Analysis
-
max time kernel
150s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 09:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe
Resource
win7-20240729-en
windows7-x64
7 signatures
150 seconds
General
-
Target
6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe
-
Size
454KB
-
MD5
43c1c7cb96a737ca40e8b50b17804728
-
SHA1
f84413491b80f000495ed48944238c0eaabd9aff
-
SHA256
6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0
-
SHA512
04e4c15dc5fcad53b218b1561e2e261bd05f32a48baab99462a9b6263b938b096b693408c162d012b384c8c7b12bf5571f9a191d68e4cf477b96c1c3b56c7451
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbe3:q7Tc2NYHUrAwfMp3CD3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 38 IoCs
resource yara_rule behavioral1/memory/2604-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1796-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2168-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2896-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2824-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2932-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2932-57-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2896-66-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2900-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2692-77-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2812-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2332-99-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2728-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2060-117-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1976-128-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1504-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2752-147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2356-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/840-184-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2088-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2020-205-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2400-221-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1192-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1080-303-0x00000000003B0000-0x00000000003DA000-memory.dmp family_blackmoon behavioral1/memory/2848-317-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2808-331-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2968-352-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1700-360-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1700-367-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2788-387-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2424-394-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2024-476-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1224-491-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1864-524-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1132-567-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2452-606-0x0000000000430000-0x000000000045A000-memory.dmp family_blackmoon behavioral1/memory/2732-632-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/2876-856-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1796 nthhbh.exe 2168 rxlrllx.exe 2896 ddvjv.exe 2824 fxlxlxl.exe 2932 ddpvv.exe 2900 7llrfrf.exe 2692 lrflrxf.exe 2812 hhbnbn.exe 2332 ffrrfrr.exe 2728 bnhhtb.exe 2060 7llfrfx.exe 1976 bntnbt.exe 1504 rxflfrl.exe 2752 jpjpv.exe 2288 ttbhbh.exe 3036 vdvjv.exe 2356 5tbhtb.exe 840 tttbnh.exe 2088 9bbnhn.exe 2112 jddpj.exe 2020 hthbhn.exe 2400 jpjjd.exe 1192 nnbbth.exe 1684 jjvjv.exe 2584 tbntbh.exe 1680 9jdjj.exe 2640 ttntbb.exe 1216 xfrxflx.exe 1540 pvdjp.exe 884 jvpvj.exe 2628 hhbbnb.exe 1080 3ppdd.exe 1092 thbhnt.exe 2848 1jjpd.exe 2212 llrfllr.exe 2896 btnhtn.exe 2808 jvddp.exe 2712 lflrrlr.exe 2968 tbntbh.exe 2700 vdvdd.exe 1700 3rllrxf.exe 1276 hnbnbn.exe 1832 jdpjj.exe 2788 dvpdp.exe 2424 flxrlxr.exe 2012 3btbnn.exe 1672 pvvpd.exe 1976 1rlrflx.exe 1084 ntnbnt.exe 2996 ppjjv.exe 2752 xflrxll.exe 2428 7ntnht.exe 2780 9jdjd.exe 1740 jpdjv.exe 1812 3flrlrx.exe 2940 3bhnbb.exe 2096 pdvvj.exe 2004 lfrxrrx.exe 2024 lxllrrx.exe 1224 hntbnb.exe 2408 djvdj.exe 952 3xllrrx.exe 2512 ntnbnt.exe 2568 jjpvd.exe -
resource yara_rule behavioral1/memory/1796-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2604-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1796-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2168-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2896-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2824-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2932-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2900-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2692-77-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2812-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2332-99-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2728-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2060-117-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1976-128-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1504-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2752-147-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2356-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/840-184-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2088-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2020-205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2400-221-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1192-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2848-317-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2808-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2968-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1700-360-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2788-387-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2424-394-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2024-476-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2096-485-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1224-491-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1864-524-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1132-567-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xflflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxfrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxllrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhthhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxllff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1796 2604 6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe 30 PID 2604 wrote to memory of 1796 2604 6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe 30 PID 2604 wrote to memory of 1796 2604 6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe 30 PID 2604 wrote to memory of 1796 2604 6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe 30 PID 1796 wrote to memory of 2168 1796 nthhbh.exe 31 PID 1796 wrote to memory of 2168 1796 nthhbh.exe 31 PID 1796 wrote to memory of 2168 1796 nthhbh.exe 31 PID 1796 wrote to memory of 2168 1796 nthhbh.exe 31 PID 2168 wrote to memory of 2896 2168 rxlrllx.exe 32 PID 2168 wrote to memory of 2896 2168 rxlrllx.exe 32 PID 2168 wrote to memory of 2896 2168 rxlrllx.exe 32 PID 2168 wrote to memory of 2896 2168 rxlrllx.exe 32 PID 2896 wrote to memory of 2824 2896 ddvjv.exe 33 PID 2896 wrote to memory of 2824 2896 ddvjv.exe 33 PID 2896 wrote to memory of 2824 2896 ddvjv.exe 33 PID 2896 wrote to memory of 2824 2896 ddvjv.exe 33 PID 2824 wrote to memory of 2932 2824 fxlxlxl.exe 34 PID 2824 wrote to memory of 2932 2824 fxlxlxl.exe 34 PID 2824 wrote to memory of 2932 2824 fxlxlxl.exe 34 PID 2824 wrote to memory of 2932 2824 fxlxlxl.exe 34 PID 2932 wrote to memory of 2900 2932 ddpvv.exe 35 PID 2932 wrote to memory of 2900 2932 ddpvv.exe 35 PID 2932 wrote to memory of 2900 2932 ddpvv.exe 35 PID 2932 wrote to memory of 2900 2932 ddpvv.exe 35 PID 2900 wrote to memory of 2692 2900 7llrfrf.exe 36 PID 2900 wrote to memory of 2692 2900 7llrfrf.exe 36 PID 2900 wrote to memory of 2692 2900 7llrfrf.exe 36 PID 2900 wrote to memory of 2692 2900 7llrfrf.exe 36 PID 2692 wrote to memory of 2812 2692 lrflrxf.exe 37 PID 2692 wrote to memory of 2812 2692 lrflrxf.exe 37 PID 2692 wrote to memory of 2812 2692 lrflrxf.exe 37 PID 2692 wrote to memory of 2812 2692 lrflrxf.exe 37 PID 2812 wrote to memory of 2332 2812 hhbnbn.exe 38 PID 2812 wrote to memory of 2332 2812 hhbnbn.exe 38 PID 2812 wrote to memory of 2332 2812 hhbnbn.exe 38 PID 2812 wrote to memory of 2332 2812 hhbnbn.exe 38 PID 2332 wrote to memory of 2728 2332 ffrrfrr.exe 39 PID 2332 wrote to memory of 2728 2332 ffrrfrr.exe 39 PID 2332 wrote to memory of 2728 2332 ffrrfrr.exe 39 PID 2332 wrote to memory of 2728 2332 ffrrfrr.exe 39 PID 2728 wrote to memory of 2060 2728 bnhhtb.exe 40 PID 2728 wrote to memory of 2060 2728 bnhhtb.exe 40 PID 2728 wrote to memory of 2060 2728 bnhhtb.exe 40 PID 2728 wrote to memory of 2060 2728 bnhhtb.exe 40 PID 2060 wrote to memory of 1976 2060 7llfrfx.exe 41 PID 2060 wrote to memory of 1976 2060 7llfrfx.exe 41 PID 2060 wrote to memory of 1976 2060 7llfrfx.exe 41 PID 2060 wrote to memory of 1976 2060 7llfrfx.exe 41 PID 1976 wrote to memory of 1504 1976 bntnbt.exe 42 PID 1976 wrote to memory of 1504 1976 bntnbt.exe 42 PID 1976 wrote to memory of 1504 1976 bntnbt.exe 42 PID 1976 wrote to memory of 1504 1976 bntnbt.exe 42 PID 1504 wrote to memory of 2752 1504 rxflfrl.exe 43 PID 1504 wrote to memory of 2752 1504 rxflfrl.exe 43 PID 1504 wrote to memory of 2752 1504 rxflfrl.exe 43 PID 1504 wrote to memory of 2752 1504 rxflfrl.exe 43 PID 2752 wrote to memory of 2288 2752 jpjpv.exe 44 PID 2752 wrote to memory of 2288 2752 jpjpv.exe 44 PID 2752 wrote to memory of 2288 2752 jpjpv.exe 44 PID 2752 wrote to memory of 2288 2752 jpjpv.exe 44 PID 2288 wrote to memory of 3036 2288 ttbhbh.exe 45 PID 2288 wrote to memory of 3036 2288 ttbhbh.exe 45 PID 2288 wrote to memory of 3036 2288 ttbhbh.exe 45 PID 2288 wrote to memory of 3036 2288 ttbhbh.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe"C:\Users\Admin\AppData\Local\Temp\6afddd7fd533b2b6d7f7d21d42b326d94a3f53508010b0058d613ddadcf3f1a0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\nthhbh.exec:\nthhbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\rxlrllx.exec:\rxlrllx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\ddvjv.exec:\ddvjv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\fxlxlxl.exec:\fxlxlxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\ddpvv.exec:\ddpvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\7llrfrf.exec:\7llrfrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\lrflrxf.exec:\lrflrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\hhbnbn.exec:\hhbnbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\ffrrfrr.exec:\ffrrfrr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\bnhhtb.exec:\bnhhtb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\7llfrfx.exec:\7llfrfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\bntnbt.exec:\bntnbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\rxflfrl.exec:\rxflfrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\jpjpv.exec:\jpjpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\ttbhbh.exec:\ttbhbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\vdvjv.exec:\vdvjv.exe17⤵
- Executes dropped EXE
PID:3036 -
\??\c:\5tbhtb.exec:\5tbhtb.exe18⤵
- Executes dropped EXE
PID:2356 -
\??\c:\tttbnh.exec:\tttbnh.exe19⤵
- Executes dropped EXE
PID:840 -
\??\c:\9bbnhn.exec:\9bbnhn.exe20⤵
- Executes dropped EXE
PID:2088 -
\??\c:\jddpj.exec:\jddpj.exe21⤵
- Executes dropped EXE
PID:2112 -
\??\c:\hthbhn.exec:\hthbhn.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020 -
\??\c:\jpjjd.exec:\jpjjd.exe23⤵
- Executes dropped EXE
PID:2400 -
\??\c:\nnbbth.exec:\nnbbth.exe24⤵
- Executes dropped EXE
PID:1192 -
\??\c:\jjvjv.exec:\jjvjv.exe25⤵
- Executes dropped EXE
PID:1684 -
\??\c:\tbntbh.exec:\tbntbh.exe26⤵
- Executes dropped EXE
PID:2584 -
\??\c:\9jdjj.exec:\9jdjj.exe27⤵
- Executes dropped EXE
PID:1680 -
\??\c:\ttntbb.exec:\ttntbb.exe28⤵
- Executes dropped EXE
PID:2640 -
\??\c:\xfrxflx.exec:\xfrxflx.exe29⤵
- Executes dropped EXE
PID:1216 -
\??\c:\pvdjp.exec:\pvdjp.exe30⤵
- Executes dropped EXE
PID:1540 -
\??\c:\jvpvj.exec:\jvpvj.exe31⤵
- Executes dropped EXE
PID:884 -
\??\c:\hhbbnb.exec:\hhbbnb.exe32⤵
- Executes dropped EXE
PID:2628 -
\??\c:\3ppdd.exec:\3ppdd.exe33⤵
- Executes dropped EXE
PID:1080 -
\??\c:\thbhnt.exec:\thbhnt.exe34⤵
- Executes dropped EXE
PID:1092 -
\??\c:\1jjpd.exec:\1jjpd.exe35⤵
- Executes dropped EXE
PID:2848 -
\??\c:\llrfllr.exec:\llrfllr.exe36⤵
- Executes dropped EXE
PID:2212 -
\??\c:\btnhtn.exec:\btnhtn.exe37⤵
- Executes dropped EXE
PID:2896 -
\??\c:\jvddp.exec:\jvddp.exe38⤵
- Executes dropped EXE
PID:2808 -
\??\c:\lflrrlr.exec:\lflrrlr.exe39⤵
- Executes dropped EXE
PID:2712 -
\??\c:\tbntbh.exec:\tbntbh.exe40⤵
- Executes dropped EXE
PID:2968 -
\??\c:\vdvdd.exec:\vdvdd.exe41⤵
- Executes dropped EXE
PID:2700 -
\??\c:\3rllrxf.exec:\3rllrxf.exe42⤵
- Executes dropped EXE
PID:1700 -
\??\c:\hnbnbn.exec:\hnbnbn.exe43⤵
- Executes dropped EXE
PID:1276 -
\??\c:\jdpjj.exec:\jdpjj.exe44⤵
- Executes dropped EXE
PID:1832 -
\??\c:\dvpdp.exec:\dvpdp.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788 -
\??\c:\flxrlxr.exec:\flxrlxr.exe46⤵
- Executes dropped EXE
PID:2424 -
\??\c:\3btbnn.exec:\3btbnn.exe47⤵
- Executes dropped EXE
PID:2012 -
\??\c:\pvvpd.exec:\pvvpd.exe48⤵
- Executes dropped EXE
PID:1672 -
\??\c:\1rlrflx.exec:\1rlrflx.exe49⤵
- Executes dropped EXE
PID:1976 -
\??\c:\ntnbnt.exec:\ntnbnt.exe50⤵
- Executes dropped EXE
PID:1084 -
\??\c:\ppjjv.exec:\ppjjv.exe51⤵
- Executes dropped EXE
PID:2996 -
\??\c:\xflrxll.exec:\xflrxll.exe52⤵
- Executes dropped EXE
PID:2752 -
\??\c:\7ntnht.exec:\7ntnht.exe53⤵
- Executes dropped EXE
PID:2428 -
\??\c:\9jdjd.exec:\9jdjd.exe54⤵
- Executes dropped EXE
PID:2780 -
\??\c:\jpdjv.exec:\jpdjv.exe55⤵
- Executes dropped EXE
PID:1740 -
\??\c:\3flrlrx.exec:\3flrlrx.exe56⤵
- Executes dropped EXE
PID:1812 -
\??\c:\3bhnbb.exec:\3bhnbb.exe57⤵
- Executes dropped EXE
PID:2940 -
\??\c:\pdvvj.exec:\pdvvj.exe58⤵
- Executes dropped EXE
PID:2096 -
\??\c:\lfrxrrx.exec:\lfrxrrx.exe59⤵
- Executes dropped EXE
PID:2004 -
\??\c:\lxllrrx.exec:\lxllrrx.exe60⤵
- Executes dropped EXE
PID:2024 -
\??\c:\hntbnb.exec:\hntbnb.exe61⤵
- Executes dropped EXE
PID:1224 -
\??\c:\djvdj.exec:\djvdj.exe62⤵
- Executes dropped EXE
PID:2408 -
\??\c:\3xllrrx.exec:\3xllrrx.exe63⤵
- Executes dropped EXE
PID:952 -
\??\c:\ntnbnt.exec:\ntnbnt.exe64⤵
- Executes dropped EXE
PID:2512 -
\??\c:\jjpvd.exec:\jjpvd.exe65⤵
- Executes dropped EXE
PID:2568 -
\??\c:\llxxllx.exec:\llxxllx.exe66⤵PID:1864
-
\??\c:\fxflrxl.exec:\fxflrxl.exe67⤵PID:1804
-
\??\c:\vvjpd.exec:\vvjpd.exe68⤵PID:2572
-
\??\c:\lrfflrx.exec:\lrfflrx.exe69⤵PID:2152
-
\??\c:\hnnnhn.exec:\hnnnhn.exe70⤵PID:1216
-
\??\c:\9htbbn.exec:\9htbbn.exe71⤵PID:1528
-
\??\c:\7djpv.exec:\7djpv.exe72⤵PID:1244
-
\??\c:\ffrfrxf.exec:\ffrfrxf.exe73⤵PID:1132
-
\??\c:\bththt.exec:\bththt.exe74⤵PID:2976
-
\??\c:\dpjjv.exec:\dpjjv.exe75⤵PID:1080
-
\??\c:\1frxflr.exec:\1frxflr.exe76⤵PID:1092
-
\??\c:\xxlxlxr.exec:\xxlxlxr.exe77⤵PID:2848
-
\??\c:\5bnthb.exec:\5bnthb.exe78⤵PID:2212
-
\??\c:\dpjvj.exec:\dpjvj.exe79⤵PID:2452
-
\??\c:\ffxxxxf.exec:\ffxxxxf.exe80⤵PID:3020
-
\??\c:\xrflflx.exec:\xrflflx.exe81⤵PID:2280
-
\??\c:\1bnbtt.exec:\1bnbtt.exe82⤵PID:2900
-
\??\c:\ddvdj.exec:\ddvdj.exe83⤵PID:2732
-
\??\c:\xxlxlxr.exec:\xxlxlxr.exe84⤵PID:1736
-
\??\c:\lrrffrf.exec:\lrrffrf.exe85⤵PID:2812
-
\??\c:\tthhnt.exec:\tthhnt.exe86⤵PID:2396
-
\??\c:\vdvjv.exec:\vdvjv.exe87⤵PID:2432
-
\??\c:\flxfxfr.exec:\flxfxfr.exe88⤵PID:264
-
\??\c:\nbntnn.exec:\nbntnn.exe89⤵PID:1520
-
\??\c:\3nnnbh.exec:\3nnnbh.exe90⤵PID:2908
-
\??\c:\vdpvp.exec:\vdpvp.exe91⤵PID:1108
-
\??\c:\flrflrf.exec:\flrflrf.exe92⤵PID:1312
-
\??\c:\bhttbb.exec:\bhttbb.exe93⤵PID:2612
-
\??\c:\pvpdj.exec:\pvpdj.exe94⤵PID:2992
-
\??\c:\7jdjj.exec:\7jdjj.exe95⤵PID:2288
-
\??\c:\5rllllr.exec:\5rllllr.exe96⤵PID:1472
-
\??\c:\ththbt.exec:\ththbt.exe97⤵PID:592
-
\??\c:\3ddpp.exec:\3ddpp.exe98⤵PID:2372
-
\??\c:\rrllrrf.exec:\rrllrrf.exe99⤵
- System Location Discovery: System Language Discovery
PID:2348 -
\??\c:\nbnhnt.exec:\nbnhnt.exe100⤵PID:2220
-
\??\c:\jjvpd.exec:\jjvpd.exe101⤵PID:788
-
\??\c:\5rlfllr.exec:\5rlfllr.exe102⤵PID:808
-
\??\c:\1tnbbn.exec:\1tnbbn.exe103⤵PID:1728
-
\??\c:\pvjpv.exec:\pvjpv.exe104⤵PID:2400
-
\??\c:\5xxxxll.exec:\5xxxxll.exe105⤵PID:2120
-
\??\c:\hnbbhh.exec:\hnbbhh.exe106⤵PID:2016
-
\??\c:\3tthbn.exec:\3tthbn.exe107⤵PID:1676
-
\??\c:\ppvvd.exec:\ppvvd.exe108⤵PID:1924
-
\??\c:\llxrlrf.exec:\llxrlrf.exe109⤵PID:2632
-
\??\c:\ntbbhn.exec:\ntbbhn.exe110⤵PID:2640
-
\??\c:\djjpj.exec:\djjpj.exe111⤵PID:1100
-
\??\c:\7llxrxx.exec:\7llxrxx.exe112⤵PID:2524
-
\??\c:\djvjp.exec:\djvjp.exe113⤵PID:2392
-
\??\c:\jvdjp.exec:\jvdjp.exe114⤵PID:1572
-
\??\c:\rfrrfrl.exec:\rfrrfrl.exe115⤵PID:2380
-
\??\c:\nbbbnt.exec:\nbbbnt.exe116⤵PID:1600
-
\??\c:\dvjpv.exec:\dvjpv.exe117⤵PID:2464
-
\??\c:\lrlrxfl.exec:\lrlrxfl.exe118⤵PID:2876
-
\??\c:\bbbhnb.exec:\bbbhnb.exe119⤵PID:2880
-
\??\c:\jjppd.exec:\jjppd.exe120⤵PID:2920
-
\??\c:\fxlrfrx.exec:\fxlrfrx.exe121⤵PID:2696
-
\??\c:\nhbbnt.exec:\nhbbnt.exe122⤵PID:2860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-