Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 19:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe
-
Size
7.0MB
-
MD5
140d6af2f3437ac8739850591bc0bb30
-
SHA1
061d6e2da3e6dc2eca5c92ca11918a46b2bd98c6
-
SHA256
4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8
-
SHA512
2765392b8e3a5d42dab7e7c610821e89ad25f10b80d86085c703927e18ba0f0a7e34d202a2feabf18408c647479a26646f1c6bfa4ecc4e1bbb3c73d014f41748
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkxk8EZk:ymb3NkkiQ3mdBjFIkxkpZk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/1652-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5672-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5816-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/772-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5680-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4720-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2988-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4624-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1196-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/432-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2528-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/916-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2792-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5296-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5500-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1556-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5488-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5384-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3176-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2008-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2952-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1776-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 5672 rrflffl.exe 5816 pppjd.exe 2720 ffxrflx.exe 772 ffxlxxx.exe 5680 lfrlrrr.exe 4524 thtnhb.exe 4720 rrfxxrl.exe 4484 tbnhbh.exe 2988 nhnhbn.exe 4624 hbnbbn.exe 1196 jdpdv.exe 4636 dvpdd.exe 432 frfllxr.exe 1916 xflffff.exe 2528 jpvpv.exe 5648 9hnnhh.exe 916 3fxfrlf.exe 2792 hnnbnh.exe 1540 hbthth.exe 5296 frxlxrf.exe 5500 vpjvv.exe 1556 bttnhb.exe 5488 vvpjj.exe 5384 3nhbbn.exe 6072 7vpdv.exe 3176 djjdp.exe 3068 rlrlfrl.exe 2008 djvjd.exe 2952 rffxrlf.exe 5292 1ffxxll.exe 1776 ntnbnh.exe 4368 flxlrrf.exe 3816 dvpvj.exe 5596 hhthhb.exe 6112 frrlxfr.exe 2332 bbthtt.exe 4308 xrrfrlr.exe 5396 jvvpj.exe 5192 3pjvj.exe 5228 tbtnbb.exe 3628 jdpjd.exe 5920 bnthnb.exe 1568 xrlfffx.exe 3336 ppjdj.exe 5676 hbbnbb.exe 1900 fxxffff.exe 2140 dpvvv.exe 1760 nnhtnn.exe 3956 3ffxlll.exe 680 jvpdd.exe 2852 ttbthh.exe 6080 hhntnb.exe 5816 lllfrfr.exe 2844 jjjdd.exe 4196 bbbtht.exe 5856 lrfxrlf.exe 4468 pdjdd.exe 4488 1llxffl.exe 4872 7fllllf.exe 4496 pjpjv.exe 5160 9tnbnh.exe 4484 lrrlxlx.exe 3632 pdjjd.exe 4696 hnhnhh.exe -
resource yara_rule behavioral2/memory/1652-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1652-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5672-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5672-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5816-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/772-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5680-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4720-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2988-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1196-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/432-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2528-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/916-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2792-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5296-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5500-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1556-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5488-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5384-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2008-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2952-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1776-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ttnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thtnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xxrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tnbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrlfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rfxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxllrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxflxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnthnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrlfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrxxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxfrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nththt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrllrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbbb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 5672 1652 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 87 PID 1652 wrote to memory of 5672 1652 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 87 PID 1652 wrote to memory of 5672 1652 4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe 87 PID 5672 wrote to memory of 5816 5672 rrflffl.exe 90 PID 5672 wrote to memory of 5816 5672 rrflffl.exe 90 PID 5672 wrote to memory of 5816 5672 rrflffl.exe 90 PID 5816 wrote to memory of 2720 5816 pppjd.exe 91 PID 5816 wrote to memory of 2720 5816 pppjd.exe 91 PID 5816 wrote to memory of 2720 5816 pppjd.exe 91 PID 2720 wrote to memory of 772 2720 ffxrflx.exe 92 PID 2720 wrote to memory of 772 2720 ffxrflx.exe 92 PID 2720 wrote to memory of 772 2720 ffxrflx.exe 92 PID 772 wrote to memory of 5680 772 ffxlxxx.exe 93 PID 772 wrote to memory of 5680 772 ffxlxxx.exe 93 PID 772 wrote to memory of 5680 772 ffxlxxx.exe 93 PID 5680 wrote to memory of 4524 5680 lfrlrrr.exe 94 PID 5680 wrote to memory of 4524 5680 lfrlrrr.exe 94 PID 5680 wrote to memory of 4524 5680 lfrlrrr.exe 94 PID 4524 wrote to memory of 4720 4524 thtnhb.exe 95 PID 4524 wrote to memory of 4720 4524 thtnhb.exe 95 PID 4524 wrote to memory of 4720 4524 thtnhb.exe 95 PID 4720 wrote to memory of 4484 4720 rrfxxrl.exe 96 PID 4720 wrote to memory of 4484 4720 rrfxxrl.exe 96 PID 4720 wrote to memory of 4484 4720 rrfxxrl.exe 96 PID 4484 wrote to memory of 2988 4484 tbnhbh.exe 97 PID 4484 wrote to memory of 2988 4484 tbnhbh.exe 97 PID 4484 wrote to memory of 2988 4484 tbnhbh.exe 97 PID 2988 wrote to memory of 4624 2988 nhnhbn.exe 100 PID 2988 wrote to memory of 4624 2988 nhnhbn.exe 100 PID 2988 wrote to memory of 4624 2988 nhnhbn.exe 100 PID 4624 wrote to memory of 1196 4624 hbnbbn.exe 101 PID 4624 wrote to memory of 1196 4624 hbnbbn.exe 101 PID 4624 wrote to memory of 1196 4624 hbnbbn.exe 101 PID 1196 wrote to memory of 4636 1196 jdpdv.exe 102 PID 1196 wrote to memory of 4636 1196 jdpdv.exe 102 PID 1196 wrote to memory of 4636 1196 jdpdv.exe 102 PID 4636 wrote to memory of 432 4636 dvpdd.exe 103 PID 4636 wrote to memory of 432 4636 dvpdd.exe 103 PID 4636 wrote to memory of 432 4636 dvpdd.exe 103 PID 432 wrote to memory of 1916 432 frfllxr.exe 106 PID 432 wrote to memory of 1916 432 frfllxr.exe 106 PID 432 wrote to memory of 1916 432 frfllxr.exe 106 PID 1916 wrote to memory of 2528 1916 xflffff.exe 107 PID 1916 wrote to memory of 2528 1916 xflffff.exe 107 PID 1916 wrote to memory of 2528 1916 xflffff.exe 107 PID 2528 wrote to memory of 5648 2528 jpvpv.exe 108 PID 2528 wrote to memory of 5648 2528 jpvpv.exe 108 PID 2528 wrote to memory of 5648 2528 jpvpv.exe 108 PID 5648 wrote to memory of 916 5648 9hnnhh.exe 109 PID 5648 wrote to memory of 916 5648 9hnnhh.exe 109 PID 5648 wrote to memory of 916 5648 9hnnhh.exe 109 PID 916 wrote to memory of 2792 916 3fxfrlf.exe 110 PID 916 wrote to memory of 2792 916 3fxfrlf.exe 110 PID 916 wrote to memory of 2792 916 3fxfrlf.exe 110 PID 2792 wrote to memory of 1540 2792 hnnbnh.exe 111 PID 2792 wrote to memory of 1540 2792 hnnbnh.exe 111 PID 2792 wrote to memory of 1540 2792 hnnbnh.exe 111 PID 1540 wrote to memory of 5296 1540 hbthth.exe 112 PID 1540 wrote to memory of 5296 1540 hbthth.exe 112 PID 1540 wrote to memory of 5296 1540 hbthth.exe 112 PID 5296 wrote to memory of 5500 5296 frxlxrf.exe 113 PID 5296 wrote to memory of 5500 5296 frxlxrf.exe 113 PID 5296 wrote to memory of 5500 5296 frxlxrf.exe 113 PID 5500 wrote to memory of 1556 5500 vpjvv.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe"C:\Users\Admin\AppData\Local\Temp\4627a5716e93ef46de7c7d08f1f15c41e09ff1387eae5d32063e379eaafa83c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\rrflffl.exec:\rrflffl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5672 -
\??\c:\pppjd.exec:\pppjd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5816 -
\??\c:\ffxrflx.exec:\ffxrflx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\ffxlxxx.exec:\ffxlxxx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\lfrlrrr.exec:\lfrlrrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5680 -
\??\c:\thtnhb.exec:\thtnhb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\rrfxxrl.exec:\rrfxxrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
\??\c:\tbnhbh.exec:\tbnhbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
\??\c:\nhnhbn.exec:\nhnhbn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\hbnbbn.exec:\hbnbbn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
\??\c:\jdpdv.exec:\jdpdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\dvpdd.exec:\dvpdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\frfllxr.exec:\frfllxr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
\??\c:\xflffff.exec:\xflffff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\jpvpv.exec:\jpvpv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\9hnnhh.exec:\9hnnhh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5648 -
\??\c:\3fxfrlf.exec:\3fxfrlf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
\??\c:\hnnbnh.exec:\hnnbnh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\hbthth.exec:\hbthth.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\frxlxrf.exec:\frxlxrf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5296 -
\??\c:\vpjvv.exec:\vpjvv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5500 -
\??\c:\bttnhb.exec:\bttnhb.exe23⤵
- Executes dropped EXE
PID:1556 -
\??\c:\vvpjj.exec:\vvpjj.exe24⤵
- Executes dropped EXE
PID:5488 -
\??\c:\3nhbbn.exec:\3nhbbn.exe25⤵
- Executes dropped EXE
PID:5384 -
\??\c:\7vpdv.exec:\7vpdv.exe26⤵
- Executes dropped EXE
PID:6072 -
\??\c:\djjdp.exec:\djjdp.exe27⤵
- Executes dropped EXE
PID:3176 -
\??\c:\rlrlfrl.exec:\rlrlfrl.exe28⤵
- Executes dropped EXE
PID:3068 -
\??\c:\djvjd.exec:\djvjd.exe29⤵
- Executes dropped EXE
PID:2008 -
\??\c:\rffxrlf.exec:\rffxrlf.exe30⤵
- Executes dropped EXE
PID:2952 -
\??\c:\1ffxxll.exec:\1ffxxll.exe31⤵
- Executes dropped EXE
PID:5292 -
\??\c:\ntnbnh.exec:\ntnbnh.exe32⤵
- Executes dropped EXE
PID:1776 -
\??\c:\flxlrrf.exec:\flxlrrf.exe33⤵
- Executes dropped EXE
PID:4368 -
\??\c:\dvpvj.exec:\dvpvj.exe34⤵
- Executes dropped EXE
PID:3816 -
\??\c:\hhthhb.exec:\hhthhb.exe35⤵
- Executes dropped EXE
PID:5596 -
\??\c:\frrlxfr.exec:\frrlxfr.exe36⤵
- Executes dropped EXE
PID:6112 -
\??\c:\bbthtt.exec:\bbthtt.exe37⤵
- Executes dropped EXE
PID:2332 -
\??\c:\xrrfrlr.exec:\xrrfrlr.exe38⤵
- Executes dropped EXE
PID:4308 -
\??\c:\jvvpj.exec:\jvvpj.exe39⤵
- Executes dropped EXE
PID:5396 -
\??\c:\3pjvj.exec:\3pjvj.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5192 -
\??\c:\tbtnbb.exec:\tbtnbb.exe41⤵
- Executes dropped EXE
PID:5228 -
\??\c:\jdpjd.exec:\jdpjd.exe42⤵
- Executes dropped EXE
PID:3628 -
\??\c:\bnthnb.exec:\bnthnb.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5920 -
\??\c:\xrlfffx.exec:\xrlfffx.exe44⤵
- Executes dropped EXE
PID:1568 -
\??\c:\ppjdj.exec:\ppjdj.exe45⤵
- Executes dropped EXE
PID:3336 -
\??\c:\hbbnbb.exec:\hbbnbb.exe46⤵
- Executes dropped EXE
PID:5676 -
\??\c:\fxxffff.exec:\fxxffff.exe47⤵
- Executes dropped EXE
PID:1900 -
\??\c:\dpvvv.exec:\dpvvv.exe48⤵
- Executes dropped EXE
PID:2140 -
\??\c:\nnhtnn.exec:\nnhtnn.exe49⤵
- Executes dropped EXE
PID:1760 -
\??\c:\3ffxlll.exec:\3ffxlll.exe50⤵
- Executes dropped EXE
PID:3956 -
\??\c:\jvpdd.exec:\jvpdd.exe51⤵
- Executes dropped EXE
PID:680 -
\??\c:\ttbthh.exec:\ttbthh.exe52⤵
- Executes dropped EXE
PID:2852 -
\??\c:\hhntnb.exec:\hhntnb.exe53⤵
- Executes dropped EXE
PID:6080 -
\??\c:\lllfrfr.exec:\lllfrfr.exe54⤵
- Executes dropped EXE
PID:5816 -
\??\c:\jjjdd.exec:\jjjdd.exe55⤵
- Executes dropped EXE
PID:2844 -
\??\c:\bbbtht.exec:\bbbtht.exe56⤵
- Executes dropped EXE
PID:4196 -
\??\c:\lrfxrlf.exec:\lrfxrlf.exe57⤵
- Executes dropped EXE
PID:5856 -
\??\c:\pdjdd.exec:\pdjdd.exe58⤵
- Executes dropped EXE
PID:4468 -
\??\c:\1llxffl.exec:\1llxffl.exe59⤵
- Executes dropped EXE
PID:4488 -
\??\c:\7fllllf.exec:\7fllllf.exe60⤵
- Executes dropped EXE
PID:4872 -
\??\c:\pjpjv.exec:\pjpjv.exe61⤵
- Executes dropped EXE
PID:4496 -
\??\c:\9tnbnh.exec:\9tnbnh.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5160 -
\??\c:\lrrlxlx.exec:\lrrlxlx.exe63⤵
- Executes dropped EXE
PID:4484 -
\??\c:\pdjjd.exec:\pdjjd.exe64⤵
- Executes dropped EXE
PID:3632 -
\??\c:\hnhnhh.exec:\hnhnhh.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4696 -
\??\c:\vpvvp.exec:\vpvvp.exe66⤵PID:4676
-
\??\c:\nththt.exec:\nththt.exe67⤵
- System Location Discovery: System Language Discovery
PID:4552 -
\??\c:\rxrfrfx.exec:\rxrfrfx.exe68⤵PID:1196
-
\??\c:\bnnbnh.exec:\bnnbnh.exe69⤵PID:2592
-
\??\c:\rxllrxx.exec:\rxllrxx.exe70⤵PID:4908
-
\??\c:\jvvjd.exec:\jvvjd.exe71⤵PID:5040
-
\??\c:\btthtn.exec:\btthtn.exe72⤵PID:4580
-
\??\c:\lfffffx.exec:\lfffffx.exe73⤵PID:5588
-
\??\c:\vpjvp.exec:\vpjvp.exe74⤵PID:4628
-
\??\c:\btnhnh.exec:\btnhnh.exe75⤵PID:4280
-
\??\c:\lrrxlxr.exec:\lrrxlxr.exe76⤵PID:3396
-
\??\c:\tthnnh.exec:\tthnnh.exe77⤵PID:5236
-
\??\c:\xffxlfr.exec:\xffxlfr.exe78⤵PID:1980
-
\??\c:\pvvpj.exec:\pvvpj.exe79⤵PID:1332
-
\??\c:\hthtnn.exec:\hthtnn.exe80⤵PID:804
-
\??\c:\1lfrlxr.exec:\1lfrlxr.exe81⤵PID:1136
-
\??\c:\rllfxxl.exec:\rllfxxl.exe82⤵PID:3408
-
\??\c:\dvdpp.exec:\dvdpp.exe83⤵PID:5436
-
\??\c:\htbtnh.exec:\htbtnh.exe84⤵PID:1704
-
\??\c:\xrxfxlf.exec:\xrxfxlf.exe85⤵
- System Location Discovery: System Language Discovery
PID:3572 -
\??\c:\bnbbnh.exec:\bnbbnh.exe86⤵PID:5400
-
\??\c:\1rllxfr.exec:\1rllxfr.exe87⤵PID:1532
-
\??\c:\jddvj.exec:\jddvj.exe88⤵PID:1720
-
\??\c:\tbbtht.exec:\tbbtht.exe89⤵PID:6072
-
\??\c:\vvvvv.exec:\vvvvv.exe90⤵PID:1436
-
\??\c:\bhbnbt.exec:\bhbnbt.exe91⤵PID:3068
-
\??\c:\fflxlfl.exec:\fflxlfl.exe92⤵PID:724
-
\??\c:\vjjvd.exec:\vjjvd.exe93⤵PID:4600
-
\??\c:\tnnhhn.exec:\tnnhhn.exe94⤵PID:3892
-
\??\c:\xrfrfxl.exec:\xrfrfxl.exe95⤵PID:6068
-
\??\c:\9ttnbn.exec:\9ttnbn.exe96⤵
- System Location Discovery: System Language Discovery
PID:3580 -
\??\c:\xffxrlx.exec:\xffxrlx.exe97⤵
- System Location Discovery: System Language Discovery
PID:5612 -
\??\c:\jdvpj.exec:\jdvpj.exe98⤵PID:3944
-
\??\c:\xxlflfr.exec:\xxlflfr.exe99⤵PID:5884
-
\??\c:\pvvvp.exec:\pvvvp.exe100⤵PID:5912
-
\??\c:\rflrrfl.exec:\rflrrfl.exe101⤵PID:2448
-
\??\c:\rfllrxx.exec:\rfllrxx.exe102⤵PID:4360
-
\??\c:\djjjd.exec:\djjjd.exe103⤵PID:4084
-
\??\c:\bbhnbt.exec:\bbhnbt.exe104⤵PID:5628
-
\??\c:\pjjvj.exec:\pjjvj.exe105⤵PID:2908
-
\??\c:\hnhtbt.exec:\hnhtbt.exe106⤵PID:4032
-
\??\c:\lxflfxr.exec:\lxflfxr.exe107⤵PID:2272
-
\??\c:\jdjvv.exec:\jdjvv.exe108⤵PID:5228
-
\??\c:\fxrxrrf.exec:\fxrxrrf.exe109⤵PID:3628
-
\??\c:\pjdpj.exec:\pjdpj.exe110⤵PID:5056
-
\??\c:\nnnhhb.exec:\nnnhhb.exe111⤵PID:3812
-
\??\c:\7bttnn.exec:\7bttnn.exe112⤵PID:2120
-
\??\c:\9xlffxr.exec:\9xlffxr.exe113⤵PID:1596
-
\??\c:\ppvpj.exec:\ppvpj.exe114⤵PID:5012
-
\??\c:\7thhbt.exec:\7thhbt.exe115⤵
- System Location Discovery: System Language Discovery
PID:3336 -
\??\c:\jjvjp.exec:\jjvjp.exe116⤵PID:4928
-
\??\c:\thbtnh.exec:\thbtnh.exe117⤵PID:1900
-
\??\c:\7jjdp.exec:\7jjdp.exe118⤵PID:1872
-
\??\c:\bnhnnn.exec:\bnhnnn.exe119⤵PID:2892
-
\??\c:\rflfxxr.exec:\rflfxxr.exe120⤵PID:1712
-
\??\c:\pdpdv.exec:\pdpdv.exe121⤵PID:3920
-
\??\c:\hntnhb.exec:\hntnhb.exe122⤵PID:1768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-