Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe
Resource
win7-20241010-en
General
-
Target
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe
-
Size
89KB
-
MD5
f891b4e0104d419684830cfb7653df6e
-
SHA1
0558b2f23024e30754c82a8ea2450a9a923f5ba8
-
SHA256
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995
-
SHA512
8499aef9637c0e483905a2d61e7e66f9a10d56a400d2292159bfd921b786fb16bc7bd8618eb20e809612ae303b4fbbf09781ae576a6fe827d6f712b14288ae50
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAXPfgr2hKmdbcPi2vhdW/:ymb3NkkiQ3mdBjFo6Pfgy3dbc/hdW/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/3612-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4188-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1528-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2552-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1060-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2608-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1276-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/572-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1720-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3480-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/100-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1536-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1236-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/780-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1192-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1100-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4712-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/224-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
4884842.exe06260.exehbhhtt.exehbhtnn.exerlfxxrr.exejvjdp.exe1pvdd.exefxrllll.exe68488.exerllfxxx.exejvpjv.exe60482.exehbbnbt.exe868082.exe084048.exe264888.exepjdvp.exepvjdv.exefxfrxrx.exe5dpjv.exe2048042.exeq06426.exepdjjv.exefffrfxl.exedpppj.exe8020060.exefxrxxff.exe0466228.exe22888.exehbbbtn.exetbbnht.exebnnbnh.exe20648.exe0048208.exe06862.exe2042206.exerfxrrrr.exe22820.exe86204.exedjpjd.exefffrxrf.exepddpj.exefrlxllx.exexrfxllx.exeppjvj.exe448204.exe0460488.exevvddp.exe4024400.exe204860.exew64800.exe884204.exe9bhbhh.exe42608.exe406026.exe06608.exebthtbn.exerlfrfxr.exetttnhb.exew48204.exe42042.exes8864.exe206460.exepvpdp.exepid process 4188 4884842.exe 1528 06260.exe 2552 hbhhtt.exe 4540 hbhtnn.exe 1796 rlfxxrr.exe 3652 jvjdp.exe 1060 1pvdd.exe 3964 fxrllll.exe 2608 68488.exe 4424 rllfxxx.exe 2244 jvpjv.exe 1276 60482.exe 572 hbbnbt.exe 1720 868082.exe 3480 084048.exe 5040 264888.exe 100 pjdvp.exe 4860 pvjdv.exe 3624 fxfrxrx.exe 1536 5dpjv.exe 1236 2048042.exe 780 q06426.exe 1192 pdjjv.exe 1100 fffrfxl.exe 2676 dpppj.exe 3668 8020060.exe 4712 fxrxxff.exe 4920 0466228.exe 2524 22888.exe 224 hbbbtn.exe 4036 tbbnht.exe 1772 bnnbnh.exe 1404 20648.exe 112 0048208.exe 4216 06862.exe 1900 2042206.exe 3660 rfxrrrr.exe 3096 22820.exe 1656 86204.exe 3408 djpjd.exe 3808 fffrxrf.exe 1116 pddpj.exe 1872 frlxllx.exe 3960 xrfxllx.exe 4444 ppjvj.exe 4292 448204.exe 1644 0460488.exe 3860 vvddp.exe 1828 4024400.exe 4804 204860.exe 5112 w64800.exe 4968 884204.exe 3156 9bhbhh.exe 4736 42608.exe 4056 406026.exe 1592 06608.exe 3652 bthtbn.exe 5048 rlfrfxr.exe 4168 tttnhb.exe 1132 w48204.exe 2608 42042.exe 2092 s8864.exe 4336 206460.exe 4928 pvpdp.exe -
Processes:
resource yara_rule behavioral2/memory/3612-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3612-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4188-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2608-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1276-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/572-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1720-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/100-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1536-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1236-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/780-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1100-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4712-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/224-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
jppdp.exe088204.exe4024400.exe7jjdp.exe444444.exe2226482.exerffxflx.exerlffrlf.exe28266.exefrlxlfr.exerllffxf.exerfxlfxr.exefxfrxrx.exennthtn.exe3bnhbn.exe7jjdv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4024400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2226482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bnhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe4884842.exe06260.exehbhhtt.exehbhtnn.exerlfxxrr.exejvjdp.exe1pvdd.exefxrllll.exe68488.exerllfxxx.exejvpjv.exe60482.exehbbnbt.exe868082.exe084048.exe264888.exepjdvp.exepvjdv.exefxfrxrx.exe5dpjv.exe2048042.exedescription pid process target process PID 3612 wrote to memory of 4188 3612 f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe 4884842.exe PID 3612 wrote to memory of 4188 3612 f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe 4884842.exe PID 3612 wrote to memory of 4188 3612 f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe 4884842.exe PID 4188 wrote to memory of 1528 4188 4884842.exe 06260.exe PID 4188 wrote to memory of 1528 4188 4884842.exe 06260.exe PID 4188 wrote to memory of 1528 4188 4884842.exe 06260.exe PID 1528 wrote to memory of 2552 1528 06260.exe hbhhtt.exe PID 1528 wrote to memory of 2552 1528 06260.exe hbhhtt.exe PID 1528 wrote to memory of 2552 1528 06260.exe hbhhtt.exe PID 2552 wrote to memory of 4540 2552 hbhhtt.exe hbhtnn.exe PID 2552 wrote to memory of 4540 2552 hbhhtt.exe hbhtnn.exe PID 2552 wrote to memory of 4540 2552 hbhhtt.exe hbhtnn.exe PID 4540 wrote to memory of 1796 4540 hbhtnn.exe rlfxxrr.exe PID 4540 wrote to memory of 1796 4540 hbhtnn.exe rlfxxrr.exe PID 4540 wrote to memory of 1796 4540 hbhtnn.exe rlfxxrr.exe PID 1796 wrote to memory of 3652 1796 rlfxxrr.exe jvjdp.exe PID 1796 wrote to memory of 3652 1796 rlfxxrr.exe jvjdp.exe PID 1796 wrote to memory of 3652 1796 rlfxxrr.exe jvjdp.exe PID 3652 wrote to memory of 1060 3652 jvjdp.exe 1pvdd.exe PID 3652 wrote to memory of 1060 3652 jvjdp.exe 1pvdd.exe PID 3652 wrote to memory of 1060 3652 jvjdp.exe 1pvdd.exe PID 1060 wrote to memory of 3964 1060 1pvdd.exe fxrllll.exe PID 1060 wrote to memory of 3964 1060 1pvdd.exe fxrllll.exe PID 1060 wrote to memory of 3964 1060 1pvdd.exe fxrllll.exe PID 3964 wrote to memory of 2608 3964 fxrllll.exe 68488.exe PID 3964 wrote to memory of 2608 3964 fxrllll.exe 68488.exe PID 3964 wrote to memory of 2608 3964 fxrllll.exe 68488.exe PID 2608 wrote to memory of 4424 2608 68488.exe rllfxxx.exe PID 2608 wrote to memory of 4424 2608 68488.exe rllfxxx.exe PID 2608 wrote to memory of 4424 2608 68488.exe rllfxxx.exe PID 4424 wrote to memory of 2244 4424 rllfxxx.exe jvpjv.exe PID 4424 wrote to memory of 2244 4424 rllfxxx.exe jvpjv.exe PID 4424 wrote to memory of 2244 4424 rllfxxx.exe jvpjv.exe PID 2244 wrote to memory of 1276 2244 jvpjv.exe 60482.exe PID 2244 wrote to memory of 1276 2244 jvpjv.exe 60482.exe PID 2244 wrote to memory of 1276 2244 jvpjv.exe 60482.exe PID 1276 wrote to memory of 572 1276 60482.exe hbbnbt.exe PID 1276 wrote to memory of 572 1276 60482.exe hbbnbt.exe PID 1276 wrote to memory of 572 1276 60482.exe hbbnbt.exe PID 572 wrote to memory of 1720 572 hbbnbt.exe 868082.exe PID 572 wrote to memory of 1720 572 hbbnbt.exe 868082.exe PID 572 wrote to memory of 1720 572 hbbnbt.exe 868082.exe PID 1720 wrote to memory of 3480 1720 868082.exe 084048.exe PID 1720 wrote to memory of 3480 1720 868082.exe 084048.exe PID 1720 wrote to memory of 3480 1720 868082.exe 084048.exe PID 3480 wrote to memory of 5040 3480 084048.exe 264888.exe PID 3480 wrote to memory of 5040 3480 084048.exe 264888.exe PID 3480 wrote to memory of 5040 3480 084048.exe 264888.exe PID 5040 wrote to memory of 100 5040 264888.exe pjdvp.exe PID 5040 wrote to memory of 100 5040 264888.exe pjdvp.exe PID 5040 wrote to memory of 100 5040 264888.exe pjdvp.exe PID 100 wrote to memory of 4860 100 pjdvp.exe pvjdv.exe PID 100 wrote to memory of 4860 100 pjdvp.exe pvjdv.exe PID 100 wrote to memory of 4860 100 pjdvp.exe pvjdv.exe PID 4860 wrote to memory of 3624 4860 pvjdv.exe fxfrxrx.exe PID 4860 wrote to memory of 3624 4860 pvjdv.exe fxfrxrx.exe PID 4860 wrote to memory of 3624 4860 pvjdv.exe fxfrxrx.exe PID 3624 wrote to memory of 1536 3624 fxfrxrx.exe 5dpjv.exe PID 3624 wrote to memory of 1536 3624 fxfrxrx.exe 5dpjv.exe PID 3624 wrote to memory of 1536 3624 fxfrxrx.exe 5dpjv.exe PID 1536 wrote to memory of 1236 1536 5dpjv.exe 2048042.exe PID 1536 wrote to memory of 1236 1536 5dpjv.exe 2048042.exe PID 1536 wrote to memory of 1236 1536 5dpjv.exe 2048042.exe PID 1236 wrote to memory of 780 1236 2048042.exe q06426.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe"C:\Users\Admin\AppData\Local\Temp\f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\4884842.exec:\4884842.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
\??\c:\06260.exec:\06260.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\hbhhtt.exec:\hbhhtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\hbhtnn.exec:\hbhtnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\rlfxxrr.exec:\rlfxxrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\jvjdp.exec:\jvjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\1pvdd.exec:\1pvdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
\??\c:\fxrllll.exec:\fxrllll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\68488.exec:\68488.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\rllfxxx.exec:\rllfxxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\jvpjv.exec:\jvpjv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\60482.exec:\60482.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\hbbnbt.exec:\hbbnbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\868082.exec:\868082.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\084048.exec:\084048.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\264888.exec:\264888.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\pjdvp.exec:\pjdvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
\??\c:\pvjdv.exec:\pvjdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\fxfrxrx.exec:\fxfrxrx.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\5dpjv.exec:\5dpjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\2048042.exec:\2048042.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\q06426.exec:\q06426.exe23⤵
- Executes dropped EXE
PID:780 -
\??\c:\pdjjv.exec:\pdjjv.exe24⤵
- Executes dropped EXE
PID:1192 -
\??\c:\fffrfxl.exec:\fffrfxl.exe25⤵
- Executes dropped EXE
PID:1100 -
\??\c:\dpppj.exec:\dpppj.exe26⤵
- Executes dropped EXE
PID:2676 -
\??\c:\8020060.exec:\8020060.exe27⤵
- Executes dropped EXE
PID:3668 -
\??\c:\fxrxxff.exec:\fxrxxff.exe28⤵
- Executes dropped EXE
PID:4712 -
\??\c:\0466228.exec:\0466228.exe29⤵
- Executes dropped EXE
PID:4920 -
\??\c:\22888.exec:\22888.exe30⤵
- Executes dropped EXE
PID:2524 -
\??\c:\hbbbtn.exec:\hbbbtn.exe31⤵
- Executes dropped EXE
PID:224 -
\??\c:\tbbnht.exec:\tbbnht.exe32⤵
- Executes dropped EXE
PID:4036 -
\??\c:\bnnbnh.exec:\bnnbnh.exe33⤵
- Executes dropped EXE
PID:1772 -
\??\c:\20648.exec:\20648.exe34⤵
- Executes dropped EXE
PID:1404 -
\??\c:\0048208.exec:\0048208.exe35⤵
- Executes dropped EXE
PID:112 -
\??\c:\06862.exec:\06862.exe36⤵
- Executes dropped EXE
PID:4216 -
\??\c:\2042206.exec:\2042206.exe37⤵
- Executes dropped EXE
PID:1900 -
\??\c:\rfxrrrr.exec:\rfxrrrr.exe38⤵
- Executes dropped EXE
PID:3660 -
\??\c:\22820.exec:\22820.exe39⤵
- Executes dropped EXE
PID:3096 -
\??\c:\86204.exec:\86204.exe40⤵
- Executes dropped EXE
PID:1656 -
\??\c:\djpjd.exec:\djpjd.exe41⤵
- Executes dropped EXE
PID:3408 -
\??\c:\fffrxrf.exec:\fffrxrf.exe42⤵
- Executes dropped EXE
PID:3808 -
\??\c:\pddpj.exec:\pddpj.exe43⤵
- Executes dropped EXE
PID:1116 -
\??\c:\frlxllx.exec:\frlxllx.exe44⤵
- Executes dropped EXE
PID:1872 -
\??\c:\xrfxllx.exec:\xrfxllx.exe45⤵
- Executes dropped EXE
PID:3960 -
\??\c:\ppjvj.exec:\ppjvj.exe46⤵
- Executes dropped EXE
PID:4444 -
\??\c:\448204.exec:\448204.exe47⤵
- Executes dropped EXE
PID:4292 -
\??\c:\0460488.exec:\0460488.exe48⤵
- Executes dropped EXE
PID:1644 -
\??\c:\vvddp.exec:\vvddp.exe49⤵
- Executes dropped EXE
PID:3860 -
\??\c:\4024400.exec:\4024400.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1828 -
\??\c:\204860.exec:\204860.exe51⤵
- Executes dropped EXE
PID:4804 -
\??\c:\w64800.exec:\w64800.exe52⤵
- Executes dropped EXE
PID:5112 -
\??\c:\884204.exec:\884204.exe53⤵
- Executes dropped EXE
PID:4968 -
\??\c:\9bhbhh.exec:\9bhbhh.exe54⤵
- Executes dropped EXE
PID:3156 -
\??\c:\42608.exec:\42608.exe55⤵
- Executes dropped EXE
PID:4736 -
\??\c:\406026.exec:\406026.exe56⤵
- Executes dropped EXE
PID:4056 -
\??\c:\06608.exec:\06608.exe57⤵
- Executes dropped EXE
PID:1592 -
\??\c:\bthtbn.exec:\bthtbn.exe58⤵
- Executes dropped EXE
PID:3652 -
\??\c:\rlfrfxr.exec:\rlfrfxr.exe59⤵
- Executes dropped EXE
PID:5048 -
\??\c:\tttnhb.exec:\tttnhb.exe60⤵
- Executes dropped EXE
PID:4168 -
\??\c:\w48204.exec:\w48204.exe61⤵
- Executes dropped EXE
PID:1132 -
\??\c:\42042.exec:\42042.exe62⤵
- Executes dropped EXE
PID:2608 -
\??\c:\s8864.exec:\s8864.exe63⤵
- Executes dropped EXE
PID:2092 -
\??\c:\206460.exec:\206460.exe64⤵
- Executes dropped EXE
PID:4336 -
\??\c:\pvpdp.exec:\pvpdp.exe65⤵
- Executes dropped EXE
PID:4928 -
\??\c:\22864.exec:\22864.exe66⤵PID:2504
-
\??\c:\426022.exec:\426022.exe67⤵PID:4456
-
\??\c:\pppjd.exec:\pppjd.exe68⤵PID:4796
-
\??\c:\lxxlffx.exec:\lxxlffx.exe69⤵PID:4576
-
\??\c:\04262.exec:\04262.exe70⤵PID:412
-
\??\c:\a4082.exec:\a4082.exe71⤵PID:2356
-
\??\c:\xxfxlfx.exec:\xxfxlfx.exe72⤵PID:4976
-
\??\c:\082866.exec:\082866.exe73⤵PID:2728
-
\??\c:\nbbnbt.exec:\nbbnbt.exe74⤵PID:4860
-
\??\c:\jdvpj.exec:\jdvpj.exe75⤵PID:3624
-
\??\c:\3hhttn.exec:\3hhttn.exe76⤵PID:3980
-
\??\c:\s4420.exec:\s4420.exe77⤵PID:3908
-
\??\c:\jvpjp.exec:\jvpjp.exe78⤵PID:844
-
\??\c:\8882626.exec:\8882626.exe79⤵PID:2108
-
\??\c:\htnhtn.exec:\htnhtn.exe80⤵PID:1100
-
\??\c:\262604.exec:\262604.exe81⤵PID:4500
-
\??\c:\646082.exec:\646082.exe82⤵PID:4676
-
\??\c:\0882688.exec:\0882688.exe83⤵PID:4744
-
\??\c:\2020404.exec:\2020404.exe84⤵PID:4784
-
\??\c:\w28488.exec:\w28488.exe85⤵PID:948
-
\??\c:\7lxrffx.exec:\7lxrffx.exe86⤵PID:2216
-
\??\c:\dppjd.exec:\dppjd.exe87⤵PID:628
-
\??\c:\fxlxxxx.exec:\fxlxxxx.exe88⤵PID:3548
-
\??\c:\rrxxxxf.exec:\rrxxxxf.exe89⤵PID:2948
-
\??\c:\28886.exec:\28886.exe90⤵PID:1244
-
\??\c:\nbnnhb.exec:\nbnnhb.exe91⤵PID:4840
-
\??\c:\4686660.exec:\4686660.exe92⤵PID:3224
-
\??\c:\a4482.exec:\a4482.exe93⤵PID:3064
-
\??\c:\668620.exec:\668620.exe94⤵PID:2756
-
\??\c:\nhnhtt.exec:\nhnhtt.exe95⤵PID:5068
-
\??\c:\u406486.exec:\u406486.exe96⤵PID:3616
-
\??\c:\jvvpd.exec:\jvvpd.exe97⤵PID:816
-
\??\c:\9tthtn.exec:\9tthtn.exe98⤵PID:2844
-
\??\c:\bbhbtb.exec:\bbhbtb.exe99⤵PID:3488
-
\??\c:\rlrxlff.exec:\rlrxlff.exe100⤵PID:4428
-
\??\c:\5jdpd.exec:\5jdpd.exe101⤵PID:1212
-
\??\c:\nbthbh.exec:\nbthbh.exe102⤵PID:768
-
\??\c:\htbbbt.exec:\htbbbt.exe103⤵PID:3860
-
\??\c:\8848822.exec:\8848822.exe104⤵PID:4364
-
\??\c:\httnnh.exec:\httnnh.exe105⤵PID:1448
-
\??\c:\1hthtn.exec:\1hthtn.exe106⤵PID:3340
-
\??\c:\022604.exec:\022604.exe107⤵PID:4736
-
\??\c:\86608.exec:\86608.exe108⤵PID:1592
-
\??\c:\440862.exec:\440862.exe109⤵PID:3652
-
\??\c:\vpdpp.exec:\vpdpp.exe110⤵PID:4332
-
\??\c:\62420.exec:\62420.exe111⤵PID:4884
-
\??\c:\e84804.exec:\e84804.exe112⤵PID:4320
-
\??\c:\40048.exec:\40048.exe113⤵PID:1472
-
\??\c:\866862.exec:\866862.exe114⤵PID:1756
-
\??\c:\vddpv.exec:\vddpv.exe115⤵PID:4928
-
\??\c:\806204.exec:\806204.exe116⤵PID:2504
-
\??\c:\40086.exec:\40086.exe117⤵PID:4456
-
\??\c:\4226486.exec:\4226486.exe118⤵PID:1720
-
\??\c:\tnnhbt.exec:\tnnhbt.exe119⤵PID:3480
-
\??\c:\0400404.exec:\0400404.exe120⤵PID:1380
-
\??\c:\htbthb.exec:\htbthb.exe121⤵PID:100
-
\??\c:\i204260.exec:\i204260.exe122⤵PID:2064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-