Analysis
-
max time kernel
120s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 22:17 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a052c606ae90eea024aba8758fe4680N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
7a052c606ae90eea024aba8758fe4680N.exe
-
Size
249KB
-
MD5
7a052c606ae90eea024aba8758fe4680
-
SHA1
de926d61996ea48085a2db620d2c6cefb0ab429b
-
SHA256
cc7b0d979fb2e790a08744a9183d31406b616998fbc5a23ce298172e25b60e72
-
SHA512
78faf30e6b7206c3c1e0ac0a9c169f7982bf4303a1ab788f4072fd75fbe10c79190c3ee3003611fd26e0df95ef8834d31e3accd060182c9ea8337c0c071e18d3
-
SSDEEP
6144:n3C9BRo/AIX27NHWpU00VIxas1oa3YiFRlin:n3C9uD6AUDCa4NYmRMn
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/4208-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1696-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1348-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1168-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2488-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1680-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/720-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/336-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3664-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2608-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4392-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1440-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3040-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4532-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/664-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/980-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3688-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3048-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/812-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4552-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4208 rrlfrlr.exe 1348 5nnbth.exe 1696 vjppj.exe 212 fflxlff.exe 1168 rllxrlf.exe 4792 nhthtn.exe 1680 flxxlxx.exe 2488 7tbnhn.exe 720 djvdd.exe 3724 ffrlffx.exe 1264 ttbhbt.exe 1336 vjjdp.exe 336 9xrrlfx.exe 1584 vdjdp.exe 3664 llffxxl.exe 2608 ttbtnh.exe 4392 pjjdv.exe 1440 7xfrlfx.exe 3040 bhtthh.exe 664 1pvjv.exe 4532 xlxxxlf.exe 980 bhnhtt.exe 1580 pvdpj.exe 3688 1hnhhh.exe 3048 vpjpj.exe 812 tbnhbt.exe 1940 vvjdj.exe 3088 7ffffll.exe 2072 5vvpj.exe 3296 xlrrrxx.exe 4552 nbhhbb.exe 208 vpvpj.exe 432 1htnhh.exe 232 pjpjd.exe 2036 1rxrrrl.exe 2848 llrlllr.exe 3108 jvjdd.exe 1724 pppjj.exe 3820 xrfxlll.exe 1396 llrxxxr.exe 3740 9bhbtt.exe 776 nhnhhh.exe 736 jjjdp.exe 4500 lfrllll.exe 5116 hnbbtt.exe 4944 bhthbn.exe 1564 dvvpj.exe 4896 lrrrlrf.exe 4696 nnbthh.exe 2228 bnbtnh.exe 1904 9jddv.exe 808 lfllxff.exe 652 rfrlfff.exe 4036 tntnhb.exe 3060 9xllfrr.exe 336 nbhnnn.exe 1136 1nbttb.exe 1584 jjppj.exe 3476 rrxxxrl.exe 4908 vjjdj.exe 3656 ffllflf.exe 1832 rrxllrf.exe 2516 nhbttn.exe 2200 3pjdv.exe -
resource yara_rule behavioral2/memory/4832-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4208-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4832-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1348-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2488-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2488-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1680-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/720-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3664-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2608-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4392-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3040-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4532-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/664-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/980-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/812-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4552-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1htnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5djjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4208 4832 7a052c606ae90eea024aba8758fe4680N.exe 83 PID 4832 wrote to memory of 4208 4832 7a052c606ae90eea024aba8758fe4680N.exe 83 PID 4832 wrote to memory of 4208 4832 7a052c606ae90eea024aba8758fe4680N.exe 83 PID 4208 wrote to memory of 1348 4208 rrlfrlr.exe 84 PID 4208 wrote to memory of 1348 4208 rrlfrlr.exe 84 PID 4208 wrote to memory of 1348 4208 rrlfrlr.exe 84 PID 1348 wrote to memory of 1696 1348 5nnbth.exe 85 PID 1348 wrote to memory of 1696 1348 5nnbth.exe 85 PID 1348 wrote to memory of 1696 1348 5nnbth.exe 85 PID 1696 wrote to memory of 212 1696 vjppj.exe 86 PID 1696 wrote to memory of 212 1696 vjppj.exe 86 PID 1696 wrote to memory of 212 1696 vjppj.exe 86 PID 212 wrote to memory of 1168 212 fflxlff.exe 87 PID 212 wrote to memory of 1168 212 fflxlff.exe 87 PID 212 wrote to memory of 1168 212 fflxlff.exe 87 PID 1168 wrote to memory of 4792 1168 rllxrlf.exe 88 PID 1168 wrote to memory of 4792 1168 rllxrlf.exe 88 PID 1168 wrote to memory of 4792 1168 rllxrlf.exe 88 PID 4792 wrote to memory of 1680 4792 nhthtn.exe 89 PID 4792 wrote to memory of 1680 4792 nhthtn.exe 89 PID 4792 wrote to memory of 1680 4792 nhthtn.exe 89 PID 1680 wrote to memory of 2488 1680 flxxlxx.exe 90 PID 1680 wrote to memory of 2488 1680 flxxlxx.exe 90 PID 1680 wrote to memory of 2488 1680 flxxlxx.exe 90 PID 2488 wrote to memory of 720 2488 7tbnhn.exe 91 PID 2488 wrote to memory of 720 2488 7tbnhn.exe 91 PID 2488 wrote to memory of 720 2488 7tbnhn.exe 91 PID 720 wrote to memory of 3724 720 djvdd.exe 92 PID 720 wrote to memory of 3724 720 djvdd.exe 92 PID 720 wrote to memory of 3724 720 djvdd.exe 92 PID 3724 wrote to memory of 1264 3724 ffrlffx.exe 93 PID 3724 wrote to memory of 1264 3724 ffrlffx.exe 93 PID 3724 wrote to memory of 1264 3724 ffrlffx.exe 93 PID 1264 wrote to memory of 1336 1264 ttbhbt.exe 94 PID 1264 wrote to memory of 1336 1264 ttbhbt.exe 94 PID 1264 wrote to memory of 1336 1264 ttbhbt.exe 94 PID 1336 wrote to memory of 336 1336 vjjdp.exe 96 PID 1336 wrote to memory of 336 1336 vjjdp.exe 96 PID 1336 wrote to memory of 336 1336 vjjdp.exe 96 PID 336 wrote to memory of 1584 336 9xrrlfx.exe 97 PID 336 wrote to memory of 1584 336 9xrrlfx.exe 97 PID 336 wrote to memory of 1584 336 9xrrlfx.exe 97 PID 1584 wrote to memory of 3664 1584 vdjdp.exe 98 PID 1584 wrote to memory of 3664 1584 vdjdp.exe 98 PID 1584 wrote to memory of 3664 1584 vdjdp.exe 98 PID 3664 wrote to memory of 2608 3664 llffxxl.exe 99 PID 3664 wrote to memory of 2608 3664 llffxxl.exe 99 PID 3664 wrote to memory of 2608 3664 llffxxl.exe 99 PID 2608 wrote to memory of 4392 2608 ttbtnh.exe 101 PID 2608 wrote to memory of 4392 2608 ttbtnh.exe 101 PID 2608 wrote to memory of 4392 2608 ttbtnh.exe 101 PID 4392 wrote to memory of 1440 4392 pjjdv.exe 102 PID 4392 wrote to memory of 1440 4392 pjjdv.exe 102 PID 4392 wrote to memory of 1440 4392 pjjdv.exe 102 PID 1440 wrote to memory of 3040 1440 7xfrlfx.exe 103 PID 1440 wrote to memory of 3040 1440 7xfrlfx.exe 103 PID 1440 wrote to memory of 3040 1440 7xfrlfx.exe 103 PID 3040 wrote to memory of 664 3040 bhtthh.exe 104 PID 3040 wrote to memory of 664 3040 bhtthh.exe 104 PID 3040 wrote to memory of 664 3040 bhtthh.exe 104 PID 664 wrote to memory of 4532 664 1pvjv.exe 105 PID 664 wrote to memory of 4532 664 1pvjv.exe 105 PID 664 wrote to memory of 4532 664 1pvjv.exe 105 PID 4532 wrote to memory of 980 4532 xlxxxlf.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a052c606ae90eea024aba8758fe4680N.exe"C:\Users\Admin\AppData\Local\Temp\7a052c606ae90eea024aba8758fe4680N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\rrlfrlr.exec:\rrlfrlr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\5nnbth.exec:\5nnbth.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\vjppj.exec:\vjppj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\fflxlff.exec:\fflxlff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\rllxrlf.exec:\rllxrlf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\nhthtn.exec:\nhthtn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\flxxlxx.exec:\flxxlxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\7tbnhn.exec:\7tbnhn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\djvdd.exec:\djvdd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:720 -
\??\c:\ffrlffx.exec:\ffrlffx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\ttbhbt.exec:\ttbhbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\vjjdp.exec:\vjjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\9xrrlfx.exec:\9xrrlfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
\??\c:\vdjdp.exec:\vdjdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\llffxxl.exec:\llffxxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\ttbtnh.exec:\ttbtnh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\pjjdv.exec:\pjjdv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\7xfrlfx.exec:\7xfrlfx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\bhtthh.exec:\bhtthh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\1pvjv.exec:\1pvjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
\??\c:\xlxxxlf.exec:\xlxxxlf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
\??\c:\bhnhtt.exec:\bhnhtt.exe23⤵
- Executes dropped EXE
PID:980 -
\??\c:\pvdpj.exec:\pvdpj.exe24⤵
- Executes dropped EXE
PID:1580 -
\??\c:\1hnhhh.exec:\1hnhhh.exe25⤵
- Executes dropped EXE
PID:3688 -
\??\c:\vpjpj.exec:\vpjpj.exe26⤵
- Executes dropped EXE
PID:3048 -
\??\c:\tbnhbt.exec:\tbnhbt.exe27⤵
- Executes dropped EXE
PID:812 -
\??\c:\vvjdj.exec:\vvjdj.exe28⤵
- Executes dropped EXE
PID:1940 -
\??\c:\7ffffll.exec:\7ffffll.exe29⤵
- Executes dropped EXE
PID:3088 -
\??\c:\5vvpj.exec:\5vvpj.exe30⤵
- Executes dropped EXE
PID:2072 -
\??\c:\xlrrrxx.exec:\xlrrrxx.exe31⤵
- Executes dropped EXE
PID:3296 -
\??\c:\nbhhbb.exec:\nbhhbb.exe32⤵
- Executes dropped EXE
PID:4552 -
\??\c:\vpvpj.exec:\vpvpj.exe33⤵
- Executes dropped EXE
PID:208 -
\??\c:\1htnhh.exec:\1htnhh.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:432 -
\??\c:\pjpjd.exec:\pjpjd.exe35⤵
- Executes dropped EXE
PID:232 -
\??\c:\1rxrrrl.exec:\1rxrrrl.exe36⤵
- Executes dropped EXE
PID:2036 -
\??\c:\llrlllr.exec:\llrlllr.exe37⤵
- Executes dropped EXE
PID:2848 -
\??\c:\bbtbbb.exec:\bbtbbb.exe38⤵PID:2624
-
\??\c:\jvjdd.exec:\jvjdd.exe39⤵
- Executes dropped EXE
PID:3108 -
\??\c:\pppjj.exec:\pppjj.exe40⤵
- Executes dropped EXE
PID:1724 -
\??\c:\xrfxlll.exec:\xrfxlll.exe41⤵
- Executes dropped EXE
PID:3820 -
\??\c:\llrxxxr.exec:\llrxxxr.exe42⤵
- Executes dropped EXE
PID:1396 -
\??\c:\9bhbtt.exec:\9bhbtt.exe43⤵
- Executes dropped EXE
PID:3740 -
\??\c:\nhnhhh.exec:\nhnhhh.exe44⤵
- Executes dropped EXE
PID:776 -
\??\c:\jjjdp.exec:\jjjdp.exe45⤵
- Executes dropped EXE
PID:736 -
\??\c:\lfrllll.exec:\lfrllll.exe46⤵
- Executes dropped EXE
PID:4500 -
\??\c:\hnbbtt.exec:\hnbbtt.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116 -
\??\c:\bhthbn.exec:\bhthbn.exe48⤵
- Executes dropped EXE
PID:4944 -
\??\c:\dvvpj.exec:\dvvpj.exe49⤵
- Executes dropped EXE
PID:1564 -
\??\c:\lrrrlrf.exec:\lrrrlrf.exe50⤵
- Executes dropped EXE
PID:4896 -
\??\c:\nnbthh.exec:\nnbthh.exe51⤵
- Executes dropped EXE
PID:4696 -
\??\c:\bnbtnh.exec:\bnbtnh.exe52⤵
- Executes dropped EXE
PID:2228 -
\??\c:\9jddv.exec:\9jddv.exe53⤵
- Executes dropped EXE
PID:1904 -
\??\c:\lfllxff.exec:\lfllxff.exe54⤵
- Executes dropped EXE
PID:808 -
\??\c:\rfrlfff.exec:\rfrlfff.exe55⤵
- Executes dropped EXE
PID:652 -
\??\c:\tntnhb.exec:\tntnhb.exe56⤵
- Executes dropped EXE
PID:4036 -
\??\c:\9xllfrr.exec:\9xllfrr.exe57⤵
- Executes dropped EXE
PID:3060 -
\??\c:\nbhnnn.exec:\nbhnnn.exe58⤵
- Executes dropped EXE
PID:336 -
\??\c:\1nbttb.exec:\1nbttb.exe59⤵
- Executes dropped EXE
PID:1136 -
\??\c:\jjppj.exec:\jjppj.exe60⤵
- Executes dropped EXE
PID:1584 -
\??\c:\rrxxxrl.exec:\rrxxxrl.exe61⤵
- Executes dropped EXE
PID:3476 -
\??\c:\vjjdj.exec:\vjjdj.exe62⤵
- Executes dropped EXE
PID:4908 -
\??\c:\ffllflf.exec:\ffllflf.exe63⤵
- Executes dropped EXE
PID:3656 -
\??\c:\rrxllrf.exec:\rrxllrf.exe64⤵
- Executes dropped EXE
PID:1832 -
\??\c:\nhbttn.exec:\nhbttn.exe65⤵
- Executes dropped EXE
PID:2516 -
\??\c:\3pjdv.exec:\3pjdv.exe66⤵
- Executes dropped EXE
PID:2200 -
\??\c:\xrxxrll.exec:\xrxxrll.exe67⤵PID:4772
-
\??\c:\5lflffx.exec:\5lflffx.exe68⤵PID:1684
-
\??\c:\hhhhhh.exec:\hhhhhh.exe69⤵PID:3480
-
\??\c:\1jjjd.exec:\1jjjd.exe70⤵PID:3984
-
\??\c:\jdvpp.exec:\jdvpp.exe71⤵PID:4520
-
\??\c:\7llfxxr.exec:\7llfxxr.exe72⤵PID:3364
-
\??\c:\llffrxr.exec:\llffrxr.exe73⤵PID:748
-
\??\c:\hnnhhh.exec:\hnnhhh.exe74⤵PID:1112
-
\??\c:\djjjp.exec:\djjjp.exe75⤵PID:4484
-
\??\c:\3ppjd.exec:\3ppjd.exe76⤵PID:4120
-
\??\c:\rrxrrrf.exec:\rrxrrrf.exe77⤵PID:2644
-
\??\c:\lfrrxxf.exec:\lfrrxxf.exe78⤵PID:4508
-
\??\c:\ttbhhh.exec:\ttbhhh.exe79⤵PID:3612
-
\??\c:\7vjpj.exec:\7vjpj.exe80⤵PID:3296
-
\??\c:\pdppj.exec:\pdppj.exe81⤵PID:408
-
\??\c:\rxlfxxx.exec:\rxlfxxx.exe82⤵PID:4140
-
\??\c:\tntnnh.exec:\tntnnh.exe83⤵PID:1576
-
\??\c:\thhbtt.exec:\thhbtt.exe84⤵PID:4340
-
\??\c:\jvpjp.exec:\jvpjp.exe85⤵PID:4472
-
\??\c:\lrlrfrf.exec:\lrlrfrf.exe86⤵PID:2848
-
\??\c:\5rllflf.exec:\5rllflf.exe87⤵PID:3096
-
\??\c:\5tbttb.exec:\5tbttb.exe88⤵PID:3604
-
\??\c:\5dddj.exec:\5dddj.exe89⤵PID:3680
-
\??\c:\pvdvp.exec:\pvdvp.exe90⤵PID:2592
-
\??\c:\ffxxfxf.exec:\ffxxfxf.exe91⤵PID:3540
-
\??\c:\ffffxxx.exec:\ffffxxx.exe92⤵PID:3868
-
\??\c:\ntttnt.exec:\ntttnt.exe93⤵PID:4628
-
\??\c:\3dpjj.exec:\3dpjj.exe94⤵
- System Location Discovery: System Language Discovery
PID:436 -
\??\c:\pdjdd.exec:\pdjdd.exe95⤵PID:4376
-
\??\c:\xrxrllf.exec:\xrxrllf.exe96⤵PID:1820
-
\??\c:\llrrrrl.exec:\llrrrrl.exe97⤵PID:4308
-
\??\c:\bnntnh.exec:\bnntnh.exe98⤵PID:3996
-
\??\c:\hbbbbb.exec:\hbbbbb.exe99⤵PID:220
-
\??\c:\dvpjd.exec:\dvpjd.exe100⤵PID:4696
-
\??\c:\vvpjp.exec:\vvpjp.exe101⤵PID:1700
-
\??\c:\fxrlfxf.exec:\fxrlfxf.exe102⤵PID:4636
-
\??\c:\hhhbbb.exec:\hhhbbb.exe103⤵PID:4280
-
\??\c:\vdjdv.exec:\vdjdv.exe104⤵PID:4100
-
\??\c:\ddpjj.exec:\ddpjj.exe105⤵PID:2144
-
\??\c:\fxrxrlf.exec:\fxrxrlf.exe106⤵PID:1116
-
\??\c:\lxflffx.exec:\lxflffx.exe107⤵PID:3908
-
\??\c:\5nnhbh.exec:\5nnhbh.exe108⤵PID:3000
-
\??\c:\ddjdd.exec:\ddjdd.exe109⤵PID:4856
-
\??\c:\pjvvd.exec:\pjvvd.exe110⤵PID:4076
-
\??\c:\rllfrrl.exec:\rllfrrl.exe111⤵PID:2200
-
\??\c:\hnhbnn.exec:\hnhbnn.exe112⤵PID:4548
-
\??\c:\hhbtth.exec:\hhbtth.exe113⤵PID:1580
-
\??\c:\pddvp.exec:\pddvp.exe114⤵PID:3568
-
\??\c:\flxxflx.exec:\flxxflx.exe115⤵PID:3616
-
\??\c:\hhntnn.exec:\hhntnn.exe116⤵PID:4872
-
\??\c:\jddvj.exec:\jddvj.exe117⤵PID:2888
-
\??\c:\ddjdp.exec:\ddjdp.exe118⤵PID:1640
-
\??\c:\xxfxrrr.exec:\xxfxrrr.exe119⤵PID:4584
-
\??\c:\5xffflf.exec:\5xffflf.exe120⤵PID:3916
-
\??\c:\tttnnn.exec:\tttnnn.exe121⤵PID:636
-
\??\c:\pjjvp.exec:\pjjvp.exe122⤵PID:4900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-