Analysis
-
max time kernel
150s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 05:34
Static task
static1
Behavioral task
behavioral1
Sample
f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe
Resource
win7-20240704-en
General
-
Target
f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe
-
Size
96KB
-
MD5
2e5025eeefc7192c12d14f6e7234d9c8
-
SHA1
fc38fa5d794aba9d30ae82cb62e3c57aff804477
-
SHA256
f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1
-
SHA512
3b226cae7fd45dadde4d5baf82176a107b4725b6e63d1094f687c028ca6f3c6d666ee4c190c6e1b9fc5a37069a165eb59895e0d353343d38a360487b8b18431a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qP1hvZo66Ox4oq2SQwfTrg:ymb3NkkiQ3mdBjFIj+qNhvZuHQYfw4jS
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/2868-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3836-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3836-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4288-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2336-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4940-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2480-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4152-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2532-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/740-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/876-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4640-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1136-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2744-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4016-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2856-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3452-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3836 9nttnt.exe 2336 pdddv.exe 4288 vvdvv.exe 4940 xrxlffx.exe 428 hnttnb.exe 2532 jdddv.exe 2480 xlfllxl.exe 3908 btbhnb.exe 4152 bttnnn.exe 740 pvvpj.exe 876 lrxxrrr.exe 5032 bbhbhh.exe 4640 ddjvv.exe 1136 dpvvv.exe 3868 1xlfxxr.exe 1688 thbtnn.exe 1656 nnhbbb.exe 2984 vpdvj.exe 1456 jppdv.exe 2744 fxfffff.exe 1820 xlrrrrr.exe 3000 nnttnt.exe 2044 hbnhbb.exe 4016 dppjv.exe 2856 rflfrxr.exe 1828 rllfllr.exe 1972 tntnhh.exe 2324 pjjdp.exe 3452 xrfxxrr.exe 1312 3xxxrrr.exe 1552 hnnnnn.exe 3348 pdjdd.exe 4308 dvdvp.exe 1700 rlxlfxx.exe 3480 fxxxxxr.exe 4792 nhttnn.exe 4424 7htbtt.exe 2800 5jpjp.exe 1440 vpjdd.exe 1716 9rxfxxx.exe 1848 3rlffff.exe 3544 bnbhth.exe 4132 ddpjd.exe 4136 5vdjj.exe 2284 xxrlfxr.exe 428 rxllrrl.exe 324 bhbnbb.exe 228 nbtbtb.exe 4488 jpjjj.exe 1756 frrrrll.exe 3168 3llfxxr.exe 1968 ttnnhh.exe 2852 pjpdd.exe 3232 5vjjp.exe 5084 pppjj.exe 5032 3xfxrrl.exe 4296 5tnnhn.exe 4584 thnhbt.exe 4960 djppd.exe 4204 7ppjj.exe 2040 llrrfff.exe 1992 rxflrrr.exe 3060 thhbhh.exe 4160 nnnntt.exe -
resource yara_rule behavioral2/memory/2868-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2868-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3836-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3836-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3836-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4288-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2336-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2532-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2532-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4152-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/740-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2532-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/740-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/876-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4640-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2744-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4016-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2856-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1972-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3452-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1552-215-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5djdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3836 2868 f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe 84 PID 2868 wrote to memory of 3836 2868 f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe 84 PID 2868 wrote to memory of 3836 2868 f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe 84 PID 3836 wrote to memory of 2336 3836 9nttnt.exe 85 PID 3836 wrote to memory of 2336 3836 9nttnt.exe 85 PID 3836 wrote to memory of 2336 3836 9nttnt.exe 85 PID 2336 wrote to memory of 4288 2336 pdddv.exe 86 PID 2336 wrote to memory of 4288 2336 pdddv.exe 86 PID 2336 wrote to memory of 4288 2336 pdddv.exe 86 PID 4288 wrote to memory of 4940 4288 vvdvv.exe 87 PID 4288 wrote to memory of 4940 4288 vvdvv.exe 87 PID 4288 wrote to memory of 4940 4288 vvdvv.exe 87 PID 4940 wrote to memory of 428 4940 xrxlffx.exe 88 PID 4940 wrote to memory of 428 4940 xrxlffx.exe 88 PID 4940 wrote to memory of 428 4940 xrxlffx.exe 88 PID 428 wrote to memory of 2532 428 hnttnb.exe 89 PID 428 wrote to memory of 2532 428 hnttnb.exe 89 PID 428 wrote to memory of 2532 428 hnttnb.exe 89 PID 2532 wrote to memory of 2480 2532 jdddv.exe 90 PID 2532 wrote to memory of 2480 2532 jdddv.exe 90 PID 2532 wrote to memory of 2480 2532 jdddv.exe 90 PID 2480 wrote to memory of 3908 2480 xlfllxl.exe 91 PID 2480 wrote to memory of 3908 2480 xlfllxl.exe 91 PID 2480 wrote to memory of 3908 2480 xlfllxl.exe 91 PID 3908 wrote to memory of 4152 3908 btbhnb.exe 93 PID 3908 wrote to memory of 4152 3908 btbhnb.exe 93 PID 3908 wrote to memory of 4152 3908 btbhnb.exe 93 PID 4152 wrote to memory of 740 4152 bttnnn.exe 94 PID 4152 wrote to memory of 740 4152 bttnnn.exe 94 PID 4152 wrote to memory of 740 4152 bttnnn.exe 94 PID 740 wrote to memory of 876 740 pvvpj.exe 95 PID 740 wrote to memory of 876 740 pvvpj.exe 95 PID 740 wrote to memory of 876 740 pvvpj.exe 95 PID 876 wrote to memory of 5032 876 lrxxrrr.exe 96 PID 876 wrote to memory of 5032 876 lrxxrrr.exe 96 PID 876 wrote to memory of 5032 876 lrxxrrr.exe 96 PID 5032 wrote to memory of 4640 5032 bbhbhh.exe 97 PID 5032 wrote to memory of 4640 5032 bbhbhh.exe 97 PID 5032 wrote to memory of 4640 5032 bbhbhh.exe 97 PID 4640 wrote to memory of 1136 4640 ddjvv.exe 98 PID 4640 wrote to memory of 1136 4640 ddjvv.exe 98 PID 4640 wrote to memory of 1136 4640 ddjvv.exe 98 PID 1136 wrote to memory of 3868 1136 dpvvv.exe 99 PID 1136 wrote to memory of 3868 1136 dpvvv.exe 99 PID 1136 wrote to memory of 3868 1136 dpvvv.exe 99 PID 3868 wrote to memory of 1688 3868 1xlfxxr.exe 100 PID 3868 wrote to memory of 1688 3868 1xlfxxr.exe 100 PID 3868 wrote to memory of 1688 3868 1xlfxxr.exe 100 PID 1688 wrote to memory of 1656 1688 thbtnn.exe 101 PID 1688 wrote to memory of 1656 1688 thbtnn.exe 101 PID 1688 wrote to memory of 1656 1688 thbtnn.exe 101 PID 1656 wrote to memory of 2984 1656 nnhbbb.exe 102 PID 1656 wrote to memory of 2984 1656 nnhbbb.exe 102 PID 1656 wrote to memory of 2984 1656 nnhbbb.exe 102 PID 2984 wrote to memory of 1456 2984 vpdvj.exe 104 PID 2984 wrote to memory of 1456 2984 vpdvj.exe 104 PID 2984 wrote to memory of 1456 2984 vpdvj.exe 104 PID 1456 wrote to memory of 2744 1456 jppdv.exe 105 PID 1456 wrote to memory of 2744 1456 jppdv.exe 105 PID 1456 wrote to memory of 2744 1456 jppdv.exe 105 PID 2744 wrote to memory of 1820 2744 fxfffff.exe 106 PID 2744 wrote to memory of 1820 2744 fxfffff.exe 106 PID 2744 wrote to memory of 1820 2744 fxfffff.exe 106 PID 1820 wrote to memory of 3000 1820 xlrrrrr.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe"C:\Users\Admin\AppData\Local\Temp\f9cb1eea530a3dee983a3f328d2458831137bf3ec8259e052f157f5f739109f1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\9nttnt.exec:\9nttnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
\??\c:\pdddv.exec:\pdddv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\vvdvv.exec:\vvdvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
\??\c:\xrxlffx.exec:\xrxlffx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\hnttnb.exec:\hnttnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
\??\c:\jdddv.exec:\jdddv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\xlfllxl.exec:\xlfllxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\btbhnb.exec:\btbhnb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\bttnnn.exec:\bttnnn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
\??\c:\pvvpj.exec:\pvvpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\lrxxrrr.exec:\lrxxrrr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\bbhbhh.exec:\bbhbhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\ddjvv.exec:\ddjvv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\dpvvv.exec:\dpvvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\1xlfxxr.exec:\1xlfxxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\thbtnn.exec:\thbtnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\nnhbbb.exec:\nnhbbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\vpdvj.exec:\vpdvj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\jppdv.exec:\jppdv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\fxfffff.exec:\fxfffff.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\xlrrrrr.exec:\xlrrrrr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\nnttnt.exec:\nnttnt.exe23⤵
- Executes dropped EXE
PID:3000 -
\??\c:\hbnhbb.exec:\hbnhbb.exe24⤵
- Executes dropped EXE
PID:2044 -
\??\c:\dppjv.exec:\dppjv.exe25⤵
- Executes dropped EXE
PID:4016 -
\??\c:\rflfrxr.exec:\rflfrxr.exe26⤵
- Executes dropped EXE
PID:2856 -
\??\c:\rllfllr.exec:\rllfllr.exe27⤵
- Executes dropped EXE
PID:1828 -
\??\c:\tntnhh.exec:\tntnhh.exe28⤵
- Executes dropped EXE
PID:1972 -
\??\c:\pjjdp.exec:\pjjdp.exe29⤵
- Executes dropped EXE
PID:2324 -
\??\c:\xrfxxrr.exec:\xrfxxrr.exe30⤵
- Executes dropped EXE
PID:3452 -
\??\c:\3xxxrrr.exec:\3xxxrrr.exe31⤵
- Executes dropped EXE
PID:1312 -
\??\c:\hnnnnn.exec:\hnnnnn.exe32⤵
- Executes dropped EXE
PID:1552 -
\??\c:\pdjdd.exec:\pdjdd.exe33⤵
- Executes dropped EXE
PID:3348 -
\??\c:\dvdvp.exec:\dvdvp.exe34⤵
- Executes dropped EXE
PID:4308 -
\??\c:\rlxlfxx.exec:\rlxlfxx.exe35⤵
- Executes dropped EXE
PID:1700 -
\??\c:\fxxxxxr.exec:\fxxxxxr.exe36⤵
- Executes dropped EXE
PID:3480 -
\??\c:\nhttnn.exec:\nhttnn.exe37⤵
- Executes dropped EXE
PID:4792 -
\??\c:\7htbtt.exec:\7htbtt.exe38⤵
- Executes dropped EXE
PID:4424 -
\??\c:\5jpjp.exec:\5jpjp.exe39⤵
- Executes dropped EXE
PID:2800 -
\??\c:\vpjdd.exec:\vpjdd.exe40⤵
- Executes dropped EXE
PID:1440 -
\??\c:\9rxfxxx.exec:\9rxfxxx.exe41⤵
- Executes dropped EXE
PID:1716 -
\??\c:\3rlffff.exec:\3rlffff.exe42⤵
- Executes dropped EXE
PID:1848 -
\??\c:\bnbhth.exec:\bnbhth.exe43⤵
- Executes dropped EXE
PID:3544 -
\??\c:\ddpjd.exec:\ddpjd.exe44⤵
- Executes dropped EXE
PID:4132 -
\??\c:\5vdjj.exec:\5vdjj.exe45⤵
- Executes dropped EXE
PID:4136 -
\??\c:\xxrlfxr.exec:\xxrlfxr.exe46⤵
- Executes dropped EXE
PID:2284 -
\??\c:\rxllrrl.exec:\rxllrrl.exe47⤵
- Executes dropped EXE
PID:428 -
\??\c:\bhbnbb.exec:\bhbnbb.exe48⤵
- Executes dropped EXE
PID:324 -
\??\c:\nbtbtb.exec:\nbtbtb.exe49⤵
- Executes dropped EXE
PID:228 -
\??\c:\jpjjj.exec:\jpjjj.exe50⤵
- Executes dropped EXE
PID:4488 -
\??\c:\frrrrll.exec:\frrrrll.exe51⤵
- Executes dropped EXE
PID:1756 -
\??\c:\3llfxxr.exec:\3llfxxr.exe52⤵
- Executes dropped EXE
PID:3168 -
\??\c:\ttnnhh.exec:\ttnnhh.exe53⤵
- Executes dropped EXE
PID:1968 -
\??\c:\pjpdd.exec:\pjpdd.exe54⤵
- Executes dropped EXE
PID:2852 -
\??\c:\5vjjp.exec:\5vjjp.exe55⤵
- Executes dropped EXE
PID:3232 -
\??\c:\pppjj.exec:\pppjj.exe56⤵
- Executes dropped EXE
PID:5084 -
\??\c:\3xfxrrl.exec:\3xfxrrl.exe57⤵
- Executes dropped EXE
PID:5032 -
\??\c:\5tnnhn.exec:\5tnnhn.exe58⤵
- Executes dropped EXE
PID:4296 -
\??\c:\thnhbt.exec:\thnhbt.exe59⤵
- Executes dropped EXE
PID:4584 -
\??\c:\djppd.exec:\djppd.exe60⤵
- Executes dropped EXE
PID:4960 -
\??\c:\7ppjj.exec:\7ppjj.exe61⤵
- Executes dropped EXE
PID:4204 -
\??\c:\llrrfff.exec:\llrrfff.exe62⤵
- Executes dropped EXE
PID:2040 -
\??\c:\rxflrrr.exec:\rxflrrr.exe63⤵
- Executes dropped EXE
PID:1992 -
\??\c:\thhbhh.exec:\thhbhh.exe64⤵
- Executes dropped EXE
PID:3060 -
\??\c:\nnnntt.exec:\nnnntt.exe65⤵
- Executes dropped EXE
PID:4160 -
\??\c:\jdvpp.exec:\jdvpp.exe66⤵PID:1760
-
\??\c:\dvvdv.exec:\dvvdv.exe67⤵PID:2812
-
\??\c:\jpppj.exec:\jpppj.exe68⤵PID:2636
-
\??\c:\flfllxf.exec:\flfllxf.exe69⤵PID:836
-
\??\c:\rrxfxxx.exec:\rrxfxxx.exe70⤵PID:1156
-
\??\c:\7tttnh.exec:\7tttnh.exe71⤵PID:2088
-
\??\c:\tnbtnt.exec:\tnbtnt.exe72⤵PID:2720
-
\??\c:\jdvvv.exec:\jdvvv.exe73⤵PID:2084
-
\??\c:\7vdpv.exec:\7vdpv.exe74⤵PID:4072
-
\??\c:\fxxlflf.exec:\fxxlflf.exe75⤵PID:3628
-
\??\c:\bhbnbn.exec:\bhbnbn.exe76⤵PID:3296
-
\??\c:\nhhnnn.exec:\nhhnnn.exe77⤵PID:3324
-
\??\c:\5dpjj.exec:\5dpjj.exe78⤵PID:2236
-
\??\c:\jdpjj.exec:\jdpjj.exe79⤵PID:3016
-
\??\c:\jjvpj.exec:\jjvpj.exe80⤵PID:508
-
\??\c:\rlllfff.exec:\rlllfff.exe81⤵
- System Location Discovery: System Language Discovery
PID:2260 -
\??\c:\fxffffr.exec:\fxffffr.exe82⤵PID:1788
-
\??\c:\5nthtn.exec:\5nthtn.exe83⤵PID:4284
-
\??\c:\ddjjv.exec:\ddjjv.exe84⤵PID:4924
-
\??\c:\jjpvd.exec:\jjpvd.exe85⤵PID:4020
-
\??\c:\fxffrfl.exec:\fxffrfl.exe86⤵PID:1520
-
\??\c:\lxfxxxr.exec:\lxfxxxr.exe87⤵PID:1072
-
\??\c:\hhbthb.exec:\hhbthb.exe88⤵PID:2212
-
\??\c:\3bbnhb.exec:\3bbnhb.exe89⤵PID:4196
-
\??\c:\pdjvp.exec:\pdjvp.exe90⤵PID:2864
-
\??\c:\vpdvp.exec:\vpdvp.exe91⤵PID:1336
-
\??\c:\xrxxllf.exec:\xrxxllf.exe92⤵PID:4704
-
\??\c:\3rrlfff.exec:\3rrlfff.exe93⤵PID:2676
-
\??\c:\bhhhhh.exec:\bhhhhh.exe94⤵PID:3488
-
\??\c:\5lfxllr.exec:\5lfxllr.exe95⤵PID:1468
-
\??\c:\rllllff.exec:\rllllff.exe96⤵PID:2356
-
\??\c:\7hnhhh.exec:\7hnhhh.exe97⤵PID:244
-
\??\c:\7nnnnn.exec:\7nnnnn.exe98⤵PID:3332
-
\??\c:\jvvjd.exec:\jvvjd.exe99⤵PID:3400
-
\??\c:\7djvv.exec:\7djvv.exe100⤵PID:3164
-
\??\c:\lxxrllf.exec:\lxxrllf.exe101⤵PID:3168
-
\??\c:\lfrffxx.exec:\lfrffxx.exe102⤵PID:740
-
\??\c:\tttttt.exec:\tttttt.exe103⤵PID:2628
-
\??\c:\dpdvv.exec:\dpdvv.exe104⤵PID:3056
-
\??\c:\ppdvp.exec:\ppdvp.exe105⤵PID:4048
-
\??\c:\frxrfrr.exec:\frxrfrr.exe106⤵PID:3392
-
\??\c:\1rxxxxx.exec:\1rxxxxx.exe107⤵PID:5076
-
\??\c:\htnbnh.exec:\htnbnh.exe108⤵PID:4680
-
\??\c:\3thbbb.exec:\3thbbb.exe109⤵PID:1684
-
\??\c:\ddppj.exec:\ddppj.exe110⤵PID:3584
-
\??\c:\ddvvp.exec:\ddvvp.exe111⤵PID:2692
-
\??\c:\lfffxxr.exec:\lfffxxr.exe112⤵PID:816
-
\??\c:\1frlllr.exec:\1frlllr.exe113⤵PID:1572
-
\??\c:\9htnhh.exec:\9htnhh.exe114⤵PID:1136
-
\??\c:\bnhtnb.exec:\bnhtnb.exe115⤵PID:112
-
\??\c:\5vdvv.exec:\5vdvv.exe116⤵
- System Location Discovery: System Language Discovery
PID:2636 -
\??\c:\lrlxrrl.exec:\lrlxrrl.exe117⤵PID:4280
-
\??\c:\9xxfxfx.exec:\9xxfxfx.exe118⤵PID:5052
-
\??\c:\7nthbt.exec:\7nthbt.exe119⤵PID:1504
-
\??\c:\jdjjv.exec:\jdjjv.exe120⤵PID:3420
-
\??\c:\pjvpv.exec:\pjvpv.exe121⤵PID:2428
-
\??\c:\flxrllr.exec:\flxrllr.exe122⤵PID:2220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-