Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe
Resource
win7-20240708-en
General
-
Target
e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe
-
Size
91KB
-
MD5
b3ef64838721d804843ec6107dcee1b2
-
SHA1
7990eeb539a26ff4a4e5008e2836b0113198bc10
-
SHA256
e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542
-
SHA512
6f28cd20fbdf2c0f42ef283f33e283124803c11a57d28cb6dd63090e0d64d47364f4328da03cf2c00a40b89aae1db371d0f71e1981a7c16f403b62d4291dbf85
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZaRB2:ymb3NkkiQ3mdBjFIVLd2hWZGreRCYBVs
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/4904-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/880-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3220-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3048-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/628-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1940-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3472-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3052-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4564-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4428-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4788-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2784-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4972-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3228-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4648-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3268-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3028 rfffxxr.exe 2072 htbtbt.exe 880 hhhbbb.exe 3220 djpjd.exe 1620 xlfxfxx.exe 3048 bhnhhh.exe 628 ddjdv.exe 4508 xrxrrff.exe 1940 xrrlllf.exe 3000 bbnhhb.exe 3472 ppvpp.exe 5080 pvjvv.exe 2196 5flfxxr.exe 2400 3nnhhh.exe 3052 tnttnb.exe 4564 jddvp.exe 4428 llflrxx.exe 4788 tnbnhb.exe 2784 5ddvp.exe 3768 rfllflf.exe 4832 fxlllfl.exe 4972 nhhhbb.exe 3492 tnhhnn.exe 3228 9ppjd.exe 1376 9vdjv.exe 4576 3xffrrr.exe 2212 tthbhh.exe 4664 jpvpp.exe 4648 rlxxxxx.exe 3268 3rfxlrf.exe 3716 hntnhb.exe 2776 tbtnhh.exe 1112 djvvv.exe 1516 jjvvj.exe 3728 lrxrrll.exe 5076 nhtnnn.exe 4048 3bbtth.exe 1400 vjpjj.exe 3528 pjjdv.exe 5072 xrxrxxr.exe 4076 rrlfxrr.exe 2600 ttttnt.exe 1856 nhnhht.exe 2412 dvvpp.exe 3668 jvvjd.exe 3356 fxrxrlf.exe 3340 rrrrlff.exe 336 bntttb.exe 4888 nhbnhh.exe 3852 7jvpj.exe 2028 rfffxrx.exe 3476 5xxxrrl.exe 2400 htnhbt.exe 4536 tnhhtn.exe 1492 3ppjj.exe 1672 vpjdv.exe 4564 frlfxxr.exe 4060 3xxrrfx.exe 4864 nnhhbb.exe 4752 thbbtt.exe 116 ddvvp.exe 3316 xxxrlff.exe 1780 xlrrrxr.exe 4972 bbthbn.exe -
resource yara_rule behavioral2/memory/4904-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3028-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/880-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/880-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3220-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/628-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4508-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1940-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1940-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1940-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3472-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3052-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4564-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4428-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4788-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2784-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4832-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4972-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3228-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4648-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3268-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rxllfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tbntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3028 4904 e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe 83 PID 4904 wrote to memory of 3028 4904 e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe 83 PID 4904 wrote to memory of 3028 4904 e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe 83 PID 3028 wrote to memory of 2072 3028 rfffxxr.exe 84 PID 3028 wrote to memory of 2072 3028 rfffxxr.exe 84 PID 3028 wrote to memory of 2072 3028 rfffxxr.exe 84 PID 2072 wrote to memory of 880 2072 htbtbt.exe 85 PID 2072 wrote to memory of 880 2072 htbtbt.exe 85 PID 2072 wrote to memory of 880 2072 htbtbt.exe 85 PID 880 wrote to memory of 3220 880 hhhbbb.exe 87 PID 880 wrote to memory of 3220 880 hhhbbb.exe 87 PID 880 wrote to memory of 3220 880 hhhbbb.exe 87 PID 3220 wrote to memory of 1620 3220 djpjd.exe 88 PID 3220 wrote to memory of 1620 3220 djpjd.exe 88 PID 3220 wrote to memory of 1620 3220 djpjd.exe 88 PID 1620 wrote to memory of 3048 1620 xlfxfxx.exe 89 PID 1620 wrote to memory of 3048 1620 xlfxfxx.exe 89 PID 1620 wrote to memory of 3048 1620 xlfxfxx.exe 89 PID 3048 wrote to memory of 628 3048 bhnhhh.exe 90 PID 3048 wrote to memory of 628 3048 bhnhhh.exe 90 PID 3048 wrote to memory of 628 3048 bhnhhh.exe 90 PID 628 wrote to memory of 4508 628 ddjdv.exe 91 PID 628 wrote to memory of 4508 628 ddjdv.exe 91 PID 628 wrote to memory of 4508 628 ddjdv.exe 91 PID 4508 wrote to memory of 1940 4508 xrxrrff.exe 92 PID 4508 wrote to memory of 1940 4508 xrxrrff.exe 92 PID 4508 wrote to memory of 1940 4508 xrxrrff.exe 92 PID 1940 wrote to memory of 3000 1940 xrrlllf.exe 94 PID 1940 wrote to memory of 3000 1940 xrrlllf.exe 94 PID 1940 wrote to memory of 3000 1940 xrrlllf.exe 94 PID 3000 wrote to memory of 3472 3000 bbnhhb.exe 95 PID 3000 wrote to memory of 3472 3000 bbnhhb.exe 95 PID 3000 wrote to memory of 3472 3000 bbnhhb.exe 95 PID 3472 wrote to memory of 5080 3472 ppvpp.exe 96 PID 3472 wrote to memory of 5080 3472 ppvpp.exe 96 PID 3472 wrote to memory of 5080 3472 ppvpp.exe 96 PID 5080 wrote to memory of 2196 5080 pvjvv.exe 97 PID 5080 wrote to memory of 2196 5080 pvjvv.exe 97 PID 5080 wrote to memory of 2196 5080 pvjvv.exe 97 PID 2196 wrote to memory of 2400 2196 5flfxxr.exe 98 PID 2196 wrote to memory of 2400 2196 5flfxxr.exe 98 PID 2196 wrote to memory of 2400 2196 5flfxxr.exe 98 PID 2400 wrote to memory of 3052 2400 3nnhhh.exe 99 PID 2400 wrote to memory of 3052 2400 3nnhhh.exe 99 PID 2400 wrote to memory of 3052 2400 3nnhhh.exe 99 PID 3052 wrote to memory of 4564 3052 tnttnb.exe 100 PID 3052 wrote to memory of 4564 3052 tnttnb.exe 100 PID 3052 wrote to memory of 4564 3052 tnttnb.exe 100 PID 4564 wrote to memory of 4428 4564 jddvp.exe 101 PID 4564 wrote to memory of 4428 4564 jddvp.exe 101 PID 4564 wrote to memory of 4428 4564 jddvp.exe 101 PID 4428 wrote to memory of 4788 4428 llflrxx.exe 103 PID 4428 wrote to memory of 4788 4428 llflrxx.exe 103 PID 4428 wrote to memory of 4788 4428 llflrxx.exe 103 PID 4788 wrote to memory of 2784 4788 tnbnhb.exe 104 PID 4788 wrote to memory of 2784 4788 tnbnhb.exe 104 PID 4788 wrote to memory of 2784 4788 tnbnhb.exe 104 PID 2784 wrote to memory of 3768 2784 5ddvp.exe 105 PID 2784 wrote to memory of 3768 2784 5ddvp.exe 105 PID 2784 wrote to memory of 3768 2784 5ddvp.exe 105 PID 3768 wrote to memory of 4832 3768 rfllflf.exe 106 PID 3768 wrote to memory of 4832 3768 rfllflf.exe 106 PID 3768 wrote to memory of 4832 3768 rfllflf.exe 106 PID 4832 wrote to memory of 4972 4832 fxlllfl.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe"C:\Users\Admin\AppData\Local\Temp\e40fc81863ad391aa95f92e5ce3690fa2a9c7aeeb6120bc47fa5865d78217542.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\rfffxxr.exec:\rfffxxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\htbtbt.exec:\htbtbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\hhhbbb.exec:\hhhbbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
\??\c:\djpjd.exec:\djpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
\??\c:\xlfxfxx.exec:\xlfxfxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\bhnhhh.exec:\bhnhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\ddjdv.exec:\ddjdv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
\??\c:\xrxrrff.exec:\xrxrrff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\xrrlllf.exec:\xrrlllf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\bbnhhb.exec:\bbnhhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\ppvpp.exec:\ppvpp.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
\??\c:\pvjvv.exec:\pvjvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\5flfxxr.exec:\5flfxxr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\3nnhhh.exec:\3nnhhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\tnttnb.exec:\tnttnb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\jddvp.exec:\jddvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\llflrxx.exec:\llflrxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
\??\c:\tnbnhb.exec:\tnbnhb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\5ddvp.exec:\5ddvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\rfllflf.exec:\rfllflf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\fxlllfl.exec:\fxlllfl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\nhhhbb.exec:\nhhhbb.exe23⤵
- Executes dropped EXE
PID:4972 -
\??\c:\tnhhnn.exec:\tnhhnn.exe24⤵
- Executes dropped EXE
PID:3492 -
\??\c:\9ppjd.exec:\9ppjd.exe25⤵
- Executes dropped EXE
PID:3228 -
\??\c:\9vdjv.exec:\9vdjv.exe26⤵
- Executes dropped EXE
PID:1376 -
\??\c:\3xffrrr.exec:\3xffrrr.exe27⤵
- Executes dropped EXE
PID:4576 -
\??\c:\tthbhh.exec:\tthbhh.exe28⤵
- Executes dropped EXE
PID:2212 -
\??\c:\jpvpp.exec:\jpvpp.exe29⤵
- Executes dropped EXE
PID:4664 -
\??\c:\rlxxxxx.exec:\rlxxxxx.exe30⤵
- Executes dropped EXE
PID:4648 -
\??\c:\3rfxlrf.exec:\3rfxlrf.exe31⤵
- Executes dropped EXE
PID:3268 -
\??\c:\hntnhb.exec:\hntnhb.exe32⤵
- Executes dropped EXE
PID:3716 -
\??\c:\tbtnhh.exec:\tbtnhh.exe33⤵
- Executes dropped EXE
PID:2776 -
\??\c:\djvvv.exec:\djvvv.exe34⤵
- Executes dropped EXE
PID:1112 -
\??\c:\jjvvj.exec:\jjvvj.exe35⤵
- Executes dropped EXE
PID:1516 -
\??\c:\lrxrrll.exec:\lrxrrll.exe36⤵
- Executes dropped EXE
PID:3728 -
\??\c:\nhtnnn.exec:\nhtnnn.exe37⤵
- Executes dropped EXE
PID:5076 -
\??\c:\3bbtth.exec:\3bbtth.exe38⤵
- Executes dropped EXE
PID:4048 -
\??\c:\vjpjj.exec:\vjpjj.exe39⤵
- Executes dropped EXE
PID:1400 -
\??\c:\pjjdv.exec:\pjjdv.exe40⤵
- Executes dropped EXE
PID:3528 -
\??\c:\xrxrxxr.exec:\xrxrxxr.exe41⤵
- Executes dropped EXE
PID:5072 -
\??\c:\rrlfxrr.exec:\rrlfxrr.exe42⤵
- Executes dropped EXE
PID:4076 -
\??\c:\ttttnt.exec:\ttttnt.exe43⤵
- Executes dropped EXE
PID:2600 -
\??\c:\nhnhht.exec:\nhnhht.exe44⤵
- Executes dropped EXE
PID:1856 -
\??\c:\dvvpp.exec:\dvvpp.exe45⤵
- Executes dropped EXE
PID:2412 -
\??\c:\jvvjd.exec:\jvvjd.exe46⤵
- Executes dropped EXE
PID:3668 -
\??\c:\fxrxrlf.exec:\fxrxrlf.exe47⤵
- Executes dropped EXE
PID:3356 -
\??\c:\rrrrlff.exec:\rrrrlff.exe48⤵
- Executes dropped EXE
PID:3340 -
\??\c:\bntttb.exec:\bntttb.exe49⤵
- Executes dropped EXE
PID:336 -
\??\c:\nhbnhh.exec:\nhbnhh.exe50⤵
- Executes dropped EXE
PID:4888 -
\??\c:\7jvpj.exec:\7jvpj.exe51⤵
- Executes dropped EXE
PID:3852 -
\??\c:\rfffxrx.exec:\rfffxrx.exe52⤵
- Executes dropped EXE
PID:2028 -
\??\c:\5xxxrrl.exec:\5xxxrrl.exe53⤵
- Executes dropped EXE
PID:3476 -
\??\c:\htnhbt.exec:\htnhbt.exe54⤵
- Executes dropped EXE
PID:2400 -
\??\c:\tnhhtn.exec:\tnhhtn.exe55⤵
- Executes dropped EXE
PID:4536 -
\??\c:\3ppjj.exec:\3ppjj.exe56⤵
- Executes dropped EXE
PID:1492 -
\??\c:\vpjdv.exec:\vpjdv.exe57⤵
- Executes dropped EXE
PID:1672 -
\??\c:\frlfxxr.exec:\frlfxxr.exe58⤵
- Executes dropped EXE
PID:4564 -
\??\c:\3xxrrfx.exec:\3xxrrfx.exe59⤵
- Executes dropped EXE
PID:4060 -
\??\c:\nnhhbb.exec:\nnhhbb.exe60⤵
- Executes dropped EXE
PID:4864 -
\??\c:\thbbtt.exec:\thbbtt.exe61⤵
- Executes dropped EXE
PID:4752 -
\??\c:\ddvvp.exec:\ddvvp.exe62⤵
- Executes dropped EXE
PID:116 -
\??\c:\xxxrlff.exec:\xxxrlff.exe63⤵
- Executes dropped EXE
PID:3316 -
\??\c:\xlrrrxr.exec:\xlrrrxr.exe64⤵
- Executes dropped EXE
PID:1780 -
\??\c:\bbthbn.exec:\bbthbn.exe65⤵
- Executes dropped EXE
PID:4972 -
\??\c:\9tbnhh.exec:\9tbnhh.exe66⤵PID:1108
-
\??\c:\lxffxrl.exec:\lxffxrl.exe67⤵PID:3756
-
\??\c:\lfxrllf.exec:\lfxrllf.exe68⤵PID:1172
-
\??\c:\tnhhht.exec:\tnhhht.exe69⤵PID:4620
-
\??\c:\jdvpp.exec:\jdvpp.exe70⤵PID:1116
-
\??\c:\xllrlxr.exec:\xllrlxr.exe71⤵PID:244
-
\??\c:\9bbbtt.exec:\9bbbtt.exe72⤵PID:3192
-
\??\c:\pdddv.exec:\pdddv.exe73⤵PID:2848
-
\??\c:\vjjjd.exec:\vjjjd.exe74⤵PID:2940
-
\??\c:\lfrlfxx.exec:\lfrlfxx.exe75⤵PID:2188
-
\??\c:\htnhbb.exec:\htnhbb.exe76⤵PID:4388
-
\??\c:\1htttt.exec:\1htttt.exe77⤵PID:4372
-
\??\c:\ppppj.exec:\ppppj.exe78⤵PID:1112
-
\??\c:\rfrlxlf.exec:\rfrlxlf.exe79⤵PID:1516
-
\??\c:\5frlllr.exec:\5frlllr.exe80⤵PID:2620
-
\??\c:\3lffllr.exec:\3lffllr.exe81⤵PID:4948
-
\??\c:\thbtnn.exec:\thbtnn.exe82⤵PID:4048
-
\??\c:\thtttb.exec:\thtttb.exe83⤵PID:1400
-
\??\c:\dvjdv.exec:\dvjdv.exe84⤵PID:2604
-
\??\c:\djjdj.exec:\djjdj.exe85⤵PID:5072
-
\??\c:\fllfxxr.exec:\fllfxxr.exe86⤵PID:1384
-
\??\c:\bbtnhh.exec:\bbtnhh.exe87⤵PID:1992
-
\??\c:\bhbnbt.exec:\bhbnbt.exe88⤵PID:3048
-
\??\c:\jvdvj.exec:\jvdvj.exe89⤵PID:1964
-
\??\c:\5pdvj.exec:\5pdvj.exe90⤵PID:3132
-
\??\c:\lllxxrf.exec:\lllxxrf.exe91⤵PID:1940
-
\??\c:\nbnnhb.exec:\nbnnhb.exe92⤵PID:4340
-
\??\c:\5hhtnn.exec:\5hhtnn.exe93⤵PID:232
-
\??\c:\5pvpj.exec:\5pvpj.exe94⤵PID:2408
-
\??\c:\vjvjd.exec:\vjvjd.exe95⤵PID:3448
-
\??\c:\lfllllr.exec:\lfllllr.exe96⤵PID:4828
-
\??\c:\hbhtnh.exec:\hbhtnh.exe97⤵PID:4596
-
\??\c:\btbnnt.exec:\btbnnt.exe98⤵PID:624
-
\??\c:\vpvjj.exec:\vpvjj.exe99⤵PID:1636
-
\??\c:\vpjvj.exec:\vpjvj.exe100⤵PID:936
-
\??\c:\xlxlrll.exec:\xlxlrll.exe101⤵PID:1808
-
\??\c:\rxlllfl.exec:\rxlllfl.exe102⤵PID:664
-
\??\c:\nttnbt.exec:\nttnbt.exe103⤵PID:3560
-
\??\c:\3vvvp.exec:\3vvvp.exe104⤵PID:1924
-
\??\c:\9vdvj.exec:\9vdvj.exe105⤵PID:3088
-
\??\c:\xflffll.exec:\xflffll.exe106⤵PID:1512
-
\??\c:\thtnhh.exec:\thtnhh.exe107⤵PID:2448
-
\??\c:\btthbn.exec:\btthbn.exe108⤵PID:396
-
\??\c:\pvvpj.exec:\pvvpj.exe109⤵PID:1284
-
\??\c:\jvjjp.exec:\jvjjp.exe110⤵PID:2040
-
\??\c:\lrlxxxx.exec:\lrlxxxx.exe111⤵PID:4380
-
\??\c:\fflrfff.exec:\fflrfff.exe112⤵PID:2152
-
\??\c:\nbthbh.exec:\nbthbh.exe113⤵PID:2376
-
\??\c:\tnhbnh.exec:\tnhbnh.exe114⤵PID:3636
-
\??\c:\dvvjv.exec:\dvvjv.exe115⤵PID:4664
-
\??\c:\rrrlxrf.exec:\rrrlxrf.exe116⤵PID:1844
-
\??\c:\xrfxllr.exec:\xrfxllr.exe117⤵PID:2768
-
\??\c:\bbhbbb.exec:\bbhbbb.exe118⤵PID:1868
-
\??\c:\htnnhh.exec:\htnnhh.exe119⤵PID:4612
-
\??\c:\ddjdd.exec:\ddjdd.exe120⤵PID:2056
-
\??\c:\vdddd.exec:\vdddd.exe121⤵PID:4904
-
\??\c:\fxxflfx.exec:\fxxflfx.exe122⤵PID:4484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-