵PID:1348
-
\??\c:\lrfxllf.exec:\lrfxllf.exe100⤵PID:2168
-
\??\c:\9tthtt.exec:\9tthtt.exe101⤵PID:1864
-
\??\c:\nnbhtt.exec:\nnbhtt.exe102⤵PID:2496
-
\??\c:\pjjpv.exec:\pjjpv.exe103⤵PID:2264
-
\??\c:\vvppp.exec:\vvppp.exe104⤵PID:1992
-
\??\c:\ttnthh.exec:\ttnthh.exe105⤵PID:2944
-
\??\c:\nnhnnt.exec:\nnhnnt.exe106⤵PID:2972
-
\??\c:\dvppv.exec:\dvppv.exe107⤵PID:1320
-
\??\c:\vjvvd.exec:\vjvvd.exe108⤵PID:1000
-
\??\c:\xfllllr.exec:\xfllllr.exe109⤵PID:2644
-
\??\c:\fxrxrxf.exec:\fxrxrxf.exe110⤵
- System Location Discovery: System Language Discovery
PID:2144 -
\??\c:\bthtbt.exec:\bthtbt.exe111⤵PID:2804
-
\??\c:\tnbhbb.exec:\tnbhbb.exe112⤵PID:2684
-
\??\c:\nbttbh.exec:\nbttbh.exe113⤵PID:2884
-
\??\c:\vpjvd.exec:\vpjvd.exe114⤵PID:2776
-
\??\c:\vvjpd.exec:\vvjpd.exe115⤵PID:2384
-
\??\c:\xxflrrx.exec:\xxflrrx.exe116⤵PID:2548
-
\??\c:\3xrlxfr.exec:\3xrlxfr.exe117⤵PID:2612
-
\??\c:\tnnthn.exec:\tnnthn.exe118⤵PID:3008
-
\??\c:\nhthtt.exec:\nhthtt.exe119⤵PID:1280
-
\??\c:\dvpvj.exec:\dvpvj.exe120⤵PID:3020
-
\??\c:\jjvpv.exec:\jjvpv.exe121⤵PID:2220
-
\??\c:\fxxrxxl.exec:\fxxrxxl.exe122⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-