Analysis
-
max time kernel
116s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 15:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
257236d595eac05d529b77196da50550N.exe
Resource
win7-20240704-en
windows7-x64
6 signatures
120 seconds
General
-
Target
257236d595eac05d529b77196da50550N.exe
-
Size
76KB
-
MD5
257236d595eac05d529b77196da50550
-
SHA1
3f05db6301573f2587651a267132ddfe641aeaeb
-
SHA256
03b5b808b9ceefc3f07ebfa5743fb1904d786782a93e96640dfb03df21e86b3f
-
SHA512
f0f7dbaa609515d1e09ee12e438ea5189d4f149fb65ea8897039002d91506d4140c2b76b3df5b228eb2557f6c3415fd572a8ee852fa426e373f0ed82745b75ea
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIJSsD+cGUFzJhy:ymb3NkkiQ3mdBjFIwsDhbN7y
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/4652-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3520-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2200-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2832-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4544-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3588-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2516-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2956-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3592-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5112-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4512-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2344-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2664-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3032-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4588-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/32-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1124-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3632-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1184-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3792-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jvdjd.exeflffxfr.exedvdvp.exevjjvp.exe9ffxllf.exetbttbb.exepdvdv.exefllfxxx.exe1dvjp.exerlrrrrl.exetnbnht.exe7dvpd.exehhbtnh.exejpdjv.exexxxffxr.exetttnth.exeppvjj.exeffflrrl.exevjjpp.exerrffxff.exehtbhht.exeddjdv.exelfllrxf.exepdpdd.exenttbbb.exejvddj.exerflxrxl.exehnhbbt.exeppddj.exerrrflfr.exe7hhhbn.exejdvdd.exe3pjdp.exefrxrxxx.exebhhnbt.exehtbbhb.exeddpdv.exexrlllrr.exedvvdv.exejvppj.exerfxlrxf.exebbbhhh.exepppvj.exepdpjd.exexlxxllf.exebnhnbn.exeppdpd.exedppjp.exefxlflxx.exetbthtt.exevdpdd.exeddjdd.exexfffxxx.exehnhhhh.exedvppd.exe1rlxrrl.exethhntb.exennntbt.exejjjjj.exexxlxlfr.exerlrrxxf.exepjpjv.exellfrxfr.exetnhtbh.exepid process 3520 jvdjd.exe 2200 flffxfr.exe 2832 dvdvp.exe 4544 vjjvp.exe 3588 9ffxllf.exe 2516 tbttbb.exe 2956 pdvdv.exe 4592 fllfxxx.exe 3592 1dvjp.exe 5112 rlrrrrl.exe 4512 tnbnht.exe 2344 7dvpd.exe 2664 hhbtnh.exe 3032 jpdjv.exe 2148 xxxffxr.exe 4704 tttnth.exe 4588 ppvjj.exe 2436 ffflrrl.exe 32 vjjpp.exe 2720 rrffxff.exe 1124 htbhht.exe 3632 ddjdv.exe 1184 lfllrxf.exe 3792 pdpdd.exe 3896 nttbbb.exe 4240 jvddj.exe 2508 rflxrxl.exe 3168 hnhbbt.exe 3256 ppddj.exe 2640 rrrflfr.exe 5108 7hhhbn.exe 1152 jdvdd.exe 4368 3pjdp.exe 4872 frxrxxx.exe 4404 bhhnbt.exe 3292 htbbhb.exe 4440 ddpdv.exe 2832 xrlllrr.exe 1084 dvvdv.exe 3588 jvppj.exe 4788 rfxlrxf.exe 64 bbbhhh.exe 3540 pppvj.exe 3204 pdpjd.exe 388 xlxxllf.exe 220 bnhnbn.exe 512 ppdpd.exe 548 dppjp.exe 4268 fxlflxx.exe 2296 tbthtt.exe 4520 vdpdd.exe 2284 ddjdd.exe 4020 xfffxxx.exe 2120 hnhhhh.exe 2436 dvppd.exe 4392 1rlxrrl.exe 3176 thhntb.exe 2608 nnntbt.exe 3472 jjjjj.exe 4004 xxlxlfr.exe 3580 rlrrxxf.exe 3944 pjpjv.exe 3792 llfrxfr.exe 3864 tnhtbh.exe -
Processes:
resource yara_rule behavioral2/memory/4652-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3520-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2200-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4544-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3588-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2516-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2956-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2956-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5112-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4512-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2344-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2664-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3032-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/32-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1124-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-188-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ttnbtn.exevdvjj.exedjjjd.exexxxrxrx.exehbbnbt.exebtbbhn.exehbhnnt.exetnbtnn.exeddpjj.exelllrrxx.exedvjpv.exe7tnhbb.exebbbnnn.exexrfrxrr.exelrlrrfr.exevvpjv.exebbnntt.exerlfrlxx.exefxxllll.exejddvp.exelrfrrxx.exedvpjj.exerfxlrxf.exefrfrfrl.exedjdjd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlrrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
257236d595eac05d529b77196da50550N.exejvdjd.exeflffxfr.exedvdvp.exevjjvp.exe9ffxllf.exetbttbb.exepdvdv.exefllfxxx.exe1dvjp.exerlrrrrl.exetnbnht.exe7dvpd.exehhbtnh.exejpdjv.exexxxffxr.exetttnth.exeppvjj.exeffflrrl.exevjjpp.exerrffxff.exehtbhht.exedescription pid process target process PID 4652 wrote to memory of 3520 4652 257236d595eac05d529b77196da50550N.exe jvdjd.exe PID 4652 wrote to memory of 3520 4652 257236d595eac05d529b77196da50550N.exe jvdjd.exe PID 4652 wrote to memory of 3520 4652 257236d595eac05d529b77196da50550N.exe jvdjd.exe PID 3520 wrote to memory of 2200 3520 jvdjd.exe flffxfr.exe PID 3520 wrote to memory of 2200 3520 jvdjd.exe flffxfr.exe PID 3520 wrote to memory of 2200 3520 jvdjd.exe flffxfr.exe PID 2200 wrote to memory of 2832 2200 flffxfr.exe dvdvp.exe PID 2200 wrote to memory of 2832 2200 flffxfr.exe dvdvp.exe PID 2200 wrote to memory of 2832 2200 flffxfr.exe dvdvp.exe PID 2832 wrote to memory of 4544 2832 dvdvp.exe vjjvp.exe PID 2832 wrote to memory of 4544 2832 dvdvp.exe vjjvp.exe PID 2832 wrote to memory of 4544 2832 dvdvp.exe vjjvp.exe PID 4544 wrote to memory of 3588 4544 vjjvp.exe 9ffxllf.exe PID 4544 wrote to memory of 3588 4544 vjjvp.exe 9ffxllf.exe PID 4544 wrote to memory of 3588 4544 vjjvp.exe 9ffxllf.exe PID 3588 wrote to memory of 2516 3588 9ffxllf.exe tbttbb.exe PID 3588 wrote to memory of 2516 3588 9ffxllf.exe tbttbb.exe PID 3588 wrote to memory of 2516 3588 9ffxllf.exe tbttbb.exe PID 2516 wrote to memory of 2956 2516 tbttbb.exe pdvdv.exe PID 2516 wrote to memory of 2956 2516 tbttbb.exe pdvdv.exe PID 2516 wrote to memory of 2956 2516 tbttbb.exe pdvdv.exe PID 2956 wrote to memory of 4592 2956 pdvdv.exe fllfxxx.exe PID 2956 wrote to memory of 4592 2956 pdvdv.exe fllfxxx.exe PID 2956 wrote to memory of 4592 2956 pdvdv.exe fllfxxx.exe PID 4592 wrote to memory of 3592 4592 fllfxxx.exe 1dvjp.exe PID 4592 wrote to memory of 3592 4592 fllfxxx.exe 1dvjp.exe PID 4592 wrote to memory of 3592 4592 fllfxxx.exe 1dvjp.exe PID 3592 wrote to memory of 5112 3592 1dvjp.exe rlrrrrl.exe PID 3592 wrote to memory of 5112 3592 1dvjp.exe rlrrrrl.exe PID 3592 wrote to memory of 5112 3592 1dvjp.exe rlrrrrl.exe PID 5112 wrote to memory of 4512 5112 rlrrrrl.exe tnbnht.exe PID 5112 wrote to memory of 4512 5112 rlrrrrl.exe tnbnht.exe PID 5112 wrote to memory of 4512 5112 rlrrrrl.exe tnbnht.exe PID 4512 wrote to memory of 2344 4512 tnbnht.exe 7dvpd.exe PID 4512 wrote to memory of 2344 4512 tnbnht.exe 7dvpd.exe PID 4512 wrote to memory of 2344 4512 tnbnht.exe 7dvpd.exe PID 2344 wrote to memory of 2664 2344 7dvpd.exe hhbtnh.exe PID 2344 wrote to memory of 2664 2344 7dvpd.exe hhbtnh.exe PID 2344 wrote to memory of 2664 2344 7dvpd.exe hhbtnh.exe PID 2664 wrote to memory of 3032 2664 hhbtnh.exe jpdjv.exe PID 2664 wrote to memory of 3032 2664 hhbtnh.exe jpdjv.exe PID 2664 wrote to memory of 3032 2664 hhbtnh.exe jpdjv.exe PID 3032 wrote to memory of 2148 3032 jpdjv.exe xxxffxr.exe PID 3032 wrote to memory of 2148 3032 jpdjv.exe xxxffxr.exe PID 3032 wrote to memory of 2148 3032 jpdjv.exe xxxffxr.exe PID 2148 wrote to memory of 4704 2148 xxxffxr.exe tttnth.exe PID 2148 wrote to memory of 4704 2148 xxxffxr.exe tttnth.exe PID 2148 wrote to memory of 4704 2148 xxxffxr.exe tttnth.exe PID 4704 wrote to memory of 4588 4704 tttnth.exe ppvjj.exe PID 4704 wrote to memory of 4588 4704 tttnth.exe ppvjj.exe PID 4704 wrote to memory of 4588 4704 tttnth.exe ppvjj.exe PID 4588 wrote to memory of 2436 4588 ppvjj.exe ffflrrl.exe PID 4588 wrote to memory of 2436 4588 ppvjj.exe ffflrrl.exe PID 4588 wrote to memory of 2436 4588 ppvjj.exe ffflrrl.exe PID 2436 wrote to memory of 32 2436 ffflrrl.exe vjjpp.exe PID 2436 wrote to memory of 32 2436 ffflrrl.exe vjjpp.exe PID 2436 wrote to memory of 32 2436 ffflrrl.exe vjjpp.exe PID 32 wrote to memory of 2720 32 vjjpp.exe rrffxff.exe PID 32 wrote to memory of 2720 32 vjjpp.exe rrffxff.exe PID 32 wrote to memory of 2720 32 vjjpp.exe rrffxff.exe PID 2720 wrote to memory of 1124 2720 rrffxff.exe htbhht.exe PID 2720 wrote to memory of 1124 2720 rrffxff.exe htbhht.exe PID 2720 wrote to memory of 1124 2720 rrffxff.exe htbhht.exe PID 1124 wrote to memory of 3632 1124 htbhht.exe ddjdv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\257236d595eac05d529b77196da50550N.exe"C:\Users\Admin\AppData\Local\Temp\257236d595eac05d529b77196da50550N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
\??\c:\jvdjd.exec:\jvdjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\flffxfr.exec:\flffxfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\dvdvp.exec:\dvdvp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\vjjvp.exec:\vjjvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\9ffxllf.exec:\9ffxllf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
\??\c:\tbttbb.exec:\tbttbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\pdvdv.exec:\pdvdv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\fllfxxx.exec:\fllfxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\1dvjp.exec:\1dvjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
\??\c:\rlrrrrl.exec:\rlrrrrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\tnbnht.exec:\tnbnht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
\??\c:\7dvpd.exec:\7dvpd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\hhbtnh.exec:\hhbtnh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\jpdjv.exec:\jpdjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\xxxffxr.exec:\xxxffxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\tttnth.exec:\tttnth.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\ppvjj.exec:\ppvjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\ffflrrl.exec:\ffflrrl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\vjjpp.exec:\vjjpp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:32 -
\??\c:\rrffxff.exec:\rrffxff.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\htbhht.exec:\htbhht.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\ddjdv.exec:\ddjdv.exe23⤵
- Executes dropped EXE
PID:3632 -
\??\c:\lfllrxf.exec:\lfllrxf.exe24⤵
- Executes dropped EXE
PID:1184 -
\??\c:\pdpdd.exec:\pdpdd.exe25⤵
- Executes dropped EXE
PID:3792 -
\??\c:\nttbbb.exec:\nttbbb.exe26⤵
- Executes dropped EXE
PID:3896 -
\??\c:\jvddj.exec:\jvddj.exe27⤵
- Executes dropped EXE
PID:4240 -
\??\c:\rflxrxl.exec:\rflxrxl.exe28⤵
- Executes dropped EXE
PID:2508 -
\??\c:\hnhbbt.exec:\hnhbbt.exe29⤵
- Executes dropped EXE
PID:3168 -
\??\c:\ppddj.exec:\ppddj.exe30⤵
- Executes dropped EXE
PID:3256 -
\??\c:\rrrflfr.exec:\rrrflfr.exe31⤵
- Executes dropped EXE
PID:2640 -
\??\c:\7hhhbn.exec:\7hhhbn.exe32⤵
- Executes dropped EXE
PID:5108 -
\??\c:\jdvdd.exec:\jdvdd.exe33⤵
- Executes dropped EXE
PID:1152 -
\??\c:\3pjdp.exec:\3pjdp.exe34⤵
- Executes dropped EXE
PID:4368 -
\??\c:\frxrxxx.exec:\frxrxxx.exe35⤵
- Executes dropped EXE
PID:4872 -
\??\c:\bhhnbt.exec:\bhhnbt.exe36⤵
- Executes dropped EXE
PID:4404 -
\??\c:\htbbhb.exec:\htbbhb.exe37⤵
- Executes dropped EXE
PID:3292 -
\??\c:\ddpdv.exec:\ddpdv.exe38⤵
- Executes dropped EXE
PID:4440 -
\??\c:\xrlllrr.exec:\xrlllrr.exe39⤵
- Executes dropped EXE
PID:2832 -
\??\c:\dvvdv.exec:\dvvdv.exe40⤵
- Executes dropped EXE
PID:1084 -
\??\c:\jvppj.exec:\jvppj.exe41⤵
- Executes dropped EXE
PID:3588 -
\??\c:\rfxlrxf.exec:\rfxlrxf.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4788 -
\??\c:\bbbhhh.exec:\bbbhhh.exe43⤵
- Executes dropped EXE
PID:64 -
\??\c:\pppvj.exec:\pppvj.exe44⤵
- Executes dropped EXE
PID:3540 -
\??\c:\pdpjd.exec:\pdpjd.exe45⤵
- Executes dropped EXE
PID:3204 -
\??\c:\xlxxllf.exec:\xlxxllf.exe46⤵
- Executes dropped EXE
PID:388 -
\??\c:\bnhnbn.exec:\bnhnbn.exe47⤵
- Executes dropped EXE
PID:220 -
\??\c:\ppdpd.exec:\ppdpd.exe48⤵
- Executes dropped EXE
PID:512 -
\??\c:\dppjp.exec:\dppjp.exe49⤵
- Executes dropped EXE
PID:548 -
\??\c:\fxlflxx.exec:\fxlflxx.exe50⤵
- Executes dropped EXE
PID:4268 -
\??\c:\tbthtt.exec:\tbthtt.exe51⤵
- Executes dropped EXE
PID:2296 -
\??\c:\vdpdd.exec:\vdpdd.exe52⤵
- Executes dropped EXE
PID:4520 -
\??\c:\ddjdd.exec:\ddjdd.exe53⤵
- Executes dropped EXE
PID:2284 -
\??\c:\xfffxxx.exec:\xfffxxx.exe54⤵
- Executes dropped EXE
PID:4020 -
\??\c:\hnhhhh.exec:\hnhhhh.exe55⤵
- Executes dropped EXE
PID:2120 -
\??\c:\dvppd.exec:\dvppd.exe56⤵
- Executes dropped EXE
PID:2436 -
\??\c:\1rlxrrl.exec:\1rlxrrl.exe57⤵
- Executes dropped EXE
PID:4392 -
\??\c:\thhntb.exec:\thhntb.exe58⤵
- Executes dropped EXE
PID:3176 -
\??\c:\nnntbt.exec:\nnntbt.exe59⤵
- Executes dropped EXE
PID:2608 -
\??\c:\jjjjj.exec:\jjjjj.exe60⤵
- Executes dropped EXE
PID:3472 -
\??\c:\xxlxlfr.exec:\xxlxlfr.exe61⤵
- Executes dropped EXE
PID:4004 -
\??\c:\rlrrxxf.exec:\rlrrxxf.exe62⤵
- Executes dropped EXE
PID:3580 -
\??\c:\pjpjv.exec:\pjpjv.exe63⤵
- Executes dropped EXE
PID:3944 -
\??\c:\llfrxfr.exec:\llfrxfr.exe64⤵
- Executes dropped EXE
PID:3792 -
\??\c:\tnhtbh.exec:\tnhtbh.exe65⤵
- Executes dropped EXE
PID:3864 -
\??\c:\jdjjd.exec:\jdjjd.exe66⤵PID:1040
-
\??\c:\lflllff.exec:\lflllff.exe67⤵PID:8
-
\??\c:\hhbhht.exec:\hhbhht.exe68⤵PID:4640
-
\??\c:\3bbhbt.exec:\3bbhbt.exe69⤵PID:3180
-
\??\c:\pddjd.exec:\pddjd.exe70⤵PID:1568
-
\??\c:\5xlrffl.exec:\5xlrffl.exe71⤵PID:4784
-
\??\c:\tbtnhb.exec:\tbtnhb.exe72⤵PID:1900
-
\??\c:\pjvvv.exec:\pjvvv.exe73⤵PID:4576
-
\??\c:\lffxlrr.exec:\lffxlrr.exe74⤵PID:712
-
\??\c:\rflxfrx.exec:\rflxfrx.exe75⤵PID:2876
-
\??\c:\pppjd.exec:\pppjd.exe76⤵PID:3412
-
\??\c:\vjjjj.exec:\vjjjj.exe77⤵PID:2500
-
\??\c:\rlrlflf.exec:\rlrlflf.exe78⤵PID:3940
-
\??\c:\nnnnhh.exec:\nnnnhh.exe79⤵PID:1036
-
\??\c:\9djdv.exec:\9djdv.exe80⤵PID:3312
-
\??\c:\5llfxrl.exec:\5llfxrl.exe81⤵PID:2840
-
\??\c:\rrxxlxr.exec:\rrxxlxr.exe82⤵PID:4080
-
\??\c:\9tbtnn.exec:\9tbtnn.exe83⤵PID:3036
-
\??\c:\frfllrr.exec:\frfllrr.exe84⤵PID:1520
-
\??\c:\nnbtnt.exec:\nnbtnt.exe85⤵PID:4800
-
\??\c:\tbnntb.exec:\tbnntb.exe86⤵PID:3536
-
\??\c:\7dvjj.exec:\7dvjj.exe87⤵PID:1868
-
\??\c:\xxffrxx.exec:\xxffrxx.exe88⤵PID:1708
-
\??\c:\tnhnth.exec:\tnhnth.exe89⤵PID:3540
-
\??\c:\vpvdp.exec:\vpvdp.exe90⤵PID:3640
-
\??\c:\xxxfxrx.exec:\xxxfxrx.exe91⤵PID:4900
-
\??\c:\frrrllf.exec:\frrrllf.exe92⤵PID:1096
-
\??\c:\xlflrxl.exec:\xlflrxl.exe93⤵PID:216
-
\??\c:\bttbtt.exec:\bttbtt.exe94⤵PID:1596
-
\??\c:\jvdjp.exec:\jvdjp.exe95⤵PID:3032
-
\??\c:\rflfxxr.exec:\rflfxxr.exe96⤵PID:2348
-
\??\c:\bnnttb.exec:\bnnttb.exe97⤵PID:1652
-
\??\c:\dvjpv.exec:\dvjpv.exe98⤵
- System Location Discovery: System Language Discovery
PID:552 -
\??\c:\frxrrrx.exec:\frxrrrx.exe99⤵PID:4076
-
\??\c:\flllfll.exec:\flllfll.exe100⤵PID:3040
-
\??\c:\nhnhht.exec:\nhnhht.exe101⤵PID:1204
-
\??\c:\jpdjj.exec:\jpdjj.exe102⤵PID:1560
-
\??\c:\vpvpv.exec:\vpvpv.exe103⤵PID:2588
-
\??\c:\lfllrxf.exec:\lfllrxf.exe104⤵PID:2660
-
\??\c:\3ntnnh.exec:\3ntnnh.exe105⤵PID:636
-
\??\c:\ttbbbb.exec:\ttbbbb.exe106⤵PID:3492
-
\??\c:\dpvvv.exec:\dpvvv.exe107⤵PID:1692
-
\??\c:\rlrrxxl.exec:\rlrrxxl.exe108⤵PID:1340
-
\??\c:\rxffffr.exec:\rxffffr.exe109⤵PID:4832
-
\??\c:\btbthh.exec:\btbthh.exe110⤵PID:4840
-
\??\c:\pjpjp.exec:\pjpjp.exe111⤵PID:532
-
\??\c:\jdjdv.exec:\jdjdv.exe112⤵PID:4040
-
\??\c:\fflffrl.exec:\fflffrl.exe113⤵PID:4964
-
\??\c:\tnhntt.exec:\tnhntt.exe114⤵PID:3168
-
\??\c:\ppjdj.exec:\ppjdj.exe115⤵PID:4904
-
\??\c:\djppp.exec:\djppp.exe116⤵PID:2816
-
\??\c:\xxxrxxr.exec:\xxxrxxr.exe117⤵PID:3876
-
\??\c:\bbhhbb.exec:\bbhhbb.exe118⤵PID:4536
-
\??\c:\jppjd.exec:\jppjd.exe119⤵PID:452
-
\??\c:\hhhhbt.exec:\hhhhbt.exe120⤵PID:2112
-
\??\c:\bttnnt.exec:\bttnnt.exe121⤵PID:3120
-
\??\c:\1pvvj.exec:\1pvvj.exe122⤵PID:3520
-
\??\c:\7xrrlrx.exec:\7xrrlrx.exe123⤵PID:3940
-
\??\c:\1hhhbh.exec:\1hhhbh.exe124⤵PID:2036
-
\??\c:\htnhth.exec:\htnhth.exe125⤵PID:4988
-
\??\c:\jppdj.exec:\jppdj.exe126⤵PID:3344
-
\??\c:\5xlxlff.exec:\5xlxlff.exe127⤵PID:1976
-
\??\c:\ttttnt.exec:\ttttnt.exe128⤵PID:3036
-
\??\c:\tbtnnn.exec:\tbtnnn.exe129⤵PID:1520
-
\??\c:\dddvv.exec:\dddvv.exe130⤵PID:1580
-
\??\c:\rllfxxf.exec:\rllfxxf.exe131⤵PID:3440
-
\??\c:\htnhbt.exec:\htnhbt.exe132⤵PID:4712
-
\??\c:\jpppp.exec:\jpppp.exe133⤵PID:3640
-
\??\c:\pjdvp.exec:\pjdvp.exe134⤵PID:672
-
\??\c:\lrrrlxx.exec:\lrrrlxx.exe135⤵PID:3700
-
\??\c:\httnnb.exec:\httnnb.exe136⤵PID:4700
-
\??\c:\pppvj.exec:\pppvj.exe137⤵PID:1596
-
\??\c:\jpdpv.exec:\jpdpv.exe138⤵PID:4520
-
\??\c:\xlrxxxf.exec:\xlrxxxf.exe139⤵PID:884
-
\??\c:\thnhbh.exec:\thnhbh.exe140⤵PID:3648
-
\??\c:\pjjvp.exec:\pjjvp.exe141⤵PID:1288
-
\??\c:\xfrxlfl.exec:\xfrxlfl.exe142⤵PID:4912
-
\??\c:\hhhhtn.exec:\hhhhtn.exe143⤵PID:1140
-
\??\c:\hbthnt.exec:\hbthnt.exe144⤵PID:3632
-
\??\c:\vjjdd.exec:\vjjdd.exe145⤵PID:4004
-
\??\c:\lxxrflx.exec:\lxxrflx.exe146⤵PID:1180
-
\??\c:\bnttnn.exec:\bnttnn.exe147⤵PID:3280
-
\??\c:\ddvvv.exec:\ddvvv.exe148⤵PID:3492
-
\??\c:\llxxxlr.exec:\llxxxlr.exe149⤵PID:1692
-
\??\c:\7xxfflx.exec:\7xxfflx.exe150⤵PID:1340
-
\??\c:\hbntnb.exec:\hbntnb.exe151⤵PID:3116
-
\??\c:\jjdvj.exec:\jjdvj.exe152⤵PID:4840
-
\??\c:\pdppv.exec:\pdppv.exe153⤵PID:3756
-
\??\c:\9rlfrxf.exec:\9rlfrxf.exe154⤵PID:2228
-
\??\c:\nhbntn.exec:\nhbntn.exe155⤵PID:4884
-
\??\c:\vpppd.exec:\vpppd.exe156⤵PID:1732
-
\??\c:\jdpvj.exec:\jdpvj.exe157⤵PID:1676
-
\??\c:\rlfxllx.exec:\rlfxllx.exe158⤵PID:2816
-
\??\c:\bthbbt.exec:\bthbbt.exe159⤵PID:412
-
\??\c:\dppdp.exec:\dppdp.exe160⤵PID:3360
-
\??\c:\frrflrf.exec:\frrflrf.exe161⤵PID:4768
-
\??\c:\fxxllll.exec:\fxxllll.exe162⤵
- System Location Discovery: System Language Discovery
PID:4324 -
\??\c:\hnbnbb.exec:\hnbnbb.exe163⤵PID:4464
-
\??\c:\vdpvd.exec:\vdpvd.exe164⤵PID:2476
-
\??\c:\vdppp.exec:\vdppp.exe165⤵PID:2200
-
\??\c:\xllxlrl.exec:\xllxlrl.exe166⤵PID:2032
-
\??\c:\bbbthn.exec:\bbbthn.exe167⤵PID:1744
-
\??\c:\nhttnn.exec:\nhttnn.exe168⤵PID:4532
-
\??\c:\jpdpp.exec:\jpdpp.exe169⤵PID:1564
-
\??\c:\frffrlf.exec:\frffrlf.exe170⤵PID:368
-
\??\c:\llfrflx.exec:\llfrflx.exe171⤵PID:3972
-
\??\c:\hhnnbb.exec:\hhnnbb.exe172⤵PID:1580
-
\??\c:\jjjdd.exec:\jjjdd.exe173⤵PID:2220
-
\??\c:\rlrxrlx.exec:\rlrxrlx.exe174⤵PID:4712
-
\??\c:\rrlrrlf.exec:\rrlrrlf.exe175⤵PID:3640
-
\??\c:\3hhntb.exec:\3hhntb.exe176⤵PID:672
-
\??\c:\vjvpd.exec:\vjvpd.exe177⤵PID:3700
-
\??\c:\pjddp.exec:\pjddp.exe178⤵PID:1096
-
\??\c:\lfllrfx.exec:\lfllrfx.exe179⤵PID:4588
-
\??\c:\tbhhtb.exec:\tbhhtb.exe180⤵PID:3968
-
\??\c:\nnbttt.exec:\nnbttt.exe181⤵PID:4820
-
\??\c:\jdppv.exec:\jdppv.exe182⤵PID:552
-
\??\c:\frrxrrr.exec:\frrxrrr.exe183⤵PID:4392
-
\??\c:\thhhhn.exec:\thhhhn.exe184⤵PID:4912
-
\??\c:\jjddv.exec:\jjddv.exe185⤵PID:1560
-
\??\c:\fxrllll.exec:\fxrllll.exe186⤵PID:5092
-
\??\c:\nhbhhn.exec:\nhbhhn.exe187⤵PID:3580
-
\??\c:\tntnht.exec:\tntnht.exe188⤵PID:1180
-
\??\c:\vdjdd.exec:\vdjdd.exe189⤵PID:3944
-
\??\c:\llfllrr.exec:\llfllrr.exe190⤵PID:1740
-
\??\c:\lffrlll.exec:\lffrlll.exe191⤵PID:440
-
\??\c:\ppdpj.exec:\ppdpj.exe192⤵PID:3456
-
\??\c:\3xrrflx.exec:\3xrrflx.exe193⤵PID:3464
-
\??\c:\nnbntb.exec:\nnbntb.exe194⤵PID:4696
-
\??\c:\vjpdp.exec:\vjpdp.exe195⤵PID:3168
-
\??\c:\5vjjp.exec:\5vjjp.exe196⤵PID:1912
-
\??\c:\rxrflll.exec:\rxrflll.exe197⤵PID:4480
-
\??\c:\nhbnbb.exec:\nhbnbb.exe198⤵PID:2392
-
\??\c:\vddpp.exec:\vddpp.exe199⤵PID:1152
-
\??\c:\xxlxffl.exec:\xxlxffl.exe200⤵PID:4872
-
\??\c:\1rfffff.exec:\1rfffff.exe201⤵PID:2520
-
\??\c:\nhtnhn.exec:\nhtnhn.exe202⤵PID:212
-
\??\c:\jdvvv.exec:\jdvvv.exe203⤵PID:4664
-
\??\c:\rlllfff.exec:\rlllfff.exe204⤵PID:3292
-
\??\c:\xxlrffr.exec:\xxlrffr.exe205⤵PID:3532
-
\??\c:\hntntb.exec:\hntntb.exe206⤵PID:4280
-
\??\c:\ddpjv.exec:\ddpjv.exe207⤵PID:1940
-
\??\c:\hhtbtb.exec:\hhtbtb.exe208⤵PID:3800
-
\??\c:\flrffxx.exec:\flrffxx.exe209⤵PID:3588
-
\??\c:\rrlrlxl.exec:\rrlrlxl.exe210⤵PID:4304
-
\??\c:\tbthhb.exec:\tbthhb.exe211⤵PID:1608
-
\??\c:\pvvjp.exec:\pvvjp.exe212⤵PID:4512
-
\??\c:\fxrlxxr.exec:\fxrlxxr.exe213⤵PID:4152
-
\??\c:\3jpjj.exec:\3jpjj.exe214⤵PID:5076
-
\??\c:\jpvjj.exec:\jpvjj.exe215⤵PID:1460
-
\??\c:\rrllfrr.exec:\rrllfrr.exe216⤵PID:672
-
\??\c:\tthbth.exec:\tthbth.exe217⤵PID:5072
-
\??\c:\jjdvj.exec:\jjdvj.exe218⤵PID:2284
-
\??\c:\lrrxxxl.exec:\lrrxxxl.exe219⤵PID:884
-
\??\c:\pvvdd.exec:\pvvdd.exe220⤵PID:3620
-
\??\c:\pvddj.exec:\pvddj.exe221⤵PID:1136
-
\??\c:\lfllxff.exec:\lfllxff.exe222⤵PID:3040
-
\??\c:\bntnnn.exec:\bntnnn.exe223⤵PID:3916
-
\??\c:\jjvvd.exec:\jjvvd.exe224⤵PID:1488
-
\??\c:\frlxllf.exec:\frlxllf.exe225⤵PID:4004
-
\??\c:\nhhhbb.exec:\nhhhbb.exe226⤵PID:1400
-
\??\c:\pdddd.exec:\pdddd.exe227⤵PID:4036
-
\??\c:\nbbbtb.exec:\nbbbtb.exe228⤵PID:3792
-
\??\c:\vvppj.exec:\vvppj.exe229⤵PID:4984
-
\??\c:\hhhthb.exec:\hhhthb.exe230⤵PID:2924
-
\??\c:\hnbnbh.exec:\hnbnbh.exe231⤵PID:8
-
\??\c:\vppjj.exec:\vppjj.exe232⤵PID:3756
-
\??\c:\rllrllf.exec:\rllrllf.exe233⤵PID:4956
-
\??\c:\hnnbnb.exec:\hnnbnb.exe234⤵PID:1896
-
\??\c:\vvpdv.exec:\vvpdv.exe235⤵PID:5108
-
\??\c:\lxxlflr.exec:\lxxlflr.exe236⤵PID:4524
-
\??\c:\llrrlxx.exec:\llrrlxx.exe237⤵PID:412
-
\??\c:\tnbbnh.exec:\tnbbnh.exe238⤵PID:452
-
\??\c:\pvvjd.exec:\pvvjd.exe239⤵PID:2112
-
\??\c:\hbbnbt.exec:\hbbnbt.exe240⤵
- System Location Discovery: System Language Discovery
PID:2804 -
\??\c:\pvjpd.exec:\pvjpd.exe241⤵PID:648
-
\??\c:\xrllrrx.exec:\xrllrrx.exe242⤵PID:2268