Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 23:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe
Resource
win7-20241010-en
6 signatures
150 seconds
General
-
Target
8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe
-
Size
64KB
-
MD5
c2066d2f26e997746ff705e97ee5f1f6
-
SHA1
afd70f409acb50eeb435564aac347e15dc0d36d0
-
SHA256
8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360
-
SHA512
c899d5705568ddb84d349555d3e4d0abc8caec2555e52bf2287a96f7cff23e8b43182b1df61ba9c36417812d159e13ef395d02050f4f8d682e308d013438d7e3
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxiv:ymb3NkkiQ3mdBjF0y7kbc
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2156-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3156-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1208-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2628-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2680-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5048-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/884-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3608-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4384-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1700-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/364-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3544-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4228-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2716-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5044-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2500-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2828-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3156 5ffrlrl.exe 1208 rxfxrlf.exe 2628 bnnhhb.exe 2680 dpvpj.exe 5048 flrfrll.exe 884 hbbhbn.exe 3608 hbbtnh.exe 4384 vjdvp.exe 1700 vpjvd.exe 4872 btthth.exe 364 thhthb.exe 4408 djjdp.exe 3024 vpdvp.exe 4508 lxxfxrf.exe 840 bbtnhh.exe 3544 vddvj.exe 4228 pjdvp.exe 3436 9xxrxxl.exe 2964 nhbnnb.exe 2716 jjjdp.exe 4736 fllxrlf.exe 336 7xxlxxl.exe 1196 tnnnhb.exe 5044 3vvjv.exe 1136 xfflfrf.exe 2500 ttnhbn.exe 1392 vjjvv.exe 3628 pdjvj.exe 2828 xrfxrff.exe 4172 5hnnhh.exe 4964 pvvvj.exe 4348 djdvj.exe 5028 1rrlxxr.exe 2764 bthnhb.exe 2368 pvpvd.exe 3052 jdvvv.exe 4980 xxlflfl.exe 2360 ttttnn.exe 444 bbbbbb.exe 3960 5hbtnh.exe 4312 bhhbhn.exe 4340 jddvd.exe 4424 ddpdp.exe 4892 xfrllll.exe 628 5tnnhh.exe 1028 nnhnhh.exe 2284 5jvjp.exe 2712 pjvdv.exe 3048 1flfxxr.exe 3632 thhbbb.exe 4856 1hhhbb.exe 2060 btbthh.exe 3112 1pvpd.exe 2404 rrxrffr.exe 2988 1lllrrx.exe 3672 tbbbhb.exe 2924 hnttth.exe 3676 5ddvj.exe 1980 djjdv.exe 3544 1llfrrl.exe 3412 lfxrxxr.exe 2668 3ntnht.exe 1448 hnhthh.exe 4888 djjdp.exe -
resource yara_rule behavioral2/memory/2156-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3156-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2628-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2680-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5048-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/884-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3608-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4384-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1700-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1700-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1700-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/364-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4508-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2716-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5044-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2500-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2828-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-209-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rxrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3156 2156 8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe 83 PID 2156 wrote to memory of 3156 2156 8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe 83 PID 2156 wrote to memory of 3156 2156 8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe 83 PID 3156 wrote to memory of 1208 3156 5ffrlrl.exe 84 PID 3156 wrote to memory of 1208 3156 5ffrlrl.exe 84 PID 3156 wrote to memory of 1208 3156 5ffrlrl.exe 84 PID 1208 wrote to memory of 2628 1208 rxfxrlf.exe 85 PID 1208 wrote to memory of 2628 1208 rxfxrlf.exe 85 PID 1208 wrote to memory of 2628 1208 rxfxrlf.exe 85 PID 2628 wrote to memory of 2680 2628 bnnhhb.exe 86 PID 2628 wrote to memory of 2680 2628 bnnhhb.exe 86 PID 2628 wrote to memory of 2680 2628 bnnhhb.exe 86 PID 2680 wrote to memory of 5048 2680 dpvpj.exe 87 PID 2680 wrote to memory of 5048 2680 dpvpj.exe 87 PID 2680 wrote to memory of 5048 2680 dpvpj.exe 87 PID 5048 wrote to memory of 884 5048 flrfrll.exe 88 PID 5048 wrote to memory of 884 5048 flrfrll.exe 88 PID 5048 wrote to memory of 884 5048 flrfrll.exe 88 PID 884 wrote to memory of 3608 884 hbbhbn.exe 89 PID 884 wrote to memory of 3608 884 hbbhbn.exe 89 PID 884 wrote to memory of 3608 884 hbbhbn.exe 89 PID 3608 wrote to memory of 4384 3608 hbbtnh.exe 90 PID 3608 wrote to memory of 4384 3608 hbbtnh.exe 90 PID 3608 wrote to memory of 4384 3608 hbbtnh.exe 90 PID 4384 wrote to memory of 1700 4384 vjdvp.exe 91 PID 4384 wrote to memory of 1700 4384 vjdvp.exe 91 PID 4384 wrote to memory of 1700 4384 vjdvp.exe 91 PID 1700 wrote to memory of 4872 1700 vpjvd.exe 92 PID 1700 wrote to memory of 4872 1700 vpjvd.exe 92 PID 1700 wrote to memory of 4872 1700 vpjvd.exe 92 PID 4872 wrote to memory of 364 4872 btthth.exe 93 PID 4872 wrote to memory of 364 4872 btthth.exe 93 PID 4872 wrote to memory of 364 4872 btthth.exe 93 PID 364 wrote to memory of 4408 364 thhthb.exe 94 PID 364 wrote to memory of 4408 364 thhthb.exe 94 PID 364 wrote to memory of 4408 364 thhthb.exe 94 PID 4408 wrote to memory of 3024 4408 djjdp.exe 96 PID 4408 wrote to memory of 3024 4408 djjdp.exe 96 PID 4408 wrote to memory of 3024 4408 djjdp.exe 96 PID 3024 wrote to memory of 4508 3024 vpdvp.exe 97 PID 3024 wrote to memory of 4508 3024 vpdvp.exe 97 PID 3024 wrote to memory of 4508 3024 vpdvp.exe 97 PID 4508 wrote to memory of 840 4508 lxxfxrf.exe 98 PID 4508 wrote to memory of 840 4508 lxxfxrf.exe 98 PID 4508 wrote to memory of 840 4508 lxxfxrf.exe 98 PID 840 wrote to memory of 3544 840 bbtnhh.exe 99 PID 840 wrote to memory of 3544 840 bbtnhh.exe 99 PID 840 wrote to memory of 3544 840 bbtnhh.exe 99 PID 3544 wrote to memory of 4228 3544 vddvj.exe 100 PID 3544 wrote to memory of 4228 3544 vddvj.exe 100 PID 3544 wrote to memory of 4228 3544 vddvj.exe 100 PID 4228 wrote to memory of 3436 4228 pjdvp.exe 101 PID 4228 wrote to memory of 3436 4228 pjdvp.exe 101 PID 4228 wrote to memory of 3436 4228 pjdvp.exe 101 PID 3436 wrote to memory of 2964 3436 9xxrxxl.exe 102 PID 3436 wrote to memory of 2964 3436 9xxrxxl.exe 102 PID 3436 wrote to memory of 2964 3436 9xxrxxl.exe 102 PID 2964 wrote to memory of 2716 2964 nhbnnb.exe 104 PID 2964 wrote to memory of 2716 2964 nhbnnb.exe 104 PID 2964 wrote to memory of 2716 2964 nhbnnb.exe 104 PID 2716 wrote to memory of 4736 2716 jjjdp.exe 105 PID 2716 wrote to memory of 4736 2716 jjjdp.exe 105 PID 2716 wrote to memory of 4736 2716 jjjdp.exe 105 PID 4736 wrote to memory of 336 4736 fllxrlf.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe"C:\Users\Admin\AppData\Local\Temp\8752ff9ed056bc1a43a266667a39fbc36a7a54172f1ce8f0dcda207366268360.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\5ffrlrl.exec:\5ffrlrl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
\??\c:\rxfxrlf.exec:\rxfxrlf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\bnnhhb.exec:\bnnhhb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\dpvpj.exec:\dpvpj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\flrfrll.exec:\flrfrll.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
\??\c:\hbbhbn.exec:\hbbhbn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\hbbtnh.exec:\hbbtnh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
\??\c:\vjdvp.exec:\vjdvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
\??\c:\vpjvd.exec:\vpjvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\btthth.exec:\btthth.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\thhthb.exec:\thhthb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
\??\c:\djjdp.exec:\djjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\vpdvp.exec:\vpdvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\lxxfxrf.exec:\lxxfxrf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
\??\c:\bbtnhh.exec:\bbtnhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\vddvj.exec:\vddvj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
\??\c:\pjdvp.exec:\pjdvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\9xxrxxl.exec:\9xxrxxl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\nhbnnb.exec:\nhbnnb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\jjjdp.exec:\jjjdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\fllxrlf.exec:\fllxrlf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\7xxlxxl.exec:\7xxlxxl.exe23⤵
- Executes dropped EXE
PID:336 -
\??\c:\tnnnhb.exec:\tnnnhb.exe24⤵
- Executes dropped EXE
PID:1196 -
\??\c:\3vvjv.exec:\3vvjv.exe25⤵
- Executes dropped EXE
PID:5044 -
\??\c:\xfflfrf.exec:\xfflfrf.exe26⤵
- Executes dropped EXE
PID:1136 -
\??\c:\ttnhbn.exec:\ttnhbn.exe27⤵
- Executes dropped EXE
PID:2500 -
\??\c:\vjjvv.exec:\vjjvv.exe28⤵
- Executes dropped EXE
PID:1392 -
\??\c:\pdjvj.exec:\pdjvj.exe29⤵
- Executes dropped EXE
PID:3628 -
\??\c:\xrfxrff.exec:\xrfxrff.exe30⤵
- Executes dropped EXE
PID:2828 -
\??\c:\5hnnhh.exec:\5hnnhh.exe31⤵
- Executes dropped EXE
PID:4172 -
\??\c:\pvvvj.exec:\pvvvj.exe32⤵
- Executes dropped EXE
PID:4964 -
\??\c:\djdvj.exec:\djdvj.exe33⤵
- Executes dropped EXE
PID:4348 -
\??\c:\1rrlxxr.exec:\1rrlxxr.exe34⤵
- Executes dropped EXE
PID:5028 -
\??\c:\bthnhb.exec:\bthnhb.exe35⤵
- Executes dropped EXE
PID:2764 -
\??\c:\pvpvd.exec:\pvpvd.exe36⤵
- Executes dropped EXE
PID:2368 -
\??\c:\jdvvv.exec:\jdvvv.exe37⤵
- Executes dropped EXE
PID:3052 -
\??\c:\xxlflfl.exec:\xxlflfl.exe38⤵
- Executes dropped EXE
PID:4980 -
\??\c:\ttttnn.exec:\ttttnn.exe39⤵
- Executes dropped EXE
PID:2360 -
\??\c:\bbbbbb.exec:\bbbbbb.exe40⤵
- Executes dropped EXE
PID:444 -
\??\c:\5hbtnh.exec:\5hbtnh.exe41⤵
- Executes dropped EXE
PID:3960 -
\??\c:\bhhbhn.exec:\bhhbhn.exe42⤵
- Executes dropped EXE
PID:4312 -
\??\c:\jddvd.exec:\jddvd.exe43⤵
- Executes dropped EXE
PID:4340 -
\??\c:\ddpdp.exec:\ddpdp.exe44⤵
- Executes dropped EXE
PID:4424 -
\??\c:\xfrllll.exec:\xfrllll.exe45⤵
- Executes dropped EXE
PID:4892 -
\??\c:\5tnnhh.exec:\5tnnhh.exe46⤵
- Executes dropped EXE
PID:628 -
\??\c:\nnhnhh.exec:\nnhnhh.exe47⤵
- Executes dropped EXE
PID:1028 -
\??\c:\5jvjp.exec:\5jvjp.exe48⤵
- Executes dropped EXE
PID:2284 -
\??\c:\pjvdv.exec:\pjvdv.exe49⤵
- Executes dropped EXE
PID:2712 -
\??\c:\1flfxxr.exec:\1flfxxr.exe50⤵
- Executes dropped EXE
PID:3048 -
\??\c:\thhbbb.exec:\thhbbb.exe51⤵
- Executes dropped EXE
PID:3632 -
\??\c:\1hhhbb.exec:\1hhhbb.exe52⤵
- Executes dropped EXE
PID:4856 -
\??\c:\btbthh.exec:\btbthh.exe53⤵
- Executes dropped EXE
PID:2060 -
\??\c:\1pvpd.exec:\1pvpd.exe54⤵
- Executes dropped EXE
PID:3112 -
\??\c:\rrxrffr.exec:\rrxrffr.exe55⤵
- Executes dropped EXE
PID:2404 -
\??\c:\1lllrrx.exec:\1lllrrx.exe56⤵
- Executes dropped EXE
PID:2988 -
\??\c:\tbbbhb.exec:\tbbbhb.exe57⤵
- Executes dropped EXE
PID:3672 -
\??\c:\hnttth.exec:\hnttth.exe58⤵
- Executes dropped EXE
PID:2924 -
\??\c:\5ddvj.exec:\5ddvj.exe59⤵
- Executes dropped EXE
PID:3676 -
\??\c:\djjdv.exec:\djjdv.exe60⤵
- Executes dropped EXE
PID:1980 -
\??\c:\1llfrrl.exec:\1llfrrl.exe61⤵
- Executes dropped EXE
PID:3544 -
\??\c:\lfxrxxr.exec:\lfxrxxr.exe62⤵
- Executes dropped EXE
PID:3412 -
\??\c:\3ntnht.exec:\3ntnht.exe63⤵
- Executes dropped EXE
PID:2668 -
\??\c:\hnhthh.exec:\hnhthh.exe64⤵
- Executes dropped EXE
PID:1448 -
\??\c:\djjdp.exec:\djjdp.exe65⤵
- Executes dropped EXE
PID:4888 -
\??\c:\vppdv.exec:\vppdv.exe66⤵PID:2716
-
\??\c:\lxxrrlr.exec:\lxxrrlr.exe67⤵PID:4436
-
\??\c:\1rxrxxr.exec:\1rxrxxr.exe68⤵PID:4828
-
\??\c:\hnttnn.exec:\hnttnn.exe69⤵PID:336
-
\??\c:\hbbnbb.exec:\hbbnbb.exe70⤵PID:3516
-
\??\c:\nbtnbb.exec:\nbtnbb.exe71⤵PID:4008
-
\??\c:\pppjd.exec:\pppjd.exe72⤵PID:1044
-
\??\c:\rlrlllr.exec:\rlrlllr.exe73⤵PID:1084
-
\??\c:\lffxxxx.exec:\lffxxxx.exe74⤵PID:3932
-
\??\c:\xxxxffl.exec:\xxxxffl.exe75⤵PID:4676
-
\??\c:\nbnhtb.exec:\nbnhtb.exe76⤵PID:3868
-
\??\c:\nhhbbt.exec:\nhhbbt.exe77⤵PID:1480
-
\??\c:\1dddv.exec:\1dddv.exe78⤵PID:4428
-
\??\c:\3pvpd.exec:\3pvpd.exe79⤵PID:4684
-
\??\c:\fxffxxf.exec:\fxffxxf.exe80⤵PID:1616
-
\??\c:\hbhhbb.exec:\hbhhbb.exe81⤵PID:4964
-
\??\c:\hntbtt.exec:\hntbtt.exe82⤵PID:1128
-
\??\c:\vpjdv.exec:\vpjdv.exe83⤵PID:636
-
\??\c:\jdddv.exec:\jdddv.exe84⤵PID:4320
-
\??\c:\vjjdp.exec:\vjjdp.exe85⤵PID:928
-
\??\c:\frrlrrl.exec:\frrlrrl.exe86⤵PID:4496
-
\??\c:\3hhbbt.exec:\3hhbbt.exe87⤵PID:508
-
\??\c:\nhhbbt.exec:\nhhbbt.exe88⤵PID:4248
-
\??\c:\dpvvp.exec:\dpvvp.exe89⤵PID:3156
-
\??\c:\dppjd.exec:\dppjd.exe90⤵PID:4820
-
\??\c:\frlfxrl.exec:\frlfxrl.exe91⤵PID:4840
-
\??\c:\flffxrr.exec:\flffxrr.exe92⤵PID:3060
-
\??\c:\bhhnbn.exec:\bhhnbn.exe93⤵PID:1728
-
\??\c:\hnnhbb.exec:\hnnhbb.exe94⤵PID:4564
-
\??\c:\dvvdv.exec:\dvvdv.exe95⤵PID:884
-
\??\c:\jjdjd.exec:\jjdjd.exe96⤵PID:5036
-
\??\c:\5fffxxr.exec:\5fffxxr.exe97⤵PID:2136
-
\??\c:\7llfffx.exec:\7llfffx.exe98⤵PID:8
-
\??\c:\rllrlll.exec:\rllrlll.exe99⤵PID:3068
-
\??\c:\1hhhhn.exec:\1hhhhn.exe100⤵PID:760
-
\??\c:\nnnhhh.exec:\nnnhhh.exe101⤵PID:2064
-
\??\c:\vjdvv.exec:\vjdvv.exe102⤵PID:364
-
\??\c:\pdjdp.exec:\pdjdp.exe103⤵PID:4920
-
\??\c:\rllfxll.exec:\rllfxll.exe104⤵PID:4724
-
\??\c:\lfllfff.exec:\lfllfff.exe105⤵PID:764
-
\??\c:\hhttnn.exec:\hhttnn.exe106⤵PID:2564
-
\??\c:\bhhbnn.exec:\bhhbnn.exe107⤵PID:1476
-
\??\c:\jddvd.exec:\jddvd.exe108⤵PID:2724
-
\??\c:\1vppd.exec:\1vppd.exe109⤵PID:4080
-
\??\c:\rrlfxxr.exec:\rrlfxxr.exe110⤵PID:4228
-
\??\c:\lxrrxll.exec:\lxrrxll.exe111⤵PID:3476
-
\??\c:\bntnhh.exec:\bntnhh.exe112⤵PID:2592
-
\??\c:\hbhhtb.exec:\hbhhtb.exe113⤵PID:3288
-
\??\c:\vjpvp.exec:\vjpvp.exe114⤵PID:4900
-
\??\c:\vjjdv.exec:\vjjdv.exe115⤵PID:4736
-
\??\c:\1xxrfff.exec:\1xxrfff.exe116⤵PID:4436
-
\??\c:\xxfxrrr.exec:\xxfxrrr.exe117⤵PID:3944
-
\??\c:\bntnhh.exec:\bntnhh.exe118⤵PID:2372
-
\??\c:\tnhhtt.exec:\tnhhtt.exe119⤵PID:2856
-
\??\c:\bbnhtt.exec:\bbnhtt.exe120⤵PID:5060
-
\??\c:\dpdvd.exec:\dpdvd.exe121⤵PID:4092
-
\??\c:\jppjd.exec:\jppjd.exe122⤵PID:4604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-