Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 12:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe
-
Size
71KB
-
MD5
a9a021d58ca4d986043a6f294e5c6540
-
SHA1
4c90fbd0e006777e408762a02da2adf0601a8f6d
-
SHA256
138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907ca
-
SHA512
ba73e7a01230c229039ae9c8bc9ce8ebf618cc2c84f59800c88e5238ab5f59024cc651b6f69eb3097906f684816e3a581a3c96fa4f03e672ed216b421a01e205
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjD:ymb3NkkiQ3mdBjFI4VT
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/2268-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1060-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4240-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3164-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5116-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/812-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3100-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1296-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2544-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3084-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4060-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3676-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3976-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4844-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2632-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2896-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1200-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4132-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4380-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3420-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3736-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2268 hhhbbh.exe 1060 3pdvp.exe 3164 pdjvd.exe 5116 htbhbb.exe 1580 pjddp.exe 3476 jdvvj.exe 1296 lfffrrf.exe 812 tnnnnn.exe 3100 hhttth.exe 4180 vpdvv.exe 3084 rlrffll.exe 2544 nbhhbb.exe 4128 htttbb.exe 1824 vjvpj.exe 4060 xllffff.exe 3676 nhbtbh.exe 3976 ttbbnt.exe 1492 pjddv.exe 4844 9fllflf.exe 2632 rrlffxx.exe 2896 bbhhnt.exe 1200 pjvvv.exe 4132 ppdvp.exe 4380 xfllxff.exe 4224 rrfllxx.exe 3224 tttthn.exe 3420 pdvpv.exe 3736 ffllrxr.exe 4524 bthbnb.exe 3276 ppvvp.exe 2536 vjddv.exe 3572 xffllxf.exe 4876 tthhhn.exe 3360 nhnhhh.exe 4548 dpdjd.exe 4988 fxxxrlf.exe 2384 bttnhh.exe 4800 1ttthn.exe 2408 dvdvv.exe 1800 3fflfll.exe 2272 nhbbtt.exe 852 hnnnbt.exe 2020 dvjdv.exe 2644 rlfrllf.exe 4672 tbhhbb.exe 3076 vpvvp.exe 2804 djvpp.exe 1296 3lfxllr.exe 1992 btnhbt.exe 2040 jjvvv.exe 2700 fxxrrll.exe 2944 hnbtnt.exe 3152 nnttnn.exe 4824 3xxxxff.exe 2952 vvdjp.exe 3280 fllfxfx.exe 2320 btbbtt.exe 4072 jddvv.exe 1824 ffxxxfx.exe 2116 llxxffr.exe 3676 tbtnnn.exe 4992 llxfrff.exe 2996 llrllll.exe 1524 tbnhhh.exe -
resource yara_rule behavioral2/memory/4240-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3164-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3164-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4240-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3164-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5116-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/812-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3100-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1296-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2544-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3084-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4060-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3676-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3976-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4844-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2632-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2896-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1200-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4132-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4380-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3736-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-207-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlxffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxxxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2268 4240 138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe 83 PID 4240 wrote to memory of 2268 4240 138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe 83 PID 4240 wrote to memory of 2268 4240 138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe 83 PID 2268 wrote to memory of 1060 2268 hhhbbh.exe 84 PID 2268 wrote to memory of 1060 2268 hhhbbh.exe 84 PID 2268 wrote to memory of 1060 2268 hhhbbh.exe 84 PID 1060 wrote to memory of 3164 1060 3pdvp.exe 85 PID 1060 wrote to memory of 3164 1060 3pdvp.exe 85 PID 1060 wrote to memory of 3164 1060 3pdvp.exe 85 PID 3164 wrote to memory of 5116 3164 pdjvd.exe 87 PID 3164 wrote to memory of 5116 3164 pdjvd.exe 87 PID 3164 wrote to memory of 5116 3164 pdjvd.exe 87 PID 5116 wrote to memory of 1580 5116 htbhbb.exe 88 PID 5116 wrote to memory of 1580 5116 htbhbb.exe 88 PID 5116 wrote to memory of 1580 5116 htbhbb.exe 88 PID 1580 wrote to memory of 3476 1580 pjddp.exe 89 PID 1580 wrote to memory of 3476 1580 pjddp.exe 89 PID 1580 wrote to memory of 3476 1580 pjddp.exe 89 PID 3476 wrote to memory of 1296 3476 jdvvj.exe 90 PID 3476 wrote to memory of 1296 3476 jdvvj.exe 90 PID 3476 wrote to memory of 1296 3476 jdvvj.exe 90 PID 1296 wrote to memory of 812 1296 lfffrrf.exe 92 PID 1296 wrote to memory of 812 1296 lfffrrf.exe 92 PID 1296 wrote to memory of 812 1296 lfffrrf.exe 92 PID 812 wrote to memory of 3100 812 tnnnnn.exe 93 PID 812 wrote to memory of 3100 812 tnnnnn.exe 93 PID 812 wrote to memory of 3100 812 tnnnnn.exe 93 PID 3100 wrote to memory of 4180 3100 hhttth.exe 94 PID 3100 wrote to memory of 4180 3100 hhttth.exe 94 PID 3100 wrote to memory of 4180 3100 hhttth.exe 94 PID 4180 wrote to memory of 3084 4180 vpdvv.exe 95 PID 4180 wrote to memory of 3084 4180 vpdvv.exe 95 PID 4180 wrote to memory of 3084 4180 vpdvv.exe 95 PID 3084 wrote to memory of 2544 3084 rlrffll.exe 96 PID 3084 wrote to memory of 2544 3084 rlrffll.exe 96 PID 3084 wrote to memory of 2544 3084 rlrffll.exe 96 PID 2544 wrote to memory of 4128 2544 nbhhbb.exe 97 PID 2544 wrote to memory of 4128 2544 nbhhbb.exe 97 PID 2544 wrote to memory of 4128 2544 nbhhbb.exe 97 PID 4128 wrote to memory of 1824 4128 htttbb.exe 98 PID 4128 wrote to memory of 1824 4128 htttbb.exe 98 PID 4128 wrote to memory of 1824 4128 htttbb.exe 98 PID 1824 wrote to memory of 4060 1824 vjvpj.exe 99 PID 1824 wrote to memory of 4060 1824 vjvpj.exe 99 PID 1824 wrote to memory of 4060 1824 vjvpj.exe 99 PID 4060 wrote to memory of 3676 4060 xllffff.exe 100 PID 4060 wrote to memory of 3676 4060 xllffff.exe 100 PID 4060 wrote to memory of 3676 4060 xllffff.exe 100 PID 3676 wrote to memory of 3976 3676 nhbtbh.exe 102 PID 3676 wrote to memory of 3976 3676 nhbtbh.exe 102 PID 3676 wrote to memory of 3976 3676 nhbtbh.exe 102 PID 3976 wrote to memory of 1492 3976 ttbbnt.exe 103 PID 3976 wrote to memory of 1492 3976 ttbbnt.exe 103 PID 3976 wrote to memory of 1492 3976 ttbbnt.exe 103 PID 1492 wrote to memory of 4844 1492 pjddv.exe 104 PID 1492 wrote to memory of 4844 1492 pjddv.exe 104 PID 1492 wrote to memory of 4844 1492 pjddv.exe 104 PID 4844 wrote to memory of 2632 4844 9fllflf.exe 105 PID 4844 wrote to memory of 2632 4844 9fllflf.exe 105 PID 4844 wrote to memory of 2632 4844 9fllflf.exe 105 PID 2632 wrote to memory of 2896 2632 rrlffxx.exe 106 PID 2632 wrote to memory of 2896 2632 rrlffxx.exe 106 PID 2632 wrote to memory of 2896 2632 rrlffxx.exe 106 PID 2896 wrote to memory of 1200 2896 bbhhnt.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe"C:\Users\Admin\AppData\Local\Temp\138ca5d0d004bb9fe69a9e1421b9bf9808ccffcda6cfb35c5ac28a413bc907caN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\hhhbbh.exec:\hhhbbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\3pdvp.exec:\3pdvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
\??\c:\pdjvd.exec:\pdjvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\htbhbb.exec:\htbhbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\pjddp.exec:\pjddp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\jdvvj.exec:\jdvvj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\lfffrrf.exec:\lfffrrf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\tnnnnn.exec:\tnnnnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\hhttth.exec:\hhttth.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\vpdvv.exec:\vpdvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\rlrffll.exec:\rlrffll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
\??\c:\nbhhbb.exec:\nbhhbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\htttbb.exec:\htttbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
\??\c:\vjvpj.exec:\vjvpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\xllffff.exec:\xllffff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\nhbtbh.exec:\nhbtbh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\ttbbnt.exec:\ttbbnt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\pjddv.exec:\pjddv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
\??\c:\9fllflf.exec:\9fllflf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\rrlffxx.exec:\rrlffxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\bbhhnt.exec:\bbhhnt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\pjvvv.exec:\pjvvv.exe23⤵
- Executes dropped EXE
PID:1200 -
\??\c:\ppdvp.exec:\ppdvp.exe24⤵
- Executes dropped EXE
PID:4132 -
\??\c:\xfllxff.exec:\xfllxff.exe25⤵
- Executes dropped EXE
PID:4380 -
\??\c:\rrfllxx.exec:\rrfllxx.exe26⤵
- Executes dropped EXE
PID:4224 -
\??\c:\tttthn.exec:\tttthn.exe27⤵
- Executes dropped EXE
PID:3224 -
\??\c:\pdvpv.exec:\pdvpv.exe28⤵
- Executes dropped EXE
PID:3420 -
\??\c:\ffllrxr.exec:\ffllrxr.exe29⤵
- Executes dropped EXE
PID:3736 -
\??\c:\bthbnb.exec:\bthbnb.exe30⤵
- Executes dropped EXE
PID:4524 -
\??\c:\ppvvp.exec:\ppvvp.exe31⤵
- Executes dropped EXE
PID:3276 -
\??\c:\vjddv.exec:\vjddv.exe32⤵
- Executes dropped EXE
PID:2536 -
\??\c:\xffllxf.exec:\xffllxf.exe33⤵
- Executes dropped EXE
PID:3572 -
\??\c:\tthhhn.exec:\tthhhn.exe34⤵
- Executes dropped EXE
PID:4876 -
\??\c:\nhnhhh.exec:\nhnhhh.exe35⤵
- Executes dropped EXE
PID:3360 -
\??\c:\dpdjd.exec:\dpdjd.exe36⤵
- Executes dropped EXE
PID:4548 -
\??\c:\fxxxrlf.exec:\fxxxrlf.exe37⤵
- Executes dropped EXE
PID:4988 -
\??\c:\bttnhh.exec:\bttnhh.exe38⤵
- Executes dropped EXE
PID:2384 -
\??\c:\1ttthn.exec:\1ttthn.exe39⤵
- Executes dropped EXE
PID:4800 -
\??\c:\dvdvv.exec:\dvdvv.exe40⤵
- Executes dropped EXE
PID:2408 -
\??\c:\3fflfll.exec:\3fflfll.exe41⤵
- Executes dropped EXE
PID:1800 -
\??\c:\nhbbtt.exec:\nhbbtt.exe42⤵
- Executes dropped EXE
PID:2272 -
\??\c:\hnnnbt.exec:\hnnnbt.exe43⤵
- Executes dropped EXE
PID:852 -
\??\c:\dvjdv.exec:\dvjdv.exe44⤵
- Executes dropped EXE
PID:2020 -
\??\c:\rlfrllf.exec:\rlfrllf.exe45⤵
- Executes dropped EXE
PID:2644 -
\??\c:\tbhhbb.exec:\tbhhbb.exe46⤵
- Executes dropped EXE
PID:4672 -
\??\c:\vpvvp.exec:\vpvvp.exe47⤵
- Executes dropped EXE
PID:3076 -
\??\c:\djvpp.exec:\djvpp.exe48⤵
- Executes dropped EXE
PID:2804 -
\??\c:\3lfxllr.exec:\3lfxllr.exe49⤵
- Executes dropped EXE
PID:1296 -
\??\c:\btnhbt.exec:\btnhbt.exe50⤵
- Executes dropped EXE
PID:1992 -
\??\c:\jjvvv.exec:\jjvvv.exe51⤵
- Executes dropped EXE
PID:2040 -
\??\c:\fxxrrll.exec:\fxxrrll.exe52⤵
- Executes dropped EXE
PID:2700 -
\??\c:\hnbtnt.exec:\hnbtnt.exe53⤵
- Executes dropped EXE
PID:2944 -
\??\c:\nnttnn.exec:\nnttnn.exe54⤵
- Executes dropped EXE
PID:3152 -
\??\c:\3xxxxff.exec:\3xxxxff.exe55⤵
- Executes dropped EXE
PID:4824 -
\??\c:\vvdjp.exec:\vvdjp.exe56⤵
- Executes dropped EXE
PID:2952 -
\??\c:\fllfxfx.exec:\fllfxfx.exe57⤵
- Executes dropped EXE
PID:3280 -
\??\c:\btbbtt.exec:\btbbtt.exe58⤵
- Executes dropped EXE
PID:2320 -
\??\c:\jddvv.exec:\jddvv.exe59⤵
- Executes dropped EXE
PID:4072 -
\??\c:\ffxxxfx.exec:\ffxxxfx.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824 -
\??\c:\llxxffr.exec:\llxxffr.exe61⤵
- Executes dropped EXE
PID:2116 -
\??\c:\tbtnnn.exec:\tbtnnn.exe62⤵
- Executes dropped EXE
PID:3676 -
\??\c:\llxfrff.exec:\llxfrff.exe63⤵
- Executes dropped EXE
PID:4992 -
\??\c:\llrllll.exec:\llrllll.exe64⤵
- Executes dropped EXE
PID:2996 -
\??\c:\tbnhhh.exec:\tbnhhh.exe65⤵
- Executes dropped EXE
PID:1524 -
\??\c:\jpvvd.exec:\jpvvd.exe66⤵PID:4020
-
\??\c:\vvvpp.exec:\vvvpp.exe67⤵PID:3596
-
\??\c:\rxlflll.exec:\rxlflll.exe68⤵PID:1660
-
\??\c:\lfxxffr.exec:\lfxxffr.exe69⤵PID:2512
-
\??\c:\hbbhbb.exec:\hbbhbb.exe70⤵PID:4044
-
\??\c:\jpddv.exec:\jpddv.exe71⤵PID:3636
-
\??\c:\vjpjd.exec:\vjpjd.exe72⤵PID:4380
-
\??\c:\llllxfx.exec:\llllxfx.exe73⤵PID:3468
-
\??\c:\5ttttb.exec:\5ttttb.exe74⤵PID:936
-
\??\c:\vpppj.exec:\vpppj.exe75⤵PID:3444
-
\??\c:\xrlllrr.exec:\xrlllrr.exe76⤵PID:1508
-
\??\c:\xxrxxrr.exec:\xxrxxrr.exe77⤵PID:392
-
\??\c:\nhnnnt.exec:\nhnnnt.exe78⤵PID:1704
-
\??\c:\pdjjj.exec:\pdjjj.exe79⤵PID:2364
-
\??\c:\jdpjv.exec:\jdpjv.exe80⤵PID:956
-
\??\c:\xfrllrr.exec:\xfrllrr.exe81⤵PID:1976
-
\??\c:\3lfxrff.exec:\3lfxrff.exe82⤵PID:4920
-
\??\c:\nnhtth.exec:\nnhtth.exe83⤵PID:3064
-
\??\c:\vvpvv.exec:\vvpvv.exe84⤵PID:4336
-
\??\c:\lrxrlll.exec:\lrxrlll.exe85⤵PID:216
-
\??\c:\rfrllll.exec:\rfrllll.exe86⤵PID:3600
-
\??\c:\hbnnnt.exec:\hbnnnt.exe87⤵PID:4988
-
\??\c:\djvvj.exec:\djvvj.exe88⤵PID:1828
-
\??\c:\rlffflr.exec:\rlffflr.exe89⤵PID:4200
-
\??\c:\lrlllll.exec:\lrlllll.exe90⤵PID:3116
-
\??\c:\tbttth.exec:\tbttth.exe91⤵PID:2936
-
\??\c:\ppjjv.exec:\ppjjv.exe92⤵PID:2272
-
\??\c:\fflfxxr.exec:\fflfxxr.exe93⤵PID:2036
-
\??\c:\rffxrrl.exec:\rffxrrl.exe94⤵PID:4328
-
\??\c:\bhhhtb.exec:\bhhhtb.exe95⤵PID:3476
-
\??\c:\vvjjd.exec:\vvjjd.exe96⤵PID:4056
-
\??\c:\jdppj.exec:\jdppj.exe97⤵PID:2368
-
\??\c:\xxlflxr.exec:\xxlflxr.exe98⤵PID:3944
-
\??\c:\nnntnt.exec:\nnntnt.exe99⤵PID:3048
-
\??\c:\bbbhbh.exec:\bbbhbh.exe100⤵PID:3100
-
\??\c:\9jvjd.exec:\9jvjd.exe101⤵PID:2416
-
\??\c:\5pvdv.exec:\5pvdv.exe102⤵PID:3124
-
\??\c:\xxffllf.exec:\xxffllf.exe103⤵PID:2764
-
\??\c:\hthhhb.exec:\hthhhb.exe104⤵PID:4308
-
\??\c:\xlllxxr.exec:\xlllxxr.exe105⤵PID:4824
-
\??\c:\lflllll.exec:\lflllll.exe106⤵PID:4128
-
\??\c:\hnnhbn.exec:\hnnhbn.exe107⤵PID:4220
-
\??\c:\pdjdv.exec:\pdjdv.exe108⤵PID:1668
-
\??\c:\vpddv.exec:\vpddv.exe109⤵PID:4060
-
\??\c:\xfxxrrl.exec:\xfxxrrl.exe110⤵PID:1824
-
\??\c:\tntnhh.exec:\tntnhh.exe111⤵PID:1560
-
\??\c:\nntthh.exec:\nntthh.exe112⤵PID:4976
-
\??\c:\jppjd.exec:\jppjd.exe113⤵PID:848
-
\??\c:\vvpjj.exec:\vvpjj.exe114⤵PID:2552
-
\??\c:\fffxrrr.exec:\fffxrrr.exe115⤵PID:1524
-
\??\c:\bbbhhh.exec:\bbbhhh.exe116⤵PID:4852
-
\??\c:\ddvpj.exec:\ddvpj.exe117⤵PID:4884
-
\??\c:\jjpjp.exec:\jjpjp.exe118⤵PID:1752
-
\??\c:\xlffxxx.exec:\xlffxxx.exe119⤵PID:2992
-
\??\c:\rlrxrxx.exec:\rlrxrxx.exe120⤵
- System Location Discovery: System Language Discovery
PID:4132 -
\??\c:\ttbbbb.exec:\ttbbbb.exe121⤵PID:1164
-
\??\c:\vpddd.exec:\vpddd.exe122⤵PID:4160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-