Analysis
-
max time kernel
120s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 11:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
edfa89ea12039eee073cd0de8925ac60N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
edfa89ea12039eee073cd0de8925ac60N.exe
-
Size
309KB
-
MD5
edfa89ea12039eee073cd0de8925ac60
-
SHA1
bdfb691ce9bf9b31ef0bf89cc72a002b5d46d950
-
SHA256
384c688e5f3dab198fc49b80a2296a687eff0f4a8720baa905536e9b0a468ff9
-
SHA512
13a31c046033d09883866b7b600fbbf828f5fac0d9fda3064f2337372712fe432b11d4b06b80cd88d0a0e14aaca4a248badf0b815f06278151c66db3f05848d9
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LAIRUohDLS0k+sLiiBVS0ILlMcGGW7sRCl9eMMJ:n3C9BRo/AIuunS3+sOiBVSXxMxTsm9eV
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/3428-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5000-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2792-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2804-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/224-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3796-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4056-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2948-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3280-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1612-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1704-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1392-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4580-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4884-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2988-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1056-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1632-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4240-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1648 frlflfr.exe 4848 3jjvj.exe 5000 xxrfrlf.exe 2792 ttnbhb.exe 2804 xlxxllx.exe 224 hhbnnb.exe 1656 dpjjv.exe 4220 flfrfxl.exe 3796 1ddvv.exe 4056 tttnhh.exe 4324 pvdvv.exe 5028 llrxrfx.exe 1420 1bnbtn.exe 2948 7xxrlfr.exe 3280 nnbnhb.exe 1612 jppdp.exe 1704 xxrfxrf.exe 1392 3tthtt.exe 4580 3jvjv.exe 4884 3llrrlf.exe 2064 rxfrlfl.exe 1480 pddpj.exe 892 xllffxf.exe 2988 9bbthb.exe 1056 pjjdp.exe 1632 xxlxlfr.exe 1864 fffflfx.exe 4420 7vvjv.exe 3928 5lflfxr.exe 4240 jdpjd.exe 4160 djjdv.exe 5072 rfxrffr.exe 4792 hnhbbt.exe 4296 3vpjv.exe 4876 frrlxxx.exe 2144 bnnhbb.exe 2372 5jpjv.exe 2540 pdvjd.exe 5100 xrrflfl.exe 1876 1hhthb.exe 732 jdpdv.exe 4908 jpjvd.exe 1660 lllxxrl.exe 2552 nbtnbt.exe 2252 ntthhb.exe 2804 9pvjv.exe 396 pdpdp.exe 232 lflxlff.exe 3536 3tnbnn.exe 764 9dpdp.exe 3796 vjpjv.exe 4964 3rlxfrx.exe 1332 7tbnnh.exe 3604 htnhbn.exe 4324 vjjdj.exe 4868 xrfxrlf.exe 924 lrrfxrl.exe 3804 1pvjd.exe 548 xrllffr.exe 3052 lxlrrll.exe 808 hnnntn.exe 1900 ddjdd.exe 1612 dddpj.exe 4620 rffxrlf.exe -
resource yara_rule behavioral2/memory/3428-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3428-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5000-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2792-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2792-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2804-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/224-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2948-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3280-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1612-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1704-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1392-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4580-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4884-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2988-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1056-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1632-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4240-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-214-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nnbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rfxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3428 wrote to memory of 1648 3428 edfa89ea12039eee073cd0de8925ac60N.exe 84 PID 3428 wrote to memory of 1648 3428 edfa89ea12039eee073cd0de8925ac60N.exe 84 PID 3428 wrote to memory of 1648 3428 edfa89ea12039eee073cd0de8925ac60N.exe 84 PID 1648 wrote to memory of 4848 1648 frlflfr.exe 85 PID 1648 wrote to memory of 4848 1648 frlflfr.exe 85 PID 1648 wrote to memory of 4848 1648 frlflfr.exe 85 PID 4848 wrote to memory of 5000 4848 3jjvj.exe 86 PID 4848 wrote to memory of 5000 4848 3jjvj.exe 86 PID 4848 wrote to memory of 5000 4848 3jjvj.exe 86 PID 5000 wrote to memory of 2792 5000 xxrfrlf.exe 88 PID 5000 wrote to memory of 2792 5000 xxrfrlf.exe 88 PID 5000 wrote to memory of 2792 5000 xxrfrlf.exe 88 PID 2792 wrote to memory of 2804 2792 ttnbhb.exe 89 PID 2792 wrote to memory of 2804 2792 ttnbhb.exe 89 PID 2792 wrote to memory of 2804 2792 ttnbhb.exe 89 PID 2804 wrote to memory of 224 2804 xlxxllx.exe 90 PID 2804 wrote to memory of 224 2804 xlxxllx.exe 90 PID 2804 wrote to memory of 224 2804 xlxxllx.exe 90 PID 224 wrote to memory of 1656 224 hhbnnb.exe 91 PID 224 wrote to memory of 1656 224 hhbnnb.exe 91 PID 224 wrote to memory of 1656 224 hhbnnb.exe 91 PID 1656 wrote to memory of 4220 1656 dpjjv.exe 92 PID 1656 wrote to memory of 4220 1656 dpjjv.exe 92 PID 1656 wrote to memory of 4220 1656 dpjjv.exe 92 PID 4220 wrote to memory of 3796 4220 flfrfxl.exe 93 PID 4220 wrote to memory of 3796 4220 flfrfxl.exe 93 PID 4220 wrote to memory of 3796 4220 flfrfxl.exe 93 PID 3796 wrote to memory of 4056 3796 1ddvv.exe 95 PID 3796 wrote to memory of 4056 3796 1ddvv.exe 95 PID 3796 wrote to memory of 4056 3796 1ddvv.exe 95 PID 4056 wrote to memory of 4324 4056 tttnhh.exe 96 PID 4056 wrote to memory of 4324 4056 tttnhh.exe 96 PID 4056 wrote to memory of 4324 4056 tttnhh.exe 96 PID 4324 wrote to memory of 5028 4324 pvdvv.exe 98 PID 4324 wrote to memory of 5028 4324 pvdvv.exe 98 PID 4324 wrote to memory of 5028 4324 pvdvv.exe 98 PID 5028 wrote to memory of 1420 5028 llrxrfx.exe 99 PID 5028 wrote to memory of 1420 5028 llrxrfx.exe 99 PID 5028 wrote to memory of 1420 5028 llrxrfx.exe 99 PID 1420 wrote to memory of 2948 1420 1bnbtn.exe 100 PID 1420 wrote to memory of 2948 1420 1bnbtn.exe 100 PID 1420 wrote to memory of 2948 1420 1bnbtn.exe 100 PID 2948 wrote to memory of 3280 2948 7xxrlfr.exe 101 PID 2948 wrote to memory of 3280 2948 7xxrlfr.exe 101 PID 2948 wrote to memory of 3280 2948 7xxrlfr.exe 101 PID 3280 wrote to memory of 1612 3280 nnbnhb.exe 102 PID 3280 wrote to memory of 1612 3280 nnbnhb.exe 102 PID 3280 wrote to memory of 1612 3280 nnbnhb.exe 102 PID 1612 wrote to memory of 1704 1612 jppdp.exe 103 PID 1612 wrote to memory of 1704 1612 jppdp.exe 103 PID 1612 wrote to memory of 1704 1612 jppdp.exe 103 PID 1704 wrote to memory of 1392 1704 xxrfxrf.exe 104 PID 1704 wrote to memory of 1392 1704 xxrfxrf.exe 104 PID 1704 wrote to memory of 1392 1704 xxrfxrf.exe 104 PID 1392 wrote to memory of 4580 1392 3tthtt.exe 105 PID 1392 wrote to memory of 4580 1392 3tthtt.exe 105 PID 1392 wrote to memory of 4580 1392 3tthtt.exe 105 PID 4580 wrote to memory of 4884 4580 3jvjv.exe 106 PID 4580 wrote to memory of 4884 4580 3jvjv.exe 106 PID 4580 wrote to memory of 4884 4580 3jvjv.exe 106 PID 4884 wrote to memory of 2064 4884 3llrrlf.exe 107 PID 4884 wrote to memory of 2064 4884 3llrrlf.exe 107 PID 4884 wrote to memory of 2064 4884 3llrrlf.exe 107 PID 2064 wrote to memory of 1480 2064 rxfrlfl.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\edfa89ea12039eee073cd0de8925ac60N.exe"C:\Users\Admin\AppData\Local\Temp\edfa89ea12039eee073cd0de8925ac60N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
\??\c:\frlflfr.exec:\frlflfr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\3jjvj.exec:\3jjvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\xxrfrlf.exec:\xxrfrlf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
\??\c:\ttnbhb.exec:\ttnbhb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\xlxxllx.exec:\xlxxllx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\hhbnnb.exec:\hhbnnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
\??\c:\dpjjv.exec:\dpjjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\flfrfxl.exec:\flfrfxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\1ddvv.exec:\1ddvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\tttnhh.exec:\tttnhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\pvdvv.exec:\pvdvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\llrxrfx.exec:\llrxrfx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\1bnbtn.exec:\1bnbtn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\7xxrlfr.exec:\7xxrlfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\nnbnhb.exec:\nnbnhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\jppdp.exec:\jppdp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\xxrfxrf.exec:\xxrfxrf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\3tthtt.exec:\3tthtt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
\??\c:\3jvjv.exec:\3jvjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\3llrrlf.exec:\3llrrlf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\rxfrlfl.exec:\rxfrlfl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\pddpj.exec:\pddpj.exe23⤵
- Executes dropped EXE
PID:1480 -
\??\c:\xllffxf.exec:\xllffxf.exe24⤵
- Executes dropped EXE
PID:892 -
\??\c:\9bbthb.exec:\9bbthb.exe25⤵
- Executes dropped EXE
PID:2988 -
\??\c:\pjjdp.exec:\pjjdp.exe26⤵
- Executes dropped EXE
PID:1056 -
\??\c:\xxlxlfr.exec:\xxlxlfr.exe27⤵
- Executes dropped EXE
PID:1632 -
\??\c:\fffflfx.exec:\fffflfx.exe28⤵
- Executes dropped EXE
PID:1864 -
\??\c:\7vvjv.exec:\7vvjv.exe29⤵
- Executes dropped EXE
PID:4420 -
\??\c:\5lflfxr.exec:\5lflfxr.exe30⤵
- Executes dropped EXE
PID:3928 -
\??\c:\jdpjd.exec:\jdpjd.exe31⤵
- Executes dropped EXE
PID:4240 -
\??\c:\djjdv.exec:\djjdv.exe32⤵
- Executes dropped EXE
PID:4160 -
\??\c:\rfxrffr.exec:\rfxrffr.exe33⤵
- Executes dropped EXE
PID:5072 -
\??\c:\hnhbbt.exec:\hnhbbt.exe34⤵
- Executes dropped EXE
PID:4792 -
\??\c:\3vpjv.exec:\3vpjv.exe35⤵
- Executes dropped EXE
PID:4296 -
\??\c:\frrlxxx.exec:\frrlxxx.exe36⤵
- Executes dropped EXE
PID:4876 -
\??\c:\bnnhbb.exec:\bnnhbb.exe37⤵
- Executes dropped EXE
PID:2144 -
\??\c:\5jpjv.exec:\5jpjv.exe38⤵
- Executes dropped EXE
PID:2372 -
\??\c:\pdvjd.exec:\pdvjd.exe39⤵
- Executes dropped EXE
PID:2540 -
\??\c:\xrrflfl.exec:\xrrflfl.exe40⤵
- Executes dropped EXE
PID:5100 -
\??\c:\1hhthb.exec:\1hhthb.exe41⤵
- Executes dropped EXE
PID:1876 -
\??\c:\jdpdv.exec:\jdpdv.exe42⤵
- Executes dropped EXE
PID:732 -
\??\c:\jpjvd.exec:\jpjvd.exe43⤵
- Executes dropped EXE
PID:4908 -
\??\c:\lllxxrl.exec:\lllxxrl.exe44⤵
- Executes dropped EXE
PID:1660 -
\??\c:\nbtnbt.exec:\nbtnbt.exe45⤵
- Executes dropped EXE
PID:2552 -
\??\c:\ntthhb.exec:\ntthhb.exe46⤵
- Executes dropped EXE
PID:2252 -
\??\c:\9pvjv.exec:\9pvjv.exe47⤵
- Executes dropped EXE
PID:2804 -
\??\c:\pdpdp.exec:\pdpdp.exe48⤵
- Executes dropped EXE
PID:396 -
\??\c:\lflxlff.exec:\lflxlff.exe49⤵
- Executes dropped EXE
PID:232 -
\??\c:\3tnbnn.exec:\3tnbnn.exe50⤵
- Executes dropped EXE
PID:3536 -
\??\c:\9dpdp.exec:\9dpdp.exe51⤵
- Executes dropped EXE
PID:764 -
\??\c:\vjpjv.exec:\vjpjv.exe52⤵
- Executes dropped EXE
PID:3796 -
\??\c:\3rlxfrx.exec:\3rlxfrx.exe53⤵
- Executes dropped EXE
PID:4964 -
\??\c:\7tbnnh.exec:\7tbnnh.exe54⤵
- Executes dropped EXE
PID:1332 -
\??\c:\htnhbn.exec:\htnhbn.exe55⤵
- Executes dropped EXE
PID:3604 -
\??\c:\vjjdj.exec:\vjjdj.exe56⤵
- Executes dropped EXE
PID:4324 -
\??\c:\xrfxrlf.exec:\xrfxrlf.exe57⤵
- Executes dropped EXE
PID:4868 -
\??\c:\lrrfxrl.exec:\lrrfxrl.exe58⤵
- Executes dropped EXE
PID:924 -
\??\c:\1pvjd.exec:\1pvjd.exe59⤵
- Executes dropped EXE
PID:3804 -
\??\c:\xrllffr.exec:\xrllffr.exe60⤵
- Executes dropped EXE
PID:548 -
\??\c:\lxlrrll.exec:\lxlrrll.exe61⤵
- Executes dropped EXE
PID:3052 -
\??\c:\hnnntn.exec:\hnnntn.exe62⤵
- Executes dropped EXE
PID:808 -
\??\c:\ddjdd.exec:\ddjdd.exe63⤵
- Executes dropped EXE
PID:1900 -
\??\c:\dddpj.exec:\dddpj.exe64⤵
- Executes dropped EXE
PID:1612 -
\??\c:\rffxrlf.exec:\rffxrlf.exe65⤵
- Executes dropped EXE
PID:4620 -
\??\c:\tthbnh.exec:\tthbnh.exe66⤵PID:1868
-
\??\c:\bnnbtn.exec:\bnnbtn.exe67⤵PID:1824
-
\??\c:\dvvpv.exec:\dvvpv.exe68⤵PID:3856
-
\??\c:\lfxrlrr.exec:\lfxrlrr.exe69⤵PID:2332
-
\??\c:\xlfrlfx.exec:\xlfrlfx.exe70⤵PID:868
-
\??\c:\5ttnbt.exec:\5ttnbt.exe71⤵PID:636
-
\??\c:\pdpdj.exec:\pdpdj.exe72⤵PID:1480
-
\??\c:\dvjvj.exec:\dvjvj.exe73⤵PID:892
-
\??\c:\fllxxrl.exec:\fllxxrl.exe74⤵PID:3488
-
\??\c:\nnnhhb.exec:\nnnhhb.exe75⤵PID:2748
-
\??\c:\bhnhbt.exec:\bhnhbt.exe76⤵PID:4732
-
\??\c:\vddvp.exec:\vddvp.exe77⤵PID:2492
-
\??\c:\djpjp.exec:\djpjp.exe78⤵PID:4304
-
\??\c:\5xxlxxl.exec:\5xxlxxl.exe79⤵PID:1968
-
\??\c:\xrfrlfx.exec:\xrfrlfx.exe80⤵PID:3964
-
\??\c:\thttth.exec:\thttth.exe81⤵PID:4076
-
\??\c:\pdvjj.exec:\pdvjj.exe82⤵PID:4036
-
\??\c:\jjpjv.exec:\jjpjv.exe83⤵PID:3632
-
\??\c:\xffrfxl.exec:\xffrfxl.exe84⤵PID:3060
-
\??\c:\ttbhht.exec:\ttbhht.exe85⤵PID:2772
-
\??\c:\thhbtn.exec:\thhbtn.exe86⤵PID:2820
-
\??\c:\5vpvp.exec:\5vpvp.exe87⤵PID:4372
-
\??\c:\jdvjd.exec:\jdvjd.exe88⤵PID:676
-
\??\c:\fxxfxxr.exec:\fxxfxxr.exe89⤵PID:2012
-
\??\c:\thbhbt.exec:\thbhbt.exe90⤵PID:3352
-
\??\c:\nntbnt.exec:\nntbnt.exe91⤵PID:1788
-
\??\c:\dvppj.exec:\dvppj.exe92⤵PID:4192
-
\??\c:\dddpd.exec:\dddpd.exe93⤵PID:5016
-
\??\c:\frlfflf.exec:\frlfflf.exe94⤵PID:3832
-
\??\c:\9btnbb.exec:\9btnbb.exe95⤵PID:2232
-
\??\c:\tbbnhb.exec:\tbbnhb.exe96⤵PID:1508
-
\??\c:\7vvjj.exec:\7vvjj.exe97⤵PID:728
-
\??\c:\7ffrfxl.exec:\7ffrfxl.exe98⤵PID:1560
-
\??\c:\xfxlfxr.exec:\xfxlfxr.exe99⤵PID:116
-
\??\c:\hntnbt.exec:\hntnbt.exe100⤵PID:2172
-
\??\c:\ppjjp.exec:\ppjjp.exe101⤵PID:3408
-
\??\c:\frllfff.exec:\frllfff.exe102⤵PID:1680
-
\??\c:\lxrxrrl.exec:\lxrxrrl.exe103⤵PID:2964
-
\??\c:\vppjd.exec:\vppjd.exe104⤵PID:2572
-
\??\c:\rfxrxxx.exec:\rfxrxxx.exe105⤵PID:856
-
\??\c:\3nnnbt.exec:\3nnnbt.exe106⤵PID:4868
-
\??\c:\btthbt.exec:\btthbt.exe107⤵PID:4912
-
\??\c:\9dvpv.exec:\9dvpv.exe108⤵PID:2176
-
\??\c:\xxxxxxx.exec:\xxxxxxx.exe109⤵PID:2640
-
\??\c:\7xfrxxx.exec:\7xfrxxx.exe110⤵PID:1620
-
\??\c:\tbbtnh.exec:\tbbtnh.exe111⤵PID:1156
-
\??\c:\vpjvd.exec:\vpjvd.exe112⤵PID:1460
-
\??\c:\vpjdp.exec:\vpjdp.exe113⤵PID:1884
-
\??\c:\fxxlrlf.exec:\fxxlrlf.exe114⤵PID:4416
-
\??\c:\nbbhbt.exec:\nbbhbt.exe115⤵PID:3860
-
\??\c:\bnbnnh.exec:\bnbnnh.exe116⤵PID:2248
-
\??\c:\7nnbnh.exec:\7nnbnh.exe117⤵
- System Location Discovery: System Language Discovery
PID:2332 -
\??\c:\vvdpd.exec:\vvdpd.exe118⤵PID:736
-
\??\c:\xrfxxrf.exec:\xrfxxrf.exe119⤵PID:4064
-
\??\c:\1xxlxrr.exec:\1xxlxrr.exe120⤵PID:1208
-
\??\c:\5tnhhh.exec:\5tnhhh.exe121⤵PID:892
-
\??\c:\vjjdv.exec:\vjjdv.exe122⤵PID:3488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-