Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe
-
Size
58KB
-
MD5
67848d081fcd57a681130b7fc7895c40
-
SHA1
078724efa39319e70427adad39056f59b61396de
-
SHA256
420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809
-
SHA512
a8a285015904318a13a70298509cab798f79abe9d3d3649e2c9e2ca10cf5416615b2d37201bf018f7052931f2c175cfb8bc2f9bcbdfff9bc204ba89d86ab8ff7
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfv781:ymb3NkkiQ3mdBjFIfvY1
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/2268-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4292-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2184-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2208-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1620-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2736-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1116-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3864-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2436-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4828-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1532-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1408-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1356-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3812-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3440-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4696-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4292 lxxllfx.exe 3416 7htnhb.exe 1636 ppjjp.exe 4352 vpdvp.exe 2184 lffrrrl.exe 2208 7hhhbb.exe 1620 3pdvj.exe 1796 frfxrrl.exe 2736 hhhhtt.exe 1116 5ppjv.exe 3864 3fxrlfx.exe 2144 tbtbhh.exe 2292 7hntnt.exe 4196 xrrrrll.exe 2788 rxlxxxx.exe 4672 htbnnb.exe 2436 lxxllxl.exe 4828 hbnnnn.exe 4364 vvddv.exe 1532 5pvjv.exe 2848 rrfxxxf.exe 3548 fxrlfxr.exe 1408 vvjpv.exe 1356 vppjd.exe 1604 lrxrxrr.exe 4172 tthbnn.exe 3812 hnnnnb.exe 3440 7jppd.exe 4796 lfxrllf.exe 496 lrxxflr.exe 4696 ttnhbt.exe 2516 7dvpj.exe 1012 djvdv.exe 3916 flxrllf.exe 3900 xfflrfl.exe 4744 hbnhbn.exe 2056 vpvvp.exe 3932 pjjdp.exe 4092 9rrxrll.exe 4340 3xxxxrr.exe 4772 vvdvj.exe 1464 flrfxxx.exe 4768 vpppd.exe 3928 9jpjv.exe 5092 frfxllf.exe 1344 rrlxlll.exe 4640 btbhhb.exe 372 djppv.exe 3700 1vpjv.exe 4620 jpddp.exe 2224 llfxrxr.exe 220 bnbhnb.exe 920 1djdd.exe 4052 1pvpd.exe 4824 rfxxrlf.exe 2736 rrxfrxx.exe 3332 tnhbbt.exe 4388 3bnhbb.exe 2204 vppvv.exe 4876 3llfxrl.exe 3076 fxxxxxf.exe 1840 lrlrxfr.exe 4328 9btnnh.exe 2788 tnbnnn.exe -
resource yara_rule behavioral2/memory/2268-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4292-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3416-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2208-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2208-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2208-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2208-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2736-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2736-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3864-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2436-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4828-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1532-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1408-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1356-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3812-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3440-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4696-213-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxffrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfxrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4292 2268 420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe 82 PID 2268 wrote to memory of 4292 2268 420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe 82 PID 2268 wrote to memory of 4292 2268 420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe 82 PID 4292 wrote to memory of 3416 4292 lxxllfx.exe 83 PID 4292 wrote to memory of 3416 4292 lxxllfx.exe 83 PID 4292 wrote to memory of 3416 4292 lxxllfx.exe 83 PID 3416 wrote to memory of 1636 3416 7htnhb.exe 84 PID 3416 wrote to memory of 1636 3416 7htnhb.exe 84 PID 3416 wrote to memory of 1636 3416 7htnhb.exe 84 PID 1636 wrote to memory of 4352 1636 ppjjp.exe 85 PID 1636 wrote to memory of 4352 1636 ppjjp.exe 85 PID 1636 wrote to memory of 4352 1636 ppjjp.exe 85 PID 4352 wrote to memory of 2184 4352 vpdvp.exe 86 PID 4352 wrote to memory of 2184 4352 vpdvp.exe 86 PID 4352 wrote to memory of 2184 4352 vpdvp.exe 86 PID 2184 wrote to memory of 2208 2184 lffrrrl.exe 87 PID 2184 wrote to memory of 2208 2184 lffrrrl.exe 87 PID 2184 wrote to memory of 2208 2184 lffrrrl.exe 87 PID 2208 wrote to memory of 1620 2208 7hhhbb.exe 88 PID 2208 wrote to memory of 1620 2208 7hhhbb.exe 88 PID 2208 wrote to memory of 1620 2208 7hhhbb.exe 88 PID 1620 wrote to memory of 1796 1620 3pdvj.exe 89 PID 1620 wrote to memory of 1796 1620 3pdvj.exe 89 PID 1620 wrote to memory of 1796 1620 3pdvj.exe 89 PID 1796 wrote to memory of 2736 1796 frfxrrl.exe 90 PID 1796 wrote to memory of 2736 1796 frfxrrl.exe 90 PID 1796 wrote to memory of 2736 1796 frfxrrl.exe 90 PID 2736 wrote to memory of 1116 2736 hhhhtt.exe 91 PID 2736 wrote to memory of 1116 2736 hhhhtt.exe 91 PID 2736 wrote to memory of 1116 2736 hhhhtt.exe 91 PID 1116 wrote to memory of 3864 1116 5ppjv.exe 92 PID 1116 wrote to memory of 3864 1116 5ppjv.exe 92 PID 1116 wrote to memory of 3864 1116 5ppjv.exe 92 PID 3864 wrote to memory of 2144 3864 3fxrlfx.exe 93 PID 3864 wrote to memory of 2144 3864 3fxrlfx.exe 93 PID 3864 wrote to memory of 2144 3864 3fxrlfx.exe 93 PID 2144 wrote to memory of 2292 2144 tbtbhh.exe 94 PID 2144 wrote to memory of 2292 2144 tbtbhh.exe 94 PID 2144 wrote to memory of 2292 2144 tbtbhh.exe 94 PID 2292 wrote to memory of 4196 2292 7hntnt.exe 95 PID 2292 wrote to memory of 4196 2292 7hntnt.exe 95 PID 2292 wrote to memory of 4196 2292 7hntnt.exe 95 PID 4196 wrote to memory of 2788 4196 xrrrrll.exe 96 PID 4196 wrote to memory of 2788 4196 xrrrrll.exe 96 PID 4196 wrote to memory of 2788 4196 xrrrrll.exe 96 PID 2788 wrote to memory of 4672 2788 rxlxxxx.exe 97 PID 2788 wrote to memory of 4672 2788 rxlxxxx.exe 97 PID 2788 wrote to memory of 4672 2788 rxlxxxx.exe 97 PID 4672 wrote to memory of 2436 4672 htbnnb.exe 98 PID 4672 wrote to memory of 2436 4672 htbnnb.exe 98 PID 4672 wrote to memory of 2436 4672 htbnnb.exe 98 PID 2436 wrote to memory of 4828 2436 lxxllxl.exe 99 PID 2436 wrote to memory of 4828 2436 lxxllxl.exe 99 PID 2436 wrote to memory of 4828 2436 lxxllxl.exe 99 PID 4828 wrote to memory of 4364 4828 hbnnnn.exe 100 PID 4828 wrote to memory of 4364 4828 hbnnnn.exe 100 PID 4828 wrote to memory of 4364 4828 hbnnnn.exe 100 PID 4364 wrote to memory of 1532 4364 vvddv.exe 101 PID 4364 wrote to memory of 1532 4364 vvddv.exe 101 PID 4364 wrote to memory of 1532 4364 vvddv.exe 101 PID 1532 wrote to memory of 2848 1532 5pvjv.exe 102 PID 1532 wrote to memory of 2848 1532 5pvjv.exe 102 PID 1532 wrote to memory of 2848 1532 5pvjv.exe 102 PID 2848 wrote to memory of 3548 2848 rrfxxxf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe"C:\Users\Admin\AppData\Local\Temp\420ee04e303d000e1ea91aa9790aac6bef2e96ec7c6375d212f34cc7b4e57809N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\lxxllfx.exec:\lxxllfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
\??\c:\7htnhb.exec:\7htnhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
\??\c:\ppjjp.exec:\ppjjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\vpdvp.exec:\vpdvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\lffrrrl.exec:\lffrrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\7hhhbb.exec:\7hhhbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\3pdvj.exec:\3pdvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\frfxrrl.exec:\frfxrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\hhhhtt.exec:\hhhhtt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\5ppjv.exec:\5ppjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\3fxrlfx.exec:\3fxrlfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\tbtbhh.exec:\tbtbhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\7hntnt.exec:\7hntnt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\xrrrrll.exec:\xrrrrll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
\??\c:\rxlxxxx.exec:\rxlxxxx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\htbnnb.exec:\htbnnb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\lxxllxl.exec:\lxxllxl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\hbnnnn.exec:\hbnnnn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\vvddv.exec:\vvddv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\5pvjv.exec:\5pvjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\rrfxxxf.exec:\rrfxxxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\fxrlfxr.exec:\fxrlfxr.exe23⤵
- Executes dropped EXE
PID:3548 -
\??\c:\vvjpv.exec:\vvjpv.exe24⤵
- Executes dropped EXE
PID:1408 -
\??\c:\vppjd.exec:\vppjd.exe25⤵
- Executes dropped EXE
PID:1356 -
\??\c:\lrxrxrr.exec:\lrxrxrr.exe26⤵
- Executes dropped EXE
PID:1604 -
\??\c:\tthbnn.exec:\tthbnn.exe27⤵
- Executes dropped EXE
PID:4172 -
\??\c:\hnnnnb.exec:\hnnnnb.exe28⤵
- Executes dropped EXE
PID:3812 -
\??\c:\7jppd.exec:\7jppd.exe29⤵
- Executes dropped EXE
PID:3440 -
\??\c:\lfxrllf.exec:\lfxrllf.exe30⤵
- Executes dropped EXE
PID:4796 -
\??\c:\lrxxflr.exec:\lrxxflr.exe31⤵
- Executes dropped EXE
PID:496 -
\??\c:\ttnhbt.exec:\ttnhbt.exe32⤵
- Executes dropped EXE
PID:4696 -
\??\c:\7dvpj.exec:\7dvpj.exe33⤵
- Executes dropped EXE
PID:2516 -
\??\c:\djvdv.exec:\djvdv.exe34⤵
- Executes dropped EXE
PID:1012 -
\??\c:\flxrllf.exec:\flxrllf.exe35⤵
- Executes dropped EXE
PID:3916 -
\??\c:\xfflrfl.exec:\xfflrfl.exe36⤵
- Executes dropped EXE
PID:3900 -
\??\c:\hbnhbn.exec:\hbnhbn.exe37⤵
- Executes dropped EXE
PID:4744 -
\??\c:\vpvvp.exec:\vpvvp.exe38⤵
- Executes dropped EXE
PID:2056 -
\??\c:\pjjdp.exec:\pjjdp.exe39⤵
- Executes dropped EXE
PID:3932 -
\??\c:\9rrxrll.exec:\9rrxrll.exe40⤵
- Executes dropped EXE
PID:4092 -
\??\c:\3xxxxrr.exec:\3xxxxrr.exe41⤵
- Executes dropped EXE
PID:4340 -
\??\c:\vvdvj.exec:\vvdvj.exe42⤵
- Executes dropped EXE
PID:4772 -
\??\c:\flrfxxx.exec:\flrfxxx.exe43⤵
- Executes dropped EXE
PID:1464 -
\??\c:\hbnntt.exec:\hbnntt.exe44⤵PID:4356
-
\??\c:\vpppd.exec:\vpppd.exe45⤵
- Executes dropped EXE
PID:4768 -
\??\c:\9jpjv.exec:\9jpjv.exe46⤵
- Executes dropped EXE
PID:3928 -
\??\c:\frfxllf.exec:\frfxllf.exe47⤵
- Executes dropped EXE
PID:5092 -
\??\c:\rrlxlll.exec:\rrlxlll.exe48⤵
- Executes dropped EXE
PID:1344 -
\??\c:\btbhhb.exec:\btbhhb.exe49⤵
- Executes dropped EXE
PID:4640 -
\??\c:\djppv.exec:\djppv.exe50⤵
- Executes dropped EXE
PID:372 -
\??\c:\1vpjv.exec:\1vpjv.exe51⤵
- Executes dropped EXE
PID:3700 -
\??\c:\jpddp.exec:\jpddp.exe52⤵
- Executes dropped EXE
PID:4620 -
\??\c:\llfxrxr.exec:\llfxrxr.exe53⤵
- Executes dropped EXE
PID:2224 -
\??\c:\bnbhnb.exec:\bnbhnb.exe54⤵
- Executes dropped EXE
PID:220 -
\??\c:\1djdd.exec:\1djdd.exe55⤵
- Executes dropped EXE
PID:920 -
\??\c:\1pvpd.exec:\1pvpd.exe56⤵
- Executes dropped EXE
PID:4052 -
\??\c:\rfxxrlf.exec:\rfxxrlf.exe57⤵
- Executes dropped EXE
PID:4824 -
\??\c:\rrxfrxx.exec:\rrxfrxx.exe58⤵
- Executes dropped EXE
PID:2736 -
\??\c:\tnhbbt.exec:\tnhbbt.exe59⤵
- Executes dropped EXE
PID:3332 -
\??\c:\3bnhbb.exec:\3bnhbb.exe60⤵
- Executes dropped EXE
PID:4388 -
\??\c:\vppvv.exec:\vppvv.exe61⤵
- Executes dropped EXE
PID:2204 -
\??\c:\3llfxrl.exec:\3llfxrl.exe62⤵
- Executes dropped EXE
PID:4876 -
\??\c:\fxxxxxf.exec:\fxxxxxf.exe63⤵
- Executes dropped EXE
PID:3076 -
\??\c:\lrlrxfr.exec:\lrlrxfr.exe64⤵
- Executes dropped EXE
PID:1840 -
\??\c:\9btnnh.exec:\9btnnh.exe65⤵
- Executes dropped EXE
PID:4328 -
\??\c:\tnbnnn.exec:\tnbnnn.exe66⤵
- Executes dropped EXE
PID:2788 -
\??\c:\vvpjj.exec:\vvpjj.exe67⤵PID:4188
-
\??\c:\lrrrllf.exec:\lrrrllf.exe68⤵PID:4520
-
\??\c:\lxflffx.exec:\lxflffx.exe69⤵PID:4672
-
\??\c:\5bbttt.exec:\5bbttt.exe70⤵PID:2296
-
\??\c:\jdpjp.exec:\jdpjp.exe71⤵PID:1108
-
\??\c:\jjjvd.exec:\jjjvd.exe72⤵PID:2592
-
\??\c:\9xxlffx.exec:\9xxlffx.exe73⤵PID:4364
-
\??\c:\lrrfxlf.exec:\lrrfxlf.exe74⤵PID:2716
-
\??\c:\nbbhbt.exec:\nbbhbt.exe75⤵PID:4432
-
\??\c:\pddvj.exec:\pddvj.exe76⤵PID:488
-
\??\c:\3djjj.exec:\3djjj.exe77⤵PID:3212
-
\??\c:\bnhbnh.exec:\bnhbnh.exe78⤵PID:1812
-
\??\c:\vvpvp.exec:\vvpvp.exe79⤵PID:2988
-
\??\c:\rrffffl.exec:\rrffffl.exe80⤵PID:1604
-
\??\c:\lflfllr.exec:\lflfllr.exe81⤵PID:4636
-
\??\c:\btttnn.exec:\btttnn.exe82⤵PID:3532
-
\??\c:\vjdvv.exec:\vjdvv.exe83⤵PID:3372
-
\??\c:\jvpjd.exec:\jvpjd.exe84⤵PID:4708
-
\??\c:\lrrlfxr.exec:\lrrlfxr.exe85⤵PID:1948
-
\??\c:\ttbtth.exec:\ttbtth.exe86⤵PID:4656
-
\??\c:\nhhbbb.exec:\nhhbbb.exe87⤵PID:2164
-
\??\c:\jvvvp.exec:\jvvvp.exe88⤵PID:3896
-
\??\c:\jjjjd.exec:\jjjjd.exe89⤵PID:4132
-
\??\c:\ffxlfxl.exec:\ffxlfxl.exe90⤵PID:4944
-
\??\c:\llfxrrf.exec:\llfxrrf.exe91⤵PID:4456
-
\??\c:\bnnhbt.exec:\bnnhbt.exe92⤵PID:2012
-
\??\c:\htbhbb.exec:\htbhbb.exe93⤵PID:2528
-
\??\c:\vjpjd.exec:\vjpjd.exe94⤵PID:1700
-
\??\c:\rfrfflr.exec:\rfrfflr.exe95⤵PID:1196
-
\??\c:\btnhnt.exec:\btnhnt.exe96⤵PID:4872
-
\??\c:\tnhthh.exec:\tnhthh.exe97⤵PID:3648
-
\??\c:\ddjvj.exec:\ddjvj.exe98⤵PID:4260
-
\??\c:\5djjv.exec:\5djjv.exe99⤵PID:4880
-
\??\c:\9rlffxr.exec:\9rlffxr.exe100⤵PID:2268
-
\??\c:\7rrlffx.exec:\7rrlffx.exe101⤵PID:4596
-
\??\c:\nhtnnn.exec:\nhtnnn.exe102⤵PID:4956
-
\??\c:\bttntt.exec:\bttntt.exe103⤵PID:4640
-
\??\c:\ddvpd.exec:\ddvpd.exe104⤵PID:372
-
\??\c:\fllrfxl.exec:\fllrfxl.exe105⤵PID:2628
-
\??\c:\1hbbtn.exec:\1hbbtn.exe106⤵PID:3092
-
\??\c:\7nbnhn.exec:\7nbnhn.exe107⤵PID:736
-
\??\c:\1pddv.exec:\1pddv.exe108⤵PID:4020
-
\??\c:\1ddvj.exec:\1ddvj.exe109⤵PID:4532
-
\??\c:\xlfxlfx.exec:\xlfxlfx.exe110⤵PID:2452
-
\??\c:\7flllfr.exec:\7flllfr.exe111⤵PID:4984
-
\??\c:\hbtbbn.exec:\hbtbbn.exe112⤵PID:1424
-
\??\c:\1vvvv.exec:\1vvvv.exe113⤵PID:4048
-
\??\c:\vdjdp.exec:\vdjdp.exe114⤵PID:2172
-
\??\c:\frlrlff.exec:\frlrlff.exe115⤵PID:3500
-
\??\c:\bbbnbn.exec:\bbbnbn.exe116⤵PID:4628
-
\??\c:\5tbbnn.exec:\5tbbnn.exe117⤵PID:2620
-
\??\c:\vddjj.exec:\vddjj.exe118⤵PID:2468
-
\??\c:\lfxxrff.exec:\lfxxrff.exe119⤵PID:4652
-
\??\c:\nhnnhh.exec:\nhnnhh.exe120⤵PID:5076
-
\??\c:\nnbthh.exec:\nnbthh.exe121⤵PID:3304
-
\??\c:\vdvdv.exec:\vdvdv.exe122⤵PID:3228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-