Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe
-
Size
593KB
-
MD5
8f565607d5530311f703566cfe7dd910
-
SHA1
41c76e769a9e6d5384bab95ae9b9a75a0da3b7ed
-
SHA256
a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5d
-
SHA512
5399fc7c02c8f7b514af95651e5b47d914ef3325cb4d1908e7eac400c63f1fe48ad510737e38effbc67adbaad39afb2822a5f86c5e74422b0c0418b734f67bbc
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayLo:n3C9Lebz+xt4vFeFmgayU
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4692-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3664-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/656-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/632-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3156-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1856-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1020-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3004-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2188-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4348-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4896-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3896-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1144-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4188-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4916-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4280-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3664 w84822.exe 3384 804484.exe 656 3lrllfx.exe 632 846048.exe 4536 0282666.exe 3156 0688266.exe 3344 lrfxxxf.exe 1856 2064826.exe 2648 02642.exe 3088 4284224.exe 4872 tbbtnh.exe 2376 thbthh.exe 1020 flrfxrl.exe 3004 k02648.exe 3052 1nnhtt.exe 4784 ttttnn.exe 2188 pjjdp.exe 4796 pvvpd.exe 4348 044002.exe 1820 2860060.exe 2884 646466.exe 2968 rrxlxrf.exe 3360 ddpjd.exe 4896 vpvjj.exe 3896 64482.exe 1144 4660462.exe 4056 q46682.exe 4188 xrrflfl.exe 5056 004860.exe 4916 0004604.exe 4280 26860.exe 3860 1dddd.exe 2864 44246.exe 1828 i004484.exe 3196 thbnnh.exe 3644 04608.exe 3832 pjdpv.exe 4404 460860.exe 624 428600.exe 1852 42860.exe 2632 o288260.exe 4768 084282.exe 3080 602042.exe 2020 dvdpv.exe 1580 nbbnhh.exe 4344 vdjvj.exe 2488 pvvjv.exe 2696 q68284.exe 2376 08084.exe 1432 7jdvj.exe 3108 6448604.exe 3004 jjvpp.exe 1172 6242604.exe 228 rrrlxrf.exe 2128 3ddpd.exe 772 lllrlxr.exe 2356 lflfxxr.exe 4044 a8820.exe 3884 68224.exe 5096 bttbtt.exe 2320 hhhbnn.exe 3960 djjvp.exe 4216 pjdpj.exe 392 22868.exe -
resource yara_rule behavioral2/memory/4692-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3664-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/656-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/656-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/656-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/632-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3156-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1856-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2648-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1020-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3004-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2188-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3896-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1144-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4188-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4280-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 004860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4242822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ddpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m8864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 884862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6404084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8664260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u842600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3664 4692 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 89 PID 4692 wrote to memory of 3664 4692 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 89 PID 4692 wrote to memory of 3664 4692 a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe 89 PID 3664 wrote to memory of 3384 3664 w84822.exe 90 PID 3664 wrote to memory of 3384 3664 w84822.exe 90 PID 3664 wrote to memory of 3384 3664 w84822.exe 90 PID 3384 wrote to memory of 656 3384 804484.exe 91 PID 3384 wrote to memory of 656 3384 804484.exe 91 PID 3384 wrote to memory of 656 3384 804484.exe 91 PID 656 wrote to memory of 632 656 3lrllfx.exe 92 PID 656 wrote to memory of 632 656 3lrllfx.exe 92 PID 656 wrote to memory of 632 656 3lrllfx.exe 92 PID 632 wrote to memory of 4536 632 846048.exe 93 PID 632 wrote to memory of 4536 632 846048.exe 93 PID 632 wrote to memory of 4536 632 846048.exe 93 PID 4536 wrote to memory of 3156 4536 0282666.exe 94 PID 4536 wrote to memory of 3156 4536 0282666.exe 94 PID 4536 wrote to memory of 3156 4536 0282666.exe 94 PID 3156 wrote to memory of 3344 3156 0688266.exe 95 PID 3156 wrote to memory of 3344 3156 0688266.exe 95 PID 3156 wrote to memory of 3344 3156 0688266.exe 95 PID 3344 wrote to memory of 1856 3344 lrfxxxf.exe 96 PID 3344 wrote to memory of 1856 3344 lrfxxxf.exe 96 PID 3344 wrote to memory of 1856 3344 lrfxxxf.exe 96 PID 1856 wrote to memory of 2648 1856 2064826.exe 97 PID 1856 wrote to memory of 2648 1856 2064826.exe 97 PID 1856 wrote to memory of 2648 1856 2064826.exe 97 PID 2648 wrote to memory of 3088 2648 02642.exe 98 PID 2648 wrote to memory of 3088 2648 02642.exe 98 PID 2648 wrote to memory of 3088 2648 02642.exe 98 PID 3088 wrote to memory of 4872 3088 4284224.exe 99 PID 3088 wrote to memory of 4872 3088 4284224.exe 99 PID 3088 wrote to memory of 4872 3088 4284224.exe 99 PID 4872 wrote to memory of 2376 4872 tbbtnh.exe 100 PID 4872 wrote to memory of 2376 4872 tbbtnh.exe 100 PID 4872 wrote to memory of 2376 4872 tbbtnh.exe 100 PID 2376 wrote to memory of 1020 2376 thbthh.exe 101 PID 2376 wrote to memory of 1020 2376 thbthh.exe 101 PID 2376 wrote to memory of 1020 2376 thbthh.exe 101 PID 1020 wrote to memory of 3004 1020 flrfxrl.exe 102 PID 1020 wrote to memory of 3004 1020 flrfxrl.exe 102 PID 1020 wrote to memory of 3004 1020 flrfxrl.exe 102 PID 3004 wrote to memory of 3052 3004 k02648.exe 103 PID 3004 wrote to memory of 3052 3004 k02648.exe 103 PID 3004 wrote to memory of 3052 3004 k02648.exe 103 PID 3052 wrote to memory of 4784 3052 1nnhtt.exe 104 PID 3052 wrote to memory of 4784 3052 1nnhtt.exe 104 PID 3052 wrote to memory of 4784 3052 1nnhtt.exe 104 PID 4784 wrote to memory of 2188 4784 ttttnn.exe 105 PID 4784 wrote to memory of 2188 4784 ttttnn.exe 105 PID 4784 wrote to memory of 2188 4784 ttttnn.exe 105 PID 2188 wrote to memory of 4796 2188 pjjdp.exe 106 PID 2188 wrote to memory of 4796 2188 pjjdp.exe 106 PID 2188 wrote to memory of 4796 2188 pjjdp.exe 106 PID 4796 wrote to memory of 4348 4796 pvvpd.exe 107 PID 4796 wrote to memory of 4348 4796 pvvpd.exe 107 PID 4796 wrote to memory of 4348 4796 pvvpd.exe 107 PID 4348 wrote to memory of 1820 4348 044002.exe 108 PID 4348 wrote to memory of 1820 4348 044002.exe 108 PID 4348 wrote to memory of 1820 4348 044002.exe 108 PID 1820 wrote to memory of 2884 1820 2860060.exe 109 PID 1820 wrote to memory of 2884 1820 2860060.exe 109 PID 1820 wrote to memory of 2884 1820 2860060.exe 109 PID 2884 wrote to memory of 2968 2884 646466.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe"C:\Users\Admin\AppData\Local\Temp\a15d6fa133e0eb84ba7f926714aa1e20621b141d5fd04a4f1254c089c0289f5dN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\w84822.exec:\w84822.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\804484.exec:\804484.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
\??\c:\3lrllfx.exec:\3lrllfx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\846048.exec:\846048.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\0282666.exec:\0282666.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\0688266.exec:\0688266.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
\??\c:\lrfxxxf.exec:\lrfxxxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\2064826.exec:\2064826.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\02642.exec:\02642.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\4284224.exec:\4284224.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\tbbtnh.exec:\tbbtnh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\thbthh.exec:\thbthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\flrfxrl.exec:\flrfxrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\k02648.exec:\k02648.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\1nnhtt.exec:\1nnhtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\ttttnn.exec:\ttttnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\pjjdp.exec:\pjjdp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\pvvpd.exec:\pvvpd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\044002.exec:\044002.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
\??\c:\2860060.exec:\2860060.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\646466.exec:\646466.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\rrxlxrf.exec:\rrxlxrf.exe23⤵
- Executes dropped EXE
PID:2968 -
\??\c:\ddpjd.exec:\ddpjd.exe24⤵
- Executes dropped EXE
PID:3360 -
\??\c:\vpvjj.exec:\vpvjj.exe25⤵
- Executes dropped EXE
PID:4896 -
\??\c:\64482.exec:\64482.exe26⤵
- Executes dropped EXE
PID:3896 -
\??\c:\4660462.exec:\4660462.exe27⤵
- Executes dropped EXE
PID:1144 -
\??\c:\q46682.exec:\q46682.exe28⤵
- Executes dropped EXE
PID:4056 -
\??\c:\xrrflfl.exec:\xrrflfl.exe29⤵
- Executes dropped EXE
PID:4188 -
\??\c:\004860.exec:\004860.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056 -
\??\c:\0004604.exec:\0004604.exe31⤵
- Executes dropped EXE
PID:4916 -
\??\c:\26860.exec:\26860.exe32⤵
- Executes dropped EXE
PID:4280 -
\??\c:\1dddd.exec:\1dddd.exe33⤵
- Executes dropped EXE
PID:3860 -
\??\c:\44246.exec:\44246.exe34⤵
- Executes dropped EXE
PID:2864 -
\??\c:\i004484.exec:\i004484.exe35⤵
- Executes dropped EXE
PID:1828 -
\??\c:\thbnnh.exec:\thbnnh.exe36⤵
- Executes dropped EXE
PID:3196 -
\??\c:\04608.exec:\04608.exe37⤵
- Executes dropped EXE
PID:3644 -
\??\c:\pjdpv.exec:\pjdpv.exe38⤵
- Executes dropped EXE
PID:3832 -
\??\c:\460860.exec:\460860.exe39⤵
- Executes dropped EXE
PID:4404 -
\??\c:\428600.exec:\428600.exe40⤵
- Executes dropped EXE
PID:624 -
\??\c:\42860.exec:\42860.exe41⤵
- Executes dropped EXE
PID:1852 -
\??\c:\o288260.exec:\o288260.exe42⤵
- Executes dropped EXE
PID:2632 -
\??\c:\084282.exec:\084282.exe43⤵
- Executes dropped EXE
PID:4768 -
\??\c:\602042.exec:\602042.exe44⤵
- Executes dropped EXE
PID:3080 -
\??\c:\dvdpv.exec:\dvdpv.exe45⤵
- Executes dropped EXE
PID:2020 -
\??\c:\nbbnhh.exec:\nbbnhh.exe46⤵
- Executes dropped EXE
PID:1580 -
\??\c:\vdjvj.exec:\vdjvj.exe47⤵
- Executes dropped EXE
PID:4344 -
\??\c:\pvvjv.exec:\pvvjv.exe48⤵
- Executes dropped EXE
PID:2488 -
\??\c:\q68284.exec:\q68284.exe49⤵
- Executes dropped EXE
PID:2696 -
\??\c:\08084.exec:\08084.exe50⤵
- Executes dropped EXE
PID:2376 -
\??\c:\7jdvj.exec:\7jdvj.exe51⤵
- Executes dropped EXE
PID:1432 -
\??\c:\6448604.exec:\6448604.exe52⤵
- Executes dropped EXE
PID:3108 -
\??\c:\jjvpp.exec:\jjvpp.exe53⤵
- Executes dropped EXE
PID:3004 -
\??\c:\6242604.exec:\6242604.exe54⤵
- Executes dropped EXE
PID:1172 -
\??\c:\rrrlxrf.exec:\rrrlxrf.exe55⤵
- Executes dropped EXE
PID:228 -
\??\c:\3ddpd.exec:\3ddpd.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128 -
\??\c:\lllrlxr.exec:\lllrlxr.exe57⤵
- Executes dropped EXE
PID:772 -
\??\c:\lflfxxr.exec:\lflfxxr.exe58⤵
- Executes dropped EXE
PID:2356 -
\??\c:\a8820.exec:\a8820.exe59⤵
- Executes dropped EXE
PID:4044 -
\??\c:\68224.exec:\68224.exe60⤵
- Executes dropped EXE
PID:3884 -
\??\c:\bttbtt.exec:\bttbtt.exe61⤵
- Executes dropped EXE
PID:5096 -
\??\c:\hhhbnn.exec:\hhhbnn.exe62⤵
- Executes dropped EXE
PID:2320 -
\??\c:\djjvp.exec:\djjvp.exe63⤵
- Executes dropped EXE
PID:3960 -
\??\c:\pjdpj.exec:\pjdpj.exe64⤵
- Executes dropped EXE
PID:4216 -
\??\c:\22868.exec:\22868.exe65⤵
- Executes dropped EXE
PID:392 -
\??\c:\86048.exec:\86048.exe66⤵PID:2772
-
\??\c:\bbbbnh.exec:\bbbbnh.exe67⤵PID:4652
-
\??\c:\lrrfxrl.exec:\lrrfxrl.exe68⤵PID:3940
-
\??\c:\3jddp.exec:\3jddp.exe69⤵PID:452
-
\??\c:\xrxrrlx.exec:\xrxrrlx.exe70⤵PID:5020
-
\??\c:\thtnhh.exec:\thtnhh.exe71⤵PID:4916
-
\??\c:\k06084.exec:\k06084.exe72⤵PID:3160
-
\??\c:\2002648.exec:\2002648.exe73⤵PID:5048
-
\??\c:\jppvj.exec:\jppvj.exe74⤵PID:2844
-
\??\c:\66204.exec:\66204.exe75⤵PID:3644
-
\??\c:\4864044.exec:\4864044.exe76⤵PID:3164
-
\??\c:\ppvpp.exec:\ppvpp.exe77⤵PID:2076
-
\??\c:\228682.exec:\228682.exe78⤵PID:2632
-
\??\c:\hnbttn.exec:\hnbttn.exe79⤵PID:3156
-
\??\c:\02206.exec:\02206.exe80⤵PID:4940
-
\??\c:\xflrfxf.exec:\xflrfxf.exe81⤵PID:4748
-
\??\c:\jdjdp.exec:\jdjdp.exe82⤵PID:2708
-
\??\c:\bhhbth.exec:\bhhbth.exe83⤵PID:4344
-
\??\c:\lfrlrfr.exec:\lfrlrfr.exe84⤵PID:2488
-
\??\c:\1hhthb.exec:\1hhthb.exe85⤵PID:1568
-
\??\c:\4468204.exec:\4468204.exe86⤵PID:4860
-
\??\c:\vjdpd.exec:\vjdpd.exe87⤵PID:1684
-
\??\c:\9xxlxfr.exec:\9xxlxfr.exe88⤵PID:4360
-
\??\c:\hbhtbt.exec:\hbhtbt.exe89⤵PID:1576
-
\??\c:\vdpjv.exec:\vdpjv.exe90⤵PID:1220
-
\??\c:\9bbnnh.exec:\9bbnnh.exe91⤵PID:2188
-
\??\c:\bbhtnh.exec:\bbhtnh.exe92⤵PID:3224
-
\??\c:\66266.exec:\66266.exe93⤵PID:772
-
\??\c:\3jjvj.exec:\3jjvj.exe94⤵PID:4544
-
\??\c:\xxrlxrf.exec:\xxrlxrf.exe95⤵PID:2884
-
\??\c:\xlxrrlx.exec:\xlxrrlx.exe96⤵PID:1412
-
\??\c:\lrrfrlx.exec:\lrrfrlx.exe97⤵PID:696
-
\??\c:\8468608.exec:\8468608.exe98⤵PID:4340
-
\??\c:\m8864.exec:\m8864.exe99⤵
- System Location Discovery: System Language Discovery
PID:2300 -
\??\c:\i086486.exec:\i086486.exe100⤵PID:3896
-
\??\c:\7dvjv.exec:\7dvjv.exe101⤵PID:3876
-
\??\c:\jjdvj.exec:\jjdvj.exe102⤵PID:2220
-
\??\c:\vdvvp.exec:\vdvvp.exe103⤵PID:828
-
\??\c:\6664860.exec:\6664860.exe104⤵PID:556
-
\??\c:\bnnhbt.exec:\bnnhbt.exe105⤵PID:4516
-
\??\c:\22648.exec:\22648.exe106⤵PID:4280
-
\??\c:\frfxlfr.exec:\frfxlfr.exe107⤵PID:1180
-
\??\c:\nthtnb.exec:\nthtnb.exe108⤵PID:2180
-
\??\c:\xrlxlxl.exec:\xrlxlxl.exe109⤵PID:1132
-
\??\c:\26240.exec:\26240.exe110⤵PID:5116
-
\??\c:\bnnntt.exec:\bnnntt.exe111⤵PID:208
-
\??\c:\nnnhth.exec:\nnnhth.exe112⤵PID:3112
-
\??\c:\7llrlff.exec:\7llrlff.exe113⤵PID:4840
-
\??\c:\s8866.exec:\s8866.exe114⤵PID:2948
-
\??\c:\206060.exec:\206060.exe115⤵PID:1620
-
\??\c:\062082.exec:\062082.exe116⤵PID:2620
-
\??\c:\ntnnnt.exec:\ntnnnt.exe117⤵PID:2788
-
\??\c:\66260.exec:\66260.exe118⤵PID:4872
-
\??\c:\3fxlxrf.exec:\3fxlxrf.exe119⤵PID:3440
-
\??\c:\dpjvj.exec:\dpjvj.exe120⤵PID:1808
-
\??\c:\64084.exec:\64084.exe121⤵PID:1148
-
\??\c:\hthbnb.exec:\hthbnb.exe122⤵PID:1084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-