Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2024, 04:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe
-
Size
50KB
-
MD5
0af5ec3b33e368af1423d7710f906619
-
SHA1
6d93e61d8e562f4b8ed97027a978c869a03d7d38
-
SHA256
f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0
-
SHA512
d56053c70cfff01344d9de289389ac387171dcf382a63342c280ac72cb47ce13e1e0196fac8df4662fa58855a187383e2eeedaddbb908a65255b25e5998cf5b7
-
SSDEEP
1536:mAocdpeVoBDulhzHMb7xNAa04Mcg5IKvlbD:0cdpeeBSHHMHLf9RyIc
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/5096-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3664-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2052-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3492-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1588-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2624-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1928-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4212-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3576-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1252-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/696-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1052-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4304-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2488-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3404-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1244-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3992-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/428-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3696-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4652-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4024-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4804-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3928-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4168-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3212-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1628-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1628-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2952-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1828-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4036-298-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2800-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2948-309-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1924-319-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/652-329-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4572-333-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-355-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4304-359-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1460-393-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3940-406-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1864-414-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-423-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1428-430-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3492-455-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3368-462-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1992-472-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2184-494-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/368-513-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4204-535-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4564-573-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3988-748-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1444-782-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-798-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-859-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4456-1281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2908-1527-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3664 68608.exe 2052 tnhbnb.exe 1580 1pdpv.exe 3492 3xxrfxr.exe 4492 u066482.exe 1588 0666600.exe 2424 ffffxxx.exe 1992 66428.exe 2624 llffrrf.exe 1768 82422.exe 892 028400.exe 1928 bhhhbb.exe 2316 66044.exe 2800 jvjjv.exe 1092 lxrfxxf.exe 4212 tnnhhh.exe 3240 bhnttb.exe 3576 028828.exe 1252 7lxfxlr.exe 3332 6888882.exe 696 48044.exe 1052 jddvp.exe 60 ttbhht.exe 4616 40688.exe 2648 vpppd.exe 4304 w08204.exe 2488 lrrfrlx.exe 3404 4062004.exe 1244 0064400.exe 972 602468.exe 3992 1dvpj.exe 428 48068.exe 3696 882604.exe 4424 66664.exe 4816 bnnhhb.exe 4476 nnnthb.exe 1132 08040.exe 960 lrxrlxr.exe 4652 22264.exe 4224 vppdp.exe 2956 dvpdv.exe 4024 a6240.exe 4724 62288.exe 4804 pjjjj.exe 3928 nhnnnn.exe 220 1fxrllx.exe 4836 488600.exe 4912 vdddd.exe 924 624444.exe 4168 djjjv.exe 1020 dddvp.exe 3212 dpvdd.exe 4016 9jjdv.exe 1628 i028468.exe 1604 bhbhbh.exe 1908 nnnnnh.exe 2952 644266.exe 1828 844820.exe 1140 ttbnhb.exe 2816 htnnnb.exe 2840 824624.exe 5052 048206.exe 2664 nhtnnt.exe 5016 hhnnhh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9flfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxfxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2840822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 282648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 802266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0400444.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 3664 5096 f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe 83 PID 5096 wrote to memory of 3664 5096 f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe 83 PID 5096 wrote to memory of 3664 5096 f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe 83 PID 3664 wrote to memory of 2052 3664 68608.exe 84 PID 3664 wrote to memory of 2052 3664 68608.exe 84 PID 3664 wrote to memory of 2052 3664 68608.exe 84 PID 2052 wrote to memory of 1580 2052 tnhbnb.exe 85 PID 2052 wrote to memory of 1580 2052 tnhbnb.exe 85 PID 2052 wrote to memory of 1580 2052 tnhbnb.exe 85 PID 1580 wrote to memory of 3492 1580 1pdpv.exe 86 PID 1580 wrote to memory of 3492 1580 1pdpv.exe 86 PID 1580 wrote to memory of 3492 1580 1pdpv.exe 86 PID 3492 wrote to memory of 4492 3492 3xxrfxr.exe 87 PID 3492 wrote to memory of 4492 3492 3xxrfxr.exe 87 PID 3492 wrote to memory of 4492 3492 3xxrfxr.exe 87 PID 4492 wrote to memory of 1588 4492 u066482.exe 88 PID 4492 wrote to memory of 1588 4492 u066482.exe 88 PID 4492 wrote to memory of 1588 4492 u066482.exe 88 PID 1588 wrote to memory of 2424 1588 0666600.exe 89 PID 1588 wrote to memory of 2424 1588 0666600.exe 89 PID 1588 wrote to memory of 2424 1588 0666600.exe 89 PID 2424 wrote to memory of 1992 2424 ffffxxx.exe 90 PID 2424 wrote to memory of 1992 2424 ffffxxx.exe 90 PID 2424 wrote to memory of 1992 2424 ffffxxx.exe 90 PID 1992 wrote to memory of 2624 1992 66428.exe 91 PID 1992 wrote to memory of 2624 1992 66428.exe 91 PID 1992 wrote to memory of 2624 1992 66428.exe 91 PID 2624 wrote to memory of 1768 2624 llffrrf.exe 92 PID 2624 wrote to memory of 1768 2624 llffrrf.exe 92 PID 2624 wrote to memory of 1768 2624 llffrrf.exe 92 PID 1768 wrote to memory of 892 1768 82422.exe 93 PID 1768 wrote to memory of 892 1768 82422.exe 93 PID 1768 wrote to memory of 892 1768 82422.exe 93 PID 892 wrote to memory of 1928 892 028400.exe 94 PID 892 wrote to memory of 1928 892 028400.exe 94 PID 892 wrote to memory of 1928 892 028400.exe 94 PID 1928 wrote to memory of 2316 1928 bhhhbb.exe 95 PID 1928 wrote to memory of 2316 1928 bhhhbb.exe 95 PID 1928 wrote to memory of 2316 1928 bhhhbb.exe 95 PID 2316 wrote to memory of 2800 2316 66044.exe 96 PID 2316 wrote to memory of 2800 2316 66044.exe 96 PID 2316 wrote to memory of 2800 2316 66044.exe 96 PID 2800 wrote to memory of 1092 2800 jvjjv.exe 97 PID 2800 wrote to memory of 1092 2800 jvjjv.exe 97 PID 2800 wrote to memory of 1092 2800 jvjjv.exe 97 PID 1092 wrote to memory of 4212 1092 lxrfxxf.exe 98 PID 1092 wrote to memory of 4212 1092 lxrfxxf.exe 98 PID 1092 wrote to memory of 4212 1092 lxrfxxf.exe 98 PID 4212 wrote to memory of 3240 4212 tnnhhh.exe 99 PID 4212 wrote to memory of 3240 4212 tnnhhh.exe 99 PID 4212 wrote to memory of 3240 4212 tnnhhh.exe 99 PID 3240 wrote to memory of 3576 3240 bhnttb.exe 100 PID 3240 wrote to memory of 3576 3240 bhnttb.exe 100 PID 3240 wrote to memory of 3576 3240 bhnttb.exe 100 PID 3576 wrote to memory of 1252 3576 028828.exe 101 PID 3576 wrote to memory of 1252 3576 028828.exe 101 PID 3576 wrote to memory of 1252 3576 028828.exe 101 PID 1252 wrote to memory of 3332 1252 7lxfxlr.exe 102 PID 1252 wrote to memory of 3332 1252 7lxfxlr.exe 102 PID 1252 wrote to memory of 3332 1252 7lxfxlr.exe 102 PID 3332 wrote to memory of 696 3332 6888882.exe 103 PID 3332 wrote to memory of 696 3332 6888882.exe 103 PID 3332 wrote to memory of 696 3332 6888882.exe 103 PID 696 wrote to memory of 1052 696 48044.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe"C:\Users\Admin\AppData\Local\Temp\f387a1ef45a32c9ce8f728693013ad994880608c37892e31df7c0adf1baeb9f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
\??\c:\68608.exec:\68608.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\tnhbnb.exec:\tnhbnb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
\??\c:\1pdpv.exec:\1pdpv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\3xxrfxr.exec:\3xxrfxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
\??\c:\u066482.exec:\u066482.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
\??\c:\0666600.exec:\0666600.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\ffffxxx.exec:\ffffxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\66428.exec:\66428.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\llffrrf.exec:\llffrrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\82422.exec:\82422.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\028400.exec:\028400.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
\??\c:\bhhhbb.exec:\bhhhbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\66044.exec:\66044.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\jvjjv.exec:\jvjjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\lxrfxxf.exec:\lxrfxxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
\??\c:\tnnhhh.exec:\tnnhhh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\bhnttb.exec:\bhnttb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
\??\c:\028828.exec:\028828.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\7lxfxlr.exec:\7lxfxlr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\6888882.exec:\6888882.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
\??\c:\48044.exec:\48044.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:696 -
\??\c:\jddvp.exec:\jddvp.exe23⤵
- Executes dropped EXE
PID:1052 -
\??\c:\ttbhht.exec:\ttbhht.exe24⤵
- Executes dropped EXE
PID:60 -
\??\c:\40688.exec:\40688.exe25⤵
- Executes dropped EXE
PID:4616 -
\??\c:\vpppd.exec:\vpppd.exe26⤵
- Executes dropped EXE
PID:2648 -
\??\c:\w08204.exec:\w08204.exe27⤵
- Executes dropped EXE
PID:4304 -
\??\c:\lrrfrlx.exec:\lrrfrlx.exe28⤵
- Executes dropped EXE
PID:2488 -
\??\c:\4062004.exec:\4062004.exe29⤵
- Executes dropped EXE
PID:3404 -
\??\c:\0064400.exec:\0064400.exe30⤵
- Executes dropped EXE
PID:1244 -
\??\c:\602468.exec:\602468.exe31⤵
- Executes dropped EXE
PID:972 -
\??\c:\1dvpj.exec:\1dvpj.exe32⤵
- Executes dropped EXE
PID:3992 -
\??\c:\48068.exec:\48068.exe33⤵
- Executes dropped EXE
PID:428 -
\??\c:\882604.exec:\882604.exe34⤵
- Executes dropped EXE
PID:3696 -
\??\c:\66664.exec:\66664.exe35⤵
- Executes dropped EXE
PID:4424 -
\??\c:\bnnhhb.exec:\bnnhhb.exe36⤵
- Executes dropped EXE
PID:4816 -
\??\c:\nnnthb.exec:\nnnthb.exe37⤵
- Executes dropped EXE
PID:4476 -
\??\c:\08040.exec:\08040.exe38⤵
- Executes dropped EXE
PID:1132 -
\??\c:\lrxrlxr.exec:\lrxrlxr.exe39⤵
- Executes dropped EXE
PID:960 -
\??\c:\22264.exec:\22264.exe40⤵
- Executes dropped EXE
PID:4652 -
\??\c:\vppdp.exec:\vppdp.exe41⤵
- Executes dropped EXE
PID:4224 -
\??\c:\dvpdv.exec:\dvpdv.exe42⤵
- Executes dropped EXE
PID:2956 -
\??\c:\a6240.exec:\a6240.exe43⤵
- Executes dropped EXE
PID:4024 -
\??\c:\62288.exec:\62288.exe44⤵
- Executes dropped EXE
PID:4724 -
\??\c:\pjjjj.exec:\pjjjj.exe45⤵
- Executes dropped EXE
PID:4804 -
\??\c:\nhnnnn.exec:\nhnnnn.exe46⤵
- Executes dropped EXE
PID:3928 -
\??\c:\1fxrllx.exec:\1fxrllx.exe47⤵
- Executes dropped EXE
PID:220 -
\??\c:\488600.exec:\488600.exe48⤵
- Executes dropped EXE
PID:4836 -
\??\c:\jjpdv.exec:\jjpdv.exe49⤵PID:1744
-
\??\c:\vdddd.exec:\vdddd.exe50⤵
- Executes dropped EXE
PID:4912 -
\??\c:\624444.exec:\624444.exe51⤵
- Executes dropped EXE
PID:924 -
\??\c:\djjjv.exec:\djjjv.exe52⤵
- Executes dropped EXE
PID:4168 -
\??\c:\dddvp.exec:\dddvp.exe53⤵
- Executes dropped EXE
PID:1020 -
\??\c:\dpvdd.exec:\dpvdd.exe54⤵
- Executes dropped EXE
PID:3212 -
\??\c:\9jjdv.exec:\9jjdv.exe55⤵
- Executes dropped EXE
PID:4016 -
\??\c:\i028468.exec:\i028468.exe56⤵
- Executes dropped EXE
PID:1628 -
\??\c:\bhbhbh.exec:\bhbhbh.exe57⤵
- Executes dropped EXE
PID:1604 -
\??\c:\nnnnnh.exec:\nnnnnh.exe58⤵
- Executes dropped EXE
PID:1908 -
\??\c:\644266.exec:\644266.exe59⤵
- Executes dropped EXE
PID:2952 -
\??\c:\844820.exec:\844820.exe60⤵
- Executes dropped EXE
PID:1828 -
\??\c:\ttbnhb.exec:\ttbnhb.exe61⤵
- Executes dropped EXE
PID:1140 -
\??\c:\htnnnb.exec:\htnnnb.exe62⤵
- Executes dropped EXE
PID:2816 -
\??\c:\824624.exec:\824624.exe63⤵
- Executes dropped EXE
PID:2840 -
\??\c:\048206.exec:\048206.exe64⤵
- Executes dropped EXE
PID:5052 -
\??\c:\nhtnnt.exec:\nhtnnt.exe65⤵
- Executes dropped EXE
PID:2664 -
\??\c:\hhnnhh.exec:\hhnnhh.exe66⤵
- Executes dropped EXE
PID:5016 -
\??\c:\6022880.exec:\6022880.exe67⤵PID:4036
-
\??\c:\2882260.exec:\2882260.exe68⤵PID:1076
-
\??\c:\hhbtth.exec:\hhbtth.exe69⤵PID:2800
-
\??\c:\2040684.exec:\2040684.exe70⤵PID:2948
-
\??\c:\628822.exec:\628822.exe71⤵PID:1620
-
\??\c:\26840.exec:\26840.exe72⤵PID:3240
-
\??\c:\jjdvj.exec:\jjdvj.exe73⤵PID:1924
-
\??\c:\42866.exec:\42866.exe74⤵PID:3468
-
\??\c:\c682666.exec:\c682666.exe75⤵PID:3900
-
\??\c:\bhbbtt.exec:\bhbbtt.exe76⤵PID:652
-
\??\c:\lffxrrl.exec:\lffxrrl.exe77⤵PID:4572
-
\??\c:\jjvvd.exec:\jjvvd.exe78⤵PID:868
-
\??\c:\ddjdp.exec:\ddjdp.exe79⤵PID:4204
-
\??\c:\a4424.exec:\a4424.exe80⤵PID:1708
-
\??\c:\jvdjp.exec:\jvdjp.exe81⤵PID:3948
-
\??\c:\tbhnnt.exec:\tbhnnt.exe82⤵PID:2732
-
\??\c:\k84848.exec:\k84848.exe83⤵PID:4660
-
\??\c:\ttthtn.exec:\ttthtn.exe84⤵PID:2648
-
\??\c:\26604.exec:\26604.exe85⤵PID:4304
-
\??\c:\a8486.exec:\a8486.exe86⤵PID:3484
-
\??\c:\ppvdd.exec:\ppvdd.exe87⤵PID:2640
-
\??\c:\lffffrl.exec:\lffffrl.exe88⤵PID:3404
-
\??\c:\flllfxr.exec:\flllfxr.exe89⤵PID:2764
-
\??\c:\44060.exec:\44060.exe90⤵PID:3964
-
\??\c:\bbtnbh.exec:\bbtnbh.exe91⤵PID:4656
-
\??\c:\0620482.exec:\0620482.exe92⤵PID:1404
-
\??\c:\20608.exec:\20608.exe93⤵PID:4296
-
\??\c:\1hnhnn.exec:\1hnhnn.exe94⤵PID:3440
-
\??\c:\vvjjj.exec:\vvjjj.exe95⤵PID:5100
-
\??\c:\9lllxfx.exec:\9lllxfx.exe96⤵PID:1460
-
\??\c:\dvddv.exec:\dvddv.exe97⤵PID:2552
-
\??\c:\o688888.exec:\o688888.exe98⤵PID:4540
-
\??\c:\2428488.exec:\2428488.exe99⤵PID:1748
-
\??\c:\w06040.exec:\w06040.exe100⤵PID:3940
-
\??\c:\s0882.exec:\s0882.exe101⤵PID:3988
-
\??\c:\8806684.exec:\8806684.exe102⤵PID:5060
-
\??\c:\lxflflf.exec:\lxflflf.exe103⤵PID:1864
-
\??\c:\vjvdd.exec:\vjvdd.exe104⤵PID:4024
-
\??\c:\8866880.exec:\8866880.exe105⤵PID:4524
-
\??\c:\hnbbbh.exec:\hnbbbh.exe106⤵PID:4716
-
\??\c:\440662.exec:\440662.exe107⤵PID:1428
-
\??\c:\4422046.exec:\4422046.exe108⤵PID:4364
-
\??\c:\6464446.exec:\6464446.exe109⤵PID:2280
-
\??\c:\24604.exec:\24604.exe110⤵PID:1744
-
\??\c:\tnbbbh.exec:\tnbbbh.exe111⤵PID:1868
-
\??\c:\62000.exec:\62000.exe112⤵PID:924
-
\??\c:\m6886.exec:\m6886.exe113⤵PID:4168
-
\??\c:\7nnnnh.exec:\7nnnnh.exe114⤵PID:4924
-
\??\c:\284440.exec:\284440.exe115⤵PID:3492
-
\??\c:\a2420.exec:\a2420.exe116⤵PID:224
-
\??\c:\hhtbht.exec:\hhtbht.exe117⤵PID:3368
-
\??\c:\80666.exec:\80666.exe118⤵PID:1584
-
\??\c:\w28888.exec:\w28888.exe119⤵PID:4280
-
\??\c:\022226.exec:\022226.exe120⤵PID:1992
-
\??\c:\4286048.exec:\4286048.exe121⤵PID:3524
-
\??\c:\7pvpj.exec:\7pvpj.exe122⤵PID:3844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-