Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 03:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
120 seconds
General
-
Target
680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe
-
Size
71KB
-
MD5
d41597c58fc3f2dd0ba1d6db23c596b6
-
SHA1
cde607e425abe274e1ba8e8c43bf33d21ed738fb
-
SHA256
680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10
-
SHA512
d9f9765b9cb68e8ad5ca87cad8147c8f38da1139d61d2113f6b0a31c85dfd520b23424838d61cf7f3631be03e0939459d65d968fbd8935e21cb42571bc5bd9b4
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+LuvdLH+/:ymb3NkkiQ3mdBjF0yMliC/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4504-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1792-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1644-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3876-30-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/336-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/336-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2364-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3924-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4360-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2996-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1004-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4756-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3688-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3548-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/220-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2868-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2972-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4684-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1328-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/400-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3776-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2364 xflffxx.exe 336 xffrrff.exe 3876 tnnnhh.exe 1644 hbbttt.exe 1792 htbthh.exe 3924 jvpjv.exe 4360 fffxlfx.exe 4280 rrxxffl.exe 2996 btnnhh.exe 1004 dvjdd.exe 3936 ddjdv.exe 4756 rflffxx.exe 3688 fxfxrrl.exe 2884 hhhhnn.exe 3548 pjjdv.exe 220 vjjjd.exe 712 rlllfxx.exe 3720 tnbbtt.exe 2868 5vvjd.exe 3772 1ffxxlf.exe 4872 nhnhnn.exe 2972 vjpdv.exe 2788 vjjpp.exe 4684 lxfrllf.exe 2208 bbhhnn.exe 4616 dvvjd.exe 724 lflfrrf.exe 1328 thnhbb.exe 400 dvvvp.exe 3776 rflfrlx.exe 5108 bnbttt.exe 3572 httnhb.exe 708 pddvp.exe 1012 xlfffxf.exe 3992 lrxrllf.exe 4132 hbbbbt.exe 1232 tntthn.exe 2004 pvvvp.exe 1420 dvvpd.exe 4508 xrrlfxx.exe 4692 rlrlffx.exe 2864 5nnhhb.exe 2876 hbbhhn.exe 1064 jddvv.exe 4884 pvvjd.exe 5072 xfllxxx.exe 2176 htnbnh.exe 3868 nbbnbb.exe 2092 jjjjd.exe 4504 lxrlrxl.exe 5024 rrrrlll.exe 2364 ttnnhh.exe 2604 btnhbt.exe 1456 jjjdp.exe 5004 3jdvp.exe 2412 xrrrllf.exe 2708 1bbbtt.exe 1152 bnbthb.exe 2580 vjdvj.exe 4824 dpjjv.exe 4576 rflxfxf.exe 2760 lflxlxl.exe 4856 hntbhh.exe 1320 htnhbt.exe -
resource yara_rule behavioral2/memory/4504-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3924-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3924-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1792-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1644-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3876-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3924-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2996-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1004-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4756-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3548-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/220-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2868-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2972-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4684-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1328-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/400-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3776-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rfxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xrlrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffffxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlxfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9llxlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fxlfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9llfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 2364 4504 680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe 82 PID 4504 wrote to memory of 2364 4504 680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe 82 PID 4504 wrote to memory of 2364 4504 680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe 82 PID 2364 wrote to memory of 336 2364 xflffxx.exe 83 PID 2364 wrote to memory of 336 2364 xflffxx.exe 83 PID 2364 wrote to memory of 336 2364 xflffxx.exe 83 PID 336 wrote to memory of 3876 336 xffrrff.exe 84 PID 336 wrote to memory of 3876 336 xffrrff.exe 84 PID 336 wrote to memory of 3876 336 xffrrff.exe 84 PID 3876 wrote to memory of 1644 3876 tnnnhh.exe 85 PID 3876 wrote to memory of 1644 3876 tnnnhh.exe 85 PID 3876 wrote to memory of 1644 3876 tnnnhh.exe 85 PID 1644 wrote to memory of 1792 1644 hbbttt.exe 86 PID 1644 wrote to memory of 1792 1644 hbbttt.exe 86 PID 1644 wrote to memory of 1792 1644 hbbttt.exe 86 PID 1792 wrote to memory of 3924 1792 htbthh.exe 87 PID 1792 wrote to memory of 3924 1792 htbthh.exe 87 PID 1792 wrote to memory of 3924 1792 htbthh.exe 87 PID 3924 wrote to memory of 4360 3924 jvpjv.exe 88 PID 3924 wrote to memory of 4360 3924 jvpjv.exe 88 PID 3924 wrote to memory of 4360 3924 jvpjv.exe 88 PID 4360 wrote to memory of 4280 4360 fffxlfx.exe 89 PID 4360 wrote to memory of 4280 4360 fffxlfx.exe 89 PID 4360 wrote to memory of 4280 4360 fffxlfx.exe 89 PID 4280 wrote to memory of 2996 4280 rrxxffl.exe 90 PID 4280 wrote to memory of 2996 4280 rrxxffl.exe 90 PID 4280 wrote to memory of 2996 4280 rrxxffl.exe 90 PID 2996 wrote to memory of 1004 2996 btnnhh.exe 91 PID 2996 wrote to memory of 1004 2996 btnnhh.exe 91 PID 2996 wrote to memory of 1004 2996 btnnhh.exe 91 PID 1004 wrote to memory of 3936 1004 dvjdd.exe 92 PID 1004 wrote to memory of 3936 1004 dvjdd.exe 92 PID 1004 wrote to memory of 3936 1004 dvjdd.exe 92 PID 3936 wrote to memory of 4756 3936 ddjdv.exe 93 PID 3936 wrote to memory of 4756 3936 ddjdv.exe 93 PID 3936 wrote to memory of 4756 3936 ddjdv.exe 93 PID 4756 wrote to memory of 3688 4756 rflffxx.exe 94 PID 4756 wrote to memory of 3688 4756 rflffxx.exe 94 PID 4756 wrote to memory of 3688 4756 rflffxx.exe 94 PID 3688 wrote to memory of 2884 3688 fxfxrrl.exe 95 PID 3688 wrote to memory of 2884 3688 fxfxrrl.exe 95 PID 3688 wrote to memory of 2884 3688 fxfxrrl.exe 95 PID 2884 wrote to memory of 3548 2884 hhhhnn.exe 96 PID 2884 wrote to memory of 3548 2884 hhhhnn.exe 96 PID 2884 wrote to memory of 3548 2884 hhhhnn.exe 96 PID 3548 wrote to memory of 220 3548 pjjdv.exe 97 PID 3548 wrote to memory of 220 3548 pjjdv.exe 97 PID 3548 wrote to memory of 220 3548 pjjdv.exe 97 PID 220 wrote to memory of 712 220 vjjjd.exe 98 PID 220 wrote to memory of 712 220 vjjjd.exe 98 PID 220 wrote to memory of 712 220 vjjjd.exe 98 PID 712 wrote to memory of 3720 712 rlllfxx.exe 99 PID 712 wrote to memory of 3720 712 rlllfxx.exe 99 PID 712 wrote to memory of 3720 712 rlllfxx.exe 99 PID 3720 wrote to memory of 2868 3720 tnbbtt.exe 100 PID 3720 wrote to memory of 2868 3720 tnbbtt.exe 100 PID 3720 wrote to memory of 2868 3720 tnbbtt.exe 100 PID 2868 wrote to memory of 3772 2868 5vvjd.exe 101 PID 2868 wrote to memory of 3772 2868 5vvjd.exe 101 PID 2868 wrote to memory of 3772 2868 5vvjd.exe 101 PID 3772 wrote to memory of 4872 3772 1ffxxlf.exe 102 PID 3772 wrote to memory of 4872 3772 1ffxxlf.exe 102 PID 3772 wrote to memory of 4872 3772 1ffxxlf.exe 102 PID 4872 wrote to memory of 2972 4872 nhnhnn.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe"C:\Users\Admin\AppData\Local\Temp\680a06ace9f201131ea2bef9926c27b1140c795b635a11ae4323fddfc61eff10.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\xflffxx.exec:\xflffxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\xffrrff.exec:\xffrrff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
\??\c:\tnnnhh.exec:\tnnnhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
\??\c:\hbbttt.exec:\hbbttt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\htbthh.exec:\htbthh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
\??\c:\jvpjv.exec:\jvpjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
\??\c:\fffxlfx.exec:\fffxlfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
\??\c:\rrxxffl.exec:\rrxxffl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
\??\c:\btnnhh.exec:\btnnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\dvjdd.exec:\dvjdd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\ddjdv.exec:\ddjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\rflffxx.exec:\rflffxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\fxfxrrl.exec:\fxfxrrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\hhhhnn.exec:\hhhhnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\pjjdv.exec:\pjjdv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
\??\c:\vjjjd.exec:\vjjjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\rlllfxx.exec:\rlllfxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
\??\c:\tnbbtt.exec:\tnbbtt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\5vvjd.exec:\5vvjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\1ffxxlf.exec:\1ffxxlf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\nhnhnn.exec:\nhnhnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\vjpdv.exec:\vjpdv.exe23⤵
- Executes dropped EXE
PID:2972 -
\??\c:\vjjpp.exec:\vjjpp.exe24⤵
- Executes dropped EXE
PID:2788 -
\??\c:\lxfrllf.exec:\lxfrllf.exe25⤵
- Executes dropped EXE
PID:4684 -
\??\c:\bbhhnn.exec:\bbhhnn.exe26⤵
- Executes dropped EXE
PID:2208 -
\??\c:\dvvjd.exec:\dvvjd.exe27⤵
- Executes dropped EXE
PID:4616 -
\??\c:\lflfrrf.exec:\lflfrrf.exe28⤵
- Executes dropped EXE
PID:724 -
\??\c:\thnhbb.exec:\thnhbb.exe29⤵
- Executes dropped EXE
PID:1328 -
\??\c:\dvvvp.exec:\dvvvp.exe30⤵
- Executes dropped EXE
PID:400 -
\??\c:\rflfrlx.exec:\rflfrlx.exe31⤵
- Executes dropped EXE
PID:3776 -
\??\c:\bnbttt.exec:\bnbttt.exe32⤵
- Executes dropped EXE
PID:5108 -
\??\c:\httnhb.exec:\httnhb.exe33⤵
- Executes dropped EXE
PID:3572 -
\??\c:\pddvp.exec:\pddvp.exe34⤵
- Executes dropped EXE
PID:708 -
\??\c:\xlfffxf.exec:\xlfffxf.exe35⤵
- Executes dropped EXE
PID:1012 -
\??\c:\lrxrllf.exec:\lrxrllf.exe36⤵
- Executes dropped EXE
PID:3992 -
\??\c:\hbbbbt.exec:\hbbbbt.exe37⤵
- Executes dropped EXE
PID:4132 -
\??\c:\tntthn.exec:\tntthn.exe38⤵
- Executes dropped EXE
PID:1232 -
\??\c:\pvvvp.exec:\pvvvp.exe39⤵
- Executes dropped EXE
PID:2004 -
\??\c:\dvvpd.exec:\dvvpd.exe40⤵
- Executes dropped EXE
PID:1420 -
\??\c:\xrrlfxx.exec:\xrrlfxx.exe41⤵
- Executes dropped EXE
PID:4508 -
\??\c:\rlrlffx.exec:\rlrlffx.exe42⤵
- Executes dropped EXE
PID:4692 -
\??\c:\5nnhhb.exec:\5nnhhb.exe43⤵
- Executes dropped EXE
PID:2864 -
\??\c:\hbbhhn.exec:\hbbhhn.exe44⤵
- Executes dropped EXE
PID:2876 -
\??\c:\jddvv.exec:\jddvv.exe45⤵
- Executes dropped EXE
PID:1064 -
\??\c:\pvvjd.exec:\pvvjd.exe46⤵
- Executes dropped EXE
PID:4884 -
\??\c:\xfllxxx.exec:\xfllxxx.exe47⤵
- Executes dropped EXE
PID:5072 -
\??\c:\htnbnh.exec:\htnbnh.exe48⤵
- Executes dropped EXE
PID:2176 -
\??\c:\nbbnbb.exec:\nbbnbb.exe49⤵
- Executes dropped EXE
PID:3868 -
\??\c:\jjjjd.exec:\jjjjd.exe50⤵
- Executes dropped EXE
PID:2092 -
\??\c:\vdpjv.exec:\vdpjv.exe51⤵PID:4400
-
\??\c:\lxrlrxl.exec:\lxrlrxl.exe52⤵
- Executes dropped EXE
PID:4504 -
\??\c:\rrrrlll.exec:\rrrrlll.exe53⤵
- Executes dropped EXE
PID:5024 -
\??\c:\ttnnhh.exec:\ttnnhh.exe54⤵
- Executes dropped EXE
PID:2364 -
\??\c:\btnhbt.exec:\btnhbt.exe55⤵
- Executes dropped EXE
PID:2604 -
\??\c:\jjjdp.exec:\jjjdp.exe56⤵
- Executes dropped EXE
PID:1456 -
\??\c:\3jdvp.exec:\3jdvp.exe57⤵
- Executes dropped EXE
PID:5004 -
\??\c:\xrrrllf.exec:\xrrrllf.exe58⤵
- Executes dropped EXE
PID:2412 -
\??\c:\1bbbtt.exec:\1bbbtt.exe59⤵
- Executes dropped EXE
PID:2708 -
\??\c:\bnbthb.exec:\bnbthb.exe60⤵
- Executes dropped EXE
PID:1152 -
\??\c:\vjdvj.exec:\vjdvj.exe61⤵
- Executes dropped EXE
PID:2580 -
\??\c:\dpjjv.exec:\dpjjv.exe62⤵
- Executes dropped EXE
PID:4824 -
\??\c:\rflxfxf.exec:\rflxfxf.exe63⤵
- Executes dropped EXE
PID:4576 -
\??\c:\lflxlxl.exec:\lflxlxl.exe64⤵
- Executes dropped EXE
PID:2760 -
\??\c:\hntbhh.exec:\hntbhh.exe65⤵
- Executes dropped EXE
PID:4856 -
\??\c:\htnhbt.exec:\htnhbt.exe66⤵
- Executes dropped EXE
PID:1320 -
\??\c:\7jjvj.exec:\7jjvj.exe67⤵PID:2316
-
\??\c:\fxlflfx.exec:\fxlflfx.exe68⤵PID:3136
-
\??\c:\rxrrlll.exec:\rxrrlll.exe69⤵PID:32
-
\??\c:\bbbhhn.exec:\bbbhhn.exe70⤵PID:3688
-
\??\c:\pppvd.exec:\pppvd.exe71⤵PID:4832
-
\??\c:\jjdvj.exec:\jjdvj.exe72⤵PID:2884
-
\??\c:\fxxxlrl.exec:\fxxxlrl.exe73⤵PID:3548
-
\??\c:\nnbbnn.exec:\nnbbnn.exe74⤵PID:220
-
\??\c:\tnhbbt.exec:\tnhbbt.exe75⤵PID:4168
-
\??\c:\pjpdj.exec:\pjpdj.exe76⤵PID:2692
-
\??\c:\pdpvv.exec:\pdpvv.exe77⤵PID:2820
-
\??\c:\5flxllf.exec:\5flxllf.exe78⤵PID:2052
-
\??\c:\rxrlffr.exec:\rxrlffr.exe79⤵PID:3736
-
\??\c:\nntnht.exec:\nntnht.exe80⤵PID:4988
-
\??\c:\tbtntt.exec:\tbtntt.exe81⤵PID:440
-
\??\c:\vddpd.exec:\vddpd.exe82⤵PID:2632
-
\??\c:\dvjvj.exec:\dvjvj.exe83⤵PID:3708
-
\??\c:\fxlfllx.exec:\fxlfllx.exe84⤵PID:2284
-
\??\c:\bhhhhh.exec:\bhhhhh.exe85⤵PID:2352
-
\??\c:\nhnhbt.exec:\nhnhbt.exe86⤵PID:3420
-
\??\c:\ppvdv.exec:\ppvdv.exe87⤵PID:3332
-
\??\c:\pdjdd.exec:\pdjdd.exe88⤵PID:772
-
\??\c:\jpvpd.exec:\jpvpd.exe89⤵PID:4616
-
\??\c:\flxxrfx.exec:\flxxrfx.exe90⤵PID:2104
-
\??\c:\xllllll.exec:\xllllll.exe91⤵PID:1328
-
\??\c:\btnhhb.exec:\btnhhb.exe92⤵PID:4544
-
\??\c:\dpjpj.exec:\dpjpj.exe93⤵PID:3128
-
\??\c:\3ppvj.exec:\3ppvj.exe94⤵PID:3740
-
\??\c:\rllxlfx.exec:\rllxlfx.exe95⤵PID:3468
-
\??\c:\xllffxx.exec:\xllffxx.exe96⤵PID:4268
-
\??\c:\thhthb.exec:\thhthb.exe97⤵PID:708
-
\??\c:\nbthbn.exec:\nbthbn.exe98⤵PID:1012
-
\??\c:\5jjvp.exec:\5jjvp.exe99⤵PID:4960
-
\??\c:\djpvj.exec:\djpvj.exe100⤵PID:4132
-
\??\c:\frlflfr.exec:\frlflfr.exe101⤵PID:1756
-
\??\c:\7rxrxrf.exec:\7rxrxrf.exe102⤵PID:2288
-
\??\c:\tnbttn.exec:\tnbttn.exe103⤵PID:1620
-
\??\c:\jdddp.exec:\jdddp.exe104⤵PID:3460
-
\??\c:\dpjvj.exec:\dpjvj.exe105⤵PID:4692
-
\??\c:\flrlxrl.exec:\flrlxrl.exe106⤵PID:3608
-
\??\c:\1llxrll.exec:\1llxrll.exe107⤵PID:4128
-
\??\c:\nbtnht.exec:\nbtnht.exe108⤵PID:1968
-
\??\c:\nntnbt.exec:\nntnbt.exe109⤵PID:4884
-
\??\c:\jjvdj.exec:\jjvdj.exe110⤵PID:3988
-
\??\c:\fxxrllx.exec:\fxxrllx.exe111⤵PID:4760
-
\??\c:\rrxxlfr.exec:\rrxxlfr.exe112⤵PID:3868
-
\??\c:\thtnhb.exec:\thtnhb.exe113⤵PID:3156
-
\??\c:\bntnbn.exec:\bntnbn.exe114⤵PID:3532
-
\??\c:\vpdvj.exec:\vpdvj.exe115⤵PID:4976
-
\??\c:\vpdpv.exec:\vpdpv.exe116⤵PID:4792
-
\??\c:\frlxlfr.exec:\frlxlfr.exe117⤵PID:4764
-
\??\c:\xllfxrx.exec:\xllfxrx.exe118⤵PID:4808
-
\??\c:\hbtnhb.exec:\hbtnhb.exe119⤵PID:2340
-
\??\c:\7ppdp.exec:\7ppdp.exe120⤵PID:840
-
\??\c:\jvvpv.exec:\jvvpv.exe121⤵PID:3972
-
\??\c:\rrxxxfl.exec:\rrxxxfl.exe122⤵PID:2736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-