Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 00:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a44ca23e6c32e757a8af9f62724c82e0N.exe
Resource
win7-20240729-en
6 signatures
120 seconds
General
-
Target
a44ca23e6c32e757a8af9f62724c82e0N.exe
-
Size
82KB
-
MD5
a44ca23e6c32e757a8af9f62724c82e0
-
SHA1
8e0d4426e69ca6586ec08d62b9df2a4c3c38599d
-
SHA256
16de9be2dd30e941db7dbcab10a105cb4eae972b9547dc6130b8e3ce0ae9ed12
-
SHA512
1b2ebb464d5269e48d2593234f6c32c8aef37afc1654ecee9f28e39712294e47e0c9cce204e53013dab85384aaecdeae07f394ab30d3551ebc23318007edd59a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo7xCkTsIwtOa2dYSePfg:ymb3NkkiQ3mdBjFo7LAIbTePfg
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/4704-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1360-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3856-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5024-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/632-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3632-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4208-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2904-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/116-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/116-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4284-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4356-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4232-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2124-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1312-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2836-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2336-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3180-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4292-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1668-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2232-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1360 lxlffff.exe 3856 hhbbbb.exe 3432 ddddd.exe 5024 ppvdp.exe 632 tbhbtt.exe 3632 9dpvj.exe 4208 1xlfrrl.exe 2904 xrlllff.exe 1336 tnhnhn.exe 116 3djjj.exe 4284 lflrrxr.exe 4356 xlrrllf.exe 4232 hnttnn.exe 2124 ppjjd.exe 1312 3frlffx.exe 2836 flrrlll.exe 2336 nbnhnh.exe 5084 ntnhnh.exe 3180 jjjjd.exe 4900 3rxrlrl.exe 4528 rxffxxf.exe 4292 1bhbhn.exe 376 dpvpd.exe 1668 rlxrrrl.exe 1400 bnhbhh.exe 4876 nbnhbt.exe 844 dvpjp.exe 2232 fllfxrl.exe 4224 lfxxxxr.exe 3964 nhtthh.exe 2428 dpvpj.exe 3508 5frrxxf.exe 3116 xrfxxxf.exe 2312 tbbtnh.exe 2128 dvvvj.exe 2044 fflrlrr.exe 4436 3rxxxxf.exe 3656 httbbt.exe 1020 7thbtb.exe 4704 rxlrxlf.exe 4424 1rlllll.exe 4872 bbbttt.exe 4508 pjjjj.exe 3552 xrrllff.exe 3920 lrxrrrl.exe 2200 tbhhhh.exe 1572 nnbthn.exe 2460 vvdvv.exe 2292 xrlxrrl.exe 4208 fxrfxfx.exe 100 btnhhb.exe 2384 5nhbnn.exe 4252 pjpjd.exe 2972 vpjdv.exe 3448 llllxxx.exe 320 frlfxfl.exe 2468 ttnhbb.exe 4232 btnhtt.exe 2964 jvdvv.exe 4848 7vvvj.exe 4324 rxrrlrr.exe 992 ffxllll.exe 2864 bnbnth.exe 4712 ttbttt.exe -
resource yara_rule behavioral2/memory/4704-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1360-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3856-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3856-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5024-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/632-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4208-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2904-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/116-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/116-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/116-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/116-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4356-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4232-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2124-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1312-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2836-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2336-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3180-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4292-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1668-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2232-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xxrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xffxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3llfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 1360 4704 a44ca23e6c32e757a8af9f62724c82e0N.exe 83 PID 4704 wrote to memory of 1360 4704 a44ca23e6c32e757a8af9f62724c82e0N.exe 83 PID 4704 wrote to memory of 1360 4704 a44ca23e6c32e757a8af9f62724c82e0N.exe 83 PID 1360 wrote to memory of 3856 1360 lxlffff.exe 84 PID 1360 wrote to memory of 3856 1360 lxlffff.exe 84 PID 1360 wrote to memory of 3856 1360 lxlffff.exe 84 PID 3856 wrote to memory of 3432 3856 hhbbbb.exe 85 PID 3856 wrote to memory of 3432 3856 hhbbbb.exe 85 PID 3856 wrote to memory of 3432 3856 hhbbbb.exe 85 PID 3432 wrote to memory of 5024 3432 ddddd.exe 86 PID 3432 wrote to memory of 5024 3432 ddddd.exe 86 PID 3432 wrote to memory of 5024 3432 ddddd.exe 86 PID 5024 wrote to memory of 632 5024 ppvdp.exe 87 PID 5024 wrote to memory of 632 5024 ppvdp.exe 87 PID 5024 wrote to memory of 632 5024 ppvdp.exe 87 PID 632 wrote to memory of 3632 632 tbhbtt.exe 88 PID 632 wrote to memory of 3632 632 tbhbtt.exe 88 PID 632 wrote to memory of 3632 632 tbhbtt.exe 88 PID 3632 wrote to memory of 4208 3632 9dpvj.exe 89 PID 3632 wrote to memory of 4208 3632 9dpvj.exe 89 PID 3632 wrote to memory of 4208 3632 9dpvj.exe 89 PID 4208 wrote to memory of 2904 4208 1xlfrrl.exe 90 PID 4208 wrote to memory of 2904 4208 1xlfrrl.exe 90 PID 4208 wrote to memory of 2904 4208 1xlfrrl.exe 90 PID 2904 wrote to memory of 1336 2904 xrlllff.exe 91 PID 2904 wrote to memory of 1336 2904 xrlllff.exe 91 PID 2904 wrote to memory of 1336 2904 xrlllff.exe 91 PID 1336 wrote to memory of 116 1336 tnhnhn.exe 93 PID 1336 wrote to memory of 116 1336 tnhnhn.exe 93 PID 1336 wrote to memory of 116 1336 tnhnhn.exe 93 PID 116 wrote to memory of 4284 116 3djjj.exe 94 PID 116 wrote to memory of 4284 116 3djjj.exe 94 PID 116 wrote to memory of 4284 116 3djjj.exe 94 PID 4284 wrote to memory of 4356 4284 lflrrxr.exe 95 PID 4284 wrote to memory of 4356 4284 lflrrxr.exe 95 PID 4284 wrote to memory of 4356 4284 lflrrxr.exe 95 PID 4356 wrote to memory of 4232 4356 xlrrllf.exe 96 PID 4356 wrote to memory of 4232 4356 xlrrllf.exe 96 PID 4356 wrote to memory of 4232 4356 xlrrllf.exe 96 PID 4232 wrote to memory of 2124 4232 hnttnn.exe 97 PID 4232 wrote to memory of 2124 4232 hnttnn.exe 97 PID 4232 wrote to memory of 2124 4232 hnttnn.exe 97 PID 2124 wrote to memory of 1312 2124 ppjjd.exe 98 PID 2124 wrote to memory of 1312 2124 ppjjd.exe 98 PID 2124 wrote to memory of 1312 2124 ppjjd.exe 98 PID 1312 wrote to memory of 2836 1312 3frlffx.exe 99 PID 1312 wrote to memory of 2836 1312 3frlffx.exe 99 PID 1312 wrote to memory of 2836 1312 3frlffx.exe 99 PID 2836 wrote to memory of 2336 2836 flrrlll.exe 101 PID 2836 wrote to memory of 2336 2836 flrrlll.exe 101 PID 2836 wrote to memory of 2336 2836 flrrlll.exe 101 PID 2336 wrote to memory of 5084 2336 nbnhnh.exe 102 PID 2336 wrote to memory of 5084 2336 nbnhnh.exe 102 PID 2336 wrote to memory of 5084 2336 nbnhnh.exe 102 PID 5084 wrote to memory of 3180 5084 ntnhnh.exe 103 PID 5084 wrote to memory of 3180 5084 ntnhnh.exe 103 PID 5084 wrote to memory of 3180 5084 ntnhnh.exe 103 PID 3180 wrote to memory of 4900 3180 jjjjd.exe 104 PID 3180 wrote to memory of 4900 3180 jjjjd.exe 104 PID 3180 wrote to memory of 4900 3180 jjjjd.exe 104 PID 4900 wrote to memory of 4528 4900 3rxrlrl.exe 105 PID 4900 wrote to memory of 4528 4900 3rxrlrl.exe 105 PID 4900 wrote to memory of 4528 4900 3rxrlrl.exe 105 PID 4528 wrote to memory of 4292 4528 rxffxxf.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a44ca23e6c32e757a8af9f62724c82e0N.exe"C:\Users\Admin\AppData\Local\Temp\a44ca23e6c32e757a8af9f62724c82e0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\lxlffff.exec:\lxlffff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
\??\c:\hhbbbb.exec:\hhbbbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\ddddd.exec:\ddddd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
\??\c:\ppvdp.exec:\ppvdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\tbhbtt.exec:\tbhbtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\9dpvj.exec:\9dpvj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\1xlfrrl.exec:\1xlfrrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\xrlllff.exec:\xrlllff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\tnhnhn.exec:\tnhnhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\3djjj.exec:\3djjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\lflrrxr.exec:\lflrrxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\xlrrllf.exec:\xlrrllf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\hnttnn.exec:\hnttnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
\??\c:\ppjjd.exec:\ppjjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\3frlffx.exec:\3frlffx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\flrrlll.exec:\flrrlll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\nbnhnh.exec:\nbnhnh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\ntnhnh.exec:\ntnhnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\jjjjd.exec:\jjjjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180 -
\??\c:\3rxrlrl.exec:\3rxrlrl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\rxffxxf.exec:\rxffxxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\1bhbhn.exec:\1bhbhn.exe23⤵
- Executes dropped EXE
PID:4292 -
\??\c:\dpvpd.exec:\dpvpd.exe24⤵
- Executes dropped EXE
PID:376 -
\??\c:\rlxrrrl.exec:\rlxrrrl.exe25⤵
- Executes dropped EXE
PID:1668 -
\??\c:\bnhbhh.exec:\bnhbhh.exe26⤵
- Executes dropped EXE
PID:1400 -
\??\c:\nbnhbt.exec:\nbnhbt.exe27⤵
- Executes dropped EXE
PID:4876 -
\??\c:\dvpjp.exec:\dvpjp.exe28⤵
- Executes dropped EXE
PID:844 -
\??\c:\fllfxrl.exec:\fllfxrl.exe29⤵
- Executes dropped EXE
PID:2232 -
\??\c:\lfxxxxr.exec:\lfxxxxr.exe30⤵
- Executes dropped EXE
PID:4224 -
\??\c:\nhtthh.exec:\nhtthh.exe31⤵
- Executes dropped EXE
PID:3964 -
\??\c:\dpvpj.exec:\dpvpj.exe32⤵
- Executes dropped EXE
PID:2428 -
\??\c:\5frrxxf.exec:\5frrxxf.exe33⤵
- Executes dropped EXE
PID:3508 -
\??\c:\xrfxxxf.exec:\xrfxxxf.exe34⤵
- Executes dropped EXE
PID:3116 -
\??\c:\tbbtnh.exec:\tbbtnh.exe35⤵
- Executes dropped EXE
PID:2312 -
\??\c:\dvvvj.exec:\dvvvj.exe36⤵
- Executes dropped EXE
PID:2128 -
\??\c:\fflrlrr.exec:\fflrlrr.exe37⤵
- Executes dropped EXE
PID:2044 -
\??\c:\3rxxxxf.exec:\3rxxxxf.exe38⤵
- Executes dropped EXE
PID:4436 -
\??\c:\httbbt.exec:\httbbt.exe39⤵
- Executes dropped EXE
PID:3656 -
\??\c:\7thbtb.exec:\7thbtb.exe40⤵
- Executes dropped EXE
PID:1020 -
\??\c:\vdjdv.exec:\vdjdv.exe41⤵PID:1788
-
\??\c:\rxlrxlf.exec:\rxlrxlf.exe42⤵
- Executes dropped EXE
PID:4704 -
\??\c:\1rlllll.exec:\1rlllll.exe43⤵
- Executes dropped EXE
PID:4424 -
\??\c:\bbbttt.exec:\bbbttt.exe44⤵
- Executes dropped EXE
PID:4872 -
\??\c:\pjjjj.exec:\pjjjj.exe45⤵
- Executes dropped EXE
PID:4508 -
\??\c:\xrrllff.exec:\xrrllff.exe46⤵
- Executes dropped EXE
PID:3552 -
\??\c:\lrxrrrl.exec:\lrxrrrl.exe47⤵
- Executes dropped EXE
PID:3920 -
\??\c:\tbhhhh.exec:\tbhhhh.exe48⤵
- Executes dropped EXE
PID:2200 -
\??\c:\nnbthn.exec:\nnbthn.exe49⤵
- Executes dropped EXE
PID:1572 -
\??\c:\vvdvv.exec:\vvdvv.exe50⤵
- Executes dropped EXE
PID:2460 -
\??\c:\xrlxrrl.exec:\xrlxrrl.exe51⤵
- Executes dropped EXE
PID:2292 -
\??\c:\fxrfxfx.exec:\fxrfxfx.exe52⤵
- Executes dropped EXE
PID:4208 -
\??\c:\btnhhb.exec:\btnhhb.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:100 -
\??\c:\5nhbnn.exec:\5nhbnn.exe54⤵
- Executes dropped EXE
PID:2384 -
\??\c:\pjpjd.exec:\pjpjd.exe55⤵
- Executes dropped EXE
PID:4252 -
\??\c:\vpjdv.exec:\vpjdv.exe56⤵
- Executes dropped EXE
PID:2972 -
\??\c:\llllxxx.exec:\llllxxx.exe57⤵
- Executes dropped EXE
PID:3448 -
\??\c:\frlfxfl.exec:\frlfxfl.exe58⤵
- Executes dropped EXE
PID:320 -
\??\c:\ttnhbb.exec:\ttnhbb.exe59⤵
- Executes dropped EXE
PID:2468 -
\??\c:\btnhtt.exec:\btnhtt.exe60⤵
- Executes dropped EXE
PID:4232 -
\??\c:\jvdvv.exec:\jvdvv.exe61⤵
- Executes dropped EXE
PID:2964 -
\??\c:\7vvvj.exec:\7vvvj.exe62⤵
- Executes dropped EXE
PID:4848 -
\??\c:\rxrrlrr.exec:\rxrrlrr.exe63⤵
- Executes dropped EXE
PID:4324 -
\??\c:\ffxllll.exec:\ffxllll.exe64⤵
- Executes dropped EXE
PID:992 -
\??\c:\bnbnth.exec:\bnbnth.exe65⤵
- Executes dropped EXE
PID:2864 -
\??\c:\ttbttt.exec:\ttbttt.exe66⤵
- Executes dropped EXE
PID:4712 -
\??\c:\pvjpd.exec:\pvjpd.exe67⤵PID:5084
-
\??\c:\xxlllrr.exec:\xxlllrr.exe68⤵PID:5020
-
\??\c:\rxxrxxl.exec:\rxxrxxl.exe69⤵PID:1452
-
\??\c:\nnbbbh.exec:\nnbbbh.exe70⤵PID:812
-
\??\c:\ntnnhb.exec:\ntnnhb.exe71⤵PID:3780
-
\??\c:\dpvjv.exec:\dpvjv.exe72⤵PID:4440
-
\??\c:\ffrlfxf.exec:\ffrlfxf.exe73⤵PID:4968
-
\??\c:\1thbbb.exec:\1thbbb.exe74⤵PID:3324
-
\??\c:\tbnhbh.exec:\tbnhbh.exe75⤵PID:3344
-
\??\c:\5jpvj.exec:\5jpvj.exe76⤵PID:2000
-
\??\c:\pvppp.exec:\pvppp.exe77⤵PID:2532
-
\??\c:\fllfllf.exec:\fllfllf.exe78⤵PID:4876
-
\??\c:\hthhbh.exec:\hthhbh.exe79⤵PID:2544
-
\??\c:\ntbttn.exec:\ntbttn.exe80⤵PID:844
-
\??\c:\9ddvv.exec:\9ddvv.exe81⤵PID:2232
-
\??\c:\pvpdd.exec:\pvpdd.exe82⤵PID:4224
-
\??\c:\frfffxr.exec:\frfffxr.exe83⤵PID:1204
-
\??\c:\7nhhbh.exec:\7nhhbh.exe84⤵PID:2692
-
\??\c:\thtnbb.exec:\thtnbb.exe85⤵PID:4532
-
\??\c:\bbnhnh.exec:\bbnhnh.exe86⤵PID:2564
-
\??\c:\ppdvv.exec:\ppdvv.exe87⤵PID:3356
-
\??\c:\vdvdd.exec:\vdvdd.exe88⤵PID:3276
-
\??\c:\lllfxff.exec:\lllfxff.exe89⤵PID:3828
-
\??\c:\tbhhnb.exec:\tbhhnb.exe90⤵PID:2660
-
\??\c:\jvppj.exec:\jvppj.exe91⤵PID:3840
-
\??\c:\5ppjd.exec:\5ppjd.exe92⤵PID:4316
-
\??\c:\1fxrxrl.exec:\1fxrxrl.exe93⤵PID:2900
-
\??\c:\1lrlxxf.exec:\1lrlxxf.exe94⤵PID:2668
-
\??\c:\xxxxlll.exec:\xxxxlll.exe95⤵PID:684
-
\??\c:\1hnnhh.exec:\1hnnhh.exe96⤵PID:1088
-
\??\c:\9bhbbh.exec:\9bhbbh.exe97⤵PID:5032
-
\??\c:\vvjjj.exec:\vvjjj.exe98⤵PID:212
-
\??\c:\rxlxfrl.exec:\rxlxfrl.exe99⤵PID:5008
-
\??\c:\7rrrllf.exec:\7rrrllf.exe100⤵PID:4228
-
\??\c:\lllllll.exec:\lllllll.exe101⤵PID:4052
-
\??\c:\3bhttt.exec:\3bhttt.exe102⤵PID:2720
-
\??\c:\jjpjp.exec:\jjpjp.exe103⤵PID:4868
-
\??\c:\pppvp.exec:\pppvp.exe104⤵PID:1828
-
\??\c:\xffrrrx.exec:\xffrrrx.exe105⤵PID:3988
-
\??\c:\xlfxxrr.exec:\xlfxxrr.exe106⤵PID:4604
-
\??\c:\nbtnhh.exec:\nbtnhh.exe107⤵PID:2812
-
\??\c:\bbhhtt.exec:\bbhhtt.exe108⤵PID:116
-
\??\c:\vppjv.exec:\vppjv.exe109⤵PID:3172
-
\??\c:\jdppd.exec:\jdppd.exe110⤵PID:960
-
\??\c:\xrxflrf.exec:\xrxflrf.exe111⤵PID:1528
-
\??\c:\rlxxlrf.exec:\rlxxlrf.exe112⤵PID:516
-
\??\c:\5ntntt.exec:\5ntntt.exe113⤵PID:5036
-
\??\c:\bhnnnn.exec:\bhnnnn.exe114⤵PID:3120
-
\??\c:\dppdp.exec:\dppdp.exe115⤵PID:3956
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe116⤵PID:3520
-
\??\c:\xllffff.exec:\xllffff.exe117⤵PID:3512
-
\??\c:\hhhttn.exec:\hhhttn.exe118⤵PID:1932
-
\??\c:\ppjjd.exec:\ppjjd.exe119⤵PID:820
-
\??\c:\jppjv.exec:\jppjv.exe120⤵PID:940
-
\??\c:\fffxxll.exec:\fffxxll.exe121⤵PID:4524
-
\??\c:\lfrrrxr.exec:\lfrrrxr.exe122⤵PID:4528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-