Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 01:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe
-
Size
71KB
-
MD5
3548a2c2431576b582b6f4f3451b6737
-
SHA1
2df1c2ff8bd949bc0e1b52c3809ab8bb4b5c6e4a
-
SHA256
bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a
-
SHA512
09e8d661bfd090a5e7318c6d88491176975c10ac77397140e2a472fb17f4df3b690c39ed9e5d12762d0c20e37909961b725244a5627677a38bf51b929367be91
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfju+:ymb3NkkiQ3mdBjFI4Vt
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
resource yara_rule behavioral2/memory/5040-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5176-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/6044-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5508-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2484-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2600-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5536-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1324-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2712-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5984-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/6016-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/6100-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5804-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5892-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5640-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5888-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4540-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2708-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5760-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2988-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3928-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1180-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2340 rrffxxx.exe 6044 hnhhhh.exe 5176 hhntnn.exe 5508 pdddd.exe 3944 xflfffr.exe 2484 bbnhhh.exe 2600 bthbbb.exe 4860 pjppp.exe 5536 vjvvj.exe 1324 1flflrr.exe 2712 ttttbb.exe 4400 vvvvv.exe 5984 rrxxxrr.exe 6016 bhttbb.exe 4412 jjjjd.exe 6100 fxfffff.exe 5804 lffxxxr.exe 5892 btbbbh.exe 5640 5vpvj.exe 5888 rrxrlll.exe 5904 rlrlllr.exe 4688 thntnt.exe 4540 djppp.exe 2708 jjjjj.exe 1580 fffffxf.exe 3928 fflllll.exe 5760 bbbhhh.exe 2988 bhnntb.exe 4556 vvdvv.exe 1180 rrxxfff.exe 4584 9xffffl.exe 5220 5tbbtt.exe 1028 vvjjv.exe 4384 vpvpp.exe 1292 rlrrlrr.exe 5256 llrrrxf.exe 3660 pjjdv.exe 2372 rllxflf.exe 4240 jvjpv.exe 1920 rfllfxr.exe 5452 jjvvj.exe 5752 9nhbbh.exe 3224 3hbttt.exe 3040 hthhhh.exe 2828 ppppp.exe 2336 bnhbbh.exe 2688 nnbbbh.exe 3864 jvpjd.exe 4388 dpdjd.exe 4616 flxrrrr.exe 5364 lxlxxff.exe 948 bbhbbh.exe 5468 dddjd.exe 2100 3vvpj.exe 4852 llrrlll.exe 908 nhtttt.exe 5392 7hnhhh.exe 1116 dpdvp.exe 1876 jdppp.exe 1156 rrrrflf.exe 3204 tttnnn.exe 5748 nbnnhn.exe 1880 jpdjp.exe 2432 nnbttb.exe -
resource yara_rule behavioral2/memory/5040-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5176-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/6044-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5508-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2484-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2600-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2600-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5536-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1324-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1324-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1324-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5536-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1324-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2712-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5984-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/6016-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/6100-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5804-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5892-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5640-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5888-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4540-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2708-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5760-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2988-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3928-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4556-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1180-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fxxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrlxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 2340 5040 bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe 84 PID 5040 wrote to memory of 2340 5040 bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe 84 PID 5040 wrote to memory of 2340 5040 bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe 84 PID 2340 wrote to memory of 6044 2340 rrffxxx.exe 85 PID 2340 wrote to memory of 6044 2340 rrffxxx.exe 85 PID 2340 wrote to memory of 6044 2340 rrffxxx.exe 85 PID 6044 wrote to memory of 5176 6044 hnhhhh.exe 86 PID 6044 wrote to memory of 5176 6044 hnhhhh.exe 86 PID 6044 wrote to memory of 5176 6044 hnhhhh.exe 86 PID 5176 wrote to memory of 5508 5176 hhntnn.exe 87 PID 5176 wrote to memory of 5508 5176 hhntnn.exe 87 PID 5176 wrote to memory of 5508 5176 hhntnn.exe 87 PID 5508 wrote to memory of 3944 5508 pdddd.exe 88 PID 5508 wrote to memory of 3944 5508 pdddd.exe 88 PID 5508 wrote to memory of 3944 5508 pdddd.exe 88 PID 3944 wrote to memory of 2484 3944 xflfffr.exe 89 PID 3944 wrote to memory of 2484 3944 xflfffr.exe 89 PID 3944 wrote to memory of 2484 3944 xflfffr.exe 89 PID 2484 wrote to memory of 2600 2484 bbnhhh.exe 90 PID 2484 wrote to memory of 2600 2484 bbnhhh.exe 90 PID 2484 wrote to memory of 2600 2484 bbnhhh.exe 90 PID 2600 wrote to memory of 4860 2600 bthbbb.exe 91 PID 2600 wrote to memory of 4860 2600 bthbbb.exe 91 PID 2600 wrote to memory of 4860 2600 bthbbb.exe 91 PID 4860 wrote to memory of 5536 4860 pjppp.exe 92 PID 4860 wrote to memory of 5536 4860 pjppp.exe 92 PID 4860 wrote to memory of 5536 4860 pjppp.exe 92 PID 5536 wrote to memory of 1324 5536 vjvvj.exe 93 PID 5536 wrote to memory of 1324 5536 vjvvj.exe 93 PID 5536 wrote to memory of 1324 5536 vjvvj.exe 93 PID 1324 wrote to memory of 2712 1324 1flflrr.exe 94 PID 1324 wrote to memory of 2712 1324 1flflrr.exe 94 PID 1324 wrote to memory of 2712 1324 1flflrr.exe 94 PID 2712 wrote to memory of 4400 2712 ttttbb.exe 95 PID 2712 wrote to memory of 4400 2712 ttttbb.exe 95 PID 2712 wrote to memory of 4400 2712 ttttbb.exe 95 PID 4400 wrote to memory of 5984 4400 vvvvv.exe 96 PID 4400 wrote to memory of 5984 4400 vvvvv.exe 96 PID 4400 wrote to memory of 5984 4400 vvvvv.exe 96 PID 5984 wrote to memory of 6016 5984 rrxxxrr.exe 97 PID 5984 wrote to memory of 6016 5984 rrxxxrr.exe 97 PID 5984 wrote to memory of 6016 5984 rrxxxrr.exe 97 PID 6016 wrote to memory of 4412 6016 bhttbb.exe 98 PID 6016 wrote to memory of 4412 6016 bhttbb.exe 98 PID 6016 wrote to memory of 4412 6016 bhttbb.exe 98 PID 4412 wrote to memory of 6100 4412 jjjjd.exe 99 PID 4412 wrote to memory of 6100 4412 jjjjd.exe 99 PID 4412 wrote to memory of 6100 4412 jjjjd.exe 99 PID 6100 wrote to memory of 5804 6100 fxfffff.exe 100 PID 6100 wrote to memory of 5804 6100 fxfffff.exe 100 PID 6100 wrote to memory of 5804 6100 fxfffff.exe 100 PID 5804 wrote to memory of 5892 5804 lffxxxr.exe 101 PID 5804 wrote to memory of 5892 5804 lffxxxr.exe 101 PID 5804 wrote to memory of 5892 5804 lffxxxr.exe 101 PID 5892 wrote to memory of 5640 5892 btbbbh.exe 102 PID 5892 wrote to memory of 5640 5892 btbbbh.exe 102 PID 5892 wrote to memory of 5640 5892 btbbbh.exe 102 PID 5640 wrote to memory of 5888 5640 5vpvj.exe 103 PID 5640 wrote to memory of 5888 5640 5vpvj.exe 103 PID 5640 wrote to memory of 5888 5640 5vpvj.exe 103 PID 5888 wrote to memory of 5904 5888 rrxrlll.exe 104 PID 5888 wrote to memory of 5904 5888 rrxrlll.exe 104 PID 5888 wrote to memory of 5904 5888 rrxrlll.exe 104 PID 5904 wrote to memory of 4688 5904 rlrlllr.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe"C:\Users\Admin\AppData\Local\Temp\bf871211542a3cb50a9416e388d28faf054e283471fac6eb2aef50cfe81a133a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\rrffxxx.exec:\rrffxxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\hnhhhh.exec:\hnhhhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6044 -
\??\c:\hhntnn.exec:\hhntnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5176 -
\??\c:\pdddd.exec:\pdddd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5508 -
\??\c:\xflfffr.exec:\xflfffr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
\??\c:\bbnhhh.exec:\bbnhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\bthbbb.exec:\bthbbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\pjppp.exec:\pjppp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\vjvvj.exec:\vjvvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5536 -
\??\c:\1flflrr.exec:\1flflrr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\ttttbb.exec:\ttttbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\vvvvv.exec:\vvvvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
\??\c:\rrxxxrr.exec:\rrxxxrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5984 -
\??\c:\bhttbb.exec:\bhttbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6016 -
\??\c:\jjjjd.exec:\jjjjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\fxfffff.exec:\fxfffff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:6100 -
\??\c:\lffxxxr.exec:\lffxxxr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5804 -
\??\c:\btbbbh.exec:\btbbbh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5892 -
\??\c:\5vpvj.exec:\5vpvj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5640 -
\??\c:\rrxrlll.exec:\rrxrlll.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5888 -
\??\c:\rlrlllr.exec:\rlrlllr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5904 -
\??\c:\thntnt.exec:\thntnt.exe23⤵
- Executes dropped EXE
PID:4688 -
\??\c:\djppp.exec:\djppp.exe24⤵
- Executes dropped EXE
PID:4540 -
\??\c:\jjjjj.exec:\jjjjj.exe25⤵
- Executes dropped EXE
PID:2708 -
\??\c:\fffffxf.exec:\fffffxf.exe26⤵
- Executes dropped EXE
PID:1580 -
\??\c:\fflllll.exec:\fflllll.exe27⤵
- Executes dropped EXE
PID:3928 -
\??\c:\bbbhhh.exec:\bbbhhh.exe28⤵
- Executes dropped EXE
PID:5760 -
\??\c:\bhnntb.exec:\bhnntb.exe29⤵
- Executes dropped EXE
PID:2988 -
\??\c:\vvdvv.exec:\vvdvv.exe30⤵
- Executes dropped EXE
PID:4556 -
\??\c:\rrxxfff.exec:\rrxxfff.exe31⤵
- Executes dropped EXE
PID:1180 -
\??\c:\9xffffl.exec:\9xffffl.exe32⤵
- Executes dropped EXE
PID:4584 -
\??\c:\5tbbtt.exec:\5tbbtt.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5220 -
\??\c:\vvjjv.exec:\vvjjv.exe34⤵
- Executes dropped EXE
PID:1028 -
\??\c:\vpvpp.exec:\vpvpp.exe35⤵
- Executes dropped EXE
PID:4384 -
\??\c:\rlrrlrr.exec:\rlrrlrr.exe36⤵
- Executes dropped EXE
PID:1292 -
\??\c:\llrrrxf.exec:\llrrrxf.exe37⤵
- Executes dropped EXE
PID:5256 -
\??\c:\pjjdv.exec:\pjjdv.exe38⤵
- Executes dropped EXE
PID:3660 -
\??\c:\rllxflf.exec:\rllxflf.exe39⤵
- Executes dropped EXE
PID:2372 -
\??\c:\jvjpv.exec:\jvjpv.exe40⤵
- Executes dropped EXE
PID:4240 -
\??\c:\rfllfxr.exec:\rfllfxr.exe41⤵
- Executes dropped EXE
PID:1920 -
\??\c:\jjvvj.exec:\jjvvj.exe42⤵
- Executes dropped EXE
PID:5452 -
\??\c:\9nhbbh.exec:\9nhbbh.exe43⤵
- Executes dropped EXE
PID:5752 -
\??\c:\3hbttt.exec:\3hbttt.exe44⤵
- Executes dropped EXE
PID:3224 -
\??\c:\hthhhh.exec:\hthhhh.exe45⤵
- Executes dropped EXE
PID:3040 -
\??\c:\ppppp.exec:\ppppp.exe46⤵
- Executes dropped EXE
PID:2828 -
\??\c:\bnhbbh.exec:\bnhbbh.exe47⤵
- Executes dropped EXE
PID:2336 -
\??\c:\nnbbbh.exec:\nnbbbh.exe48⤵
- Executes dropped EXE
PID:2688 -
\??\c:\jvpjd.exec:\jvpjd.exe49⤵
- Executes dropped EXE
PID:3864 -
\??\c:\dpdjd.exec:\dpdjd.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388 -
\??\c:\flxrrrr.exec:\flxrrrr.exe51⤵
- Executes dropped EXE
PID:4616 -
\??\c:\lxlxxff.exec:\lxlxxff.exe52⤵
- Executes dropped EXE
PID:5364 -
\??\c:\bbhbbh.exec:\bbhbbh.exe53⤵
- Executes dropped EXE
PID:948 -
\??\c:\dddjd.exec:\dddjd.exe54⤵
- Executes dropped EXE
PID:5468 -
\??\c:\3vvpj.exec:\3vvpj.exe55⤵
- Executes dropped EXE
PID:2100 -
\??\c:\llrrlll.exec:\llrrlll.exe56⤵
- Executes dropped EXE
PID:4852 -
\??\c:\nhtttt.exec:\nhtttt.exe57⤵
- Executes dropped EXE
PID:908 -
\??\c:\7hnhhh.exec:\7hnhhh.exe58⤵
- Executes dropped EXE
PID:5392 -
\??\c:\dpdvp.exec:\dpdvp.exe59⤵
- Executes dropped EXE
PID:1116 -
\??\c:\jdppp.exec:\jdppp.exe60⤵
- Executes dropped EXE
PID:1876 -
\??\c:\rrrrflf.exec:\rrrrflf.exe61⤵
- Executes dropped EXE
PID:1156 -
\??\c:\tttnnn.exec:\tttnnn.exe62⤵
- Executes dropped EXE
PID:3204 -
\??\c:\nbnnhn.exec:\nbnnhn.exe63⤵
- Executes dropped EXE
PID:5748 -
\??\c:\jpdjp.exec:\jpdjp.exe64⤵
- Executes dropped EXE
PID:1880 -
\??\c:\nnbttb.exec:\nnbttb.exe65⤵
- Executes dropped EXE
PID:2432 -
\??\c:\bnhhhn.exec:\bnhhhn.exe66⤵PID:3952
-
\??\c:\vvdpj.exec:\vvdpj.exe67⤵PID:2760
-
\??\c:\ddjjd.exec:\ddjjd.exe68⤵PID:3372
-
\??\c:\1lrrxff.exec:\1lrrxff.exe69⤵PID:3228
-
\??\c:\bbnhnn.exec:\bbnhnn.exe70⤵PID:3456
-
\??\c:\9htbnt.exec:\9htbnt.exe71⤵PID:764
-
\??\c:\1dddd.exec:\1dddd.exe72⤵PID:2952
-
\??\c:\frfxrrr.exec:\frfxrrr.exe73⤵PID:5600
-
\??\c:\5rlfffx.exec:\5rlfffx.exe74⤵PID:812
-
\??\c:\bbhbbn.exec:\bbhbbn.exe75⤵PID:4872
-
\??\c:\tttntt.exec:\tttntt.exe76⤵PID:4368
-
\??\c:\dvdvp.exec:\dvdvp.exe77⤵PID:5040
-
\??\c:\pvjdj.exec:\pvjdj.exe78⤵PID:3984
-
\??\c:\5rxxflx.exec:\5rxxflx.exe79⤵PID:5172
-
\??\c:\lllllrr.exec:\lllllrr.exe80⤵PID:5156
-
\??\c:\tbhhhh.exec:\tbhhhh.exe81⤵PID:1716
-
\??\c:\dpppj.exec:\dpppj.exe82⤵PID:5528
-
\??\c:\jpppj.exec:\jpppj.exe83⤵PID:5496
-
\??\c:\fflllrr.exec:\fflllrr.exe84⤵PID:4968
-
\??\c:\rllllll.exec:\rllllll.exe85⤵PID:1428
-
\??\c:\nhnnnn.exec:\nhnnnn.exe86⤵PID:5408
-
\??\c:\bnbhbb.exec:\bnbhbb.exe87⤵PID:4744
-
\??\c:\vjjdd.exec:\vjjdd.exe88⤵PID:5540
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe89⤵PID:5656
-
\??\c:\llrrrxr.exec:\llrrrxr.exe90⤵PID:2716
-
\??\c:\ththnh.exec:\ththnh.exe91⤵PID:2172
-
\??\c:\jjvjd.exec:\jjvjd.exe92⤵PID:5596
-
\??\c:\9pvpj.exec:\9pvpj.exe93⤵PID:2408
-
\??\c:\xrrxxrf.exec:\xrrxxrf.exe94⤵PID:6024
-
\??\c:\xxflfll.exec:\xxflfll.exe95⤵PID:4888
-
\??\c:\hnttnn.exec:\hnttnn.exe96⤵PID:6020
-
\??\c:\tthhhh.exec:\tthhhh.exe97⤵PID:6072
-
\??\c:\djpvv.exec:\djpvv.exe98⤵PID:4412
-
\??\c:\rrflllx.exec:\rrflllx.exe99⤵PID:5952
-
\??\c:\xrxxxxx.exec:\xrxxxxx.exe100⤵PID:5872
-
\??\c:\bbhhhn.exec:\bbhhhn.exe101⤵PID:5980
-
\??\c:\pvdvj.exec:\pvdvj.exe102⤵PID:6008
-
\??\c:\ppjvp.exec:\ppjvp.exe103⤵PID:2912
-
\??\c:\llffxxx.exec:\llffxxx.exe104⤵PID:2812
-
\??\c:\fxffxfx.exec:\fxffxfx.exe105⤵PID:5816
-
\??\c:\rllrrrr.exec:\rllrrrr.exe106⤵PID:808
-
\??\c:\hhhhtb.exec:\hhhhtb.exe107⤵PID:3844
-
\??\c:\9jppp.exec:\9jppp.exe108⤵PID:2256
-
\??\c:\ppjvj.exec:\ppjvj.exe109⤵PID:2792
-
\??\c:\rxlfflr.exec:\rxlfflr.exe110⤵PID:3972
-
\??\c:\llrrrrx.exec:\llrrrrx.exe111⤵PID:3888
-
\??\c:\nbhhhn.exec:\nbhhhn.exe112⤵PID:3848
-
\??\c:\vdjdv.exec:\vdjdv.exe113⤵PID:1220
-
\??\c:\dddpp.exec:\dddpp.exe114⤵PID:4692
-
\??\c:\llrllrr.exec:\llrllrr.exe115⤵PID:4380
-
\??\c:\bthnnn.exec:\bthnnn.exe116⤵PID:1204
-
\??\c:\dvvvp.exec:\dvvvp.exe117⤵PID:4028
-
\??\c:\1rlllrr.exec:\1rlllrr.exe118⤵PID:2680
-
\??\c:\xrrrrrr.exec:\xrrrrrr.exe119⤵PID:3116
-
\??\c:\tnthbb.exec:\tnthbb.exe120⤵
- System Location Discovery: System Language Discovery
PID:3484 -
\??\c:\ppvvv.exec:\ppvvv.exe121⤵PID:1028
-
\??\c:\1dpjj.exec:\1dpjj.exe122⤵PID:5696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-