Analysis
-
max time kernel
120s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 09:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
25af8646094136691a9c630f54de1e10N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
25af8646094136691a9c630f54de1e10N.exe
-
Size
843KB
-
MD5
25af8646094136691a9c630f54de1e10
-
SHA1
55f75783b05c3048ce3d532bb5698a0f34a66e03
-
SHA256
c7c334a34d6be9f3afa8ef6e041b08e3ca488727a942d9f3dda21b0830973540
-
SHA512
92806900dd4cb32b7f33d2fddc2142be3362c06078e0a93a2cc38e3673ed9261c50069d6deb3d48f420fef6fdc27b5c68a651fbf72f2b086a7593cdd6c45e381
-
SSDEEP
24576:Sgdn8whSenedn8whhdn76gdn8whSfgdn8whSzu:TFyVPf5
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4064-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1196-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4596-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1976-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4068-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/680-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2508-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4248-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3472-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4520-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1456-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2724-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5088-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4584-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4760-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4380-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1288-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1000-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3728-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4664 thhbbt.exe 3560 tbnhtn.exe 4084 nnhtnh.exe 1196 llrflff.exe 3384 jvvvp.exe 4596 bnhbnh.exe 1976 rrfrrlx.exe 1340 hhtntn.exe 4068 pddpd.exe 4536 3ntnbb.exe 4220 1djdd.exe 680 5lflfff.exe 2508 xllffxr.exe 4248 tbhhtt.exe 3728 1jppj.exe 3472 xxxxrrl.exe 1000 nthtnh.exe 4520 jppdv.exe 1288 flxxlrl.exe 1456 nnttbb.exe 4380 7djdv.exe 2268 xrrrlfx.exe 2724 hhtttt.exe 4760 dddvv.exe 3848 jvvpj.exe 928 rfrlffx.exe 4224 7ttnhh.exe 5088 jvpdv.exe 1592 fxfrrff.exe 4584 hhbthh.exe 1472 pppdd.exe 32 xfxlxrl.exe 552 3ntbtn.exe 1632 jppvj.exe 2784 rflfxfr.exe 2628 lxxxrlx.exe 5068 nbnhnh.exe 832 jjjvp.exe 3536 lxxxlxl.exe 1400 9bthtn.exe 3560 pvpdp.exe 4288 5llxlfr.exe 2044 btnbtt.exe 2708 thnbbh.exe 1828 dppjv.exe 2036 xrrxrlf.exe 4468 nbhtbt.exe 3508 ntnnbt.exe 2472 ddpdd.exe 2460 bnnbnh.exe 1364 htntbn.exe 4536 vddpj.exe 3240 xllflxf.exe 3488 hhnhbt.exe 1200 vppjd.exe 452 9rrlxrf.exe 4452 hhntnn.exe 2432 pdvpd.exe 4520 rxfxllf.exe 1288 hbbnhb.exe 424 djvdv.exe 3336 xlxrfxr.exe 1732 bnhtht.exe 4568 jjvpp.exe -
resource yara_rule behavioral2/memory/4064-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1196-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4596-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4068-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/680-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4248-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3472-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4520-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1456-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5088-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4584-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4760-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4380-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1288-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1000-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3728-111-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlxrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffllrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3djvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffrlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3thbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flllxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrfrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflfxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nbntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4664 4064 25af8646094136691a9c630f54de1e10N.exe 84 PID 4064 wrote to memory of 4664 4064 25af8646094136691a9c630f54de1e10N.exe 84 PID 4064 wrote to memory of 4664 4064 25af8646094136691a9c630f54de1e10N.exe 84 PID 4664 wrote to memory of 3560 4664 thhbbt.exe 85 PID 4664 wrote to memory of 3560 4664 thhbbt.exe 85 PID 4664 wrote to memory of 3560 4664 thhbbt.exe 85 PID 3560 wrote to memory of 4084 3560 tbnhtn.exe 86 PID 3560 wrote to memory of 4084 3560 tbnhtn.exe 86 PID 3560 wrote to memory of 4084 3560 tbnhtn.exe 86 PID 4084 wrote to memory of 1196 4084 nnhtnh.exe 87 PID 4084 wrote to memory of 1196 4084 nnhtnh.exe 87 PID 4084 wrote to memory of 1196 4084 nnhtnh.exe 87 PID 1196 wrote to memory of 3384 1196 llrflff.exe 88 PID 1196 wrote to memory of 3384 1196 llrflff.exe 88 PID 1196 wrote to memory of 3384 1196 llrflff.exe 88 PID 3384 wrote to memory of 4596 3384 jvvvp.exe 89 PID 3384 wrote to memory of 4596 3384 jvvvp.exe 89 PID 3384 wrote to memory of 4596 3384 jvvvp.exe 89 PID 4596 wrote to memory of 1976 4596 bnhbnh.exe 90 PID 4596 wrote to memory of 1976 4596 bnhbnh.exe 90 PID 4596 wrote to memory of 1976 4596 bnhbnh.exe 90 PID 1976 wrote to memory of 1340 1976 rrfrrlx.exe 92 PID 1976 wrote to memory of 1340 1976 rrfrrlx.exe 92 PID 1976 wrote to memory of 1340 1976 rrfrrlx.exe 92 PID 1340 wrote to memory of 4068 1340 hhtntn.exe 93 PID 1340 wrote to memory of 4068 1340 hhtntn.exe 93 PID 1340 wrote to memory of 4068 1340 hhtntn.exe 93 PID 4068 wrote to memory of 4536 4068 pddpd.exe 94 PID 4068 wrote to memory of 4536 4068 pddpd.exe 94 PID 4068 wrote to memory of 4536 4068 pddpd.exe 94 PID 4536 wrote to memory of 4220 4536 3ntnbb.exe 95 PID 4536 wrote to memory of 4220 4536 3ntnbb.exe 95 PID 4536 wrote to memory of 4220 4536 3ntnbb.exe 95 PID 4220 wrote to memory of 680 4220 1djdd.exe 96 PID 4220 wrote to memory of 680 4220 1djdd.exe 96 PID 4220 wrote to memory of 680 4220 1djdd.exe 96 PID 680 wrote to memory of 2508 680 5lflfff.exe 98 PID 680 wrote to memory of 2508 680 5lflfff.exe 98 PID 680 wrote to memory of 2508 680 5lflfff.exe 98 PID 2508 wrote to memory of 4248 2508 xllffxr.exe 99 PID 2508 wrote to memory of 4248 2508 xllffxr.exe 99 PID 2508 wrote to memory of 4248 2508 xllffxr.exe 99 PID 4248 wrote to memory of 3728 4248 tbhhtt.exe 100 PID 4248 wrote to memory of 3728 4248 tbhhtt.exe 100 PID 4248 wrote to memory of 3728 4248 tbhhtt.exe 100 PID 3728 wrote to memory of 3472 3728 1jppj.exe 101 PID 3728 wrote to memory of 3472 3728 1jppj.exe 101 PID 3728 wrote to memory of 3472 3728 1jppj.exe 101 PID 3472 wrote to memory of 1000 3472 xxxxrrl.exe 102 PID 3472 wrote to memory of 1000 3472 xxxxrrl.exe 102 PID 3472 wrote to memory of 1000 3472 xxxxrrl.exe 102 PID 1000 wrote to memory of 4520 1000 nthtnh.exe 103 PID 1000 wrote to memory of 4520 1000 nthtnh.exe 103 PID 1000 wrote to memory of 4520 1000 nthtnh.exe 103 PID 4520 wrote to memory of 1288 4520 jppdv.exe 104 PID 4520 wrote to memory of 1288 4520 jppdv.exe 104 PID 4520 wrote to memory of 1288 4520 jppdv.exe 104 PID 1288 wrote to memory of 1456 1288 flxxlrl.exe 105 PID 1288 wrote to memory of 1456 1288 flxxlrl.exe 105 PID 1288 wrote to memory of 1456 1288 flxxlrl.exe 105 PID 1456 wrote to memory of 4380 1456 nnttbb.exe 106 PID 1456 wrote to memory of 4380 1456 nnttbb.exe 106 PID 1456 wrote to memory of 4380 1456 nnttbb.exe 106 PID 4380 wrote to memory of 2268 4380 7djdv.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\25af8646094136691a9c630f54de1e10N.exe"C:\Users\Admin\AppData\Local\Temp\25af8646094136691a9c630f54de1e10N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\thhbbt.exec:\thhbbt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\tbnhtn.exec:\tbnhtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\nnhtnh.exec:\nnhtnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\llrflff.exec:\llrflff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\jvvvp.exec:\jvvvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\bnhbnh.exec:\bnhbnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\rrfrrlx.exec:\rrfrrlx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\hhtntn.exec:\hhtntn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
\??\c:\pddpd.exec:\pddpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\3ntnbb.exec:\3ntnbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\1djdd.exec:\1djdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\5lflfff.exec:\5lflfff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\xllffxr.exec:\xllffxr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\tbhhtt.exec:\tbhhtt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\1jppj.exec:\1jppj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\xxxxrrl.exec:\xxxxrrl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
\??\c:\nthtnh.exec:\nthtnh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\jppdv.exec:\jppdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\flxxlrl.exec:\flxxlrl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
\??\c:\nnttbb.exec:\nnttbb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\7djdv.exec:\7djdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
\??\c:\xrrrlfx.exec:\xrrrlfx.exe23⤵
- Executes dropped EXE
PID:2268 -
\??\c:\hhtttt.exec:\hhtttt.exe24⤵
- Executes dropped EXE
PID:2724 -
\??\c:\dddvv.exec:\dddvv.exe25⤵
- Executes dropped EXE
PID:4760 -
\??\c:\jvvpj.exec:\jvvpj.exe26⤵
- Executes dropped EXE
PID:3848 -
\??\c:\rfrlffx.exec:\rfrlffx.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928 -
\??\c:\7ttnhh.exec:\7ttnhh.exe28⤵
- Executes dropped EXE
PID:4224 -
\??\c:\jvpdv.exec:\jvpdv.exe29⤵
- Executes dropped EXE
PID:5088 -
\??\c:\fxfrrff.exec:\fxfrrff.exe30⤵
- Executes dropped EXE
PID:1592 -
\??\c:\hhbthh.exec:\hhbthh.exe31⤵
- Executes dropped EXE
PID:4584 -
\??\c:\pppdd.exec:\pppdd.exe32⤵
- Executes dropped EXE
PID:1472 -
\??\c:\xfxlxrl.exec:\xfxlxrl.exe33⤵
- Executes dropped EXE
PID:32 -
\??\c:\3ntbtn.exec:\3ntbtn.exe34⤵
- Executes dropped EXE
PID:552 -
\??\c:\jppvj.exec:\jppvj.exe35⤵
- Executes dropped EXE
PID:1632 -
\??\c:\rflfxfr.exec:\rflfxfr.exe36⤵
- Executes dropped EXE
PID:2784 -
\??\c:\lxxxrlx.exec:\lxxxrlx.exe37⤵
- Executes dropped EXE
PID:2628 -
\??\c:\nbnhnh.exec:\nbnhnh.exe38⤵
- Executes dropped EXE
PID:5068 -
\??\c:\jjjvp.exec:\jjjvp.exe39⤵
- Executes dropped EXE
PID:832 -
\??\c:\lxxxlxl.exec:\lxxxlxl.exe40⤵
- Executes dropped EXE
PID:3536 -
\??\c:\9bthtn.exec:\9bthtn.exe41⤵
- Executes dropped EXE
PID:1400 -
\??\c:\pvpdp.exec:\pvpdp.exe42⤵
- Executes dropped EXE
PID:3560 -
\??\c:\5llxlfr.exec:\5llxlfr.exe43⤵
- Executes dropped EXE
PID:4288 -
\??\c:\btnbtt.exec:\btnbtt.exe44⤵
- Executes dropped EXE
PID:2044 -
\??\c:\thnbbh.exec:\thnbbh.exe45⤵
- Executes dropped EXE
PID:2708 -
\??\c:\dppjv.exec:\dppjv.exe46⤵
- Executes dropped EXE
PID:1828 -
\??\c:\xrrxrlf.exec:\xrrxrlf.exe47⤵
- Executes dropped EXE
PID:2036 -
\??\c:\nbhtbt.exec:\nbhtbt.exe48⤵
- Executes dropped EXE
PID:4468 -
\??\c:\ntnnbt.exec:\ntnnbt.exe49⤵
- Executes dropped EXE
PID:3508 -
\??\c:\ddpdd.exec:\ddpdd.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472 -
\??\c:\bnnbnh.exec:\bnnbnh.exe51⤵
- Executes dropped EXE
PID:2460 -
\??\c:\htntbn.exec:\htntbn.exe52⤵
- Executes dropped EXE
PID:1364 -
\??\c:\vddpj.exec:\vddpj.exe53⤵
- Executes dropped EXE
PID:4536 -
\??\c:\xllflxf.exec:\xllflxf.exe54⤵
- Executes dropped EXE
PID:3240 -
\??\c:\hhnhbt.exec:\hhnhbt.exe55⤵
- Executes dropped EXE
PID:3488 -
\??\c:\vppjd.exec:\vppjd.exe56⤵
- Executes dropped EXE
PID:1200 -
\??\c:\9rrlxrf.exec:\9rrlxrf.exe57⤵
- Executes dropped EXE
PID:452 -
\??\c:\hhntnn.exec:\hhntnn.exe58⤵
- Executes dropped EXE
PID:4452 -
\??\c:\pdvpd.exec:\pdvpd.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432 -
\??\c:\rxfxllf.exec:\rxfxllf.exe60⤵
- Executes dropped EXE
PID:4520 -
\??\c:\hbbnhb.exec:\hbbnhb.exe61⤵
- Executes dropped EXE
PID:1288 -
\??\c:\djvdv.exec:\djvdv.exe62⤵
- Executes dropped EXE
PID:424 -
\??\c:\xlxrfxr.exec:\xlxrfxr.exe63⤵
- Executes dropped EXE
PID:3336 -
\??\c:\bnhtht.exec:\bnhtht.exe64⤵
- Executes dropped EXE
PID:1732 -
\??\c:\jjvpp.exec:\jjvpp.exe65⤵
- Executes dropped EXE
PID:4568 -
\??\c:\ffxfrrf.exec:\ffxfrrf.exe66⤵PID:1656
-
\??\c:\vvvpv.exec:\vvvpv.exe67⤵PID:928
-
\??\c:\rffxrlr.exec:\rffxrlr.exe68⤵PID:2836
-
\??\c:\ntthbt.exec:\ntthbt.exe69⤵PID:3616
-
\??\c:\ttbnbt.exec:\ttbnbt.exe70⤵PID:4460
-
\??\c:\vpppj.exec:\vpppj.exe71⤵PID:2312
-
\??\c:\1fxlxrf.exec:\1fxlxrf.exe72⤵PID:2980
-
\??\c:\1tthbt.exec:\1tthbt.exe73⤵PID:840
-
\??\c:\jvvpj.exec:\jvvpj.exe74⤵PID:2284
-
\??\c:\lxxfxxx.exec:\lxxfxxx.exe75⤵PID:4336
-
\??\c:\nhhbnh.exec:\nhhbnh.exe76⤵PID:524
-
\??\c:\ddjdj.exec:\ddjdj.exe77⤵PID:3644
-
\??\c:\llrflrl.exec:\llrflrl.exe78⤵PID:404
-
\??\c:\rxlxlxl.exec:\rxlxlxl.exe79⤵PID:4060
-
\??\c:\dpjvp.exec:\dpjvp.exe80⤵PID:1176
-
\??\c:\dvjpd.exec:\dvjpd.exe81⤵PID:1352
-
\??\c:\7fxlfxl.exec:\7fxlfxl.exe82⤵PID:4160
-
\??\c:\tbtntn.exec:\tbtntn.exe83⤵PID:1584
-
\??\c:\pvvjd.exec:\pvvjd.exe84⤵PID:3680
-
\??\c:\xffxrlf.exec:\xffxrlf.exe85⤵PID:3384
-
\??\c:\3bhbht.exec:\3bhbht.exe86⤵PID:3888
-
\??\c:\ddvvp.exec:\ddvvp.exe87⤵PID:4032
-
\??\c:\btnbtn.exec:\btnbtn.exe88⤵PID:2036
-
\??\c:\vjppp.exec:\vjppp.exe89⤵PID:636
-
\??\c:\3llfffx.exec:\3llfffx.exe90⤵PID:3260
-
\??\c:\lffxxrr.exec:\lffxxrr.exe91⤵PID:2644
-
\??\c:\bnhtnh.exec:\bnhtnh.exe92⤵PID:1324
-
\??\c:\jppdv.exec:\jppdv.exe93⤵PID:2444
-
\??\c:\ffxllff.exec:\ffxllff.exe94⤵PID:1364
-
\??\c:\9vvpp.exec:\9vvpp.exe95⤵PID:4536
-
\??\c:\rxxrffr.exec:\rxxrffr.exe96⤵PID:3372
-
\??\c:\fxflfrf.exec:\fxflfrf.exe97⤵PID:920
-
\??\c:\bbtnbh.exec:\bbtnbh.exe98⤵PID:1200
-
\??\c:\7vvvp.exec:\7vvvp.exe99⤵PID:452
-
\??\c:\flllxrf.exec:\flllxrf.exe100⤵
- System Location Discovery: System Language Discovery
PID:3596 -
\??\c:\hnttth.exec:\hnttth.exe101⤵PID:3700
-
\??\c:\jvdpd.exec:\jvdpd.exe102⤵PID:2504
-
\??\c:\xllxlxr.exec:\xllxlxr.exe103⤵PID:1676
-
\??\c:\htntbn.exec:\htntbn.exe104⤵PID:3192
-
\??\c:\djdvp.exec:\djdvp.exe105⤵PID:1792
-
\??\c:\fffxfxl.exec:\fffxfxl.exe106⤵PID:1104
-
\??\c:\nhtnhb.exec:\nhtnhb.exe107⤵PID:3940
-
\??\c:\pjvpd.exec:\pjvpd.exe108⤵PID:876
-
\??\c:\xrrfrrf.exec:\xrrfrrf.exe109⤵PID:3012
-
\??\c:\bbbhtn.exec:\bbbhtn.exe110⤵PID:2396
-
\??\c:\jpjvj.exec:\jpjvj.exe111⤵PID:220
-
\??\c:\rrxlfrr.exec:\rrxlfrr.exe112⤵PID:2312
-
\??\c:\thbtnh.exec:\thbtnh.exe113⤵PID:588
-
\??\c:\vpvjj.exec:\vpvjj.exe114⤵PID:840
-
\??\c:\lxrffxr.exec:\lxrffxr.exe115⤵PID:2284
-
\??\c:\nnnbnh.exec:\nnnbnh.exe116⤵PID:3408
-
\??\c:\7ppjd.exec:\7ppjd.exe117⤵PID:524
-
\??\c:\xllfrxl.exec:\xllfrxl.exe118⤵PID:4920
-
\??\c:\thtnhh.exec:\thtnhh.exe119⤵PID:404
-
\??\c:\bhhtnh.exec:\bhhtnh.exe120⤵PID:4060
-
\??\c:\vjdpj.exec:\vjdpj.exe121⤵PID:2404
-
\??\c:\lrrrxxx.exec:\lrrrxxx.exe122⤵PID:3268
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-