Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 23:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe
-
Size
70KB
-
MD5
7988471efb6939dc418a0936e3fccd38
-
SHA1
2d85a18e650fe503902fefc8c471b9e3e9919c9a
-
SHA256
7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd
-
SHA512
a7aa4b70552b993500c9b67a0bfc6b4c7c00cef8876b9e97cae84032cca2be3931008c61b01dd4225206507d9884f2fb3676ec134d65e1466fb0e39a402536f5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjK:ymb3NkkiQ3mdBjFI4V6
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/4912-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2436-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1440-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3092-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4084-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2184-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2160-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3576-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1904-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4056-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1956-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1168-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1404-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/364-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2624-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1572-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3408 5bbttt.exe 2436 pjdvd.exe 2184 rllfxxx.exe 1440 hhbtnn.exe 4084 htbbtt.exe 928 1pvpj.exe 3092 rrlfxrr.exe 4424 lrfxlrr.exe 2160 5rffxff.exe 4676 hhnhnn.exe 3576 lxlxxff.exe 2936 frxxrxr.exe 1904 ntbhbt.exe 464 pvdvp.exe 4056 1ppjj.exe 1956 lxxrfxf.exe 4004 nbnnbt.exe 1168 pdjdv.exe 1404 lxfxxrr.exe 364 ttnnhh.exe 3644 tbbnbb.exe 3464 ddvjd.exe 1736 xrxrllf.exe 2280 bbbbtt.exe 2624 5htnnn.exe 3044 vjvpp.exe 5084 xrffxff.exe 4924 htbttb.exe 3000 htttth.exe 1572 vddjj.exe 4920 pjjjj.exe 4284 ffxlllr.exe 1760 htnhbt.exe 1696 nhbbbt.exe 3816 7dpjp.exe 4008 rxrrrrl.exe 3440 xxlfxxl.exe 3152 hnnnhh.exe 4600 pjjjj.exe 3088 jjdvp.exe 4344 vpdpj.exe 4912 fxxxxff.exe 3996 btttnt.exe 5008 nttnnt.exe 2068 pjvpp.exe 2184 ppvpp.exe 1004 1frrffx.exe 4300 xrxxxxr.exe 1280 9nbbbh.exe 2132 thhnnn.exe 640 jdddd.exe 1324 vdpdd.exe 2916 fxrlfff.exe 740 xrrrrrx.exe 1756 hntttt.exe 1372 hnnttn.exe 4432 ppdvp.exe 5000 vvvvp.exe 2556 3xfxrrr.exe 3916 xrffxfx.exe 3764 1bhhnn.exe 876 hbbhbb.exe 4056 vjvpj.exe 1124 1jdjj.exe -
resource yara_rule behavioral2/memory/4912-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2436-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2436-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3092-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4084-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2160-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2160-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3576-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2936-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1904-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/464-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1956-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1404-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/364-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2624-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1572-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llllxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3408 4912 7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe 83 PID 4912 wrote to memory of 3408 4912 7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe 83 PID 4912 wrote to memory of 3408 4912 7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe 83 PID 3408 wrote to memory of 2436 3408 5bbttt.exe 84 PID 3408 wrote to memory of 2436 3408 5bbttt.exe 84 PID 3408 wrote to memory of 2436 3408 5bbttt.exe 84 PID 2436 wrote to memory of 2184 2436 pjdvd.exe 85 PID 2436 wrote to memory of 2184 2436 pjdvd.exe 85 PID 2436 wrote to memory of 2184 2436 pjdvd.exe 85 PID 2184 wrote to memory of 1440 2184 rllfxxx.exe 86 PID 2184 wrote to memory of 1440 2184 rllfxxx.exe 86 PID 2184 wrote to memory of 1440 2184 rllfxxx.exe 86 PID 1440 wrote to memory of 4084 1440 hhbtnn.exe 87 PID 1440 wrote to memory of 4084 1440 hhbtnn.exe 87 PID 1440 wrote to memory of 4084 1440 hhbtnn.exe 87 PID 4084 wrote to memory of 928 4084 htbbtt.exe 88 PID 4084 wrote to memory of 928 4084 htbbtt.exe 88 PID 4084 wrote to memory of 928 4084 htbbtt.exe 88 PID 928 wrote to memory of 3092 928 1pvpj.exe 89 PID 928 wrote to memory of 3092 928 1pvpj.exe 89 PID 928 wrote to memory of 3092 928 1pvpj.exe 89 PID 3092 wrote to memory of 4424 3092 rrlfxrr.exe 90 PID 3092 wrote to memory of 4424 3092 rrlfxrr.exe 90 PID 3092 wrote to memory of 4424 3092 rrlfxrr.exe 90 PID 4424 wrote to memory of 2160 4424 lrfxlrr.exe 91 PID 4424 wrote to memory of 2160 4424 lrfxlrr.exe 91 PID 4424 wrote to memory of 2160 4424 lrfxlrr.exe 91 PID 2160 wrote to memory of 4676 2160 5rffxff.exe 92 PID 2160 wrote to memory of 4676 2160 5rffxff.exe 92 PID 2160 wrote to memory of 4676 2160 5rffxff.exe 92 PID 4676 wrote to memory of 3576 4676 hhnhnn.exe 93 PID 4676 wrote to memory of 3576 4676 hhnhnn.exe 93 PID 4676 wrote to memory of 3576 4676 hhnhnn.exe 93 PID 3576 wrote to memory of 2936 3576 lxlxxff.exe 94 PID 3576 wrote to memory of 2936 3576 lxlxxff.exe 94 PID 3576 wrote to memory of 2936 3576 lxlxxff.exe 94 PID 2936 wrote to memory of 1904 2936 frxxrxr.exe 96 PID 2936 wrote to memory of 1904 2936 frxxrxr.exe 96 PID 2936 wrote to memory of 1904 2936 frxxrxr.exe 96 PID 1904 wrote to memory of 464 1904 ntbhbt.exe 97 PID 1904 wrote to memory of 464 1904 ntbhbt.exe 97 PID 1904 wrote to memory of 464 1904 ntbhbt.exe 97 PID 464 wrote to memory of 4056 464 pvdvp.exe 98 PID 464 wrote to memory of 4056 464 pvdvp.exe 98 PID 464 wrote to memory of 4056 464 pvdvp.exe 98 PID 4056 wrote to memory of 1956 4056 1ppjj.exe 99 PID 4056 wrote to memory of 1956 4056 1ppjj.exe 99 PID 4056 wrote to memory of 1956 4056 1ppjj.exe 99 PID 1956 wrote to memory of 4004 1956 lxxrfxf.exe 100 PID 1956 wrote to memory of 4004 1956 lxxrfxf.exe 100 PID 1956 wrote to memory of 4004 1956 lxxrfxf.exe 100 PID 4004 wrote to memory of 1168 4004 nbnnbt.exe 101 PID 4004 wrote to memory of 1168 4004 nbnnbt.exe 101 PID 4004 wrote to memory of 1168 4004 nbnnbt.exe 101 PID 1168 wrote to memory of 1404 1168 pdjdv.exe 102 PID 1168 wrote to memory of 1404 1168 pdjdv.exe 102 PID 1168 wrote to memory of 1404 1168 pdjdv.exe 102 PID 1404 wrote to memory of 364 1404 lxfxxrr.exe 104 PID 1404 wrote to memory of 364 1404 lxfxxrr.exe 104 PID 1404 wrote to memory of 364 1404 lxfxxrr.exe 104 PID 364 wrote to memory of 3644 364 ttnnhh.exe 105 PID 364 wrote to memory of 3644 364 ttnnhh.exe 105 PID 364 wrote to memory of 3644 364 ttnnhh.exe 105 PID 3644 wrote to memory of 3464 3644 tbbnbb.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe"C:\Users\Admin\AppData\Local\Temp\7db85bc4464e8c014f5e01ffb26c7e28f53f6e7a242138e8531ca6e7bf2a91bd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\5bbttt.exec:\5bbttt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\pjdvd.exec:\pjdvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\rllfxxx.exec:\rllfxxx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\hhbtnn.exec:\hhbtnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\htbbtt.exec:\htbbtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\1pvpj.exec:\1pvpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\rrlfxrr.exec:\rrlfxrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\lrfxlrr.exec:\lrfxlrr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\5rffxff.exec:\5rffxff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\hhnhnn.exec:\hhnhnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\lxlxxff.exec:\lxlxxff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\frxxrxr.exec:\frxxrxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\ntbhbt.exec:\ntbhbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\pvdvp.exec:\pvdvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\1ppjj.exec:\1ppjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\lxxrfxf.exec:\lxxrfxf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\nbnnbt.exec:\nbnnbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\pdjdv.exec:\pdjdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\lxfxxrr.exec:\lxfxxrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\ttnnhh.exec:\ttnnhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
\??\c:\tbbnbb.exec:\tbbnbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
\??\c:\ddvjd.exec:\ddvjd.exe23⤵
- Executes dropped EXE
PID:3464 -
\??\c:\xrxrllf.exec:\xrxrllf.exe24⤵
- Executes dropped EXE
PID:1736 -
\??\c:\bbbbtt.exec:\bbbbtt.exe25⤵
- Executes dropped EXE
PID:2280 -
\??\c:\5htnnn.exec:\5htnnn.exe26⤵
- Executes dropped EXE
PID:2624 -
\??\c:\vjvpp.exec:\vjvpp.exe27⤵
- Executes dropped EXE
PID:3044 -
\??\c:\xrffxff.exec:\xrffxff.exe28⤵
- Executes dropped EXE
PID:5084 -
\??\c:\htbttb.exec:\htbttb.exe29⤵
- Executes dropped EXE
PID:4924 -
\??\c:\htttth.exec:\htttth.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
\??\c:\vddjj.exec:\vddjj.exe31⤵
- Executes dropped EXE
PID:1572 -
\??\c:\pjjjj.exec:\pjjjj.exe32⤵
- Executes dropped EXE
PID:4920 -
\??\c:\ffxlllr.exec:\ffxlllr.exe33⤵
- Executes dropped EXE
PID:4284 -
\??\c:\htnhbt.exec:\htnhbt.exe34⤵
- Executes dropped EXE
PID:1760 -
\??\c:\nhbbbt.exec:\nhbbbt.exe35⤵
- Executes dropped EXE
PID:1696 -
\??\c:\7dpjp.exec:\7dpjp.exe36⤵
- Executes dropped EXE
PID:3816 -
\??\c:\rxrrrrl.exec:\rxrrrrl.exe37⤵
- Executes dropped EXE
PID:4008 -
\??\c:\xxlfxxl.exec:\xxlfxxl.exe38⤵
- Executes dropped EXE
PID:3440 -
\??\c:\hnnnhh.exec:\hnnnhh.exe39⤵
- Executes dropped EXE
PID:3152 -
\??\c:\pjjjj.exec:\pjjjj.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600 -
\??\c:\jjdvp.exec:\jjdvp.exe41⤵
- Executes dropped EXE
PID:3088 -
\??\c:\vpdpj.exec:\vpdpj.exe42⤵
- Executes dropped EXE
PID:4344 -
\??\c:\fxxxxff.exec:\fxxxxff.exe43⤵
- Executes dropped EXE
PID:4912 -
\??\c:\btttnt.exec:\btttnt.exe44⤵
- Executes dropped EXE
PID:3996 -
\??\c:\nttnnt.exec:\nttnnt.exe45⤵
- Executes dropped EXE
PID:5008 -
\??\c:\pjvpp.exec:\pjvpp.exe46⤵
- Executes dropped EXE
PID:2068 -
\??\c:\ppvpp.exec:\ppvpp.exe47⤵
- Executes dropped EXE
PID:2184 -
\??\c:\1frrffx.exec:\1frrffx.exe48⤵
- Executes dropped EXE
PID:1004 -
\??\c:\xrxxxxr.exec:\xrxxxxr.exe49⤵
- Executes dropped EXE
PID:4300 -
\??\c:\9nbbbh.exec:\9nbbbh.exe50⤵
- Executes dropped EXE
PID:1280 -
\??\c:\thhnnn.exec:\thhnnn.exe51⤵
- Executes dropped EXE
PID:2132 -
\??\c:\jdddd.exec:\jdddd.exe52⤵
- Executes dropped EXE
PID:640 -
\??\c:\vdpdd.exec:\vdpdd.exe53⤵
- Executes dropped EXE
PID:1324 -
\??\c:\fxrlfff.exec:\fxrlfff.exe54⤵
- Executes dropped EXE
PID:2916 -
\??\c:\xrrrrrx.exec:\xrrrrrx.exe55⤵
- Executes dropped EXE
PID:740 -
\??\c:\hntttt.exec:\hntttt.exe56⤵
- Executes dropped EXE
PID:1756 -
\??\c:\hnnttn.exec:\hnnttn.exe57⤵
- Executes dropped EXE
PID:1372 -
\??\c:\ppdvp.exec:\ppdvp.exe58⤵
- Executes dropped EXE
PID:4432 -
\??\c:\vvvvp.exec:\vvvvp.exe59⤵
- Executes dropped EXE
PID:5000 -
\??\c:\3xfxrrr.exec:\3xfxrrr.exe60⤵
- Executes dropped EXE
PID:2556 -
\??\c:\xrffxfx.exec:\xrffxfx.exe61⤵
- Executes dropped EXE
PID:3916 -
\??\c:\1bhhnn.exec:\1bhhnn.exe62⤵
- Executes dropped EXE
PID:3764 -
\??\c:\hbbhbb.exec:\hbbhbb.exe63⤵
- Executes dropped EXE
PID:876 -
\??\c:\vjvpj.exec:\vjvpj.exe64⤵
- Executes dropped EXE
PID:4056 -
\??\c:\1jdjj.exec:\1jdjj.exe65⤵
- Executes dropped EXE
PID:1124 -
\??\c:\rlrrrxr.exec:\rlrrrxr.exe66⤵PID:1776
-
\??\c:\xxrxxff.exec:\xxrxxff.exe67⤵PID:3448
-
\??\c:\nbbhhh.exec:\nbbhhh.exe68⤵PID:1092
-
\??\c:\htttnn.exec:\htttnn.exe69⤵PID:3732
-
\??\c:\5pvvp.exec:\5pvvp.exe70⤵PID:4224
-
\??\c:\lrfxffr.exec:\lrfxffr.exe71⤵PID:4524
-
\??\c:\7nbthn.exec:\7nbthn.exe72⤵PID:552
-
\??\c:\nnhhhh.exec:\nnhhhh.exe73⤵PID:5088
-
\??\c:\tbtnnt.exec:\tbtnnt.exe74⤵PID:3836
-
\??\c:\vvdvv.exec:\vvdvv.exe75⤵PID:3688
-
\??\c:\dpvpv.exec:\dpvpv.exe76⤵PID:4160
-
\??\c:\frxrflf.exec:\frxrflf.exe77⤵PID:936
-
\??\c:\lffflll.exec:\lffflll.exe78⤵PID:4968
-
\??\c:\7hbhbh.exec:\7hbhbh.exe79⤵PID:3248
-
\??\c:\5bbtnn.exec:\5bbtnn.exe80⤵PID:4312
-
\??\c:\jjvvd.exec:\jjvvd.exe81⤵PID:428
-
\??\c:\dppvv.exec:\dppvv.exe82⤵PID:3940
-
\??\c:\5frrxxr.exec:\5frrxxr.exe83⤵PID:2492
-
\??\c:\rllllll.exec:\rllllll.exe84⤵PID:2116
-
\??\c:\thnttt.exec:\thnttt.exe85⤵PID:1728
-
\??\c:\ttnhhb.exec:\ttnhhb.exe86⤵PID:4212
-
\??\c:\nhbbnt.exec:\nhbbnt.exe87⤵PID:4284
-
\??\c:\ddjjd.exec:\ddjjd.exe88⤵PID:4860
-
\??\c:\vpddd.exec:\vpddd.exe89⤵PID:2476
-
\??\c:\xrxxrxx.exec:\xrxxrxx.exe90⤵PID:3832
-
\??\c:\hhhhhh.exec:\hhhhhh.exe91⤵PID:4364
-
\??\c:\jddvp.exec:\jddvp.exe92⤵PID:1304
-
\??\c:\xrxxlrr.exec:\xrxxlrr.exe93⤵PID:3640
-
\??\c:\httbtt.exec:\httbtt.exe94⤵PID:4340
-
\??\c:\tnbbtb.exec:\tnbbtb.exe95⤵PID:4352
-
\??\c:\pvddv.exec:\pvddv.exe96⤵PID:3344
-
\??\c:\pppjj.exec:\pppjj.exe97⤵PID:1076
-
\??\c:\rlfxrrx.exec:\rlfxrrx.exe98⤵PID:3996
-
\??\c:\fxffxxr.exec:\fxffxxr.exe99⤵PID:1252
-
\??\c:\jppjd.exec:\jppjd.exe100⤵PID:1216
-
\??\c:\lfxlffx.exec:\lfxlffx.exe101⤵PID:3612
-
\??\c:\xlfrllf.exec:\xlfrllf.exe102⤵PID:4300
-
\??\c:\tnbnnn.exec:\tnbnnn.exe103⤵PID:4984
-
\??\c:\bnnhbb.exec:\bnnhbb.exe104⤵PID:4236
-
\??\c:\jjpvv.exec:\jjpvv.exe105⤵PID:4992
-
\??\c:\dpvpj.exec:\dpvpj.exe106⤵PID:5060
-
\??\c:\rxrxflf.exec:\rxrxflf.exe107⤵PID:1276
-
\??\c:\lxxxrrl.exec:\lxxxrrl.exe108⤵PID:740
-
\??\c:\hbhhbh.exec:\hbhhbh.exe109⤵PID:2700
-
\??\c:\nhbbbb.exec:\nhbbbb.exe110⤵PID:2348
-
\??\c:\dpppd.exec:\dpppd.exe111⤵PID:3592
-
\??\c:\7jjpp.exec:\7jjpp.exe112⤵PID:2560
-
\??\c:\llrrlrr.exec:\llrrlrr.exe113⤵PID:964
-
\??\c:\fxflxrx.exec:\fxflxrx.exe114⤵PID:3516
-
\??\c:\hbbtnn.exec:\hbbtnn.exe115⤵PID:2664
-
\??\c:\7vvdv.exec:\7vvdv.exe116⤵PID:3632
-
\??\c:\pdppp.exec:\pdppp.exe117⤵PID:3468
-
\??\c:\9frfffx.exec:\9frfffx.exe118⤵PID:4900
-
\??\c:\flxrrrr.exec:\flxrrrr.exe119⤵PID:1168
-
\??\c:\nthbnn.exec:\nthbnn.exe120⤵PID:4636
-
\??\c:\btnhnn.exec:\btnhnn.exe121⤵PID:2072
-
\??\c:\3pdjj.exec:\3pdjj.exe122⤵PID:3920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-