Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 20:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe
-
Size
64KB
-
MD5
b3507b8acd0b882e68cc1290e74357f2
-
SHA1
3dd44315942758c2510b2b77670a5009e37b15ad
-
SHA256
32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e
-
SHA512
4a337dfb8d6f6b509de5d2c2bc35ccec670faa232d459be68278f8f87e3230f85e18a8817f2ab7923b1aacfe24f7a57332723754149fcf2fd1186fe2700a9602
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27T:ymb3NkkiQ3mdBjFI9O
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/400-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3788-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2768-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3004-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4988-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3544-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3832-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2660-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/184-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4824-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3364-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5096-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2424-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3612-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2388-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1384-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4972-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/880-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3788 1pddj.exe 2768 lrxllxl.exe 1816 ntbtht.exe 3004 btnhtn.exe 4988 dpvdv.exe 3544 pdddd.exe 384 rflrrxl.exe 4180 flfxrfx.exe 4668 bhhbtt.exe 3832 ddvjj.exe 2660 ffrfrfx.exe 184 9hhthb.exe 4824 nbnbnb.exe 4432 jdpjd.exe 3364 flxllxf.exe 3052 llflfxr.exe 5096 tbbhnn.exe 4464 5hnhtn.exe 2424 5ppdp.exe 216 3fxlxrl.exe 3612 nhtntn.exe 4752 hnthbh.exe 3536 vjjdp.exe 2388 3xxrfxf.exe 4568 7ffrfxr.exe 1068 tntttn.exe 1620 dvdpp.exe 1384 lffxrlr.exe 2200 1xxrfxr.exe 4972 9hbtnh.exe 880 hnbbhb.exe 2880 5vvvp.exe 4292 rxrlxrl.exe 2624 7rxlrlr.exe 2056 tthbnh.exe 864 thtnbt.exe 2816 pdvdj.exe 2768 dpdpd.exe 1432 flfrfxr.exe 3048 frffxll.exe 4732 5flffff.exe 1956 7nhbnb.exe 1216 5nhthb.exe 888 9vpjd.exe 4400 ppppd.exe 1896 jvpdj.exe 4428 llfrlxr.exe 3664 rlrrrrl.exe 3992 5btbnh.exe 3656 tbnhtn.exe 1192 9vpjv.exe 4668 ddvjv.exe 2660 lrrfrll.exe 3284 9xrlxrx.exe 4824 tttthh.exe 3692 9bbtnn.exe 4176 nhhthb.exe 1528 vpppp.exe 1976 pdvpd.exe 1292 lxrfrll.exe 4740 fxxrrll.exe 4064 nttnbt.exe 5008 hnhhth.exe 4380 pvdpp.exe -
resource yara_rule behavioral2/memory/400-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3788-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3004-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3004-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3004-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4988-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/184-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4824-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3364-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5096-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2424-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3612-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2388-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1384-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4972-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/880-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lxfrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rlxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrfxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxllxrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 3788 400 32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe 83 PID 400 wrote to memory of 3788 400 32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe 83 PID 400 wrote to memory of 3788 400 32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe 83 PID 3788 wrote to memory of 2768 3788 1pddj.exe 84 PID 3788 wrote to memory of 2768 3788 1pddj.exe 84 PID 3788 wrote to memory of 2768 3788 1pddj.exe 84 PID 2768 wrote to memory of 1816 2768 lrxllxl.exe 85 PID 2768 wrote to memory of 1816 2768 lrxllxl.exe 85 PID 2768 wrote to memory of 1816 2768 lrxllxl.exe 85 PID 1816 wrote to memory of 3004 1816 ntbtht.exe 86 PID 1816 wrote to memory of 3004 1816 ntbtht.exe 86 PID 1816 wrote to memory of 3004 1816 ntbtht.exe 86 PID 3004 wrote to memory of 4988 3004 btnhtn.exe 87 PID 3004 wrote to memory of 4988 3004 btnhtn.exe 87 PID 3004 wrote to memory of 4988 3004 btnhtn.exe 87 PID 4988 wrote to memory of 3544 4988 dpvdv.exe 88 PID 4988 wrote to memory of 3544 4988 dpvdv.exe 88 PID 4988 wrote to memory of 3544 4988 dpvdv.exe 88 PID 3544 wrote to memory of 384 3544 pdddd.exe 89 PID 3544 wrote to memory of 384 3544 pdddd.exe 89 PID 3544 wrote to memory of 384 3544 pdddd.exe 89 PID 384 wrote to memory of 4180 384 rflrrxl.exe 90 PID 384 wrote to memory of 4180 384 rflrrxl.exe 90 PID 384 wrote to memory of 4180 384 rflrrxl.exe 90 PID 4180 wrote to memory of 4668 4180 flfxrfx.exe 91 PID 4180 wrote to memory of 4668 4180 flfxrfx.exe 91 PID 4180 wrote to memory of 4668 4180 flfxrfx.exe 91 PID 4668 wrote to memory of 3832 4668 bhhbtt.exe 92 PID 4668 wrote to memory of 3832 4668 bhhbtt.exe 92 PID 4668 wrote to memory of 3832 4668 bhhbtt.exe 92 PID 3832 wrote to memory of 2660 3832 ddvjj.exe 93 PID 3832 wrote to memory of 2660 3832 ddvjj.exe 93 PID 3832 wrote to memory of 2660 3832 ddvjj.exe 93 PID 2660 wrote to memory of 184 2660 ffrfrfx.exe 94 PID 2660 wrote to memory of 184 2660 ffrfrfx.exe 94 PID 2660 wrote to memory of 184 2660 ffrfrfx.exe 94 PID 184 wrote to memory of 4824 184 9hhthb.exe 95 PID 184 wrote to memory of 4824 184 9hhthb.exe 95 PID 184 wrote to memory of 4824 184 9hhthb.exe 95 PID 4824 wrote to memory of 4432 4824 nbnbnb.exe 96 PID 4824 wrote to memory of 4432 4824 nbnbnb.exe 96 PID 4824 wrote to memory of 4432 4824 nbnbnb.exe 96 PID 4432 wrote to memory of 3364 4432 jdpjd.exe 97 PID 4432 wrote to memory of 3364 4432 jdpjd.exe 97 PID 4432 wrote to memory of 3364 4432 jdpjd.exe 97 PID 3364 wrote to memory of 3052 3364 flxllxf.exe 98 PID 3364 wrote to memory of 3052 3364 flxllxf.exe 98 PID 3364 wrote to memory of 3052 3364 flxllxf.exe 98 PID 3052 wrote to memory of 5096 3052 llflfxr.exe 100 PID 3052 wrote to memory of 5096 3052 llflfxr.exe 100 PID 3052 wrote to memory of 5096 3052 llflfxr.exe 100 PID 5096 wrote to memory of 4464 5096 tbbhnn.exe 101 PID 5096 wrote to memory of 4464 5096 tbbhnn.exe 101 PID 5096 wrote to memory of 4464 5096 tbbhnn.exe 101 PID 4464 wrote to memory of 2424 4464 5hnhtn.exe 102 PID 4464 wrote to memory of 2424 4464 5hnhtn.exe 102 PID 4464 wrote to memory of 2424 4464 5hnhtn.exe 102 PID 2424 wrote to memory of 216 2424 5ppdp.exe 103 PID 2424 wrote to memory of 216 2424 5ppdp.exe 103 PID 2424 wrote to memory of 216 2424 5ppdp.exe 103 PID 216 wrote to memory of 3612 216 3fxlxrl.exe 105 PID 216 wrote to memory of 3612 216 3fxlxrl.exe 105 PID 216 wrote to memory of 3612 216 3fxlxrl.exe 105 PID 3612 wrote to memory of 4752 3612 nhtntn.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe"C:\Users\Admin\AppData\Local\Temp\32f49c7d08217d05c5d4513d290f787276095989e0e0821266a60953d6ad1b3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\1pddj.exec:\1pddj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\lrxllxl.exec:\lrxllxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\ntbtht.exec:\ntbtht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\btnhtn.exec:\btnhtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\dpvdv.exec:\dpvdv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
\??\c:\pdddd.exec:\pdddd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
\??\c:\rflrrxl.exec:\rflrrxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
\??\c:\flfxrfx.exec:\flfxrfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\bhhbtt.exec:\bhhbtt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\ddvjj.exec:\ddvjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\ffrfrfx.exec:\ffrfrfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\9hhthb.exec:\9hhthb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:184 -
\??\c:\nbnbnb.exec:\nbnbnb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
\??\c:\jdpjd.exec:\jdpjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
\??\c:\flxllxf.exec:\flxllxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
\??\c:\llflfxr.exec:\llflfxr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\tbbhnn.exec:\tbbhnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
\??\c:\5hnhtn.exec:\5hnhtn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\5ppdp.exec:\5ppdp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\3fxlxrl.exec:\3fxlxrl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\nhtntn.exec:\nhtntn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\hnthbh.exec:\hnthbh.exe23⤵
- Executes dropped EXE
PID:4752 -
\??\c:\vjjdp.exec:\vjjdp.exe24⤵
- Executes dropped EXE
PID:3536 -
\??\c:\3xxrfxf.exec:\3xxrfxf.exe25⤵
- Executes dropped EXE
PID:2388 -
\??\c:\7ffrfxr.exec:\7ffrfxr.exe26⤵
- Executes dropped EXE
PID:4568 -
\??\c:\tntttn.exec:\tntttn.exe27⤵
- Executes dropped EXE
PID:1068 -
\??\c:\dvdpp.exec:\dvdpp.exe28⤵
- Executes dropped EXE
PID:1620 -
\??\c:\lffxrlr.exec:\lffxrlr.exe29⤵
- Executes dropped EXE
PID:1384 -
\??\c:\1xxrfxr.exec:\1xxrfxr.exe30⤵
- Executes dropped EXE
PID:2200 -
\??\c:\9hbtnh.exec:\9hbtnh.exe31⤵
- Executes dropped EXE
PID:4972 -
\??\c:\hnbbhb.exec:\hnbbhb.exe32⤵
- Executes dropped EXE
PID:880 -
\??\c:\5vvvp.exec:\5vvvp.exe33⤵
- Executes dropped EXE
PID:2880 -
\??\c:\rxrlxrl.exec:\rxrlxrl.exe34⤵
- Executes dropped EXE
PID:4292 -
\??\c:\7rxlrlr.exec:\7rxlrlr.exe35⤵
- Executes dropped EXE
PID:2624 -
\??\c:\tthbnh.exec:\tthbnh.exe36⤵
- Executes dropped EXE
PID:2056 -
\??\c:\thtnbt.exec:\thtnbt.exe37⤵
- Executes dropped EXE
PID:864 -
\??\c:\pdvdj.exec:\pdvdj.exe38⤵
- Executes dropped EXE
PID:2816 -
\??\c:\dpdpd.exec:\dpdpd.exe39⤵
- Executes dropped EXE
PID:2768 -
\??\c:\flfrfxr.exec:\flfrfxr.exe40⤵
- Executes dropped EXE
PID:1432 -
\??\c:\frffxll.exec:\frffxll.exe41⤵
- Executes dropped EXE
PID:3048 -
\??\c:\5flffff.exec:\5flffff.exe42⤵
- Executes dropped EXE
PID:4732 -
\??\c:\7nhbnb.exec:\7nhbnb.exe43⤵
- Executes dropped EXE
PID:1956 -
\??\c:\5nhthb.exec:\5nhthb.exe44⤵
- Executes dropped EXE
PID:1216 -
\??\c:\9vpjd.exec:\9vpjd.exe45⤵
- Executes dropped EXE
PID:888 -
\??\c:\ppppd.exec:\ppppd.exe46⤵
- Executes dropped EXE
PID:4400 -
\??\c:\jvpdj.exec:\jvpdj.exe47⤵
- Executes dropped EXE
PID:1896 -
\??\c:\llfrlxr.exec:\llfrlxr.exe48⤵
- Executes dropped EXE
PID:4428 -
\??\c:\rlrrrrl.exec:\rlrrrrl.exe49⤵
- Executes dropped EXE
PID:3664 -
\??\c:\5btbnh.exec:\5btbnh.exe50⤵
- Executes dropped EXE
PID:3992 -
\??\c:\tbnhtn.exec:\tbnhtn.exe51⤵
- Executes dropped EXE
PID:3656 -
\??\c:\9vpjv.exec:\9vpjv.exe52⤵
- Executes dropped EXE
PID:1192 -
\??\c:\ddvjv.exec:\ddvjv.exe53⤵
- Executes dropped EXE
PID:4668 -
\??\c:\lrrfrll.exec:\lrrfrll.exe54⤵
- Executes dropped EXE
PID:2660 -
\??\c:\9xrlxrx.exec:\9xrlxrx.exe55⤵
- Executes dropped EXE
PID:3284 -
\??\c:\tttthh.exec:\tttthh.exe56⤵
- Executes dropped EXE
PID:4824 -
\??\c:\9bbtnn.exec:\9bbtnn.exe57⤵
- Executes dropped EXE
PID:3692 -
\??\c:\nhhthb.exec:\nhhthb.exe58⤵
- Executes dropped EXE
PID:4176 -
\??\c:\vpppp.exec:\vpppp.exe59⤵
- Executes dropped EXE
PID:1528 -
\??\c:\pdvpd.exec:\pdvpd.exe60⤵
- Executes dropped EXE
PID:1976 -
\??\c:\lxrfrll.exec:\lxrfrll.exe61⤵
- Executes dropped EXE
PID:1292 -
\??\c:\fxxrrll.exec:\fxxrrll.exe62⤵
- Executes dropped EXE
PID:4740 -
\??\c:\nttnbt.exec:\nttnbt.exe63⤵
- Executes dropped EXE
PID:4064 -
\??\c:\hnhhth.exec:\hnhhth.exe64⤵
- Executes dropped EXE
PID:5008 -
\??\c:\pvdpp.exec:\pvdpp.exe65⤵
- Executes dropped EXE
PID:4380 -
\??\c:\9fffffx.exec:\9fffffx.exe66⤵PID:3444
-
\??\c:\5flffxf.exec:\5flffxf.exe67⤵PID:4924
-
\??\c:\nhhhbb.exec:\nhhhbb.exe68⤵PID:3900
-
\??\c:\nbbtnn.exec:\nbbtnn.exe69⤵PID:3624
-
\??\c:\9pjdj.exec:\9pjdj.exe70⤵PID:3536
-
\??\c:\lxlxfrl.exec:\lxlxfrl.exe71⤵PID:2728
-
\??\c:\rfrlfxr.exec:\rfrlfxr.exe72⤵PID:544
-
\??\c:\ttnnbb.exec:\ttnnbb.exe73⤵PID:2604
-
\??\c:\9vvdp.exec:\9vvdp.exe74⤵PID:4500
-
\??\c:\7vdvv.exec:\7vdvv.exe75⤵PID:1696
-
\??\c:\5ffxlfx.exec:\5ffxlfx.exe76⤵PID:3688
-
\??\c:\lfxfrrr.exec:\lfxfrrr.exe77⤵PID:3824
-
\??\c:\tnnhhb.exec:\tnnhhb.exe78⤵PID:3028
-
\??\c:\3nthhb.exec:\3nthhb.exe79⤵PID:1848
-
\??\c:\djdpd.exec:\djdpd.exe80⤵PID:3668
-
\??\c:\dpdpd.exec:\dpdpd.exe81⤵PID:1320
-
\??\c:\lffllxr.exec:\lffllxr.exe82⤵PID:880
-
\??\c:\lrrrfxr.exec:\lrrrfxr.exe83⤵PID:4384
-
\??\c:\bhnhbt.exec:\bhnhbt.exe84⤵PID:468
-
\??\c:\9tbnnh.exec:\9tbnnh.exe85⤵PID:4436
-
\??\c:\jvpdp.exec:\jvpdp.exe86⤵PID:4788
-
\??\c:\jdjdj.exec:\jdjdj.exe87⤵PID:864
-
\??\c:\flfrfxx.exec:\flfrfxx.exe88⤵PID:4560
-
\??\c:\rxrlfxl.exec:\rxrlfxl.exe89⤵PID:1356
-
\??\c:\nhbnhb.exec:\nhbnhb.exe90⤵PID:3004
-
\??\c:\tnttbn.exec:\tnttbn.exe91⤵PID:2612
-
\??\c:\vdjvp.exec:\vdjvp.exe92⤵PID:1860
-
\??\c:\jdpvd.exec:\jdpvd.exe93⤵PID:3384
-
\??\c:\xxrflfx.exec:\xxrflfx.exe94⤵PID:5012
-
\??\c:\fllxlfx.exec:\fllxlfx.exe95⤵PID:3368
-
\??\c:\htbtbb.exec:\htbtbb.exe96⤵PID:2976
-
\??\c:\lxlflfx.exec:\lxlflfx.exe97⤵PID:4584
-
\??\c:\nhtbnn.exec:\nhtbnn.exe98⤵PID:2368
-
\??\c:\nhbtnb.exec:\nhbtnb.exe99⤵PID:5084
-
\??\c:\jdvvj.exec:\jdvvj.exe100⤵PID:556
-
\??\c:\jvjpv.exec:\jvjpv.exe101⤵PID:3472
-
\??\c:\lffrxrr.exec:\lffrxrr.exe102⤵PID:1856
-
\??\c:\5lxrrll.exec:\5lxrrll.exe103⤵PID:208
-
\??\c:\3nhbnh.exec:\3nhbnh.exe104⤵PID:3312
-
\??\c:\3jdvj.exec:\3jdvj.exe105⤵PID:220
-
\??\c:\pddpj.exec:\pddpj.exe106⤵PID:2692
-
\??\c:\fffxlff.exec:\fffxlff.exe107⤵PID:4084
-
\??\c:\lrrfxrf.exec:\lrrfxrf.exe108⤵PID:2120
-
\??\c:\fxrrrlr.exec:\fxrrrlr.exe109⤵PID:1972
-
\??\c:\3bbtnn.exec:\3bbtnn.exe110⤵PID:624
-
\??\c:\nhhbhb.exec:\nhhbhb.exe111⤵PID:2184
-
\??\c:\pdvpd.exec:\pdvpd.exe112⤵PID:372
-
\??\c:\dpvpd.exec:\dpvpd.exe113⤵PID:216
-
\??\c:\9lfrrll.exec:\9lfrrll.exe114⤵PID:3636
-
\??\c:\xffxfxf.exec:\xffxfxf.exe115⤵PID:3520
-
\??\c:\hbnhhh.exec:\hbnhhh.exe116⤵PID:3412
-
\??\c:\9bbttt.exec:\9bbttt.exe117⤵PID:2780
-
\??\c:\ttbbtt.exec:\ttbbtt.exe118⤵PID:4720
-
\??\c:\jvvjd.exec:\jvvjd.exe119⤵PID:3532
-
\??\c:\vpdvp.exec:\vpdvp.exe120⤵PID:3784
-
\??\c:\xrffxrl.exec:\xrffxrl.exe121⤵PID:4996
-
\??\c:\xrfxrlx.exec:\xrfxrlx.exe122⤵PID:760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-