Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe
Resource
win7-20240903-en
General
-
Target
297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe
-
Size
72KB
-
MD5
df190e37b21597ba70e584c0ce2a80e0
-
SHA1
8ef6725ea15d326f582efb4f6785d4eff26e5a74
-
SHA256
297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88e
-
SHA512
229a765c2599aee039effa70f8d721b0c628cdbc82a1ab61fde32cae9c147a77f5913d128fb5c229014dd7fecfea8dddf5c94498a371d643e55256b93cf4b975
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjF:ymb3NkkiQ3mdBjFI4VV
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/776-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/776-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/440-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2436-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1600-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1520-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4868-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3576-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2932-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1172-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2248-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2856-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2632-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2500-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4772-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3424-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3428-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3500-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
9dppd.exefxxrrrl.exennnnhh.exe3nbtbb.exepjjjd.exerlrrffl.exetbhhbn.exe1hnhbb.exevvvjd.exe7xrrffx.exevjjdv.exeddppp.exexrlfxxx.exethtnnn.exepdddv.exexlxrllf.exe1thbtt.exe7jddv.exefxxflxx.exethbbhh.exejjvpv.exehnhbnn.exe1dpjj.exerllfxxx.exebntttb.exepvddp.exerrrrllf.exe3nhnhh.exehnhntb.exejvdvv.exelflllrr.exetnntnn.exejjvjj.exexlrrlll.exebhbntb.exepdppp.exejjdpj.exexrxxxxf.exerxfllll.exe7bhhhn.exepdvpj.exefxxlfxr.exehbnbhb.exebthhbb.exedvjpv.exedvvvv.exexxffxxx.exenhthbb.exenbnnnn.exevvvvp.exelfrxrxr.exexllflfr.exe1ttnnn.exeppjdv.exerfrfxlx.exerllrlrl.exebtnnbh.exefrxxxxl.exehbtthh.exeddjpj.exeddvvp.exellffllx.exelrxxxxx.exettbbtt.exepid Process 440 9dppd.exe 2436 fxxrrrl.exe 1600 nnnnhh.exe 4464 3nbtbb.exe 1520 pjjjd.exe 4868 rlrrffl.exe 3576 tbhhbn.exe 4364 1hnhbb.exe 2932 vvvjd.exe 1172 7xrrffx.exe 4660 vjjdv.exe 552 ddppp.exe 2248 xrlfxxx.exe 2856 thtnnn.exe 2632 pdddv.exe 4752 xlxrllf.exe 4060 1thbtt.exe 4928 7jddv.exe 2500 fxxflxx.exe 4228 thbbhh.exe 4772 jjvpv.exe 2440 hnhbnn.exe 2620 1dpjj.exe 3424 rllfxxx.exe 4836 bntttb.exe 3428 pvddp.exe 1780 rrrrllf.exe 3500 3nhnhh.exe 3400 hnhntb.exe 4544 jvdvv.exe 908 lflllrr.exe 232 tnntnn.exe 884 jjvjj.exe 1120 xlrrlll.exe 4636 bhbntb.exe 3544 pdppp.exe 2788 jjdpj.exe 4224 xrxxxxf.exe 4720 rxfllll.exe 1424 7bhhhn.exe 3948 pdvpj.exe 920 fxxlfxr.exe 648 hbnbhb.exe 4456 bthhbb.exe 4352 dvjpv.exe 2244 dvvvv.exe 4088 xxffxxx.exe 1716 nhthbb.exe 1952 nbnnnn.exe 744 vvvvp.exe 316 lfrxrxr.exe 956 xllflfr.exe 4988 1ttnnn.exe 4120 ppjdv.exe 1008 rfrfxlx.exe 2924 rllrlrl.exe 972 btnnbh.exe 3792 frxxxxl.exe 1116 hbtthh.exe 3576 ddjpj.exe 3532 ddvvp.exe 2708 llffllx.exe 1068 lrxxxxx.exe 388 ttbbtt.exe -
Processes:
resource yara_rule behavioral2/memory/776-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/776-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/440-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2436-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1600-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1520-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3576-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1172-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1172-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2248-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2856-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2632-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2500-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4772-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3424-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3428-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3500-192-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3pdvp.exe9bhhbb.exe3rflfll.exelllrrrr.exedjpjd.exerlllfff.exe5flxrrl.exedpvdp.exentbntb.exehhtthb.exejjvjj.exethhhbn.exeppdjp.exehnnbtn.exexxlfxlx.exe9lrxrxx.exevjjdv.exethbbth.exenhhhbt.exexxxxrxx.exejvdvp.exetntttb.exefxrrlfx.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rflfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5flxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe9dppd.exefxxrrrl.exennnnhh.exe3nbtbb.exepjjjd.exerlrrffl.exetbhhbn.exe1hnhbb.exevvvjd.exe7xrrffx.exevjjdv.exeddppp.exexrlfxxx.exethtnnn.exepdddv.exexlxrllf.exe1thbtt.exe7jddv.exefxxflxx.exethbbhh.exejjvpv.exedescription pid Process procid_target PID 776 wrote to memory of 440 776 297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe 82 PID 776 wrote to memory of 440 776 297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe 82 PID 776 wrote to memory of 440 776 297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe 82 PID 440 wrote to memory of 2436 440 9dppd.exe 83 PID 440 wrote to memory of 2436 440 9dppd.exe 83 PID 440 wrote to memory of 2436 440 9dppd.exe 83 PID 2436 wrote to memory of 1600 2436 fxxrrrl.exe 84 PID 2436 wrote to memory of 1600 2436 fxxrrrl.exe 84 PID 2436 wrote to memory of 1600 2436 fxxrrrl.exe 84 PID 1600 wrote to memory of 4464 1600 nnnnhh.exe 85 PID 1600 wrote to memory of 4464 1600 nnnnhh.exe 85 PID 1600 wrote to memory of 4464 1600 nnnnhh.exe 85 PID 4464 wrote to memory of 1520 4464 3nbtbb.exe 86 PID 4464 wrote to memory of 1520 4464 3nbtbb.exe 86 PID 4464 wrote to memory of 1520 4464 3nbtbb.exe 86 PID 1520 wrote to memory of 4868 1520 pjjjd.exe 87 PID 1520 wrote to memory of 4868 1520 pjjjd.exe 87 PID 1520 wrote to memory of 4868 1520 pjjjd.exe 87 PID 4868 wrote to memory of 3576 4868 rlrrffl.exe 88 PID 4868 wrote to memory of 3576 4868 rlrrffl.exe 88 PID 4868 wrote to memory of 3576 4868 rlrrffl.exe 88 PID 3576 wrote to memory of 4364 3576 tbhhbn.exe 89 PID 3576 wrote to memory of 4364 3576 tbhhbn.exe 89 PID 3576 wrote to memory of 4364 3576 tbhhbn.exe 89 PID 4364 wrote to memory of 2932 4364 1hnhbb.exe 90 PID 4364 wrote to memory of 2932 4364 1hnhbb.exe 90 PID 4364 wrote to memory of 2932 4364 1hnhbb.exe 90 PID 2932 wrote to memory of 1172 2932 vvvjd.exe 91 PID 2932 wrote to memory of 1172 2932 vvvjd.exe 91 PID 2932 wrote to memory of 1172 2932 vvvjd.exe 91 PID 1172 wrote to memory of 4660 1172 7xrrffx.exe 92 PID 1172 wrote to memory of 4660 1172 7xrrffx.exe 92 PID 1172 wrote to memory of 4660 1172 7xrrffx.exe 92 PID 4660 wrote to memory of 552 4660 vjjdv.exe 93 PID 4660 wrote to memory of 552 4660 vjjdv.exe 93 PID 4660 wrote to memory of 552 4660 vjjdv.exe 93 PID 552 wrote to memory of 2248 552 ddppp.exe 94 PID 552 wrote to memory of 2248 552 ddppp.exe 94 PID 552 wrote to memory of 2248 552 ddppp.exe 94 PID 2248 wrote to memory of 2856 2248 xrlfxxx.exe 95 PID 2248 wrote to memory of 2856 2248 xrlfxxx.exe 95 PID 2248 wrote to memory of 2856 2248 xrlfxxx.exe 95 PID 2856 wrote to memory of 2632 2856 thtnnn.exe 96 PID 2856 wrote to memory of 2632 2856 thtnnn.exe 96 PID 2856 wrote to memory of 2632 2856 thtnnn.exe 96 PID 2632 wrote to memory of 4752 2632 pdddv.exe 97 PID 2632 wrote to memory of 4752 2632 pdddv.exe 97 PID 2632 wrote to memory of 4752 2632 pdddv.exe 97 PID 4752 wrote to memory of 4060 4752 xlxrllf.exe 98 PID 4752 wrote to memory of 4060 4752 xlxrllf.exe 98 PID 4752 wrote to memory of 4060 4752 xlxrllf.exe 98 PID 4060 wrote to memory of 4928 4060 1thbtt.exe 99 PID 4060 wrote to memory of 4928 4060 1thbtt.exe 99 PID 4060 wrote to memory of 4928 4060 1thbtt.exe 99 PID 4928 wrote to memory of 2500 4928 7jddv.exe 100 PID 4928 wrote to memory of 2500 4928 7jddv.exe 100 PID 4928 wrote to memory of 2500 4928 7jddv.exe 100 PID 2500 wrote to memory of 4228 2500 fxxflxx.exe 101 PID 2500 wrote to memory of 4228 2500 fxxflxx.exe 101 PID 2500 wrote to memory of 4228 2500 fxxflxx.exe 101 PID 4228 wrote to memory of 4772 4228 thbbhh.exe 102 PID 4228 wrote to memory of 4772 4228 thbbhh.exe 102 PID 4228 wrote to memory of 4772 4228 thbbhh.exe 102 PID 4772 wrote to memory of 2440 4772 jjvpv.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe"C:\Users\Admin\AppData\Local\Temp\297b6597f301075930743fb0b780d6d6b27880d27979fdb18292b1ed61d5c88eN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\9dppd.exec:\9dppd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\fxxrrrl.exec:\fxxrrrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\nnnnhh.exec:\nnnnhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\3nbtbb.exec:\3nbtbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\pjjjd.exec:\pjjjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\rlrrffl.exec:\rlrrffl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
\??\c:\tbhhbn.exec:\tbhhbn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\1hnhbb.exec:\1hnhbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\vvvjd.exec:\vvvjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\7xrrffx.exec:\7xrrffx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\vjjdv.exec:\vjjdv.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\ddppp.exec:\ddppp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\xrlfxxx.exec:\xrlfxxx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\thtnnn.exec:\thtnnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\pdddv.exec:\pdddv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\xlxrllf.exec:\xlxrllf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
\??\c:\1thbtt.exec:\1thbtt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\7jddv.exec:\7jddv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\fxxflxx.exec:\fxxflxx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\thbbhh.exec:\thbbhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\jjvpv.exec:\jjvpv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
\??\c:\hnhbnn.exec:\hnhbnn.exe23⤵
- Executes dropped EXE
PID:2440 -
\??\c:\1dpjj.exec:\1dpjj.exe24⤵
- Executes dropped EXE
PID:2620 -
\??\c:\rllfxxx.exec:\rllfxxx.exe25⤵
- Executes dropped EXE
PID:3424 -
\??\c:\bntttb.exec:\bntttb.exe26⤵
- Executes dropped EXE
PID:4836 -
\??\c:\pvddp.exec:\pvddp.exe27⤵
- Executes dropped EXE
PID:3428 -
\??\c:\rrrrllf.exec:\rrrrllf.exe28⤵
- Executes dropped EXE
PID:1780 -
\??\c:\3nhnhh.exec:\3nhnhh.exe29⤵
- Executes dropped EXE
PID:3500 -
\??\c:\hnhntb.exec:\hnhntb.exe30⤵
- Executes dropped EXE
PID:3400 -
\??\c:\jvdvv.exec:\jvdvv.exe31⤵
- Executes dropped EXE
PID:4544 -
\??\c:\lflllrr.exec:\lflllrr.exe32⤵
- Executes dropped EXE
PID:908 -
\??\c:\tnntnn.exec:\tnntnn.exe33⤵
- Executes dropped EXE
PID:232 -
\??\c:\jjvjj.exec:\jjvjj.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:884 -
\??\c:\xlrrlll.exec:\xlrrlll.exe35⤵
- Executes dropped EXE
PID:1120 -
\??\c:\bhbntb.exec:\bhbntb.exe36⤵
- Executes dropped EXE
PID:4636 -
\??\c:\pdppp.exec:\pdppp.exe37⤵
- Executes dropped EXE
PID:3544 -
\??\c:\jjdpj.exec:\jjdpj.exe38⤵
- Executes dropped EXE
PID:2788 -
\??\c:\xrxxxxf.exec:\xrxxxxf.exe39⤵
- Executes dropped EXE
PID:4224 -
\??\c:\rxfllll.exec:\rxfllll.exe40⤵
- Executes dropped EXE
PID:4720 -
\??\c:\7bhhhn.exec:\7bhhhn.exe41⤵
- Executes dropped EXE
PID:1424 -
\??\c:\pdvpj.exec:\pdvpj.exe42⤵
- Executes dropped EXE
PID:3948 -
\??\c:\fxxlfxr.exec:\fxxlfxr.exe43⤵
- Executes dropped EXE
PID:920 -
\??\c:\hbnbhb.exec:\hbnbhb.exe44⤵
- Executes dropped EXE
PID:648 -
\??\c:\bthhbb.exec:\bthhbb.exe45⤵
- Executes dropped EXE
PID:4456 -
\??\c:\dvjpv.exec:\dvjpv.exe46⤵
- Executes dropped EXE
PID:4352 -
\??\c:\dvvvv.exec:\dvvvv.exe47⤵
- Executes dropped EXE
PID:2244 -
\??\c:\xxffxxx.exec:\xxffxxx.exe48⤵
- Executes dropped EXE
PID:4088 -
\??\c:\nhthbb.exec:\nhthbb.exe49⤵
- Executes dropped EXE
PID:1716 -
\??\c:\nbnnnn.exec:\nbnnnn.exe50⤵
- Executes dropped EXE
PID:1952 -
\??\c:\vvvvp.exec:\vvvvp.exe51⤵
- Executes dropped EXE
PID:744 -
\??\c:\lfrxrxr.exec:\lfrxrxr.exe52⤵
- Executes dropped EXE
PID:316 -
\??\c:\xllflfr.exec:\xllflfr.exe53⤵
- Executes dropped EXE
PID:956 -
\??\c:\1ttnnn.exec:\1ttnnn.exe54⤵
- Executes dropped EXE
PID:4988 -
\??\c:\ppjdv.exec:\ppjdv.exe55⤵
- Executes dropped EXE
PID:4120 -
\??\c:\rfrfxlx.exec:\rfrfxlx.exe56⤵
- Executes dropped EXE
PID:1008 -
\??\c:\rllrlrl.exec:\rllrlrl.exe57⤵
- Executes dropped EXE
PID:2924 -
\??\c:\btnnbh.exec:\btnnbh.exe58⤵
- Executes dropped EXE
PID:972 -
\??\c:\frxxxxl.exec:\frxxxxl.exe59⤵
- Executes dropped EXE
PID:3792 -
\??\c:\hbtthh.exec:\hbtthh.exe60⤵
- Executes dropped EXE
PID:1116 -
\??\c:\ddjpj.exec:\ddjpj.exe61⤵
- Executes dropped EXE
PID:3576 -
\??\c:\ddvvp.exec:\ddvvp.exe62⤵
- Executes dropped EXE
PID:3532 -
\??\c:\llffllx.exec:\llffllx.exe63⤵
- Executes dropped EXE
PID:2708 -
\??\c:\lrxxxxx.exec:\lrxxxxx.exe64⤵
- Executes dropped EXE
PID:1068 -
\??\c:\ttbbtt.exec:\ttbbtt.exe65⤵
- Executes dropped EXE
PID:388 -
\??\c:\vdpjv.exec:\vdpjv.exe66⤵PID:3596
-
\??\c:\vpvpd.exec:\vpvpd.exe67⤵PID:4660
-
\??\c:\rfrlfff.exec:\rfrlfff.exe68⤵PID:1356
-
\??\c:\lrrrxfx.exec:\lrrrxfx.exe69⤵PID:2012
-
\??\c:\bhnnnn.exec:\bhnnnn.exe70⤵PID:1792
-
\??\c:\djjpj.exec:\djjpj.exe71⤵PID:2248
-
\??\c:\frffxxr.exec:\frffxxr.exe72⤵PID:2856
-
\??\c:\frfffll.exec:\frfffll.exe73⤵PID:5016
-
\??\c:\7ttttt.exec:\7ttttt.exe74⤵PID:1964
-
\??\c:\jpppv.exec:\jpppv.exe75⤵PID:5024
-
\??\c:\9djjd.exec:\9djjd.exe76⤵PID:4060
-
\??\c:\flrrxxf.exec:\flrrxxf.exe77⤵PID:2028
-
\??\c:\hhhtth.exec:\hhhtth.exe78⤵PID:1908
-
\??\c:\htbtnn.exec:\htbtnn.exe79⤵PID:736
-
\??\c:\jjjvp.exec:\jjjvp.exe80⤵PID:808
-
\??\c:\1rllfff.exec:\1rllfff.exe81⤵PID:1548
-
\??\c:\3rflfll.exec:\3rflfll.exe82⤵
- System Location Discovery: System Language Discovery
PID:3876 -
\??\c:\nnnnhh.exec:\nnnnhh.exe83⤵PID:4736
-
\??\c:\tnbbtt.exec:\tnbbtt.exe84⤵PID:3172
-
\??\c:\rxxffff.exec:\rxxffff.exe85⤵PID:1784
-
\??\c:\lrrlfrx.exec:\lrrlfrx.exe86⤵PID:2172
-
\??\c:\hhbbtb.exec:\hhbbtb.exe87⤵PID:1616
-
\??\c:\ttbttt.exec:\ttbttt.exe88⤵PID:740
-
\??\c:\ddjjv.exec:\ddjjv.exe89⤵PID:4424
-
\??\c:\5jvvj.exec:\5jvvj.exe90⤵PID:1028
-
\??\c:\lfffxff.exec:\lfffxff.exe91⤵PID:2448
-
\??\c:\1bhtbh.exec:\1bhtbh.exe92⤵PID:3404
-
\??\c:\pdpjd.exec:\pdpjd.exe93⤵PID:2064
-
\??\c:\djjvd.exec:\djjvd.exe94⤵PID:1628
-
\??\c:\1lrlllf.exec:\1lrlllf.exe95⤵PID:3268
-
\??\c:\nnhhtt.exec:\nnhhtt.exe96⤵PID:3572
-
\??\c:\ntbbtb.exec:\ntbbtb.exe97⤵PID:812
-
\??\c:\jpdvv.exec:\jpdvv.exe98⤵PID:4900
-
\??\c:\vvvpp.exec:\vvvpp.exe99⤵PID:4224
-
\??\c:\rlffffx.exec:\rlffffx.exe100⤵PID:4756
-
\??\c:\btthht.exec:\btthht.exe101⤵PID:2192
-
\??\c:\9vddv.exec:\9vddv.exe102⤵PID:2812
-
\??\c:\ddppp.exec:\ddppp.exe103⤵PID:5028
-
\??\c:\9ntbnt.exec:\9ntbnt.exe104⤵PID:540
-
\??\c:\5pjjv.exec:\5pjjv.exe105⤵PID:1252
-
\??\c:\xlffflx.exec:\xlffflx.exe106⤵PID:1004
-
\??\c:\5rlllff.exec:\5rlllff.exe107⤵PID:3632
-
\??\c:\3thbhh.exec:\3thbhh.exe108⤵PID:1524
-
\??\c:\jjpvv.exec:\jjpvv.exe109⤵PID:4392
-
\??\c:\ppppp.exec:\ppppp.exe110⤵PID:4864
-
\??\c:\xrrrllf.exec:\xrrrllf.exe111⤵PID:1652
-
\??\c:\lrrrlll.exec:\lrrrlll.exe112⤵PID:4780
-
\??\c:\hbtttt.exec:\hbtttt.exe113⤵PID:1812
-
\??\c:\nhbbhh.exec:\nhbbhh.exe114⤵PID:4040
-
\??\c:\jjppd.exec:\jjppd.exe115⤵PID:4388
-
\??\c:\xxlfxff.exec:\xxlfxff.exe116⤵PID:1348
-
\??\c:\nntttt.exec:\nntttt.exe117⤵PID:3524
-
\??\c:\5bnhtb.exec:\5bnhtb.exe118⤵PID:4212
-
\??\c:\ddppd.exec:\ddppd.exe119⤵PID:4724
-
\??\c:\3pvpj.exec:\3pvpj.exe120⤵PID:1988
-
\??\c:\9dvpj.exec:\9dvpj.exe121⤵PID:3388
-
\??\c:\fxlfxxx.exec:\fxlfxxx.exe122⤵PID:4364
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-