Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe
Resource
win7-20240903-en
General
-
Target
85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe
-
Size
74KB
-
MD5
8764a363fad3374c2fc08b91ef510700
-
SHA1
1c0110dfce2730f7abcbd825f128b9b2b68d106f
-
SHA256
85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8
-
SHA512
4a5025dad44ebf3af21daac0ac24da8e967c2175560df413d5a64c06dee81b3fc1fb4d8c64ed9a4b900b4362299cfbdff2c93eac536b084489355796128673e1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmP+d:ymb3NkkiQ3mdBjFIvl358nLA89OMFVHh
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/3396-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3396-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3208-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3196-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2508-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/664-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4260-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3500-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/228-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5044-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1396-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/548-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4084-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1728-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1016-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1904-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4932-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3856-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3208 xfrlllf.exe 4900 606600.exe 3196 nbhbnn.exe 664 5ppjv.exe 2508 806044.exe 4260 484844.exe 3628 06068.exe 3240 404862.exe 3500 484844.exe 228 llflrxx.exe 5044 26484.exe 1396 606400.exe 1616 ddpvj.exe 548 864848.exe 4084 nhtnhh.exe 1728 ntbtnb.exe 1348 68442.exe 2312 240088.exe 1016 822666.exe 1820 48488.exe 2568 0688222.exe 4124 tnnhbb.exe 2404 4622660.exe 1904 822226.exe 60 44048.exe 4152 w88266.exe 4932 2448044.exe 3856 lfffxxx.exe 3152 6662626.exe 4464 thnhhb.exe 4412 hhnhhh.exe 3860 nhbnbb.exe 1672 btntbh.exe 1360 fxlfrrr.exe 3460 28448.exe 1560 1hbbbh.exe 1160 3jdpd.exe 2184 rlrlflf.exe 2352 828228.exe 2056 04266.exe 5052 6244222.exe 3236 82226.exe 4676 fxfflrx.exe 3240 22282.exe 2088 862048.exe 4092 nbbthh.exe 3180 2888266.exe 228 46666.exe 5044 hbnthb.exe 4604 2800408.exe 1248 0462260.exe 692 68448.exe 3088 vpvpd.exe 548 lrrrllf.exe 3772 a0062.exe 3760 08600.exe 3204 68608.exe 2936 tntnht.exe 2312 rxffxxx.exe 928 4026660.exe 980 1pvpv.exe 1820 640826.exe 2596 7ddvp.exe 5032 9jjvv.exe -
resource yara_rule behavioral2/memory/3396-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3396-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3208-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3208-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3196-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/664-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4260-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4260-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4260-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3500-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3500-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3500-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5044-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1396-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1616-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/548-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4084-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1728-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2312-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1016-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1904-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4932-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3856-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-211-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 086666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2648488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i422626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4860048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 606400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rlxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i448266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0664226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxlfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrrflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m4648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8246060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 442606.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3208 3396 85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe 89 PID 3396 wrote to memory of 3208 3396 85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe 89 PID 3396 wrote to memory of 3208 3396 85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe 89 PID 3208 wrote to memory of 4900 3208 xfrlllf.exe 90 PID 3208 wrote to memory of 4900 3208 xfrlllf.exe 90 PID 3208 wrote to memory of 4900 3208 xfrlllf.exe 90 PID 4900 wrote to memory of 3196 4900 606600.exe 91 PID 4900 wrote to memory of 3196 4900 606600.exe 91 PID 4900 wrote to memory of 3196 4900 606600.exe 91 PID 3196 wrote to memory of 664 3196 nbhbnn.exe 92 PID 3196 wrote to memory of 664 3196 nbhbnn.exe 92 PID 3196 wrote to memory of 664 3196 nbhbnn.exe 92 PID 664 wrote to memory of 2508 664 5ppjv.exe 93 PID 664 wrote to memory of 2508 664 5ppjv.exe 93 PID 664 wrote to memory of 2508 664 5ppjv.exe 93 PID 2508 wrote to memory of 4260 2508 806044.exe 94 PID 2508 wrote to memory of 4260 2508 806044.exe 94 PID 2508 wrote to memory of 4260 2508 806044.exe 94 PID 4260 wrote to memory of 3628 4260 484844.exe 95 PID 4260 wrote to memory of 3628 4260 484844.exe 95 PID 4260 wrote to memory of 3628 4260 484844.exe 95 PID 3628 wrote to memory of 3240 3628 06068.exe 96 PID 3628 wrote to memory of 3240 3628 06068.exe 96 PID 3628 wrote to memory of 3240 3628 06068.exe 96 PID 3240 wrote to memory of 3500 3240 404862.exe 97 PID 3240 wrote to memory of 3500 3240 404862.exe 97 PID 3240 wrote to memory of 3500 3240 404862.exe 97 PID 3500 wrote to memory of 228 3500 484844.exe 98 PID 3500 wrote to memory of 228 3500 484844.exe 98 PID 3500 wrote to memory of 228 3500 484844.exe 98 PID 228 wrote to memory of 5044 228 llflrxx.exe 99 PID 228 wrote to memory of 5044 228 llflrxx.exe 99 PID 228 wrote to memory of 5044 228 llflrxx.exe 99 PID 5044 wrote to memory of 1396 5044 26484.exe 100 PID 5044 wrote to memory of 1396 5044 26484.exe 100 PID 5044 wrote to memory of 1396 5044 26484.exe 100 PID 1396 wrote to memory of 1616 1396 606400.exe 101 PID 1396 wrote to memory of 1616 1396 606400.exe 101 PID 1396 wrote to memory of 1616 1396 606400.exe 101 PID 1616 wrote to memory of 548 1616 ddpvj.exe 102 PID 1616 wrote to memory of 548 1616 ddpvj.exe 102 PID 1616 wrote to memory of 548 1616 ddpvj.exe 102 PID 548 wrote to memory of 4084 548 864848.exe 103 PID 548 wrote to memory of 4084 548 864848.exe 103 PID 548 wrote to memory of 4084 548 864848.exe 103 PID 4084 wrote to memory of 1728 4084 nhtnhh.exe 104 PID 4084 wrote to memory of 1728 4084 nhtnhh.exe 104 PID 4084 wrote to memory of 1728 4084 nhtnhh.exe 104 PID 1728 wrote to memory of 1348 1728 ntbtnb.exe 105 PID 1728 wrote to memory of 1348 1728 ntbtnb.exe 105 PID 1728 wrote to memory of 1348 1728 ntbtnb.exe 105 PID 1348 wrote to memory of 2312 1348 68442.exe 106 PID 1348 wrote to memory of 2312 1348 68442.exe 106 PID 1348 wrote to memory of 2312 1348 68442.exe 106 PID 2312 wrote to memory of 1016 2312 240088.exe 107 PID 2312 wrote to memory of 1016 2312 240088.exe 107 PID 2312 wrote to memory of 1016 2312 240088.exe 107 PID 1016 wrote to memory of 1820 1016 822666.exe 108 PID 1016 wrote to memory of 1820 1016 822666.exe 108 PID 1016 wrote to memory of 1820 1016 822666.exe 108 PID 1820 wrote to memory of 2568 1820 48488.exe 109 PID 1820 wrote to memory of 2568 1820 48488.exe 109 PID 1820 wrote to memory of 2568 1820 48488.exe 109 PID 2568 wrote to memory of 4124 2568 0688222.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe"C:\Users\Admin\AppData\Local\Temp\85da4b1d30bc15e6476daafe71c4184cea93687acf6fdcb75528952efbb782c8N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
\??\c:\xfrlllf.exec:\xfrlllf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\606600.exec:\606600.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\nbhbnn.exec:\nbhbnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
\??\c:\5ppjv.exec:\5ppjv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:664 -
\??\c:\806044.exec:\806044.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\484844.exec:\484844.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\06068.exec:\06068.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\404862.exec:\404862.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
\??\c:\484844.exec:\484844.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
\??\c:\llflrxx.exec:\llflrxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
\??\c:\26484.exec:\26484.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\606400.exec:\606400.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
\??\c:\ddpvj.exec:\ddpvj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\864848.exec:\864848.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\nhtnhh.exec:\nhtnhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\ntbtnb.exec:\ntbtnb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\68442.exec:\68442.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\240088.exec:\240088.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\822666.exec:\822666.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\48488.exec:\48488.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\0688222.exec:\0688222.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\tnnhbb.exec:\tnnhbb.exe23⤵
- Executes dropped EXE
PID:4124 -
\??\c:\4622660.exec:\4622660.exe24⤵
- Executes dropped EXE
PID:2404 -
\??\c:\822226.exec:\822226.exe25⤵
- Executes dropped EXE
PID:1904 -
\??\c:\44048.exec:\44048.exe26⤵
- Executes dropped EXE
PID:60 -
\??\c:\w88266.exec:\w88266.exe27⤵
- Executes dropped EXE
PID:4152 -
\??\c:\2448044.exec:\2448044.exe28⤵
- Executes dropped EXE
PID:4932 -
\??\c:\lfffxxx.exec:\lfffxxx.exe29⤵
- Executes dropped EXE
PID:3856 -
\??\c:\6662626.exec:\6662626.exe30⤵
- Executes dropped EXE
PID:3152 -
\??\c:\thnhhb.exec:\thnhhb.exe31⤵
- Executes dropped EXE
PID:4464 -
\??\c:\hhnhhh.exec:\hhnhhh.exe32⤵
- Executes dropped EXE
PID:4412 -
\??\c:\nhbnbb.exec:\nhbnbb.exe33⤵
- Executes dropped EXE
PID:3860 -
\??\c:\btntbh.exec:\btntbh.exe34⤵
- Executes dropped EXE
PID:1672 -
\??\c:\fxlfrrr.exec:\fxlfrrr.exe35⤵
- Executes dropped EXE
PID:1360 -
\??\c:\28448.exec:\28448.exe36⤵
- Executes dropped EXE
PID:3460 -
\??\c:\1hbbbh.exec:\1hbbbh.exe37⤵
- Executes dropped EXE
PID:1560 -
\??\c:\3jdpd.exec:\3jdpd.exe38⤵
- Executes dropped EXE
PID:1160 -
\??\c:\rlrlflf.exec:\rlrlflf.exe39⤵
- Executes dropped EXE
PID:2184 -
\??\c:\828228.exec:\828228.exe40⤵
- Executes dropped EXE
PID:2352 -
\??\c:\04266.exec:\04266.exe41⤵
- Executes dropped EXE
PID:2056 -
\??\c:\6244222.exec:\6244222.exe42⤵
- Executes dropped EXE
PID:5052 -
\??\c:\82226.exec:\82226.exe43⤵
- Executes dropped EXE
PID:3236 -
\??\c:\fxfflrx.exec:\fxfflrx.exe44⤵
- Executes dropped EXE
PID:4676 -
\??\c:\22282.exec:\22282.exe45⤵
- Executes dropped EXE
PID:3240 -
\??\c:\862048.exec:\862048.exe46⤵
- Executes dropped EXE
PID:2088 -
\??\c:\nbbthh.exec:\nbbthh.exe47⤵
- Executes dropped EXE
PID:4092 -
\??\c:\2888266.exec:\2888266.exe48⤵
- Executes dropped EXE
PID:3180 -
\??\c:\46666.exec:\46666.exe49⤵
- Executes dropped EXE
PID:228 -
\??\c:\hbnthb.exec:\hbnthb.exe50⤵
- Executes dropped EXE
PID:5044 -
\??\c:\2800408.exec:\2800408.exe51⤵
- Executes dropped EXE
PID:4604 -
\??\c:\0462260.exec:\0462260.exe52⤵
- Executes dropped EXE
PID:1248 -
\??\c:\68448.exec:\68448.exe53⤵
- Executes dropped EXE
PID:692 -
\??\c:\vpvpd.exec:\vpvpd.exe54⤵
- Executes dropped EXE
PID:3088 -
\??\c:\lrrrllf.exec:\lrrrllf.exe55⤵
- Executes dropped EXE
PID:548 -
\??\c:\a0062.exec:\a0062.exe56⤵
- Executes dropped EXE
PID:3772 -
\??\c:\08600.exec:\08600.exe57⤵
- Executes dropped EXE
PID:3760 -
\??\c:\68608.exec:\68608.exe58⤵
- Executes dropped EXE
PID:3204 -
\??\c:\tntnht.exec:\tntnht.exe59⤵
- Executes dropped EXE
PID:2936 -
\??\c:\rxffxxx.exec:\rxffxxx.exe60⤵
- Executes dropped EXE
PID:2312 -
\??\c:\4026660.exec:\4026660.exe61⤵
- Executes dropped EXE
PID:928 -
\??\c:\1pvpv.exec:\1pvpv.exe62⤵
- Executes dropped EXE
PID:980 -
\??\c:\640826.exec:\640826.exe63⤵
- Executes dropped EXE
PID:1820 -
\??\c:\7ddvp.exec:\7ddvp.exe64⤵
- Executes dropped EXE
PID:2596 -
\??\c:\9jjvv.exec:\9jjvv.exe65⤵
- Executes dropped EXE
PID:5032 -
\??\c:\40086.exec:\40086.exe66⤵PID:2852
-
\??\c:\xllxfrx.exec:\xllxfrx.exe67⤵PID:1684
-
\??\c:\0860262.exec:\0860262.exe68⤵PID:1956
-
\??\c:\hnhthn.exec:\hnhthn.exe69⤵PID:2004
-
\??\c:\1lfxrll.exec:\1lfxrll.exe70⤵PID:4152
-
\??\c:\thnhtt.exec:\thnhtt.exe71⤵PID:5040
-
\??\c:\82220.exec:\82220.exe72⤵PID:4892
-
\??\c:\s8826.exec:\s8826.exe73⤵PID:2484
-
\??\c:\824446.exec:\824446.exe74⤵PID:1864
-
\??\c:\4024860.exec:\4024860.exe75⤵PID:3412
-
\??\c:\00060.exec:\00060.exe76⤵PID:3632
-
\??\c:\pjjdd.exec:\pjjdd.exe77⤵PID:2084
-
\??\c:\k22266.exec:\k22266.exe78⤵PID:672
-
\??\c:\9dvpd.exec:\9dvpd.exe79⤵PID:4832
-
\??\c:\k48260.exec:\k48260.exe80⤵PID:1944
-
\??\c:\rrrlffx.exec:\rrrlffx.exe81⤵PID:2132
-
\??\c:\frrfrlr.exec:\frrfrlr.exe82⤵PID:664
-
\??\c:\rrlxxlf.exec:\rrlxxlf.exe83⤵PID:3700
-
\??\c:\bttttt.exec:\bttttt.exe84⤵PID:3140
-
\??\c:\rllfxxx.exec:\rllfxxx.exe85⤵PID:3116
-
\??\c:\00600.exec:\00600.exe86⤵PID:5112
-
\??\c:\7xxrffr.exec:\7xxrffr.exe87⤵PID:4952
-
\??\c:\ppjjd.exec:\ppjjd.exe88⤵PID:3604
-
\??\c:\pdvjv.exec:\pdvjv.exe89⤵PID:116
-
\??\c:\m0264.exec:\m0264.exe90⤵PID:4476
-
\??\c:\e44422.exec:\e44422.exe91⤵PID:2916
-
\??\c:\200088.exec:\200088.exe92⤵PID:3908
-
\??\c:\vjvjj.exec:\vjvjj.exe93⤵PID:2540
-
\??\c:\dvpjj.exec:\dvpjj.exe94⤵PID:1492
-
\??\c:\jvvpd.exec:\jvvpd.exe95⤵PID:1548
-
\??\c:\xlxrfxr.exec:\xlxrfxr.exe96⤵PID:3352
-
\??\c:\22266.exec:\22266.exe97⤵PID:2240
-
\??\c:\02464.exec:\02464.exe98⤵PID:548
-
\??\c:\tnhbnn.exec:\tnhbnn.exe99⤵PID:3556
-
\??\c:\fxlrfrf.exec:\fxlrfrf.exe100⤵PID:4296
-
\??\c:\dpjjd.exec:\dpjjd.exe101⤵PID:3044
-
\??\c:\o484282.exec:\o484282.exe102⤵PID:3300
-
\??\c:\246604.exec:\246604.exe103⤵PID:4988
-
\??\c:\hbbtbt.exec:\hbbtbt.exe104⤵PID:4156
-
\??\c:\66860.exec:\66860.exe105⤵PID:2568
-
\??\c:\rrfxrrx.exec:\rrfxrrx.exe106⤵PID:4124
-
\??\c:\3hnhtb.exec:\3hnhtb.exe107⤵PID:4212
-
\??\c:\8282000.exec:\8282000.exe108⤵PID:1592
-
\??\c:\ppdjj.exec:\ppdjj.exe109⤵PID:1904
-
\??\c:\fflllll.exec:\fflllll.exe110⤵PID:4572
-
\??\c:\3bbhbh.exec:\3bbhbh.exe111⤵PID:1956
-
\??\c:\i448266.exec:\i448266.exe112⤵
- System Location Discovery: System Language Discovery
PID:2268 -
\??\c:\xlxrrlx.exec:\xlxrrlx.exe113⤵PID:1320
-
\??\c:\djpjj.exec:\djpjj.exe114⤵PID:5040
-
\??\c:\llxxlfr.exec:\llxxlfr.exe115⤵PID:4540
-
\??\c:\3rxrrff.exec:\3rxrrff.exe116⤵PID:788
-
\??\c:\82440.exec:\82440.exe117⤵PID:1244
-
\??\c:\2248660.exec:\2248660.exe118⤵PID:3208
-
\??\c:\862640.exec:\862640.exe119⤵PID:3632
-
\??\c:\06008.exec:\06008.exe120⤵PID:2856
-
\??\c:\w62082.exec:\w62082.exe121⤵PID:2660
-
\??\c:\8248400.exec:\8248400.exe122⤵PID:2272
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-