Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 03:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d92c471a57ebeb596e3a387251e05c40N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
d92c471a57ebeb596e3a387251e05c40N.exe
-
Size
964KB
-
MD5
d92c471a57ebeb596e3a387251e05c40
-
SHA1
012bcee24c5a31d04492bf9e7d9f0d30bc9ab264
-
SHA256
bc305b74f00007fbf6dcd26fc2bfd1ef28d957a6d40a3a69b445b9a22140274c
-
SHA512
9b89c5f538f801c1fc06bf0548ff8e88cd2a0ccb786f44cdf6e4c432746740b7fb7df1283309bdc64bda64b9dc3a7575279088f1d8c06f95e5981e058a3fd075
-
SSDEEP
12288:n3C9yMo+S0L9xRnoq7H9xqYL04iVypNKvzcMwdBS3b3aoqYveXVadBlHD+CURPOk:SgD4bhoqLDqYLagB6Wj1+Cym
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/940-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/988-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2792-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4052-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4052-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2872-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4456-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3804-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3484-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5064-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2264-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3084-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2248-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/456-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1952-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4196-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4444-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 988 nbnthn.exe 5100 1djdv.exe 4848 tnbtbn.exe 2792 rrllflf.exe 2872 bhbtnb.exe 4052 xrllrfl.exe 1584 llrlxxx.exe 3416 5xllflf.exe 3436 vvvpp.exe 2380 fflxlrr.exe 5028 bbnnht.exe 4456 pvvvd.exe 3804 llxffll.exe 5064 nnhbtt.exe 4668 rrllffx.exe 3484 vpvvp.exe 2264 xxxrrxx.exe 2160 lfrrlll.exe 3084 bttnnn.exe 2764 dddvv.exe 2248 3xllllf.exe 408 5vvvp.exe 456 bbnhbn.exe 2748 1vpvp.exe 928 hnhbtn.exe 1952 dvjdd.exe 2432 rfllxxr.exe 4660 tnhbtt.exe 4196 fxffxfx.exe 4444 ntbbtt.exe 864 lrrrrxx.exe 2820 ttbthh.exe 4360 lrxxrrr.exe 1664 hntnnt.exe 676 5jvvp.exe 3356 ffxxrff.exe 4868 ttttbb.exe 3376 pjpjp.exe 4092 fxlfrrr.exe 3120 pvddv.exe 4676 7xffxrr.exe 1836 thnhbt.exe 4228 9dpjv.exe 3696 xlxxxxr.exe 4700 thhhbb.exe 4344 vpppj.exe 4656 xxlllll.exe 4696 ddpvp.exe 4964 fxrrxrr.exe 2572 hhtnbt.exe 2244 dpjdd.exe 2472 xxlflxx.exe 60 jvvvj.exe 2176 lfrrlff.exe 4592 bbhbnn.exe 3576 jdvpp.exe 1704 rlfxffl.exe 4972 tbbhhh.exe 4128 jddvp.exe 4580 rrfffff.exe 3228 nhttnb.exe 4816 dvddd.exe 2332 xrlfxxx.exe 3100 5nnnhh.exe -
resource yara_rule behavioral2/memory/940-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/988-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2792-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4052-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4052-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3804-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3484-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5064-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3084-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2248-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1952-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4196-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4444-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lxrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lrfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rxxxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlllfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lrfxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 988 940 d92c471a57ebeb596e3a387251e05c40N.exe 84 PID 940 wrote to memory of 988 940 d92c471a57ebeb596e3a387251e05c40N.exe 84 PID 940 wrote to memory of 988 940 d92c471a57ebeb596e3a387251e05c40N.exe 84 PID 988 wrote to memory of 5100 988 nbnthn.exe 85 PID 988 wrote to memory of 5100 988 nbnthn.exe 85 PID 988 wrote to memory of 5100 988 nbnthn.exe 85 PID 5100 wrote to memory of 4848 5100 1djdv.exe 86 PID 5100 wrote to memory of 4848 5100 1djdv.exe 86 PID 5100 wrote to memory of 4848 5100 1djdv.exe 86 PID 4848 wrote to memory of 2792 4848 tnbtbn.exe 87 PID 4848 wrote to memory of 2792 4848 tnbtbn.exe 87 PID 4848 wrote to memory of 2792 4848 tnbtbn.exe 87 PID 2792 wrote to memory of 2872 2792 rrllflf.exe 89 PID 2792 wrote to memory of 2872 2792 rrllflf.exe 89 PID 2792 wrote to memory of 2872 2792 rrllflf.exe 89 PID 2872 wrote to memory of 4052 2872 bhbtnb.exe 90 PID 2872 wrote to memory of 4052 2872 bhbtnb.exe 90 PID 2872 wrote to memory of 4052 2872 bhbtnb.exe 90 PID 4052 wrote to memory of 1584 4052 xrllrfl.exe 92 PID 4052 wrote to memory of 1584 4052 xrllrfl.exe 92 PID 4052 wrote to memory of 1584 4052 xrllrfl.exe 92 PID 1584 wrote to memory of 3416 1584 llrlxxx.exe 94 PID 1584 wrote to memory of 3416 1584 llrlxxx.exe 94 PID 1584 wrote to memory of 3416 1584 llrlxxx.exe 94 PID 3416 wrote to memory of 3436 3416 5xllflf.exe 95 PID 3416 wrote to memory of 3436 3416 5xllflf.exe 95 PID 3416 wrote to memory of 3436 3416 5xllflf.exe 95 PID 3436 wrote to memory of 2380 3436 vvvpp.exe 96 PID 3436 wrote to memory of 2380 3436 vvvpp.exe 96 PID 3436 wrote to memory of 2380 3436 vvvpp.exe 96 PID 2380 wrote to memory of 5028 2380 fflxlrr.exe 97 PID 2380 wrote to memory of 5028 2380 fflxlrr.exe 97 PID 2380 wrote to memory of 5028 2380 fflxlrr.exe 97 PID 5028 wrote to memory of 4456 5028 bbnnht.exe 98 PID 5028 wrote to memory of 4456 5028 bbnnht.exe 98 PID 5028 wrote to memory of 4456 5028 bbnnht.exe 98 PID 4456 wrote to memory of 3804 4456 pvvvd.exe 99 PID 4456 wrote to memory of 3804 4456 pvvvd.exe 99 PID 4456 wrote to memory of 3804 4456 pvvvd.exe 99 PID 3804 wrote to memory of 5064 3804 llxffll.exe 100 PID 3804 wrote to memory of 5064 3804 llxffll.exe 100 PID 3804 wrote to memory of 5064 3804 llxffll.exe 100 PID 5064 wrote to memory of 4668 5064 nnhbtt.exe 101 PID 5064 wrote to memory of 4668 5064 nnhbtt.exe 101 PID 5064 wrote to memory of 4668 5064 nnhbtt.exe 101 PID 4668 wrote to memory of 3484 4668 rrllffx.exe 102 PID 4668 wrote to memory of 3484 4668 rrllffx.exe 102 PID 4668 wrote to memory of 3484 4668 rrllffx.exe 102 PID 3484 wrote to memory of 2264 3484 vpvvp.exe 103 PID 3484 wrote to memory of 2264 3484 vpvvp.exe 103 PID 3484 wrote to memory of 2264 3484 vpvvp.exe 103 PID 2264 wrote to memory of 2160 2264 xxxrrxx.exe 104 PID 2264 wrote to memory of 2160 2264 xxxrrxx.exe 104 PID 2264 wrote to memory of 2160 2264 xxxrrxx.exe 104 PID 2160 wrote to memory of 3084 2160 lfrrlll.exe 105 PID 2160 wrote to memory of 3084 2160 lfrrlll.exe 105 PID 2160 wrote to memory of 3084 2160 lfrrlll.exe 105 PID 3084 wrote to memory of 2764 3084 bttnnn.exe 106 PID 3084 wrote to memory of 2764 3084 bttnnn.exe 106 PID 3084 wrote to memory of 2764 3084 bttnnn.exe 106 PID 2764 wrote to memory of 2248 2764 dddvv.exe 107 PID 2764 wrote to memory of 2248 2764 dddvv.exe 107 PID 2764 wrote to memory of 2248 2764 dddvv.exe 107 PID 2248 wrote to memory of 408 2248 3xllllf.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\d92c471a57ebeb596e3a387251e05c40N.exe"C:\Users\Admin\AppData\Local\Temp\d92c471a57ebeb596e3a387251e05c40N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:940 -
\??\c:\nbnthn.exec:\nbnthn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
\??\c:\1djdv.exec:\1djdv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\tnbtbn.exec:\tnbtbn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\rrllflf.exec:\rrllflf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\bhbtnb.exec:\bhbtnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\xrllrfl.exec:\xrllrfl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
\??\c:\llrlxxx.exec:\llrlxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\5xllflf.exec:\5xllflf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
\??\c:\vvvpp.exec:\vvvpp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\fflxlrr.exec:\fflxlrr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\bbnnht.exec:\bbnnht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\pvvvd.exec:\pvvvd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\llxffll.exec:\llxffll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
\??\c:\nnhbtt.exec:\nnhbtt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\rrllffx.exec:\rrllffx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\vpvvp.exec:\vpvvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
\??\c:\xxxrrxx.exec:\xxxrrxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\lfrrlll.exec:\lfrrlll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\bttnnn.exec:\bttnnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
\??\c:\dddvv.exec:\dddvv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\3xllllf.exec:\3xllllf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\5vvvp.exec:\5vvvp.exe23⤵
- Executes dropped EXE
PID:408 -
\??\c:\bbnhbn.exec:\bbnhbn.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456 -
\??\c:\1vpvp.exec:\1vpvp.exe25⤵
- Executes dropped EXE
PID:2748 -
\??\c:\hnhbtn.exec:\hnhbtn.exe26⤵
- Executes dropped EXE
PID:928 -
\??\c:\dvjdd.exec:\dvjdd.exe27⤵
- Executes dropped EXE
PID:1952 -
\??\c:\rfllxxr.exec:\rfllxxr.exe28⤵
- Executes dropped EXE
PID:2432 -
\??\c:\tnhbtt.exec:\tnhbtt.exe29⤵
- Executes dropped EXE
PID:4660 -
\??\c:\fxffxfx.exec:\fxffxfx.exe30⤵
- Executes dropped EXE
PID:4196 -
\??\c:\ntbbtt.exec:\ntbbtt.exe31⤵
- Executes dropped EXE
PID:4444 -
\??\c:\lrrrrxx.exec:\lrrrrxx.exe32⤵
- Executes dropped EXE
PID:864 -
\??\c:\ttbthh.exec:\ttbthh.exe33⤵
- Executes dropped EXE
PID:2820 -
\??\c:\lrxxrrr.exec:\lrxxrrr.exe34⤵
- Executes dropped EXE
PID:4360 -
\??\c:\hntnnt.exec:\hntnnt.exe35⤵
- Executes dropped EXE
PID:1664 -
\??\c:\5jvvp.exec:\5jvvp.exe36⤵
- Executes dropped EXE
PID:676 -
\??\c:\ffxxrff.exec:\ffxxrff.exe37⤵
- Executes dropped EXE
PID:3356 -
\??\c:\ttttbb.exec:\ttttbb.exe38⤵
- Executes dropped EXE
PID:4868 -
\??\c:\pjpjp.exec:\pjpjp.exe39⤵
- Executes dropped EXE
PID:3376 -
\??\c:\fxlfrrr.exec:\fxlfrrr.exe40⤵
- Executes dropped EXE
PID:4092 -
\??\c:\pvddv.exec:\pvddv.exe41⤵
- Executes dropped EXE
PID:3120 -
\??\c:\7xffxrr.exec:\7xffxrr.exe42⤵
- Executes dropped EXE
PID:4676 -
\??\c:\thnhbt.exec:\thnhbt.exe43⤵
- Executes dropped EXE
PID:1836 -
\??\c:\9dpjv.exec:\9dpjv.exe44⤵
- Executes dropped EXE
PID:4228 -
\??\c:\xlxxxxr.exec:\xlxxxxr.exe45⤵
- Executes dropped EXE
PID:3696 -
\??\c:\thhhbb.exec:\thhhbb.exe46⤵
- Executes dropped EXE
PID:4700 -
\??\c:\vpppj.exec:\vpppj.exe47⤵
- Executes dropped EXE
PID:4344 -
\??\c:\xxlllll.exec:\xxlllll.exe48⤵
- Executes dropped EXE
PID:4656 -
\??\c:\ddpvp.exec:\ddpvp.exe49⤵
- Executes dropped EXE
PID:4696 -
\??\c:\fxrrxrr.exec:\fxrrxrr.exe50⤵
- Executes dropped EXE
PID:4964 -
\??\c:\hhtnbt.exec:\hhtnbt.exe51⤵
- Executes dropped EXE
PID:2572 -
\??\c:\dpjdd.exec:\dpjdd.exe52⤵
- Executes dropped EXE
PID:2244 -
\??\c:\xxlflxx.exec:\xxlflxx.exe53⤵
- Executes dropped EXE
PID:2472 -
\??\c:\jvvvj.exec:\jvvvj.exe54⤵
- Executes dropped EXE
PID:60 -
\??\c:\lfrrlff.exec:\lfrrlff.exe55⤵
- Executes dropped EXE
PID:2176 -
\??\c:\bbhbnn.exec:\bbhbnn.exe56⤵
- Executes dropped EXE
PID:4592 -
\??\c:\jdvpp.exec:\jdvpp.exe57⤵
- Executes dropped EXE
PID:3576 -
\??\c:\rlfxffl.exec:\rlfxffl.exe58⤵
- Executes dropped EXE
PID:1704 -
\??\c:\tbbhhh.exec:\tbbhhh.exe59⤵
- Executes dropped EXE
PID:4972 -
\??\c:\jddvp.exec:\jddvp.exe60⤵
- Executes dropped EXE
PID:4128 -
\??\c:\rrfffff.exec:\rrfffff.exe61⤵
- Executes dropped EXE
PID:4580 -
\??\c:\nhttnb.exec:\nhttnb.exe62⤵
- Executes dropped EXE
PID:3228 -
\??\c:\dvddd.exec:\dvddd.exe63⤵
- Executes dropped EXE
PID:4816 -
\??\c:\xrlfxxx.exec:\xrlfxxx.exe64⤵
- Executes dropped EXE
PID:2332 -
\??\c:\5nnnhh.exec:\5nnnhh.exe65⤵
- Executes dropped EXE
PID:3100 -
\??\c:\5vddp.exec:\5vddp.exe66⤵PID:316
-
\??\c:\frrrllf.exec:\frrrllf.exe67⤵PID:1056
-
\??\c:\5bttnt.exec:\5bttnt.exe68⤵PID:4732
-
\??\c:\7jvpd.exec:\7jvpd.exe69⤵PID:928
-
\??\c:\lxlffff.exec:\lxlffff.exe70⤵PID:1968
-
\??\c:\bnhhnb.exec:\bnhhnb.exe71⤵PID:4660
-
\??\c:\jjppj.exec:\jjppj.exe72⤵PID:3852
-
\??\c:\lllllff.exec:\lllllff.exe73⤵PID:2752
-
\??\c:\nthbhn.exec:\nthbhn.exe74⤵PID:1444
-
\??\c:\pjvpp.exec:\pjvpp.exe75⤵PID:2012
-
\??\c:\bbnhhn.exec:\bbnhhn.exe76⤵PID:4740
-
\??\c:\djdvv.exec:\djdvv.exe77⤵PID:2944
-
\??\c:\rlflxrl.exec:\rlflxrl.exe78⤵PID:3284
-
\??\c:\7bhhhh.exec:\7bhhhh.exe79⤵PID:3356
-
\??\c:\3vddv.exec:\3vddv.exe80⤵PID:1660
-
\??\c:\fxxrrfx.exec:\fxxrrfx.exe81⤵PID:4148
-
\??\c:\tthhhh.exec:\tthhhh.exe82⤵PID:4092
-
\??\c:\1pjvv.exec:\1pjvv.exe83⤵PID:3776
-
\??\c:\nnnttt.exec:\nnnttt.exe84⤵PID:2252
-
\??\c:\jvjvv.exec:\jvjvv.exe85⤵PID:1656
-
\??\c:\xrrlrrr.exec:\xrrlrrr.exe86⤵PID:4228
-
\??\c:\tnnnnn.exec:\tnnnnn.exe87⤵PID:3696
-
\??\c:\dpvvp.exec:\dpvvp.exe88⤵PID:1840
-
\??\c:\ffffxll.exec:\ffffxll.exe89⤵PID:4720
-
\??\c:\jpjdv.exec:\jpjdv.exe90⤵PID:4968
-
\??\c:\1xfxxrr.exec:\1xfxxrr.exe91⤵PID:1072
-
\??\c:\htbhhh.exec:\htbhhh.exe92⤵PID:3760
-
\??\c:\9pvpj.exec:\9pvpj.exe93⤵PID:3872
-
\??\c:\frxrlfx.exec:\frxrlfx.exe94⤵PID:3668
-
\??\c:\9nnhbb.exec:\9nnhbb.exe95⤵PID:4640
-
\??\c:\ddjvv.exec:\ddjvv.exe96⤵PID:808
-
\??\c:\9xlfrrl.exec:\9xlfrrl.exe97⤵PID:2176
-
\??\c:\bnnnnt.exec:\bnnnnt.exe98⤵
- System Location Discovery: System Language Discovery
PID:3680 -
\??\c:\llllfxr.exec:\llllfxr.exe99⤵PID:4136
-
\??\c:\nbnntb.exec:\nbnntb.exe100⤵PID:1408
-
\??\c:\jjppp.exec:\jjppp.exe101⤵PID:4972
-
\??\c:\frxxrrr.exec:\frxxrrr.exe102⤵PID:4248
-
\??\c:\nnbbbt.exec:\nnbbbt.exe103⤵PID:1456
-
\??\c:\jvvvd.exec:\jvvvd.exe104⤵PID:3228
-
\??\c:\7tbtnn.exec:\7tbtnn.exe105⤵PID:4816
-
\??\c:\pvvdj.exec:\pvvdj.exe106⤵PID:2980
-
\??\c:\rrrxffx.exec:\rrrxffx.exe107⤵PID:3100
-
\??\c:\btnntt.exec:\btnntt.exe108⤵PID:4932
-
\??\c:\9jppv.exec:\9jppv.exe109⤵PID:4420
-
\??\c:\fllxlfx.exec:\fllxlfx.exe110⤵PID:2724
-
\??\c:\bhnhbb.exec:\bhnhbb.exe111⤵PID:4240
-
\??\c:\pvvvv.exec:\pvvvv.exe112⤵PID:4504
-
\??\c:\llxrxfr.exec:\llxrxfr.exe113⤵PID:4820
-
\??\c:\5nbtnt.exec:\5nbtnt.exe114⤵PID:2772
-
\??\c:\vvppp.exec:\vvppp.exe115⤵PID:2580
-
\??\c:\rlllffx.exec:\rlllffx.exe116⤵PID:3316
-
\??\c:\hbhbtt.exec:\hbhbtt.exe117⤵PID:592
-
\??\c:\djdvp.exec:\djdvp.exe118⤵PID:4740
-
\??\c:\xxllffl.exec:\xxllffl.exe119⤵PID:528
-
\??\c:\bntnnt.exec:\bntnnt.exe120⤵PID:5020
-
\??\c:\jpdvv.exec:\jpdvv.exe121⤵PID:3356
-
\??\c:\tttnhh.exec:\tttnhh.exe122⤵PID:1660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-