Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 13:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ce8bfd43cff8fdc8df1f3bf84f730d00N.exe
Resource
win7-20240729-en
6 signatures
120 seconds
General
-
Target
ce8bfd43cff8fdc8df1f3bf84f730d00N.exe
-
Size
82KB
-
MD5
ce8bfd43cff8fdc8df1f3bf84f730d00
-
SHA1
0b02a97cefbb4dae67e88da7271576ab608f85cd
-
SHA256
b48a849535f9cc0d8da68a7b63d589d307de604162135db8804d98d714988474
-
SHA512
eb78883ee4e690cde25ead2b9d7585f1fea0c15c8bbb6e350b61563fb569ef83f2eeedf86ea188794393ccaf7aa00c6f40cd319f3ea199be6ec1ac4c7141b381
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Qi:ymb3NkkiQ3mdBjFIIp9L9QrrA8d
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2764-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3424-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1152-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2724-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1624-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1032-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2208-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/392-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1588-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2352-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3876-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4572-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3140-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1084-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3588-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2724 7frxfll.exe 1152 frrrrlf.exe 3424 bhhhhn.exe 1624 pdjpj.exe 1032 lxrllxf.exe 4968 htnttb.exe 1576 jvdjj.exe 4504 ddvjp.exe 1960 3tthhn.exe 1944 ntbhtt.exe 2208 jpdjj.exe 3440 xxxxxxx.exe 1780 ttnthn.exe 212 9vpjd.exe 392 llllfff.exe 4816 hhhhhn.exe 1588 tntbhb.exe 4672 5djpd.exe 2352 nhbbht.exe 3876 jpvvv.exe 2192 djpvp.exe 4572 xrffflr.exe 2456 bbbbbh.exe 3140 vjppp.exe 1084 3djjp.exe 4644 xflllrr.exe 2380 xfxrrff.exe 4180 nbhhhh.exe 3588 vjjjj.exe 3648 dddpp.exe 5068 rlxfrfr.exe 2760 hnthnt.exe 4440 hnbbbt.exe 2628 ppjjd.exe 4172 7djjj.exe 2724 llllxxr.exe 4184 flrxxff.exe 4748 9hbbtt.exe 1652 tttnbb.exe 1624 vpjdv.exe 1032 vvvvj.exe 4376 rxrfllx.exe 2844 fxllfxf.exe 4932 ttnnnn.exe 832 5hnnnt.exe 1360 jpppv.exe 1264 djjjd.exe 1416 3dppp.exe 1692 1frlfxr.exe 4764 xxxxffl.exe 2512 7bttnn.exe 3436 nbnnnn.exe 1076 9vvvp.exe 3584 pvddv.exe 4288 llfflrf.exe 1176 1lxxrxl.exe 3464 fffrrxf.exe 1588 bntntb.exe 2720 ntbbbt.exe 1364 jdvvv.exe 2124 dddvv.exe 372 lllfrrx.exe 432 xxxrrrr.exe 4684 ntbnbb.exe -
resource yara_rule behavioral2/memory/2764-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3424-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1152-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1624-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1032-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1576-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2208-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/392-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1588-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2352-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3876-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1084-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3588-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxxrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5btnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxllrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llllxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5thhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2724 2764 ce8bfd43cff8fdc8df1f3bf84f730d00N.exe 83 PID 2764 wrote to memory of 2724 2764 ce8bfd43cff8fdc8df1f3bf84f730d00N.exe 83 PID 2764 wrote to memory of 2724 2764 ce8bfd43cff8fdc8df1f3bf84f730d00N.exe 83 PID 2724 wrote to memory of 1152 2724 7frxfll.exe 84 PID 2724 wrote to memory of 1152 2724 7frxfll.exe 84 PID 2724 wrote to memory of 1152 2724 7frxfll.exe 84 PID 1152 wrote to memory of 3424 1152 frrrrlf.exe 85 PID 1152 wrote to memory of 3424 1152 frrrrlf.exe 85 PID 1152 wrote to memory of 3424 1152 frrrrlf.exe 85 PID 3424 wrote to memory of 1624 3424 bhhhhn.exe 86 PID 3424 wrote to memory of 1624 3424 bhhhhn.exe 86 PID 3424 wrote to memory of 1624 3424 bhhhhn.exe 86 PID 1624 wrote to memory of 1032 1624 pdjpj.exe 87 PID 1624 wrote to memory of 1032 1624 pdjpj.exe 87 PID 1624 wrote to memory of 1032 1624 pdjpj.exe 87 PID 1032 wrote to memory of 4968 1032 lxrllxf.exe 88 PID 1032 wrote to memory of 4968 1032 lxrllxf.exe 88 PID 1032 wrote to memory of 4968 1032 lxrllxf.exe 88 PID 4968 wrote to memory of 1576 4968 htnttb.exe 89 PID 4968 wrote to memory of 1576 4968 htnttb.exe 89 PID 4968 wrote to memory of 1576 4968 htnttb.exe 89 PID 1576 wrote to memory of 4504 1576 jvdjj.exe 90 PID 1576 wrote to memory of 4504 1576 jvdjj.exe 90 PID 1576 wrote to memory of 4504 1576 jvdjj.exe 90 PID 4504 wrote to memory of 1960 4504 ddvjp.exe 91 PID 4504 wrote to memory of 1960 4504 ddvjp.exe 91 PID 4504 wrote to memory of 1960 4504 ddvjp.exe 91 PID 1960 wrote to memory of 1944 1960 3tthhn.exe 92 PID 1960 wrote to memory of 1944 1960 3tthhn.exe 92 PID 1960 wrote to memory of 1944 1960 3tthhn.exe 92 PID 1944 wrote to memory of 2208 1944 ntbhtt.exe 93 PID 1944 wrote to memory of 2208 1944 ntbhtt.exe 93 PID 1944 wrote to memory of 2208 1944 ntbhtt.exe 93 PID 2208 wrote to memory of 3440 2208 jpdjj.exe 94 PID 2208 wrote to memory of 3440 2208 jpdjj.exe 94 PID 2208 wrote to memory of 3440 2208 jpdjj.exe 94 PID 3440 wrote to memory of 1780 3440 xxxxxxx.exe 96 PID 3440 wrote to memory of 1780 3440 xxxxxxx.exe 96 PID 3440 wrote to memory of 1780 3440 xxxxxxx.exe 96 PID 1780 wrote to memory of 212 1780 ttnthn.exe 97 PID 1780 wrote to memory of 212 1780 ttnthn.exe 97 PID 1780 wrote to memory of 212 1780 ttnthn.exe 97 PID 212 wrote to memory of 392 212 9vpjd.exe 98 PID 212 wrote to memory of 392 212 9vpjd.exe 98 PID 212 wrote to memory of 392 212 9vpjd.exe 98 PID 392 wrote to memory of 4816 392 llllfff.exe 99 PID 392 wrote to memory of 4816 392 llllfff.exe 99 PID 392 wrote to memory of 4816 392 llllfff.exe 99 PID 4816 wrote to memory of 1588 4816 hhhhhn.exe 101 PID 4816 wrote to memory of 1588 4816 hhhhhn.exe 101 PID 4816 wrote to memory of 1588 4816 hhhhhn.exe 101 PID 1588 wrote to memory of 4672 1588 tntbhb.exe 102 PID 1588 wrote to memory of 4672 1588 tntbhb.exe 102 PID 1588 wrote to memory of 4672 1588 tntbhb.exe 102 PID 4672 wrote to memory of 2352 4672 5djpd.exe 103 PID 4672 wrote to memory of 2352 4672 5djpd.exe 103 PID 4672 wrote to memory of 2352 4672 5djpd.exe 103 PID 2352 wrote to memory of 3876 2352 nhbbht.exe 104 PID 2352 wrote to memory of 3876 2352 nhbbht.exe 104 PID 2352 wrote to memory of 3876 2352 nhbbht.exe 104 PID 3876 wrote to memory of 2192 3876 jpvvv.exe 106 PID 3876 wrote to memory of 2192 3876 jpvvv.exe 106 PID 3876 wrote to memory of 2192 3876 jpvvv.exe 106 PID 2192 wrote to memory of 4572 2192 djpvp.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce8bfd43cff8fdc8df1f3bf84f730d00N.exe"C:\Users\Admin\AppData\Local\Temp\ce8bfd43cff8fdc8df1f3bf84f730d00N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\7frxfll.exec:\7frxfll.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\frrrrlf.exec:\frrrrlf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\bhhhhn.exec:\bhhhhn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
\??\c:\pdjpj.exec:\pdjpj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\lxrllxf.exec:\lxrllxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\htnttb.exec:\htnttb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\jvdjj.exec:\jvdjj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\ddvjp.exec:\ddvjp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\3tthhn.exec:\3tthhn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\ntbhtt.exec:\ntbhtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\jpdjj.exec:\jpdjj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\xxxxxxx.exec:\xxxxxxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\ttnthn.exec:\ttnthn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\9vpjd.exec:\9vpjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\llllfff.exec:\llllfff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
\??\c:\hhhhhn.exec:\hhhhhn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
\??\c:\tntbhb.exec:\tntbhb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\5djpd.exec:\5djpd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\nhbbht.exec:\nhbbht.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\jpvvv.exec:\jpvvv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\djpvp.exec:\djpvp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\xrffflr.exec:\xrffflr.exe23⤵
- Executes dropped EXE
PID:4572 -
\??\c:\bbbbbh.exec:\bbbbbh.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456 -
\??\c:\vjppp.exec:\vjppp.exe25⤵
- Executes dropped EXE
PID:3140 -
\??\c:\3djjp.exec:\3djjp.exe26⤵
- Executes dropped EXE
PID:1084 -
\??\c:\xflllrr.exec:\xflllrr.exe27⤵
- Executes dropped EXE
PID:4644 -
\??\c:\xfxrrff.exec:\xfxrrff.exe28⤵
- Executes dropped EXE
PID:2380 -
\??\c:\nbhhhh.exec:\nbhhhh.exe29⤵
- Executes dropped EXE
PID:4180 -
\??\c:\vjjjj.exec:\vjjjj.exe30⤵
- Executes dropped EXE
PID:3588 -
\??\c:\dddpp.exec:\dddpp.exe31⤵
- Executes dropped EXE
PID:3648 -
\??\c:\rlxfrfr.exec:\rlxfrfr.exe32⤵
- Executes dropped EXE
PID:5068 -
\??\c:\hnthnt.exec:\hnthnt.exe33⤵
- Executes dropped EXE
PID:2760 -
\??\c:\hnbbbt.exec:\hnbbbt.exe34⤵
- Executes dropped EXE
PID:4440 -
\??\c:\ppjjd.exec:\ppjjd.exe35⤵
- Executes dropped EXE
PID:2628 -
\??\c:\7djjj.exec:\7djjj.exe36⤵
- Executes dropped EXE
PID:4172 -
\??\c:\llllxxr.exec:\llllxxr.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724 -
\??\c:\flrxxff.exec:\flrxxff.exe38⤵
- Executes dropped EXE
PID:4184 -
\??\c:\9hbbtt.exec:\9hbbtt.exe39⤵
- Executes dropped EXE
PID:4748 -
\??\c:\tttnbb.exec:\tttnbb.exe40⤵
- Executes dropped EXE
PID:1652 -
\??\c:\vpjdv.exec:\vpjdv.exe41⤵
- Executes dropped EXE
PID:1624 -
\??\c:\vvvvj.exec:\vvvvj.exe42⤵
- Executes dropped EXE
PID:1032 -
\??\c:\rxrfllx.exec:\rxrfllx.exe43⤵
- Executes dropped EXE
PID:4376 -
\??\c:\fxllfxf.exec:\fxllfxf.exe44⤵
- Executes dropped EXE
PID:2844 -
\??\c:\ttnnnn.exec:\ttnnnn.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4932 -
\??\c:\5hnnnt.exec:\5hnnnt.exe46⤵
- Executes dropped EXE
PID:832 -
\??\c:\jpppv.exec:\jpppv.exe47⤵
- Executes dropped EXE
PID:1360 -
\??\c:\djjjd.exec:\djjjd.exe48⤵
- Executes dropped EXE
PID:1264 -
\??\c:\3dppp.exec:\3dppp.exe49⤵
- Executes dropped EXE
PID:1416 -
\??\c:\1frlfxr.exec:\1frlfxr.exe50⤵
- Executes dropped EXE
PID:1692 -
\??\c:\xxxxffl.exec:\xxxxffl.exe51⤵
- Executes dropped EXE
PID:4764 -
\??\c:\7bttnn.exec:\7bttnn.exe52⤵
- Executes dropped EXE
PID:2512 -
\??\c:\nbnnnn.exec:\nbnnnn.exe53⤵
- Executes dropped EXE
PID:3436 -
\??\c:\9vvvp.exec:\9vvvp.exe54⤵
- Executes dropped EXE
PID:1076 -
\??\c:\pvddv.exec:\pvddv.exe55⤵
- Executes dropped EXE
PID:3584 -
\??\c:\llfflrf.exec:\llfflrf.exe56⤵
- Executes dropped EXE
PID:4288 -
\??\c:\1lxxrxl.exec:\1lxxrxl.exe57⤵
- Executes dropped EXE
PID:1176 -
\??\c:\fffrrxf.exec:\fffrrxf.exe58⤵
- Executes dropped EXE
PID:3464 -
\??\c:\bntntb.exec:\bntntb.exe59⤵
- Executes dropped EXE
PID:1588 -
\??\c:\ntbbbt.exec:\ntbbbt.exe60⤵
- Executes dropped EXE
PID:2720 -
\??\c:\jdvvv.exec:\jdvvv.exe61⤵
- Executes dropped EXE
PID:1364 -
\??\c:\dddvv.exec:\dddvv.exe62⤵
- Executes dropped EXE
PID:2124 -
\??\c:\lllfrrx.exec:\lllfrrx.exe63⤵
- Executes dropped EXE
PID:372 -
\??\c:\xxxrrrr.exec:\xxxrrrr.exe64⤵
- Executes dropped EXE
PID:432 -
\??\c:\ntbnbb.exec:\ntbnbb.exe65⤵
- Executes dropped EXE
PID:4684 -
\??\c:\nhbnnt.exec:\nhbnnt.exe66⤵PID:1912
-
\??\c:\3djpv.exec:\3djpv.exe67⤵PID:8
-
\??\c:\vvppv.exec:\vvppv.exe68⤵PID:2456
-
\??\c:\flxxrrf.exec:\flxxrrf.exe69⤵PID:4636
-
\??\c:\fxffxxx.exec:\fxffxxx.exe70⤵PID:1084
-
\??\c:\bbnthn.exec:\bbnthn.exe71⤵PID:2800
-
\??\c:\7jjpv.exec:\7jjpv.exe72⤵PID:5028
-
\??\c:\jjvjd.exec:\jjvjd.exe73⤵PID:804
-
\??\c:\lrxxfff.exec:\lrxxfff.exe74⤵PID:4892
-
\??\c:\3lrrxff.exec:\3lrrxff.exe75⤵PID:2984
-
\??\c:\nbhhhn.exec:\nbhhhn.exe76⤵PID:2028
-
\??\c:\nbttbh.exec:\nbttbh.exe77⤵PID:3544
-
\??\c:\vdppj.exec:\vdppj.exe78⤵PID:4436
-
\??\c:\vdvvv.exec:\vdvvv.exe79⤵PID:4552
-
\??\c:\7frlfff.exec:\7frlfff.exe80⤵PID:4980
-
\??\c:\xxxxlrr.exec:\xxxxlrr.exe81⤵PID:4796
-
\??\c:\5thhht.exec:\5thhht.exe82⤵
- System Location Discovery: System Language Discovery
PID:1388 -
\??\c:\bhnhnt.exec:\bhnhnt.exe83⤵PID:1152
-
\??\c:\jvddd.exec:\jvddd.exe84⤵PID:1412
-
\??\c:\jdvvp.exec:\jdvvp.exe85⤵PID:4748
-
\??\c:\lfrrrlr.exec:\lfrrrlr.exe86⤵PID:1080
-
\??\c:\frxxxfl.exec:\frxxxfl.exe87⤵PID:4952
-
\??\c:\vvjjd.exec:\vvjjd.exe88⤵PID:1032
-
\??\c:\vvddv.exec:\vvddv.exe89⤵PID:2632
-
\??\c:\flffxxf.exec:\flffxxf.exe90⤵PID:5048
-
\??\c:\rfrxfrf.exec:\rfrxfrf.exe91⤵PID:4932
-
\??\c:\ntbthb.exec:\ntbthb.exe92⤵PID:4280
-
\??\c:\hhntnt.exec:\hhntnt.exe93⤵PID:324
-
\??\c:\ddvvd.exec:\ddvvd.exe94⤵PID:5088
-
\??\c:\3dvvp.exec:\3dvvp.exe95⤵PID:3008
-
\??\c:\rrxxxfr.exec:\rrxxxfr.exe96⤵PID:4688
-
\??\c:\9ntttb.exec:\9ntttb.exe97⤵PID:4600
-
\??\c:\nhbbtb.exec:\nhbbtb.exe98⤵PID:3540
-
\??\c:\9htntt.exec:\9htntt.exe99⤵PID:2156
-
\??\c:\7vvvd.exec:\7vvvd.exe100⤵PID:4732
-
\??\c:\xrllrxx.exec:\xrllrxx.exe101⤵PID:3584
-
\??\c:\lrrlrfx.exec:\lrrlrfx.exe102⤵PID:4464
-
\??\c:\tnnhhh.exec:\tnnhhh.exe103⤵PID:1176
-
\??\c:\pjvvv.exec:\pjvvv.exe104⤵PID:1812
-
\??\c:\9djvv.exec:\9djvv.exe105⤵PID:1588
-
\??\c:\xxllfll.exec:\xxllfll.exe106⤵PID:3048
-
\??\c:\3rffxff.exec:\3rffxff.exe107⤵PID:1364
-
\??\c:\3nbtnt.exec:\3nbtnt.exe108⤵PID:3016
-
\??\c:\hhnnbb.exec:\hhnnbb.exe109⤵PID:4240
-
\??\c:\3pvjj.exec:\3pvjj.exe110⤵PID:3500
-
\??\c:\9dvpv.exec:\9dvpv.exe111⤵PID:4684
-
\??\c:\xxxrlff.exec:\xxxrlff.exe112⤵PID:1912
-
\??\c:\tnbttb.exec:\tnbttb.exe113⤵PID:1548
-
\??\c:\jdjjj.exec:\jdjjj.exe114⤵PID:2688
-
\??\c:\rrxrlfl.exec:\rrxrlfl.exe115⤵PID:2888
-
\??\c:\lrxxrrr.exec:\lrxxrrr.exe116⤵PID:3164
-
\??\c:\nnnntt.exec:\nnnntt.exe117⤵PID:2916
-
\??\c:\dpvjj.exec:\dpvjj.exe118⤵PID:636
-
\??\c:\ddpvj.exec:\ddpvj.exe119⤵PID:3512
-
\??\c:\9rxrrrx.exec:\9rxrrrx.exe120⤵PID:3244
-
\??\c:\lfllrrx.exec:\lfllrrx.exe121⤵PID:1948
-
\??\c:\nnhhnn.exec:\nnhhnn.exe122⤵PID:4000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-