Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 01:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe
-
Size
489KB
-
MD5
4655b9c81cd3d8a5d98971806f09bf1b
-
SHA1
13788fc3b33bc0189cd4c37285208347506277cf
-
SHA256
b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d
-
SHA512
02910f7fe0f34ac510d157338073d7b93004e9f2bb1590c4ac4154fbab4cb68c2f523b75838b3207c329f3e488ba7a498da1059dc98dff39dee75a49521b1eb1
-
SSDEEP
6144:n3C9BRo7MlrWKo+lS0Le4xRSAoq78yoyfx93svqTbWL5wE+:n3C9yMo+S0L9xRnoq7H9QYcmB
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/3048-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2380-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2064-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5024-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2168-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1948-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3248-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3860-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/912-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2084-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3636-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3596-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/968-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2988-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2620-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4012-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2820-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2380 pvvvp.exe 3048 xrxxxxx.exe 5024 dvddd.exe 2820 pdvvv.exe 5020 1vvpp.exe 3568 3xxrlxr.exe 4012 3nbtnt.exe 4212 vpvpj.exe 2168 xxffxfx.exe 3372 bbbbtt.exe 736 thbtnn.exe 2620 dvpjd.exe 2988 rlrlffx.exe 1948 thhtnn.exe 968 jddvj.exe 3596 rlrrlrr.exe 3248 ddvvp.exe 3860 rfllfxx.exe 1636 9nthnb.exe 924 fxrllll.exe 3636 nnnhbb.exe 964 pdppp.exe 4612 lffxrrl.exe 2504 nhbthh.exe 1660 3vvpv.exe 4928 rxxrlfx.exe 3096 hnnnnn.exe 2084 7vjdv.exe 912 xxrlrrx.exe 4460 lffxrrr.exe 4224 nnbhnn.exe 2204 5tbttt.exe 452 xflfrrx.exe 2804 tbhthh.exe 2328 lffxrrl.exe 996 lrrrrxr.exe 4332 hbtnhh.exe 2064 djpjd.exe 2096 rlxrrlf.exe 4260 bntnhb.exe 2420 nhbttn.exe 4300 vpjdv.exe 4168 lxflllf.exe 4776 xrxxxxx.exe 3932 btbtnh.exe 3092 vdjdv.exe 4532 lxxrllf.exe 3532 lrxrlll.exe 1724 bbbnhn.exe 5008 vpvvv.exe 804 jppdp.exe 2628 lrxfrxx.exe 2620 hbbbtt.exe 3772 jppvj.exe 3704 3djdp.exe 968 llfrlfx.exe 692 hbhbhh.exe 4576 pppjj.exe 3312 vjpjv.exe 1376 xrxxrll.exe 3604 nnnttt.exe 3828 nntnnh.exe 5012 pjvvp.exe 3908 lrrllff.exe -
resource yara_rule behavioral2/memory/2064-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2064-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5024-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5020-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2168-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1948-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3248-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3860-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/912-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2084-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3636-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3596-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/968-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2988-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2620-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4012-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2820-33-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3djdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rlllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2380 2064 b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe 84 PID 2064 wrote to memory of 2380 2064 b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe 84 PID 2064 wrote to memory of 2380 2064 b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe 84 PID 2380 wrote to memory of 3048 2380 pvvvp.exe 85 PID 2380 wrote to memory of 3048 2380 pvvvp.exe 85 PID 2380 wrote to memory of 3048 2380 pvvvp.exe 85 PID 3048 wrote to memory of 5024 3048 xrxxxxx.exe 380 PID 3048 wrote to memory of 5024 3048 xrxxxxx.exe 380 PID 3048 wrote to memory of 5024 3048 xrxxxxx.exe 380 PID 5024 wrote to memory of 2820 5024 dvddd.exe 297 PID 5024 wrote to memory of 2820 5024 dvddd.exe 297 PID 5024 wrote to memory of 2820 5024 dvddd.exe 297 PID 2820 wrote to memory of 5020 2820 pdvvv.exe 88 PID 2820 wrote to memory of 5020 2820 pdvvv.exe 88 PID 2820 wrote to memory of 5020 2820 pdvvv.exe 88 PID 5020 wrote to memory of 3568 5020 1vvpp.exe 89 PID 5020 wrote to memory of 3568 5020 1vvpp.exe 89 PID 5020 wrote to memory of 3568 5020 1vvpp.exe 89 PID 3568 wrote to memory of 4012 3568 3xxrlxr.exe 90 PID 3568 wrote to memory of 4012 3568 3xxrlxr.exe 90 PID 3568 wrote to memory of 4012 3568 3xxrlxr.exe 90 PID 4012 wrote to memory of 4212 4012 3nbtnt.exe 221 PID 4012 wrote to memory of 4212 4012 3nbtnt.exe 221 PID 4012 wrote to memory of 4212 4012 3nbtnt.exe 221 PID 4212 wrote to memory of 2168 4212 vpvpj.exe 93 PID 4212 wrote to memory of 2168 4212 vpvpj.exe 93 PID 4212 wrote to memory of 2168 4212 vpvpj.exe 93 PID 2168 wrote to memory of 3372 2168 xxffxfx.exe 540 PID 2168 wrote to memory of 3372 2168 xxffxfx.exe 540 PID 2168 wrote to memory of 3372 2168 xxffxfx.exe 540 PID 3372 wrote to memory of 736 3372 bbbbtt.exe 97 PID 3372 wrote to memory of 736 3372 bbbbtt.exe 97 PID 3372 wrote to memory of 736 3372 bbbbtt.exe 97 PID 736 wrote to memory of 2620 736 thbtnn.exe 98 PID 736 wrote to memory of 2620 736 thbtnn.exe 98 PID 736 wrote to memory of 2620 736 thbtnn.exe 98 PID 2620 wrote to memory of 2988 2620 dvpjd.exe 99 PID 2620 wrote to memory of 2988 2620 dvpjd.exe 99 PID 2620 wrote to memory of 2988 2620 dvpjd.exe 99 PID 2988 wrote to memory of 1948 2988 rlrlffx.exe 100 PID 2988 wrote to memory of 1948 2988 rlrlffx.exe 100 PID 2988 wrote to memory of 1948 2988 rlrlffx.exe 100 PID 1948 wrote to memory of 968 1948 thhtnn.exe 142 PID 1948 wrote to memory of 968 1948 thhtnn.exe 142 PID 1948 wrote to memory of 968 1948 thhtnn.exe 142 PID 968 wrote to memory of 3596 968 jddvj.exe 625 PID 968 wrote to memory of 3596 968 jddvj.exe 625 PID 968 wrote to memory of 3596 968 jddvj.exe 625 PID 3596 wrote to memory of 3248 3596 rlrrlrr.exe 103 PID 3596 wrote to memory of 3248 3596 rlrrlrr.exe 103 PID 3596 wrote to memory of 3248 3596 rlrrlrr.exe 103 PID 3248 wrote to memory of 3860 3248 ddvvp.exe 104 PID 3248 wrote to memory of 3860 3248 ddvvp.exe 104 PID 3248 wrote to memory of 3860 3248 ddvvp.exe 104 PID 3860 wrote to memory of 1636 3860 rfllfxx.exe 105 PID 3860 wrote to memory of 1636 3860 rfllfxx.exe 105 PID 3860 wrote to memory of 1636 3860 rfllfxx.exe 105 PID 1636 wrote to memory of 924 1636 9nthnb.exe 106 PID 1636 wrote to memory of 924 1636 9nthnb.exe 106 PID 1636 wrote to memory of 924 1636 9nthnb.exe 106 PID 924 wrote to memory of 3636 924 fxrllll.exe 107 PID 924 wrote to memory of 3636 924 fxrllll.exe 107 PID 924 wrote to memory of 3636 924 fxrllll.exe 107 PID 3636 wrote to memory of 964 3636 nnnhbb.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe"C:\Users\Admin\AppData\Local\Temp\b2486a61bb2827531ceb80a5b42f145b923a13bf809376a9345dd3e88b8af44d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\pvvvp.exec:\pvvvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\xrxxxxx.exec:\xrxxxxx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\dvddd.exec:\dvddd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\pdvvv.exec:\pdvvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\1vvpp.exec:\1vvpp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\3xxrlxr.exec:\3xxrlxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\3nbtnt.exec:\3nbtnt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\vpvpj.exec:\vpvpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\xxffxfx.exec:\xxffxfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\bbbbtt.exec:\bbbbtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
\??\c:\thbtnn.exec:\thbtnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\dvpjd.exec:\dvpjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\rlrlffx.exec:\rlrlffx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\thhtnn.exec:\thhtnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\jddvj.exec:\jddvj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\rlrrlrr.exec:\rlrrlrr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\ddvvp.exec:\ddvvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\rfllfxx.exec:\rfllfxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\9nthnb.exec:\9nthnb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\fxrllll.exec:\fxrllll.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:924 -
\??\c:\nnnhbb.exec:\nnnhbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\pdppp.exec:\pdppp.exe23⤵
- Executes dropped EXE
PID:964 -
\??\c:\lffxrrl.exec:\lffxrrl.exe24⤵
- Executes dropped EXE
PID:4612 -
\??\c:\nhbthh.exec:\nhbthh.exe25⤵
- Executes dropped EXE
PID:2504 -
\??\c:\3vvpv.exec:\3vvpv.exe26⤵
- Executes dropped EXE
PID:1660 -
\??\c:\rxxrlfx.exec:\rxxrlfx.exe27⤵
- Executes dropped EXE
PID:4928 -
\??\c:\hnnnnn.exec:\hnnnnn.exe28⤵
- Executes dropped EXE
PID:3096 -
\??\c:\7vjdv.exec:\7vjdv.exe29⤵
- Executes dropped EXE
PID:2084 -
\??\c:\xxrlrrx.exec:\xxrlrrx.exe30⤵
- Executes dropped EXE
PID:912 -
\??\c:\lffxrrr.exec:\lffxrrr.exe31⤵
- Executes dropped EXE
PID:4460 -
\??\c:\nnbhnn.exec:\nnbhnn.exe32⤵
- Executes dropped EXE
PID:4224 -
\??\c:\5tbttt.exec:\5tbttt.exe33⤵
- Executes dropped EXE
PID:2204 -
\??\c:\xflfrrx.exec:\xflfrrx.exe34⤵
- Executes dropped EXE
PID:452 -
\??\c:\tbhthh.exec:\tbhthh.exe35⤵
- Executes dropped EXE
PID:2804 -
\??\c:\lffxrrl.exec:\lffxrrl.exe36⤵
- Executes dropped EXE
PID:2328 -
\??\c:\lrrrrxr.exec:\lrrrrxr.exe37⤵
- Executes dropped EXE
PID:996 -
\??\c:\hbtnhh.exec:\hbtnhh.exe38⤵
- Executes dropped EXE
PID:4332 -
\??\c:\djpjd.exec:\djpjd.exe39⤵
- Executes dropped EXE
PID:2064 -
\??\c:\rlxrrlf.exec:\rlxrrlf.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096 -
\??\c:\bntnhb.exec:\bntnhb.exe41⤵
- Executes dropped EXE
PID:4260 -
\??\c:\nhbttn.exec:\nhbttn.exe42⤵
- Executes dropped EXE
PID:2420 -
\??\c:\vpjdv.exec:\vpjdv.exe43⤵
- Executes dropped EXE
PID:4300 -
\??\c:\lxflllf.exec:\lxflllf.exe44⤵
- Executes dropped EXE
PID:4168 -
\??\c:\xrxxxxx.exec:\xrxxxxx.exe45⤵
- Executes dropped EXE
PID:4776 -
\??\c:\btbtnh.exec:\btbtnh.exe46⤵
- Executes dropped EXE
PID:3932 -
\??\c:\vdjdv.exec:\vdjdv.exe47⤵
- Executes dropped EXE
PID:3092 -
\??\c:\lxxrllf.exec:\lxxrllf.exe48⤵
- Executes dropped EXE
PID:4532 -
\??\c:\lrxrlll.exec:\lrxrlll.exe49⤵
- Executes dropped EXE
PID:3532 -
\??\c:\bbbnhn.exec:\bbbnhn.exe50⤵
- Executes dropped EXE
PID:1724 -
\??\c:\vpvvv.exec:\vpvvv.exe51⤵
- Executes dropped EXE
PID:5008 -
\??\c:\jppdp.exec:\jppdp.exe52⤵
- Executes dropped EXE
PID:804 -
\??\c:\lrxfrxx.exec:\lrxfrxx.exe53⤵
- Executes dropped EXE
PID:2628 -
\??\c:\hbbbtt.exec:\hbbbtt.exe54⤵
- Executes dropped EXE
PID:2620 -
\??\c:\jppvj.exec:\jppvj.exe55⤵
- Executes dropped EXE
PID:3772 -
\??\c:\3djdp.exec:\3djdp.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3704 -
\??\c:\llfrlfx.exec:\llfrlfx.exe57⤵
- Executes dropped EXE
PID:968 -
\??\c:\hbhbhh.exec:\hbhbhh.exe58⤵
- Executes dropped EXE
PID:692 -
\??\c:\pppjj.exec:\pppjj.exe59⤵
- Executes dropped EXE
PID:4576 -
\??\c:\vjpjv.exec:\vjpjv.exe60⤵
- Executes dropped EXE
PID:3312 -
\??\c:\xrxxrll.exec:\xrxxrll.exe61⤵
- Executes dropped EXE
PID:1376 -
\??\c:\nnnttt.exec:\nnnttt.exe62⤵
- Executes dropped EXE
PID:3604 -
\??\c:\nntnnh.exec:\nntnnh.exe63⤵
- Executes dropped EXE
PID:3828 -
\??\c:\pjvvp.exec:\pjvvp.exe64⤵
- Executes dropped EXE
PID:5012 -
\??\c:\lrrllff.exec:\lrrllff.exe65⤵
- Executes dropped EXE
PID:3908 -
\??\c:\xrflffx.exec:\xrflffx.exe66⤵PID:4612
-
\??\c:\htttbh.exec:\htttbh.exe67⤵PID:2744
-
\??\c:\vpvvp.exec:\vpvvp.exe68⤵PID:1952
-
\??\c:\vvjjj.exec:\vvjjj.exe69⤵PID:540
-
\??\c:\xxlflll.exec:\xxlflll.exe70⤵PID:2576
-
\??\c:\1hhbbb.exec:\1hhbbb.exe71⤵PID:228
-
\??\c:\jdpvp.exec:\jdpvp.exe72⤵PID:4828
-
\??\c:\1rfxrrf.exec:\1rfxrrf.exe73⤵PID:2928
-
\??\c:\frxlllr.exec:\frxlllr.exe74⤵PID:4952
-
\??\c:\hthhtt.exec:\hthhtt.exe75⤵PID:4548
-
\??\c:\xrffrrf.exec:\xrffrrf.exe76⤵PID:2392
-
\??\c:\nttbtt.exec:\nttbtt.exe77⤵PID:2676
-
\??\c:\dppjv.exec:\dppjv.exe78⤵PID:3864
-
\??\c:\9djdp.exec:\9djdp.exe79⤵PID:4308
-
\??\c:\xrflrrx.exec:\xrflrrx.exe80⤵PID:4044
-
\??\c:\bntnnn.exec:\bntnnn.exe81⤵PID:1056
-
\??\c:\9hhbtt.exec:\9hhbtt.exe82⤵PID:3456
-
\??\c:\3jdjd.exec:\3jdjd.exe83⤵PID:4176
-
\??\c:\xllfrrf.exec:\xllfrrf.exe84⤵PID:1248
-
\??\c:\thnhhn.exec:\thnhhn.exe85⤵PID:3560
-
\??\c:\hhhhbh.exec:\hhhhbh.exe86⤵PID:552
-
\??\c:\pjppp.exec:\pjppp.exe87⤵PID:2200
-
\??\c:\lxfrllf.exec:\lxfrllf.exe88⤵PID:3236
-
\??\c:\nhhbtn.exec:\nhhbtn.exe89⤵PID:3876
-
\??\c:\djjdv.exec:\djjdv.exe90⤵PID:4804
-
\??\c:\vdppj.exec:\vdppj.exe91⤵PID:1084
-
\??\c:\xrxlfxf.exec:\xrxlfxf.exe92⤵PID:3932
-
\??\c:\3ntnhh.exec:\3ntnhh.exe93⤵PID:3092
-
\??\c:\hnntht.exec:\hnntht.exe94⤵PID:1832
-
\??\c:\7pvvj.exec:\7pvvj.exe95⤵PID:3376
-
\??\c:\rllfrxr.exec:\rllfrxr.exe96⤵PID:1032
-
\??\c:\rrrxllf.exec:\rrrxllf.exe97⤵PID:3944
-
\??\c:\bhnhbt.exec:\bhnhbt.exe98⤵PID:4708
-
\??\c:\dvvjd.exec:\dvvjd.exe99⤵PID:2368
-
\??\c:\1vddv.exec:\1vddv.exe100⤵PID:3704
-
\??\c:\3ffxrrl.exec:\3ffxrrl.exe101⤵PID:4572
-
\??\c:\rlfxxxx.exec:\rlfxxxx.exe102⤵PID:4576
-
\??\c:\hbbbhh.exec:\hbbbhh.exe103⤵PID:2968
-
\??\c:\jjjdd.exec:\jjjdd.exe104⤵PID:60
-
\??\c:\pjjpj.exec:\pjjpj.exe105⤵PID:3584
-
\??\c:\frxxrrr.exec:\frxxrrr.exe106⤵PID:1688
-
\??\c:\5tbtbb.exec:\5tbtbb.exe107⤵PID:1852
-
\??\c:\pjjvd.exec:\pjjvd.exe108⤵PID:4372
-
\??\c:\vppjd.exec:\vppjd.exe109⤵PID:4296
-
\??\c:\frxrlfx.exec:\frxrlfx.exe110⤵PID:3460
-
\??\c:\9nhttb.exec:\9nhttb.exe111⤵PID:2240
-
\??\c:\tbnnnt.exec:\tbnnnt.exe112⤵PID:1360
-
\??\c:\pjppj.exec:\pjppj.exe113⤵PID:3780
-
\??\c:\3rxxrfx.exec:\3rxxrfx.exe114⤵PID:4456
-
\??\c:\9ntthh.exec:\9ntthh.exe115⤵
- System Location Discovery: System Language Discovery
PID:4952 -
\??\c:\bhnbtn.exec:\bhnbtn.exe116⤵PID:4820
-
\??\c:\djddd.exec:\djddd.exe117⤵PID:2792
-
\??\c:\ppvdv.exec:\ppvdv.exe118⤵PID:2676
-
\??\c:\xffffll.exec:\xffffll.exe119⤵PID:2804
-
\??\c:\thbtnh.exec:\thbtnh.exe120⤵PID:4396
-
\??\c:\hhtnbb.exec:\hhtnbb.exe121⤵PID:4044
-
\??\c:\vvvpj.exec:\vvvpj.exe122⤵PID:3580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-