Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 14:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
805e348fc105ebb2b837ae53e30d2e80N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
805e348fc105ebb2b837ae53e30d2e80N.exe
-
Size
88KB
-
MD5
805e348fc105ebb2b837ae53e30d2e80
-
SHA1
5aff34c5eea25edd7422b087e7dd8edad7893651
-
SHA256
d511edac19aaeaa4d8d17bfe9a9e105e7c95c6faa37996140430a70a7f43700b
-
SHA512
87c84b93ae97936703541fc9694e8d780cefe7ea4866e618c45c717e8e8b408ecb4f585a2c08c7c02c1efe3cf3a6ca8487dbdd6cef97e5aa2f3932a2b3c1ee7d
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wV3jaCJ5jH3ebt:ymb3NkkiQ3mdBjF+3TU2K3bJZXw
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/2216-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2216-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4232-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/944-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4984-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3052-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3868-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3708-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1164-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3044-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4640-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2420-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4028-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1184-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2584-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1392-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2692-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/452-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3052-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3084-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4232 8202664.exe 944 htbnbb.exe 4984 rlfxfxf.exe 3052 tnhbtt.exe 3456 xxxfxfl.exe 3408 8868260.exe 3624 422644.exe 3868 20806.exe 3708 8040002.exe 1164 286488.exe 3044 ntbnhn.exe 4640 4862266.exe 4136 5rffxxr.exe 4028 04662.exe 2420 624488.exe 1184 0288226.exe 2596 2626604.exe 1844 jpvpj.exe 2584 lffxrrr.exe 3940 68266.exe 3964 260882.exe 1392 jdvvp.exe 2692 260088.exe 4352 240488.exe 2684 26220.exe 540 nbhbnn.exe 452 2422406.exe 1568 6088260.exe 3052 tntnhb.exe 3456 084844.exe 3084 jjjdp.exe 1636 68004.exe 3068 g4886.exe 728 440644.exe 3400 hbhhtb.exe 2428 6288822.exe 4288 frxrxfx.exe 4748 dvpjj.exe 948 q06222.exe 3472 602288.exe 3184 vppjd.exe 1764 pdvvp.exe 2416 8448482.exe 3836 4886044.exe 3224 4860224.exe 2992 66260.exe 3560 dvppj.exe 2796 tnnnbb.exe 4576 jjppv.exe 4436 402266.exe 2488 nhbbnn.exe 4724 426488.exe 4428 dpdvp.exe 1136 ntbttb.exe 872 40664.exe 3032 62260.exe 2600 hbbbnn.exe 2436 bbtnhh.exe 1728 xxlflxl.exe 2128 lxrrlll.exe 4108 flffffx.exe 3456 24240.exe 532 xrxrfff.exe 1128 xlrfxfl.exe -
resource yara_rule behavioral2/memory/2216-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2216-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4232-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/944-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3052-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3868-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3868-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3868-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3708-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1164-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3044-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4640-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2420-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4028-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2584-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1392-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2692-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/452-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3052-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3084-210-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxlrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w06204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 686004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6400000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 880826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4000826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06882.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4232 2216 805e348fc105ebb2b837ae53e30d2e80N.exe 91 PID 2216 wrote to memory of 4232 2216 805e348fc105ebb2b837ae53e30d2e80N.exe 91 PID 2216 wrote to memory of 4232 2216 805e348fc105ebb2b837ae53e30d2e80N.exe 91 PID 4232 wrote to memory of 944 4232 8202664.exe 92 PID 4232 wrote to memory of 944 4232 8202664.exe 92 PID 4232 wrote to memory of 944 4232 8202664.exe 92 PID 944 wrote to memory of 4984 944 htbnbb.exe 93 PID 944 wrote to memory of 4984 944 htbnbb.exe 93 PID 944 wrote to memory of 4984 944 htbnbb.exe 93 PID 4984 wrote to memory of 3052 4984 rlfxfxf.exe 94 PID 4984 wrote to memory of 3052 4984 rlfxfxf.exe 94 PID 4984 wrote to memory of 3052 4984 rlfxfxf.exe 94 PID 3052 wrote to memory of 3456 3052 tnhbtt.exe 95 PID 3052 wrote to memory of 3456 3052 tnhbtt.exe 95 PID 3052 wrote to memory of 3456 3052 tnhbtt.exe 95 PID 3456 wrote to memory of 3408 3456 xxxfxfl.exe 96 PID 3456 wrote to memory of 3408 3456 xxxfxfl.exe 96 PID 3456 wrote to memory of 3408 3456 xxxfxfl.exe 96 PID 3408 wrote to memory of 3624 3408 8868260.exe 97 PID 3408 wrote to memory of 3624 3408 8868260.exe 97 PID 3408 wrote to memory of 3624 3408 8868260.exe 97 PID 3624 wrote to memory of 3868 3624 422644.exe 98 PID 3624 wrote to memory of 3868 3624 422644.exe 98 PID 3624 wrote to memory of 3868 3624 422644.exe 98 PID 3868 wrote to memory of 3708 3868 20806.exe 99 PID 3868 wrote to memory of 3708 3868 20806.exe 99 PID 3868 wrote to memory of 3708 3868 20806.exe 99 PID 3708 wrote to memory of 1164 3708 8040002.exe 100 PID 3708 wrote to memory of 1164 3708 8040002.exe 100 PID 3708 wrote to memory of 1164 3708 8040002.exe 100 PID 1164 wrote to memory of 3044 1164 286488.exe 101 PID 1164 wrote to memory of 3044 1164 286488.exe 101 PID 1164 wrote to memory of 3044 1164 286488.exe 101 PID 3044 wrote to memory of 4640 3044 ntbnhn.exe 103 PID 3044 wrote to memory of 4640 3044 ntbnhn.exe 103 PID 3044 wrote to memory of 4640 3044 ntbnhn.exe 103 PID 4640 wrote to memory of 4136 4640 4862266.exe 104 PID 4640 wrote to memory of 4136 4640 4862266.exe 104 PID 4640 wrote to memory of 4136 4640 4862266.exe 104 PID 4136 wrote to memory of 4028 4136 5rffxxr.exe 105 PID 4136 wrote to memory of 4028 4136 5rffxxr.exe 105 PID 4136 wrote to memory of 4028 4136 5rffxxr.exe 105 PID 4028 wrote to memory of 2420 4028 04662.exe 106 PID 4028 wrote to memory of 2420 4028 04662.exe 106 PID 4028 wrote to memory of 2420 4028 04662.exe 106 PID 2420 wrote to memory of 1184 2420 624488.exe 107 PID 2420 wrote to memory of 1184 2420 624488.exe 107 PID 2420 wrote to memory of 1184 2420 624488.exe 107 PID 1184 wrote to memory of 2596 1184 0288226.exe 108 PID 1184 wrote to memory of 2596 1184 0288226.exe 108 PID 1184 wrote to memory of 2596 1184 0288226.exe 108 PID 2596 wrote to memory of 1844 2596 2626604.exe 109 PID 2596 wrote to memory of 1844 2596 2626604.exe 109 PID 2596 wrote to memory of 1844 2596 2626604.exe 109 PID 1844 wrote to memory of 2584 1844 jpvpj.exe 110 PID 1844 wrote to memory of 2584 1844 jpvpj.exe 110 PID 1844 wrote to memory of 2584 1844 jpvpj.exe 110 PID 2584 wrote to memory of 3940 2584 lffxrrr.exe 111 PID 2584 wrote to memory of 3940 2584 lffxrrr.exe 111 PID 2584 wrote to memory of 3940 2584 lffxrrr.exe 111 PID 3940 wrote to memory of 3964 3940 68266.exe 113 PID 3940 wrote to memory of 3964 3940 68266.exe 113 PID 3940 wrote to memory of 3964 3940 68266.exe 113 PID 3964 wrote to memory of 1392 3964 260882.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\805e348fc105ebb2b837ae53e30d2e80N.exe"C:\Users\Admin\AppData\Local\Temp\805e348fc105ebb2b837ae53e30d2e80N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\8202664.exec:\8202664.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
\??\c:\htbnbb.exec:\htbnbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
\??\c:\rlfxfxf.exec:\rlfxfxf.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\tnhbtt.exec:\tnhbtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\xxxfxfl.exec:\xxxfxfl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
\??\c:\8868260.exec:\8868260.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\422644.exec:\422644.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\20806.exec:\20806.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\8040002.exec:\8040002.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\286488.exec:\286488.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\ntbnhn.exec:\ntbnhn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\4862266.exec:\4862266.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
\??\c:\5rffxxr.exec:\5rffxxr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
\??\c:\04662.exec:\04662.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\624488.exec:\624488.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\0288226.exec:\0288226.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\2626604.exec:\2626604.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\jpvpj.exec:\jpvpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\lffxrrr.exec:\lffxrrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\68266.exec:\68266.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
\??\c:\260882.exec:\260882.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\jdvvp.exec:\jdvvp.exe23⤵
- Executes dropped EXE
PID:1392 -
\??\c:\260088.exec:\260088.exe24⤵
- Executes dropped EXE
PID:2692 -
\??\c:\240488.exec:\240488.exe25⤵
- Executes dropped EXE
PID:4352 -
\??\c:\26220.exec:\26220.exe26⤵
- Executes dropped EXE
PID:2684 -
\??\c:\nbhbnn.exec:\nbhbnn.exe27⤵
- Executes dropped EXE
PID:540 -
\??\c:\2422406.exec:\2422406.exe28⤵
- Executes dropped EXE
PID:452 -
\??\c:\6088260.exec:\6088260.exe29⤵
- Executes dropped EXE
PID:1568 -
\??\c:\tntnhb.exec:\tntnhb.exe30⤵
- Executes dropped EXE
PID:3052 -
\??\c:\084844.exec:\084844.exe31⤵
- Executes dropped EXE
PID:3456 -
\??\c:\jjjdp.exec:\jjjdp.exe32⤵
- Executes dropped EXE
PID:3084 -
\??\c:\68004.exec:\68004.exe33⤵
- Executes dropped EXE
PID:1636 -
\??\c:\g4886.exec:\g4886.exe34⤵
- Executes dropped EXE
PID:3068 -
\??\c:\440644.exec:\440644.exe35⤵
- Executes dropped EXE
PID:728 -
\??\c:\hbhhtb.exec:\hbhhtb.exe36⤵
- Executes dropped EXE
PID:3400 -
\??\c:\6288822.exec:\6288822.exe37⤵
- Executes dropped EXE
PID:2428 -
\??\c:\frxrxfx.exec:\frxrxfx.exe38⤵
- Executes dropped EXE
PID:4288 -
\??\c:\dvpjj.exec:\dvpjj.exe39⤵
- Executes dropped EXE
PID:4748 -
\??\c:\q06222.exec:\q06222.exe40⤵
- Executes dropped EXE
PID:948 -
\??\c:\602288.exec:\602288.exe41⤵
- Executes dropped EXE
PID:3472 -
\??\c:\vppjd.exec:\vppjd.exe42⤵
- Executes dropped EXE
PID:3184 -
\??\c:\pdvvp.exec:\pdvvp.exe43⤵
- Executes dropped EXE
PID:1764 -
\??\c:\8448482.exec:\8448482.exe44⤵
- Executes dropped EXE
PID:2416 -
\??\c:\4886044.exec:\4886044.exe45⤵
- Executes dropped EXE
PID:3836 -
\??\c:\4860224.exec:\4860224.exe46⤵
- Executes dropped EXE
PID:3224 -
\??\c:\66260.exec:\66260.exe47⤵
- Executes dropped EXE
PID:2992 -
\??\c:\dvppj.exec:\dvppj.exe48⤵
- Executes dropped EXE
PID:3560 -
\??\c:\tnnnbb.exec:\tnnnbb.exe49⤵
- Executes dropped EXE
PID:2796 -
\??\c:\jjppv.exec:\jjppv.exe50⤵
- Executes dropped EXE
PID:4576 -
\??\c:\402266.exec:\402266.exe51⤵
- Executes dropped EXE
PID:4436 -
\??\c:\nhbbnn.exec:\nhbbnn.exe52⤵
- Executes dropped EXE
PID:2488 -
\??\c:\426488.exec:\426488.exe53⤵
- Executes dropped EXE
PID:4724 -
\??\c:\xxfxxxf.exec:\xxfxxxf.exe54⤵PID:2100
-
\??\c:\dpdvp.exec:\dpdvp.exe55⤵
- Executes dropped EXE
PID:4428 -
\??\c:\ntbttb.exec:\ntbttb.exe56⤵
- Executes dropped EXE
PID:1136 -
\??\c:\40664.exec:\40664.exe57⤵
- Executes dropped EXE
PID:872 -
\??\c:\62260.exec:\62260.exe58⤵
- Executes dropped EXE
PID:3032 -
\??\c:\hbbbnn.exec:\hbbbnn.exe59⤵
- Executes dropped EXE
PID:2600 -
\??\c:\bbtnhh.exec:\bbtnhh.exe60⤵
- Executes dropped EXE
PID:2436 -
\??\c:\xxlflxl.exec:\xxlflxl.exe61⤵
- Executes dropped EXE
PID:1728 -
\??\c:\lxrrlll.exec:\lxrrlll.exe62⤵
- Executes dropped EXE
PID:2128 -
\??\c:\flffffx.exec:\flffffx.exe63⤵
- Executes dropped EXE
PID:4108 -
\??\c:\24240.exec:\24240.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3456 -
\??\c:\xrxrfff.exec:\xrxrfff.exe65⤵
- Executes dropped EXE
PID:532 -
\??\c:\xlrfxfl.exec:\xlrfxfl.exe66⤵
- Executes dropped EXE
PID:1128 -
\??\c:\8844884.exec:\8844884.exe67⤵PID:3068
-
\??\c:\tnhhht.exec:\tnhhht.exe68⤵PID:4564
-
\??\c:\28824.exec:\28824.exe69⤵PID:2712
-
\??\c:\pddvp.exec:\pddvp.exe70⤵PID:2052
-
\??\c:\8022600.exec:\8022600.exe71⤵PID:3240
-
\??\c:\xrlflll.exec:\xrlflll.exe72⤵PID:3328
-
\??\c:\ffffxxx.exec:\ffffxxx.exe73⤵PID:4640
-
\??\c:\644602.exec:\644602.exe74⤵PID:4492
-
\??\c:\djpjv.exec:\djpjv.exe75⤵PID:1300
-
\??\c:\004000.exec:\004000.exe76⤵PID:3336
-
\??\c:\2844222.exec:\2844222.exe77⤵PID:2172
-
\??\c:\a4662.exec:\a4662.exe78⤵PID:384
-
\??\c:\606600.exec:\606600.exe79⤵PID:3088
-
\??\c:\jdvpd.exec:\jdvpd.exe80⤵PID:4664
-
\??\c:\jjjjd.exec:\jjjjd.exe81⤵PID:3556
-
\??\c:\824088.exec:\824088.exe82⤵PID:1444
-
\??\c:\6844448.exec:\6844448.exe83⤵PID:3376
-
\??\c:\nhbttn.exec:\nhbttn.exe84⤵PID:2152
-
\??\c:\84606.exec:\84606.exe85⤵PID:4328
-
\??\c:\6448064.exec:\6448064.exe86⤵PID:4724
-
\??\c:\08660.exec:\08660.exe87⤵PID:4364
-
\??\c:\6804444.exec:\6804444.exe88⤵PID:2296
-
\??\c:\nhnhtb.exec:\nhnhtb.exe89⤵PID:4744
-
\??\c:\6244044.exec:\6244044.exe90⤵PID:872
-
\??\c:\hbttnh.exec:\hbttnh.exe91⤵PID:4992
-
\??\c:\08486.exec:\08486.exe92⤵PID:1912
-
\??\c:\ffrrrxr.exec:\ffrrrxr.exe93⤵PID:2516
-
\??\c:\tnhbnn.exec:\tnhbnn.exe94⤵PID:3804
-
\??\c:\48040.exec:\48040.exe95⤵PID:552
-
\??\c:\flfffxl.exec:\flfffxl.exe96⤵PID:2388
-
\??\c:\lrrrlll.exec:\lrrrlll.exe97⤵PID:4244
-
\??\c:\26282.exec:\26282.exe98⤵PID:456
-
\??\c:\0448226.exec:\0448226.exe99⤵PID:4816
-
\??\c:\nhnnht.exec:\nhnnht.exe100⤵PID:896
-
\??\c:\flrfxrr.exec:\flrfxrr.exe101⤵PID:4564
-
\??\c:\8806600.exec:\8806600.exe102⤵PID:2604
-
\??\c:\hbthbb.exec:\hbthbb.exe103⤵PID:3252
-
\??\c:\nbhhht.exec:\nbhhht.exe104⤵PID:5084
-
\??\c:\4800420.exec:\4800420.exe105⤵PID:3168
-
\??\c:\00262.exec:\00262.exe106⤵PID:5096
-
\??\c:\20462.exec:\20462.exe107⤵PID:3184
-
\??\c:\nttthh.exec:\nttthh.exe108⤵PID:1764
-
\??\c:\nhnhbb.exec:\nhnhbb.exe109⤵PID:2416
-
\??\c:\vvjjp.exec:\vvjjp.exe110⤵PID:2512
-
\??\c:\622666.exec:\622666.exe111⤵PID:3224
-
\??\c:\444488.exec:\444488.exe112⤵PID:4664
-
\??\c:\q86448.exec:\q86448.exe113⤵PID:3556
-
\??\c:\bttbtt.exec:\bttbtt.exe114⤵PID:1444
-
\??\c:\4222006.exec:\4222006.exe115⤵PID:2060
-
\??\c:\btnhbb.exec:\btnhbb.exe116⤵PID:2488
-
\??\c:\dpppd.exec:\dpppd.exe117⤵PID:4328
-
\??\c:\484888.exec:\484888.exe118⤵PID:1560
-
\??\c:\06280.exec:\06280.exe119⤵PID:5060
-
\??\c:\02642.exec:\02642.exe120⤵PID:2044
-
\??\c:\8226222.exec:\8226222.exe121⤵PID:872
-
\??\c:\3pppj.exec:\3pppj.exe122⤵PID:540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-