Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 09:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe
-
Size
69KB
-
MD5
5078693d1ed4ac9bb3f9915b123eb2dd
-
SHA1
7c07df0a4f7eaa7024f057765d8a4942d0dca75b
-
SHA256
25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2
-
SHA512
e2d4c19452eafe33a2e44e6525d6148e6c9a9f40382631c1e1093978be9387f8c2494b729b8b38d1d101a3b377999c1fdae359a1c474ea45f356325fdafe0b05
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdJULh1214ar4f:ymb3NkkiQ3mdBjFIFdJmdar4f
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/1208-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3844-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3844-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2916-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1672-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1980-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/548-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2620-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/412-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3812-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4108-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4024-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5112-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3880-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3576-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/776-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3256-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2096-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3420-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1572-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2592-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4776-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1020-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3468 668828.exe 3844 888226.exe 2916 rr64482.exe 1672 0268686.exe 1980 8444406.exe 2788 8422240.exe 548 8246286.exe 412 086000.exe 2620 3fllffl.exe 3812 4620066.exe 4108 bbtthn.exe 4928 062802.exe 4024 k64444.exe 1868 5rlfrll.exe 5112 tnbtnt.exe 3880 80024.exe 3576 ddjdj.exe 776 8862200.exe 3256 flrffll.exe 704 lxrlrlx.exe 2028 lllxfrr.exe 2096 02402.exe 3420 lfrrxlr.exe 2152 hbnntt.exe 1572 dvvpp.exe 4616 xlrfxxr.exe 2592 82686.exe 4776 tttttn.exe 932 jjjvv.exe 2228 0822666.exe 1020 46246.exe 5032 66864.exe 2268 7pjpv.exe 2872 llxxxff.exe 4632 24222.exe 4316 vvvvd.exe 2768 vpjdd.exe 3516 262222.exe 4272 048828.exe 1548 o006420.exe 1040 hhnnnt.exe 3668 vpvpp.exe 5012 06462.exe 2820 682682.exe 1980 dddpj.exe 1340 jjvvv.exe 3460 xrffxff.exe 1444 xlxlxlx.exe 1248 dvppp.exe 4684 0422404.exe 1976 vvvjv.exe 3548 206662.exe 3500 e08822.exe 4740 2806222.exe 2176 djvpv.exe 2868 40246.exe 1544 k26802.exe 2992 24620.exe 4896 82264.exe 3904 nhhhbh.exe 2800 4848626.exe 540 frrrrrr.exe 5092 ttttnn.exe 3840 800886.exe -
resource yara_rule behavioral2/memory/1208-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3844-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3844-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3844-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2916-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2916-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/548-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/548-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/412-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/412-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2620-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/412-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3812-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3812-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4108-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4024-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5112-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3880-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3576-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/776-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3256-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1572-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2592-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4776-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1020-215-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8444406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 042224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4424666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2664866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 3468 1208 25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe 83 PID 1208 wrote to memory of 3468 1208 25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe 83 PID 1208 wrote to memory of 3468 1208 25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe 83 PID 3468 wrote to memory of 3844 3468 668828.exe 84 PID 3468 wrote to memory of 3844 3468 668828.exe 84 PID 3468 wrote to memory of 3844 3468 668828.exe 84 PID 3844 wrote to memory of 2916 3844 888226.exe 85 PID 3844 wrote to memory of 2916 3844 888226.exe 85 PID 3844 wrote to memory of 2916 3844 888226.exe 85 PID 2916 wrote to memory of 1672 2916 rr64482.exe 86 PID 2916 wrote to memory of 1672 2916 rr64482.exe 86 PID 2916 wrote to memory of 1672 2916 rr64482.exe 86 PID 1672 wrote to memory of 1980 1672 0268686.exe 87 PID 1672 wrote to memory of 1980 1672 0268686.exe 87 PID 1672 wrote to memory of 1980 1672 0268686.exe 87 PID 1980 wrote to memory of 2788 1980 8444406.exe 88 PID 1980 wrote to memory of 2788 1980 8444406.exe 88 PID 1980 wrote to memory of 2788 1980 8444406.exe 88 PID 2788 wrote to memory of 548 2788 8422240.exe 89 PID 2788 wrote to memory of 548 2788 8422240.exe 89 PID 2788 wrote to memory of 548 2788 8422240.exe 89 PID 548 wrote to memory of 412 548 8246286.exe 90 PID 548 wrote to memory of 412 548 8246286.exe 90 PID 548 wrote to memory of 412 548 8246286.exe 90 PID 412 wrote to memory of 2620 412 086000.exe 91 PID 412 wrote to memory of 2620 412 086000.exe 91 PID 412 wrote to memory of 2620 412 086000.exe 91 PID 2620 wrote to memory of 3812 2620 3fllffl.exe 92 PID 2620 wrote to memory of 3812 2620 3fllffl.exe 92 PID 2620 wrote to memory of 3812 2620 3fllffl.exe 92 PID 3812 wrote to memory of 4108 3812 4620066.exe 93 PID 3812 wrote to memory of 4108 3812 4620066.exe 93 PID 3812 wrote to memory of 4108 3812 4620066.exe 93 PID 4108 wrote to memory of 4928 4108 bbtthn.exe 94 PID 4108 wrote to memory of 4928 4108 bbtthn.exe 94 PID 4108 wrote to memory of 4928 4108 bbtthn.exe 94 PID 4928 wrote to memory of 4024 4928 062802.exe 95 PID 4928 wrote to memory of 4024 4928 062802.exe 95 PID 4928 wrote to memory of 4024 4928 062802.exe 95 PID 4024 wrote to memory of 1868 4024 k64444.exe 96 PID 4024 wrote to memory of 1868 4024 k64444.exe 96 PID 4024 wrote to memory of 1868 4024 k64444.exe 96 PID 1868 wrote to memory of 5112 1868 5rlfrll.exe 97 PID 1868 wrote to memory of 5112 1868 5rlfrll.exe 97 PID 1868 wrote to memory of 5112 1868 5rlfrll.exe 97 PID 5112 wrote to memory of 3880 5112 tnbtnt.exe 98 PID 5112 wrote to memory of 3880 5112 tnbtnt.exe 98 PID 5112 wrote to memory of 3880 5112 tnbtnt.exe 98 PID 3880 wrote to memory of 3576 3880 80024.exe 99 PID 3880 wrote to memory of 3576 3880 80024.exe 99 PID 3880 wrote to memory of 3576 3880 80024.exe 99 PID 3576 wrote to memory of 776 3576 ddjdj.exe 100 PID 3576 wrote to memory of 776 3576 ddjdj.exe 100 PID 3576 wrote to memory of 776 3576 ddjdj.exe 100 PID 776 wrote to memory of 3256 776 8862200.exe 101 PID 776 wrote to memory of 3256 776 8862200.exe 101 PID 776 wrote to memory of 3256 776 8862200.exe 101 PID 3256 wrote to memory of 704 3256 flrffll.exe 102 PID 3256 wrote to memory of 704 3256 flrffll.exe 102 PID 3256 wrote to memory of 704 3256 flrffll.exe 102 PID 704 wrote to memory of 2028 704 lxrlrlx.exe 103 PID 704 wrote to memory of 2028 704 lxrlrlx.exe 103 PID 704 wrote to memory of 2028 704 lxrlrlx.exe 103 PID 2028 wrote to memory of 2096 2028 lllxfrr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe"C:\Users\Admin\AppData\Local\Temp\25aaf1597342a25b77d8dce1160f70d8254c0f0da8427ecfb8f552e8dc5168f2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\668828.exec:\668828.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\888226.exec:\888226.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
\??\c:\rr64482.exec:\rr64482.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\0268686.exec:\0268686.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\8444406.exec:\8444406.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\8422240.exec:\8422240.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\8246286.exec:\8246286.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\086000.exec:\086000.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
\??\c:\3fllffl.exec:\3fllffl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\4620066.exec:\4620066.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
\??\c:\bbtthn.exec:\bbtthn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
\??\c:\062802.exec:\062802.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\k64444.exec:\k64444.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\5rlfrll.exec:\5rlfrll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
\??\c:\tnbtnt.exec:\tnbtnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\80024.exec:\80024.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
\??\c:\ddjdj.exec:\ddjdj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\8862200.exec:\8862200.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\flrffll.exec:\flrffll.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
\??\c:\lxrlrlx.exec:\lxrlrlx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704 -
\??\c:\lllxfrr.exec:\lllxfrr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\02402.exec:\02402.exe23⤵
- Executes dropped EXE
PID:2096 -
\??\c:\lfrrxlr.exec:\lfrrxlr.exe24⤵
- Executes dropped EXE
PID:3420 -
\??\c:\hbnntt.exec:\hbnntt.exe25⤵
- Executes dropped EXE
PID:2152 -
\??\c:\dvvpp.exec:\dvvpp.exe26⤵
- Executes dropped EXE
PID:1572 -
\??\c:\xlrfxxr.exec:\xlrfxxr.exe27⤵
- Executes dropped EXE
PID:4616 -
\??\c:\82686.exec:\82686.exe28⤵
- Executes dropped EXE
PID:2592 -
\??\c:\tttttn.exec:\tttttn.exe29⤵
- Executes dropped EXE
PID:4776 -
\??\c:\jjjvv.exec:\jjjvv.exe30⤵
- Executes dropped EXE
PID:932 -
\??\c:\0822666.exec:\0822666.exe31⤵
- Executes dropped EXE
PID:2228 -
\??\c:\46246.exec:\46246.exe32⤵
- Executes dropped EXE
PID:1020 -
\??\c:\66864.exec:\66864.exe33⤵
- Executes dropped EXE
PID:5032 -
\??\c:\7pjpv.exec:\7pjpv.exe34⤵
- Executes dropped EXE
PID:2268 -
\??\c:\llxxxff.exec:\llxxxff.exe35⤵
- Executes dropped EXE
PID:2872 -
\??\c:\24222.exec:\24222.exe36⤵
- Executes dropped EXE
PID:4632 -
\??\c:\vvvvd.exec:\vvvvd.exe37⤵
- Executes dropped EXE
PID:4316 -
\??\c:\vpjdd.exec:\vpjdd.exe38⤵
- Executes dropped EXE
PID:2768 -
\??\c:\262222.exec:\262222.exe39⤵
- Executes dropped EXE
PID:3516 -
\??\c:\048828.exec:\048828.exe40⤵
- Executes dropped EXE
PID:4272 -
\??\c:\o006420.exec:\o006420.exe41⤵
- Executes dropped EXE
PID:1548 -
\??\c:\hhnnnt.exec:\hhnnnt.exe42⤵
- Executes dropped EXE
PID:1040 -
\??\c:\vpvpp.exec:\vpvpp.exe43⤵
- Executes dropped EXE
PID:3668 -
\??\c:\06462.exec:\06462.exe44⤵
- Executes dropped EXE
PID:5012 -
\??\c:\682682.exec:\682682.exe45⤵
- Executes dropped EXE
PID:2820 -
\??\c:\dddpj.exec:\dddpj.exe46⤵
- Executes dropped EXE
PID:1980 -
\??\c:\jjvvv.exec:\jjvvv.exe47⤵
- Executes dropped EXE
PID:1340 -
\??\c:\xrffxff.exec:\xrffxff.exe48⤵
- Executes dropped EXE
PID:3460 -
\??\c:\xlxlxlx.exec:\xlxlxlx.exe49⤵
- Executes dropped EXE
PID:1444 -
\??\c:\dvppp.exec:\dvppp.exe50⤵
- Executes dropped EXE
PID:1248 -
\??\c:\0422404.exec:\0422404.exe51⤵
- Executes dropped EXE
PID:4684 -
\??\c:\vvvjv.exec:\vvvjv.exe52⤵
- Executes dropped EXE
PID:1976 -
\??\c:\206662.exec:\206662.exe53⤵
- Executes dropped EXE
PID:3548 -
\??\c:\e08822.exec:\e08822.exe54⤵
- Executes dropped EXE
PID:3500 -
\??\c:\2806222.exec:\2806222.exe55⤵
- Executes dropped EXE
PID:4740 -
\??\c:\djvpv.exec:\djvpv.exe56⤵
- Executes dropped EXE
PID:2176 -
\??\c:\40246.exec:\40246.exe57⤵
- Executes dropped EXE
PID:2868 -
\??\c:\k26802.exec:\k26802.exe58⤵
- Executes dropped EXE
PID:1544 -
\??\c:\24620.exec:\24620.exe59⤵
- Executes dropped EXE
PID:2992 -
\??\c:\82264.exec:\82264.exe60⤵
- Executes dropped EXE
PID:4896 -
\??\c:\nhhhbh.exec:\nhhhbh.exe61⤵
- Executes dropped EXE
PID:3904 -
\??\c:\4848626.exec:\4848626.exe62⤵
- Executes dropped EXE
PID:2800 -
\??\c:\frrrrrr.exec:\frrrrrr.exe63⤵
- Executes dropped EXE
PID:540 -
\??\c:\ttttnn.exec:\ttttnn.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092 -
\??\c:\800886.exec:\800886.exe65⤵
- Executes dropped EXE
PID:3840 -
\??\c:\tttttn.exec:\tttttn.exe66⤵PID:808
-
\??\c:\804602.exec:\804602.exe67⤵PID:1912
-
\??\c:\08004.exec:\08004.exe68⤵PID:3004
-
\??\c:\64006.exec:\64006.exe69⤵PID:1132
-
\??\c:\066864.exec:\066864.exe70⤵PID:3732
-
\??\c:\djvpd.exec:\djvpd.exe71⤵PID:5108
-
\??\c:\vpddd.exec:\vpddd.exe72⤵PID:1572
-
\??\c:\vjppj.exec:\vjppj.exe73⤵PID:780
-
\??\c:\rxffrlx.exec:\rxffrlx.exe74⤵PID:1376
-
\??\c:\btbntt.exec:\btbntt.exe75⤵PID:2400
-
\??\c:\6460066.exec:\6460066.exe76⤵PID:1680
-
\??\c:\bthbbb.exec:\bthbbb.exe77⤵PID:3756
-
\??\c:\vvddv.exec:\vvddv.exe78⤵PID:1636
-
\??\c:\ddvjp.exec:\ddvjp.exe79⤵PID:2008
-
\??\c:\0600642.exec:\0600642.exe80⤵PID:3524
-
\??\c:\vvvjv.exec:\vvvjv.exe81⤵PID:4008
-
\??\c:\9jvjv.exec:\9jvjv.exe82⤵PID:1364
-
\??\c:\622080.exec:\622080.exe83⤵PID:1584
-
\??\c:\0626022.exec:\0626022.exe84⤵PID:2908
-
\??\c:\620820.exec:\620820.exe85⤵PID:4328
-
\??\c:\pddpj.exec:\pddpj.exe86⤵PID:4336
-
\??\c:\0046484.exec:\0046484.exe87⤵PID:3464
-
\??\c:\tnnnhn.exec:\tnnnhn.exe88⤵PID:4540
-
\??\c:\ppppv.exec:\ppppv.exe89⤵PID:4080
-
\??\c:\22686.exec:\22686.exe90⤵PID:5048
-
\??\c:\nhhhbb.exec:\nhhhbb.exe91⤵PID:4576
-
\??\c:\xxllrxf.exec:\xxllrxf.exe92⤵PID:3952
-
\??\c:\g6288.exec:\g6288.exe93⤵PID:4952
-
\??\c:\rxflfll.exec:\rxflfll.exe94⤵PID:5012
-
\??\c:\lrfxffl.exec:\lrfxffl.exe95⤵PID:3984
-
\??\c:\vddvv.exec:\vddvv.exe96⤵PID:1980
-
\??\c:\0480002.exec:\0480002.exe97⤵PID:1340
-
\??\c:\1nhnhb.exec:\1nhnhb.exe98⤵PID:1624
-
\??\c:\9jppv.exec:\9jppv.exe99⤵PID:4956
-
\??\c:\jvvpj.exec:\jvvpj.exe100⤵PID:3892
-
\??\c:\btnhtn.exec:\btnhtn.exe101⤵PID:1284
-
\??\c:\vddpd.exec:\vddpd.exe102⤵PID:1976
-
\??\c:\6882666.exec:\6882666.exe103⤵PID:3964
-
\??\c:\066600.exec:\066600.exe104⤵PID:4308
-
\??\c:\826802.exec:\826802.exe105⤵PID:4740
-
\??\c:\48468.exec:\48468.exe106⤵PID:4928
-
\??\c:\dvjvv.exec:\dvjvv.exe107⤵PID:2868
-
\??\c:\488888.exec:\488888.exe108⤵PID:3064
-
\??\c:\i622266.exec:\i622266.exe109⤵PID:2992
-
\??\c:\26440.exec:\26440.exe110⤵PID:2616
-
\??\c:\9bnhnn.exec:\9bnhnn.exe111⤵PID:1724
-
\??\c:\806606.exec:\806606.exe112⤵PID:1780
-
\??\c:\48660.exec:\48660.exe113⤵PID:1180
-
\??\c:\vpppp.exec:\vpppp.exe114⤵PID:1204
-
\??\c:\82028.exec:\82028.exe115⤵PID:3888
-
\??\c:\lffxrrl.exec:\lffxrrl.exe116⤵PID:2000
-
\??\c:\xxffxxr.exec:\xxffxxr.exe117⤵PID:2756
-
\??\c:\nntbbh.exec:\nntbbh.exe118⤵PID:1144
-
\??\c:\20846.exec:\20846.exe119⤵PID:4768
-
\??\c:\3frlxlx.exec:\3frlxlx.exe120⤵PID:848
-
\??\c:\dddpv.exec:\dddpv.exe121⤵PID:4600
-
\??\c:\tnhhhn.exec:\tnhhhn.exe122⤵PID:4432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-