Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 00:16
Static task
static1
Behavioral task
behavioral1
Sample
a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe
Resource
win7-20240903-en
General
-
Target
a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe
-
Size
107KB
-
MD5
2ac1116405c57fc335d23409febeb856
-
SHA1
1c542ff1dc9b1818279da414930364a692381bb1
-
SHA256
a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1
-
SHA512
a212131585377b177a92400a2f50cbd436c4a6104618b9cc6bd6bcb61fb2929cadd17318cf21c0c87f26ad49f1b63f855fce91f34ceecd3e3ed0024280394cc8
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LAIb+t7uybUvDoC5B:n3C9BRo/AI2ujc2
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1812-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-49-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2588-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1824-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3068-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1476-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1496-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/772-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1044-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/448-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
5tntbb.exejpvvv.exe1xffrxl.exenhtbnh.exennbntt.exelxrxxxf.exennhhhb.exepjvvv.exepjddj.exe1frflrx.exe9nhhnn.exedvjvd.exeddpvv.exehnnhbt.exennhbhb.exejjddj.exe7lxflxf.exe3thhtb.exehnnnnt.exe7ddvd.exexxllrrf.exehnbhbb.exehhtbnn.exe9pddv.exepvpdj.exeflfflrf.exebhnhbn.exejjdjd.exevvppp.exexrllxxl.exehhhntt.exevpjpd.exe1pvjj.exe9xrfrrx.exe1fxflrf.exe3tnbhh.exe1bnbbb.exehbtntn.exevvjpv.exevvjpv.exerrxxllx.exexlrrlrr.exe3bnthh.exe9nhbtt.exe9dpjj.exe5jvpv.exe3lxrxlr.exe7llrxxf.exettbnhn.exebthhhb.exeddpjp.exeppppd.exerrrxffr.exellrfrxl.exe5tbbnt.exebbhtbn.exe7jdjv.exeppdjp.exe5vvdp.exelfxxxxf.exe5fllflx.exettnnnt.exennbhnn.exevpvdj.exepid process 1724 5tntbb.exe 2788 jpvvv.exe 2772 1xffrxl.exe 2588 nhtbnh.exe 2760 nnbntt.exe 2572 lxrxxxf.exe 3068 nnhhhb.exe 1824 pjvvv.exe 2208 pjddj.exe 1784 1frflrx.exe 1476 9nhhnn.exe 2852 dvjvd.exe 1496 ddpvv.exe 2744 hnnhbt.exe 2880 nnhbhb.exe 772 jjddj.exe 3000 7lxflxf.exe 1044 3thhtb.exe 1816 hnnnnt.exe 2748 7ddvd.exe 448 xxllrrf.exe 1648 hnbhbb.exe 2524 hhtbnn.exe 872 9pddv.exe 2252 pvpdj.exe 2340 flfflrf.exe 2460 bhnhbn.exe 2520 jjdjd.exe 2456 vvppp.exe 2024 xrllxxl.exe 2420 hhhntt.exe 1980 vpjpd.exe 2708 1pvjj.exe 2560 9xrfrrx.exe 2716 1fxflrf.exe 2452 3tnbhh.exe 2776 1bnbbb.exe 2552 hbtntn.exe 2616 vvjpv.exe 2572 vvjpv.exe 2180 rrxxllx.exe 2620 xlrrlrr.exe 2220 3bnthh.exe 2128 9nhbtt.exe 2876 9dpjj.exe 2244 5jvpv.exe 2656 3lxrxlr.exe 688 7llrxxf.exe 2860 ttbnhn.exe 1496 bthhhb.exe 788 ddpjp.exe 696 ppppd.exe 1912 rrrxffr.exe 1264 llrfrxl.exe 2400 5tbbnt.exe 2368 bbhtbn.exe 2388 7jdjv.exe 2988 ppdjp.exe 1296 5vvdp.exe 1284 lfxxxxf.exe 1516 5fllflx.exe 1272 ttnnnt.exe 2120 nnbhnn.exe 2252 vpvdj.exe -
Processes:
resource yara_rule behavioral1/memory/1812-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1824-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1476-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/772-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1044-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/448-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-282-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ttbbhh.exettbhnn.exenbhbhb.exe5ddjd.exevvpdj.exe5pdjj.exellflxxf.exe9nhhhh.exeppjpj.exehnbnbb.exepjvpd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llflxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe5tntbb.exejpvvv.exe1xffrxl.exenhtbnh.exennbntt.exelxrxxxf.exennhhhb.exepjvvv.exepjddj.exe1frflrx.exe9nhhnn.exedvjvd.exeddpvv.exehnnhbt.exennhbhb.exedescription pid process target process PID 1812 wrote to memory of 1724 1812 a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe 5tntbb.exe PID 1812 wrote to memory of 1724 1812 a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe 5tntbb.exe PID 1812 wrote to memory of 1724 1812 a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe 5tntbb.exe PID 1812 wrote to memory of 1724 1812 a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe 5tntbb.exe PID 1724 wrote to memory of 2788 1724 5tntbb.exe jpvvv.exe PID 1724 wrote to memory of 2788 1724 5tntbb.exe jpvvv.exe PID 1724 wrote to memory of 2788 1724 5tntbb.exe jpvvv.exe PID 1724 wrote to memory of 2788 1724 5tntbb.exe jpvvv.exe PID 2788 wrote to memory of 2772 2788 jpvvv.exe 1xffrxl.exe PID 2788 wrote to memory of 2772 2788 jpvvv.exe 1xffrxl.exe PID 2788 wrote to memory of 2772 2788 jpvvv.exe 1xffrxl.exe PID 2788 wrote to memory of 2772 2788 jpvvv.exe 1xffrxl.exe PID 2772 wrote to memory of 2588 2772 1xffrxl.exe nhtbnh.exe PID 2772 wrote to memory of 2588 2772 1xffrxl.exe nhtbnh.exe PID 2772 wrote to memory of 2588 2772 1xffrxl.exe nhtbnh.exe PID 2772 wrote to memory of 2588 2772 1xffrxl.exe nhtbnh.exe PID 2588 wrote to memory of 2760 2588 nhtbnh.exe nnbntt.exe PID 2588 wrote to memory of 2760 2588 nhtbnh.exe nnbntt.exe PID 2588 wrote to memory of 2760 2588 nhtbnh.exe nnbntt.exe PID 2588 wrote to memory of 2760 2588 nhtbnh.exe nnbntt.exe PID 2760 wrote to memory of 2572 2760 nnbntt.exe lxrxxxf.exe PID 2760 wrote to memory of 2572 2760 nnbntt.exe lxrxxxf.exe PID 2760 wrote to memory of 2572 2760 nnbntt.exe lxrxxxf.exe PID 2760 wrote to memory of 2572 2760 nnbntt.exe lxrxxxf.exe PID 2572 wrote to memory of 3068 2572 lxrxxxf.exe nnhhhb.exe PID 2572 wrote to memory of 3068 2572 lxrxxxf.exe nnhhhb.exe PID 2572 wrote to memory of 3068 2572 lxrxxxf.exe nnhhhb.exe PID 2572 wrote to memory of 3068 2572 lxrxxxf.exe nnhhhb.exe PID 3068 wrote to memory of 1824 3068 nnhhhb.exe pjvvv.exe PID 3068 wrote to memory of 1824 3068 nnhhhb.exe pjvvv.exe PID 3068 wrote to memory of 1824 3068 nnhhhb.exe pjvvv.exe PID 3068 wrote to memory of 1824 3068 nnhhhb.exe pjvvv.exe PID 1824 wrote to memory of 2208 1824 pjvvv.exe pjddj.exe PID 1824 wrote to memory of 2208 1824 pjvvv.exe pjddj.exe PID 1824 wrote to memory of 2208 1824 pjvvv.exe pjddj.exe PID 1824 wrote to memory of 2208 1824 pjvvv.exe pjddj.exe PID 2208 wrote to memory of 1784 2208 pjddj.exe 1frflrx.exe PID 2208 wrote to memory of 1784 2208 pjddj.exe 1frflrx.exe PID 2208 wrote to memory of 1784 2208 pjddj.exe 1frflrx.exe PID 2208 wrote to memory of 1784 2208 pjddj.exe 1frflrx.exe PID 1784 wrote to memory of 1476 1784 1frflrx.exe 9nhhnn.exe PID 1784 wrote to memory of 1476 1784 1frflrx.exe 9nhhnn.exe PID 1784 wrote to memory of 1476 1784 1frflrx.exe 9nhhnn.exe PID 1784 wrote to memory of 1476 1784 1frflrx.exe 9nhhnn.exe PID 1476 wrote to memory of 2852 1476 9nhhnn.exe dvjvd.exe PID 1476 wrote to memory of 2852 1476 9nhhnn.exe dvjvd.exe PID 1476 wrote to memory of 2852 1476 9nhhnn.exe dvjvd.exe PID 1476 wrote to memory of 2852 1476 9nhhnn.exe dvjvd.exe PID 2852 wrote to memory of 1496 2852 dvjvd.exe ddpvv.exe PID 2852 wrote to memory of 1496 2852 dvjvd.exe ddpvv.exe PID 2852 wrote to memory of 1496 2852 dvjvd.exe ddpvv.exe PID 2852 wrote to memory of 1496 2852 dvjvd.exe ddpvv.exe PID 1496 wrote to memory of 2744 1496 ddpvv.exe hnnhbt.exe PID 1496 wrote to memory of 2744 1496 ddpvv.exe hnnhbt.exe PID 1496 wrote to memory of 2744 1496 ddpvv.exe hnnhbt.exe PID 1496 wrote to memory of 2744 1496 ddpvv.exe hnnhbt.exe PID 2744 wrote to memory of 2880 2744 hnnhbt.exe nnhbhb.exe PID 2744 wrote to memory of 2880 2744 hnnhbt.exe nnhbhb.exe PID 2744 wrote to memory of 2880 2744 hnnhbt.exe nnhbhb.exe PID 2744 wrote to memory of 2880 2744 hnnhbt.exe nnhbhb.exe PID 2880 wrote to memory of 772 2880 nnhbhb.exe jjddj.exe PID 2880 wrote to memory of 772 2880 nnhbhb.exe jjddj.exe PID 2880 wrote to memory of 772 2880 nnhbhb.exe jjddj.exe PID 2880 wrote to memory of 772 2880 nnhbhb.exe jjddj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe"C:\Users\Admin\AppData\Local\Temp\a3b3c3d7a03773bbfd1e95803b2b7773114f59ef943e984303b2fcabcbe288e1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\5tntbb.exec:\5tntbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
\??\c:\jpvvv.exec:\jpvvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\1xffrxl.exec:\1xffrxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\nhtbnh.exec:\nhtbnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\nnbntt.exec:\nnbntt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\lxrxxxf.exec:\lxrxxxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\nnhhhb.exec:\nnhhhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\pjvvv.exec:\pjvvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\pjddj.exec:\pjddj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\1frflrx.exec:\1frflrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\9nhhnn.exec:\9nhhnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\dvjvd.exec:\dvjvd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\ddpvv.exec:\ddpvv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
\??\c:\hnnhbt.exec:\hnnhbt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\nnhbhb.exec:\nnhbhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\jjddj.exec:\jjddj.exe17⤵
- Executes dropped EXE
PID:772 -
\??\c:\7lxflxf.exec:\7lxflxf.exe18⤵
- Executes dropped EXE
PID:3000 -
\??\c:\3thhtb.exec:\3thhtb.exe19⤵
- Executes dropped EXE
PID:1044 -
\??\c:\hnnnnt.exec:\hnnnnt.exe20⤵
- Executes dropped EXE
PID:1816 -
\??\c:\7ddvd.exec:\7ddvd.exe21⤵
- Executes dropped EXE
PID:2748 -
\??\c:\xxllrrf.exec:\xxllrrf.exe22⤵
- Executes dropped EXE
PID:448 -
\??\c:\hnbhbb.exec:\hnbhbb.exe23⤵
- Executes dropped EXE
PID:1648 -
\??\c:\hhtbnn.exec:\hhtbnn.exe24⤵
- Executes dropped EXE
PID:2524 -
\??\c:\9pddv.exec:\9pddv.exe25⤵
- Executes dropped EXE
PID:872 -
\??\c:\pvpdj.exec:\pvpdj.exe26⤵
- Executes dropped EXE
PID:2252 -
\??\c:\flfflrf.exec:\flfflrf.exe27⤵
- Executes dropped EXE
PID:2340 -
\??\c:\bhnhbn.exec:\bhnhbn.exe28⤵
- Executes dropped EXE
PID:2460 -
\??\c:\jjdjd.exec:\jjdjd.exe29⤵
- Executes dropped EXE
PID:2520 -
\??\c:\vvppp.exec:\vvppp.exe30⤵
- Executes dropped EXE
PID:2456 -
\??\c:\xrllxxl.exec:\xrllxxl.exe31⤵
- Executes dropped EXE
PID:2024 -
\??\c:\hhhntt.exec:\hhhntt.exe32⤵
- Executes dropped EXE
PID:2420 -
\??\c:\vpjpd.exec:\vpjpd.exe33⤵
- Executes dropped EXE
PID:1980 -
\??\c:\1pvjj.exec:\1pvjj.exe34⤵
- Executes dropped EXE
PID:2708 -
\??\c:\9xrfrrx.exec:\9xrfrrx.exe35⤵
- Executes dropped EXE
PID:2560 -
\??\c:\1fxflrf.exec:\1fxflrf.exe36⤵
- Executes dropped EXE
PID:2716 -
\??\c:\3tnbhh.exec:\3tnbhh.exe37⤵
- Executes dropped EXE
PID:2452 -
\??\c:\1bnbbb.exec:\1bnbbb.exe38⤵
- Executes dropped EXE
PID:2776 -
\??\c:\hbtntn.exec:\hbtntn.exe39⤵
- Executes dropped EXE
PID:2552 -
\??\c:\vvjpv.exec:\vvjpv.exe40⤵
- Executes dropped EXE
PID:2616 -
\??\c:\vvjpv.exec:\vvjpv.exe41⤵
- Executes dropped EXE
PID:2572 -
\??\c:\rrxxllx.exec:\rrxxllx.exe42⤵
- Executes dropped EXE
PID:2180 -
\??\c:\xlrrlrr.exec:\xlrrlrr.exe43⤵
- Executes dropped EXE
PID:2620 -
\??\c:\3bnthh.exec:\3bnthh.exe44⤵
- Executes dropped EXE
PID:2220 -
\??\c:\9nhbtt.exec:\9nhbtt.exe45⤵
- Executes dropped EXE
PID:2128 -
\??\c:\9dpjj.exec:\9dpjj.exe46⤵
- Executes dropped EXE
PID:2876 -
\??\c:\5jvpv.exec:\5jvpv.exe47⤵
- Executes dropped EXE
PID:2244 -
\??\c:\3lxrxlr.exec:\3lxrxlr.exe48⤵
- Executes dropped EXE
PID:2656 -
\??\c:\7llrxxf.exec:\7llrxxf.exe49⤵
- Executes dropped EXE
PID:688 -
\??\c:\ttbnhn.exec:\ttbnhn.exe50⤵
- Executes dropped EXE
PID:2860 -
\??\c:\bthhhb.exec:\bthhhb.exe51⤵
- Executes dropped EXE
PID:1496 -
\??\c:\ddpjp.exec:\ddpjp.exe52⤵
- Executes dropped EXE
PID:788 -
\??\c:\ppppd.exec:\ppppd.exe53⤵
- Executes dropped EXE
PID:696 -
\??\c:\rrrxffr.exec:\rrrxffr.exe54⤵
- Executes dropped EXE
PID:1912 -
\??\c:\llrfrxl.exec:\llrfrxl.exe55⤵
- Executes dropped EXE
PID:1264 -
\??\c:\5tbbnt.exec:\5tbbnt.exe56⤵
- Executes dropped EXE
PID:2400 -
\??\c:\bbhtbn.exec:\bbhtbn.exe57⤵
- Executes dropped EXE
PID:2368 -
\??\c:\7jdjv.exec:\7jdjv.exe58⤵
- Executes dropped EXE
PID:2388 -
\??\c:\ppdjp.exec:\ppdjp.exe59⤵
- Executes dropped EXE
PID:2988 -
\??\c:\5vvdp.exec:\5vvdp.exe60⤵
- Executes dropped EXE
PID:1296 -
\??\c:\lfxxxxf.exec:\lfxxxxf.exe61⤵
- Executes dropped EXE
PID:1284 -
\??\c:\5fllflx.exec:\5fllflx.exe62⤵
- Executes dropped EXE
PID:1516 -
\??\c:\ttnnnt.exec:\ttnnnt.exe63⤵
- Executes dropped EXE
PID:1272 -
\??\c:\nnbhnn.exec:\nnbhnn.exe64⤵
- Executes dropped EXE
PID:2120 -
\??\c:\vpvdj.exec:\vpvdj.exe65⤵
- Executes dropped EXE
PID:2252 -
\??\c:\3xrrfll.exec:\3xrrfll.exe66⤵PID:3020
-
\??\c:\ffrrxfr.exec:\ffrrxfr.exe67⤵PID:2340
-
\??\c:\1tbhtb.exec:\1tbhtb.exe68⤵PID:1000
-
\??\c:\7bnthn.exec:\7bnthn.exe69⤵PID:2432
-
\??\c:\1jddd.exec:\1jddd.exe70⤵PID:1268
-
\??\c:\ppvjj.exec:\ppvjj.exe71⤵PID:2012
-
\??\c:\9dpvd.exec:\9dpvd.exe72⤵PID:2660
-
\??\c:\lflllrx.exec:\lflllrx.exe73⤵PID:2804
-
\??\c:\3rlxffl.exec:\3rlxffl.exe74⤵PID:2996
-
\??\c:\3nbhth.exec:\3nbhth.exe75⤵PID:2788
-
\??\c:\5bbbnn.exec:\5bbbnn.exe76⤵PID:2688
-
\??\c:\ppdjp.exec:\ppdjp.exe77⤵PID:1608
-
\??\c:\pjvdj.exec:\pjvdj.exe78⤵PID:1528
-
\??\c:\xxlxxxl.exec:\xxlxxxl.exe79⤵PID:2692
-
\??\c:\fxxxlrx.exec:\fxxxlrx.exe80⤵PID:2584
-
\??\c:\tbthtt.exec:\tbthtt.exe81⤵PID:2596
-
\??\c:\tntbnt.exec:\tntbnt.exe82⤵PID:1396
-
\??\c:\3vppd.exec:\3vppd.exe83⤵PID:2824
-
\??\c:\jjpvd.exec:\jjpvd.exe84⤵PID:2188
-
\??\c:\ffxxllx.exec:\ffxxllx.exe85⤵PID:2652
-
\??\c:\xxfrrrx.exec:\xxfrrrx.exe86⤵PID:2208
-
\??\c:\btbtbb.exec:\btbtbb.exe87⤵PID:2876
-
\??\c:\bhbhtb.exec:\bhbhtb.exe88⤵PID:2848
-
\??\c:\pjpvv.exec:\pjpvv.exe89⤵PID:324
-
\??\c:\vvpvp.exec:\vvpvp.exe90⤵PID:1028
-
\??\c:\fxlrflr.exec:\fxlrflr.exe91⤵PID:2956
-
\??\c:\rlxxllx.exec:\rlxxllx.exe92⤵PID:2952
-
\??\c:\thbnbh.exec:\thbnbh.exe93⤵PID:2052
-
\??\c:\nthbnn.exec:\nthbnn.exe94⤵PID:1432
-
\??\c:\5rlrrrf.exec:\5rlrrrf.exe95⤵PID:3012
-
\??\c:\tnnbhn.exec:\tnnbhn.exe96⤵PID:2248
-
\??\c:\bbthtt.exec:\bbthtt.exe97⤵PID:1804
-
\??\c:\3vppd.exec:\3vppd.exe98⤵PID:1816
-
\??\c:\ppddd.exec:\ppddd.exe99⤵PID:1316
-
\??\c:\jjdjp.exec:\jjdjp.exe100⤵PID:1144
-
\??\c:\fxrflrx.exec:\fxrflrx.exe101⤵PID:1296
-
\??\c:\lfxxxlx.exec:\lfxxxlx.exe102⤵PID:1284
-
\??\c:\nbhhnh.exec:\nbhhnh.exe103⤵PID:2016
-
\??\c:\btnthh.exec:\btnthh.exe104⤵PID:2308
-
\??\c:\vppvv.exec:\vppvv.exe105⤵PID:2636
-
\??\c:\vpddp.exec:\vpddp.exe106⤵PID:288
-
\??\c:\rlxxfrr.exec:\rlxxfrr.exe107⤵PID:2476
-
\??\c:\1fxxrfl.exec:\1fxxrfl.exe108⤵PID:2288
-
\??\c:\nttttt.exec:\nttttt.exe109⤵PID:892
-
\??\c:\9bbbtt.exec:\9bbbtt.exe110⤵PID:2312
-
\??\c:\jjppv.exec:\jjppv.exe111⤵PID:1940
-
\??\c:\9dvvv.exec:\9dvvv.exe112⤵PID:2664
-
\??\c:\3xflrrx.exec:\3xflrrx.exe113⤵PID:1364
-
\??\c:\llflxxl.exec:\llflxxl.exe114⤵PID:2804
-
\??\c:\tnttbb.exec:\tnttbb.exe115⤵PID:2708
-
\??\c:\btbnnn.exec:\btbnnn.exe116⤵PID:2560
-
\??\c:\hbhhnh.exec:\hbhhnh.exe117⤵PID:2580
-
\??\c:\ppdjd.exec:\ppdjd.exe118⤵PID:2452
-
\??\c:\pvjpj.exec:\pvjpj.exe119⤵PID:2556
-
\??\c:\xrllrfl.exec:\xrllrfl.exe120⤵PID:2760
-
\??\c:\xrxllrx.exec:\xrxllrx.exe121⤵PID:2616
-
\??\c:\nthtnh.exec:\nthtnh.exe122⤵PID:2540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-