Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe
Resource
win7-20240903-en
General
-
Target
674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe
-
Size
96KB
-
MD5
794b87e935c8f13cb7bda43dce397910
-
SHA1
20dfeeba86c5fb509aabd618ab9e7d78e6649076
-
SHA256
674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3e
-
SHA512
0a3da19732367086c6d7d61d6eecd92662dc1ba8d57e68d1c6a233c607d24a9c6ed3d267fa3e9838b0bc2585193ce47c5a8824cae7911ea2816580375ec5d1d7
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo7xCkTsIRwnohZkqR4Ra13vYlXO:ymb3NkkiQ3mdBjFo7LAIRUohDmRIL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4396-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4396-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2064-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1876-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1516-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3676-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4184-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3280-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2468-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4408-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3600-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2408-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3584-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3260-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5104-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1680-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1724-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1408-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1876 rrxrfff.exe 1684 bbnnnn.exe 2064 tnnhbb.exe 1516 jdjjv.exe 3676 llllffx.exe 4184 fxxfxxr.exe 3280 thbbnb.exe 2468 btbtbb.exe 4176 3djdp.exe 4408 1fxrfff.exe 3600 nnhnnb.exe 2408 pjjdp.exe 4412 ffrlllr.exe 4160 bbnntn.exe 3584 nhnhtt.exe 3260 7jjvd.exe 4628 fffxxxx.exe 4940 rxxxxrr.exe 5104 ppvvv.exe 1680 ddpjv.exe 4140 hbhbtb.exe 4560 ddvdv.exe 1248 frrlffx.exe 2504 tntnhh.exe 1724 9ntnhh.exe 1408 jdddv.exe 5040 vpppj.exe 5016 xrrlxxx.exe 1772 7thhnn.exe 216 bthbtb.exe 884 vpjdv.exe 4116 ddjjd.exe 1696 3lfxxxr.exe 872 hnbtnn.exe 4652 jpdvp.exe 1020 pjppd.exe 4752 fxrlxxx.exe 3328 rfffxxx.exe 612 tntnht.exe 5116 pdjdd.exe 4992 7jdvp.exe 4080 xrlffxl.exe 3744 5rrlrrr.exe 4512 1vvvv.exe 4936 1jjjv.exe 4796 5rlffll.exe 2532 9nhnnt.exe 4396 htnhbb.exe 4272 vppjj.exe 3992 llrrfff.exe 4316 btbbtt.exe 4024 bthbnb.exe 4844 pdjdv.exe 3568 xflxfff.exe 4760 flxxrrx.exe 3676 thtbht.exe 4168 vjdjj.exe 4268 rflfrrr.exe 3392 rlxrxxf.exe 752 7hbtbb.exe 1768 vpppj.exe 4408 jvppv.exe 1728 xxrllfx.exe 2876 ttnhnh.exe -
resource yara_rule behavioral2/memory/4396-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4396-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2064-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3676-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4184-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3280-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2468-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4408-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3600-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2408-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3584-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3260-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5104-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1680-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4140-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1724-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1408-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 1876 4396 674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe 83 PID 4396 wrote to memory of 1876 4396 674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe 83 PID 4396 wrote to memory of 1876 4396 674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe 83 PID 1876 wrote to memory of 1684 1876 rrxrfff.exe 84 PID 1876 wrote to memory of 1684 1876 rrxrfff.exe 84 PID 1876 wrote to memory of 1684 1876 rrxrfff.exe 84 PID 1684 wrote to memory of 2064 1684 bbnnnn.exe 85 PID 1684 wrote to memory of 2064 1684 bbnnnn.exe 85 PID 1684 wrote to memory of 2064 1684 bbnnnn.exe 85 PID 2064 wrote to memory of 1516 2064 tnnhbb.exe 86 PID 2064 wrote to memory of 1516 2064 tnnhbb.exe 86 PID 2064 wrote to memory of 1516 2064 tnnhbb.exe 86 PID 1516 wrote to memory of 3676 1516 jdjjv.exe 87 PID 1516 wrote to memory of 3676 1516 jdjjv.exe 87 PID 1516 wrote to memory of 3676 1516 jdjjv.exe 87 PID 3676 wrote to memory of 4184 3676 llllffx.exe 88 PID 3676 wrote to memory of 4184 3676 llllffx.exe 88 PID 3676 wrote to memory of 4184 3676 llllffx.exe 88 PID 4184 wrote to memory of 3280 4184 fxxfxxr.exe 89 PID 4184 wrote to memory of 3280 4184 fxxfxxr.exe 89 PID 4184 wrote to memory of 3280 4184 fxxfxxr.exe 89 PID 3280 wrote to memory of 2468 3280 thbbnb.exe 90 PID 3280 wrote to memory of 2468 3280 thbbnb.exe 90 PID 3280 wrote to memory of 2468 3280 thbbnb.exe 90 PID 2468 wrote to memory of 4176 2468 btbtbb.exe 91 PID 2468 wrote to memory of 4176 2468 btbtbb.exe 91 PID 2468 wrote to memory of 4176 2468 btbtbb.exe 91 PID 4176 wrote to memory of 4408 4176 3djdp.exe 92 PID 4176 wrote to memory of 4408 4176 3djdp.exe 92 PID 4176 wrote to memory of 4408 4176 3djdp.exe 92 PID 4408 wrote to memory of 3600 4408 1fxrfff.exe 93 PID 4408 wrote to memory of 3600 4408 1fxrfff.exe 93 PID 4408 wrote to memory of 3600 4408 1fxrfff.exe 93 PID 3600 wrote to memory of 2408 3600 nnhnnb.exe 94 PID 3600 wrote to memory of 2408 3600 nnhnnb.exe 94 PID 3600 wrote to memory of 2408 3600 nnhnnb.exe 94 PID 2408 wrote to memory of 4412 2408 pjjdp.exe 95 PID 2408 wrote to memory of 4412 2408 pjjdp.exe 95 PID 2408 wrote to memory of 4412 2408 pjjdp.exe 95 PID 4412 wrote to memory of 4160 4412 ffrlllr.exe 96 PID 4412 wrote to memory of 4160 4412 ffrlllr.exe 96 PID 4412 wrote to memory of 4160 4412 ffrlllr.exe 96 PID 4160 wrote to memory of 3584 4160 bbnntn.exe 97 PID 4160 wrote to memory of 3584 4160 bbnntn.exe 97 PID 4160 wrote to memory of 3584 4160 bbnntn.exe 97 PID 3584 wrote to memory of 3260 3584 nhnhtt.exe 98 PID 3584 wrote to memory of 3260 3584 nhnhtt.exe 98 PID 3584 wrote to memory of 3260 3584 nhnhtt.exe 98 PID 3260 wrote to memory of 4628 3260 7jjvd.exe 99 PID 3260 wrote to memory of 4628 3260 7jjvd.exe 99 PID 3260 wrote to memory of 4628 3260 7jjvd.exe 99 PID 4628 wrote to memory of 4940 4628 fffxxxx.exe 100 PID 4628 wrote to memory of 4940 4628 fffxxxx.exe 100 PID 4628 wrote to memory of 4940 4628 fffxxxx.exe 100 PID 4940 wrote to memory of 5104 4940 rxxxxrr.exe 101 PID 4940 wrote to memory of 5104 4940 rxxxxrr.exe 101 PID 4940 wrote to memory of 5104 4940 rxxxxrr.exe 101 PID 5104 wrote to memory of 1680 5104 ppvvv.exe 102 PID 5104 wrote to memory of 1680 5104 ppvvv.exe 102 PID 5104 wrote to memory of 1680 5104 ppvvv.exe 102 PID 1680 wrote to memory of 4140 1680 ddpjv.exe 103 PID 1680 wrote to memory of 4140 1680 ddpjv.exe 103 PID 1680 wrote to memory of 4140 1680 ddpjv.exe 103 PID 4140 wrote to memory of 4560 4140 hbhbtb.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe"C:\Users\Admin\AppData\Local\Temp\674b532a02107996c7bf4c765597d6a7105d99203411026e2f55bfa918c48f3eN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\rrxrfff.exec:\rrxrfff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\bbnnnn.exec:\bbnnnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\tnnhbb.exec:\tnnhbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\jdjjv.exec:\jdjjv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\llllffx.exec:\llllffx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\fxxfxxr.exec:\fxxfxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
\??\c:\thbbnb.exec:\thbbnb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\btbtbb.exec:\btbtbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\3djdp.exec:\3djdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\1fxrfff.exec:\1fxrfff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\nnhnnb.exec:\nnhnnb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
\??\c:\pjjdp.exec:\pjjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\ffrlllr.exec:\ffrlllr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\bbnntn.exec:\bbnntn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\nhnhtt.exec:\nhnhtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
\??\c:\7jjvd.exec:\7jjvd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
\??\c:\fffxxxx.exec:\fffxxxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\rxxxxrr.exec:\rxxxxrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\ppvvv.exec:\ppvvv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\ddpjv.exec:\ddpjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\hbhbtb.exec:\hbhbtb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
\??\c:\ddvdv.exec:\ddvdv.exe23⤵
- Executes dropped EXE
PID:4560 -
\??\c:\frrlffx.exec:\frrlffx.exe24⤵
- Executes dropped EXE
PID:1248 -
\??\c:\tntnhh.exec:\tntnhh.exe25⤵
- Executes dropped EXE
PID:2504 -
\??\c:\9ntnhh.exec:\9ntnhh.exe26⤵
- Executes dropped EXE
PID:1724 -
\??\c:\jdddv.exec:\jdddv.exe27⤵
- Executes dropped EXE
PID:1408 -
\??\c:\vpppj.exec:\vpppj.exe28⤵
- Executes dropped EXE
PID:5040 -
\??\c:\xrrlxxx.exec:\xrrlxxx.exe29⤵
- Executes dropped EXE
PID:5016 -
\??\c:\7thhnn.exec:\7thhnn.exe30⤵
- Executes dropped EXE
PID:1772 -
\??\c:\bthbtb.exec:\bthbtb.exe31⤵
- Executes dropped EXE
PID:216 -
\??\c:\vpjdv.exec:\vpjdv.exe32⤵
- Executes dropped EXE
PID:884 -
\??\c:\ddjjd.exec:\ddjjd.exe33⤵
- Executes dropped EXE
PID:4116 -
\??\c:\3lfxxxr.exec:\3lfxxxr.exe34⤵
- Executes dropped EXE
PID:1696 -
\??\c:\hnbtnn.exec:\hnbtnn.exe35⤵
- Executes dropped EXE
PID:872 -
\??\c:\jpdvp.exec:\jpdvp.exe36⤵
- Executes dropped EXE
PID:4652 -
\??\c:\pjppd.exec:\pjppd.exe37⤵
- Executes dropped EXE
PID:1020 -
\??\c:\fxrlxxx.exec:\fxrlxxx.exe38⤵
- Executes dropped EXE
PID:4752 -
\??\c:\rfffxxx.exec:\rfffxxx.exe39⤵
- Executes dropped EXE
PID:3328 -
\??\c:\tntnht.exec:\tntnht.exe40⤵
- Executes dropped EXE
PID:612 -
\??\c:\pdjdd.exec:\pdjdd.exe41⤵
- Executes dropped EXE
PID:5116 -
\??\c:\7jdvp.exec:\7jdvp.exe42⤵
- Executes dropped EXE
PID:4992 -
\??\c:\xrlffxl.exec:\xrlffxl.exe43⤵
- Executes dropped EXE
PID:4080 -
\??\c:\5rrlrrr.exec:\5rrlrrr.exe44⤵
- Executes dropped EXE
PID:3744 -
\??\c:\1vvvv.exec:\1vvvv.exe45⤵
- Executes dropped EXE
PID:4512 -
\??\c:\1jjjv.exec:\1jjjv.exe46⤵
- Executes dropped EXE
PID:4936 -
\??\c:\5rlffll.exec:\5rlffll.exe47⤵
- Executes dropped EXE
PID:4796 -
\??\c:\9nhnnt.exec:\9nhnnt.exe48⤵
- Executes dropped EXE
PID:2532 -
\??\c:\htnhbb.exec:\htnhbb.exe49⤵
- Executes dropped EXE
PID:4396 -
\??\c:\vppjj.exec:\vppjj.exe50⤵
- Executes dropped EXE
PID:4272 -
\??\c:\llrrfff.exec:\llrrfff.exe51⤵
- Executes dropped EXE
PID:3992 -
\??\c:\btbbtt.exec:\btbbtt.exe52⤵
- Executes dropped EXE
PID:4316 -
\??\c:\bthbnb.exec:\bthbnb.exe53⤵
- Executes dropped EXE
PID:4024 -
\??\c:\pdjdv.exec:\pdjdv.exe54⤵
- Executes dropped EXE
PID:4844 -
\??\c:\xflxfff.exec:\xflxfff.exe55⤵
- Executes dropped EXE
PID:3568 -
\??\c:\flxxrrx.exec:\flxxrrx.exe56⤵
- Executes dropped EXE
PID:4760 -
\??\c:\thtbht.exec:\thtbht.exe57⤵
- Executes dropped EXE
PID:3676 -
\??\c:\vjdjj.exec:\vjdjj.exe58⤵
- Executes dropped EXE
PID:4168 -
\??\c:\rflfrrr.exec:\rflfrrr.exe59⤵
- Executes dropped EXE
PID:4268 -
\??\c:\rlxrxxf.exec:\rlxrxxf.exe60⤵
- Executes dropped EXE
PID:3392 -
\??\c:\7hbtbb.exec:\7hbtbb.exe61⤵
- Executes dropped EXE
PID:752 -
\??\c:\vpppj.exec:\vpppj.exe62⤵
- Executes dropped EXE
PID:1768 -
\??\c:\jvppv.exec:\jvppv.exe63⤵
- Executes dropped EXE
PID:4408 -
\??\c:\xxrllfx.exec:\xxrllfx.exe64⤵
- Executes dropped EXE
PID:1728 -
\??\c:\ttnhnh.exec:\ttnhnh.exe65⤵
- Executes dropped EXE
PID:2876 -
\??\c:\3tnhbt.exec:\3tnhbt.exe66⤵PID:1032
-
\??\c:\vpppp.exec:\vpppp.exe67⤵PID:1480
-
\??\c:\5jjpd.exec:\5jjpd.exe68⤵PID:4160
-
\??\c:\fffrflf.exec:\fffrflf.exe69⤵PID:4828
-
\??\c:\hbtnnn.exec:\hbtnnn.exe70⤵PID:1812
-
\??\c:\thhbtt.exec:\thhbtt.exe71⤵PID:2572
-
\??\c:\jddpd.exec:\jddpd.exe72⤵PID:4644
-
\??\c:\rrrrlll.exec:\rrrrlll.exe73⤵PID:224
-
\??\c:\9frlfff.exec:\9frlfff.exe74⤵PID:4940
-
\??\c:\fxxlfff.exec:\fxxlfff.exe75⤵PID:4928
-
\??\c:\bhhhbh.exec:\bhhhbh.exe76⤵PID:1632
-
\??\c:\tntnnh.exec:\tntnnh.exe77⤵PID:1448
-
\??\c:\bbttnn.exec:\bbttnn.exe78⤵PID:1364
-
\??\c:\1vvdj.exec:\1vvdj.exe79⤵PID:1540
-
\??\c:\flrrlrl.exec:\flrrlrl.exe80⤵PID:2972
-
\??\c:\1frrxxx.exec:\1frrxxx.exe81⤵PID:464
-
\??\c:\btttnn.exec:\btttnn.exe82⤵PID:1312
-
\??\c:\7tbttt.exec:\7tbttt.exe83⤵PID:2216
-
\??\c:\vjjjv.exec:\vjjjv.exe84⤵PID:4660
-
\??\c:\ddpvp.exec:\ddpvp.exe85⤵PID:5040
-
\??\c:\3xlxrrr.exec:\3xlxrrr.exe86⤵PID:3776
-
\??\c:\xfrrllf.exec:\xfrrllf.exe87⤵PID:5048
-
\??\c:\1hnnnn.exec:\1hnnnn.exe88⤵PID:2192
-
\??\c:\bbhhhh.exec:\bbhhhh.exe89⤵PID:4048
-
\??\c:\ppvvv.exec:\ppvvv.exe90⤵PID:4324
-
\??\c:\5vvpp.exec:\5vvpp.exe91⤵PID:4416
-
\??\c:\llfffll.exec:\llfffll.exe92⤵PID:3732
-
\??\c:\xxxxllx.exec:\xxxxllx.exe93⤵PID:3736
-
\??\c:\nnnhbt.exec:\nnnhbt.exe94⤵PID:1100
-
\??\c:\vppdv.exec:\vppdv.exe95⤵PID:4652
-
\??\c:\vpvvj.exec:\vpvvj.exe96⤵PID:2220
-
\??\c:\vpjdv.exec:\vpjdv.exe97⤵PID:4932
-
\??\c:\xxllfrx.exec:\xxllfrx.exe98⤵PID:1744
-
\??\c:\nnthhb.exec:\nnthhb.exe99⤵PID:612
-
\??\c:\hnbtnt.exec:\hnbtnt.exe100⤵PID:212
-
\??\c:\1jppd.exec:\1jppd.exe101⤵PID:3720
-
\??\c:\rffffff.exec:\rffffff.exe102⤵PID:4864
-
\??\c:\5flfxxr.exec:\5flfxxr.exe103⤵PID:4524
-
\??\c:\tnnthn.exec:\tnnthn.exe104⤵PID:4376
-
\??\c:\7vvvp.exec:\7vvvp.exe105⤵PID:3256
-
\??\c:\7vpjv.exec:\7vpjv.exe106⤵PID:2532
-
\??\c:\1xxrlrl.exec:\1xxrlrl.exe107⤵PID:2924
-
\??\c:\3hbbbb.exec:\3hbbbb.exe108⤵PID:1416
-
\??\c:\tbbtnh.exec:\tbbtnh.exe109⤵PID:3928
-
\??\c:\tbtnhb.exec:\tbtnhb.exe110⤵PID:4476
-
\??\c:\pdvvp.exec:\pdvvp.exe111⤵PID:1084
-
\??\c:\7pppd.exec:\7pppd.exe112⤵PID:4844
-
\??\c:\fflfrrx.exec:\fflfrrx.exe113⤵PID:3568
-
\??\c:\hnhbtn.exec:\hnhbtn.exe114⤵PID:3492
-
\??\c:\tttttt.exec:\tttttt.exe115⤵PID:4448
-
\??\c:\5jddp.exec:\5jddp.exe116⤵PID:4168
-
\??\c:\dvvpj.exec:\dvvpj.exe117⤵PID:4268
-
\??\c:\7rxrlff.exec:\7rxrlff.exe118⤵PID:4092
-
\??\c:\nhnnnh.exec:\nhnnnh.exe119⤵PID:1656
-
\??\c:\nbbtht.exec:\nbbtht.exe120⤵PID:3052
-
\??\c:\djjvp.exec:\djjvp.exe121⤵PID:4900
-
\??\c:\ddpjj.exec:\ddpjj.exe122⤵PID:3876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-