Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 21:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe
-
Size
105KB
-
MD5
d8b1eb5847774742429d5578ed0e8b57
-
SHA1
8dd1723c339a881b22899a3c9a6f0e7ea743e2f4
-
SHA256
34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7
-
SHA512
2b0eab56c7677175e38e424baa4c23356e52b170dd47ee18d225aa44d078a930b83c6e0df4146d4118a4e8a85e56cc9f8212b762265074e566d98baba506179c
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73tvn+Yp99zm+/KZBHq82PCK:n3C9BRo7tvnJ99T/KZE89K
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/4572-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4572-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4716-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2480-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4500-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4916-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3564-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3156-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/264-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4540-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4164-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2368-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4716 84648.exe 2480 82448.exe 4004 rllrrlx.exe 4500 088226.exe 4916 6026222.exe 3556 i804448.exe 3348 86888.exe 3564 242268.exe 5080 lrlxrrr.exe 2340 ntnhtt.exe 3156 480626.exe 2556 jddvp.exe 264 jpvpj.exe 2864 tttnnn.exe 4056 rrffffx.exe 4540 vpddp.exe 2592 7bbbtb.exe 3792 rlxxrrr.exe 1716 006066.exe 4164 pdddj.exe 4860 080644.exe 2984 4404884.exe 5052 jdvpj.exe 2368 08006.exe 364 84448.exe 2776 ppvvd.exe 1856 1ntnhb.exe 4220 pddjp.exe 3476 044444.exe 4016 2626448.exe 4616 240044.exe 4828 e22622.exe 4404 xfffxfx.exe 4580 pvddp.exe 4608 btbthn.exe 112 rlllllf.exe 4604 nbbtnt.exe 5048 rxlfxff.exe 2352 24626.exe 1212 24206.exe 1128 fxfxfxf.exe 428 xflfffx.exe 4300 jvdvp.exe 632 lfxxrrl.exe 2420 lxrrrrr.exe 3756 xrxrxxx.exe 4852 02826.exe 4940 dppjd.exe 3368 048088.exe 5040 tnhbtt.exe 2172 lfxrllf.exe 2460 428604.exe 4296 3ddvv.exe 4560 086000.exe 2364 4804006.exe 1892 0442064.exe 1512 jdjdv.exe 4056 3ttnbb.exe 2988 402606.exe 536 jvddj.exe 3608 1nbhbn.exe 2308 vjjdv.exe 3260 42226.exe 4164 xrfflfr.exe -
resource yara_rule behavioral2/memory/4572-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4500-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3564-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3156-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/264-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4540-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4164-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2368-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-213-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8066044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m6204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 602262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxlxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4716 4572 34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe 85 PID 4572 wrote to memory of 4716 4572 34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe 85 PID 4572 wrote to memory of 4716 4572 34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe 85 PID 4716 wrote to memory of 2480 4716 84648.exe 86 PID 4716 wrote to memory of 2480 4716 84648.exe 86 PID 4716 wrote to memory of 2480 4716 84648.exe 86 PID 2480 wrote to memory of 4004 2480 82448.exe 87 PID 2480 wrote to memory of 4004 2480 82448.exe 87 PID 2480 wrote to memory of 4004 2480 82448.exe 87 PID 4004 wrote to memory of 4500 4004 rllrrlx.exe 88 PID 4004 wrote to memory of 4500 4004 rllrrlx.exe 88 PID 4004 wrote to memory of 4500 4004 rllrrlx.exe 88 PID 4500 wrote to memory of 4916 4500 088226.exe 89 PID 4500 wrote to memory of 4916 4500 088226.exe 89 PID 4500 wrote to memory of 4916 4500 088226.exe 89 PID 4916 wrote to memory of 3556 4916 6026222.exe 90 PID 4916 wrote to memory of 3556 4916 6026222.exe 90 PID 4916 wrote to memory of 3556 4916 6026222.exe 90 PID 3556 wrote to memory of 3348 3556 i804448.exe 91 PID 3556 wrote to memory of 3348 3556 i804448.exe 91 PID 3556 wrote to memory of 3348 3556 i804448.exe 91 PID 3348 wrote to memory of 3564 3348 86888.exe 92 PID 3348 wrote to memory of 3564 3348 86888.exe 92 PID 3348 wrote to memory of 3564 3348 86888.exe 92 PID 3564 wrote to memory of 5080 3564 242268.exe 93 PID 3564 wrote to memory of 5080 3564 242268.exe 93 PID 3564 wrote to memory of 5080 3564 242268.exe 93 PID 5080 wrote to memory of 2340 5080 lrlxrrr.exe 94 PID 5080 wrote to memory of 2340 5080 lrlxrrr.exe 94 PID 5080 wrote to memory of 2340 5080 lrlxrrr.exe 94 PID 2340 wrote to memory of 3156 2340 ntnhtt.exe 95 PID 2340 wrote to memory of 3156 2340 ntnhtt.exe 95 PID 2340 wrote to memory of 3156 2340 ntnhtt.exe 95 PID 3156 wrote to memory of 2556 3156 480626.exe 96 PID 3156 wrote to memory of 2556 3156 480626.exe 96 PID 3156 wrote to memory of 2556 3156 480626.exe 96 PID 2556 wrote to memory of 264 2556 jddvp.exe 97 PID 2556 wrote to memory of 264 2556 jddvp.exe 97 PID 2556 wrote to memory of 264 2556 jddvp.exe 97 PID 264 wrote to memory of 2864 264 jpvpj.exe 98 PID 264 wrote to memory of 2864 264 jpvpj.exe 98 PID 264 wrote to memory of 2864 264 jpvpj.exe 98 PID 2864 wrote to memory of 4056 2864 tttnnn.exe 99 PID 2864 wrote to memory of 4056 2864 tttnnn.exe 99 PID 2864 wrote to memory of 4056 2864 tttnnn.exe 99 PID 4056 wrote to memory of 4540 4056 rrffffx.exe 100 PID 4056 wrote to memory of 4540 4056 rrffffx.exe 100 PID 4056 wrote to memory of 4540 4056 rrffffx.exe 100 PID 4540 wrote to memory of 2592 4540 vpddp.exe 101 PID 4540 wrote to memory of 2592 4540 vpddp.exe 101 PID 4540 wrote to memory of 2592 4540 vpddp.exe 101 PID 2592 wrote to memory of 3792 2592 7bbbtb.exe 102 PID 2592 wrote to memory of 3792 2592 7bbbtb.exe 102 PID 2592 wrote to memory of 3792 2592 7bbbtb.exe 102 PID 3792 wrote to memory of 1716 3792 rlxxrrr.exe 103 PID 3792 wrote to memory of 1716 3792 rlxxrrr.exe 103 PID 3792 wrote to memory of 1716 3792 rlxxrrr.exe 103 PID 1716 wrote to memory of 4164 1716 006066.exe 104 PID 1716 wrote to memory of 4164 1716 006066.exe 104 PID 1716 wrote to memory of 4164 1716 006066.exe 104 PID 4164 wrote to memory of 4860 4164 pdddj.exe 105 PID 4164 wrote to memory of 4860 4164 pdddj.exe 105 PID 4164 wrote to memory of 4860 4164 pdddj.exe 105 PID 4860 wrote to memory of 2984 4860 080644.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe"C:\Users\Admin\AppData\Local\Temp\34086b7ad3ef2425bfad0eca29a8b05a71d615115aaaa31498ea4ce9e47ca0e7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\84648.exec:\84648.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\82448.exec:\82448.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\rllrrlx.exec:\rllrrlx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\088226.exec:\088226.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\6026222.exec:\6026222.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\i804448.exec:\i804448.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\86888.exec:\86888.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\242268.exec:\242268.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
\??\c:\lrlxrrr.exec:\lrlxrrr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\ntnhtt.exec:\ntnhtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\480626.exec:\480626.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
\??\c:\jddvp.exec:\jddvp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\jpvpj.exec:\jpvpj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
\??\c:\tttnnn.exec:\tttnnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\rrffffx.exec:\rrffffx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
\??\c:\vpddp.exec:\vpddp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\7bbbtb.exec:\7bbbtb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\rlxxrrr.exec:\rlxxrrr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
\??\c:\006066.exec:\006066.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
\??\c:\pdddj.exec:\pdddj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4164 -
\??\c:\080644.exec:\080644.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\4404884.exec:\4404884.exe23⤵
- Executes dropped EXE
PID:2984 -
\??\c:\jdvpj.exec:\jdvpj.exe24⤵
- Executes dropped EXE
PID:5052 -
\??\c:\08006.exec:\08006.exe25⤵
- Executes dropped EXE
PID:2368 -
\??\c:\84448.exec:\84448.exe26⤵
- Executes dropped EXE
PID:364 -
\??\c:\ppvvd.exec:\ppvvd.exe27⤵
- Executes dropped EXE
PID:2776 -
\??\c:\1ntnhb.exec:\1ntnhb.exe28⤵
- Executes dropped EXE
PID:1856 -
\??\c:\pddjp.exec:\pddjp.exe29⤵
- Executes dropped EXE
PID:4220 -
\??\c:\044444.exec:\044444.exe30⤵
- Executes dropped EXE
PID:3476 -
\??\c:\2626448.exec:\2626448.exe31⤵
- Executes dropped EXE
PID:4016 -
\??\c:\240044.exec:\240044.exe32⤵
- Executes dropped EXE
PID:4616 -
\??\c:\e22622.exec:\e22622.exe33⤵
- Executes dropped EXE
PID:4828 -
\??\c:\xfffxfx.exec:\xfffxfx.exe34⤵
- Executes dropped EXE
PID:4404 -
\??\c:\pvddp.exec:\pvddp.exe35⤵
- Executes dropped EXE
PID:4580 -
\??\c:\btbthn.exec:\btbthn.exe36⤵
- Executes dropped EXE
PID:4608 -
\??\c:\rlllllf.exec:\rlllllf.exe37⤵
- Executes dropped EXE
PID:112 -
\??\c:\nbbtnt.exec:\nbbtnt.exe38⤵
- Executes dropped EXE
PID:4604 -
\??\c:\rxlfxff.exec:\rxlfxff.exe39⤵
- Executes dropped EXE
PID:5048 -
\??\c:\24626.exec:\24626.exe40⤵
- Executes dropped EXE
PID:2352 -
\??\c:\24206.exec:\24206.exe41⤵
- Executes dropped EXE
PID:1212 -
\??\c:\fxfxfxf.exec:\fxfxfxf.exe42⤵
- Executes dropped EXE
PID:1128 -
\??\c:\xflfffx.exec:\xflfffx.exe43⤵
- Executes dropped EXE
PID:428 -
\??\c:\jvdvp.exec:\jvdvp.exe44⤵
- Executes dropped EXE
PID:4300 -
\??\c:\lfxxrrl.exec:\lfxxrrl.exe45⤵
- Executes dropped EXE
PID:632 -
\??\c:\lxrrrrr.exec:\lxrrrrr.exe46⤵
- Executes dropped EXE
PID:2420 -
\??\c:\xrxrxxx.exec:\xrxrxxx.exe47⤵
- Executes dropped EXE
PID:3756 -
\??\c:\02826.exec:\02826.exe48⤵
- Executes dropped EXE
PID:4852 -
\??\c:\dppjd.exec:\dppjd.exe49⤵
- Executes dropped EXE
PID:4940 -
\??\c:\048088.exec:\048088.exe50⤵
- Executes dropped EXE
PID:3368 -
\??\c:\tnhbtt.exec:\tnhbtt.exe51⤵
- Executes dropped EXE
PID:5040 -
\??\c:\lfxrllf.exec:\lfxrllf.exe52⤵
- Executes dropped EXE
PID:2172 -
\??\c:\428604.exec:\428604.exe53⤵
- Executes dropped EXE
PID:2460 -
\??\c:\3ddvv.exec:\3ddvv.exe54⤵
- Executes dropped EXE
PID:4296 -
\??\c:\086000.exec:\086000.exe55⤵
- Executes dropped EXE
PID:4560 -
\??\c:\4804006.exec:\4804006.exe56⤵
- Executes dropped EXE
PID:2364 -
\??\c:\0442064.exec:\0442064.exe57⤵
- Executes dropped EXE
PID:1892 -
\??\c:\jdjdv.exec:\jdjdv.exe58⤵
- Executes dropped EXE
PID:1512 -
\??\c:\3ttnbb.exec:\3ttnbb.exe59⤵
- Executes dropped EXE
PID:4056 -
\??\c:\402606.exec:\402606.exe60⤵
- Executes dropped EXE
PID:2988 -
\??\c:\jvddj.exec:\jvddj.exe61⤵
- Executes dropped EXE
PID:536 -
\??\c:\1nbhbn.exec:\1nbhbn.exe62⤵
- Executes dropped EXE
PID:3608 -
\??\c:\vjjdv.exec:\vjjdv.exe63⤵
- Executes dropped EXE
PID:2308 -
\??\c:\42226.exec:\42226.exe64⤵
- Executes dropped EXE
PID:3260 -
\??\c:\xrfflfr.exec:\xrfflfr.exe65⤵
- Executes dropped EXE
PID:4164 -
\??\c:\48888.exec:\48888.exe66⤵PID:4964
-
\??\c:\060280.exec:\060280.exe67⤵PID:3040
-
\??\c:\pjjdd.exec:\pjjdd.exe68⤵PID:2944
-
\??\c:\206682.exec:\206682.exe69⤵PID:5052
-
\??\c:\vppjd.exec:\vppjd.exe70⤵PID:4820
-
\??\c:\44604.exec:\44604.exe71⤵PID:3248
-
\??\c:\o622464.exec:\o622464.exe72⤵PID:1808
-
\??\c:\620046.exec:\620046.exe73⤵PID:3172
-
\??\c:\04488.exec:\04488.exe74⤵PID:2992
-
\??\c:\bthtnt.exec:\bthtnt.exe75⤵PID:4060
-
\??\c:\2400484.exec:\2400484.exe76⤵PID:1456
-
\??\c:\flrlfff.exec:\flrlfff.exe77⤵PID:3476
-
\??\c:\48062.exec:\48062.exe78⤵PID:5068
-
\??\c:\2204888.exec:\2204888.exe79⤵PID:4600
-
\??\c:\s6004.exec:\s6004.exe80⤵PID:2372
-
\??\c:\406646.exec:\406646.exe81⤵PID:2084
-
\??\c:\xllfxxr.exec:\xllfxxr.exe82⤵PID:2168
-
\??\c:\86262.exec:\86262.exe83⤵PID:1832
-
\??\c:\28626.exec:\28626.exe84⤵PID:1700
-
\??\c:\dppdp.exec:\dppdp.exe85⤵PID:408
-
\??\c:\80626.exec:\80626.exe86⤵
- System Location Discovery: System Language Discovery
PID:4372 -
\??\c:\nnbtbn.exec:\nnbtbn.exe87⤵PID:4152
-
\??\c:\ppjdv.exec:\ppjdv.exe88⤵PID:1400
-
\??\c:\260482.exec:\260482.exe89⤵PID:4788
-
\??\c:\djpjv.exec:\djpjv.exe90⤵PID:4300
-
\??\c:\m6266.exec:\m6266.exe91⤵PID:3192
-
\??\c:\4060828.exec:\4060828.exe92⤵PID:2420
-
\??\c:\pdpjj.exec:\pdpjj.exe93⤵PID:1940
-
\??\c:\btnhtn.exec:\btnhtn.exe94⤵PID:1472
-
\??\c:\82482.exec:\82482.exe95⤵PID:3304
-
\??\c:\llffllf.exec:\llffllf.exe96⤵PID:3176
-
\??\c:\dpjdp.exec:\dpjdp.exe97⤵PID:3180
-
\??\c:\bbttbh.exec:\bbttbh.exe98⤵PID:5084
-
\??\c:\btnhtn.exec:\btnhtn.exe99⤵PID:4440
-
\??\c:\1dvjv.exec:\1dvjv.exe100⤵PID:4296
-
\??\c:\jjvjd.exec:\jjvjd.exe101⤵PID:4560
-
\??\c:\a6804.exec:\a6804.exe102⤵PID:5088
-
\??\c:\1jpdd.exec:\1jpdd.exe103⤵PID:4260
-
\??\c:\w00648.exec:\w00648.exe104⤵PID:1696
-
\??\c:\5pddj.exec:\5pddj.exe105⤵PID:2748
-
\??\c:\htbthn.exec:\htbthn.exe106⤵PID:1104
-
\??\c:\rlxlrll.exec:\rlxlrll.exe107⤵PID:1296
-
\??\c:\8464826.exec:\8464826.exe108⤵PID:4672
-
\??\c:\0060826.exec:\0060826.exe109⤵PID:400
-
\??\c:\4404882.exec:\4404882.exe110⤵PID:1716
-
\??\c:\flfxllf.exec:\flfxllf.exe111⤵PID:1460
-
\??\c:\xrllxfx.exec:\xrllxfx.exe112⤵PID:3232
-
\??\c:\pjdvp.exec:\pjdvp.exe113⤵PID:2496
-
\??\c:\xs40646.exec:\xs40646.exe114⤵PID:3124
-
\??\c:\084848.exec:\084848.exe115⤵PID:3036
-
\??\c:\488200.exec:\488200.exe116⤵PID:4820
-
\??\c:\062204.exec:\062204.exe117⤵PID:4844
-
\??\c:\jdjpd.exec:\jdjpd.exe118⤵PID:1248
-
\??\c:\xxllllf.exec:\xxllllf.exe119⤵PID:3700
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe120⤵PID:2260
-
\??\c:\5vppj.exec:\5vppj.exe121⤵PID:1984
-
\??\c:\rlfxllx.exec:\rlfxllx.exe122⤵PID:2216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-