Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 15:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
70e7a051757034b3c306a5eac4858aa0N.exe
Resource
win7-20240729-en
6 signatures
120 seconds
General
-
Target
70e7a051757034b3c306a5eac4858aa0N.exe
-
Size
65KB
-
MD5
70e7a051757034b3c306a5eac4858aa0
-
SHA1
85f0a36298adf7791ab821bd209f2ba7a8dc7d73
-
SHA256
35755f7890b5df86fa3c9e0faa2114fd5e1820fc13e62939e5d8799cac7f7eb0
-
SHA512
2d1ec7ae16eb49ebc56a242bb87241664931568b7a2144785013afe7ccad78f983781873ee5701fbd9aa9db7a03917c787c3387efe1faad940f5f4c43938b310
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27Bqf1:ymb3NkkiQ3mdBjFI9cqf1
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/2848-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4696-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/384-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3272-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2244-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2864-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2768-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1084-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2776-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4196-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4200-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1292-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/804-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3860-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4800-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2828-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2308-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2296-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/208-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5088-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3368-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2840-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4696 jdjdj.exe 384 9nbbtt.exe 2220 ntntbh.exe 3272 vpvvv.exe 4632 rrlrlrx.exe 2244 htbhtn.exe 2864 fffllll.exe 5056 rxxfxff.exe 2768 bhnntt.exe 1084 ppppp.exe 2776 rrrrxfr.exe 4196 lfrfffl.exe 4200 thhtbn.exe 5032 ddvvj.exe 1292 ffrlrxx.exe 804 rxxrllf.exe 3860 hnhttb.exe 3384 pvjjv.exe 2828 1pppp.exe 4800 xxxflrx.exe 964 5llxxxf.exe 2600 7nhtbt.exe 1796 pjvpj.exe 2308 fffffrr.exe 2296 rfrxlrl.exe 208 ntnnhn.exe 1356 1vddv.exe 5088 vvjjp.exe 232 xrflrlr.exe 3368 7ttnnn.exe 2840 pjjjj.exe 1288 fxllllr.exe 4188 bbhnnt.exe 1704 hntbtb.exe 5028 bnbbhh.exe 4632 jvpjp.exe 2780 ddvdj.exe 1640 3frxxfx.exe 1196 frllxff.exe 712 bhhhhb.exe 3044 bbbnhb.exe 2768 htbbtb.exe 732 3jvvp.exe 2284 djvdd.exe 3380 1lxxrxf.exe 1812 llflrfl.exe 2844 htttbh.exe 4932 3bhnth.exe 3032 vdpvd.exe 4868 vvjjj.exe 1752 1xxrrrf.exe 2828 xlxxxfl.exe 2076 hbbhnb.exe 844 7hbbth.exe 964 dvjdp.exe 4220 djppp.exe 2576 rxffflr.exe 3472 rlxxxff.exe 4944 nbhbhn.exe 3412 tbtnhb.exe 4348 hbtnhh.exe 2772 pdvvp.exe 3620 pvdjd.exe 4328 flxfrfr.exe -
resource yara_rule behavioral2/memory/2848-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4696-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/384-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2220-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3272-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4632-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4632-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4632-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2244-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2244-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2244-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2864-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1084-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4196-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4200-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1292-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/804-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3860-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4800-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2828-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2308-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2296-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/208-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5088-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3368-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2840-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5djdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1htbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxllllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrllfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tntbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4696 2848 70e7a051757034b3c306a5eac4858aa0N.exe 84 PID 2848 wrote to memory of 4696 2848 70e7a051757034b3c306a5eac4858aa0N.exe 84 PID 2848 wrote to memory of 4696 2848 70e7a051757034b3c306a5eac4858aa0N.exe 84 PID 4696 wrote to memory of 384 4696 jdjdj.exe 85 PID 4696 wrote to memory of 384 4696 jdjdj.exe 85 PID 4696 wrote to memory of 384 4696 jdjdj.exe 85 PID 384 wrote to memory of 2220 384 9nbbtt.exe 86 PID 384 wrote to memory of 2220 384 9nbbtt.exe 86 PID 384 wrote to memory of 2220 384 9nbbtt.exe 86 PID 2220 wrote to memory of 3272 2220 ntntbh.exe 87 PID 2220 wrote to memory of 3272 2220 ntntbh.exe 87 PID 2220 wrote to memory of 3272 2220 ntntbh.exe 87 PID 3272 wrote to memory of 4632 3272 vpvvv.exe 88 PID 3272 wrote to memory of 4632 3272 vpvvv.exe 88 PID 3272 wrote to memory of 4632 3272 vpvvv.exe 88 PID 4632 wrote to memory of 2244 4632 rrlrlrx.exe 89 PID 4632 wrote to memory of 2244 4632 rrlrlrx.exe 89 PID 4632 wrote to memory of 2244 4632 rrlrlrx.exe 89 PID 2244 wrote to memory of 2864 2244 htbhtn.exe 90 PID 2244 wrote to memory of 2864 2244 htbhtn.exe 90 PID 2244 wrote to memory of 2864 2244 htbhtn.exe 90 PID 2864 wrote to memory of 5056 2864 fffllll.exe 91 PID 2864 wrote to memory of 5056 2864 fffllll.exe 91 PID 2864 wrote to memory of 5056 2864 fffllll.exe 91 PID 5056 wrote to memory of 2768 5056 rxxfxff.exe 92 PID 5056 wrote to memory of 2768 5056 rxxfxff.exe 92 PID 5056 wrote to memory of 2768 5056 rxxfxff.exe 92 PID 2768 wrote to memory of 1084 2768 bhnntt.exe 93 PID 2768 wrote to memory of 1084 2768 bhnntt.exe 93 PID 2768 wrote to memory of 1084 2768 bhnntt.exe 93 PID 1084 wrote to memory of 2776 1084 ppppp.exe 94 PID 1084 wrote to memory of 2776 1084 ppppp.exe 94 PID 1084 wrote to memory of 2776 1084 ppppp.exe 94 PID 2776 wrote to memory of 4196 2776 rrrrxfr.exe 95 PID 2776 wrote to memory of 4196 2776 rrrrxfr.exe 95 PID 2776 wrote to memory of 4196 2776 rrrrxfr.exe 95 PID 4196 wrote to memory of 4200 4196 lfrfffl.exe 96 PID 4196 wrote to memory of 4200 4196 lfrfffl.exe 96 PID 4196 wrote to memory of 4200 4196 lfrfffl.exe 96 PID 4200 wrote to memory of 5032 4200 thhtbn.exe 97 PID 4200 wrote to memory of 5032 4200 thhtbn.exe 97 PID 4200 wrote to memory of 5032 4200 thhtbn.exe 97 PID 5032 wrote to memory of 1292 5032 ddvvj.exe 98 PID 5032 wrote to memory of 1292 5032 ddvvj.exe 98 PID 5032 wrote to memory of 1292 5032 ddvvj.exe 98 PID 1292 wrote to memory of 804 1292 ffrlrxx.exe 99 PID 1292 wrote to memory of 804 1292 ffrlrxx.exe 99 PID 1292 wrote to memory of 804 1292 ffrlrxx.exe 99 PID 804 wrote to memory of 3860 804 rxxrllf.exe 100 PID 804 wrote to memory of 3860 804 rxxrllf.exe 100 PID 804 wrote to memory of 3860 804 rxxrllf.exe 100 PID 3860 wrote to memory of 3384 3860 hnhttb.exe 101 PID 3860 wrote to memory of 3384 3860 hnhttb.exe 101 PID 3860 wrote to memory of 3384 3860 hnhttb.exe 101 PID 3384 wrote to memory of 2828 3384 pvjjv.exe 102 PID 3384 wrote to memory of 2828 3384 pvjjv.exe 102 PID 3384 wrote to memory of 2828 3384 pvjjv.exe 102 PID 2828 wrote to memory of 4800 2828 1pppp.exe 103 PID 2828 wrote to memory of 4800 2828 1pppp.exe 103 PID 2828 wrote to memory of 4800 2828 1pppp.exe 103 PID 4800 wrote to memory of 964 4800 xxxflrx.exe 105 PID 4800 wrote to memory of 964 4800 xxxflrx.exe 105 PID 4800 wrote to memory of 964 4800 xxxflrx.exe 105 PID 964 wrote to memory of 2600 964 5llxxxf.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\70e7a051757034b3c306a5eac4858aa0N.exe"C:\Users\Admin\AppData\Local\Temp\70e7a051757034b3c306a5eac4858aa0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\jdjdj.exec:\jdjdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
\??\c:\9nbbtt.exec:\9nbbtt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
\??\c:\ntntbh.exec:\ntntbh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\vpvvv.exec:\vpvvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
\??\c:\rrlrlrx.exec:\rrlrlrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
\??\c:\htbhtn.exec:\htbhtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\fffllll.exec:\fffllll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\rxxfxff.exec:\rxxfxff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\bhnntt.exec:\bhnntt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\ppppp.exec:\ppppp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
\??\c:\rrrrxfr.exec:\rrrrxfr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\lfrfffl.exec:\lfrfffl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
\??\c:\thhtbn.exec:\thhtbn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\ddvvj.exec:\ddvvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\ffrlrxx.exec:\ffrlrxx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\rxxrllf.exec:\rxxrllf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
\??\c:\hnhttb.exec:\hnhttb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\pvjjv.exec:\pvjjv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\1pppp.exec:\1pppp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\xxxflrx.exec:\xxxflrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\5llxxxf.exec:\5llxxxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
\??\c:\7nhtbt.exec:\7nhtbt.exe23⤵
- Executes dropped EXE
PID:2600 -
\??\c:\pjvpj.exec:\pjvpj.exe24⤵
- Executes dropped EXE
PID:1796 -
\??\c:\fffffrr.exec:\fffffrr.exe25⤵
- Executes dropped EXE
PID:2308 -
\??\c:\rfrxlrl.exec:\rfrxlrl.exe26⤵
- Executes dropped EXE
PID:2296 -
\??\c:\ntnnhn.exec:\ntnnhn.exe27⤵
- Executes dropped EXE
PID:208 -
\??\c:\1vddv.exec:\1vddv.exe28⤵
- Executes dropped EXE
PID:1356 -
\??\c:\vvjjp.exec:\vvjjp.exe29⤵
- Executes dropped EXE
PID:5088 -
\??\c:\xrflrlr.exec:\xrflrlr.exe30⤵
- Executes dropped EXE
PID:232 -
\??\c:\7ttnnn.exec:\7ttnnn.exe31⤵
- Executes dropped EXE
PID:3368 -
\??\c:\pjjjj.exec:\pjjjj.exe32⤵
- Executes dropped EXE
PID:2840 -
\??\c:\fxllllr.exec:\fxllllr.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288 -
\??\c:\bbhnnt.exec:\bbhnnt.exe34⤵
- Executes dropped EXE
PID:4188 -
\??\c:\hntbtb.exec:\hntbtb.exe35⤵
- Executes dropped EXE
PID:1704 -
\??\c:\bnbbhh.exec:\bnbbhh.exe36⤵
- Executes dropped EXE
PID:5028 -
\??\c:\jvpjp.exec:\jvpjp.exe37⤵
- Executes dropped EXE
PID:4632 -
\??\c:\ddvdj.exec:\ddvdj.exe38⤵
- Executes dropped EXE
PID:2780 -
\??\c:\3frxxfx.exec:\3frxxfx.exe39⤵
- Executes dropped EXE
PID:1640 -
\??\c:\frllxff.exec:\frllxff.exe40⤵
- Executes dropped EXE
PID:1196 -
\??\c:\bhhhhb.exec:\bhhhhb.exe41⤵
- Executes dropped EXE
PID:712 -
\??\c:\bbbnhb.exec:\bbbnhb.exe42⤵
- Executes dropped EXE
PID:3044 -
\??\c:\htbbtb.exec:\htbbtb.exe43⤵
- Executes dropped EXE
PID:2768 -
\??\c:\3jvvp.exec:\3jvvp.exe44⤵
- Executes dropped EXE
PID:732 -
\??\c:\djvdd.exec:\djvdd.exe45⤵
- Executes dropped EXE
PID:2284 -
\??\c:\1lxxrxf.exec:\1lxxrxf.exe46⤵
- Executes dropped EXE
PID:3380 -
\??\c:\llflrfl.exec:\llflrfl.exe47⤵
- Executes dropped EXE
PID:1812 -
\??\c:\htttbh.exec:\htttbh.exe48⤵
- Executes dropped EXE
PID:2844 -
\??\c:\3bhnth.exec:\3bhnth.exe49⤵
- Executes dropped EXE
PID:4932 -
\??\c:\vdpvd.exec:\vdpvd.exe50⤵
- Executes dropped EXE
PID:3032 -
\??\c:\vvjjj.exec:\vvjjj.exe51⤵
- Executes dropped EXE
PID:4868 -
\??\c:\1xxrrrf.exec:\1xxrrrf.exe52⤵
- Executes dropped EXE
PID:1752 -
\??\c:\xlxxxfl.exec:\xlxxxfl.exe53⤵
- Executes dropped EXE
PID:2828 -
\??\c:\hbbhnb.exec:\hbbhnb.exe54⤵
- Executes dropped EXE
PID:2076 -
\??\c:\7hbbth.exec:\7hbbth.exe55⤵
- Executes dropped EXE
PID:844 -
\??\c:\dvjdp.exec:\dvjdp.exe56⤵
- Executes dropped EXE
PID:964 -
\??\c:\djppp.exec:\djppp.exe57⤵
- Executes dropped EXE
PID:4220 -
\??\c:\rxffflr.exec:\rxffflr.exe58⤵
- Executes dropped EXE
PID:2576 -
\??\c:\rlxxxff.exec:\rlxxxff.exe59⤵
- Executes dropped EXE
PID:3472 -
\??\c:\nbhbhn.exec:\nbhbhn.exe60⤵
- Executes dropped EXE
PID:4944 -
\??\c:\tbtnhb.exec:\tbtnhb.exe61⤵
- Executes dropped EXE
PID:3412 -
\??\c:\hbtnhh.exec:\hbtnhh.exe62⤵
- Executes dropped EXE
PID:4348 -
\??\c:\pdvvp.exec:\pdvvp.exe63⤵
- Executes dropped EXE
PID:2772 -
\??\c:\pvdjd.exec:\pvdjd.exe64⤵
- Executes dropped EXE
PID:3620 -
\??\c:\flxfrfr.exec:\flxfrfr.exe65⤵
- Executes dropped EXE
PID:4328 -
\??\c:\rxxfflr.exec:\rxxfflr.exe66⤵PID:2184
-
\??\c:\nnttth.exec:\nnttth.exe67⤵PID:4696
-
\??\c:\7httnt.exec:\7httnt.exe68⤵PID:4576
-
\??\c:\vdvvv.exec:\vdvvv.exe69⤵PID:1288
-
\??\c:\vvdvp.exec:\vvdvp.exe70⤵PID:2100
-
\??\c:\xlxxxff.exec:\xlxxxff.exe71⤵PID:1916
-
\??\c:\rrflrxf.exec:\rrflrxf.exe72⤵PID:2972
-
\??\c:\hbnttb.exec:\hbnttb.exe73⤵PID:3052
-
\??\c:\tbhbhh.exec:\tbhbhh.exe74⤵PID:4232
-
\??\c:\ddvvv.exec:\ddvvv.exe75⤵PID:1640
-
\??\c:\9ppvv.exec:\9ppvv.exe76⤵PID:2124
-
\??\c:\lxfflxl.exec:\lxfflxl.exe77⤵PID:2940
-
\??\c:\xlffllx.exec:\xlffllx.exe78⤵PID:2804
-
\??\c:\tthhhh.exec:\tthhhh.exe79⤵PID:3000
-
\??\c:\jddvd.exec:\jddvd.exe80⤵PID:4480
-
\??\c:\jjpjv.exec:\jjpjv.exe81⤵PID:732
-
\??\c:\xlxxlll.exec:\xlxxlll.exe82⤵PID:2284
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe83⤵PID:3380
-
\??\c:\hbhhhn.exec:\hbhhhn.exe84⤵PID:3588
-
\??\c:\dvjpj.exec:\dvjpj.exe85⤵PID:5092
-
\??\c:\lllrlll.exec:\lllrlll.exe86⤵PID:3992
-
\??\c:\lflfxxr.exec:\lflfxxr.exe87⤵PID:3032
-
\??\c:\nnhhbh.exec:\nnhhbh.exe88⤵PID:3284
-
\??\c:\vjpjj.exec:\vjpjj.exe89⤵PID:3968
-
\??\c:\pvppp.exec:\pvppp.exe90⤵PID:4376
-
\??\c:\ffrfflr.exec:\ffrfflr.exe91⤵PID:2076
-
\??\c:\rlrrrxx.exec:\rlrrrxx.exe92⤵PID:1428
-
\??\c:\bhbnbt.exec:\bhbnbt.exe93⤵PID:1796
-
\??\c:\tntnbb.exec:\tntnbb.exe94⤵PID:2060
-
\??\c:\vpppp.exec:\vpppp.exe95⤵PID:3512
-
\??\c:\vdjjj.exec:\vdjjj.exe96⤵PID:4804
-
\??\c:\3xfxxxx.exec:\3xfxxxx.exe97⤵PID:4332
-
\??\c:\9tnhbh.exec:\9tnhbh.exe98⤵PID:1992
-
\??\c:\thhtth.exec:\thhtth.exe99⤵PID:836
-
\??\c:\pjvvv.exec:\pjvvv.exe100⤵PID:3876
-
\??\c:\3jppv.exec:\3jppv.exe101⤵PID:2772
-
\??\c:\rrxfffl.exec:\rrxfffl.exe102⤵PID:4212
-
\??\c:\rrxxflx.exec:\rrxxflx.exe103⤵PID:4328
-
\??\c:\hnhbbn.exec:\hnhbbn.exe104⤵PID:2276
-
\??\c:\btttbb.exec:\btttbb.exe105⤵PID:3972
-
\??\c:\pdvdj.exec:\pdvdj.exe106⤵PID:2700
-
\??\c:\pjddv.exec:\pjddv.exe107⤵PID:1700
-
\??\c:\frffffr.exec:\frffffr.exe108⤵PID:1836
-
\??\c:\fffxxll.exec:\fffxxll.exe109⤵PID:2244
-
\??\c:\thttbh.exec:\thttbh.exe110⤵PID:2548
-
\??\c:\jjpdd.exec:\jjpdd.exe111⤵PID:2780
-
\??\c:\xxrlxff.exec:\xxrlxff.exe112⤵PID:532
-
\??\c:\btnbbt.exec:\btnbbt.exe113⤵PID:4728
-
\??\c:\jjjjv.exec:\jjjjv.exe114⤵PID:1600
-
\??\c:\jpvdj.exec:\jpvdj.exe115⤵PID:1412
-
\??\c:\rxffrrl.exec:\rxffrrl.exe116⤵PID:444
-
\??\c:\fxlrxfl.exec:\fxlrxfl.exe117⤵PID:2768
-
\??\c:\hbbtbb.exec:\hbbtbb.exe118⤵PID:4072
-
\??\c:\hhnnnn.exec:\hhnnnn.exe119⤵PID:708
-
\??\c:\ppdjd.exec:\ppdjd.exe120⤵PID:1912
-
\??\c:\pvpdv.exec:\pvpdv.exe121⤵PID:996
-
\??\c:\9xlrflx.exec:\9xlrflx.exe122⤵PID:756
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-