Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 01:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe
-
Size
72KB
-
MD5
2e6639661b8e824117bd9f263ec9d950
-
SHA1
c4b64cdbb148111b0b3c5b8afae2118d6b22a5de
-
SHA256
2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90
-
SHA512
22afcb9367f2324ff708309f3499783663dc31f5ba64add9f8931c1773fd6fb7e2d0d10aba1f0948df0d902effb565418bcb57a0999bc6f2f57eee3d4e0d6c21
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjX:ymb3NkkiQ3mdBjFI4Vn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 32 IoCs
resource yara_rule behavioral2/memory/4764-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/784-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1508-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1988-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1312-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2148-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2148-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3632-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1904-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2224-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2520-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2520-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2372-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4476-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4360-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2228-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3480-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4068-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/636-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2860-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4188-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2004-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 784 rfrllxl.exe 1508 tthhnh.exe 1988 3dddv.exe 1312 xrflrxf.exe 212 bnhnnt.exe 2148 jpvpj.exe 3632 9rxrfll.exe 1904 1pddv.exe 2224 jjpjp.exe 2520 1xlfffl.exe 2372 3ntnnn.exe 4476 vvpjd.exe 4360 xlfxrrl.exe 2228 bhtnnn.exe 2312 hbhhnn.exe 4016 pdjdj.exe 4784 rlrllll.exe 1540 bhnnnh.exe 4412 fffxllx.exe 3480 nbbbtt.exe 3612 vppjd.exe 4068 frlfrrl.exe 636 rfxrllr.exe 3692 nhhbtt.exe 2860 dpvpj.exe 4188 hntttb.exe 4748 bhnhhh.exe 4488 ttnbbn.exe 2196 1bbttt.exe 4408 3jjdp.exe 2004 ffllfff.exe 3436 xllxlff.exe 1504 hntttt.exe 4104 djjpp.exe 872 rffxllf.exe 2576 xlrfxrl.exe 3696 htbhhb.exe 4140 jdjdd.exe 2188 7pvjv.exe 1508 xxxlxlx.exe 3300 fxxrrll.exe 2936 thhnnb.exe 3972 nbbthh.exe 432 vpddj.exe 3816 rlfxllf.exe 4480 bnnhbt.exe 3644 jvpjd.exe 2768 1lllxxl.exe 2360 thnbtt.exe 2500 ppdpv.exe 3772 frrlfxr.exe 2380 xxxffrr.exe 5032 hbnhhh.exe 4940 btbbtt.exe 2480 jdvpj.exe 2072 rrrlfff.exe 2468 9bbbtn.exe 3676 vpvvv.exe 1828 lffrrrr.exe 4016 rfrfxxl.exe 3532 nbnbhn.exe 2948 9jvpj.exe 3664 vpvdd.exe 3124 lrxxrff.exe -
resource yara_rule behavioral2/memory/4764-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/784-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1508-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1508-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1988-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1312-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1904-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2224-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2224-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2224-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2224-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2520-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2520-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2372-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4476-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2228-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2312-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4068-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/636-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2860-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4188-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2004-216-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbntbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxllfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxrlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxffrr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 784 4764 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 84 PID 4764 wrote to memory of 784 4764 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 84 PID 4764 wrote to memory of 784 4764 2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe 84 PID 784 wrote to memory of 1508 784 rfrllxl.exe 85 PID 784 wrote to memory of 1508 784 rfrllxl.exe 85 PID 784 wrote to memory of 1508 784 rfrllxl.exe 85 PID 1508 wrote to memory of 1988 1508 tthhnh.exe 86 PID 1508 wrote to memory of 1988 1508 tthhnh.exe 86 PID 1508 wrote to memory of 1988 1508 tthhnh.exe 86 PID 1988 wrote to memory of 1312 1988 3dddv.exe 87 PID 1988 wrote to memory of 1312 1988 3dddv.exe 87 PID 1988 wrote to memory of 1312 1988 3dddv.exe 87 PID 1312 wrote to memory of 212 1312 xrflrxf.exe 88 PID 1312 wrote to memory of 212 1312 xrflrxf.exe 88 PID 1312 wrote to memory of 212 1312 xrflrxf.exe 88 PID 212 wrote to memory of 2148 212 bnhnnt.exe 89 PID 212 wrote to memory of 2148 212 bnhnnt.exe 89 PID 212 wrote to memory of 2148 212 bnhnnt.exe 89 PID 2148 wrote to memory of 3632 2148 jpvpj.exe 90 PID 2148 wrote to memory of 3632 2148 jpvpj.exe 90 PID 2148 wrote to memory of 3632 2148 jpvpj.exe 90 PID 3632 wrote to memory of 1904 3632 9rxrfll.exe 91 PID 3632 wrote to memory of 1904 3632 9rxrfll.exe 91 PID 3632 wrote to memory of 1904 3632 9rxrfll.exe 91 PID 1904 wrote to memory of 2224 1904 1pddv.exe 92 PID 1904 wrote to memory of 2224 1904 1pddv.exe 92 PID 1904 wrote to memory of 2224 1904 1pddv.exe 92 PID 2224 wrote to memory of 2520 2224 jjpjp.exe 93 PID 2224 wrote to memory of 2520 2224 jjpjp.exe 93 PID 2224 wrote to memory of 2520 2224 jjpjp.exe 93 PID 2520 wrote to memory of 2372 2520 1xlfffl.exe 94 PID 2520 wrote to memory of 2372 2520 1xlfffl.exe 94 PID 2520 wrote to memory of 2372 2520 1xlfffl.exe 94 PID 2372 wrote to memory of 4476 2372 3ntnnn.exe 95 PID 2372 wrote to memory of 4476 2372 3ntnnn.exe 95 PID 2372 wrote to memory of 4476 2372 3ntnnn.exe 95 PID 4476 wrote to memory of 4360 4476 vvpjd.exe 96 PID 4476 wrote to memory of 4360 4476 vvpjd.exe 96 PID 4476 wrote to memory of 4360 4476 vvpjd.exe 96 PID 4360 wrote to memory of 2228 4360 xlfxrrl.exe 97 PID 4360 wrote to memory of 2228 4360 xlfxrrl.exe 97 PID 4360 wrote to memory of 2228 4360 xlfxrrl.exe 97 PID 2228 wrote to memory of 2312 2228 bhtnnn.exe 98 PID 2228 wrote to memory of 2312 2228 bhtnnn.exe 98 PID 2228 wrote to memory of 2312 2228 bhtnnn.exe 98 PID 2312 wrote to memory of 4016 2312 hbhhnn.exe 99 PID 2312 wrote to memory of 4016 2312 hbhhnn.exe 99 PID 2312 wrote to memory of 4016 2312 hbhhnn.exe 99 PID 4016 wrote to memory of 4784 4016 pdjdj.exe 100 PID 4016 wrote to memory of 4784 4016 pdjdj.exe 100 PID 4016 wrote to memory of 4784 4016 pdjdj.exe 100 PID 4784 wrote to memory of 1540 4784 rlrllll.exe 101 PID 4784 wrote to memory of 1540 4784 rlrllll.exe 101 PID 4784 wrote to memory of 1540 4784 rlrllll.exe 101 PID 1540 wrote to memory of 4412 1540 bhnnnh.exe 102 PID 1540 wrote to memory of 4412 1540 bhnnnh.exe 102 PID 1540 wrote to memory of 4412 1540 bhnnnh.exe 102 PID 4412 wrote to memory of 3480 4412 fffxllx.exe 103 PID 4412 wrote to memory of 3480 4412 fffxllx.exe 103 PID 4412 wrote to memory of 3480 4412 fffxllx.exe 103 PID 3480 wrote to memory of 3612 3480 nbbbtt.exe 104 PID 3480 wrote to memory of 3612 3480 nbbbtt.exe 104 PID 3480 wrote to memory of 3612 3480 nbbbtt.exe 104 PID 3612 wrote to memory of 4068 3612 vppjd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe"C:\Users\Admin\AppData\Local\Temp\2f51a7ee95c2222d3e91c88a02cc83e8422b4ff07dbb3a4b32626d5d5ee13d90.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\rfrllxl.exec:\rfrllxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:784 -
\??\c:\tthhnh.exec:\tthhnh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\3dddv.exec:\3dddv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\xrflrxf.exec:\xrflrxf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\bnhnnt.exec:\bnhnnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\jpvpj.exec:\jpvpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\9rxrfll.exec:\9rxrfll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\1pddv.exec:\1pddv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\jjpjp.exec:\jjpjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\1xlfffl.exec:\1xlfffl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\3ntnnn.exec:\3ntnnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\vvpjd.exec:\vvpjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
\??\c:\xlfxrrl.exec:\xlfxrrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
\??\c:\bhtnnn.exec:\bhtnnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\hbhhnn.exec:\hbhhnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\pdjdj.exec:\pdjdj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
\??\c:\rlrllll.exec:\rlrllll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\bhnnnh.exec:\bhnnnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\fffxllx.exec:\fffxllx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\nbbbtt.exec:\nbbbtt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\vppjd.exec:\vppjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\frlfrrl.exec:\frlfrrl.exe23⤵
- Executes dropped EXE
PID:4068 -
\??\c:\rfxrllr.exec:\rfxrllr.exe24⤵
- Executes dropped EXE
PID:636 -
\??\c:\nhhbtt.exec:\nhhbtt.exe25⤵
- Executes dropped EXE
PID:3692 -
\??\c:\dpvpj.exec:\dpvpj.exe26⤵
- Executes dropped EXE
PID:2860 -
\??\c:\hntttb.exec:\hntttb.exe27⤵
- Executes dropped EXE
PID:4188 -
\??\c:\bhnhhh.exec:\bhnhhh.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748 -
\??\c:\ttnbbn.exec:\ttnbbn.exe29⤵
- Executes dropped EXE
PID:4488 -
\??\c:\1bbttt.exec:\1bbttt.exe30⤵
- Executes dropped EXE
PID:2196 -
\??\c:\3jjdp.exec:\3jjdp.exe31⤵
- Executes dropped EXE
PID:4408 -
\??\c:\ffllfff.exec:\ffllfff.exe32⤵
- Executes dropped EXE
PID:2004 -
\??\c:\xllxlff.exec:\xllxlff.exe33⤵
- Executes dropped EXE
PID:3436 -
\??\c:\hntttt.exec:\hntttt.exe34⤵
- Executes dropped EXE
PID:1504 -
\??\c:\djjpp.exec:\djjpp.exe35⤵
- Executes dropped EXE
PID:4104 -
\??\c:\rffxllf.exec:\rffxllf.exe36⤵
- Executes dropped EXE
PID:872 -
\??\c:\xlrfxrl.exec:\xlrfxrl.exe37⤵
- Executes dropped EXE
PID:2576 -
\??\c:\htbhhb.exec:\htbhhb.exe38⤵
- Executes dropped EXE
PID:3696 -
\??\c:\jdjdd.exec:\jdjdd.exe39⤵
- Executes dropped EXE
PID:4140 -
\??\c:\7pvjv.exec:\7pvjv.exe40⤵
- Executes dropped EXE
PID:2188 -
\??\c:\xxxlxlx.exec:\xxxlxlx.exe41⤵
- Executes dropped EXE
PID:1508 -
\??\c:\fxxrrll.exec:\fxxrrll.exe42⤵
- Executes dropped EXE
PID:3300 -
\??\c:\thhnnb.exec:\thhnnb.exe43⤵
- Executes dropped EXE
PID:2936 -
\??\c:\nbbthh.exec:\nbbthh.exe44⤵
- Executes dropped EXE
PID:3972 -
\??\c:\vpddj.exec:\vpddj.exe45⤵
- Executes dropped EXE
PID:432 -
\??\c:\rlfxllf.exec:\rlfxllf.exe46⤵
- Executes dropped EXE
PID:3816 -
\??\c:\bnnhbt.exec:\bnnhbt.exe47⤵
- Executes dropped EXE
PID:4480 -
\??\c:\jvpjd.exec:\jvpjd.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3644 -
\??\c:\1lllxxl.exec:\1lllxxl.exe49⤵
- Executes dropped EXE
PID:2768 -
\??\c:\thnbtt.exec:\thnbtt.exe50⤵
- Executes dropped EXE
PID:2360 -
\??\c:\ppdpv.exec:\ppdpv.exe51⤵
- Executes dropped EXE
PID:2500 -
\??\c:\frrlfxr.exec:\frrlfxr.exe52⤵
- Executes dropped EXE
PID:3772 -
\??\c:\xxxffrr.exec:\xxxffrr.exe53⤵
- Executes dropped EXE
PID:2380 -
\??\c:\hbnhhh.exec:\hbnhhh.exe54⤵
- Executes dropped EXE
PID:5032 -
\??\c:\btbbtt.exec:\btbbtt.exe55⤵
- Executes dropped EXE
PID:4940 -
\??\c:\jdvpj.exec:\jdvpj.exe56⤵
- Executes dropped EXE
PID:2480 -
\??\c:\rrrlfff.exec:\rrrlfff.exe57⤵
- Executes dropped EXE
PID:2072 -
\??\c:\9bbbtn.exec:\9bbbtn.exe58⤵
- Executes dropped EXE
PID:2468 -
\??\c:\vpvvv.exec:\vpvvv.exe59⤵
- Executes dropped EXE
PID:3676 -
\??\c:\lffrrrr.exec:\lffrrrr.exe60⤵
- Executes dropped EXE
PID:1828 -
\??\c:\rfrfxxl.exec:\rfrfxxl.exe61⤵
- Executes dropped EXE
PID:4016 -
\??\c:\nbnbhn.exec:\nbnbhn.exe62⤵
- Executes dropped EXE
PID:3532 -
\??\c:\9jvpj.exec:\9jvpj.exe63⤵
- Executes dropped EXE
PID:2948 -
\??\c:\vpvdd.exec:\vpvdd.exe64⤵
- Executes dropped EXE
PID:3664 -
\??\c:\lrxxrff.exec:\lrxxrff.exe65⤵
- Executes dropped EXE
PID:3124 -
\??\c:\htbttt.exec:\htbttt.exe66⤵PID:3176
-
\??\c:\hbnhnt.exec:\hbnhnt.exe67⤵PID:1892
-
\??\c:\dppdv.exec:\dppdv.exe68⤵PID:1780
-
\??\c:\lfxxrrl.exec:\lfxxrrl.exe69⤵PID:4740
-
\??\c:\5rxxxxx.exec:\5rxxxxx.exe70⤵PID:4572
-
\??\c:\httnnn.exec:\httnnn.exe71⤵PID:2260
-
\??\c:\ddjjv.exec:\ddjjv.exe72⤵PID:1488
-
\??\c:\vpppp.exec:\vpppp.exe73⤵PID:2860
-
\??\c:\llffxxr.exec:\llffxxr.exe74⤵PID:4188
-
\??\c:\rlrllxf.exec:\rlrllxf.exe75⤵PID:4524
-
\??\c:\ttnbbh.exec:\ttnbbh.exe76⤵PID:4748
-
\??\c:\5pvdj.exec:\5pvdj.exe77⤵PID:4736
-
\??\c:\5jjdv.exec:\5jjdv.exe78⤵PID:4776
-
\??\c:\9fflfxr.exec:\9fflfxr.exe79⤵PID:3304
-
\??\c:\tnhbtt.exec:\tnhbtt.exe80⤵PID:952
-
\??\c:\vpjdd.exec:\vpjdd.exe81⤵PID:3556
-
\??\c:\vpvpd.exec:\vpvpd.exe82⤵PID:3328
-
\??\c:\xrrlfff.exec:\xrrlfff.exe83⤵PID:1504
-
\??\c:\thnnhh.exec:\thnnhh.exe84⤵PID:4104
-
\??\c:\nnnbbb.exec:\nnnbbb.exe85⤵PID:1144
-
\??\c:\jvpjv.exec:\jvpjv.exe86⤵PID:4764
-
\??\c:\3flfxxr.exec:\3flfxxr.exe87⤵PID:3696
-
\??\c:\bnnnth.exec:\bnnnth.exe88⤵PID:3920
-
\??\c:\nbbntn.exec:\nbbntn.exe89⤵PID:5016
-
\??\c:\7pdjp.exec:\7pdjp.exe90⤵PID:1248
-
\??\c:\fflrfxl.exec:\fflrfxl.exe91⤵PID:1416
-
\??\c:\3nhtht.exec:\3nhtht.exe92⤵PID:3256
-
\??\c:\bnnnhb.exec:\bnnnhb.exe93⤵PID:5048
-
\??\c:\jjjdd.exec:\jjjdd.exe94⤵PID:1600
-
\??\c:\jdvjd.exec:\jdvjd.exe95⤵PID:1188
-
\??\c:\fxrxxll.exec:\fxrxxll.exe96⤵PID:1996
-
\??\c:\nhbbbb.exec:\nhbbbb.exe97⤵PID:3212
-
\??\c:\bttthh.exec:\bttthh.exe98⤵PID:3236
-
\??\c:\dvpjd.exec:\dvpjd.exe99⤵PID:4992
-
\??\c:\frfxfff.exec:\frfxfff.exe100⤵PID:3056
-
\??\c:\rfrrlrr.exec:\rfrrlrr.exe101⤵PID:3456
-
\??\c:\bntnhb.exec:\bntnhb.exe102⤵PID:2268
-
\??\c:\jvpdp.exec:\jvpdp.exe103⤵PID:4308
-
\??\c:\xxrlfxr.exec:\xxrlfxr.exe104⤵PID:4940
-
\??\c:\nbhbbn.exec:\nbhbbn.exe105⤵PID:4476
-
\??\c:\nhhbnh.exec:\nhhbnh.exe106⤵PID:3828
-
\??\c:\jdpjd.exec:\jdpjd.exe107⤵PID:3248
-
\??\c:\5ddjv.exec:\5ddjv.exe108⤵PID:3520
-
\??\c:\fffxrlf.exec:\fffxrlf.exe109⤵PID:2312
-
\??\c:\tbbtnn.exec:\tbbtnn.exe110⤵PID:3036
-
\??\c:\hnntnh.exec:\hnntnh.exe111⤵PID:2232
-
\??\c:\vpddj.exec:\vpddj.exe112⤵PID:4220
-
\??\c:\vpvdv.exec:\vpvdv.exe113⤵PID:2484
-
\??\c:\llxxxxf.exec:\llxxxxf.exe114⤵PID:3132
-
\??\c:\bhhnhb.exec:\bhhnhb.exe115⤵PID:812
-
\??\c:\7vjjj.exec:\7vjjj.exe116⤵PID:2096
-
\??\c:\vvjdp.exec:\vvjdp.exe117⤵PID:1432
-
\??\c:\fllfrxf.exec:\fllfrxf.exe118⤵PID:4068
-
\??\c:\frrxlff.exec:\frrxlff.exe119⤵PID:2060
-
\??\c:\tnnnnn.exec:\tnnnnn.exe120⤵
- System Location Discovery: System Language Discovery
PID:2092 -
\??\c:\djjdp.exec:\djjdp.exe121⤵PID:4384
-
\??\c:\dvpjp.exec:\dvpjp.exe122⤵PID:4232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-