Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 22:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe
-
Size
590KB
-
MD5
dae53a0132d9fda7de89607ef5351d80
-
SHA1
f667d33a61c10a433acab11bb7e4717f358d2eac
-
SHA256
db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693a
-
SHA512
2aa4e87015e9b9d28933d913b302c15f99faf20dbba4864102579c38f34116475b4c8b5b2cf73c1d6945cd20fcf72813d4ee2d89209067229a8d15ff7fb4ce16
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayl:n3C9Lebz+xt4vFeFmgayl
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/408-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2420-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4268-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/972-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1776-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/344-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2548-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3916-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2796-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2076-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3452-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3980-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2248-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2896-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2960-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5048-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3080-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4188-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1748-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2900-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2928 1xxrrxx.exe 2900 tntttn.exe 4152 vpdvv.exe 2420 pjjdd.exe 4424 llfxrlf.exe 5068 nnnntt.exe 1748 9jjdv.exe 4188 lllfxxx.exe 3080 xfllxxf.exe 4840 hbbtbh.exe 5048 jvvvv.exe 2960 lflffxx.exe 4268 rlfxxrl.exe 2896 hhtnhn.exe 2248 1djdv.exe 3980 lfllffx.exe 3452 thhhhh.exe 2076 hbbttt.exe 2796 jdppj.exe 4672 rffxrxr.exe 3916 xfxrlff.exe 4556 hhnnnh.exe 4488 jjpjj.exe 344 1xrrllf.exe 2548 llrlfxx.exe 1776 tnnhhh.exe 1532 pdvvp.exe 1008 pjdjd.exe 972 rrfxxrx.exe 4976 bbbtnt.exe 2416 vpvpp.exe 3536 9pvdd.exe 872 flxfxxl.exe 3468 hbbtnn.exe 2940 ddjdd.exe 3764 9vdvp.exe 2908 rlrlffx.exe 4868 tnhhht.exe 2268 bbhbtt.exe 452 djppv.exe 1844 xxllrrx.exe 3984 3xrlffx.exe 5044 tttnnh.exe 2192 vvppv.exe 3880 xrxxfff.exe 3328 9llfxll.exe 3924 1nhbtt.exe 1368 jdjdp.exe 4364 1vddj.exe 4864 fflrlrl.exe 408 hbnhhh.exe 5060 hhhhbt.exe 4148 djjdv.exe 4600 rxfrffx.exe 1284 1bnhhh.exe 512 bhnhbh.exe 5108 vpdvp.exe 5068 bbbtth.exe 5032 jvdvp.exe 3652 5fllffx.exe 4824 xrxlxxr.exe 1680 nnhhbt.exe 2468 jdjdd.exe 1484 rxfxxxr.exe -
resource yara_rule behavioral2/memory/408-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2420-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4268-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/972-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1776-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/344-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2548-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4556-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3916-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2796-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3452-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2248-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2896-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2960-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5048-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3080-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4188-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1748-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2900-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-20-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9hnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnntbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllfxrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 2928 408 db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe 82 PID 408 wrote to memory of 2928 408 db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe 82 PID 408 wrote to memory of 2928 408 db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe 82 PID 2928 wrote to memory of 2900 2928 1xxrrxx.exe 83 PID 2928 wrote to memory of 2900 2928 1xxrrxx.exe 83 PID 2928 wrote to memory of 2900 2928 1xxrrxx.exe 83 PID 2900 wrote to memory of 4152 2900 tntttn.exe 84 PID 2900 wrote to memory of 4152 2900 tntttn.exe 84 PID 2900 wrote to memory of 4152 2900 tntttn.exe 84 PID 4152 wrote to memory of 2420 4152 vpdvv.exe 85 PID 4152 wrote to memory of 2420 4152 vpdvv.exe 85 PID 4152 wrote to memory of 2420 4152 vpdvv.exe 85 PID 2420 wrote to memory of 4424 2420 pjjdd.exe 86 PID 2420 wrote to memory of 4424 2420 pjjdd.exe 86 PID 2420 wrote to memory of 4424 2420 pjjdd.exe 86 PID 4424 wrote to memory of 5068 4424 llfxrlf.exe 139 PID 4424 wrote to memory of 5068 4424 llfxrlf.exe 139 PID 4424 wrote to memory of 5068 4424 llfxrlf.exe 139 PID 5068 wrote to memory of 1748 5068 nnnntt.exe 88 PID 5068 wrote to memory of 1748 5068 nnnntt.exe 88 PID 5068 wrote to memory of 1748 5068 nnnntt.exe 88 PID 1748 wrote to memory of 4188 1748 9jjdv.exe 89 PID 1748 wrote to memory of 4188 1748 9jjdv.exe 89 PID 1748 wrote to memory of 4188 1748 9jjdv.exe 89 PID 4188 wrote to memory of 3080 4188 lllfxxx.exe 90 PID 4188 wrote to memory of 3080 4188 lllfxxx.exe 90 PID 4188 wrote to memory of 3080 4188 lllfxxx.exe 90 PID 3080 wrote to memory of 4840 3080 xfllxxf.exe 91 PID 3080 wrote to memory of 4840 3080 xfllxxf.exe 91 PID 3080 wrote to memory of 4840 3080 xfllxxf.exe 91 PID 4840 wrote to memory of 5048 4840 hbbtbh.exe 92 PID 4840 wrote to memory of 5048 4840 hbbtbh.exe 92 PID 4840 wrote to memory of 5048 4840 hbbtbh.exe 92 PID 5048 wrote to memory of 2960 5048 jvvvv.exe 93 PID 5048 wrote to memory of 2960 5048 jvvvv.exe 93 PID 5048 wrote to memory of 2960 5048 jvvvv.exe 93 PID 2960 wrote to memory of 4268 2960 lflffxx.exe 147 PID 2960 wrote to memory of 4268 2960 lflffxx.exe 147 PID 2960 wrote to memory of 4268 2960 lflffxx.exe 147 PID 4268 wrote to memory of 2896 4268 rlfxxrl.exe 95 PID 4268 wrote to memory of 2896 4268 rlfxxrl.exe 95 PID 4268 wrote to memory of 2896 4268 rlfxxrl.exe 95 PID 2896 wrote to memory of 2248 2896 hhtnhn.exe 96 PID 2896 wrote to memory of 2248 2896 hhtnhn.exe 96 PID 2896 wrote to memory of 2248 2896 hhtnhn.exe 96 PID 2248 wrote to memory of 3980 2248 1djdv.exe 97 PID 2248 wrote to memory of 3980 2248 1djdv.exe 97 PID 2248 wrote to memory of 3980 2248 1djdv.exe 97 PID 3980 wrote to memory of 3452 3980 lfllffx.exe 98 PID 3980 wrote to memory of 3452 3980 lfllffx.exe 98 PID 3980 wrote to memory of 3452 3980 lfllffx.exe 98 PID 3452 wrote to memory of 2076 3452 thhhhh.exe 99 PID 3452 wrote to memory of 2076 3452 thhhhh.exe 99 PID 3452 wrote to memory of 2076 3452 thhhhh.exe 99 PID 2076 wrote to memory of 2796 2076 hbbttt.exe 100 PID 2076 wrote to memory of 2796 2076 hbbttt.exe 100 PID 2076 wrote to memory of 2796 2076 hbbttt.exe 100 PID 2796 wrote to memory of 4672 2796 jdppj.exe 101 PID 2796 wrote to memory of 4672 2796 jdppj.exe 101 PID 2796 wrote to memory of 4672 2796 jdppj.exe 101 PID 4672 wrote to memory of 3916 4672 rffxrxr.exe 102 PID 4672 wrote to memory of 3916 4672 rffxrxr.exe 102 PID 4672 wrote to memory of 3916 4672 rffxrxr.exe 102 PID 3916 wrote to memory of 4556 3916 xfxrlff.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe"C:\Users\Admin\AppData\Local\Temp\db7daee704fcb1f5c09a91eb100edf7487bf2cf7c450f147db7442658a0f693aN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:408 -
\??\c:\1xxrrxx.exec:\1xxrrxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\tntttn.exec:\tntttn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\vpdvv.exec:\vpdvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
\??\c:\pjjdd.exec:\pjjdd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\llfxrlf.exec:\llfxrlf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\nnnntt.exec:\nnnntt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\9jjdv.exec:\9jjdv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\lllfxxx.exec:\lllfxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
\??\c:\xfllxxf.exec:\xfllxxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\hbbtbh.exec:\hbbtbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\jvvvv.exec:\jvvvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
\??\c:\lflffxx.exec:\lflffxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\rlfxxrl.exec:\rlfxxrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
\??\c:\hhtnhn.exec:\hhtnhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\1djdv.exec:\1djdv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\lfllffx.exec:\lfllffx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
\??\c:\thhhhh.exec:\thhhhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
\??\c:\hbbttt.exec:\hbbttt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\jdppj.exec:\jdppj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\rffxrxr.exec:\rffxrxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\xfxrlff.exec:\xfxrlff.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
\??\c:\hhnnnh.exec:\hhnnnh.exe23⤵
- Executes dropped EXE
PID:4556 -
\??\c:\jjpjj.exec:\jjpjj.exe24⤵
- Executes dropped EXE
PID:4488 -
\??\c:\1xrrllf.exec:\1xrrllf.exe25⤵
- Executes dropped EXE
PID:344 -
\??\c:\llrlfxx.exec:\llrlfxx.exe26⤵
- Executes dropped EXE
PID:2548 -
\??\c:\tnnhhh.exec:\tnnhhh.exe27⤵
- Executes dropped EXE
PID:1776 -
\??\c:\pdvvp.exec:\pdvvp.exe28⤵
- Executes dropped EXE
PID:1532 -
\??\c:\pjdjd.exec:\pjdjd.exe29⤵
- Executes dropped EXE
PID:1008 -
\??\c:\rrfxxrx.exec:\rrfxxrx.exe30⤵
- Executes dropped EXE
PID:972 -
\??\c:\bbbtnt.exec:\bbbtnt.exe31⤵
- Executes dropped EXE
PID:4976 -
\??\c:\vpvpp.exec:\vpvpp.exe32⤵
- Executes dropped EXE
PID:2416 -
\??\c:\9pvdd.exec:\9pvdd.exe33⤵
- Executes dropped EXE
PID:3536 -
\??\c:\flxfxxl.exec:\flxfxxl.exe34⤵
- Executes dropped EXE
PID:872 -
\??\c:\hbbtnn.exec:\hbbtnn.exe35⤵
- Executes dropped EXE
PID:3468 -
\??\c:\ddjdd.exec:\ddjdd.exe36⤵
- Executes dropped EXE
PID:2940 -
\??\c:\9vdvp.exec:\9vdvp.exe37⤵
- Executes dropped EXE
PID:3764 -
\??\c:\rlrlffx.exec:\rlrlffx.exe38⤵
- Executes dropped EXE
PID:2908 -
\??\c:\tnhhht.exec:\tnhhht.exe39⤵
- Executes dropped EXE
PID:4868 -
\??\c:\bbhbtt.exec:\bbhbtt.exe40⤵
- Executes dropped EXE
PID:2268 -
\??\c:\djppv.exec:\djppv.exe41⤵
- Executes dropped EXE
PID:452 -
\??\c:\xxllrrx.exec:\xxllrrx.exe42⤵
- Executes dropped EXE
PID:1844 -
\??\c:\3xrlffx.exec:\3xrlffx.exe43⤵
- Executes dropped EXE
PID:3984 -
\??\c:\tttnnh.exec:\tttnnh.exe44⤵
- Executes dropped EXE
PID:5044 -
\??\c:\vvppv.exec:\vvppv.exe45⤵
- Executes dropped EXE
PID:2192 -
\??\c:\xrxxfff.exec:\xrxxfff.exe46⤵
- Executes dropped EXE
PID:3880 -
\??\c:\9llfxll.exec:\9llfxll.exe47⤵
- Executes dropped EXE
PID:3328 -
\??\c:\1nhbtt.exec:\1nhbtt.exe48⤵
- Executes dropped EXE
PID:3924 -
\??\c:\jdjdp.exec:\jdjdp.exe49⤵
- Executes dropped EXE
PID:1368 -
\??\c:\1vddj.exec:\1vddj.exe50⤵
- Executes dropped EXE
PID:4364 -
\??\c:\fflrlrl.exec:\fflrlrl.exe51⤵
- Executes dropped EXE
PID:4864 -
\??\c:\hbnhhh.exec:\hbnhhh.exe52⤵
- Executes dropped EXE
PID:408 -
\??\c:\hhhhbt.exec:\hhhhbt.exe53⤵
- Executes dropped EXE
PID:5060 -
\??\c:\djjdv.exec:\djjdv.exe54⤵
- Executes dropped EXE
PID:4148 -
\??\c:\rxfrffx.exec:\rxfrffx.exe55⤵
- Executes dropped EXE
PID:4600 -
\??\c:\1bnhhh.exec:\1bnhhh.exe56⤵
- Executes dropped EXE
PID:1284 -
\??\c:\bhnhbh.exec:\bhnhbh.exe57⤵
- Executes dropped EXE
PID:512 -
\??\c:\vpdvp.exec:\vpdvp.exe58⤵
- Executes dropped EXE
PID:5108 -
\??\c:\bbbtth.exec:\bbbtth.exe59⤵
- Executes dropped EXE
PID:5068 -
\??\c:\jvdvp.exec:\jvdvp.exe60⤵
- Executes dropped EXE
PID:5032 -
\??\c:\5fllffx.exec:\5fllffx.exe61⤵
- Executes dropped EXE
PID:3652 -
\??\c:\xrxlxxr.exec:\xrxlxxr.exe62⤵
- Executes dropped EXE
PID:4824 -
\??\c:\nnhhbt.exec:\nnhhbt.exe63⤵
- Executes dropped EXE
PID:1680 -
\??\c:\jdjdd.exec:\jdjdd.exe64⤵
- Executes dropped EXE
PID:2468 -
\??\c:\rxfxxxr.exec:\rxfxxxr.exe65⤵
- Executes dropped EXE
PID:1484 -
\??\c:\fxrlffx.exec:\fxrlffx.exe66⤵PID:3388
-
\??\c:\tbhbtt.exec:\tbhbtt.exe67⤵PID:4268
-
\??\c:\7pppp.exec:\7pppp.exe68⤵PID:5076
-
\??\c:\xlrxxxx.exec:\xlrxxxx.exe69⤵PID:2564
-
\??\c:\fffxrlf.exec:\fffxrlf.exe70⤵PID:1704
-
\??\c:\9nhhbb.exec:\9nhhbb.exe71⤵PID:2812
-
\??\c:\dppjd.exec:\dppjd.exe72⤵PID:2164
-
\??\c:\rxfxrrl.exec:\rxfxrrl.exe73⤵PID:3876
-
\??\c:\fflxxxr.exec:\fflxxxr.exe74⤵PID:2956
-
\??\c:\thntnh.exec:\thntnh.exe75⤵PID:4980
-
\??\c:\jdddd.exec:\jdddd.exe76⤵PID:4488
-
\??\c:\3xfrllf.exec:\3xfrllf.exe77⤵PID:1548
-
\??\c:\9ttnbb.exec:\9ttnbb.exe78⤵PID:2556
-
\??\c:\dvjpj.exec:\dvjpj.exe79⤵PID:1008
-
\??\c:\rrlffxx.exec:\rrlffxx.exe80⤵PID:2540
-
\??\c:\btnbhb.exec:\btnbhb.exe81⤵PID:3464
-
\??\c:\3vpjd.exec:\3vpjd.exe82⤵PID:2312
-
\??\c:\dvpjd.exec:\dvpjd.exe83⤵PID:2216
-
\??\c:\9frffxf.exec:\9frffxf.exe84⤵PID:3468
-
\??\c:\thhbbt.exec:\thhbbt.exe85⤵PID:2940
-
\??\c:\9pjdp.exec:\9pjdp.exe86⤵PID:4224
-
\??\c:\vvdvp.exec:\vvdvp.exe87⤵PID:4784
-
\??\c:\rxxrxxr.exec:\rxxrxxr.exe88⤵PID:2348
-
\??\c:\5tbttt.exec:\5tbttt.exe89⤵PID:3372
-
\??\c:\9hhhbt.exec:\9hhhbt.exe90⤵PID:960
-
\??\c:\pjppp.exec:\pjppp.exe91⤵PID:3748
-
\??\c:\fxlflfl.exec:\fxlflfl.exe92⤵PID:4836
-
\??\c:\7nnbtt.exec:\7nnbtt.exe93⤵PID:3328
-
\??\c:\hbhbtt.exec:\hbhbtt.exe94⤵PID:2464
-
\??\c:\pvvvp.exec:\pvvvp.exe95⤵PID:4412
-
\??\c:\xrlfxrl.exec:\xrlfxrl.exe96⤵PID:2628
-
\??\c:\bntnnh.exec:\bntnnh.exe97⤵PID:5104
-
\??\c:\9bbntt.exec:\9bbntt.exe98⤵PID:1628
-
\??\c:\jjpjd.exec:\jjpjd.exe99⤵PID:4356
-
\??\c:\lfffxxx.exec:\lfffxxx.exe100⤵PID:1136
-
\??\c:\xxllrrf.exec:\xxllrrf.exe101⤵PID:1268
-
\??\c:\9nnnnn.exec:\9nnnnn.exe102⤵PID:756
-
\??\c:\5djjd.exec:\5djjd.exe103⤵PID:4508
-
\??\c:\flrrffx.exec:\flrrffx.exe104⤵PID:3672
-
\??\c:\ppjvp.exec:\ppjvp.exe105⤵PID:316
-
\??\c:\lffffff.exec:\lffffff.exe106⤵PID:780
-
\??\c:\3nnnnn.exec:\3nnnnn.exe107⤵PID:1348
-
\??\c:\vvppv.exec:\vvppv.exe108⤵PID:1244
-
\??\c:\5xfxxxx.exec:\5xfxxxx.exe109⤵PID:4856
-
\??\c:\xrrlfxx.exec:\xrrlfxx.exe110⤵PID:2792
-
\??\c:\nnbtbt.exec:\nnbtbt.exe111⤵PID:2912
-
\??\c:\nhbnbt.exec:\nhbnbt.exe112⤵PID:4184
-
\??\c:\5tnbnh.exec:\5tnbnh.exe113⤵PID:2480
-
\??\c:\jdjjj.exec:\jdjjj.exe114⤵PID:3388
-
\??\c:\rlfxfxf.exec:\rlfxfxf.exe115⤵PID:4028
-
\??\c:\nbbbtt.exec:\nbbbtt.exe116⤵PID:4840
-
\??\c:\3htbtt.exec:\3htbtt.exe117⤵PID:3112
-
\??\c:\5djdd.exec:\5djdd.exe118⤵PID:3980
-
\??\c:\flxrlfx.exec:\flxrlfx.exe119⤵
- System Location Discovery: System Language Discovery
PID:324 -
\??\c:\htbtnh.exec:\htbtnh.exe120⤵PID:4676
-
\??\c:\vvjdd.exec:\vvjdd.exe121⤵PID:3548
-
\??\c:\hhhbth.exec:\hhhbth.exe122⤵PID:2076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-