Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 13:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c8a4bf3022561c2a5a22c0e234e99880N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
c8a4bf3022561c2a5a22c0e234e99880N.exe
-
Size
90KB
-
MD5
c8a4bf3022561c2a5a22c0e234e99880
-
SHA1
f8b501cd888f7f1240e1c91801fa4087119e62be
-
SHA256
6d343eed4d5608fe758cecf601f7663edd92f366bfe5a2081bb4db8f35092554
-
SHA512
8094b7e28f892368c23a547ffcba2d20919e6f4bab81288a36e9bda5e7a125f393f62d8c666b4cb439f1b334254fb225d70b71031c90966d3cc948cdbe112b75
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iJvRirE0DmmdL2jqWkBj:ymb3NkkiQ3mdBjF+3TU2iBRioSumWS11
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/4328-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4328-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5036-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2180-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4112-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/352-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3648-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1920-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1156-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/404-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1328-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/952-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/456-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3600-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4528-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3124-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1076-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 5036 3tbnnn.exe 4456 rrllfll.exe 2180 xxfrrxf.exe 4792 tnnhnh.exe 5080 7llrrrr.exe 4784 tnttbb.exe 4112 jjjjj.exe 352 xxxxrxx.exe 3648 thtttb.exe 1920 bnbtnt.exe 1156 pjppj.exe 4876 nhtbtt.exe 4928 nnttbb.exe 3720 djpvv.exe 1816 ffrrflr.exe 404 hhhbtt.exe 3360 vjvjj.exe 1328 rlxrffl.exe 4544 tnhbbh.exe 952 7djjv.exe 4752 xfxrlfx.exe 456 xlxrrll.exe 4528 tnhhnn.exe 3600 jvvpj.exe 3124 rfrflrx.exe 1588 tbhnhn.exe 4736 hbhbhh.exe 2984 jdjdp.exe 3272 xrrxrlx.exe 1076 5ttnhh.exe 2156 5nbnbh.exe 1092 dvvvp.exe 4204 pddjv.exe 3220 frxlxxr.exe 5076 nbbbhh.exe 4484 ppvvd.exe 2600 djdpd.exe 4536 xxxrlfx.exe 4356 nhtttt.exe 2308 nhnnhh.exe 2540 pdvpj.exe 4612 jdvpp.exe 4648 xrrrlll.exe 2432 5xllfff.exe 1152 1ntntt.exe 1548 hbbbbb.exe 4260 vddjj.exe 2612 jdjjv.exe 4476 7fflrrr.exe 1200 thhbtn.exe 4232 7bnhbt.exe 2108 jppjv.exe 1240 vdpjv.exe 4176 xrrxlll.exe 3616 bttnnn.exe 640 nhttbb.exe 3552 vvvpj.exe 3088 3vdjj.exe 1156 rflfxxx.exe 3348 3rfflrx.exe 4884 hnttth.exe 744 pjvjd.exe 1884 pvpjd.exe 1456 rxlxllf.exe -
resource yara_rule behavioral2/memory/4328-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4328-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2180-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/352-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3648-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1920-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1920-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1920-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1156-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/404-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1328-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/952-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3600-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4528-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1076-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffflxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxfxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9llxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrfxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7flxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 5036 4328 c8a4bf3022561c2a5a22c0e234e99880N.exe 83 PID 4328 wrote to memory of 5036 4328 c8a4bf3022561c2a5a22c0e234e99880N.exe 83 PID 4328 wrote to memory of 5036 4328 c8a4bf3022561c2a5a22c0e234e99880N.exe 83 PID 5036 wrote to memory of 4456 5036 3tbnnn.exe 84 PID 5036 wrote to memory of 4456 5036 3tbnnn.exe 84 PID 5036 wrote to memory of 4456 5036 3tbnnn.exe 84 PID 4456 wrote to memory of 2180 4456 rrllfll.exe 85 PID 4456 wrote to memory of 2180 4456 rrllfll.exe 85 PID 4456 wrote to memory of 2180 4456 rrllfll.exe 85 PID 2180 wrote to memory of 4792 2180 xxfrrxf.exe 86 PID 2180 wrote to memory of 4792 2180 xxfrrxf.exe 86 PID 2180 wrote to memory of 4792 2180 xxfrrxf.exe 86 PID 4792 wrote to memory of 5080 4792 tnnhnh.exe 87 PID 4792 wrote to memory of 5080 4792 tnnhnh.exe 87 PID 4792 wrote to memory of 5080 4792 tnnhnh.exe 87 PID 5080 wrote to memory of 4784 5080 7llrrrr.exe 89 PID 5080 wrote to memory of 4784 5080 7llrrrr.exe 89 PID 5080 wrote to memory of 4784 5080 7llrrrr.exe 89 PID 4784 wrote to memory of 4112 4784 tnttbb.exe 90 PID 4784 wrote to memory of 4112 4784 tnttbb.exe 90 PID 4784 wrote to memory of 4112 4784 tnttbb.exe 90 PID 4112 wrote to memory of 352 4112 jjjjj.exe 92 PID 4112 wrote to memory of 352 4112 jjjjj.exe 92 PID 4112 wrote to memory of 352 4112 jjjjj.exe 92 PID 352 wrote to memory of 3648 352 xxxxrxx.exe 93 PID 352 wrote to memory of 3648 352 xxxxrxx.exe 93 PID 352 wrote to memory of 3648 352 xxxxrxx.exe 93 PID 3648 wrote to memory of 1920 3648 thtttb.exe 94 PID 3648 wrote to memory of 1920 3648 thtttb.exe 94 PID 3648 wrote to memory of 1920 3648 thtttb.exe 94 PID 1920 wrote to memory of 1156 1920 bnbtnt.exe 95 PID 1920 wrote to memory of 1156 1920 bnbtnt.exe 95 PID 1920 wrote to memory of 1156 1920 bnbtnt.exe 95 PID 1156 wrote to memory of 4876 1156 pjppj.exe 96 PID 1156 wrote to memory of 4876 1156 pjppj.exe 96 PID 1156 wrote to memory of 4876 1156 pjppj.exe 96 PID 4876 wrote to memory of 4928 4876 nhtbtt.exe 97 PID 4876 wrote to memory of 4928 4876 nhtbtt.exe 97 PID 4876 wrote to memory of 4928 4876 nhtbtt.exe 97 PID 4928 wrote to memory of 3720 4928 nnttbb.exe 99 PID 4928 wrote to memory of 3720 4928 nnttbb.exe 99 PID 4928 wrote to memory of 3720 4928 nnttbb.exe 99 PID 3720 wrote to memory of 1816 3720 djpvv.exe 100 PID 3720 wrote to memory of 1816 3720 djpvv.exe 100 PID 3720 wrote to memory of 1816 3720 djpvv.exe 100 PID 1816 wrote to memory of 404 1816 ffrrflr.exe 101 PID 1816 wrote to memory of 404 1816 ffrrflr.exe 101 PID 1816 wrote to memory of 404 1816 ffrrflr.exe 101 PID 404 wrote to memory of 3360 404 hhhbtt.exe 102 PID 404 wrote to memory of 3360 404 hhhbtt.exe 102 PID 404 wrote to memory of 3360 404 hhhbtt.exe 102 PID 3360 wrote to memory of 1328 3360 vjvjj.exe 103 PID 3360 wrote to memory of 1328 3360 vjvjj.exe 103 PID 3360 wrote to memory of 1328 3360 vjvjj.exe 103 PID 1328 wrote to memory of 4544 1328 rlxrffl.exe 104 PID 1328 wrote to memory of 4544 1328 rlxrffl.exe 104 PID 1328 wrote to memory of 4544 1328 rlxrffl.exe 104 PID 4544 wrote to memory of 952 4544 tnhbbh.exe 105 PID 4544 wrote to memory of 952 4544 tnhbbh.exe 105 PID 4544 wrote to memory of 952 4544 tnhbbh.exe 105 PID 952 wrote to memory of 4752 952 7djjv.exe 106 PID 952 wrote to memory of 4752 952 7djjv.exe 106 PID 952 wrote to memory of 4752 952 7djjv.exe 106 PID 4752 wrote to memory of 456 4752 xfxrlfx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a4bf3022561c2a5a22c0e234e99880N.exe"C:\Users\Admin\AppData\Local\Temp\c8a4bf3022561c2a5a22c0e234e99880N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
\??\c:\3tbnnn.exec:\3tbnnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
\??\c:\rrllfll.exec:\rrllfll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\xxfrrxf.exec:\xxfrrxf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\tnnhnh.exec:\tnnhnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\7llrrrr.exec:\7llrrrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\tnttbb.exec:\tnttbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\jjjjj.exec:\jjjjj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
\??\c:\xxxxrxx.exec:\xxxxrxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\thtttb.exec:\thtttb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
\??\c:\bnbtnt.exec:\bnbtnt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\pjppj.exec:\pjppj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
\??\c:\nhtbtt.exec:\nhtbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\nnttbb.exec:\nnttbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\djpvv.exec:\djpvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\ffrrflr.exec:\ffrrflr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\hhhbtt.exec:\hhhbtt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
\??\c:\vjvjj.exec:\vjvjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
\??\c:\rlxrffl.exec:\rlxrffl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
\??\c:\tnhbbh.exec:\tnhbbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\7djjv.exec:\7djjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\xfxrlfx.exec:\xfxrlfx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\xlxrrll.exec:\xlxrrll.exe23⤵
- Executes dropped EXE
PID:456 -
\??\c:\tnhhnn.exec:\tnhhnn.exe24⤵
- Executes dropped EXE
PID:4528 -
\??\c:\jvvpj.exec:\jvvpj.exe25⤵
- Executes dropped EXE
PID:3600 -
\??\c:\rfrflrx.exec:\rfrflrx.exe26⤵
- Executes dropped EXE
PID:3124 -
\??\c:\tbhnhn.exec:\tbhnhn.exe27⤵
- Executes dropped EXE
PID:1588 -
\??\c:\hbhbhh.exec:\hbhbhh.exe28⤵
- Executes dropped EXE
PID:4736 -
\??\c:\jdjdp.exec:\jdjdp.exe29⤵
- Executes dropped EXE
PID:2984 -
\??\c:\xrrxrlx.exec:\xrrxrlx.exe30⤵
- Executes dropped EXE
PID:3272 -
\??\c:\5ttnhh.exec:\5ttnhh.exe31⤵
- Executes dropped EXE
PID:1076 -
\??\c:\5nbnbh.exec:\5nbnbh.exe32⤵
- Executes dropped EXE
PID:2156 -
\??\c:\dvvvp.exec:\dvvvp.exe33⤵
- Executes dropped EXE
PID:1092 -
\??\c:\pddjv.exec:\pddjv.exe34⤵
- Executes dropped EXE
PID:4204 -
\??\c:\frxlxxr.exec:\frxlxxr.exe35⤵
- Executes dropped EXE
PID:3220 -
\??\c:\nbbbhh.exec:\nbbbhh.exe36⤵
- Executes dropped EXE
PID:5076 -
\??\c:\ppvvd.exec:\ppvvd.exe37⤵
- Executes dropped EXE
PID:4484 -
\??\c:\djdpd.exec:\djdpd.exe38⤵
- Executes dropped EXE
PID:2600 -
\??\c:\xxxrlfx.exec:\xxxrlfx.exe39⤵
- Executes dropped EXE
PID:4536 -
\??\c:\nhtttt.exec:\nhtttt.exe40⤵
- Executes dropped EXE
PID:4356 -
\??\c:\nhnnhh.exec:\nhnnhh.exe41⤵
- Executes dropped EXE
PID:2308 -
\??\c:\pdvpj.exec:\pdvpj.exe42⤵
- Executes dropped EXE
PID:2540 -
\??\c:\jdvpp.exec:\jdvpp.exe43⤵
- Executes dropped EXE
PID:4612 -
\??\c:\xrrrlll.exec:\xrrrlll.exe44⤵
- Executes dropped EXE
PID:4648 -
\??\c:\5xllfff.exec:\5xllfff.exe45⤵
- Executes dropped EXE
PID:2432 -
\??\c:\1ntntt.exec:\1ntntt.exe46⤵
- Executes dropped EXE
PID:1152 -
\??\c:\hbbbbb.exec:\hbbbbb.exe47⤵
- Executes dropped EXE
PID:1548 -
\??\c:\vddjj.exec:\vddjj.exe48⤵
- Executes dropped EXE
PID:4260 -
\??\c:\jdjjv.exec:\jdjjv.exe49⤵
- Executes dropped EXE
PID:2612 -
\??\c:\7fflrrr.exec:\7fflrrr.exe50⤵
- Executes dropped EXE
PID:4476 -
\??\c:\thhbtn.exec:\thhbtn.exe51⤵
- Executes dropped EXE
PID:1200 -
\??\c:\7bnhbt.exec:\7bnhbt.exe52⤵
- Executes dropped EXE
PID:4232 -
\??\c:\jppjv.exec:\jppjv.exe53⤵
- Executes dropped EXE
PID:2108 -
\??\c:\vdpjv.exec:\vdpjv.exe54⤵
- Executes dropped EXE
PID:1240 -
\??\c:\xrrxlll.exec:\xrrxlll.exe55⤵
- Executes dropped EXE
PID:4176 -
\??\c:\bttnnn.exec:\bttnnn.exe56⤵
- Executes dropped EXE
PID:3616 -
\??\c:\nhttbb.exec:\nhttbb.exe57⤵
- Executes dropped EXE
PID:640 -
\??\c:\vvvpj.exec:\vvvpj.exe58⤵
- Executes dropped EXE
PID:3552 -
\??\c:\3vdjj.exec:\3vdjj.exe59⤵
- Executes dropped EXE
PID:3088 -
\??\c:\rflfxxx.exec:\rflfxxx.exe60⤵
- Executes dropped EXE
PID:1156 -
\??\c:\3rfflrx.exec:\3rfflrx.exe61⤵
- Executes dropped EXE
PID:3348 -
\??\c:\hnttth.exec:\hnttth.exe62⤵
- Executes dropped EXE
PID:4884 -
\??\c:\pjvjd.exec:\pjvjd.exe63⤵
- Executes dropped EXE
PID:744 -
\??\c:\pvpjd.exec:\pvpjd.exe64⤵
- Executes dropped EXE
PID:1884 -
\??\c:\rxlxllf.exec:\rxlxllf.exe65⤵
- Executes dropped EXE
PID:1456 -
\??\c:\1lrrlxx.exec:\1lrrlxx.exe66⤵PID:1584
-
\??\c:\5ntbbb.exec:\5ntbbb.exe67⤵PID:1540
-
\??\c:\3nbthh.exec:\3nbthh.exe68⤵PID:2368
-
\??\c:\vvvvp.exec:\vvvvp.exe69⤵PID:1328
-
\??\c:\fxxxxxr.exec:\fxxxxxr.exe70⤵PID:1096
-
\??\c:\xrrxxff.exec:\xrrxxff.exe71⤵PID:4748
-
\??\c:\vvvvj.exec:\vvvvj.exe72⤵PID:4752
-
\??\c:\xxfxflx.exec:\xxfxflx.exe73⤵PID:3520
-
\??\c:\1hbtnh.exec:\1hbtnh.exe74⤵PID:3676
-
\??\c:\tnhbtt.exec:\tnhbtt.exe75⤵PID:4528
-
\??\c:\jdjjp.exec:\jdjjp.exe76⤵PID:1128
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe77⤵PID:1588
-
\??\c:\hbbbth.exec:\hbbbth.exe78⤵PID:836
-
\??\c:\1thbhh.exec:\1thbhh.exe79⤵PID:1480
-
\??\c:\ddpdp.exec:\ddpdp.exe80⤵PID:4008
-
\??\c:\rllflrl.exec:\rllflrl.exe81⤵PID:3272
-
\??\c:\5xxxrrl.exec:\5xxxrrl.exe82⤵PID:3248
-
\??\c:\nnbbtt.exec:\nnbbtt.exe83⤵PID:1580
-
\??\c:\hbbtnn.exec:\hbbtnn.exe84⤵PID:2156
-
\??\c:\pvpdv.exec:\pvpdv.exe85⤵PID:4808
-
\??\c:\xfxxrrr.exec:\xfxxrrr.exe86⤵PID:1728
-
\??\c:\nbbhhb.exec:\nbbhhb.exe87⤵PID:3196
-
\??\c:\nhnhtn.exec:\nhnhtn.exe88⤵PID:3372
-
\??\c:\3pjjd.exec:\3pjjd.exe89⤵PID:3376
-
\??\c:\rfrfffr.exec:\rfrfffr.exe90⤵PID:4348
-
\??\c:\xlrllff.exec:\xlrllff.exe91⤵PID:4144
-
\??\c:\hhhbtn.exec:\hhhbtn.exe92⤵PID:4404
-
\??\c:\pdvvv.exec:\pdvvv.exe93⤵PID:1352
-
\??\c:\1pdvj.exec:\1pdvj.exe94⤵PID:2512
-
\??\c:\frrfxxl.exec:\frrfxxl.exe95⤵PID:3916
-
\??\c:\lfflfff.exec:\lfflfff.exe96⤵PID:3392
-
\??\c:\ntnhbt.exec:\ntnhbt.exe97⤵PID:1152
-
\??\c:\7jvvv.exec:\7jvvv.exe98⤵PID:2720
-
\??\c:\fxllrrx.exec:\fxllrrx.exe99⤵PID:1612
-
\??\c:\5fxxrrr.exec:\5fxxrrr.exe100⤵PID:4304
-
\??\c:\1nnhht.exec:\1nnhht.exe101⤵PID:4476
-
\??\c:\9djjv.exec:\9djjv.exe102⤵PID:3024
-
\??\c:\vjvvv.exec:\vjvvv.exe103⤵PID:4232
-
\??\c:\xlfxrlx.exec:\xlfxrlx.exe104⤵PID:764
-
\??\c:\lfrlflf.exec:\lfrlflf.exe105⤵PID:1428
-
\??\c:\bbnnnb.exec:\bbnnnb.exe106⤵PID:4176
-
\??\c:\thnhbb.exec:\thnhbb.exe107⤵PID:3616
-
\??\c:\pjppd.exec:\pjppd.exe108⤵PID:5004
-
\??\c:\7rrlffr.exec:\7rrlffr.exe109⤵PID:3552
-
\??\c:\rfxrrrl.exec:\rfxrrrl.exe110⤵PID:3568
-
\??\c:\tbhbth.exec:\tbhbth.exe111⤵PID:1336
-
\??\c:\httttb.exec:\httttb.exe112⤵PID:3348
-
\??\c:\1pjdv.exec:\1pjdv.exe113⤵PID:4884
-
\??\c:\7dpjv.exec:\7dpjv.exe114⤵PID:744
-
\??\c:\5fxrlrl.exec:\5fxrlrl.exe115⤵PID:2232
-
\??\c:\3xxxxxr.exec:\3xxxxxr.exe116⤵PID:4820
-
\??\c:\httthb.exec:\httthb.exe117⤵PID:4272
-
\??\c:\ppjdj.exec:\ppjdj.exe118⤵PID:408
-
\??\c:\lfrlffx.exec:\lfrlffx.exe119⤵PID:2368
-
\??\c:\hbhtnn.exec:\hbhtnn.exe120⤵PID:1328
-
\??\c:\7nnhhn.exec:\7nnhhn.exe121⤵PID:1436
-
\??\c:\djdpj.exec:\djdpj.exe122⤵PID:3332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-