Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe
Resource
win7-20240903-en
General
-
Target
c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe
-
Size
64KB
-
MD5
8fe9063666a5dcd8570da8663cd3e2f0
-
SHA1
5827ed7b7c3ee6ab1914d654ae9d9350bd36cc8c
-
SHA256
c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43
-
SHA512
e4cf0a002a98438d3ec7cb86ba3516d1fdbf794e58344585719c8f0e9cc864378e98f8e99af806bd8fb19fa98488baa257cb1c1aa30548d50be065e823b25ffe
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qPts:ymb3NkkiQ3mdBjFIj+qK
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/3000-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/768-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3544-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4800-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2904-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1536-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1228-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1228-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2432-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2432-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2084-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2364-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3976-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1088-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5092-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4512-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4916-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/836-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3152-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2212-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
086820.exe2222626.exerfrfrfl.exehhhbtn.exe044826.exethhtbt.exevjppj.exepppjj.exepddjp.exehntnnh.exe0044000.exe0880608.exethhhhb.exe0684440.exennbhbn.exejvdvv.exe2866662.exeffrrrll.exenbntbb.exerxfxlrl.exedpvpd.exevdvpd.exem8826.exe606004.exe06888.exeo246060.exerrlrllr.exe5hnnhn.exejpdvv.exeu244222.exexfxffff.exefffxrlr.exe2404648.exe3hnttb.exethhthb.exevpppp.exe2686640.exe1rxffrl.exe1vpjj.exellxlxxl.exe464620.exejjpdp.exe08448.exe220666.exerlrrrff.exetbnnnn.exe28022.exe042642.exerrxlxfx.exelfxfxll.exennnbbb.exe066888.exenhtbnn.exe24848.exe0260040.exefxffrxr.exenbbbbt.exe668644.exe0042822.exe6082428.exejdjjj.exetbhbtt.exe686080.exe00442.exepid process 768 086820.exe 3544 2222626.exe 4800 rfrfrfl.exe 2904 hhhbtn.exe 2084 044826.exe 3940 thhtbt.exe 3628 vjppj.exe 1536 pppjj.exe 2432 pddjp.exe 1228 hntnnh.exe 2364 0044000.exe 3976 0880608.exe 2684 thhhhb.exe 1088 0684440.exe 4224 nnbhbn.exe 5092 jvdvv.exe 4512 2866662.exe 4916 ffrrrll.exe 5080 nbntbb.exe 4608 rxfxlrl.exe 836 dpvpd.exe 840 vdvpd.exe 4352 m8826.exe 4856 606004.exe 324 06888.exe 2284 o246060.exe 4344 rrlrllr.exe 3184 5hnnhn.exe 548 jpdvv.exe 3152 u244222.exe 2212 xfxffff.exe 2784 fffxrlr.exe 1764 2404648.exe 1672 3hnttb.exe 1556 thhthb.exe 4180 vpppp.exe 2596 2686640.exe 2568 1rxffrl.exe 2932 1vpjj.exe 3188 llxlxxl.exe 3028 464620.exe 4400 jjpdp.exe 2984 08448.exe 1648 220666.exe 3548 rlrrrff.exe 3520 tbnnnn.exe 2960 28022.exe 4800 042642.exe 2276 rrxlxfx.exe 1868 lfxfxll.exe 5032 nnnbbb.exe 2440 066888.exe 2956 nhtbnn.exe 1728 24848.exe 1812 0260040.exe 1536 fxffrxr.exe 4504 nbbbbt.exe 2424 668644.exe 3872 0042822.exe 224 6082428.exe 3948 jdjjj.exe 3996 tbhbtt.exe 4144 686080.exe 3880 00442.exe -
Processes:
resource yara_rule behavioral2/memory/3000-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/768-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4800-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2904-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1536-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1228-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1228-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2084-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2084-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2084-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3976-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1088-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4512-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/836-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3152-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2212-215-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
nbtnbn.exe2400444.exe3ffxrll.exe8860880.exe6644406.exe280048.exei000000.exe6404422.exebthhnn.exe3dvpj.exe0048204.exefflrxrr.exew24002.exe00208.exe86208.exennbhbn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtnbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2400444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ffxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8860880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6644406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i000000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6404422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0048204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w24002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe086820.exe2222626.exerfrfrfl.exehhhbtn.exe044826.exethhtbt.exevjppj.exepppjj.exepddjp.exehntnnh.exe0044000.exe0880608.exethhhhb.exe0684440.exennbhbn.exejvdvv.exe2866662.exeffrrrll.exenbntbb.exerxfxlrl.exedpvpd.exedescription pid process target process PID 3000 wrote to memory of 768 3000 c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe 086820.exe PID 3000 wrote to memory of 768 3000 c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe 086820.exe PID 3000 wrote to memory of 768 3000 c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe 086820.exe PID 768 wrote to memory of 3544 768 086820.exe 2222626.exe PID 768 wrote to memory of 3544 768 086820.exe 2222626.exe PID 768 wrote to memory of 3544 768 086820.exe 2222626.exe PID 3544 wrote to memory of 4800 3544 2222626.exe rfrfrfl.exe PID 3544 wrote to memory of 4800 3544 2222626.exe rfrfrfl.exe PID 3544 wrote to memory of 4800 3544 2222626.exe rfrfrfl.exe PID 4800 wrote to memory of 2904 4800 rfrfrfl.exe hhhbtn.exe PID 4800 wrote to memory of 2904 4800 rfrfrfl.exe hhhbtn.exe PID 4800 wrote to memory of 2904 4800 rfrfrfl.exe hhhbtn.exe PID 2904 wrote to memory of 2084 2904 hhhbtn.exe 044826.exe PID 2904 wrote to memory of 2084 2904 hhhbtn.exe 044826.exe PID 2904 wrote to memory of 2084 2904 hhhbtn.exe 044826.exe PID 2084 wrote to memory of 3940 2084 044826.exe thhtbt.exe PID 2084 wrote to memory of 3940 2084 044826.exe thhtbt.exe PID 2084 wrote to memory of 3940 2084 044826.exe thhtbt.exe PID 3940 wrote to memory of 3628 3940 thhtbt.exe vjppj.exe PID 3940 wrote to memory of 3628 3940 thhtbt.exe vjppj.exe PID 3940 wrote to memory of 3628 3940 thhtbt.exe vjppj.exe PID 3628 wrote to memory of 1536 3628 vjppj.exe pppjj.exe PID 3628 wrote to memory of 1536 3628 vjppj.exe pppjj.exe PID 3628 wrote to memory of 1536 3628 vjppj.exe pppjj.exe PID 1536 wrote to memory of 2432 1536 pppjj.exe pddjp.exe PID 1536 wrote to memory of 2432 1536 pppjj.exe pddjp.exe PID 1536 wrote to memory of 2432 1536 pppjj.exe pddjp.exe PID 2432 wrote to memory of 1228 2432 pddjp.exe hntnnh.exe PID 2432 wrote to memory of 1228 2432 pddjp.exe hntnnh.exe PID 2432 wrote to memory of 1228 2432 pddjp.exe hntnnh.exe PID 1228 wrote to memory of 2364 1228 hntnnh.exe 0044000.exe PID 1228 wrote to memory of 2364 1228 hntnnh.exe 0044000.exe PID 1228 wrote to memory of 2364 1228 hntnnh.exe 0044000.exe PID 2364 wrote to memory of 3976 2364 0044000.exe 0880608.exe PID 2364 wrote to memory of 3976 2364 0044000.exe 0880608.exe PID 2364 wrote to memory of 3976 2364 0044000.exe 0880608.exe PID 3976 wrote to memory of 2684 3976 0880608.exe thhhhb.exe PID 3976 wrote to memory of 2684 3976 0880608.exe thhhhb.exe PID 3976 wrote to memory of 2684 3976 0880608.exe thhhhb.exe PID 2684 wrote to memory of 1088 2684 thhhhb.exe 0684440.exe PID 2684 wrote to memory of 1088 2684 thhhhb.exe 0684440.exe PID 2684 wrote to memory of 1088 2684 thhhhb.exe 0684440.exe PID 1088 wrote to memory of 4224 1088 0684440.exe nnbhbn.exe PID 1088 wrote to memory of 4224 1088 0684440.exe nnbhbn.exe PID 1088 wrote to memory of 4224 1088 0684440.exe nnbhbn.exe PID 4224 wrote to memory of 5092 4224 nnbhbn.exe jvdvv.exe PID 4224 wrote to memory of 5092 4224 nnbhbn.exe jvdvv.exe PID 4224 wrote to memory of 5092 4224 nnbhbn.exe jvdvv.exe PID 5092 wrote to memory of 4512 5092 jvdvv.exe 2866662.exe PID 5092 wrote to memory of 4512 5092 jvdvv.exe 2866662.exe PID 5092 wrote to memory of 4512 5092 jvdvv.exe 2866662.exe PID 4512 wrote to memory of 4916 4512 2866662.exe ffrrrll.exe PID 4512 wrote to memory of 4916 4512 2866662.exe ffrrrll.exe PID 4512 wrote to memory of 4916 4512 2866662.exe ffrrrll.exe PID 4916 wrote to memory of 5080 4916 ffrrrll.exe nbntbb.exe PID 4916 wrote to memory of 5080 4916 ffrrrll.exe nbntbb.exe PID 4916 wrote to memory of 5080 4916 ffrrrll.exe nbntbb.exe PID 5080 wrote to memory of 4608 5080 nbntbb.exe rxfxlrl.exe PID 5080 wrote to memory of 4608 5080 nbntbb.exe rxfxlrl.exe PID 5080 wrote to memory of 4608 5080 nbntbb.exe rxfxlrl.exe PID 4608 wrote to memory of 836 4608 rxfxlrl.exe dpvpd.exe PID 4608 wrote to memory of 836 4608 rxfxlrl.exe dpvpd.exe PID 4608 wrote to memory of 836 4608 rxfxlrl.exe dpvpd.exe PID 836 wrote to memory of 840 836 dpvpd.exe vdvpd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe"C:\Users\Admin\AppData\Local\Temp\c2bb50c66d74e1b6fbcdb5d4253c7bd4f9a12a083db9a40ba3889cb8d8fd8f43N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\086820.exec:\086820.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
\??\c:\2222626.exec:\2222626.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
\??\c:\rfrfrfl.exec:\rfrfrfl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\hhhbtn.exec:\hhhbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\044826.exec:\044826.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\thhtbt.exec:\thhtbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
\??\c:\vjppj.exec:\vjppj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\pppjj.exec:\pppjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\pddjp.exec:\pddjp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\hntnnh.exec:\hntnnh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
\??\c:\0044000.exec:\0044000.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\0880608.exec:\0880608.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\thhhhb.exec:\thhhhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\0684440.exec:\0684440.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
\??\c:\nnbhbn.exec:\nnbhbn.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\jvdvv.exec:\jvdvv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\2866662.exec:\2866662.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
\??\c:\ffrrrll.exec:\ffrrrll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\nbntbb.exec:\nbntbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\rxfxlrl.exec:\rxfxlrl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
\??\c:\dpvpd.exec:\dpvpd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
\??\c:\vdvpd.exec:\vdvpd.exe23⤵
- Executes dropped EXE
PID:840 -
\??\c:\m8826.exec:\m8826.exe24⤵
- Executes dropped EXE
PID:4352 -
\??\c:\606004.exec:\606004.exe25⤵
- Executes dropped EXE
PID:4856 -
\??\c:\06888.exec:\06888.exe26⤵
- Executes dropped EXE
PID:324 -
\??\c:\o246060.exec:\o246060.exe27⤵
- Executes dropped EXE
PID:2284 -
\??\c:\rrlrllr.exec:\rrlrllr.exe28⤵
- Executes dropped EXE
PID:4344 -
\??\c:\5hnnhn.exec:\5hnnhn.exe29⤵
- Executes dropped EXE
PID:3184 -
\??\c:\jpdvv.exec:\jpdvv.exe30⤵
- Executes dropped EXE
PID:548 -
\??\c:\u244222.exec:\u244222.exe31⤵
- Executes dropped EXE
PID:3152 -
\??\c:\xfxffff.exec:\xfxffff.exe32⤵
- Executes dropped EXE
PID:2212 -
\??\c:\fffxrlr.exec:\fffxrlr.exe33⤵
- Executes dropped EXE
PID:2784 -
\??\c:\2404648.exec:\2404648.exe34⤵
- Executes dropped EXE
PID:1764 -
\??\c:\3hnttb.exec:\3hnttb.exe35⤵
- Executes dropped EXE
PID:1672 -
\??\c:\thhthb.exec:\thhthb.exe36⤵
- Executes dropped EXE
PID:1556 -
\??\c:\vpppp.exec:\vpppp.exe37⤵
- Executes dropped EXE
PID:4180 -
\??\c:\2686640.exec:\2686640.exe38⤵
- Executes dropped EXE
PID:2596 -
\??\c:\1rxffrl.exec:\1rxffrl.exe39⤵
- Executes dropped EXE
PID:2568 -
\??\c:\1vpjj.exec:\1vpjj.exe40⤵
- Executes dropped EXE
PID:2932 -
\??\c:\llxlxxl.exec:\llxlxxl.exe41⤵
- Executes dropped EXE
PID:3188 -
\??\c:\464620.exec:\464620.exe42⤵
- Executes dropped EXE
PID:3028 -
\??\c:\jjpdp.exec:\jjpdp.exe43⤵
- Executes dropped EXE
PID:4400 -
\??\c:\08448.exec:\08448.exe44⤵
- Executes dropped EXE
PID:2984 -
\??\c:\220666.exec:\220666.exe45⤵
- Executes dropped EXE
PID:1648 -
\??\c:\rlrrrff.exec:\rlrrrff.exe46⤵
- Executes dropped EXE
PID:3548 -
\??\c:\tbnnnn.exec:\tbnnnn.exe47⤵
- Executes dropped EXE
PID:3520 -
\??\c:\28022.exec:\28022.exe48⤵
- Executes dropped EXE
PID:2960 -
\??\c:\042642.exec:\042642.exe49⤵
- Executes dropped EXE
PID:4800 -
\??\c:\rrxlxfx.exec:\rrxlxfx.exe50⤵
- Executes dropped EXE
PID:2276 -
\??\c:\lfxfxll.exec:\lfxfxll.exe51⤵
- Executes dropped EXE
PID:1868 -
\??\c:\nnnbbb.exec:\nnnbbb.exe52⤵
- Executes dropped EXE
PID:5032 -
\??\c:\066888.exec:\066888.exe53⤵
- Executes dropped EXE
PID:2440 -
\??\c:\nhtbnn.exec:\nhtbnn.exe54⤵
- Executes dropped EXE
PID:2956 -
\??\c:\24848.exec:\24848.exe55⤵
- Executes dropped EXE
PID:1728 -
\??\c:\0260040.exec:\0260040.exe56⤵
- Executes dropped EXE
PID:1812 -
\??\c:\fxffrxr.exec:\fxffrxr.exe57⤵
- Executes dropped EXE
PID:1536 -
\??\c:\nbbbbt.exec:\nbbbbt.exe58⤵
- Executes dropped EXE
PID:4504 -
\??\c:\668644.exec:\668644.exe59⤵
- Executes dropped EXE
PID:2424 -
\??\c:\0042822.exec:\0042822.exe60⤵
- Executes dropped EXE
PID:3872 -
\??\c:\6082428.exec:\6082428.exe61⤵
- Executes dropped EXE
PID:224 -
\??\c:\jdjjj.exec:\jdjjj.exe62⤵
- Executes dropped EXE
PID:3948 -
\??\c:\tbhbtt.exec:\tbhbtt.exe63⤵
- Executes dropped EXE
PID:3996 -
\??\c:\686080.exec:\686080.exe64⤵
- Executes dropped EXE
PID:4144 -
\??\c:\00442.exec:\00442.exe65⤵
- Executes dropped EXE
PID:3880 -
\??\c:\ttbbtb.exec:\ttbbtb.exe66⤵PID:2620
-
\??\c:\5hhhbh.exec:\5hhhbh.exe67⤵PID:3680
-
\??\c:\8880248.exec:\8880248.exe68⤵PID:4224
-
\??\c:\jvddd.exec:\jvddd.exe69⤵PID:4704
-
\??\c:\lxlrfff.exec:\lxlrfff.exe70⤵PID:4736
-
\??\c:\frxrllf.exec:\frxrllf.exe71⤵PID:804
-
\??\c:\dvdvv.exec:\dvdvv.exe72⤵PID:2828
-
\??\c:\vpddd.exec:\vpddd.exe73⤵PID:5080
-
\??\c:\fxfxlrl.exec:\fxfxlrl.exe74⤵PID:4608
-
\??\c:\6804488.exec:\6804488.exe75⤵PID:4196
-
\??\c:\xxlllff.exec:\xxlllff.exe76⤵PID:380
-
\??\c:\rxxflrx.exec:\rxxflrx.exe77⤵PID:836
-
\??\c:\7nbntb.exec:\7nbntb.exe78⤵PID:3740
-
\??\c:\22042.exec:\22042.exe79⤵PID:100
-
\??\c:\xrffrrx.exec:\xrffrrx.exe80⤵PID:4856
-
\??\c:\djjdd.exec:\djjdd.exe81⤵PID:3536
-
\??\c:\m0226.exec:\m0226.exe82⤵PID:4588
-
\??\c:\w20482.exec:\w20482.exe83⤵PID:2800
-
\??\c:\3vvjj.exec:\3vvjj.exe84⤵PID:2108
-
\??\c:\bbthhn.exec:\bbthhn.exe85⤵PID:4284
-
\??\c:\w24488.exec:\w24488.exe86⤵PID:3096
-
\??\c:\2026484.exec:\2026484.exe87⤵PID:4964
-
\??\c:\xffxxff.exec:\xffxxff.exe88⤵PID:1780
-
\??\c:\ttttnt.exec:\ttttnt.exe89⤵PID:2040
-
\??\c:\8282264.exec:\8282264.exe90⤵PID:2844
-
\??\c:\268640.exec:\268640.exe91⤵PID:3916
-
\??\c:\4404482.exec:\4404482.exe92⤵PID:1672
-
\??\c:\vvddj.exec:\vvddj.exe93⤵PID:1000
-
\??\c:\flfllrr.exec:\flfllrr.exe94⤵PID:4180
-
\??\c:\8220824.exec:\8220824.exe95⤵PID:1964
-
\??\c:\jjppv.exec:\jjppv.exe96⤵PID:4872
-
\??\c:\o466442.exec:\o466442.exe97⤵PID:1016
-
\??\c:\6244888.exec:\6244888.exe98⤵PID:1876
-
\??\c:\5xfffff.exec:\5xfffff.exe99⤵PID:2700
-
\??\c:\w68800.exec:\w68800.exe100⤵PID:3252
-
\??\c:\6206824.exec:\6206824.exe101⤵PID:3316
-
\??\c:\fllfrrl.exec:\fllfrrl.exe102⤵PID:3544
-
\??\c:\26866.exec:\26866.exe103⤵PID:4100
-
\??\c:\7nhhnn.exec:\7nhhnn.exe104⤵PID:3180
-
\??\c:\hbbbbh.exec:\hbbbbh.exe105⤵PID:1348
-
\??\c:\9bnhht.exec:\9bnhht.exe106⤵PID:3432
-
\??\c:\206222.exec:\206222.exe107⤵PID:1688
-
\??\c:\xrffxxx.exec:\xrffxxx.exe108⤵PID:1836
-
\??\c:\24626.exec:\24626.exe109⤵PID:628
-
\??\c:\26026.exec:\26026.exe110⤵PID:4540
-
\??\c:\bbbnnn.exec:\bbbnnn.exe111⤵PID:4248
-
\??\c:\ppvvv.exec:\ppvvv.exe112⤵PID:4300
-
\??\c:\k04888.exec:\k04888.exe113⤵PID:1720
-
\??\c:\64426.exec:\64426.exe114⤵PID:3960
-
\??\c:\bthhnn.exec:\bthhnn.exe115⤵
- System Location Discovery: System Language Discovery
PID:2696 -
\??\c:\024602.exec:\024602.exe116⤵PID:2452
-
\??\c:\1djpp.exec:\1djpp.exe117⤵PID:3360
-
\??\c:\680044.exec:\680044.exe118⤵PID:1088
-
\??\c:\bnnhhh.exec:\bnnhhh.exe119⤵PID:2760
-
\??\c:\e84440.exec:\e84440.exe120⤵PID:408
-
\??\c:\ddddd.exec:\ddddd.exe121⤵PID:1824
-
\??\c:\040428.exec:\040428.exe122⤵PID:3836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-