Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 18:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe
Resource
win7-20240903-en
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe
-
Size
65KB
-
MD5
19e505935a04928d3e9d726355897875
-
SHA1
ab7cc94cf2d265abcc83bb5963cf937dcda55eef
-
SHA256
102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578
-
SHA512
9ee04596de95e6f296f5684e78bf0b2e3f492de6d9ebe93f9a304e58cac01ee9b915eb88eee31599c5114c8986636762d70cdf7293935d3aeb3258dfb075f9cc
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27BqfpOWY:ymb3NkkiQ3mdBjFI9cqf8F
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/3048-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5008-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4308-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2852-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3204-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2880-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4272-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2700-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4444-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1496-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/788-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4452-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3200-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1916-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1528-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1968-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4512-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3952-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1520-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/956-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/448-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1552 hhbbbt.exe 5008 vvvpj.exe 4308 xllxrrr.exe 3204 xrxfxxr.exe 2852 hhtnhh.exe 4272 pdddv.exe 2880 fxrlfxx.exe 2700 frllfxr.exe 4364 jdjjd.exe 4792 vjjjv.exe 4444 7xfxxfx.exe 4616 thhnnh.exe 2032 vjjdd.exe 1496 rlrlllr.exe 788 nbbtnh.exe 4452 xrrrfff.exe 3200 xrlrxxr.exe 1916 bhnnhh.exe 1528 9ppjv.exe 1968 rfxrrff.exe 220 rlflxrl.exe 4512 tnhhbb.exe 4564 vjjjd.exe 348 dddpv.exe 3952 rffxffl.exe 1164 hbhbbb.exe 1520 nttnbb.exe 1668 pdvdp.exe 956 xrrllrr.exe 1656 5nnnnn.exe 448 jvddp.exe 1004 ppdvv.exe 740 fffxxxf.exe 3916 htttnn.exe 3440 djpdv.exe 3920 ppvpj.exe 2636 xrfxrrl.exe 2832 flrrllf.exe 1464 hnbttn.exe 2988 3jjjj.exe 4284 vpjdp.exe 984 lffxlll.exe 588 xrrllff.exe 1484 ntnhnt.exe 556 hbthbt.exe 4732 9pvpj.exe 4308 vppjv.exe 2924 lxrfrll.exe 2580 rrxxxlr.exe 2764 hntnhh.exe 3400 dpdjj.exe 4380 djppd.exe 2396 pjpjd.exe 2516 ffllffx.exe 2700 llxrrrr.exe 3636 hbbthh.exe 4816 tbtnhh.exe 3080 pvvdv.exe 1396 jjjdd.exe 4660 lfrlxxx.exe 1468 flrxxxr.exe 1672 nnbbtt.exe 848 bnhhtt.exe 3592 1djjj.exe -
resource yara_rule behavioral2/memory/3048-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1552-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5008-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4308-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2852-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4272-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4272-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2880-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2880-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2880-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4272-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2700-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4444-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1496-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/788-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3200-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1968-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4512-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3952-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1520-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/956-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/448-212-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrxxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlxlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rxxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrlxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frflfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlflxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxlxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflffxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfrfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ffllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxffrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3tnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxxrr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1552 3048 102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe 82 PID 3048 wrote to memory of 1552 3048 102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe 82 PID 3048 wrote to memory of 1552 3048 102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe 82 PID 1552 wrote to memory of 5008 1552 hhbbbt.exe 83 PID 1552 wrote to memory of 5008 1552 hhbbbt.exe 83 PID 1552 wrote to memory of 5008 1552 hhbbbt.exe 83 PID 5008 wrote to memory of 4308 5008 vvvpj.exe 84 PID 5008 wrote to memory of 4308 5008 vvvpj.exe 84 PID 5008 wrote to memory of 4308 5008 vvvpj.exe 84 PID 4308 wrote to memory of 3204 4308 xllxrrr.exe 85 PID 4308 wrote to memory of 3204 4308 xllxrrr.exe 85 PID 4308 wrote to memory of 3204 4308 xllxrrr.exe 85 PID 3204 wrote to memory of 2852 3204 xrxfxxr.exe 86 PID 3204 wrote to memory of 2852 3204 xrxfxxr.exe 86 PID 3204 wrote to memory of 2852 3204 xrxfxxr.exe 86 PID 2852 wrote to memory of 4272 2852 hhtnhh.exe 87 PID 2852 wrote to memory of 4272 2852 hhtnhh.exe 87 PID 2852 wrote to memory of 4272 2852 hhtnhh.exe 87 PID 4272 wrote to memory of 2880 4272 pdddv.exe 88 PID 4272 wrote to memory of 2880 4272 pdddv.exe 88 PID 4272 wrote to memory of 2880 4272 pdddv.exe 88 PID 2880 wrote to memory of 2700 2880 fxrlfxx.exe 89 PID 2880 wrote to memory of 2700 2880 fxrlfxx.exe 89 PID 2880 wrote to memory of 2700 2880 fxrlfxx.exe 89 PID 2700 wrote to memory of 4364 2700 frllfxr.exe 90 PID 2700 wrote to memory of 4364 2700 frllfxr.exe 90 PID 2700 wrote to memory of 4364 2700 frllfxr.exe 90 PID 4364 wrote to memory of 4792 4364 jdjjd.exe 91 PID 4364 wrote to memory of 4792 4364 jdjjd.exe 91 PID 4364 wrote to memory of 4792 4364 jdjjd.exe 91 PID 4792 wrote to memory of 4444 4792 vjjjv.exe 92 PID 4792 wrote to memory of 4444 4792 vjjjv.exe 92 PID 4792 wrote to memory of 4444 4792 vjjjv.exe 92 PID 4444 wrote to memory of 4616 4444 7xfxxfx.exe 93 PID 4444 wrote to memory of 4616 4444 7xfxxfx.exe 93 PID 4444 wrote to memory of 4616 4444 7xfxxfx.exe 93 PID 4616 wrote to memory of 2032 4616 thhnnh.exe 94 PID 4616 wrote to memory of 2032 4616 thhnnh.exe 94 PID 4616 wrote to memory of 2032 4616 thhnnh.exe 94 PID 2032 wrote to memory of 1496 2032 vjjdd.exe 95 PID 2032 wrote to memory of 1496 2032 vjjdd.exe 95 PID 2032 wrote to memory of 1496 2032 vjjdd.exe 95 PID 1496 wrote to memory of 788 1496 rlrlllr.exe 96 PID 1496 wrote to memory of 788 1496 rlrlllr.exe 96 PID 1496 wrote to memory of 788 1496 rlrlllr.exe 96 PID 788 wrote to memory of 4452 788 nbbtnh.exe 97 PID 788 wrote to memory of 4452 788 nbbtnh.exe 97 PID 788 wrote to memory of 4452 788 nbbtnh.exe 97 PID 4452 wrote to memory of 3200 4452 xrrrfff.exe 98 PID 4452 wrote to memory of 3200 4452 xrrrfff.exe 98 PID 4452 wrote to memory of 3200 4452 xrrrfff.exe 98 PID 3200 wrote to memory of 1916 3200 xrlrxxr.exe 99 PID 3200 wrote to memory of 1916 3200 xrlrxxr.exe 99 PID 3200 wrote to memory of 1916 3200 xrlrxxr.exe 99 PID 1916 wrote to memory of 1528 1916 bhnnhh.exe 100 PID 1916 wrote to memory of 1528 1916 bhnnhh.exe 100 PID 1916 wrote to memory of 1528 1916 bhnnhh.exe 100 PID 1528 wrote to memory of 1968 1528 9ppjv.exe 101 PID 1528 wrote to memory of 1968 1528 9ppjv.exe 101 PID 1528 wrote to memory of 1968 1528 9ppjv.exe 101 PID 1968 wrote to memory of 220 1968 rfxrrff.exe 102 PID 1968 wrote to memory of 220 1968 rfxrrff.exe 102 PID 1968 wrote to memory of 220 1968 rfxrrff.exe 102 PID 220 wrote to memory of 4512 220 rlflxrl.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe"C:\Users\Admin\AppData\Local\Temp\102d0a2973ce26b7888a58371bba3541e9a0acbb27e4f7886201175d20dcb578.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\hhbbbt.exec:\hhbbbt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\vvvpj.exec:\vvvpj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\xllxrrr.exec:\xllxrrr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
\??\c:\xrxfxxr.exec:\xrxfxxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\hhtnhh.exec:\hhtnhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\pdddv.exec:\pdddv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\fxrlfxx.exec:\fxrlfxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\frllfxr.exec:\frllfxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\jdjjd.exec:\jdjjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\vjjjv.exec:\vjjjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\7xfxxfx.exec:\7xfxxfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
\??\c:\thhnnh.exec:\thhnnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\vjjdd.exec:\vjjdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\rlrlllr.exec:\rlrlllr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
\??\c:\nbbtnh.exec:\nbbtnh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
\??\c:\xrrrfff.exec:\xrrrfff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\xrlrxxr.exec:\xrlrxxr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\bhnnhh.exec:\bhnnhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\9ppjv.exec:\9ppjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\rfxrrff.exec:\rfxrrff.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\rlflxrl.exec:\rlflxrl.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\tnhhbb.exec:\tnhhbb.exe23⤵
- Executes dropped EXE
PID:4512 -
\??\c:\vjjjd.exec:\vjjjd.exe24⤵
- Executes dropped EXE
PID:4564 -
\??\c:\dddpv.exec:\dddpv.exe25⤵
- Executes dropped EXE
PID:348 -
\??\c:\rffxffl.exec:\rffxffl.exe26⤵
- Executes dropped EXE
PID:3952 -
\??\c:\hbhbbb.exec:\hbhbbb.exe27⤵
- Executes dropped EXE
PID:1164 -
\??\c:\nttnbb.exec:\nttnbb.exe28⤵
- Executes dropped EXE
PID:1520 -
\??\c:\pdvdp.exec:\pdvdp.exe29⤵
- Executes dropped EXE
PID:1668 -
\??\c:\xrrllrr.exec:\xrrllrr.exe30⤵
- Executes dropped EXE
PID:956 -
\??\c:\5nnnnn.exec:\5nnnnn.exe31⤵
- Executes dropped EXE
PID:1656 -
\??\c:\jvddp.exec:\jvddp.exe32⤵
- Executes dropped EXE
PID:448 -
\??\c:\ppdvv.exec:\ppdvv.exe33⤵
- Executes dropped EXE
PID:1004 -
\??\c:\fffxxxf.exec:\fffxxxf.exe34⤵
- Executes dropped EXE
PID:740 -
\??\c:\htttnn.exec:\htttnn.exe35⤵
- Executes dropped EXE
PID:3916 -
\??\c:\djpdv.exec:\djpdv.exe36⤵
- Executes dropped EXE
PID:3440 -
\??\c:\ppvpj.exec:\ppvpj.exe37⤵
- Executes dropped EXE
PID:3920 -
\??\c:\xrfxrrl.exec:\xrfxrrl.exe38⤵
- Executes dropped EXE
PID:2636 -
\??\c:\flrrllf.exec:\flrrllf.exe39⤵
- Executes dropped EXE
PID:2832 -
\??\c:\hnbttn.exec:\hnbttn.exe40⤵
- Executes dropped EXE
PID:1464 -
\??\c:\3jjjj.exec:\3jjjj.exe41⤵
- Executes dropped EXE
PID:2988 -
\??\c:\vpjdp.exec:\vpjdp.exe42⤵
- Executes dropped EXE
PID:4284 -
\??\c:\lffxlll.exec:\lffxlll.exe43⤵
- Executes dropped EXE
PID:984 -
\??\c:\xrrllff.exec:\xrrllff.exe44⤵
- Executes dropped EXE
PID:588 -
\??\c:\ntnhnt.exec:\ntnhnt.exe45⤵
- Executes dropped EXE
PID:1484 -
\??\c:\hbthbt.exec:\hbthbt.exe46⤵
- Executes dropped EXE
PID:556 -
\??\c:\9pvpj.exec:\9pvpj.exe47⤵
- Executes dropped EXE
PID:4732 -
\??\c:\vppjv.exec:\vppjv.exe48⤵
- Executes dropped EXE
PID:4308 -
\??\c:\lxrfrll.exec:\lxrfrll.exe49⤵
- Executes dropped EXE
PID:2924 -
\??\c:\rrxxxlr.exec:\rrxxxlr.exe50⤵
- Executes dropped EXE
PID:2580 -
\??\c:\hntnhh.exec:\hntnhh.exe51⤵
- Executes dropped EXE
PID:2764 -
\??\c:\dpdjj.exec:\dpdjj.exe52⤵
- Executes dropped EXE
PID:3400 -
\??\c:\djppd.exec:\djppd.exe53⤵
- Executes dropped EXE
PID:4380 -
\??\c:\pjpjd.exec:\pjpjd.exe54⤵
- Executes dropped EXE
PID:2396 -
\??\c:\ffllffx.exec:\ffllffx.exe55⤵
- Executes dropped EXE
PID:2516 -
\??\c:\llxrrrr.exec:\llxrrrr.exe56⤵
- Executes dropped EXE
PID:2700 -
\??\c:\hbbthh.exec:\hbbthh.exe57⤵
- Executes dropped EXE
PID:3636 -
\??\c:\tbtnhh.exec:\tbtnhh.exe58⤵
- Executes dropped EXE
PID:4816 -
\??\c:\pvvdv.exec:\pvvdv.exe59⤵
- Executes dropped EXE
PID:3080 -
\??\c:\jjjdd.exec:\jjjdd.exe60⤵
- Executes dropped EXE
PID:1396 -
\??\c:\lfrlxxx.exec:\lfrlxxx.exe61⤵
- Executes dropped EXE
PID:4660 -
\??\c:\flrxxxr.exec:\flrxxxr.exe62⤵
- Executes dropped EXE
PID:1468 -
\??\c:\nnbbtt.exec:\nnbbtt.exe63⤵
- Executes dropped EXE
PID:1672 -
\??\c:\bnhhtt.exec:\bnhhtt.exe64⤵
- Executes dropped EXE
PID:848 -
\??\c:\1djjj.exec:\1djjj.exe65⤵
- Executes dropped EXE
PID:3592 -
\??\c:\xlffflf.exec:\xlffflf.exe66⤵PID:4072
-
\??\c:\5rrlffx.exec:\5rrlffx.exe67⤵PID:2388
-
\??\c:\3tbtnt.exec:\3tbtnt.exe68⤵PID:2384
-
\??\c:\bhnhhh.exec:\bhnhhh.exe69⤵PID:4700
-
\??\c:\ppppj.exec:\ppppj.exe70⤵PID:1312
-
\??\c:\jpjjv.exec:\jpjjv.exe71⤵PID:5020
-
\??\c:\rxffxff.exec:\rxffxff.exe72⤵PID:4184
-
\??\c:\fxfrrfr.exec:\fxfrrfr.exe73⤵PID:1320
-
\??\c:\nhbnhb.exec:\nhbnhb.exe74⤵PID:4140
-
\??\c:\btnbhb.exec:\btnbhb.exe75⤵
- System Location Discovery: System Language Discovery
PID:4704 -
\??\c:\jpjdv.exec:\jpjdv.exe76⤵PID:232
-
\??\c:\jvdvj.exec:\jvdvj.exe77⤵PID:4564
-
\??\c:\lrfrxfx.exec:\lrfrxfx.exe78⤵PID:1924
-
\??\c:\tnhnht.exec:\tnhnht.exe79⤵PID:3588
-
\??\c:\nhhhtt.exec:\nhhhtt.exe80⤵PID:4856
-
\??\c:\dvjvd.exec:\dvjvd.exe81⤵PID:5076
-
\??\c:\vjjjv.exec:\vjjjv.exe82⤵PID:5040
-
\??\c:\1ffrfrx.exec:\1ffrfrx.exe83⤵PID:3812
-
\??\c:\bbnbnn.exec:\bbnbnn.exe84⤵PID:4440
-
\??\c:\rrrflfr.exec:\rrrflfr.exe85⤵PID:3524
-
\??\c:\xxxlflf.exec:\xxxlflf.exe86⤵PID:3256
-
\??\c:\httnbt.exec:\httnbt.exe87⤵PID:2400
-
\??\c:\7bthtn.exec:\7bthtn.exe88⤵PID:744
-
\??\c:\jvvvp.exec:\jvvvp.exe89⤵PID:4424
-
\??\c:\vjjdp.exec:\vjjdp.exe90⤵PID:3916
-
\??\c:\lrrlffx.exec:\lrrlffx.exe91⤵PID:1848
-
\??\c:\xrlfrlx.exec:\xrlfrlx.exe92⤵PID:3920
-
\??\c:\hnbbhb.exec:\hnbbhb.exe93⤵PID:2948
-
\??\c:\htbntn.exec:\htbntn.exe94⤵PID:4496
-
\??\c:\jdvpj.exec:\jdvpj.exe95⤵PID:516
-
\??\c:\xffrxrf.exec:\xffrxrf.exe96⤵PID:4392
-
\??\c:\ththtn.exec:\ththtn.exe97⤵PID:2304
-
\??\c:\9ttbth.exec:\9ttbth.exe98⤵PID:1552
-
\??\c:\pdpdj.exec:\pdpdj.exe99⤵PID:896
-
\??\c:\pjvjp.exec:\pjvjp.exe100⤵PID:1036
-
\??\c:\3xrflxl.exec:\3xrflxl.exe101⤵PID:3760
-
\??\c:\1xrfrfr.exec:\1xrfrfr.exe102⤵PID:4732
-
\??\c:\htbtnh.exec:\htbtnh.exe103⤵PID:4308
-
\??\c:\jpdpv.exec:\jpdpv.exe104⤵PID:2924
-
\??\c:\9jjvj.exec:\9jjvj.exe105⤵PID:3004
-
\??\c:\rrfxfrf.exec:\rrfxfrf.exe106⤵PID:680
-
\??\c:\flfrfrf.exec:\flfrfrf.exe107⤵
- System Location Discovery: System Language Discovery
PID:1384 -
\??\c:\7nbnhb.exec:\7nbnhb.exe108⤵PID:3056
-
\??\c:\tbnbnb.exec:\tbnbnb.exe109⤵PID:2396
-
\??\c:\pjvjp.exec:\pjvjp.exe110⤵PID:4328
-
\??\c:\vjdpv.exec:\vjdpv.exe111⤵PID:4364
-
\??\c:\flfrxll.exec:\flfrxll.exe112⤵PID:4760
-
\??\c:\xrrfrlf.exec:\xrrfrlf.exe113⤵PID:4816
-
\??\c:\bnnbbn.exec:\bnnbbn.exe114⤵PID:840
-
\??\c:\9pjvd.exec:\9pjvd.exe115⤵PID:1628
-
\??\c:\jvpdp.exec:\jvpdp.exe116⤵PID:2440
-
\??\c:\vjjvd.exec:\vjjvd.exe117⤵PID:5088
-
\??\c:\flxlrlx.exec:\flxlrlx.exe118⤵PID:2000
-
\??\c:\3rfrfxl.exec:\3rfrfxl.exe119⤵PID:3012
-
\??\c:\3tnbnh.exec:\3tnbnh.exe120⤵PID:3028
-
\??\c:\1nhhbb.exec:\1nhhbb.exe121⤵PID:4336
-
\??\c:\jvdvj.exec:\jvdvj.exe122⤵PID:4420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-