Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 05:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe
-
Size
80KB
-
MD5
5c5fde1216ab23c239931ce764ce2f26
-
SHA1
1caaad56944bdb6d603c6664b02a0fbdde78b2ee
-
SHA256
c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf
-
SHA512
162062dfb7d3f11942f8aec171c3be9088c9002841a8366dca2ebe93c2e153f79bbe5935949877ec25d0557bf21613a93ba47790962a6ed3ac2b5396f2ed16e5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoLuePjDYlSVeAD:ymb3NkkiQ3mdBjFoLucjDNVD
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/1820-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4528-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-14-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3008-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3020-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2628-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3608-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2356-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1432-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1884-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1344-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3216-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3756-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4960-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1328-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3592-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-12928-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3348 7rfrfrf.exe 5012 nhbhbt.exe 4528 pjdpd.exe 1960 dpjvp.exe 2152 lrlxlfx.exe 1636 9hnhhh.exe 3012 hbnbtt.exe 4564 jjpjd.exe 3008 lxrlxxl.exe 3020 tnnhbt.exe 4872 nbhbnt.exe 2628 5dvjd.exe 3608 lrxrlrr.exe 2356 nbbthh.exe 1432 9vvpp.exe 1884 vjvjd.exe 1344 3rffxfr.exe 2876 hbnhbn.exe 3216 7ddpv.exe 2360 vjjdp.exe 4108 9xrlffx.exe 1188 3btnbb.exe 3756 7vpjd.exe 4960 fxxxlfx.exe 4764 lxrrffl.exe 4928 9nbnbt.exe 1328 ddvjd.exe 3780 3xlrrlx.exe 3592 nbthbt.exe 3264 ttbnnh.exe 2516 dpppj.exe 4944 ffllffx.exe 4192 1lxrffx.exe 4700 7hnntt.exe 1296 hbtnnn.exe 2404 vjjjp.exe 1656 ddvvp.exe 1140 rxlfxll.exe 5012 rfffxxr.exe 2688 3ntntn.exe 4364 tbbttt.exe 4684 hbnhbb.exe 2284 ppppj.exe 3012 3djdv.exe 1800 rrrxxlf.exe 4212 1fxrxfx.exe 3648 7nnttt.exe 968 thnhhh.exe 3604 djpvp.exe 1196 ppppv.exe 452 lxrllrl.exe 3280 9nnnnn.exe 3916 1vdvd.exe 3408 3fxxrrr.exe 3608 nhhbtb.exe 4188 jvjjv.exe 3388 1xxlfxr.exe 5112 nnbhtb.exe 2488 vdjpv.exe 3488 ddpjj.exe 4580 xlfxllf.exe 2468 rlrlffl.exe 2672 hhnhnh.exe 2308 5btnhh.exe -
resource yara_rule behavioral2/memory/1820-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4528-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4564-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3008-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3020-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2628-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3608-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2356-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1432-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1884-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1344-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3216-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3756-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4960-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1328-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-12928-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9flxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 3348 1820 c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe 83 PID 1820 wrote to memory of 3348 1820 c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe 83 PID 1820 wrote to memory of 3348 1820 c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe 83 PID 3348 wrote to memory of 5012 3348 7rfrfrf.exe 84 PID 3348 wrote to memory of 5012 3348 7rfrfrf.exe 84 PID 3348 wrote to memory of 5012 3348 7rfrfrf.exe 84 PID 5012 wrote to memory of 4528 5012 nhbhbt.exe 85 PID 5012 wrote to memory of 4528 5012 nhbhbt.exe 85 PID 5012 wrote to memory of 4528 5012 nhbhbt.exe 85 PID 4528 wrote to memory of 1960 4528 pjdpd.exe 86 PID 4528 wrote to memory of 1960 4528 pjdpd.exe 86 PID 4528 wrote to memory of 1960 4528 pjdpd.exe 86 PID 1960 wrote to memory of 2152 1960 dpjvp.exe 87 PID 1960 wrote to memory of 2152 1960 dpjvp.exe 87 PID 1960 wrote to memory of 2152 1960 dpjvp.exe 87 PID 2152 wrote to memory of 1636 2152 lrlxlfx.exe 88 PID 2152 wrote to memory of 1636 2152 lrlxlfx.exe 88 PID 2152 wrote to memory of 1636 2152 lrlxlfx.exe 88 PID 1636 wrote to memory of 3012 1636 9hnhhh.exe 89 PID 1636 wrote to memory of 3012 1636 9hnhhh.exe 89 PID 1636 wrote to memory of 3012 1636 9hnhhh.exe 89 PID 3012 wrote to memory of 4564 3012 hbnbtt.exe 91 PID 3012 wrote to memory of 4564 3012 hbnbtt.exe 91 PID 3012 wrote to memory of 4564 3012 hbnbtt.exe 91 PID 4564 wrote to memory of 3008 4564 jjpjd.exe 92 PID 4564 wrote to memory of 3008 4564 jjpjd.exe 92 PID 4564 wrote to memory of 3008 4564 jjpjd.exe 92 PID 3008 wrote to memory of 3020 3008 lxrlxxl.exe 93 PID 3008 wrote to memory of 3020 3008 lxrlxxl.exe 93 PID 3008 wrote to memory of 3020 3008 lxrlxxl.exe 93 PID 3020 wrote to memory of 4872 3020 tnnhbt.exe 94 PID 3020 wrote to memory of 4872 3020 tnnhbt.exe 94 PID 3020 wrote to memory of 4872 3020 tnnhbt.exe 94 PID 4872 wrote to memory of 2628 4872 nbhbnt.exe 95 PID 4872 wrote to memory of 2628 4872 nbhbnt.exe 95 PID 4872 wrote to memory of 2628 4872 nbhbnt.exe 95 PID 2628 wrote to memory of 3608 2628 5dvjd.exe 96 PID 2628 wrote to memory of 3608 2628 5dvjd.exe 96 PID 2628 wrote to memory of 3608 2628 5dvjd.exe 96 PID 3608 wrote to memory of 2356 3608 lrxrlrr.exe 98 PID 3608 wrote to memory of 2356 3608 lrxrlrr.exe 98 PID 3608 wrote to memory of 2356 3608 lrxrlrr.exe 98 PID 2356 wrote to memory of 1432 2356 nbbthh.exe 99 PID 2356 wrote to memory of 1432 2356 nbbthh.exe 99 PID 2356 wrote to memory of 1432 2356 nbbthh.exe 99 PID 1432 wrote to memory of 1884 1432 9vvpp.exe 100 PID 1432 wrote to memory of 1884 1432 9vvpp.exe 100 PID 1432 wrote to memory of 1884 1432 9vvpp.exe 100 PID 1884 wrote to memory of 1344 1884 vjvjd.exe 101 PID 1884 wrote to memory of 1344 1884 vjvjd.exe 101 PID 1884 wrote to memory of 1344 1884 vjvjd.exe 101 PID 1344 wrote to memory of 2876 1344 3rffxfr.exe 102 PID 1344 wrote to memory of 2876 1344 3rffxfr.exe 102 PID 1344 wrote to memory of 2876 1344 3rffxfr.exe 102 PID 2876 wrote to memory of 3216 2876 hbnhbn.exe 103 PID 2876 wrote to memory of 3216 2876 hbnhbn.exe 103 PID 2876 wrote to memory of 3216 2876 hbnhbn.exe 103 PID 3216 wrote to memory of 2360 3216 7ddpv.exe 104 PID 3216 wrote to memory of 2360 3216 7ddpv.exe 104 PID 3216 wrote to memory of 2360 3216 7ddpv.exe 104 PID 2360 wrote to memory of 4108 2360 vjjdp.exe 105 PID 2360 wrote to memory of 4108 2360 vjjdp.exe 105 PID 2360 wrote to memory of 4108 2360 vjjdp.exe 105 PID 4108 wrote to memory of 1188 4108 9xrlffx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe"C:\Users\Admin\AppData\Local\Temp\c254b0af9e560474174484dc4b994fb9b8ff9f1f96cab130826a88b2ee4978cf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\7rfrfrf.exec:\7rfrfrf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\nhbhbt.exec:\nhbhbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\pjdpd.exec:\pjdpd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\dpjvp.exec:\dpjvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\lrlxlfx.exec:\lrlxlfx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\9hnhhh.exec:\9hnhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\hbnbtt.exec:\hbnbtt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\jjpjd.exec:\jjpjd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
\??\c:\lxrlxxl.exec:\lxrlxxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\tnnhbt.exec:\tnnhbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\nbhbnt.exec:\nbhbnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\5dvjd.exec:\5dvjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\lrxrlrr.exec:\lrxrlrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
\??\c:\nbbthh.exec:\nbbthh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\9vvpp.exec:\9vvpp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
\??\c:\vjvjd.exec:\vjvjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\3rffxfr.exec:\3rffxfr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\hbnhbn.exec:\hbnhbn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\7ddpv.exec:\7ddpv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\vjjdp.exec:\vjjdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
\??\c:\9xrlffx.exec:\9xrlffx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
\??\c:\3btnbb.exec:\3btnbb.exe23⤵
- Executes dropped EXE
PID:1188 -
\??\c:\7vpjd.exec:\7vpjd.exe24⤵
- Executes dropped EXE
PID:3756 -
\??\c:\fxxxlfx.exec:\fxxxlfx.exe25⤵
- Executes dropped EXE
PID:4960 -
\??\c:\lxrrffl.exec:\lxrrffl.exe26⤵
- Executes dropped EXE
PID:4764 -
\??\c:\9nbnbt.exec:\9nbnbt.exe27⤵
- Executes dropped EXE
PID:4928 -
\??\c:\ddvjd.exec:\ddvjd.exe28⤵
- Executes dropped EXE
PID:1328 -
\??\c:\3xlrrlx.exec:\3xlrrlx.exe29⤵
- Executes dropped EXE
PID:3780 -
\??\c:\nbthbt.exec:\nbthbt.exe30⤵
- Executes dropped EXE
PID:3592 -
\??\c:\ttbnnh.exec:\ttbnnh.exe31⤵
- Executes dropped EXE
PID:3264 -
\??\c:\dpppj.exec:\dpppj.exe32⤵
- Executes dropped EXE
PID:2516 -
\??\c:\ffllffx.exec:\ffllffx.exe33⤵
- Executes dropped EXE
PID:4944 -
\??\c:\1lxrffx.exec:\1lxrffx.exe34⤵
- Executes dropped EXE
PID:4192 -
\??\c:\7hnntt.exec:\7hnntt.exe35⤵
- Executes dropped EXE
PID:4700 -
\??\c:\hbtnnn.exec:\hbtnnn.exe36⤵
- Executes dropped EXE
PID:1296 -
\??\c:\vjjjp.exec:\vjjjp.exe37⤵
- Executes dropped EXE
PID:2404 -
\??\c:\ddvvp.exec:\ddvvp.exe38⤵
- Executes dropped EXE
PID:1656 -
\??\c:\rxlfxll.exec:\rxlfxll.exe39⤵
- Executes dropped EXE
PID:1140 -
\??\c:\rfffxxr.exec:\rfffxxr.exe40⤵
- Executes dropped EXE
PID:5012 -
\??\c:\3ntntn.exec:\3ntntn.exe41⤵
- Executes dropped EXE
PID:2688 -
\??\c:\tbbttt.exec:\tbbttt.exe42⤵
- Executes dropped EXE
PID:4364 -
\??\c:\hbnhbb.exec:\hbnhbb.exe43⤵
- Executes dropped EXE
PID:4684 -
\??\c:\ppppj.exec:\ppppj.exe44⤵
- Executes dropped EXE
PID:2284 -
\??\c:\3djdv.exec:\3djdv.exe45⤵
- Executes dropped EXE
PID:3012 -
\??\c:\rrrxxlf.exec:\rrrxxlf.exe46⤵
- Executes dropped EXE
PID:1800 -
\??\c:\1fxrxfx.exec:\1fxrxfx.exe47⤵
- Executes dropped EXE
PID:4212 -
\??\c:\7nnttt.exec:\7nnttt.exe48⤵
- Executes dropped EXE
PID:3648 -
\??\c:\thnhhh.exec:\thnhhh.exe49⤵
- Executes dropped EXE
PID:968 -
\??\c:\djpvp.exec:\djpvp.exe50⤵
- Executes dropped EXE
PID:3604 -
\??\c:\ppppv.exec:\ppppv.exe51⤵
- Executes dropped EXE
PID:1196 -
\??\c:\lxrllrl.exec:\lxrllrl.exe52⤵
- Executes dropped EXE
PID:452 -
\??\c:\9nnnnn.exec:\9nnnnn.exe53⤵
- Executes dropped EXE
PID:3280 -
\??\c:\1vdvd.exec:\1vdvd.exe54⤵
- Executes dropped EXE
PID:3916 -
\??\c:\3fxxrrr.exec:\3fxxrrr.exe55⤵
- Executes dropped EXE
PID:3408 -
\??\c:\nhhbtb.exec:\nhhbtb.exe56⤵
- Executes dropped EXE
PID:3608 -
\??\c:\jvjjv.exec:\jvjjv.exe57⤵
- Executes dropped EXE
PID:4188 -
\??\c:\1xxlfxr.exec:\1xxlfxr.exe58⤵
- Executes dropped EXE
PID:3388 -
\??\c:\nnbhtb.exec:\nnbhtb.exe59⤵
- Executes dropped EXE
PID:5112 -
\??\c:\vdjpv.exec:\vdjpv.exe60⤵
- Executes dropped EXE
PID:2488 -
\??\c:\ddpjj.exec:\ddpjj.exe61⤵
- Executes dropped EXE
PID:3488 -
\??\c:\xlfxllf.exec:\xlfxllf.exe62⤵
- Executes dropped EXE
PID:4580 -
\??\c:\rlrlffl.exec:\rlrlffl.exe63⤵
- Executes dropped EXE
PID:2468 -
\??\c:\hhnhnh.exec:\hhnhnh.exe64⤵
- Executes dropped EXE
PID:2672 -
\??\c:\5btnhh.exec:\5btnhh.exe65⤵
- Executes dropped EXE
PID:2308 -
\??\c:\ppjdp.exec:\ppjdp.exe66⤵PID:920
-
\??\c:\jdvpd.exec:\jdvpd.exe67⤵PID:3228
-
\??\c:\xrfrrlx.exec:\xrfrrlx.exe68⤵PID:1040
-
\??\c:\9flxlfr.exec:\9flxlfr.exe69⤵
- System Location Discovery: System Language Discovery
PID:5096 -
\??\c:\tthbnh.exec:\tthbnh.exe70⤵PID:1580
-
\??\c:\7jvpp.exec:\7jvpp.exe71⤵PID:1012
-
\??\c:\lfrlxxl.exec:\lfrlxxl.exe72⤵PID:2384
-
\??\c:\7bbthh.exec:\7bbthh.exe73⤵PID:3460
-
\??\c:\jvvjv.exec:\jvvjv.exe74⤵PID:1776
-
\??\c:\9jdvp.exec:\9jdvp.exe75⤵PID:840
-
\??\c:\xfxxxxr.exec:\xfxxxxr.exe76⤵PID:2020
-
\??\c:\5bnnbh.exec:\5bnnbh.exe77⤵PID:3988
-
\??\c:\pdppj.exec:\pdppj.exe78⤵PID:228
-
\??\c:\xllfxxx.exec:\xllfxxx.exe79⤵PID:2980
-
\??\c:\ntthbt.exec:\ntthbt.exe80⤵PID:5008
-
\??\c:\1bbtnn.exec:\1bbtnn.exe81⤵PID:636
-
\??\c:\7jvjd.exec:\7jvjd.exe82⤵PID:4508
-
\??\c:\jjdpj.exec:\jjdpj.exe83⤵PID:5072
-
\??\c:\5xxrlfx.exec:\5xxrlfx.exe84⤵PID:2388
-
\??\c:\fxlfxrf.exec:\fxlfxrf.exe85⤵PID:4000
-
\??\c:\tbbthb.exec:\tbbthb.exe86⤵PID:3292
-
\??\c:\nbtnbt.exec:\nbtnbt.exe87⤵PID:4344
-
\??\c:\vddvp.exec:\vddvp.exe88⤵PID:3804
-
\??\c:\1xxrxxx.exec:\1xxrxxx.exe89⤵PID:4684
-
\??\c:\ffxlfxl.exec:\ffxlfxl.exe90⤵PID:2252
-
\??\c:\nttnnt.exec:\nttnnt.exe91⤵PID:3076
-
\??\c:\hhhtbb.exec:\hhhtbb.exe92⤵PID:4976
-
\??\c:\dvddd.exec:\dvddd.exe93⤵PID:4564
-
\??\c:\pvdvv.exec:\pvdvv.exe94⤵PID:2344
-
\??\c:\3xxlxrf.exec:\3xxlxrf.exe95⤵PID:3008
-
\??\c:\1fllfll.exec:\1fllfll.exe96⤵PID:4372
-
\??\c:\hbhbhb.exec:\hbhbhb.exe97⤵PID:1196
-
\??\c:\jppdv.exec:\jppdv.exe98⤵PID:5052
-
\??\c:\xffrlfr.exec:\xffrlfr.exe99⤵PID:412
-
\??\c:\5thhnn.exec:\5thhnn.exe100⤵PID:3916
-
\??\c:\ppvpj.exec:\ppvpj.exe101⤵PID:2628
-
\??\c:\pdvpd.exec:\pdvpd.exe102⤵PID:3608
-
\??\c:\frlffxl.exec:\frlffxl.exe103⤵PID:3288
-
\??\c:\fxxrllf.exec:\fxxrllf.exe104⤵PID:3800
-
\??\c:\bnnhtt.exec:\bnnhtt.exe105⤵PID:1340
-
\??\c:\nttnbt.exec:\nttnbt.exe106⤵PID:2144
-
\??\c:\dvjvj.exec:\dvjvj.exe107⤵PID:3632
-
\??\c:\jdjjd.exec:\jdjjd.exe108⤵PID:2272
-
\??\c:\rxrrllr.exec:\rxrrllr.exe109⤵PID:3820
-
\??\c:\nhnhbb.exec:\nhnhbb.exe110⤵PID:4608
-
\??\c:\7bhnbh.exec:\7bhnbh.exe111⤵PID:3016
-
\??\c:\jdjjv.exec:\jdjjv.exe112⤵PID:2420
-
\??\c:\fflflxr.exec:\fflflxr.exe113⤵PID:1148
-
\??\c:\3rlfxxx.exec:\3rlfxxx.exe114⤵PID:4764
-
\??\c:\tttthh.exec:\tttthh.exe115⤵PID:4828
-
\??\c:\pvvpj.exec:\pvvpj.exe116⤵PID:3124
-
\??\c:\9jjdp.exec:\9jjdp.exe117⤵PID:1012
-
\??\c:\7llxrlf.exec:\7llxrlf.exe118⤵PID:2384
-
\??\c:\hnhhbb.exec:\hnhhbb.exe119⤵PID:3460
-
\??\c:\nhbbtn.exec:\nhbbtn.exe120⤵PID:1676
-
\??\c:\pjjdd.exec:\pjjdd.exe121⤵PID:840
-
\??\c:\3vvpd.exec:\3vvpd.exe122⤵PID:2020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-