Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 19:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe
-
Size
230KB
-
MD5
8d31b2050350690416a2d0616c169230
-
SHA1
37271994f7fad872907e9cae1204cbe0f558d41a
-
SHA256
e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2e
-
SHA512
233c21dc35356a46fd6deb75b347e16c83e8d5d681f493299e559d65f055e67d2a203b6aac6f41d3b9558015e42022337c84d525bb36d8fc23f9f9f1be1f3f87
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1fX:n3C9BRo7MlrWKo+lxKk1fX
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4760-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3500-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4232-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/824-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3772-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/688-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1784-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2488-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4756-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/312-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4328-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2428-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2392-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2368-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1432-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4372-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3500 bhbhtt.exe 4232 dvvpp.exe 824 rfxlxlx.exe 2968 nttnnn.exe 4636 xllfxxx.exe 2156 fllfxrl.exe 3772 tnnhbb.exe 4628 dpdpj.exe 216 lrlrrlx.exe 932 bhhbnh.exe 688 frlfxrl.exe 1784 xlrlxxr.exe 2488 dvvpj.exe 2288 bbhtnh.exe 2956 jppjv.exe 4756 lfffxxx.exe 312 hhbhnn.exe 2172 dvpdd.exe 4160 lfrlrrx.exe 4328 ttnbtn.exe 1992 hhthhb.exe 4028 jppjd.exe 2428 rrrflfx.exe 3544 rllxrff.exe 2392 hbnhnt.exe 2368 bntnhb.exe 1656 vvdvj.exe 1432 fxfxfxx.exe 1440 nbttnn.exe 4372 dppdj.exe 1896 xrlrlll.exe 2200 thnhnn.exe 4928 tbhbhb.exe 1224 dppjj.exe 3268 7rlfxfx.exe 4060 hbthbt.exe 3260 jpvpv.exe 696 vvvpp.exe 4680 frrlxxr.exe 3004 9bhbhh.exe 3692 hbnnhh.exe 468 pvdpj.exe 4852 rlrrxlr.exe 4320 nthtnh.exe 4976 7hhbbt.exe 824 5jdpp.exe 4632 rllfxrl.exe 1944 fxxrlfl.exe 2872 nbnhth.exe 3924 jpjpd.exe 4500 1rxffrl.exe 5084 htbtnh.exe 4628 xrlllll.exe 3128 nhhnnt.exe 1428 vdddd.exe 1228 vpvjv.exe 1096 rlfxlrx.exe 2920 nbnnht.exe 1892 hbhbhh.exe 3620 pjppp.exe 3652 5xxlxxf.exe 2288 llxxrrl.exe 2956 tbbnhb.exe 2760 3bhbnh.exe -
resource yara_rule behavioral2/memory/4760-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4760-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3500-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4232-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/824-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3772-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/688-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1784-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2488-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4756-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/312-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4328-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1992-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2428-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2392-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1432-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4372-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxflrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bhbtt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 3500 4760 e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe 82 PID 4760 wrote to memory of 3500 4760 e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe 82 PID 4760 wrote to memory of 3500 4760 e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe 82 PID 3500 wrote to memory of 4232 3500 bhbhtt.exe 83 PID 3500 wrote to memory of 4232 3500 bhbhtt.exe 83 PID 3500 wrote to memory of 4232 3500 bhbhtt.exe 83 PID 4232 wrote to memory of 824 4232 dvvpp.exe 84 PID 4232 wrote to memory of 824 4232 dvvpp.exe 84 PID 4232 wrote to memory of 824 4232 dvvpp.exe 84 PID 824 wrote to memory of 2968 824 rfxlxlx.exe 85 PID 824 wrote to memory of 2968 824 rfxlxlx.exe 85 PID 824 wrote to memory of 2968 824 rfxlxlx.exe 85 PID 2968 wrote to memory of 4636 2968 nttnnn.exe 86 PID 2968 wrote to memory of 4636 2968 nttnnn.exe 86 PID 2968 wrote to memory of 4636 2968 nttnnn.exe 86 PID 4636 wrote to memory of 2156 4636 xllfxxx.exe 87 PID 4636 wrote to memory of 2156 4636 xllfxxx.exe 87 PID 4636 wrote to memory of 2156 4636 xllfxxx.exe 87 PID 2156 wrote to memory of 3772 2156 fllfxrl.exe 88 PID 2156 wrote to memory of 3772 2156 fllfxrl.exe 88 PID 2156 wrote to memory of 3772 2156 fllfxrl.exe 88 PID 3772 wrote to memory of 4628 3772 tnnhbb.exe 89 PID 3772 wrote to memory of 4628 3772 tnnhbb.exe 89 PID 3772 wrote to memory of 4628 3772 tnnhbb.exe 89 PID 4628 wrote to memory of 216 4628 dpdpj.exe 90 PID 4628 wrote to memory of 216 4628 dpdpj.exe 90 PID 4628 wrote to memory of 216 4628 dpdpj.exe 90 PID 216 wrote to memory of 932 216 lrlrrlx.exe 91 PID 216 wrote to memory of 932 216 lrlrrlx.exe 91 PID 216 wrote to memory of 932 216 lrlrrlx.exe 91 PID 932 wrote to memory of 688 932 bhhbnh.exe 92 PID 932 wrote to memory of 688 932 bhhbnh.exe 92 PID 932 wrote to memory of 688 932 bhhbnh.exe 92 PID 688 wrote to memory of 1784 688 frlfxrl.exe 93 PID 688 wrote to memory of 1784 688 frlfxrl.exe 93 PID 688 wrote to memory of 1784 688 frlfxrl.exe 93 PID 1784 wrote to memory of 2488 1784 xlrlxxr.exe 94 PID 1784 wrote to memory of 2488 1784 xlrlxxr.exe 94 PID 1784 wrote to memory of 2488 1784 xlrlxxr.exe 94 PID 2488 wrote to memory of 2288 2488 dvvpj.exe 95 PID 2488 wrote to memory of 2288 2488 dvvpj.exe 95 PID 2488 wrote to memory of 2288 2488 dvvpj.exe 95 PID 2288 wrote to memory of 2956 2288 bbhtnh.exe 96 PID 2288 wrote to memory of 2956 2288 bbhtnh.exe 96 PID 2288 wrote to memory of 2956 2288 bbhtnh.exe 96 PID 2956 wrote to memory of 4756 2956 jppjv.exe 97 PID 2956 wrote to memory of 4756 2956 jppjv.exe 97 PID 2956 wrote to memory of 4756 2956 jppjv.exe 97 PID 4756 wrote to memory of 312 4756 lfffxxx.exe 98 PID 4756 wrote to memory of 312 4756 lfffxxx.exe 98 PID 4756 wrote to memory of 312 4756 lfffxxx.exe 98 PID 312 wrote to memory of 2172 312 hhbhnn.exe 99 PID 312 wrote to memory of 2172 312 hhbhnn.exe 99 PID 312 wrote to memory of 2172 312 hhbhnn.exe 99 PID 2172 wrote to memory of 4160 2172 dvpdd.exe 100 PID 2172 wrote to memory of 4160 2172 dvpdd.exe 100 PID 2172 wrote to memory of 4160 2172 dvpdd.exe 100 PID 4160 wrote to memory of 4328 4160 lfrlrrx.exe 101 PID 4160 wrote to memory of 4328 4160 lfrlrrx.exe 101 PID 4160 wrote to memory of 4328 4160 lfrlrrx.exe 101 PID 4328 wrote to memory of 1992 4328 ttnbtn.exe 102 PID 4328 wrote to memory of 1992 4328 ttnbtn.exe 102 PID 4328 wrote to memory of 1992 4328 ttnbtn.exe 102 PID 1992 wrote to memory of 4028 1992 hhthhb.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe"C:\Users\Admin\AppData\Local\Temp\e5061c59b75f3b2ead9b003640c6455fb0753539583e3cb7696661ac3dc00c2eN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
\??\c:\bhbhtt.exec:\bhbhtt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
\??\c:\dvvpp.exec:\dvvpp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
\??\c:\rfxlxlx.exec:\rfxlxlx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:824 -
\??\c:\nttnnn.exec:\nttnnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\xllfxxx.exec:\xllfxxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\fllfxrl.exec:\fllfxrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\tnnhbb.exec:\tnnhbb.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\dpdpj.exec:\dpdpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\lrlrrlx.exec:\lrlrrlx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\bhhbnh.exec:\bhhbnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\frlfxrl.exec:\frlfxrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\xlrlxxr.exec:\xlrlxxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\dvvpj.exec:\dvvpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\bbhtnh.exec:\bbhtnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\jppjv.exec:\jppjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\lfffxxx.exec:\lfffxxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\hhbhnn.exec:\hhbhnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
\??\c:\dvpdd.exec:\dvpdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\lfrlrrx.exec:\lfrlrrx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\ttnbtn.exec:\ttnbtn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
\??\c:\hhthhb.exec:\hhthhb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\jppjd.exec:\jppjd.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028 -
\??\c:\rrrflfx.exec:\rrrflfx.exe24⤵
- Executes dropped EXE
PID:2428 -
\??\c:\rllxrff.exec:\rllxrff.exe25⤵
- Executes dropped EXE
PID:3544 -
\??\c:\hbnhnt.exec:\hbnhnt.exe26⤵
- Executes dropped EXE
PID:2392 -
\??\c:\bntnhb.exec:\bntnhb.exe27⤵
- Executes dropped EXE
PID:2368 -
\??\c:\vvdvj.exec:\vvdvj.exe28⤵
- Executes dropped EXE
PID:1656 -
\??\c:\fxfxfxx.exec:\fxfxfxx.exe29⤵
- Executes dropped EXE
PID:1432 -
\??\c:\nbttnn.exec:\nbttnn.exe30⤵
- Executes dropped EXE
PID:1440 -
\??\c:\dppdj.exec:\dppdj.exe31⤵
- Executes dropped EXE
PID:4372 -
\??\c:\xrlrlll.exec:\xrlrlll.exe32⤵
- Executes dropped EXE
PID:1896 -
\??\c:\thnhnn.exec:\thnhnn.exe33⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tbhbhb.exec:\tbhbhb.exe34⤵
- Executes dropped EXE
PID:4928 -
\??\c:\dppjj.exec:\dppjj.exe35⤵
- Executes dropped EXE
PID:1224 -
\??\c:\7rlfxfx.exec:\7rlfxfx.exe36⤵
- Executes dropped EXE
PID:3268 -
\??\c:\hbthbt.exec:\hbthbt.exe37⤵
- Executes dropped EXE
PID:4060 -
\??\c:\jpvpv.exec:\jpvpv.exe38⤵
- Executes dropped EXE
PID:3260 -
\??\c:\vvvpp.exec:\vvvpp.exe39⤵
- Executes dropped EXE
PID:696 -
\??\c:\frrlxxr.exec:\frrlxxr.exe40⤵
- Executes dropped EXE
PID:4680 -
\??\c:\9bhbhh.exec:\9bhbhh.exe41⤵
- Executes dropped EXE
PID:3004 -
\??\c:\hbnnhh.exec:\hbnnhh.exe42⤵
- Executes dropped EXE
PID:3692 -
\??\c:\pvdpj.exec:\pvdpj.exe43⤵
- Executes dropped EXE
PID:468 -
\??\c:\rlrrxlr.exec:\rlrrxlr.exe44⤵
- Executes dropped EXE
PID:4852 -
\??\c:\nthtnh.exec:\nthtnh.exe45⤵
- Executes dropped EXE
PID:4320 -
\??\c:\7hhbbt.exec:\7hhbbt.exe46⤵
- Executes dropped EXE
PID:4976 -
\??\c:\5jdpp.exec:\5jdpp.exe47⤵
- Executes dropped EXE
PID:824 -
\??\c:\rllfxrl.exec:\rllfxrl.exe48⤵
- Executes dropped EXE
PID:4632 -
\??\c:\fxxrlfl.exec:\fxxrlfl.exe49⤵
- Executes dropped EXE
PID:1944 -
\??\c:\nbnhth.exec:\nbnhth.exe50⤵
- Executes dropped EXE
PID:2872 -
\??\c:\jpjpd.exec:\jpjpd.exe51⤵
- Executes dropped EXE
PID:3924 -
\??\c:\1rxffrl.exec:\1rxffrl.exe52⤵
- Executes dropped EXE
PID:4500 -
\??\c:\htbtnh.exec:\htbtnh.exe53⤵
- Executes dropped EXE
PID:5084 -
\??\c:\xrlllll.exec:\xrlllll.exe54⤵
- Executes dropped EXE
PID:4628 -
\??\c:\nhhnnt.exec:\nhhnnt.exe55⤵
- Executes dropped EXE
PID:3128 -
\??\c:\vdddd.exec:\vdddd.exe56⤵
- Executes dropped EXE
PID:1428 -
\??\c:\vpvjv.exec:\vpvjv.exe57⤵
- Executes dropped EXE
PID:1228 -
\??\c:\rlfxlrx.exec:\rlfxlrx.exe58⤵
- Executes dropped EXE
PID:1096 -
\??\c:\nbnnht.exec:\nbnnht.exe59⤵
- Executes dropped EXE
PID:2920 -
\??\c:\hbhbhh.exec:\hbhbhh.exe60⤵
- Executes dropped EXE
PID:1892 -
\??\c:\pjppp.exec:\pjppp.exe61⤵
- Executes dropped EXE
PID:3620 -
\??\c:\5xxlxxf.exec:\5xxlxxf.exe62⤵
- Executes dropped EXE
PID:3652 -
\??\c:\llxxrrl.exec:\llxxrrl.exe63⤵
- Executes dropped EXE
PID:2288 -
\??\c:\tbbnhb.exec:\tbbnhb.exe64⤵
- Executes dropped EXE
PID:2956 -
\??\c:\3bhbnh.exec:\3bhbnh.exe65⤵
- Executes dropped EXE
PID:2760 -
\??\c:\dvddj.exec:\dvddj.exe66⤵PID:452
-
\??\c:\frxxrrl.exec:\frxxrrl.exe67⤵PID:912
-
\??\c:\1frlffr.exec:\1frlffr.exe68⤵PID:4920
-
\??\c:\hnhhbb.exec:\hnhhbb.exe69⤵PID:4676
-
\??\c:\dvpjd.exec:\dvpjd.exe70⤵PID:728
-
\??\c:\7pjdd.exec:\7pjdd.exe71⤵PID:3788
-
\??\c:\rxlfxxr.exec:\rxlfxxr.exe72⤵PID:100
-
\??\c:\ffffxfx.exec:\ffffxfx.exe73⤵PID:1992
-
\??\c:\bnttbt.exec:\bnttbt.exe74⤵PID:3612
-
\??\c:\vdjdv.exec:\vdjdv.exe75⤵PID:4592
-
\??\c:\9vpvj.exec:\9vpvj.exe76⤵PID:3000
-
\??\c:\flxxrll.exec:\flxxrll.exe77⤵PID:3476
-
\??\c:\lxlfxfx.exec:\lxlfxfx.exe78⤵PID:2444
-
\??\c:\bnnhbt.exec:\bnnhbt.exe79⤵PID:4532
-
\??\c:\jjjdp.exec:\jjjdp.exe80⤵PID:1808
-
\??\c:\jvvpp.exec:\jvvpp.exe81⤵PID:4460
-
\??\c:\fxrxxrr.exec:\fxrxxrr.exe82⤵PID:4324
-
\??\c:\lfrlrrx.exec:\lfrlrrx.exe83⤵PID:1432
-
\??\c:\bthnbt.exec:\bthnbt.exe84⤵PID:1976
-
\??\c:\pjjvv.exec:\pjjvv.exe85⤵PID:3760
-
\??\c:\lfrrflr.exec:\lfrrflr.exe86⤵PID:1720
-
\??\c:\fxffxxx.exec:\fxffxxx.exe87⤵PID:3324
-
\??\c:\bbhbhh.exec:\bbhbhh.exe88⤵PID:4876
-
\??\c:\ddvdv.exec:\ddvdv.exe89⤵PID:3008
-
\??\c:\jvvpj.exec:\jvvpj.exe90⤵PID:2200
-
\??\c:\1lxrlll.exec:\1lxrlll.exe91⤵PID:4560
-
\??\c:\5rxxffl.exec:\5rxxffl.exe92⤵PID:2744
-
\??\c:\bhnhnh.exec:\bhnhnh.exe93⤵PID:1680
-
\??\c:\jdvpp.exec:\jdvpp.exe94⤵PID:3520
-
\??\c:\vpjdp.exec:\vpjdp.exe95⤵PID:4424
-
\??\c:\frxlxxl.exec:\frxlxxl.exe96⤵PID:4600
-
\??\c:\bttnnh.exec:\bttnnh.exe97⤵PID:3844
-
\??\c:\bnbttn.exec:\bnbttn.exe98⤵PID:4760
-
\??\c:\jdddd.exec:\jdddd.exe99⤵PID:4892
-
\??\c:\pddvj.exec:\pddvj.exe100⤵PID:2228
-
\??\c:\xrrxxfx.exec:\xrrxxfx.exe101⤵PID:4764
-
\??\c:\hhnhhh.exec:\hhnhhh.exe102⤵PID:3768
-
\??\c:\bthbtt.exec:\bthbtt.exe103⤵
- System Location Discovery: System Language Discovery
PID:3056 -
\??\c:\jvvjd.exec:\jvvjd.exe104⤵PID:748
-
\??\c:\5vvpd.exec:\5vvpd.exe105⤵PID:2860
-
\??\c:\rlrrlll.exec:\rlrrlll.exe106⤵PID:1888
-
\??\c:\bnnnnn.exec:\bnnnnn.exe107⤵PID:4912
-
\??\c:\7vdpj.exec:\7vdpj.exe108⤵PID:408
-
\??\c:\pdjjj.exec:\pdjjj.exe109⤵PID:2848
-
\??\c:\9xrrlfx.exec:\9xrrlfx.exe110⤵PID:3992
-
\??\c:\xllffxr.exec:\xllffxr.exe111⤵PID:4452
-
\??\c:\nhhbbt.exec:\nhhbbt.exe112⤵PID:4628
-
\??\c:\vvvdd.exec:\vvvdd.exe113⤵PID:3128
-
\??\c:\djddv.exec:\djddv.exe114⤵
- System Location Discovery: System Language Discovery
PID:2724 -
\??\c:\lxxxrrr.exec:\lxxxrrr.exe115⤵PID:2708
-
\??\c:\rxfxrlf.exec:\rxfxrlf.exe116⤵PID:1096
-
\??\c:\hntnnt.exec:\hntnnt.exe117⤵PID:3076
-
\??\c:\thbbbb.exec:\thbbbb.exe118⤵PID:772
-
\??\c:\vdpjv.exec:\vdpjv.exe119⤵PID:2644
-
\??\c:\pjvpv.exec:\pjvpv.exe120⤵PID:3540
-
\??\c:\lfffflr.exec:\lfffflr.exe121⤵PID:1404
-
\??\c:\frfxrxr.exec:\frfxrxr.exe122⤵PID:2288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-