Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe
Resource
win7-20240903-en
General
-
Target
ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe
-
Size
71KB
-
MD5
bce7b4173095aa26c22b6b7a4e5bf640
-
SHA1
9da5826a23f13ae2aaf22d19a55276efcb5b366a
-
SHA256
ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81c
-
SHA512
2263bb2a9e4c4d36f77dc14b6c5696eb98982cbbdeb963fc6ee2a9a7bfc11c595d1e675cffdadfda37f8f5089698894ad3b3b46ed657fba0c69723e0644293fd
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUPqrDZ5RxfVK5DIp:ymb3NkkiQ3mdBjF0yUmrfVce
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4324-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5108-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4168-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1404-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3452-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/412-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1216-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5072-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1788-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4732-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/376-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3724-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/636-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1704-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3532-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1280-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4996-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3116-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1372-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3444-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3560 xrrlfxx.exe 5108 tbnhbt.exe 2912 1jjdd.exe 3432 fxxrlll.exe 4168 fxffffx.exe 1404 3nbtnn.exe 2400 nntthh.exe 3452 vvpjj.exe 1740 xlllrfx.exe 2508 nnhnnh.exe 412 3dppp.exe 1216 nnbbtt.exe 2444 pdvpp.exe 5072 xrrfxxx.exe 2980 5hbttt.exe 1788 nntttt.exe 4732 1vvpj.exe 376 lxfffrr.exe 3724 ntnhhb.exe 636 djppd.exe 936 djppj.exe 752 lrlfxxr.exe 1704 thtnhh.exe 4836 vpvpj.exe 3532 vpvvd.exe 1280 dvppj.exe 4996 fffxrlr.exe 3116 nbbbbb.exe 3276 5vjpv.exe 1372 hbbtht.exe 3444 bbtbtb.exe 1224 ddjvp.exe 1096 llrffff.exe 3940 bttttt.exe 2972 pjjdv.exe 1260 3rlffff.exe 4620 djvpj.exe 3800 9flrrrl.exe 1080 xrxrrxx.exe 3852 xfrrllr.exe 4380 bhhhhh.exe 2200 dppjd.exe 2528 vpdvd.exe 3392 tnhhbh.exe 2720 tthbtt.exe 1008 jppjd.exe 2248 xrrlffx.exe 4260 bhtthh.exe 3764 ntbnhh.exe 4368 1ddpj.exe 3104 dvvdv.exe 2352 fxllrxx.exe 2584 3lrxffr.exe 4448 hhnhnn.exe 3568 vpvdv.exe 2176 pjpjp.exe 4644 xrxrlrr.exe 3608 rrxxfff.exe 4624 bhnbhn.exe 3440 pppjd.exe 1464 vppvp.exe 2776 frlfxxx.exe 3996 tnnhnn.exe 1168 vpjvv.exe -
resource yara_rule behavioral2/memory/4324-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5108-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4168-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1404-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3452-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/412-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5072-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1788-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4732-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/376-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3724-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/636-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1704-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3532-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1280-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4996-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3116-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1372-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3444-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xffrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7llfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxffffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3560 4324 ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe 82 PID 4324 wrote to memory of 3560 4324 ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe 82 PID 4324 wrote to memory of 3560 4324 ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe 82 PID 3560 wrote to memory of 5108 3560 xrrlfxx.exe 83 PID 3560 wrote to memory of 5108 3560 xrrlfxx.exe 83 PID 3560 wrote to memory of 5108 3560 xrrlfxx.exe 83 PID 5108 wrote to memory of 2912 5108 tbnhbt.exe 84 PID 5108 wrote to memory of 2912 5108 tbnhbt.exe 84 PID 5108 wrote to memory of 2912 5108 tbnhbt.exe 84 PID 2912 wrote to memory of 3432 2912 1jjdd.exe 85 PID 2912 wrote to memory of 3432 2912 1jjdd.exe 85 PID 2912 wrote to memory of 3432 2912 1jjdd.exe 85 PID 3432 wrote to memory of 4168 3432 fxxrlll.exe 86 PID 3432 wrote to memory of 4168 3432 fxxrlll.exe 86 PID 3432 wrote to memory of 4168 3432 fxxrlll.exe 86 PID 4168 wrote to memory of 1404 4168 fxffffx.exe 87 PID 4168 wrote to memory of 1404 4168 fxffffx.exe 87 PID 4168 wrote to memory of 1404 4168 fxffffx.exe 87 PID 1404 wrote to memory of 2400 1404 3nbtnn.exe 88 PID 1404 wrote to memory of 2400 1404 3nbtnn.exe 88 PID 1404 wrote to memory of 2400 1404 3nbtnn.exe 88 PID 2400 wrote to memory of 3452 2400 nntthh.exe 89 PID 2400 wrote to memory of 3452 2400 nntthh.exe 89 PID 2400 wrote to memory of 3452 2400 nntthh.exe 89 PID 3452 wrote to memory of 1740 3452 vvpjj.exe 90 PID 3452 wrote to memory of 1740 3452 vvpjj.exe 90 PID 3452 wrote to memory of 1740 3452 vvpjj.exe 90 PID 1740 wrote to memory of 2508 1740 xlllrfx.exe 91 PID 1740 wrote to memory of 2508 1740 xlllrfx.exe 91 PID 1740 wrote to memory of 2508 1740 xlllrfx.exe 91 PID 2508 wrote to memory of 412 2508 nnhnnh.exe 92 PID 2508 wrote to memory of 412 2508 nnhnnh.exe 92 PID 2508 wrote to memory of 412 2508 nnhnnh.exe 92 PID 412 wrote to memory of 1216 412 3dppp.exe 93 PID 412 wrote to memory of 1216 412 3dppp.exe 93 PID 412 wrote to memory of 1216 412 3dppp.exe 93 PID 1216 wrote to memory of 2444 1216 nnbbtt.exe 94 PID 1216 wrote to memory of 2444 1216 nnbbtt.exe 94 PID 1216 wrote to memory of 2444 1216 nnbbtt.exe 94 PID 2444 wrote to memory of 5072 2444 pdvpp.exe 95 PID 2444 wrote to memory of 5072 2444 pdvpp.exe 95 PID 2444 wrote to memory of 5072 2444 pdvpp.exe 95 PID 5072 wrote to memory of 2980 5072 xrrfxxx.exe 96 PID 5072 wrote to memory of 2980 5072 xrrfxxx.exe 96 PID 5072 wrote to memory of 2980 5072 xrrfxxx.exe 96 PID 2980 wrote to memory of 1788 2980 5hbttt.exe 97 PID 2980 wrote to memory of 1788 2980 5hbttt.exe 97 PID 2980 wrote to memory of 1788 2980 5hbttt.exe 97 PID 1788 wrote to memory of 4732 1788 nntttt.exe 98 PID 1788 wrote to memory of 4732 1788 nntttt.exe 98 PID 1788 wrote to memory of 4732 1788 nntttt.exe 98 PID 4732 wrote to memory of 376 4732 1vvpj.exe 99 PID 4732 wrote to memory of 376 4732 1vvpj.exe 99 PID 4732 wrote to memory of 376 4732 1vvpj.exe 99 PID 376 wrote to memory of 3724 376 lxfffrr.exe 100 PID 376 wrote to memory of 3724 376 lxfffrr.exe 100 PID 376 wrote to memory of 3724 376 lxfffrr.exe 100 PID 3724 wrote to memory of 636 3724 ntnhhb.exe 101 PID 3724 wrote to memory of 636 3724 ntnhhb.exe 101 PID 3724 wrote to memory of 636 3724 ntnhhb.exe 101 PID 636 wrote to memory of 936 636 djppd.exe 102 PID 636 wrote to memory of 936 636 djppd.exe 102 PID 636 wrote to memory of 936 636 djppd.exe 102 PID 936 wrote to memory of 752 936 djppj.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe"C:\Users\Admin\AppData\Local\Temp\ccf3ce12f4536a6c7f818c8800ccb334f859ce737d2d7e12af1a3b34c3aca81cN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\xrrlfxx.exec:\xrrlfxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\tbnhbt.exec:\tbnhbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\1jjdd.exec:\1jjdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\fxxrlll.exec:\fxxrlll.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
\??\c:\fxffffx.exec:\fxffffx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
\??\c:\3nbtnn.exec:\3nbtnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\nntthh.exec:\nntthh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\vvpjj.exec:\vvpjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
\??\c:\xlllrfx.exec:\xlllrfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\nnhnnh.exec:\nnhnnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\3dppp.exec:\3dppp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
\??\c:\nnbbtt.exec:\nnbbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\pdvpp.exec:\pdvpp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\xrrfxxx.exec:\xrrfxxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\5hbttt.exec:\5hbttt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\nntttt.exec:\nntttt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\1vvpj.exec:\1vvpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\lxfffrr.exec:\lxfffrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\ntnhhb.exec:\ntnhhb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\djppd.exec:\djppd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
\??\c:\djppj.exec:\djppj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
\??\c:\lrlfxxr.exec:\lrlfxxr.exe23⤵
- Executes dropped EXE
PID:752 -
\??\c:\thtnhh.exec:\thtnhh.exe24⤵
- Executes dropped EXE
PID:1704 -
\??\c:\vpvpj.exec:\vpvpj.exe25⤵
- Executes dropped EXE
PID:4836 -
\??\c:\vpvvd.exec:\vpvvd.exe26⤵
- Executes dropped EXE
PID:3532 -
\??\c:\dvppj.exec:\dvppj.exe27⤵
- Executes dropped EXE
PID:1280 -
\??\c:\fffxrlr.exec:\fffxrlr.exe28⤵
- Executes dropped EXE
PID:4996 -
\??\c:\nbbbbb.exec:\nbbbbb.exe29⤵
- Executes dropped EXE
PID:3116 -
\??\c:\5vjpv.exec:\5vjpv.exe30⤵
- Executes dropped EXE
PID:3276 -
\??\c:\hbbtht.exec:\hbbtht.exe31⤵
- Executes dropped EXE
PID:1372 -
\??\c:\bbtbtb.exec:\bbtbtb.exe32⤵
- Executes dropped EXE
PID:3444 -
\??\c:\ddjvp.exec:\ddjvp.exe33⤵
- Executes dropped EXE
PID:1224 -
\??\c:\llrffff.exec:\llrffff.exe34⤵
- Executes dropped EXE
PID:1096 -
\??\c:\bttttt.exec:\bttttt.exe35⤵
- Executes dropped EXE
PID:3940 -
\??\c:\pjjdv.exec:\pjjdv.exe36⤵
- Executes dropped EXE
PID:2972 -
\??\c:\3rlffff.exec:\3rlffff.exe37⤵
- Executes dropped EXE
PID:1260 -
\??\c:\djvpj.exec:\djvpj.exe38⤵
- Executes dropped EXE
PID:4620 -
\??\c:\9flrrrl.exec:\9flrrrl.exe39⤵
- Executes dropped EXE
PID:3800 -
\??\c:\xrxrrxx.exec:\xrxrrxx.exe40⤵
- Executes dropped EXE
PID:1080 -
\??\c:\xfrrllr.exec:\xfrrllr.exe41⤵
- Executes dropped EXE
PID:3852 -
\??\c:\bhhhhh.exec:\bhhhhh.exe42⤵
- Executes dropped EXE
PID:4380 -
\??\c:\dppjd.exec:\dppjd.exe43⤵
- Executes dropped EXE
PID:2200 -
\??\c:\vpdvd.exec:\vpdvd.exe44⤵
- Executes dropped EXE
PID:2528 -
\??\c:\tnhhbh.exec:\tnhhbh.exe45⤵
- Executes dropped EXE
PID:3392 -
\??\c:\tthbtt.exec:\tthbtt.exe46⤵
- Executes dropped EXE
PID:2720 -
\??\c:\jppjd.exec:\jppjd.exe47⤵
- Executes dropped EXE
PID:1008 -
\??\c:\xrrlffx.exec:\xrrlffx.exe48⤵
- Executes dropped EXE
PID:2248 -
\??\c:\bhtthh.exec:\bhtthh.exe49⤵
- Executes dropped EXE
PID:4260 -
\??\c:\ntbnhh.exec:\ntbnhh.exe50⤵
- Executes dropped EXE
PID:3764 -
\??\c:\1ddpj.exec:\1ddpj.exe51⤵
- Executes dropped EXE
PID:4368 -
\??\c:\dvvdv.exec:\dvvdv.exe52⤵
- Executes dropped EXE
PID:3104 -
\??\c:\fxllrxx.exec:\fxllrxx.exe53⤵
- Executes dropped EXE
PID:2352 -
\??\c:\3lrxffr.exec:\3lrxffr.exe54⤵
- Executes dropped EXE
PID:2584 -
\??\c:\hhnhnn.exec:\hhnhnn.exe55⤵
- Executes dropped EXE
PID:4448 -
\??\c:\vpvdv.exec:\vpvdv.exe56⤵
- Executes dropped EXE
PID:3568 -
\??\c:\pjpjp.exec:\pjpjp.exe57⤵
- Executes dropped EXE
PID:2176 -
\??\c:\xrxrlrr.exec:\xrxrlrr.exe58⤵
- Executes dropped EXE
PID:4644 -
\??\c:\rrxxfff.exec:\rrxxfff.exe59⤵
- Executes dropped EXE
PID:3608 -
\??\c:\bhnbhn.exec:\bhnbhn.exe60⤵
- Executes dropped EXE
PID:4624 -
\??\c:\pppjd.exec:\pppjd.exe61⤵
- Executes dropped EXE
PID:3440 -
\??\c:\vppvp.exec:\vppvp.exe62⤵
- Executes dropped EXE
PID:1464 -
\??\c:\frlfxxx.exec:\frlfxxx.exe63⤵
- Executes dropped EXE
PID:2776 -
\??\c:\tnnhnn.exec:\tnnhnn.exe64⤵
- Executes dropped EXE
PID:3996 -
\??\c:\vpjvv.exec:\vpjvv.exe65⤵
- Executes dropped EXE
PID:1168 -
\??\c:\dpvvj.exec:\dpvvj.exe66⤵PID:2508
-
\??\c:\lrrrffx.exec:\lrrrffx.exe67⤵PID:2296
-
\??\c:\bnnhtt.exec:\bnnhtt.exe68⤵PID:1012
-
\??\c:\djdvj.exec:\djdvj.exe69⤵PID:4596
-
\??\c:\pjjjv.exec:\pjjjv.exe70⤵PID:232
-
\??\c:\7rrrlff.exec:\7rrrlff.exe71⤵PID:1468
-
\??\c:\lfllrrf.exec:\lfllrrf.exe72⤵PID:1588
-
\??\c:\9btthh.exec:\9btthh.exe73⤵PID:1848
-
\??\c:\9bnbtn.exec:\9bnbtn.exe74⤵PID:3236
-
\??\c:\jddvv.exec:\jddvv.exe75⤵PID:4296
-
\??\c:\9rfxfff.exec:\9rfxfff.exe76⤵PID:2732
-
\??\c:\7llfxxx.exec:\7llfxxx.exe77⤵PID:4840
-
\??\c:\9hnnhh.exec:\9hnnhh.exe78⤵PID:1756
-
\??\c:\nhbthb.exec:\nhbthb.exe79⤵PID:3356
-
\??\c:\jvvpd.exec:\jvvpd.exe80⤵PID:2500
-
\??\c:\rlrlxrf.exec:\rlrlxrf.exe81⤵PID:936
-
\??\c:\3fxfxxr.exec:\3fxfxxr.exe82⤵PID:1864
-
\??\c:\nhhnbn.exec:\nhhnbn.exe83⤵PID:924
-
\??\c:\3nhtnn.exec:\3nhtnn.exe84⤵PID:2448
-
\??\c:\vjpjv.exec:\vjpjv.exe85⤵PID:3096
-
\??\c:\lrlxrll.exec:\lrlxrll.exe86⤵PID:2156
-
\??\c:\rffrllf.exec:\rffrllf.exe87⤵PID:1748
-
\??\c:\xffxllx.exec:\xffxllx.exe88⤵PID:540
-
\??\c:\nhttnt.exec:\nhttnt.exe89⤵PID:5012
-
\??\c:\tbbhbb.exec:\tbbhbb.exe90⤵PID:3640
-
\??\c:\3ddvp.exec:\3ddvp.exe91⤵PID:4736
-
\??\c:\ffflxrl.exec:\ffflxrl.exe92⤵PID:888
-
\??\c:\bhnhbb.exec:\bhnhbb.exe93⤵PID:1308
-
\??\c:\tntbnt.exec:\tntbnt.exe94⤵PID:1656
-
\??\c:\jdpjd.exec:\jdpjd.exe95⤵PID:3436
-
\??\c:\vddjd.exec:\vddjd.exe96⤵PID:2060
-
\??\c:\lxlllfx.exec:\lxlllfx.exe97⤵PID:2132
-
\??\c:\rrxxffl.exec:\rrxxffl.exe98⤵PID:2972
-
\??\c:\tnbhtn.exec:\tnbhtn.exe99⤵PID:3988
-
\??\c:\djjdp.exec:\djjdp.exe100⤵PID:868
-
\??\c:\rflrllf.exec:\rflrllf.exe101⤵PID:628
-
\??\c:\fxlfffl.exec:\fxlfffl.exe102⤵PID:4212
-
\??\c:\bnbnhn.exec:\bnbnhn.exe103⤵PID:876
-
\??\c:\3jpdv.exec:\3jpdv.exe104⤵PID:4536
-
\??\c:\pvvdj.exec:\pvvdj.exe105⤵PID:1176
-
\??\c:\rfrfffx.exec:\rfrfffx.exe106⤵PID:2620
-
\??\c:\ffxxllf.exec:\ffxxllf.exe107⤵PID:5004
-
\??\c:\bnntnt.exec:\bnntnt.exe108⤵PID:2472
-
\??\c:\7ddvj.exec:\7ddvj.exe109⤵PID:1844
-
\??\c:\1ddpj.exec:\1ddpj.exe110⤵PID:4324
-
\??\c:\dvppv.exec:\dvppv.exe111⤵PID:3560
-
\??\c:\llllffr.exec:\llllffr.exe112⤵PID:3008
-
\??\c:\bhtnhb.exec:\bhtnhb.exe113⤵PID:1636
-
\??\c:\nbbtnn.exec:\nbbtnn.exe114⤵PID:2272
-
\??\c:\xrxlrlr.exec:\xrxlrlr.exe115⤵PID:768
-
\??\c:\rfxxrrl.exec:\rfxxrrl.exe116⤵PID:808
-
\??\c:\tnnbtn.exec:\tnnbtn.exe117⤵PID:2380
-
\??\c:\hnnbbb.exec:\hnnbbb.exe118⤵PID:3604
-
\??\c:\7dpjd.exec:\7dpjd.exe119⤵PID:3500
-
\??\c:\pjjvj.exec:\pjjvj.exe120⤵PID:3064
-
\??\c:\9xxlfxl.exec:\9xxlfxl.exe121⤵PID:3544
-
\??\c:\llllfxf.exec:\llllfxf.exe122⤵PID:3540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-