Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe
Resource
win7-20240903-en
General
-
Target
695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe
-
Size
49KB
-
MD5
3b9eedf4db998c4f18a0c7ce94a47e44
-
SHA1
8e68b50ae5c2f8b589727f0c9135da44646f03d8
-
SHA256
695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15
-
SHA512
173fc95204b3924949ee001675e653b40e8cafdc3ef0f9b7e5d9e870067eb55b01c6d62ec5b73ab1740733d0ba7d07a50a066fb636246c48b16ae9808e2dbcfc
-
SSDEEP
1536:mAocdpeVoBDulhzHMb7xNAa04Mcg5bx7DUa:0cdpeeBSHHMHLf9Rybx7D5
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3128-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3328-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2724-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1864-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2880-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3016-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/832-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4756-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/756-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4332-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/524-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2452-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/32-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1784-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3396-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2168-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5004-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/624-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4468-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3956-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4148-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3828-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1404-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1908-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4340-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3128-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1844-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4276-274-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1228-278-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3960-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4456-298-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2384-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-315-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2284-364-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-384-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1744-392-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3332-405-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3620-424-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-470-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-480-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/396-493-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4708-518-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-522-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2464-586-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1672-638-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-651-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1748-688-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3284-695-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2284-744-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-766-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-815-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2232-1140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2748-1268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tbbtbb.exexrlrrfr.exebbttnn.exevvpjv.exebbhbtt.exebnttnn.exe3vdvv.exeo022688.exek60660.exe0060448.exe804208.exe8066666.exe088222.exehhbnnb.exebtnbtt.exe04002.exexrrlffx.exek26660.exes8042.exe5htbtt.exetbhbbh.exeo682288.exee20060.exe0026222.exevdvpj.exe5nthtn.exe7pvpv.exevpdvj.exe828204.exe7bbtnb.exeffrrxrx.exe9ffxxrr.exeq62044.exebtbtht.exerllfrrl.exeflxrllf.exei406460.exe1lfxxrl.exe488204.exe6060882.exe3xrfxrf.exe9nnbtn.exehhhbnh.exe80264.exevvjvv.exe6862600.exe6264286.exejjjpd.exe26068.exethhtbn.exem6824.exejjvpj.exe040464.exe480088.exe20826.exelflfrlf.exevdddd.exee28222.exe2460822.exe28482.exe600004.exe042280.exes8488.exeppvpp.exepid Process 1864 tbbtbb.exe 2724 xrlrrfr.exe 3328 bbttnn.exe 2880 vvpjv.exe 2928 bbhbtt.exe 3016 bnttnn.exe 4756 3vdvv.exe 832 o022688.exe 756 k60660.exe 2936 0060448.exe 4332 804208.exe 524 8066666.exe 2144 088222.exe 2452 hhbnnb.exe 32 btnbtt.exe 1768 04002.exe 4524 xrrlffx.exe 1784 k26660.exe 2168 s8042.exe 3396 5htbtt.exe 4636 tbhbbh.exe 1212 o682288.exe 5004 e20060.exe 624 0026222.exe 4468 vdvpj.exe 3956 5nthtn.exe 4148 7pvpv.exe 3468 vpdvj.exe 3848 828204.exe 3408 7bbtnb.exe 4560 ffrrxrx.exe 4972 9ffxxrr.exe 2124 q62044.exe 2172 btbtht.exe 3828 rllfrrl.exe 4252 flxrllf.exe 1404 i406460.exe 3376 1lfxxrl.exe 4964 488204.exe 2976 6060882.exe 3088 3xrfxrf.exe 3640 9nnbtn.exe 1908 hhhbnh.exe 3940 80264.exe 1340 vvjvv.exe 1972 6862600.exe 4352 6264286.exe 4340 jjjpd.exe 3128 26068.exe 4212 thhtbn.exe 532 m6824.exe 976 jjvpj.exe 3328 040464.exe 1844 480088.exe 4852 20826.exe 4276 lflfrlf.exe 1228 vdddd.exe 3016 e28222.exe 2536 2460822.exe 3960 28482.exe 1472 600004.exe 2396 042280.exe 4456 s8488.exe 2384 ppvpp.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
626660.exe44882.exe24622.exei406460.exe60420.exes0648.exe2682026.exe4466444.exe8882604.exefxfxffl.exelfrrrrx.exebbbttt.exedpjdp.exe06226.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 626660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i406460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2682026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4466444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8882604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06226.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exetbbtbb.exexrlrrfr.exebbttnn.exevvpjv.exebbhbtt.exebnttnn.exe3vdvv.exeo022688.exek60660.exe0060448.exe804208.exe8066666.exe088222.exehhbnnb.exebtnbtt.exe04002.exexrrlffx.exek26660.exes8042.exe5htbtt.exetbhbbh.exedescription pid Process procid_target PID 3128 wrote to memory of 1864 3128 695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe 82 PID 3128 wrote to memory of 1864 3128 695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe 82 PID 3128 wrote to memory of 1864 3128 695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe 82 PID 1864 wrote to memory of 2724 1864 tbbtbb.exe 83 PID 1864 wrote to memory of 2724 1864 tbbtbb.exe 83 PID 1864 wrote to memory of 2724 1864 tbbtbb.exe 83 PID 2724 wrote to memory of 3328 2724 xrlrrfr.exe 84 PID 2724 wrote to memory of 3328 2724 xrlrrfr.exe 84 PID 2724 wrote to memory of 3328 2724 xrlrrfr.exe 84 PID 3328 wrote to memory of 2880 3328 bbttnn.exe 85 PID 3328 wrote to memory of 2880 3328 bbttnn.exe 85 PID 3328 wrote to memory of 2880 3328 bbttnn.exe 85 PID 2880 wrote to memory of 2928 2880 vvpjv.exe 86 PID 2880 wrote to memory of 2928 2880 vvpjv.exe 86 PID 2880 wrote to memory of 2928 2880 vvpjv.exe 86 PID 2928 wrote to memory of 3016 2928 bbhbtt.exe 87 PID 2928 wrote to memory of 3016 2928 bbhbtt.exe 87 PID 2928 wrote to memory of 3016 2928 bbhbtt.exe 87 PID 3016 wrote to memory of 4756 3016 bnttnn.exe 88 PID 3016 wrote to memory of 4756 3016 bnttnn.exe 88 PID 3016 wrote to memory of 4756 3016 bnttnn.exe 88 PID 4756 wrote to memory of 832 4756 3vdvv.exe 89 PID 4756 wrote to memory of 832 4756 3vdvv.exe 89 PID 4756 wrote to memory of 832 4756 3vdvv.exe 89 PID 832 wrote to memory of 756 832 o022688.exe 90 PID 832 wrote to memory of 756 832 o022688.exe 90 PID 832 wrote to memory of 756 832 o022688.exe 90 PID 756 wrote to memory of 2936 756 k60660.exe 91 PID 756 wrote to memory of 2936 756 k60660.exe 91 PID 756 wrote to memory of 2936 756 k60660.exe 91 PID 2936 wrote to memory of 4332 2936 0060448.exe 92 PID 2936 wrote to memory of 4332 2936 0060448.exe 92 PID 2936 wrote to memory of 4332 2936 0060448.exe 92 PID 4332 wrote to memory of 524 4332 804208.exe 93 PID 4332 wrote to memory of 524 4332 804208.exe 93 PID 4332 wrote to memory of 524 4332 804208.exe 93 PID 524 wrote to memory of 2144 524 8066666.exe 94 PID 524 wrote to memory of 2144 524 8066666.exe 94 PID 524 wrote to memory of 2144 524 8066666.exe 94 PID 2144 wrote to memory of 2452 2144 088222.exe 95 PID 2144 wrote to memory of 2452 2144 088222.exe 95 PID 2144 wrote to memory of 2452 2144 088222.exe 95 PID 2452 wrote to memory of 32 2452 hhbnnb.exe 96 PID 2452 wrote to memory of 32 2452 hhbnnb.exe 96 PID 2452 wrote to memory of 32 2452 hhbnnb.exe 96 PID 32 wrote to memory of 1768 32 btnbtt.exe 97 PID 32 wrote to memory of 1768 32 btnbtt.exe 97 PID 32 wrote to memory of 1768 32 btnbtt.exe 97 PID 1768 wrote to memory of 4524 1768 04002.exe 98 PID 1768 wrote to memory of 4524 1768 04002.exe 98 PID 1768 wrote to memory of 4524 1768 04002.exe 98 PID 4524 wrote to memory of 1784 4524 xrrlffx.exe 99 PID 4524 wrote to memory of 1784 4524 xrrlffx.exe 99 PID 4524 wrote to memory of 1784 4524 xrrlffx.exe 99 PID 1784 wrote to memory of 2168 1784 k26660.exe 100 PID 1784 wrote to memory of 2168 1784 k26660.exe 100 PID 1784 wrote to memory of 2168 1784 k26660.exe 100 PID 2168 wrote to memory of 3396 2168 s8042.exe 101 PID 2168 wrote to memory of 3396 2168 s8042.exe 101 PID 2168 wrote to memory of 3396 2168 s8042.exe 101 PID 3396 wrote to memory of 4636 3396 5htbtt.exe 102 PID 3396 wrote to memory of 4636 3396 5htbtt.exe 102 PID 3396 wrote to memory of 4636 3396 5htbtt.exe 102 PID 4636 wrote to memory of 1212 4636 tbhbbh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe"C:\Users\Admin\AppData\Local\Temp\695df4f9eb709628fbaff8fde466997c6373d3efd15bb683bc580d8d60421f15.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
\??\c:\tbbtbb.exec:\tbbtbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\xrlrrfr.exec:\xrlrrfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\bbttnn.exec:\bbttnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
\??\c:\vvpjv.exec:\vvpjv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
\??\c:\bbhbtt.exec:\bbhbtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\bnttnn.exec:\bnttnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\3vdvv.exec:\3vdvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\o022688.exec:\o022688.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
\??\c:\k60660.exec:\k60660.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
\??\c:\0060448.exec:\0060448.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\804208.exec:\804208.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332 -
\??\c:\8066666.exec:\8066666.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\088222.exec:\088222.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\hhbnnb.exec:\hhbnnb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\btnbtt.exec:\btnbtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:32 -
\??\c:\04002.exec:\04002.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\xrrlffx.exec:\xrrlffx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\k26660.exec:\k26660.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\s8042.exec:\s8042.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168 -
\??\c:\5htbtt.exec:\5htbtt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
\??\c:\tbhbbh.exec:\tbhbbh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\o682288.exec:\o682288.exe23⤵
- Executes dropped EXE
PID:1212 -
\??\c:\e20060.exec:\e20060.exe24⤵
- Executes dropped EXE
PID:5004 -
\??\c:\0026222.exec:\0026222.exe25⤵
- Executes dropped EXE
PID:624 -
\??\c:\vdvpj.exec:\vdvpj.exe26⤵
- Executes dropped EXE
PID:4468 -
\??\c:\5nthtn.exec:\5nthtn.exe27⤵
- Executes dropped EXE
PID:3956 -
\??\c:\7pvpv.exec:\7pvpv.exe28⤵
- Executes dropped EXE
PID:4148 -
\??\c:\vpdvj.exec:\vpdvj.exe29⤵
- Executes dropped EXE
PID:3468 -
\??\c:\828204.exec:\828204.exe30⤵
- Executes dropped EXE
PID:3848 -
\??\c:\7bbtnb.exec:\7bbtnb.exe31⤵
- Executes dropped EXE
PID:3408 -
\??\c:\ffrrxrx.exec:\ffrrxrx.exe32⤵
- Executes dropped EXE
PID:4560 -
\??\c:\9ffxxrr.exec:\9ffxxrr.exe33⤵
- Executes dropped EXE
PID:4972 -
\??\c:\q62044.exec:\q62044.exe34⤵
- Executes dropped EXE
PID:2124 -
\??\c:\btbtht.exec:\btbtht.exe35⤵
- Executes dropped EXE
PID:2172 -
\??\c:\rllfrrl.exec:\rllfrrl.exe36⤵
- Executes dropped EXE
PID:3828 -
\??\c:\flxrllf.exec:\flxrllf.exe37⤵
- Executes dropped EXE
PID:4252 -
\??\c:\i406460.exec:\i406460.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1404 -
\??\c:\1lfxxrl.exec:\1lfxxrl.exe39⤵
- Executes dropped EXE
PID:3376 -
\??\c:\488204.exec:\488204.exe40⤵
- Executes dropped EXE
PID:4964 -
\??\c:\6060882.exec:\6060882.exe41⤵
- Executes dropped EXE
PID:2976 -
\??\c:\3xrfxrf.exec:\3xrfxrf.exe42⤵
- Executes dropped EXE
PID:3088 -
\??\c:\9nnbtn.exec:\9nnbtn.exe43⤵
- Executes dropped EXE
PID:3640 -
\??\c:\hhhbnh.exec:\hhhbnh.exe44⤵
- Executes dropped EXE
PID:1908 -
\??\c:\80264.exec:\80264.exe45⤵
- Executes dropped EXE
PID:3940 -
\??\c:\vvjvv.exec:\vvjvv.exe46⤵
- Executes dropped EXE
PID:1340 -
\??\c:\6862600.exec:\6862600.exe47⤵
- Executes dropped EXE
PID:1972 -
\??\c:\6264286.exec:\6264286.exe48⤵
- Executes dropped EXE
PID:4352 -
\??\c:\jjjpd.exec:\jjjpd.exe49⤵
- Executes dropped EXE
PID:4340 -
\??\c:\26068.exec:\26068.exe50⤵
- Executes dropped EXE
PID:3128 -
\??\c:\thhtbn.exec:\thhtbn.exe51⤵
- Executes dropped EXE
PID:4212 -
\??\c:\m6824.exec:\m6824.exe52⤵
- Executes dropped EXE
PID:532 -
\??\c:\jjvpj.exec:\jjvpj.exe53⤵
- Executes dropped EXE
PID:976 -
\??\c:\040464.exec:\040464.exe54⤵
- Executes dropped EXE
PID:3328 -
\??\c:\480088.exec:\480088.exe55⤵
- Executes dropped EXE
PID:1844 -
\??\c:\20826.exec:\20826.exe56⤵
- Executes dropped EXE
PID:4852 -
\??\c:\lflfrlf.exec:\lflfrlf.exe57⤵
- Executes dropped EXE
PID:4276 -
\??\c:\vdddd.exec:\vdddd.exe58⤵
- Executes dropped EXE
PID:1228 -
\??\c:\e28222.exec:\e28222.exe59⤵
- Executes dropped EXE
PID:3016 -
\??\c:\2460822.exec:\2460822.exe60⤵
- Executes dropped EXE
PID:2536 -
\??\c:\28482.exec:\28482.exe61⤵
- Executes dropped EXE
PID:3960 -
\??\c:\600004.exec:\600004.exe62⤵
- Executes dropped EXE
PID:1472 -
\??\c:\042280.exec:\042280.exe63⤵
- Executes dropped EXE
PID:2396 -
\??\c:\s8488.exec:\s8488.exe64⤵
- Executes dropped EXE
PID:4456 -
\??\c:\ppvpp.exec:\ppvpp.exe65⤵
- Executes dropped EXE
PID:2384 -
\??\c:\m0606.exec:\m0606.exe66⤵PID:4288
-
\??\c:\tbtttn.exec:\tbtttn.exe67⤵PID:5000
-
\??\c:\5vvvp.exec:\5vvvp.exe68⤵PID:4696
-
\??\c:\nttbbn.exec:\nttbbn.exe69⤵PID:3000
-
\??\c:\9llllff.exec:\9llllff.exe70⤵PID:3904
-
\??\c:\rxxllxl.exec:\rxxllxl.exe71⤵PID:3700
-
\??\c:\48606.exec:\48606.exe72⤵PID:2672
-
\??\c:\802862.exec:\802862.exe73⤵PID:32
-
\??\c:\q20426.exec:\q20426.exe74⤵PID:3060
-
\??\c:\3ntnhn.exec:\3ntnhn.exe75⤵PID:2560
-
\??\c:\6648880.exec:\6648880.exe76⤵PID:4104
-
\??\c:\224620.exec:\224620.exe77⤵PID:2032
-
\??\c:\o060048.exec:\o060048.exe78⤵PID:1232
-
\??\c:\3nnnth.exec:\3nnnth.exe79⤵PID:3936
-
\??\c:\xxffffx.exec:\xxffffx.exe80⤵PID:3228
-
\??\c:\8644246.exec:\8644246.exe81⤵PID:3368
-
\??\c:\200420.exec:\200420.exe82⤵PID:1212
-
\??\c:\864488.exec:\864488.exe83⤵PID:1868
-
\??\c:\a4608.exec:\a4608.exe84⤵PID:1836
-
\??\c:\llfxffl.exec:\llfxffl.exe85⤵PID:2284
-
\??\c:\tttnnb.exec:\tttnnb.exe86⤵PID:3864
-
\??\c:\e46048.exec:\e46048.exe87⤵PID:116
-
\??\c:\xxxxllf.exec:\xxxxllf.exe88⤵PID:2176
-
\??\c:\o600482.exec:\o600482.exe89⤵PID:1440
-
\??\c:\o426660.exec:\o426660.exe90⤵PID:1320
-
\??\c:\nhhhnn.exec:\nhhhnn.exe91⤵PID:2300
-
\??\c:\5pdvd.exec:\5pdvd.exe92⤵PID:4040
-
\??\c:\q28448.exec:\q28448.exe93⤵PID:1744
-
\??\c:\dppjd.exec:\dppjd.exe94⤵PID:3200
-
\??\c:\dvvpj.exec:\dvvpj.exe95⤵PID:1220
-
\??\c:\bbhhbb.exec:\bbhhbb.exe96⤵PID:544
-
\??\c:\7xrrrxx.exec:\7xrrrxx.exe97⤵PID:3332
-
\??\c:\1xlffxr.exec:\1xlffxr.exe98⤵PID:3376
-
\??\c:\5lxrllx.exec:\5lxrllx.exe99⤵PID:3812
-
\??\c:\1btnhb.exec:\1btnhb.exe100⤵PID:1656
-
\??\c:\xrxrffl.exec:\xrxrffl.exe101⤵PID:4692
-
\??\c:\242666.exec:\242666.exe102⤵PID:1932
-
\??\c:\2208660.exec:\2208660.exe103⤵PID:3620
-
\??\c:\28804.exec:\28804.exe104⤵PID:3940
-
\??\c:\48482.exec:\48482.exe105⤵PID:1340
-
\??\c:\068822.exec:\068822.exe106⤵PID:4420
-
\??\c:\w28266.exec:\w28266.exe107⤵PID:1916
-
\??\c:\dvvpj.exec:\dvvpj.exe108⤵PID:2280
-
\??\c:\828204.exec:\828204.exe109⤵PID:4236
-
\??\c:\ttnnnt.exec:\ttnnnt.exe110⤵PID:3008
-
\??\c:\240042.exec:\240042.exe111⤵PID:4212
-
\??\c:\28600.exec:\28600.exe112⤵PID:532
-
\??\c:\u248044.exec:\u248044.exe113⤵PID:2264
-
\??\c:\9pjdv.exec:\9pjdv.exe114⤵PID:2880
-
\??\c:\260466.exec:\260466.exe115⤵PID:2188
-
\??\c:\2262020.exec:\2262020.exe116⤵PID:4852
-
\??\c:\82822.exec:\82822.exe117⤵PID:4276
-
\??\c:\c682888.exec:\c682888.exe118⤵PID:2340
-
\??\c:\m2882.exec:\m2882.exe119⤵PID:4756
-
\??\c:\frfffxl.exec:\frfffxl.exe120⤵PID:2416
-
\??\c:\9djjj.exec:\9djjj.exe121⤵PID:4412
-
\??\c:\820826.exec:\820826.exe122⤵PID:1740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-