Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe
Resource
win7-20240903-en
General
-
Target
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe
-
Size
245KB
-
MD5
bf2695c48bf77c994421e0592f2d2953
-
SHA1
71abe1c2be83a5402a3bdeb9f13c12475ac3f903
-
SHA256
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3
-
SHA512
b5c8d482dda726c8dee89bf8d14f975d6b046019684acc38870fab911a83451257027b239efc3bba22c18221cc8074933c63f9135deb13682818e41d9f741dc8
-
SSDEEP
6144:n3C9BRo7tvnJ9oEz2Eu9XgcVyDOoZU0wGiv/U:n3C9ytvnV2NQAo20wGivs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-307-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-289-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/772-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1852-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2452-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1696-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2040-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2280-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2484-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-7667-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ppddp.exerrlxlrf.exerxlxlrf.exerrflffr.exe5jdjj.exejpjjv.exexllxfrf.exetthtbn.exe3vvvd.exexxlrflr.exehbthtt.exe3ttbnh.exevdpdv.exe3rrxllx.exe7fxfrrr.exe1nnthn.exevjddp.exedvpvp.exe9lfllrf.exebtnthn.exedppvj.exerlxfrrr.exenhttnt.exenbhhhb.exevjdjv.exefxxflll.exehbthtt.exe5jddv.exedvjpj.exerrllxxr.exehbbbhh.exejdvvj.exexxrrffr.exelfxxxfl.exe9rlrxfr.exettthhh.exetnhnnt.exe5vvdj.exeddpdp.exe1lxfffl.exefrllrrx.exeffrrflr.exebthntt.exethttbb.exe9vpvv.exevpdpd.exevpddj.exe5lfrffl.exexrxxrrx.exe3tnnbb.exebtnnbb.exe3nnhtb.exe3pdjj.exejvjdd.exexrflffr.exe1xllllr.exe9nnbnt.exettbbbh.exe1hhnnb.exepjvdp.exejjvdj.exe7frrxlx.exefxrfxxl.exefrlrxfl.exepid process 2484 ppddp.exe 2280 rrlxlrf.exe 2020 rxlxlrf.exe 2184 rrflffr.exe 2676 5jdjj.exe 2804 jpjjv.exe 2732 xllxfrf.exe 2872 tthtbn.exe 2572 3vvvd.exe 2692 xxlrflr.exe 576 hbthtt.exe 2464 3ttbnh.exe 2040 vdpdv.exe 308 3rrxllx.exe 1696 7fxfrrr.exe 1680 1nnthn.exe 1956 vjddp.exe 2816 dvpvp.exe 2612 9lfllrf.exe 2208 btnthn.exe 2452 dppvj.exe 1852 rlxfrrr.exe 1664 nhttnt.exe 772 nbhhhb.exe 1168 vjdjv.exe 2536 fxxflll.exe 2176 hbthtt.exe 1636 5jddv.exe 2320 dvjpj.exe 532 rrllxxr.exe 1692 hbbbhh.exe 2112 jdvvj.exe 1324 xxrrffr.exe 2008 lfxxxfl.exe 2504 9rlrxfr.exe 2328 ttthhh.exe 1624 tnhnnt.exe 2776 5vvdj.exe 2956 ddpdp.exe 2852 1lxfffl.exe 2936 frllrrx.exe 2732 ffrrflr.exe 2832 bthntt.exe 2636 thttbb.exe 3048 9vpvv.exe 1424 vpdpd.exe 1736 vpddj.exe 988 5lfrffl.exe 2012 xrxxrrx.exe 1712 3tnnbb.exe 112 btnnbb.exe 1696 3nnhtb.exe 1792 3pdjj.exe 1956 jvjdd.exe 1668 xrflffr.exe 2240 1xllllr.exe 3028 9nnbnt.exe 2220 ttbbbh.exe 1856 1hhnnb.exe 1504 pjvdp.exe 824 jjvdj.exe 1664 7frrxlx.exe 772 fxrfxxl.exe 1168 frlrxfl.exe -
Processes:
resource yara_rule behavioral1/memory/1692-307-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-289-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/772-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1852-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2452-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1696-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-7667-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1pjvd.exe3jvvv.exetnbbbh.exehbnnhb.exe3jvvd.exeppjjj.exerlxrxxl.exe7jdjj.exejdvdv.exennhthh.exexxxfxxl.exebththn.exelllrrrl.exevjdjv.exeddvpv.exe9nhhnt.exe9dpvv.exe5ddjd.exedvpdd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxfxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bththn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exeppddp.exerrlxlrf.exerxlxlrf.exerrflffr.exe5jdjj.exejpjjv.exexllxfrf.exetthtbn.exe3vvvd.exexxlrflr.exehbthtt.exe3ttbnh.exevdpdv.exe3rrxllx.exe7fxfrrr.exedescription pid process target process PID 1960 wrote to memory of 2484 1960 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe ppddp.exe PID 1960 wrote to memory of 2484 1960 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe ppddp.exe PID 1960 wrote to memory of 2484 1960 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe ppddp.exe PID 1960 wrote to memory of 2484 1960 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe ppddp.exe PID 2484 wrote to memory of 2280 2484 ppddp.exe rrlxlrf.exe PID 2484 wrote to memory of 2280 2484 ppddp.exe rrlxlrf.exe PID 2484 wrote to memory of 2280 2484 ppddp.exe rrlxlrf.exe PID 2484 wrote to memory of 2280 2484 ppddp.exe rrlxlrf.exe PID 2280 wrote to memory of 2020 2280 rrlxlrf.exe rxlxlrf.exe PID 2280 wrote to memory of 2020 2280 rrlxlrf.exe rxlxlrf.exe PID 2280 wrote to memory of 2020 2280 rrlxlrf.exe rxlxlrf.exe PID 2280 wrote to memory of 2020 2280 rrlxlrf.exe rxlxlrf.exe PID 2020 wrote to memory of 2184 2020 rxlxlrf.exe rrflffr.exe PID 2020 wrote to memory of 2184 2020 rxlxlrf.exe rrflffr.exe PID 2020 wrote to memory of 2184 2020 rxlxlrf.exe rrflffr.exe PID 2020 wrote to memory of 2184 2020 rxlxlrf.exe rrflffr.exe PID 2184 wrote to memory of 2676 2184 rrflffr.exe 5jdjj.exe PID 2184 wrote to memory of 2676 2184 rrflffr.exe 5jdjj.exe PID 2184 wrote to memory of 2676 2184 rrflffr.exe 5jdjj.exe PID 2184 wrote to memory of 2676 2184 rrflffr.exe 5jdjj.exe PID 2676 wrote to memory of 2804 2676 5jdjj.exe jpjjv.exe PID 2676 wrote to memory of 2804 2676 5jdjj.exe jpjjv.exe PID 2676 wrote to memory of 2804 2676 5jdjj.exe jpjjv.exe PID 2676 wrote to memory of 2804 2676 5jdjj.exe jpjjv.exe PID 2804 wrote to memory of 2732 2804 jpjjv.exe xllxfrf.exe PID 2804 wrote to memory of 2732 2804 jpjjv.exe xllxfrf.exe PID 2804 wrote to memory of 2732 2804 jpjjv.exe xllxfrf.exe PID 2804 wrote to memory of 2732 2804 jpjjv.exe xllxfrf.exe PID 2732 wrote to memory of 2872 2732 xllxfrf.exe tthtbn.exe PID 2732 wrote to memory of 2872 2732 xllxfrf.exe tthtbn.exe PID 2732 wrote to memory of 2872 2732 xllxfrf.exe tthtbn.exe PID 2732 wrote to memory of 2872 2732 xllxfrf.exe tthtbn.exe PID 2872 wrote to memory of 2572 2872 tthtbn.exe 3vvvd.exe PID 2872 wrote to memory of 2572 2872 tthtbn.exe 3vvvd.exe PID 2872 wrote to memory of 2572 2872 tthtbn.exe 3vvvd.exe PID 2872 wrote to memory of 2572 2872 tthtbn.exe 3vvvd.exe PID 2572 wrote to memory of 2692 2572 3vvvd.exe xxlrflr.exe PID 2572 wrote to memory of 2692 2572 3vvvd.exe xxlrflr.exe PID 2572 wrote to memory of 2692 2572 3vvvd.exe xxlrflr.exe PID 2572 wrote to memory of 2692 2572 3vvvd.exe xxlrflr.exe PID 2692 wrote to memory of 576 2692 xxlrflr.exe hbthtt.exe PID 2692 wrote to memory of 576 2692 xxlrflr.exe hbthtt.exe PID 2692 wrote to memory of 576 2692 xxlrflr.exe hbthtt.exe PID 2692 wrote to memory of 576 2692 xxlrflr.exe hbthtt.exe PID 576 wrote to memory of 2464 576 hbthtt.exe 3ttbnh.exe PID 576 wrote to memory of 2464 576 hbthtt.exe 3ttbnh.exe PID 576 wrote to memory of 2464 576 hbthtt.exe 3ttbnh.exe PID 576 wrote to memory of 2464 576 hbthtt.exe 3ttbnh.exe PID 2464 wrote to memory of 2040 2464 3ttbnh.exe vdpdv.exe PID 2464 wrote to memory of 2040 2464 3ttbnh.exe vdpdv.exe PID 2464 wrote to memory of 2040 2464 3ttbnh.exe vdpdv.exe PID 2464 wrote to memory of 2040 2464 3ttbnh.exe vdpdv.exe PID 2040 wrote to memory of 308 2040 vdpdv.exe 3rrxllx.exe PID 2040 wrote to memory of 308 2040 vdpdv.exe 3rrxllx.exe PID 2040 wrote to memory of 308 2040 vdpdv.exe 3rrxllx.exe PID 2040 wrote to memory of 308 2040 vdpdv.exe 3rrxllx.exe PID 308 wrote to memory of 1696 308 3rrxllx.exe 7xxfxrf.exe PID 308 wrote to memory of 1696 308 3rrxllx.exe 7xxfxrf.exe PID 308 wrote to memory of 1696 308 3rrxllx.exe 7xxfxrf.exe PID 308 wrote to memory of 1696 308 3rrxllx.exe 7xxfxrf.exe PID 1696 wrote to memory of 1680 1696 7fxfrrr.exe 1nnthn.exe PID 1696 wrote to memory of 1680 1696 7fxfrrr.exe 1nnthn.exe PID 1696 wrote to memory of 1680 1696 7fxfrrr.exe 1nnthn.exe PID 1696 wrote to memory of 1680 1696 7fxfrrr.exe 1nnthn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe"C:\Users\Admin\AppData\Local\Temp\ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\ppddp.exec:\ppddp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\rrlxlrf.exec:\rrlxlrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\rxlxlrf.exec:\rxlxlrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\rrflffr.exec:\rrflffr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
\??\c:\5jdjj.exec:\5jdjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\jpjjv.exec:\jpjjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\xllxfrf.exec:\xllxfrf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\tthtbn.exec:\tthtbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\3vvvd.exec:\3vvvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\xxlrflr.exec:\xxlrflr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\hbthtt.exec:\hbthtt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
\??\c:\3ttbnh.exec:\3ttbnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\vdpdv.exec:\vdpdv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\3rrxllx.exec:\3rrxllx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
\??\c:\7fxfrrr.exec:\7fxfrrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\1nnthn.exec:\1nnthn.exe17⤵
- Executes dropped EXE
PID:1680 -
\??\c:\vjddp.exec:\vjddp.exe18⤵
- Executes dropped EXE
PID:1956 -
\??\c:\dvpvp.exec:\dvpvp.exe19⤵
- Executes dropped EXE
PID:2816 -
\??\c:\9lfllrf.exec:\9lfllrf.exe20⤵
- Executes dropped EXE
PID:2612 -
\??\c:\btnthn.exec:\btnthn.exe21⤵
- Executes dropped EXE
PID:2208 -
\??\c:\dppvj.exec:\dppvj.exe22⤵
- Executes dropped EXE
PID:2452 -
\??\c:\rlxfrrr.exec:\rlxfrrr.exe23⤵
- Executes dropped EXE
PID:1852 -
\??\c:\nhttnt.exec:\nhttnt.exe24⤵
- Executes dropped EXE
PID:1664 -
\??\c:\nbhhhb.exec:\nbhhhb.exe25⤵
- Executes dropped EXE
PID:772 -
\??\c:\vjdjv.exec:\vjdjv.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168 -
\??\c:\fxxflll.exec:\fxxflll.exe27⤵
- Executes dropped EXE
PID:2536 -
\??\c:\hbthtt.exec:\hbthtt.exe28⤵
- Executes dropped EXE
PID:2176 -
\??\c:\5jddv.exec:\5jddv.exe29⤵
- Executes dropped EXE
PID:1636 -
\??\c:\dvjpj.exec:\dvjpj.exe30⤵
- Executes dropped EXE
PID:2320 -
\??\c:\rrllxxr.exec:\rrllxxr.exe31⤵
- Executes dropped EXE
PID:532 -
\??\c:\hbbbhh.exec:\hbbbhh.exe32⤵
- Executes dropped EXE
PID:1692 -
\??\c:\jdvvj.exec:\jdvvj.exe33⤵
- Executes dropped EXE
PID:2112 -
\??\c:\xxrrffr.exec:\xxrrffr.exe34⤵
- Executes dropped EXE
PID:1324 -
\??\c:\lfxxxfl.exec:\lfxxxfl.exe35⤵
- Executes dropped EXE
PID:2008 -
\??\c:\9rlrxfr.exec:\9rlrxfr.exe36⤵
- Executes dropped EXE
PID:2504 -
\??\c:\ttthhh.exec:\ttthhh.exe37⤵
- Executes dropped EXE
PID:2328 -
\??\c:\tnhnnt.exec:\tnhnnt.exe38⤵
- Executes dropped EXE
PID:1624 -
\??\c:\5vvdj.exec:\5vvdj.exe39⤵
- Executes dropped EXE
PID:2776 -
\??\c:\ddpdp.exec:\ddpdp.exe40⤵
- Executes dropped EXE
PID:2956 -
\??\c:\1lxfffl.exec:\1lxfffl.exe41⤵
- Executes dropped EXE
PID:2852 -
\??\c:\frllrrx.exec:\frllrrx.exe42⤵
- Executes dropped EXE
PID:2936 -
\??\c:\ffrrflr.exec:\ffrrflr.exe43⤵
- Executes dropped EXE
PID:2732 -
\??\c:\bthntt.exec:\bthntt.exe44⤵
- Executes dropped EXE
PID:2832 -
\??\c:\thttbb.exec:\thttbb.exe45⤵
- Executes dropped EXE
PID:2636 -
\??\c:\9vpvv.exec:\9vpvv.exe46⤵
- Executes dropped EXE
PID:3048 -
\??\c:\vpdpd.exec:\vpdpd.exe47⤵
- Executes dropped EXE
PID:1424 -
\??\c:\vpddj.exec:\vpddj.exe48⤵
- Executes dropped EXE
PID:1736 -
\??\c:\5lfrffl.exec:\5lfrffl.exe49⤵
- Executes dropped EXE
PID:988 -
\??\c:\xrxxrrx.exec:\xrxxrrx.exe50⤵
- Executes dropped EXE
PID:2012 -
\??\c:\3tnnbb.exec:\3tnnbb.exe51⤵
- Executes dropped EXE
PID:1712 -
\??\c:\btnnbb.exec:\btnnbb.exe52⤵
- Executes dropped EXE
PID:112 -
\??\c:\3nnhtb.exec:\3nnhtb.exe53⤵
- Executes dropped EXE
PID:1696 -
\??\c:\3pdjj.exec:\3pdjj.exe54⤵
- Executes dropped EXE
PID:1792 -
\??\c:\jvjdd.exec:\jvjdd.exe55⤵
- Executes dropped EXE
PID:1956 -
\??\c:\xrflffr.exec:\xrflffr.exe56⤵
- Executes dropped EXE
PID:1668 -
\??\c:\1xllllr.exec:\1xllllr.exe57⤵
- Executes dropped EXE
PID:2240 -
\??\c:\9nnbnt.exec:\9nnbnt.exe58⤵
- Executes dropped EXE
PID:3028 -
\??\c:\ttbbbh.exec:\ttbbbh.exe59⤵
- Executes dropped EXE
PID:2220 -
\??\c:\1hhnnb.exec:\1hhnnb.exe60⤵
- Executes dropped EXE
PID:1856 -
\??\c:\pjvdp.exec:\pjvdp.exe61⤵
- Executes dropped EXE
PID:1504 -
\??\c:\jjvdj.exec:\jjvdj.exe62⤵
- Executes dropped EXE
PID:824 -
\??\c:\7frrxlx.exec:\7frrxlx.exe63⤵
- Executes dropped EXE
PID:1664 -
\??\c:\fxrfxxl.exec:\fxrfxxl.exe64⤵
- Executes dropped EXE
PID:772 -
\??\c:\frlrxfl.exec:\frlrxfl.exe65⤵
- Executes dropped EXE
PID:1168 -
\??\c:\hbhnbb.exec:\hbhnbb.exe66⤵PID:1480
-
\??\c:\hbnttt.exec:\hbnttt.exe67⤵PID:2172
-
\??\c:\1vjdd.exec:\1vjdd.exe68⤵PID:2524
-
\??\c:\jjdpd.exec:\jjdpd.exe69⤵PID:756
-
\??\c:\dvpvv.exec:\dvpvv.exe70⤵PID:2260
-
\??\c:\9lxfflr.exec:\9lxfflr.exe71⤵PID:2052
-
\??\c:\5llrxlx.exec:\5llrxlx.exe72⤵PID:2212
-
\??\c:\7nhhtb.exec:\7nhhtb.exe73⤵PID:2056
-
\??\c:\htbhtb.exec:\htbhtb.exe74⤵PID:2112
-
\??\c:\dvpdv.exec:\dvpdv.exe75⤵PID:1324
-
\??\c:\dddpv.exec:\dddpv.exe76⤵PID:2008
-
\??\c:\9dpvv.exec:\9dpvv.exe77⤵
- System Location Discovery: System Language Discovery
PID:2504 -
\??\c:\rlxxflr.exec:\rlxxflr.exe78⤵PID:2328
-
\??\c:\fxrflrx.exec:\fxrflrx.exe79⤵PID:1624
-
\??\c:\hhnntt.exec:\hhnntt.exe80⤵PID:2776
-
\??\c:\bthnhn.exec:\bthnhn.exe81⤵PID:2956
-
\??\c:\hhtbnn.exec:\hhtbnn.exe82⤵PID:2852
-
\??\c:\ddpvj.exec:\ddpvj.exe83⤵PID:2936
-
\??\c:\dvddj.exec:\dvddj.exe84⤵PID:2592
-
\??\c:\fffllxl.exec:\fffllxl.exe85⤵PID:2832
-
\??\c:\1lflrrx.exec:\1lflrrx.exe86⤵PID:2636
-
\??\c:\rllxlrl.exec:\rllxlrl.exe87⤵PID:3048
-
\??\c:\bthntb.exec:\bthntb.exe88⤵PID:1424
-
\??\c:\5tntbn.exec:\5tntbn.exe89⤵PID:1736
-
\??\c:\dvjpd.exec:\dvjpd.exe90⤵PID:988
-
\??\c:\pjppv.exec:\pjppv.exe91⤵PID:2012
-
\??\c:\pjdjv.exec:\pjdjv.exe92⤵PID:1712
-
\??\c:\lfrfxxl.exec:\lfrfxxl.exe93⤵PID:112
-
\??\c:\rlrxflr.exec:\rlrxflr.exe94⤵PID:1696
-
\??\c:\hhbtbb.exec:\hhbtbb.exe95⤵PID:1792
-
\??\c:\nhttth.exec:\nhttth.exe96⤵PID:1956
-
\??\c:\1tbhtb.exec:\1tbhtb.exe97⤵PID:1668
-
\??\c:\1vppv.exec:\1vppv.exe98⤵PID:2240
-
\??\c:\3jvvd.exec:\3jvvd.exe99⤵
- System Location Discovery: System Language Discovery
PID:3028 -
\??\c:\lfrrrfr.exec:\lfrrrfr.exe100⤵PID:2220
-
\??\c:\rlxfffr.exec:\rlxfffr.exe101⤵PID:1856
-
\??\c:\rflrffr.exec:\rflrffr.exe102⤵PID:1504
-
\??\c:\btbhnb.exec:\btbhnb.exe103⤵PID:824
-
\??\c:\tnbbbh.exec:\tnbbbh.exe104⤵
- System Location Discovery: System Language Discovery
PID:1664 -
\??\c:\5djpv.exec:\5djpv.exe105⤵PID:772
-
\??\c:\pjjvd.exec:\pjjvd.exe106⤵PID:1168
-
\??\c:\dddjd.exec:\dddjd.exe107⤵PID:1480
-
\??\c:\lxrrffl.exec:\lxrrffl.exe108⤵PID:2172
-
\??\c:\5rfrxxl.exec:\5rfrxxl.exe109⤵PID:2524
-
\??\c:\hbtbbb.exec:\hbtbbb.exe110⤵PID:756
-
\??\c:\bbhnbt.exec:\bbhnbt.exe111⤵PID:1960
-
\??\c:\nnhthn.exec:\nnhthn.exe112⤵PID:2052
-
\??\c:\jdvdv.exec:\jdvdv.exe113⤵PID:2212
-
\??\c:\jdpvj.exec:\jdpvj.exe114⤵PID:2056
-
\??\c:\rlrlrrx.exec:\rlrlrrx.exe115⤵PID:2112
-
\??\c:\lfflrrf.exec:\lfflrrf.exe116⤵PID:1324
-
\??\c:\xrflrrx.exec:\xrflrrx.exe117⤵PID:2192
-
\??\c:\bbbnbh.exec:\bbbnbh.exe118⤵PID:2504
-
\??\c:\nnnttt.exec:\nnnttt.exe119⤵PID:2328
-
\??\c:\3jdvp.exec:\3jdvp.exe120⤵PID:1624
-
\??\c:\vpddp.exec:\vpddp.exe121⤵PID:2776
-
\??\c:\9pdjd.exec:\9pdjd.exe122⤵PID:2956
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-