Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 01:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
120 seconds
General
-
Target
3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe
-
Size
67KB
-
MD5
88d398d0c7df90c1424060aff2a85a80
-
SHA1
3d0cfccf309c4acf23e3f51825e590ab80cad6fc
-
SHA256
3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507f
-
SHA512
564e288f2e9ca9395d63c79becefa6e3e542174b8c5df07b22ccb76e7f2b1492857f8af0cdee4bc25e17fc1bbc23a2503ca121874646c92424c99b6879d22f44
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxe6:ymb3NkkiQ3mdBjF0y7kbU6
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/5004-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5004-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1404-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3724-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-37-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1208-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3988-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2440-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2444-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3540-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3804-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4992-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4684-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3412-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2964-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4336-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/588-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/316-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2896-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4192-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1404 fxfffff.exe 3616 ttbbhh.exe 3724 nnnnhh.exe 4688 vdppj.exe 1208 5xflffx.exe 1148 rfffxxx.exe 1924 jpjjd.exe 3988 7vvdv.exe 1464 9lfllll.exe 4560 xrxrflx.exe 2856 bbttnh.exe 2440 jjvdd.exe 2444 5xllflf.exe 3540 xxllrrl.exe 3804 bbbtbb.exe 4488 5jppp.exe 4992 3xrrllf.exe 4684 hhhhbb.exe 3412 hbnhhh.exe 4668 jppvp.exe 2964 rlffxxr.exe 4336 bhttnn.exe 588 btnhbb.exe 4352 3vddv.exe 316 lfxxrrl.exe 4740 htthhh.exe 4192 1tbbbb.exe 2896 vvddv.exe 1524 dpvjp.exe 3020 pvvdv.exe 4284 fxllrfr.exe 1904 5hnhhh.exe 1132 tntttt.exe 1004 nnnnhh.exe 3136 jvvpp.exe 1988 xflfxxx.exe 4484 lllllxr.exe 4068 1hnbnn.exe 3612 nnhhbb.exe 3332 ddvjj.exe 1908 rlrrlrx.exe 4548 bbttnn.exe 4424 nhnnhn.exe 4024 jjjjj.exe 4632 lflrlll.exe 3512 xllllrr.exe 4916 9hhhhh.exe 1632 3dpjp.exe 3724 1lxrxxl.exe 5012 tnttnh.exe 1876 3jdvv.exe 4420 rffrllr.exe 1844 jjpvd.exe 4736 jppjv.exe 692 3llrllf.exe 4884 tthhnb.exe 4572 ttttnn.exe 2044 5vddd.exe 4180 5pvpv.exe 3252 fxrrllf.exe 1196 9ntntb.exe 4076 pppjj.exe 4140 djvvj.exe 3848 xxfxxxx.exe -
resource yara_rule behavioral2/memory/5004-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1404-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3724-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3988-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1464-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1464-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3540-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3804-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4992-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4684-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3412-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2964-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4336-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/588-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/316-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2896-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4192-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7htnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llllxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lfllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xllflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 1404 5004 3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe 83 PID 5004 wrote to memory of 1404 5004 3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe 83 PID 5004 wrote to memory of 1404 5004 3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe 83 PID 1404 wrote to memory of 3616 1404 fxfffff.exe 84 PID 1404 wrote to memory of 3616 1404 fxfffff.exe 84 PID 1404 wrote to memory of 3616 1404 fxfffff.exe 84 PID 3616 wrote to memory of 3724 3616 ttbbhh.exe 85 PID 3616 wrote to memory of 3724 3616 ttbbhh.exe 85 PID 3616 wrote to memory of 3724 3616 ttbbhh.exe 85 PID 3724 wrote to memory of 4688 3724 nnnnhh.exe 86 PID 3724 wrote to memory of 4688 3724 nnnnhh.exe 86 PID 3724 wrote to memory of 4688 3724 nnnnhh.exe 86 PID 4688 wrote to memory of 1208 4688 vdppj.exe 87 PID 4688 wrote to memory of 1208 4688 vdppj.exe 87 PID 4688 wrote to memory of 1208 4688 vdppj.exe 87 PID 1208 wrote to memory of 1148 1208 5xflffx.exe 88 PID 1208 wrote to memory of 1148 1208 5xflffx.exe 88 PID 1208 wrote to memory of 1148 1208 5xflffx.exe 88 PID 1148 wrote to memory of 1924 1148 rfffxxx.exe 89 PID 1148 wrote to memory of 1924 1148 rfffxxx.exe 89 PID 1148 wrote to memory of 1924 1148 rfffxxx.exe 89 PID 1924 wrote to memory of 3988 1924 jpjjd.exe 90 PID 1924 wrote to memory of 3988 1924 jpjjd.exe 90 PID 1924 wrote to memory of 3988 1924 jpjjd.exe 90 PID 3988 wrote to memory of 1464 3988 7vvdv.exe 91 PID 3988 wrote to memory of 1464 3988 7vvdv.exe 91 PID 3988 wrote to memory of 1464 3988 7vvdv.exe 91 PID 1464 wrote to memory of 4560 1464 9lfllll.exe 92 PID 1464 wrote to memory of 4560 1464 9lfllll.exe 92 PID 1464 wrote to memory of 4560 1464 9lfllll.exe 92 PID 4560 wrote to memory of 2856 4560 xrxrflx.exe 93 PID 4560 wrote to memory of 2856 4560 xrxrflx.exe 93 PID 4560 wrote to memory of 2856 4560 xrxrflx.exe 93 PID 2856 wrote to memory of 2440 2856 bbttnh.exe 94 PID 2856 wrote to memory of 2440 2856 bbttnh.exe 94 PID 2856 wrote to memory of 2440 2856 bbttnh.exe 94 PID 2440 wrote to memory of 2444 2440 jjvdd.exe 95 PID 2440 wrote to memory of 2444 2440 jjvdd.exe 95 PID 2440 wrote to memory of 2444 2440 jjvdd.exe 95 PID 2444 wrote to memory of 3540 2444 5xllflf.exe 96 PID 2444 wrote to memory of 3540 2444 5xllflf.exe 96 PID 2444 wrote to memory of 3540 2444 5xllflf.exe 96 PID 3540 wrote to memory of 3804 3540 xxllrrl.exe 97 PID 3540 wrote to memory of 3804 3540 xxllrrl.exe 97 PID 3540 wrote to memory of 3804 3540 xxllrrl.exe 97 PID 3804 wrote to memory of 4488 3804 bbbtbb.exe 98 PID 3804 wrote to memory of 4488 3804 bbbtbb.exe 98 PID 3804 wrote to memory of 4488 3804 bbbtbb.exe 98 PID 4488 wrote to memory of 4992 4488 5jppp.exe 99 PID 4488 wrote to memory of 4992 4488 5jppp.exe 99 PID 4488 wrote to memory of 4992 4488 5jppp.exe 99 PID 4992 wrote to memory of 4684 4992 3xrrllf.exe 100 PID 4992 wrote to memory of 4684 4992 3xrrllf.exe 100 PID 4992 wrote to memory of 4684 4992 3xrrllf.exe 100 PID 4684 wrote to memory of 3412 4684 hhhhbb.exe 101 PID 4684 wrote to memory of 3412 4684 hhhhbb.exe 101 PID 4684 wrote to memory of 3412 4684 hhhhbb.exe 101 PID 3412 wrote to memory of 4668 3412 hbnhhh.exe 102 PID 3412 wrote to memory of 4668 3412 hbnhhh.exe 102 PID 3412 wrote to memory of 4668 3412 hbnhhh.exe 102 PID 4668 wrote to memory of 2964 4668 jppvp.exe 103 PID 4668 wrote to memory of 2964 4668 jppvp.exe 103 PID 4668 wrote to memory of 2964 4668 jppvp.exe 103 PID 2964 wrote to memory of 4336 2964 rlffxxr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe"C:\Users\Admin\AppData\Local\Temp\3c576ae8f7aafb248fd0a5f97173ea720be862b407981ddd076255a28508507fN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
\??\c:\fxfffff.exec:\fxfffff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\ttbbhh.exec:\ttbbhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\nnnnhh.exec:\nnnnhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\vdppj.exec:\vdppj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\5xflffx.exec:\5xflffx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\rfffxxx.exec:\rfffxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\jpjjd.exec:\jpjjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\7vvdv.exec:\7vvdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\9lfllll.exec:\9lfllll.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\xrxrflx.exec:\xrxrflx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\bbttnh.exec:\bbttnh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\jjvdd.exec:\jjvdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\5xllflf.exec:\5xllflf.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\xxllrrl.exec:\xxllrrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
\??\c:\bbbtbb.exec:\bbbtbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
\??\c:\5jppp.exec:\5jppp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\3xrrllf.exec:\3xrrllf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
\??\c:\hhhhbb.exec:\hhhhbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
\??\c:\hbnhhh.exec:\hbnhhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
\??\c:\jppvp.exec:\jppvp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\rlffxxr.exec:\rlffxxr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\bhttnn.exec:\bhttnn.exe23⤵
- Executes dropped EXE
PID:4336 -
\??\c:\btnhbb.exec:\btnhbb.exe24⤵
- Executes dropped EXE
PID:588 -
\??\c:\3vddv.exec:\3vddv.exe25⤵
- Executes dropped EXE
PID:4352 -
\??\c:\lfxxrrl.exec:\lfxxrrl.exe26⤵
- Executes dropped EXE
PID:316 -
\??\c:\htthhh.exec:\htthhh.exe27⤵
- Executes dropped EXE
PID:4740 -
\??\c:\1tbbbb.exec:\1tbbbb.exe28⤵
- Executes dropped EXE
PID:4192 -
\??\c:\vvddv.exec:\vvddv.exe29⤵
- Executes dropped EXE
PID:2896 -
\??\c:\dpvjp.exec:\dpvjp.exe30⤵
- Executes dropped EXE
PID:1524 -
\??\c:\pvvdv.exec:\pvvdv.exe31⤵
- Executes dropped EXE
PID:3020 -
\??\c:\fxllrfr.exec:\fxllrfr.exe32⤵
- Executes dropped EXE
PID:4284 -
\??\c:\5hnhhh.exec:\5hnhhh.exe33⤵
- Executes dropped EXE
PID:1904 -
\??\c:\tntttt.exec:\tntttt.exe34⤵
- Executes dropped EXE
PID:1132 -
\??\c:\nnnnhh.exec:\nnnnhh.exe35⤵
- Executes dropped EXE
PID:1004 -
\??\c:\jvvpp.exec:\jvvpp.exe36⤵
- Executes dropped EXE
PID:3136 -
\??\c:\xflfxxx.exec:\xflfxxx.exe37⤵
- Executes dropped EXE
PID:1988 -
\??\c:\lllllxr.exec:\lllllxr.exe38⤵
- Executes dropped EXE
PID:4484 -
\??\c:\1hnbnn.exec:\1hnbnn.exe39⤵
- Executes dropped EXE
PID:4068 -
\??\c:\nnhhbb.exec:\nnhhbb.exe40⤵
- Executes dropped EXE
PID:3612 -
\??\c:\ddvjj.exec:\ddvjj.exe41⤵
- Executes dropped EXE
PID:3332 -
\??\c:\rlrrlrx.exec:\rlrrlrx.exe42⤵
- Executes dropped EXE
PID:1908 -
\??\c:\bbttnn.exec:\bbttnn.exe43⤵
- Executes dropped EXE
PID:4548 -
\??\c:\nhnnhn.exec:\nhnnhn.exe44⤵
- Executes dropped EXE
PID:4424 -
\??\c:\jjjjj.exec:\jjjjj.exe45⤵
- Executes dropped EXE
PID:4024 -
\??\c:\lflrlll.exec:\lflrlll.exe46⤵
- Executes dropped EXE
PID:4632 -
\??\c:\xllllrr.exec:\xllllrr.exe47⤵
- Executes dropped EXE
PID:3512 -
\??\c:\9hhhhh.exec:\9hhhhh.exe48⤵
- Executes dropped EXE
PID:4916 -
\??\c:\3dpjp.exec:\3dpjp.exe49⤵
- Executes dropped EXE
PID:1632 -
\??\c:\1lxrxxl.exec:\1lxrxxl.exe50⤵
- Executes dropped EXE
PID:3724 -
\??\c:\tnttnh.exec:\tnttnh.exe51⤵
- Executes dropped EXE
PID:5012 -
\??\c:\3jdvv.exec:\3jdvv.exe52⤵
- Executes dropped EXE
PID:1876 -
\??\c:\rffrllr.exec:\rffrllr.exe53⤵
- Executes dropped EXE
PID:4420 -
\??\c:\jjpvd.exec:\jjpvd.exe54⤵
- Executes dropped EXE
PID:1844 -
\??\c:\jppjv.exec:\jppjv.exe55⤵
- Executes dropped EXE
PID:4736 -
\??\c:\3llrllf.exec:\3llrllf.exe56⤵
- Executes dropped EXE
PID:692 -
\??\c:\tthhnb.exec:\tthhnb.exe57⤵
- Executes dropped EXE
PID:4884 -
\??\c:\ttttnn.exec:\ttttnn.exe58⤵
- Executes dropped EXE
PID:4572 -
\??\c:\5vddd.exec:\5vddd.exe59⤵
- Executes dropped EXE
PID:2044 -
\??\c:\5pvpv.exec:\5pvpv.exe60⤵
- Executes dropped EXE
PID:4180 -
\??\c:\fxrrllf.exec:\fxrrllf.exe61⤵
- Executes dropped EXE
PID:3252 -
\??\c:\9ntntb.exec:\9ntntb.exe62⤵
- Executes dropped EXE
PID:1196 -
\??\c:\pppjj.exec:\pppjj.exe63⤵
- Executes dropped EXE
PID:4076 -
\??\c:\djvvj.exec:\djvvj.exe64⤵
- Executes dropped EXE
PID:4140 -
\??\c:\xxfxxxx.exec:\xxfxxxx.exe65⤵
- Executes dropped EXE
PID:3848 -
\??\c:\rrffffl.exec:\rrffffl.exe66⤵PID:2928
-
\??\c:\hbthbb.exec:\hbthbb.exe67⤵PID:3516
-
\??\c:\3jjjd.exec:\3jjjd.exe68⤵PID:3568
-
\??\c:\xxxxrrl.exec:\xxxxrrl.exe69⤵PID:2052
-
\??\c:\htbbtt.exec:\htbbtt.exe70⤵PID:1872
-
\??\c:\nbhthn.exec:\nbhthn.exe71⤵PID:4748
-
\??\c:\rxflfrr.exec:\rxflfrr.exe72⤵PID:4564
-
\??\c:\nnntnt.exec:\nnntnt.exe73⤵PID:2448
-
\??\c:\jjvvj.exec:\jjvvj.exe74⤵PID:2072
-
\??\c:\vvppv.exec:\vvppv.exe75⤵PID:3328
-
\??\c:\frfxrrl.exec:\frfxrrl.exe76⤵PID:4652
-
\??\c:\rrllffx.exec:\rrllffx.exe77⤵PID:2960
-
\??\c:\thnhbb.exec:\thnhbb.exe78⤵PID:4084
-
\??\c:\vvpjj.exec:\vvpjj.exe79⤵PID:4524
-
\??\c:\lxllffx.exec:\lxllffx.exe80⤵PID:1424
-
\??\c:\hnttbb.exec:\hnttbb.exe81⤵PID:2672
-
\??\c:\djddd.exec:\djddd.exe82⤵
- System Location Discovery: System Language Discovery
PID:4720 -
\??\c:\vddvv.exec:\vddvv.exe83⤵PID:4824
-
\??\c:\fxrlllf.exec:\fxrlllf.exe84⤵PID:4124
-
\??\c:\hbtnhh.exec:\hbtnhh.exe85⤵PID:1524
-
\??\c:\bbtttn.exec:\bbtttn.exe86⤵PID:4348
-
\??\c:\dvvvv.exec:\dvvvv.exe87⤵
- System Location Discovery: System Language Discovery
PID:2828 -
\??\c:\ddddd.exec:\ddddd.exe88⤵PID:4956
-
\??\c:\fxrrrrl.exec:\fxrrrrl.exe89⤵PID:3440
-
\??\c:\nhbnbh.exec:\nhbnbh.exe90⤵PID:3936
-
\??\c:\btthbb.exec:\btthbb.exe91⤵PID:3820
-
\??\c:\7pppj.exec:\7pppj.exe92⤵PID:3712
-
\??\c:\rlfxllf.exec:\rlfxllf.exe93⤵PID:4452
-
\??\c:\rxfflrl.exec:\rxfflrl.exe94⤵PID:2912
-
\??\c:\tbhhbt.exec:\tbhhbt.exe95⤵PID:3964
-
\??\c:\7bbbtt.exec:\7bbbtt.exe96⤵PID:668
-
\??\c:\jvvpj.exec:\jvvpj.exe97⤵PID:1728
-
\??\c:\1jppj.exec:\1jppj.exe98⤵PID:4408
-
\??\c:\3lrllrr.exec:\3lrllrr.exe99⤵PID:4456
-
\??\c:\hnnbbb.exec:\hnnbbb.exe100⤵PID:1892
-
\??\c:\ttnnhh.exec:\ttnnhh.exe101⤵PID:4024
-
\??\c:\3vddv.exec:\3vddv.exe102⤵PID:4632
-
\??\c:\1vpdv.exec:\1vpdv.exe103⤵PID:3512
-
\??\c:\xlllflf.exec:\xlllflf.exe104⤵PID:2240
-
\??\c:\nnttbb.exec:\nnttbb.exe105⤵PID:2784
-
\??\c:\3tbbbb.exec:\3tbbbb.exe106⤵PID:4360
-
\??\c:\jpjdv.exec:\jpjdv.exe107⤵PID:760
-
\??\c:\1djdv.exec:\1djdv.exe108⤵PID:2116
-
\??\c:\3lfxrrl.exec:\3lfxrrl.exe109⤵PID:3748
-
\??\c:\nthbbt.exec:\nthbbt.exe110⤵PID:2308
-
\??\c:\bhbbbb.exec:\bhbbbb.exe111⤵
- System Location Discovery: System Language Discovery
PID:5052 -
\??\c:\pdvpd.exec:\pdvpd.exe112⤵PID:3048
-
\??\c:\flxlxxr.exec:\flxlxxr.exe113⤵PID:4432
-
\??\c:\xrlxlrf.exec:\xrlxlrf.exe114⤵PID:4644
-
\??\c:\hhhbbn.exec:\hhhbbn.exe115⤵
- System Location Discovery: System Language Discovery
PID:4728 -
\??\c:\ddjdv.exec:\ddjdv.exe116⤵PID:716
-
\??\c:\jvjjj.exec:\jvjjj.exe117⤵PID:4188
-
\??\c:\rlxlxrl.exec:\rlxlxrl.exe118⤵PID:2856
-
\??\c:\7xrrllf.exec:\7xrrllf.exe119⤵PID:3400
-
\??\c:\bntnhn.exec:\bntnhn.exe120⤵PID:4344
-
\??\c:\7nhhbh.exec:\7nhhbh.exe121⤵PID:1272
-
\??\c:\ddvvp.exec:\ddvvp.exe122⤵PID:1716
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-