Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 15:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe
Resource
win7-20240708-en
windows7-x64
6 signatures
120 seconds
General
-
Target
104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe
-
Size
64KB
-
MD5
8932a19049f0559d5386b2ef63e9cdd0
-
SHA1
cd45050127d9ec1e809ecfb920612c33ce6e0286
-
SHA256
104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37
-
SHA512
e6359b721b2f707da37b0ee804a77789f813978c345ad20a5517cf556f3aa596a4539dddb50eecb90959f008dd6bb4c54806530cbc3ced765101d6defdb62cb9
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxiG:ymb3NkkiQ3mdBjF0y7kbh
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/1864-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1700-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3672-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4708-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/544-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3968-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2872-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3788-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4240-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4844-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2208-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4340-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1548-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3724-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2964-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3160-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2628-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1700 1hbhbb.exe 3908 ddvpd.exe 3672 fxxrfxr.exe 5100 nttbtn.exe 4708 pjvpv.exe 3436 lflfxrl.exe 544 hhtnhb.exe 3968 jdvpv.exe 2872 1rrlxrl.exe 3788 3rxrlfx.exe 752 7tttbb.exe 4240 jdppp.exe 4844 lrrlrrr.exe 2928 llfxxrl.exe 4656 thbnnt.exe 2208 9vvdv.exe 4340 flxxrxx.exe 1548 tttnhh.exe 4896 ddpjd.exe 2108 fxxlfxr.exe 3724 tnnnhh.exe 2964 pjpvv.exe 3160 xrrlllf.exe 2264 3ttttb.exe 2628 7bhhht.exe 352 5vjpd.exe 4848 lrrrlll.exe 1600 7xxffrr.exe 4624 hntnnb.exe 5040 jvddv.exe 4920 rfrlllf.exe 636 3rrxrxl.exe 2444 9hhhtt.exe 4168 lflffff.exe 1816 3xxrfxr.exe 1724 pdjdv.exe 1540 vdvpj.exe 4380 xlfxxrl.exe 4256 nhhhbt.exe 2932 pvdvv.exe 1908 xrxrllf.exe 776 9tbbhn.exe 5060 pjjvp.exe 4260 vdvdv.exe 4964 fflffxr.exe 4300 hbbtnh.exe 2128 pvvvp.exe 2876 1vvpd.exe 624 fllxrrl.exe 4760 vppjd.exe 2776 7xxrflf.exe 3672 hbbthh.exe 4812 hthbnn.exe 468 jdjdd.exe 4056 1jdvj.exe 860 7rllflf.exe 4356 3nhhbh.exe 544 pjpjj.exe 3968 jdjjd.exe 2832 7frfrxx.exe 5008 ttttnn.exe 1912 jppjd.exe 2480 dvppp.exe 3704 lxfxfxx.exe -
resource yara_rule behavioral2/memory/1864-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1864-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1700-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3672-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/544-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3968-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3788-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4240-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4844-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2208-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4340-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1548-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3724-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2964-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3160-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2628-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lrfxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5djdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxrfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1864 wrote to memory of 1700 1864 104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe 81 PID 1864 wrote to memory of 1700 1864 104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe 81 PID 1864 wrote to memory of 1700 1864 104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe 81 PID 1700 wrote to memory of 3908 1700 1hbhbb.exe 82 PID 1700 wrote to memory of 3908 1700 1hbhbb.exe 82 PID 1700 wrote to memory of 3908 1700 1hbhbb.exe 82 PID 3908 wrote to memory of 3672 3908 ddvpd.exe 83 PID 3908 wrote to memory of 3672 3908 ddvpd.exe 83 PID 3908 wrote to memory of 3672 3908 ddvpd.exe 83 PID 3672 wrote to memory of 5100 3672 fxxrfxr.exe 84 PID 3672 wrote to memory of 5100 3672 fxxrfxr.exe 84 PID 3672 wrote to memory of 5100 3672 fxxrfxr.exe 84 PID 5100 wrote to memory of 4708 5100 nttbtn.exe 85 PID 5100 wrote to memory of 4708 5100 nttbtn.exe 85 PID 5100 wrote to memory of 4708 5100 nttbtn.exe 85 PID 4708 wrote to memory of 3436 4708 pjvpv.exe 86 PID 4708 wrote to memory of 3436 4708 pjvpv.exe 86 PID 4708 wrote to memory of 3436 4708 pjvpv.exe 86 PID 3436 wrote to memory of 544 3436 lflfxrl.exe 87 PID 3436 wrote to memory of 544 3436 lflfxrl.exe 87 PID 3436 wrote to memory of 544 3436 lflfxrl.exe 87 PID 544 wrote to memory of 3968 544 hhtnhb.exe 88 PID 544 wrote to memory of 3968 544 hhtnhb.exe 88 PID 544 wrote to memory of 3968 544 hhtnhb.exe 88 PID 3968 wrote to memory of 2872 3968 jdvpv.exe 89 PID 3968 wrote to memory of 2872 3968 jdvpv.exe 89 PID 3968 wrote to memory of 2872 3968 jdvpv.exe 89 PID 2872 wrote to memory of 3788 2872 1rrlxrl.exe 90 PID 2872 wrote to memory of 3788 2872 1rrlxrl.exe 90 PID 2872 wrote to memory of 3788 2872 1rrlxrl.exe 90 PID 3788 wrote to memory of 752 3788 3rxrlfx.exe 91 PID 3788 wrote to memory of 752 3788 3rxrlfx.exe 91 PID 3788 wrote to memory of 752 3788 3rxrlfx.exe 91 PID 752 wrote to memory of 4240 752 7tttbb.exe 92 PID 752 wrote to memory of 4240 752 7tttbb.exe 92 PID 752 wrote to memory of 4240 752 7tttbb.exe 92 PID 4240 wrote to memory of 4844 4240 jdppp.exe 93 PID 4240 wrote to memory of 4844 4240 jdppp.exe 93 PID 4240 wrote to memory of 4844 4240 jdppp.exe 93 PID 4844 wrote to memory of 2928 4844 lrrlrrr.exe 94 PID 4844 wrote to memory of 2928 4844 lrrlrrr.exe 94 PID 4844 wrote to memory of 2928 4844 lrrlrrr.exe 94 PID 2928 wrote to memory of 4656 2928 llfxxrl.exe 95 PID 2928 wrote to memory of 4656 2928 llfxxrl.exe 95 PID 2928 wrote to memory of 4656 2928 llfxxrl.exe 95 PID 4656 wrote to memory of 2208 4656 thbnnt.exe 96 PID 4656 wrote to memory of 2208 4656 thbnnt.exe 96 PID 4656 wrote to memory of 2208 4656 thbnnt.exe 96 PID 2208 wrote to memory of 4340 2208 9vvdv.exe 97 PID 2208 wrote to memory of 4340 2208 9vvdv.exe 97 PID 2208 wrote to memory of 4340 2208 9vvdv.exe 97 PID 4340 wrote to memory of 1548 4340 flxxrxx.exe 98 PID 4340 wrote to memory of 1548 4340 flxxrxx.exe 98 PID 4340 wrote to memory of 1548 4340 flxxrxx.exe 98 PID 1548 wrote to memory of 4896 1548 tttnhh.exe 99 PID 1548 wrote to memory of 4896 1548 tttnhh.exe 99 PID 1548 wrote to memory of 4896 1548 tttnhh.exe 99 PID 4896 wrote to memory of 2108 4896 ddpjd.exe 100 PID 4896 wrote to memory of 2108 4896 ddpjd.exe 100 PID 4896 wrote to memory of 2108 4896 ddpjd.exe 100 PID 2108 wrote to memory of 3724 2108 fxxlfxr.exe 101 PID 2108 wrote to memory of 3724 2108 fxxlfxr.exe 101 PID 2108 wrote to memory of 3724 2108 fxxlfxr.exe 101 PID 3724 wrote to memory of 2964 3724 tnnnhh.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe"C:\Users\Admin\AppData\Local\Temp\104b1d7e55616b109de0fcc807e40047b8b10110d1149cd64cb41c3f53f2cd37N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\1hbhbb.exec:\1hbhbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\ddvpd.exec:\ddvpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\fxxrfxr.exec:\fxxrfxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\nttbtn.exec:\nttbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\pjvpv.exec:\pjvpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
\??\c:\lflfxrl.exec:\lflfxrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\hhtnhb.exec:\hhtnhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\jdvpv.exec:\jdvpv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\1rrlxrl.exec:\1rrlxrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\3rxrlfx.exec:\3rxrlfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\7tttbb.exec:\7tttbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
\??\c:\jdppp.exec:\jdppp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\lrrlrrr.exec:\lrrlrrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\llfxxrl.exec:\llfxxrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\thbnnt.exec:\thbnnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
\??\c:\9vvdv.exec:\9vvdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\flxxrxx.exec:\flxxrxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\tttnhh.exec:\tttnhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\ddpjd.exec:\ddpjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\fxxlfxr.exec:\fxxlfxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\tnnnhh.exec:\tnnnhh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\pjpvv.exec:\pjpvv.exe23⤵
- Executes dropped EXE
PID:2964 -
\??\c:\xrrlllf.exec:\xrrlllf.exe24⤵
- Executes dropped EXE
PID:3160 -
\??\c:\3ttttb.exec:\3ttttb.exe25⤵
- Executes dropped EXE
PID:2264 -
\??\c:\7bhhht.exec:\7bhhht.exe26⤵
- Executes dropped EXE
PID:2628 -
\??\c:\5vjpd.exec:\5vjpd.exe27⤵
- Executes dropped EXE
PID:352 -
\??\c:\lrrrlll.exec:\lrrrlll.exe28⤵
- Executes dropped EXE
PID:4848 -
\??\c:\7xxffrr.exec:\7xxffrr.exe29⤵
- Executes dropped EXE
PID:1600 -
\??\c:\hntnnb.exec:\hntnnb.exe30⤵
- Executes dropped EXE
PID:4624 -
\??\c:\jvddv.exec:\jvddv.exe31⤵
- Executes dropped EXE
PID:5040 -
\??\c:\rfrlllf.exec:\rfrlllf.exe32⤵
- Executes dropped EXE
PID:4920 -
\??\c:\3rrxrxl.exec:\3rrxrxl.exe33⤵
- Executes dropped EXE
PID:636 -
\??\c:\9hhhtt.exec:\9hhhtt.exe34⤵
- Executes dropped EXE
PID:2444 -
\??\c:\lflffff.exec:\lflffff.exe35⤵
- Executes dropped EXE
PID:4168 -
\??\c:\3xxrfxr.exec:\3xxrfxr.exe36⤵
- Executes dropped EXE
PID:1816 -
\??\c:\pdjdv.exec:\pdjdv.exe37⤵
- Executes dropped EXE
PID:1724 -
\??\c:\vdvpj.exec:\vdvpj.exe38⤵
- Executes dropped EXE
PID:1540 -
\??\c:\xlfxxrl.exec:\xlfxxrl.exe39⤵
- Executes dropped EXE
PID:4380 -
\??\c:\nhhhbt.exec:\nhhhbt.exe40⤵
- Executes dropped EXE
PID:4256 -
\??\c:\pvdvv.exec:\pvdvv.exe41⤵
- Executes dropped EXE
PID:2932 -
\??\c:\xrxrllf.exec:\xrxrllf.exe42⤵
- Executes dropped EXE
PID:1908 -
\??\c:\9tbbhn.exec:\9tbbhn.exe43⤵
- Executes dropped EXE
PID:776 -
\??\c:\pjjvp.exec:\pjjvp.exe44⤵
- Executes dropped EXE
PID:5060 -
\??\c:\vdvdv.exec:\vdvdv.exe45⤵
- Executes dropped EXE
PID:4260 -
\??\c:\fflffxr.exec:\fflffxr.exe46⤵
- Executes dropped EXE
PID:4964 -
\??\c:\hbbtnh.exec:\hbbtnh.exe47⤵
- Executes dropped EXE
PID:4300 -
\??\c:\pvvvp.exec:\pvvvp.exe48⤵
- Executes dropped EXE
PID:2128 -
\??\c:\1vvpd.exec:\1vvpd.exe49⤵
- Executes dropped EXE
PID:2876 -
\??\c:\fllxrrl.exec:\fllxrrl.exe50⤵
- Executes dropped EXE
PID:624 -
\??\c:\vppjd.exec:\vppjd.exe51⤵
- Executes dropped EXE
PID:4760 -
\??\c:\7xxrflf.exec:\7xxrflf.exe52⤵
- Executes dropped EXE
PID:2776 -
\??\c:\hbbthh.exec:\hbbthh.exe53⤵
- Executes dropped EXE
PID:3672 -
\??\c:\hthbnn.exec:\hthbnn.exe54⤵
- Executes dropped EXE
PID:4812 -
\??\c:\jdjdd.exec:\jdjdd.exe55⤵
- Executes dropped EXE
PID:468 -
\??\c:\1jdvj.exec:\1jdvj.exe56⤵
- Executes dropped EXE
PID:4056 -
\??\c:\7rllflf.exec:\7rllflf.exe57⤵
- Executes dropped EXE
PID:860 -
\??\c:\3nhhbh.exec:\3nhhbh.exe58⤵
- Executes dropped EXE
PID:4356 -
\??\c:\pjpjj.exec:\pjpjj.exe59⤵
- Executes dropped EXE
PID:544 -
\??\c:\jdjjd.exec:\jdjjd.exe60⤵
- Executes dropped EXE
PID:3968 -
\??\c:\7frfrxx.exec:\7frfrxx.exe61⤵
- Executes dropped EXE
PID:2832 -
\??\c:\ttttnn.exec:\ttttnn.exe62⤵
- Executes dropped EXE
PID:5008 -
\??\c:\jppjd.exec:\jppjd.exe63⤵
- Executes dropped EXE
PID:1912 -
\??\c:\dvppp.exec:\dvppp.exe64⤵
- Executes dropped EXE
PID:2480 -
\??\c:\lxfxfxx.exec:\lxfxfxx.exe65⤵
- Executes dropped EXE
PID:3704 -
\??\c:\lxrlfrl.exec:\lxrlfrl.exe66⤵PID:4156
-
\??\c:\bhbtnn.exec:\bhbtnn.exe67⤵PID:4420
-
\??\c:\xllffff.exec:\xllffff.exe68⤵PID:3012
-
\??\c:\lrfxlff.exec:\lrfxlff.exe69⤵PID:3900
-
\??\c:\thnbnh.exec:\thnbnh.exe70⤵PID:2728
-
\??\c:\ddvvv.exec:\ddvvv.exe71⤵PID:4852
-
\??\c:\vjjpj.exec:\vjjpj.exe72⤵PID:1128
-
\??\c:\xrrrlff.exec:\xrrrlff.exe73⤵PID:4464
-
\??\c:\ttbbhh.exec:\ttbbhh.exe74⤵PID:4544
-
\??\c:\bhhbnn.exec:\bhhbnn.exe75⤵PID:704
-
\??\c:\7dddv.exec:\7dddv.exe76⤵PID:2188
-
\??\c:\flxxxff.exec:\flxxxff.exe77⤵PID:1008
-
\??\c:\ntnhbh.exec:\ntnhbh.exe78⤵PID:4468
-
\??\c:\hhtntt.exec:\hhtntt.exe79⤵PID:2812
-
\??\c:\pjdvp.exec:\pjdvp.exe80⤵PID:4444
-
\??\c:\dpjjv.exec:\dpjjv.exe81⤵PID:1496
-
\??\c:\xlllfxr.exec:\xlllfxr.exe82⤵PID:4384
-
\??\c:\hhnnnt.exec:\hhnnnt.exe83⤵PID:4192
-
\??\c:\7bbbbb.exec:\7bbbbb.exe84⤵PID:3572
-
\??\c:\pvvdd.exec:\pvvdd.exe85⤵PID:224
-
\??\c:\xlrlffx.exec:\xlrlffx.exe86⤵PID:1892
-
\??\c:\rxxxxfx.exec:\rxxxxfx.exe87⤵PID:896
-
\??\c:\tnhhbn.exec:\tnhhbn.exe88⤵PID:1600
-
\??\c:\bntnhh.exec:\bntnhh.exe89⤵PID:2800
-
\??\c:\ppvvp.exec:\ppvvp.exe90⤵PID:512
-
\??\c:\lllffff.exec:\lllffff.exe91⤵PID:4636
-
\??\c:\xxrlllf.exec:\xxrlllf.exe92⤵
- System Location Discovery: System Language Discovery
PID:4164 -
\??\c:\5thbbb.exec:\5thbbb.exe93⤵PID:636
-
\??\c:\ppddv.exec:\ppddv.exe94⤵PID:2348
-
\??\c:\jddvj.exec:\jddvj.exe95⤵PID:3808
-
\??\c:\3rxrllr.exec:\3rxrllr.exe96⤵PID:4288
-
\??\c:\nbtttt.exec:\nbtttt.exe97⤵PID:3872
-
\??\c:\htbbtt.exec:\htbbtt.exe98⤵PID:3108
-
\??\c:\7dvjd.exec:\7dvjd.exe99⤵PID:1592
-
\??\c:\7vpdp.exec:\7vpdp.exe100⤵PID:3472
-
\??\c:\rlfrffx.exec:\rlfrffx.exe101⤵PID:1736
-
\??\c:\fxffllf.exec:\fxffllf.exe102⤵PID:3804
-
\??\c:\htbtnh.exec:\htbtnh.exe103⤵PID:1856
-
\??\c:\ppjdv.exec:\ppjdv.exe104⤵PID:3784
-
\??\c:\jdvpp.exec:\jdvpp.exe105⤵PID:1432
-
\??\c:\fxfrfxx.exec:\fxfrfxx.exe106⤵PID:4308
-
\??\c:\bnttnn.exec:\bnttnn.exe107⤵PID:4104
-
\??\c:\hhhnhb.exec:\hhhnhb.exe108⤵PID:832
-
\??\c:\dvvvp.exec:\dvvvp.exe109⤵PID:3032
-
\??\c:\fxxrrrl.exec:\fxxrrrl.exe110⤵
- System Location Discovery: System Language Discovery
PID:2056 -
\??\c:\1rxrlxr.exec:\1rxrlxr.exe111⤵PID:4756
-
\??\c:\bthbbb.exec:\bthbbb.exe112⤵PID:4712
-
\??\c:\xrxflll.exec:\xrxflll.exe113⤵PID:3508
-
\??\c:\xfxllff.exec:\xfxllff.exe114⤵PID:628
-
\??\c:\hhnbbh.exec:\hhnbbh.exe115⤵PID:1112
-
\??\c:\djjdv.exec:\djjdv.exe116⤵PID:1644
-
\??\c:\jdjdv.exec:\jdjdv.exe117⤵PID:4052
-
\??\c:\xfrrlfx.exec:\xfrrlfx.exe118⤵PID:2504
-
\??\c:\nhtttb.exec:\nhtttb.exe119⤵PID:732
-
\??\c:\tnbbbh.exec:\tnbbbh.exe120⤵PID:2808
-
\??\c:\dppjd.exec:\dppjd.exe121⤵PID:2900
-
\??\c:\vdjdv.exec:\vdjdv.exe122⤵PID:668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-