Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe
Resource
win7-20240903-en
General
-
Target
d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe
-
Size
76KB
-
MD5
76fc9680c506c6291b48291a08ae8508
-
SHA1
020fcbf433f0e329475c08520cb0a98e133d96ba
-
SHA256
d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279
-
SHA512
1426705a2f123c402bb4b731f41acc6669a4c132985875ffd2d799783418858e96ea94e9ac61b794a69c95a6fa7cca03088d0d36e4b2bd432c733ec03d5b52e2
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmP7w:ymb3NkkiQ3mdBjFIvl358nLA89OMFVHH
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/4832-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4216-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2384-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2468-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2960-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4252-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1916-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1500-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1056-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3464-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1036-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2056-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4472-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2868-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2024-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4216 frxxffx.exe 2468 jdvvv.exe 2384 jvvjd.exe 4644 2802060.exe 2960 846084.exe 4252 w84422.exe 3652 0200448.exe 1916 tnhnnn.exe 1500 2444468.exe 1684 pdjdv.exe 4260 668260.exe 1056 vdjjv.exe 3464 hhthbb.exe 1992 264fxx.exe 2236 rrlxlxf.exe 4004 1djjd.exe 3852 bttttb.exe 5104 k40088.exe 1036 djjdd.exe 216 5hhhhb.exe 4872 vdjdv.exe 4936 84428.exe 2056 0220462.exe 1932 m0262.exe 4472 4024422.exe 4656 nhbhnh.exe 2868 e62600.exe 1920 thtnbn.exe 2024 jppdp.exe 2908 7bhnhh.exe 1664 hbnnbt.exe 2812 nbhbtt.exe 3372 tntnbt.exe 2676 44648.exe 536 rfxlfxr.exe 1944 jdjjj.exe 1700 82640.exe 4912 9xlfffl.exe 1500 rlxxrlf.exe 4864 60022.exe 3480 xxxxffl.exe 2880 8468262.exe 2408 6846046.exe 380 pjjjv.exe 2548 rffrxrf.exe 4008 2668664.exe 2496 9hhhbb.exe 5116 g4684.exe 3856 7vddj.exe 3428 hbhbbh.exe 8 26828.exe 4976 8444448.exe 3284 3tbbhh.exe 3972 jpjjp.exe 4996 rrfxxfr.exe 1460 hbbbbb.exe 4720 04266.exe 984 886600.exe 3508 ttntnh.exe 4804 468866.exe 4444 9jdvj.exe 4216 280822.exe 4492 ntnhtb.exe 2244 426828.exe -
resource yara_rule behavioral2/memory/4832-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4832-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4216-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2384-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2468-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2960-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4252-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1500-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1500-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1500-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1056-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3464-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1992-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1036-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2056-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2868-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s8086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w02660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rlxrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8222222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4042060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 4216 4832 d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe 90 PID 4832 wrote to memory of 4216 4832 d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe 90 PID 4832 wrote to memory of 4216 4832 d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe 90 PID 4216 wrote to memory of 2468 4216 frxxffx.exe 91 PID 4216 wrote to memory of 2468 4216 frxxffx.exe 91 PID 4216 wrote to memory of 2468 4216 frxxffx.exe 91 PID 2468 wrote to memory of 2384 2468 jdvvv.exe 92 PID 2468 wrote to memory of 2384 2468 jdvvv.exe 92 PID 2468 wrote to memory of 2384 2468 jdvvv.exe 92 PID 2384 wrote to memory of 4644 2384 jvvjd.exe 93 PID 2384 wrote to memory of 4644 2384 jvvjd.exe 93 PID 2384 wrote to memory of 4644 2384 jvvjd.exe 93 PID 4644 wrote to memory of 2960 4644 2802060.exe 94 PID 4644 wrote to memory of 2960 4644 2802060.exe 94 PID 4644 wrote to memory of 2960 4644 2802060.exe 94 PID 2960 wrote to memory of 4252 2960 846084.exe 95 PID 2960 wrote to memory of 4252 2960 846084.exe 95 PID 2960 wrote to memory of 4252 2960 846084.exe 95 PID 4252 wrote to memory of 3652 4252 w84422.exe 96 PID 4252 wrote to memory of 3652 4252 w84422.exe 96 PID 4252 wrote to memory of 3652 4252 w84422.exe 96 PID 3652 wrote to memory of 1916 3652 0200448.exe 97 PID 3652 wrote to memory of 1916 3652 0200448.exe 97 PID 3652 wrote to memory of 1916 3652 0200448.exe 97 PID 1916 wrote to memory of 1500 1916 tnhnnn.exe 99 PID 1916 wrote to memory of 1500 1916 tnhnnn.exe 99 PID 1916 wrote to memory of 1500 1916 tnhnnn.exe 99 PID 1500 wrote to memory of 1684 1500 2444468.exe 100 PID 1500 wrote to memory of 1684 1500 2444468.exe 100 PID 1500 wrote to memory of 1684 1500 2444468.exe 100 PID 1684 wrote to memory of 4260 1684 pdjdv.exe 102 PID 1684 wrote to memory of 4260 1684 pdjdv.exe 102 PID 1684 wrote to memory of 4260 1684 pdjdv.exe 102 PID 4260 wrote to memory of 1056 4260 668260.exe 103 PID 4260 wrote to memory of 1056 4260 668260.exe 103 PID 4260 wrote to memory of 1056 4260 668260.exe 103 PID 1056 wrote to memory of 3464 1056 vdjjv.exe 104 PID 1056 wrote to memory of 3464 1056 vdjjv.exe 104 PID 1056 wrote to memory of 3464 1056 vdjjv.exe 104 PID 3464 wrote to memory of 1992 3464 hhthbb.exe 105 PID 3464 wrote to memory of 1992 3464 hhthbb.exe 105 PID 3464 wrote to memory of 1992 3464 hhthbb.exe 105 PID 1992 wrote to memory of 2236 1992 264fxx.exe 106 PID 1992 wrote to memory of 2236 1992 264fxx.exe 106 PID 1992 wrote to memory of 2236 1992 264fxx.exe 106 PID 2236 wrote to memory of 4004 2236 rrlxlxf.exe 107 PID 2236 wrote to memory of 4004 2236 rrlxlxf.exe 107 PID 2236 wrote to memory of 4004 2236 rrlxlxf.exe 107 PID 4004 wrote to memory of 3852 4004 1djjd.exe 108 PID 4004 wrote to memory of 3852 4004 1djjd.exe 108 PID 4004 wrote to memory of 3852 4004 1djjd.exe 108 PID 3852 wrote to memory of 5104 3852 bttttb.exe 109 PID 3852 wrote to memory of 5104 3852 bttttb.exe 109 PID 3852 wrote to memory of 5104 3852 bttttb.exe 109 PID 5104 wrote to memory of 1036 5104 k40088.exe 110 PID 5104 wrote to memory of 1036 5104 k40088.exe 110 PID 5104 wrote to memory of 1036 5104 k40088.exe 110 PID 1036 wrote to memory of 216 1036 djjdd.exe 111 PID 1036 wrote to memory of 216 1036 djjdd.exe 111 PID 1036 wrote to memory of 216 1036 djjdd.exe 111 PID 216 wrote to memory of 4872 216 5hhhhb.exe 112 PID 216 wrote to memory of 4872 216 5hhhhb.exe 112 PID 216 wrote to memory of 4872 216 5hhhhb.exe 112 PID 4872 wrote to memory of 4936 4872 vdjdv.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe"C:\Users\Admin\AppData\Local\Temp\d9aec05d623bb6ffb81286d7f88e0396f0f561816c4e9f6220a5dc1f2e036279.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\frxxffx.exec:\frxxffx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
\??\c:\jdvvv.exec:\jdvvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\jvvjd.exec:\jvvjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\2802060.exec:\2802060.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\846084.exec:\846084.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\w84422.exec:\w84422.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\0200448.exec:\0200448.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\tnhnnn.exec:\tnhnnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\2444468.exec:\2444468.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
\??\c:\pdjdv.exec:\pdjdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\668260.exec:\668260.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\vdjjv.exec:\vdjjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\hhthbb.exec:\hhthbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
\??\c:\264fxx.exec:\264fxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\rrlxlxf.exec:\rrlxlxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\1djjd.exec:\1djjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\bttttb.exec:\bttttb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
\??\c:\k40088.exec:\k40088.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\djjdd.exec:\djjdd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\5hhhhb.exec:\5hhhhb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\vdjdv.exec:\vdjdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\84428.exec:\84428.exe23⤵
- Executes dropped EXE
PID:4936 -
\??\c:\0220462.exec:\0220462.exe24⤵
- Executes dropped EXE
PID:2056 -
\??\c:\m0262.exec:\m0262.exe25⤵
- Executes dropped EXE
PID:1932 -
\??\c:\4024422.exec:\4024422.exe26⤵
- Executes dropped EXE
PID:4472 -
\??\c:\nhbhnh.exec:\nhbhnh.exe27⤵
- Executes dropped EXE
PID:4656 -
\??\c:\e62600.exec:\e62600.exe28⤵
- Executes dropped EXE
PID:2868 -
\??\c:\thtnbn.exec:\thtnbn.exe29⤵
- Executes dropped EXE
PID:1920 -
\??\c:\jppdp.exec:\jppdp.exe30⤵
- Executes dropped EXE
PID:2024 -
\??\c:\7bhnhh.exec:\7bhnhh.exe31⤵
- Executes dropped EXE
PID:2908 -
\??\c:\hbnnbt.exec:\hbnnbt.exe32⤵
- Executes dropped EXE
PID:1664 -
\??\c:\nbhbtt.exec:\nbhbtt.exe33⤵
- Executes dropped EXE
PID:2812 -
\??\c:\tntnbt.exec:\tntnbt.exe34⤵
- Executes dropped EXE
PID:3372 -
\??\c:\44648.exec:\44648.exe35⤵
- Executes dropped EXE
PID:2676 -
\??\c:\rfxlfxr.exec:\rfxlfxr.exe36⤵
- Executes dropped EXE
PID:536 -
\??\c:\jdjjj.exec:\jdjjj.exe37⤵
- Executes dropped EXE
PID:1944 -
\??\c:\82640.exec:\82640.exe38⤵
- Executes dropped EXE
PID:1700 -
\??\c:\9xlfffl.exec:\9xlfffl.exe39⤵
- Executes dropped EXE
PID:4912 -
\??\c:\rlxxrlf.exec:\rlxxrlf.exe40⤵
- Executes dropped EXE
PID:1500 -
\??\c:\60022.exec:\60022.exe41⤵
- Executes dropped EXE
PID:4864 -
\??\c:\xxxxffl.exec:\xxxxffl.exe42⤵
- Executes dropped EXE
PID:3480 -
\??\c:\8468262.exec:\8468262.exe43⤵
- Executes dropped EXE
PID:2880 -
\??\c:\6846046.exec:\6846046.exe44⤵
- Executes dropped EXE
PID:2408 -
\??\c:\pjjjv.exec:\pjjjv.exe45⤵
- Executes dropped EXE
PID:380 -
\??\c:\rffrxrf.exec:\rffrxrf.exe46⤵
- Executes dropped EXE
PID:2548 -
\??\c:\2668664.exec:\2668664.exe47⤵
- Executes dropped EXE
PID:4008 -
\??\c:\9hhhbb.exec:\9hhhbb.exe48⤵
- Executes dropped EXE
PID:2496 -
\??\c:\g4684.exec:\g4684.exe49⤵
- Executes dropped EXE
PID:5116 -
\??\c:\7vddj.exec:\7vddj.exe50⤵
- Executes dropped EXE
PID:3856 -
\??\c:\hbhbbh.exec:\hbhbbh.exe51⤵
- Executes dropped EXE
PID:3428 -
\??\c:\26828.exec:\26828.exe52⤵
- Executes dropped EXE
PID:8 -
\??\c:\8444448.exec:\8444448.exe53⤵
- Executes dropped EXE
PID:4976 -
\??\c:\3tbbhh.exec:\3tbbhh.exe54⤵
- Executes dropped EXE
PID:3284 -
\??\c:\jpjjp.exec:\jpjjp.exe55⤵
- Executes dropped EXE
PID:3972 -
\??\c:\rrfxxfr.exec:\rrfxxfr.exe56⤵
- Executes dropped EXE
PID:4996 -
\??\c:\hbbbbb.exec:\hbbbbb.exe57⤵
- Executes dropped EXE
PID:1460 -
\??\c:\04266.exec:\04266.exe58⤵
- Executes dropped EXE
PID:4720 -
\??\c:\886600.exec:\886600.exe59⤵
- Executes dropped EXE
PID:984 -
\??\c:\ttntnh.exec:\ttntnh.exe60⤵
- Executes dropped EXE
PID:3508 -
\??\c:\468866.exec:\468866.exe61⤵
- Executes dropped EXE
PID:4804 -
\??\c:\9jdvj.exec:\9jdvj.exe62⤵
- Executes dropped EXE
PID:4444 -
\??\c:\280822.exec:\280822.exe63⤵
- Executes dropped EXE
PID:4216 -
\??\c:\ntnhtb.exec:\ntnhtb.exe64⤵
- Executes dropped EXE
PID:4492 -
\??\c:\426828.exec:\426828.exe65⤵
- Executes dropped EXE
PID:2244 -
\??\c:\vpddp.exec:\vpddp.exe66⤵PID:2044
-
\??\c:\thhhnn.exec:\thhhnn.exe67⤵PID:2908
-
\??\c:\282408.exec:\282408.exe68⤵PID:4092
-
\??\c:\02088.exec:\02088.exe69⤵PID:3040
-
\??\c:\rlfxffr.exec:\rlfxffr.exe70⤵PID:924
-
\??\c:\pjjvd.exec:\pjjvd.exe71⤵PID:1640
-
\??\c:\hhbttt.exec:\hhbttt.exe72⤵PID:4992
-
\??\c:\dvppp.exec:\dvppp.exe73⤵PID:892
-
\??\c:\xxllxll.exec:\xxllxll.exe74⤵PID:3680
-
\??\c:\pdppd.exec:\pdppd.exe75⤵PID:1684
-
\??\c:\44220.exec:\44220.exe76⤵PID:3996
-
\??\c:\fxlllrr.exec:\fxlllrr.exe77⤵PID:3444
-
\??\c:\9rxrllf.exec:\9rxrllf.exe78⤵PID:3516
-
\??\c:\9bbbbh.exec:\9bbbbh.exe79⤵PID:2340
-
\??\c:\tbbbtt.exec:\tbbbtt.exe80⤵PID:3564
-
\??\c:\thhhhh.exec:\thhhhh.exe81⤵PID:2136
-
\??\c:\i248046.exec:\i248046.exe82⤵PID:2608
-
\??\c:\ppvvv.exec:\ppvvv.exe83⤵PID:1540
-
\??\c:\202483b.exec:\202483b.exe84⤵PID:4128
-
\??\c:\thbtbb.exec:\thbtbb.exe85⤵PID:1008
-
\??\c:\ntbtnn.exec:\ntbtnn.exe86⤵PID:4000
-
\??\c:\86604.exec:\86604.exe87⤵PID:4368
-
\??\c:\8262260.exec:\8262260.exe88⤵PID:4684
-
\??\c:\frfrllr.exec:\frfrllr.exe89⤵PID:4404
-
\??\c:\nbbthh.exec:\nbbthh.exe90⤵PID:4872
-
\??\c:\3flfxxr.exec:\3flfxxr.exe91⤵PID:3972
-
\??\c:\4466228.exec:\4466228.exe92⤵PID:3320
-
\??\c:\6288882.exec:\6288882.exe93⤵PID:2528
-
\??\c:\lfrxxrr.exec:\lfrxxrr.exe94⤵PID:1932
-
\??\c:\8862286.exec:\8862286.exe95⤵PID:2192
-
\??\c:\20266.exec:\20266.exe96⤵PID:4656
-
\??\c:\1lxxflx.exec:\1lxxflx.exe97⤵PID:4804
-
\??\c:\u622008.exec:\u622008.exe98⤵PID:3360
-
\??\c:\bhnhhb.exec:\bhnhhb.exe99⤵PID:2508
-
\??\c:\6026224.exec:\6026224.exe100⤵PID:4492
-
\??\c:\a2482.exec:\a2482.exe101⤵
- System Location Discovery: System Language Discovery
PID:4352 -
\??\c:\dpvpd.exec:\dpvpd.exe102⤵PID:2044
-
\??\c:\flflffx.exec:\flflffx.exe103⤵PID:2908
-
\??\c:\pjpvp.exec:\pjpvp.exe104⤵PID:4092
-
\??\c:\c622000.exec:\c622000.exe105⤵PID:4664
-
\??\c:\9ttnnn.exec:\9ttnnn.exe106⤵PID:924
-
\??\c:\dpvdv.exec:\dpvdv.exe107⤵PID:1640
-
\??\c:\1vvjv.exec:\1vvjv.exe108⤵PID:4992
-
\??\c:\thhhtn.exec:\thhhtn.exe109⤵PID:892
-
\??\c:\vjppd.exec:\vjppd.exe110⤵PID:3680
-
\??\c:\6404662.exec:\6404662.exe111⤵PID:1684
-
\??\c:\4688228.exec:\4688228.exe112⤵PID:3996
-
\??\c:\xrfxrlf.exec:\xrfxrlf.exe113⤵PID:1508
-
\??\c:\lffxxrr.exec:\lffxxrr.exe114⤵PID:380
-
\??\c:\nbbttn.exec:\nbbttn.exe115⤵PID:5060
-
\??\c:\202266.exec:\202266.exe116⤵PID:2496
-
\??\c:\bhhbhh.exec:\bhhbhh.exe117⤵PID:4488
-
\??\c:\84662.exec:\84662.exe118⤵PID:5116
-
\??\c:\xrfxlfx.exec:\xrfxlfx.exe119⤵PID:5104
-
\??\c:\fflflff.exec:\fflflff.exe120⤵PID:832
-
\??\c:\9dvvp.exec:\9dvvp.exe121⤵PID:2372
-
\??\c:\64484.exec:\64484.exe122⤵PID:1036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-