Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 21:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe
-
Size
120KB
-
MD5
b320df553dda4158c19fab252d462f02
-
SHA1
7913a626fb7f7a72ad664a61cae7646885c1eaba
-
SHA256
a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3
-
SHA512
e90b2737b70cbefc6a79037c3fc00474c62453f37b67d4b802b16cb5119273252c1a5b294943f5e2ee7a87d4ef8baeb58787b745cd7547ccaa5ce5f6cd330b13
-
SSDEEP
3072:ymb3NkkiQ3mdBjFWXkj7afoHvmQ+EZMYX8XFE:n3C9BRW0j/uVEZFN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/4588-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3124-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-31-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4452-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2092-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4300-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3420-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1152-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3696-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3016-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5008-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/832-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2016-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2088-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2896-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1516-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3060-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4920 bthbtn.exe 4452 bhttnt.exe 3468 vjpvj.exe 3124 xxfllxr.exe 2092 lxlxrrl.exe 3420 1rxllxf.exe 4300 5ntttb.exe 5052 dddvp.exe 1524 5llfxxx.exe 1152 5thhhb.exe 1676 dvvvd.exe 3696 xrlxrff.exe 4704 bnhnht.exe 3016 jddvp.exe 5008 httnhh.exe 1956 tntnnh.exe 3948 lrxrrrr.exe 832 5tntbt.exe 1176 dvjdd.exe 2792 dpdpp.exe 2088 flllffx.exe 2016 tnhnbt.exe 2896 vvdjj.exe 1516 lxffxxr.exe 3060 btnhtn.exe 3680 pvjdd.exe 5020 rxrfffx.exe 3408 btnbnh.exe 4848 pvpvj.exe 4352 xxxfrlr.exe 2260 nthbhh.exe 1512 3dvvp.exe 2244 rfxlrfr.exe 2400 rxllxxr.exe 1064 tnhntn.exe 4684 vvdvp.exe 5068 3lrrxll.exe 1380 tnbnbt.exe 1816 pdjdd.exe 1520 flrrxrf.exe 2864 5htnnb.exe 1192 jppdp.exe 3192 lffrlxr.exe 1388 vpvvp.exe 4876 3vvvp.exe 2624 rrxfrlf.exe 2364 3bbbtt.exe 3912 fxxrrrr.exe 1836 lrfffrf.exe 3124 hbhhth.exe 4252 1pvvj.exe 4396 9vdvp.exe 2768 llfxrlr.exe 4844 thbnhb.exe 1188 tttnhb.exe 4648 btbbhh.exe 3552 bnbntn.exe 3156 fffxxxf.exe 1152 tnttnn.exe 4584 3jvpv.exe 1944 jdppj.exe 456 nnbtnn.exe 3588 7thbnn.exe 1916 9ddvv.exe -
resource yara_rule behavioral2/memory/4588-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2092-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4300-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1152-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1152-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1152-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3696-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5008-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/832-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2088-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2896-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3060-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-197-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lfxrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bhhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrllff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rrrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxxrrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4920 4588 a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe 84 PID 4588 wrote to memory of 4920 4588 a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe 84 PID 4588 wrote to memory of 4920 4588 a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe 84 PID 4920 wrote to memory of 4452 4920 bthbtn.exe 85 PID 4920 wrote to memory of 4452 4920 bthbtn.exe 85 PID 4920 wrote to memory of 4452 4920 bthbtn.exe 85 PID 4452 wrote to memory of 3468 4452 bhttnt.exe 86 PID 4452 wrote to memory of 3468 4452 bhttnt.exe 86 PID 4452 wrote to memory of 3468 4452 bhttnt.exe 86 PID 3468 wrote to memory of 3124 3468 vjpvj.exe 87 PID 3468 wrote to memory of 3124 3468 vjpvj.exe 87 PID 3468 wrote to memory of 3124 3468 vjpvj.exe 87 PID 3124 wrote to memory of 2092 3124 xxfllxr.exe 88 PID 3124 wrote to memory of 2092 3124 xxfllxr.exe 88 PID 3124 wrote to memory of 2092 3124 xxfllxr.exe 88 PID 2092 wrote to memory of 3420 2092 lxlxrrl.exe 89 PID 2092 wrote to memory of 3420 2092 lxlxrrl.exe 89 PID 2092 wrote to memory of 3420 2092 lxlxrrl.exe 89 PID 3420 wrote to memory of 4300 3420 1rxllxf.exe 90 PID 3420 wrote to memory of 4300 3420 1rxllxf.exe 90 PID 3420 wrote to memory of 4300 3420 1rxllxf.exe 90 PID 4300 wrote to memory of 5052 4300 5ntttb.exe 91 PID 4300 wrote to memory of 5052 4300 5ntttb.exe 91 PID 4300 wrote to memory of 5052 4300 5ntttb.exe 91 PID 5052 wrote to memory of 1524 5052 dddvp.exe 92 PID 5052 wrote to memory of 1524 5052 dddvp.exe 92 PID 5052 wrote to memory of 1524 5052 dddvp.exe 92 PID 1524 wrote to memory of 1152 1524 5llfxxx.exe 93 PID 1524 wrote to memory of 1152 1524 5llfxxx.exe 93 PID 1524 wrote to memory of 1152 1524 5llfxxx.exe 93 PID 1152 wrote to memory of 1676 1152 5thhhb.exe 94 PID 1152 wrote to memory of 1676 1152 5thhhb.exe 94 PID 1152 wrote to memory of 1676 1152 5thhhb.exe 94 PID 1676 wrote to memory of 3696 1676 dvvvd.exe 95 PID 1676 wrote to memory of 3696 1676 dvvvd.exe 95 PID 1676 wrote to memory of 3696 1676 dvvvd.exe 95 PID 3696 wrote to memory of 4704 3696 xrlxrff.exe 96 PID 3696 wrote to memory of 4704 3696 xrlxrff.exe 96 PID 3696 wrote to memory of 4704 3696 xrlxrff.exe 96 PID 4704 wrote to memory of 3016 4704 bnhnht.exe 97 PID 4704 wrote to memory of 3016 4704 bnhnht.exe 97 PID 4704 wrote to memory of 3016 4704 bnhnht.exe 97 PID 3016 wrote to memory of 5008 3016 jddvp.exe 98 PID 3016 wrote to memory of 5008 3016 jddvp.exe 98 PID 3016 wrote to memory of 5008 3016 jddvp.exe 98 PID 5008 wrote to memory of 1956 5008 httnhh.exe 99 PID 5008 wrote to memory of 1956 5008 httnhh.exe 99 PID 5008 wrote to memory of 1956 5008 httnhh.exe 99 PID 1956 wrote to memory of 3948 1956 tntnnh.exe 100 PID 1956 wrote to memory of 3948 1956 tntnnh.exe 100 PID 1956 wrote to memory of 3948 1956 tntnnh.exe 100 PID 3948 wrote to memory of 832 3948 lrxrrrr.exe 101 PID 3948 wrote to memory of 832 3948 lrxrrrr.exe 101 PID 3948 wrote to memory of 832 3948 lrxrrrr.exe 101 PID 832 wrote to memory of 1176 832 5tntbt.exe 102 PID 832 wrote to memory of 1176 832 5tntbt.exe 102 PID 832 wrote to memory of 1176 832 5tntbt.exe 102 PID 1176 wrote to memory of 2792 1176 dvjdd.exe 103 PID 1176 wrote to memory of 2792 1176 dvjdd.exe 103 PID 1176 wrote to memory of 2792 1176 dvjdd.exe 103 PID 2792 wrote to memory of 2088 2792 dpdpp.exe 104 PID 2792 wrote to memory of 2088 2792 dpdpp.exe 104 PID 2792 wrote to memory of 2088 2792 dpdpp.exe 104 PID 2088 wrote to memory of 2016 2088 flllffx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe"C:\Users\Admin\AppData\Local\Temp\a44d75b276c38affb0ccb0edce2a11284731484b3c9cf2c732291b4b670046e3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\bthbtn.exec:\bthbtn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\bhttnt.exec:\bhttnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\vjpvj.exec:\vjpvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\xxfllxr.exec:\xxfllxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\lxlxrrl.exec:\lxlxrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\1rxllxf.exec:\1rxllxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
\??\c:\5ntttb.exec:\5ntttb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\dddvp.exec:\dddvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\5llfxxx.exec:\5llfxxx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\5thhhb.exec:\5thhhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\dvvvd.exec:\dvvvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\xrlxrff.exec:\xrlxrff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
\??\c:\bnhnht.exec:\bnhnht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\jddvp.exec:\jddvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\httnhh.exec:\httnhh.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\tntnnh.exec:\tntnnh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\lrxrrrr.exec:\lrxrrrr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\5tntbt.exec:\5tntbt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
\??\c:\dvjdd.exec:\dvjdd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\dpdpp.exec:\dpdpp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\flllffx.exec:\flllffx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\tnhnbt.exec:\tnhnbt.exe23⤵
- Executes dropped EXE
PID:2016 -
\??\c:\vvdjj.exec:\vvdjj.exe24⤵
- Executes dropped EXE
PID:2896 -
\??\c:\lxffxxr.exec:\lxffxxr.exe25⤵
- Executes dropped EXE
PID:1516 -
\??\c:\btnhtn.exec:\btnhtn.exe26⤵
- Executes dropped EXE
PID:3060 -
\??\c:\pvjdd.exec:\pvjdd.exe27⤵
- Executes dropped EXE
PID:3680 -
\??\c:\rxrfffx.exec:\rxrfffx.exe28⤵
- Executes dropped EXE
PID:5020 -
\??\c:\btnbnh.exec:\btnbnh.exe29⤵
- Executes dropped EXE
PID:3408 -
\??\c:\pvpvj.exec:\pvpvj.exe30⤵
- Executes dropped EXE
PID:4848 -
\??\c:\xxxfrlr.exec:\xxxfrlr.exe31⤵
- Executes dropped EXE
PID:4352 -
\??\c:\nthbhh.exec:\nthbhh.exe32⤵
- Executes dropped EXE
PID:2260 -
\??\c:\3dvvp.exec:\3dvvp.exe33⤵
- Executes dropped EXE
PID:1512 -
\??\c:\rfxlrfr.exec:\rfxlrfr.exe34⤵
- Executes dropped EXE
PID:2244 -
\??\c:\rxllxxr.exec:\rxllxxr.exe35⤵
- Executes dropped EXE
PID:2400 -
\??\c:\tnhntn.exec:\tnhntn.exe36⤵
- Executes dropped EXE
PID:1064 -
\??\c:\vvdvp.exec:\vvdvp.exe37⤵
- Executes dropped EXE
PID:4684 -
\??\c:\3lrrxll.exec:\3lrrxll.exe38⤵
- Executes dropped EXE
PID:5068 -
\??\c:\tnbnbt.exec:\tnbnbt.exe39⤵
- Executes dropped EXE
PID:1380 -
\??\c:\pdjdd.exec:\pdjdd.exe40⤵
- Executes dropped EXE
PID:1816 -
\??\c:\flrrxrf.exec:\flrrxrf.exe41⤵
- Executes dropped EXE
PID:1520 -
\??\c:\5htnnb.exec:\5htnnb.exe42⤵
- Executes dropped EXE
PID:2864 -
\??\c:\jppdp.exec:\jppdp.exe43⤵
- Executes dropped EXE
PID:1192 -
\??\c:\lffrlxr.exec:\lffrlxr.exe44⤵
- Executes dropped EXE
PID:3192 -
\??\c:\ntbbnh.exec:\ntbbnh.exe45⤵PID:1032
-
\??\c:\vpvvp.exec:\vpvvp.exe46⤵
- Executes dropped EXE
PID:1388 -
\??\c:\3vvvp.exec:\3vvvp.exe47⤵
- Executes dropped EXE
PID:4876 -
\??\c:\rrxfrlf.exec:\rrxfrlf.exe48⤵
- Executes dropped EXE
PID:2624 -
\??\c:\3bbbtt.exec:\3bbbtt.exe49⤵
- Executes dropped EXE
PID:2364 -
\??\c:\fxxrrrr.exec:\fxxrrrr.exe50⤵
- Executes dropped EXE
PID:3912 -
\??\c:\lrfffrf.exec:\lrfffrf.exe51⤵
- Executes dropped EXE
PID:1836 -
\??\c:\hbhhth.exec:\hbhhth.exe52⤵
- Executes dropped EXE
PID:3124 -
\??\c:\1pvvj.exec:\1pvvj.exe53⤵
- Executes dropped EXE
PID:4252 -
\??\c:\9vdvp.exec:\9vdvp.exe54⤵
- Executes dropped EXE
PID:4396 -
\??\c:\llfxrlr.exec:\llfxrlr.exe55⤵
- Executes dropped EXE
PID:2768 -
\??\c:\thbnhb.exec:\thbnhb.exe56⤵
- Executes dropped EXE
PID:4844 -
\??\c:\tttnhb.exec:\tttnhb.exe57⤵
- Executes dropped EXE
PID:1188 -
\??\c:\btbbhh.exec:\btbbhh.exe58⤵
- Executes dropped EXE
PID:4648 -
\??\c:\bnbntn.exec:\bnbntn.exe59⤵
- Executes dropped EXE
PID:3552 -
\??\c:\fffxxxf.exec:\fffxxxf.exe60⤵
- Executes dropped EXE
PID:3156 -
\??\c:\tnttnn.exec:\tnttnn.exe61⤵
- Executes dropped EXE
PID:1152 -
\??\c:\3jvpv.exec:\3jvpv.exe62⤵
- Executes dropped EXE
PID:4584 -
\??\c:\jdppj.exec:\jdppj.exe63⤵
- Executes dropped EXE
PID:1944 -
\??\c:\nnbtnn.exec:\nnbtnn.exe64⤵
- Executes dropped EXE
PID:456 -
\??\c:\7thbnn.exec:\7thbnn.exe65⤵
- Executes dropped EXE
PID:3588 -
\??\c:\9ddvv.exec:\9ddvv.exe66⤵
- Executes dropped EXE
PID:1916 -
\??\c:\rrfxllf.exec:\rrfxllf.exe67⤵PID:1364
-
\??\c:\xfxrfxf.exec:\xfxrfxf.exe68⤵PID:868
-
\??\c:\nhtntn.exec:\nhtntn.exe69⤵PID:4712
-
\??\c:\vdvjp.exec:\vdvjp.exe70⤵PID:2728
-
\??\c:\rfffflf.exec:\rfffflf.exe71⤵PID:2808
-
\??\c:\3tnhbt.exec:\3tnhbt.exe72⤵PID:1448
-
\??\c:\dvvvp.exec:\dvvvp.exe73⤵PID:2828
-
\??\c:\djvpj.exec:\djvpj.exe74⤵PID:624
-
\??\c:\frxrrrr.exec:\frxrrrr.exe75⤵PID:4072
-
\??\c:\1hhbtt.exec:\1hhbtt.exe76⤵PID:5064
-
\??\c:\thhbtn.exec:\thhbtn.exe77⤵PID:2896
-
\??\c:\vpvvp.exec:\vpvvp.exe78⤵PID:4932
-
\??\c:\vvjjj.exec:\vvjjj.exe79⤵PID:2168
-
\??\c:\tbhbnn.exec:\tbhbnn.exe80⤵PID:1184
-
\??\c:\thnhbb.exec:\thnhbb.exe81⤵PID:4788
-
\??\c:\pjjdv.exec:\pjjdv.exe82⤵PID:4948
-
\??\c:\xllrlxx.exec:\xllrlxx.exe83⤵PID:5036
-
\??\c:\bntnhn.exec:\bntnhn.exe84⤵PID:3240
-
\??\c:\nhhbtt.exec:\nhhbtt.exe85⤵PID:3672
-
\??\c:\jvvvv.exec:\jvvvv.exe86⤵PID:1572
-
\??\c:\xxlrrrl.exec:\xxlrrrl.exe87⤵PID:3864
-
\??\c:\xflfrrl.exec:\xflfrrl.exe88⤵PID:4592
-
\??\c:\ttbbbb.exec:\ttbbbb.exe89⤵PID:3884
-
\??\c:\vdjpp.exec:\vdjpp.exe90⤵PID:3600
-
\??\c:\xrxrrrl.exec:\xrxrrrl.exe91⤵PID:1564
-
\??\c:\3rrrllf.exec:\3rrrllf.exe92⤵PID:1376
-
\??\c:\btnhbn.exec:\btnhbn.exe93⤵PID:2212
-
\??\c:\fxxrlff.exec:\fxxrlff.exe94⤵PID:2240
-
\??\c:\lfxfxxx.exec:\lfxfxxx.exe95⤵PID:1816
-
\??\c:\btbbbb.exec:\btbbbb.exe96⤵PID:1552
-
\??\c:\ttnnnn.exec:\ttnnnn.exe97⤵
- System Location Discovery: System Language Discovery
PID:4324 -
\??\c:\ddjjv.exec:\ddjjv.exe98⤵PID:4004
-
\??\c:\xlrlxrl.exec:\xlrlxrl.exe99⤵PID:2860
-
\??\c:\xxxrxlx.exec:\xxxrxlx.exe100⤵PID:1720
-
\??\c:\tttttt.exec:\tttttt.exe101⤵PID:1904
-
\??\c:\tnnbtt.exec:\tnnbtt.exe102⤵PID:1392
-
\??\c:\5dpjv.exec:\5dpjv.exe103⤵PID:4164
-
\??\c:\5djjd.exec:\5djjd.exe104⤵PID:2392
-
\??\c:\rxrlfxr.exec:\rxrlfxr.exe105⤵PID:3644
-
\??\c:\rrrlfff.exec:\rrrlfff.exe106⤵PID:5052
-
\??\c:\thbhbt.exec:\thbhbt.exe107⤵PID:688
-
\??\c:\jpvjd.exec:\jpvjd.exe108⤵PID:1524
-
\??\c:\1jjjj.exec:\1jjjj.exe109⤵PID:4480
-
\??\c:\rlxrxxf.exec:\rlxrxxf.exe110⤵PID:2800
-
\??\c:\xxrxxxr.exec:\xxrxxxr.exe111⤵PID:3324
-
\??\c:\ddddj.exec:\ddddj.exe112⤵PID:4540
-
\??\c:\xlrlffx.exec:\xlrlffx.exe113⤵PID:1820
-
\??\c:\5rffffx.exec:\5rffffx.exe114⤵PID:3952
-
\??\c:\1pvpd.exec:\1pvpd.exe115⤵PID:2332
-
\??\c:\vjvjv.exec:\vjvjv.exe116⤵PID:2640
-
\??\c:\frrxrxf.exec:\frrxrxf.exe117⤵PID:1636
-
\??\c:\dpppd.exec:\dpppd.exe118⤵PID:2764
-
\??\c:\ffrxrxx.exec:\ffrxrxx.exe119⤵PID:1196
-
\??\c:\9ntnhh.exec:\9ntnhh.exe120⤵PID:4460
-
\??\c:\pvpvv.exec:\pvpvv.exe121⤵PID:644
-
\??\c:\9rrrlfx.exec:\9rrrlfx.exe122⤵PID:2152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-