Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe
Resource
win7-20240729-en
General
-
Target
0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe
-
Size
93KB
-
MD5
d0894c5dc08ea0b08316156d50f75a60
-
SHA1
fd380798628466a2d84001735e0b967666b1ecd3
-
SHA256
0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1a
-
SHA512
a7f8385bdd95435ba7110934d0a2a85bd264e400029261f18d537e4e3cf4bdcb9fa6e7dfae7d103995e299a0bedbe7d3278da91207edc423b3eb99e42c2ba516
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73t6MlYqn+jMp99zx/A0Utg8:ymb3NkkiQ3mdBjFo73tvn+Yp99zDuP
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/1536-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1204-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1204-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3636-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4904-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3820-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1136-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1924-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4112-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4060-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1512-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3400-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3412-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3632-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5096-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3916-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4380-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1204 frrlllf.exe 3636 ppppv.exe 1648 xxrrlrr.exe 4904 pjppv.exe 1136 tbnbbh.exe 3820 82004.exe 3640 7xxxxxx.exe 4796 frxxfff.exe 1924 nhhhbb.exe 4112 lffxxxx.exe 4060 frfrxrx.exe 2144 88486.exe 4224 82468.exe 5100 8022666.exe 1512 vpddd.exe 3400 llllfll.exe 3412 4664828.exe 1456 lrrrxxl.exe 3740 c420088.exe 3632 622866.exe 1008 bnnhbb.exe 5096 6644488.exe 4528 hnhhbh.exe 3916 xxrrrrf.exe 1960 62888.exe 3496 68044.exe 2884 624240.exe 4380 dddpj.exe 2864 1nnttn.exe 2012 rlfxxxx.exe 4924 xlrffxx.exe 4724 0604880.exe 1060 8022666.exe 2724 0028226.exe 4552 48848.exe 3736 1xfxxxx.exe 2124 86868.exe 4824 xxlfrxl.exe 4340 hhbbhh.exe 3944 rrllxrl.exe 2716 ffrxlfx.exe 3832 ttnbnh.exe 3624 btthbt.exe 1336 dvppj.exe 3560 c200602.exe 312 btntbb.exe 3040 bntbnb.exe 3432 0062666.exe 1684 4800022.exe 2436 46888.exe 3900 884000.exe 2860 04666.exe 1416 nnhbnt.exe 2116 80660.exe 4796 08000.exe 1924 xxrllrl.exe 4752 0646828.exe 2336 1tbtbb.exe 4060 8648668.exe 244 nhttnt.exe 1616 6844444.exe 3064 tttttt.exe 2208 28620.exe 5100 66484.exe -
resource yara_rule behavioral2/memory/1536-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1204-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1204-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3636-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3820-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3640-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1136-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1924-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1924-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4060-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1512-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3400-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3412-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5096-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3916-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4380-187-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k66026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8844826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8660044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6860444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrflfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8022666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0488008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c066066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4642.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1204 1536 0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe 85 PID 1536 wrote to memory of 1204 1536 0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe 85 PID 1536 wrote to memory of 1204 1536 0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe 85 PID 1204 wrote to memory of 3636 1204 frrlllf.exe 86 PID 1204 wrote to memory of 3636 1204 frrlllf.exe 86 PID 1204 wrote to memory of 3636 1204 frrlllf.exe 86 PID 3636 wrote to memory of 1648 3636 ppppv.exe 87 PID 3636 wrote to memory of 1648 3636 ppppv.exe 87 PID 3636 wrote to memory of 1648 3636 ppppv.exe 87 PID 1648 wrote to memory of 4904 1648 xxrrlrr.exe 88 PID 1648 wrote to memory of 4904 1648 xxrrlrr.exe 88 PID 1648 wrote to memory of 4904 1648 xxrrlrr.exe 88 PID 4904 wrote to memory of 1136 4904 pjppv.exe 89 PID 4904 wrote to memory of 1136 4904 pjppv.exe 89 PID 4904 wrote to memory of 1136 4904 pjppv.exe 89 PID 1136 wrote to memory of 3820 1136 tbnbbh.exe 90 PID 1136 wrote to memory of 3820 1136 tbnbbh.exe 90 PID 1136 wrote to memory of 3820 1136 tbnbbh.exe 90 PID 3820 wrote to memory of 3640 3820 82004.exe 91 PID 3820 wrote to memory of 3640 3820 82004.exe 91 PID 3820 wrote to memory of 3640 3820 82004.exe 91 PID 3640 wrote to memory of 4796 3640 7xxxxxx.exe 92 PID 3640 wrote to memory of 4796 3640 7xxxxxx.exe 92 PID 3640 wrote to memory of 4796 3640 7xxxxxx.exe 92 PID 4796 wrote to memory of 1924 4796 frxxfff.exe 93 PID 4796 wrote to memory of 1924 4796 frxxfff.exe 93 PID 4796 wrote to memory of 1924 4796 frxxfff.exe 93 PID 1924 wrote to memory of 4112 1924 nhhhbb.exe 94 PID 1924 wrote to memory of 4112 1924 nhhhbb.exe 94 PID 1924 wrote to memory of 4112 1924 nhhhbb.exe 94 PID 4112 wrote to memory of 4060 4112 lffxxxx.exe 95 PID 4112 wrote to memory of 4060 4112 lffxxxx.exe 95 PID 4112 wrote to memory of 4060 4112 lffxxxx.exe 95 PID 4060 wrote to memory of 2144 4060 frfrxrx.exe 96 PID 4060 wrote to memory of 2144 4060 frfrxrx.exe 96 PID 4060 wrote to memory of 2144 4060 frfrxrx.exe 96 PID 2144 wrote to memory of 4224 2144 88486.exe 97 PID 2144 wrote to memory of 4224 2144 88486.exe 97 PID 2144 wrote to memory of 4224 2144 88486.exe 97 PID 4224 wrote to memory of 5100 4224 82468.exe 98 PID 4224 wrote to memory of 5100 4224 82468.exe 98 PID 4224 wrote to memory of 5100 4224 82468.exe 98 PID 5100 wrote to memory of 1512 5100 8022666.exe 99 PID 5100 wrote to memory of 1512 5100 8022666.exe 99 PID 5100 wrote to memory of 1512 5100 8022666.exe 99 PID 1512 wrote to memory of 3400 1512 vpddd.exe 100 PID 1512 wrote to memory of 3400 1512 vpddd.exe 100 PID 1512 wrote to memory of 3400 1512 vpddd.exe 100 PID 3400 wrote to memory of 3412 3400 llllfll.exe 101 PID 3400 wrote to memory of 3412 3400 llllfll.exe 101 PID 3400 wrote to memory of 3412 3400 llllfll.exe 101 PID 3412 wrote to memory of 1456 3412 4664828.exe 102 PID 3412 wrote to memory of 1456 3412 4664828.exe 102 PID 3412 wrote to memory of 1456 3412 4664828.exe 102 PID 1456 wrote to memory of 3740 1456 lrrrxxl.exe 103 PID 1456 wrote to memory of 3740 1456 lrrrxxl.exe 103 PID 1456 wrote to memory of 3740 1456 lrrrxxl.exe 103 PID 3740 wrote to memory of 3632 3740 c420088.exe 104 PID 3740 wrote to memory of 3632 3740 c420088.exe 104 PID 3740 wrote to memory of 3632 3740 c420088.exe 104 PID 3632 wrote to memory of 1008 3632 622866.exe 105 PID 3632 wrote to memory of 1008 3632 622866.exe 105 PID 3632 wrote to memory of 1008 3632 622866.exe 105 PID 1008 wrote to memory of 5096 1008 bnnhbb.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe"C:\Users\Admin\AppData\Local\Temp\0c7265eb92231c0232d3b983bc08ec1efb8cb9b650214b46cb973ca4f22e9c1aN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\frrlllf.exec:\frrlllf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\ppppv.exec:\ppppv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\xxrrlrr.exec:\xxrrlrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\pjppv.exec:\pjppv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\tbnbbh.exec:\tbnbbh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\82004.exec:\82004.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
\??\c:\7xxxxxx.exec:\7xxxxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\frxxfff.exec:\frxxfff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\nhhhbb.exec:\nhhhbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\lffxxxx.exec:\lffxxxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
\??\c:\frfrxrx.exec:\frfrxrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\88486.exec:\88486.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\82468.exec:\82468.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\8022666.exec:\8022666.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\vpddd.exec:\vpddd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\llllfll.exec:\llllfll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
\??\c:\4664828.exec:\4664828.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
\??\c:\lrrrxxl.exec:\lrrrxxl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\c420088.exec:\c420088.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3740 -
\??\c:\622866.exec:\622866.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\bnnhbb.exec:\bnnhbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\6644488.exec:\6644488.exe23⤵
- Executes dropped EXE
PID:5096 -
\??\c:\hnhhbh.exec:\hnhhbh.exe24⤵
- Executes dropped EXE
PID:4528 -
\??\c:\xxrrrrf.exec:\xxrrrrf.exe25⤵
- Executes dropped EXE
PID:3916 -
\??\c:\62888.exec:\62888.exe26⤵
- Executes dropped EXE
PID:1960 -
\??\c:\68044.exec:\68044.exe27⤵
- Executes dropped EXE
PID:3496 -
\??\c:\624240.exec:\624240.exe28⤵
- Executes dropped EXE
PID:2884 -
\??\c:\dddpj.exec:\dddpj.exe29⤵
- Executes dropped EXE
PID:4380 -
\??\c:\1nnttn.exec:\1nnttn.exe30⤵
- Executes dropped EXE
PID:2864 -
\??\c:\rlfxxxx.exec:\rlfxxxx.exe31⤵
- Executes dropped EXE
PID:2012 -
\??\c:\xlrffxx.exec:\xlrffxx.exe32⤵
- Executes dropped EXE
PID:4924 -
\??\c:\0604880.exec:\0604880.exe33⤵
- Executes dropped EXE
PID:4724 -
\??\c:\8022666.exec:\8022666.exe34⤵
- Executes dropped EXE
PID:1060 -
\??\c:\0028226.exec:\0028226.exe35⤵
- Executes dropped EXE
PID:2724 -
\??\c:\48848.exec:\48848.exe36⤵
- Executes dropped EXE
PID:4552 -
\??\c:\1xfxxxx.exec:\1xfxxxx.exe37⤵
- Executes dropped EXE
PID:3736 -
\??\c:\86868.exec:\86868.exe38⤵
- Executes dropped EXE
PID:2124 -
\??\c:\xxlfrxl.exec:\xxlfrxl.exe39⤵
- Executes dropped EXE
PID:4824 -
\??\c:\hhbbhh.exec:\hhbbhh.exe40⤵
- Executes dropped EXE
PID:4340 -
\??\c:\rrllxrl.exec:\rrllxrl.exe41⤵
- Executes dropped EXE
PID:3944 -
\??\c:\ffrxlfx.exec:\ffrxlfx.exe42⤵
- Executes dropped EXE
PID:2716 -
\??\c:\ttnbnh.exec:\ttnbnh.exe43⤵
- Executes dropped EXE
PID:3832 -
\??\c:\btthbt.exec:\btthbt.exe44⤵
- Executes dropped EXE
PID:3624 -
\??\c:\dvppj.exec:\dvppj.exe45⤵
- Executes dropped EXE
PID:1336 -
\??\c:\c200602.exec:\c200602.exe46⤵
- Executes dropped EXE
PID:3560 -
\??\c:\btntbb.exec:\btntbb.exe47⤵
- Executes dropped EXE
PID:312 -
\??\c:\bntbnb.exec:\bntbnb.exe48⤵
- Executes dropped EXE
PID:3040 -
\??\c:\0062666.exec:\0062666.exe49⤵
- Executes dropped EXE
PID:3432 -
\??\c:\4800022.exec:\4800022.exe50⤵
- Executes dropped EXE
PID:1684 -
\??\c:\46888.exec:\46888.exe51⤵
- Executes dropped EXE
PID:2436 -
\??\c:\884000.exec:\884000.exe52⤵
- Executes dropped EXE
PID:3900 -
\??\c:\04666.exec:\04666.exe53⤵
- Executes dropped EXE
PID:2860 -
\??\c:\nnhbnt.exec:\nnhbnt.exe54⤵
- Executes dropped EXE
PID:1416 -
\??\c:\80660.exec:\80660.exe55⤵
- Executes dropped EXE
PID:2116 -
\??\c:\08000.exec:\08000.exe56⤵
- Executes dropped EXE
PID:4796 -
\??\c:\xxrllrl.exec:\xxrllrl.exe57⤵
- Executes dropped EXE
PID:1924 -
\??\c:\0646828.exec:\0646828.exe58⤵
- Executes dropped EXE
PID:4752 -
\??\c:\1tbtbb.exec:\1tbtbb.exe59⤵
- Executes dropped EXE
PID:2336 -
\??\c:\8648668.exec:\8648668.exe60⤵
- Executes dropped EXE
PID:4060 -
\??\c:\nhttnt.exec:\nhttnt.exe61⤵
- Executes dropped EXE
PID:244 -
\??\c:\6844444.exec:\6844444.exe62⤵
- Executes dropped EXE
PID:1616 -
\??\c:\tttttt.exec:\tttttt.exe63⤵
- Executes dropped EXE
PID:3064 -
\??\c:\28620.exec:\28620.exe64⤵
- Executes dropped EXE
PID:2208 -
\??\c:\66484.exec:\66484.exe65⤵
- Executes dropped EXE
PID:5100 -
\??\c:\s6444.exec:\s6444.exe66⤵PID:3540
-
\??\c:\xrrlflf.exec:\xrrlflf.exe67⤵PID:3456
-
\??\c:\vpvvv.exec:\vpvvv.exe68⤵PID:3380
-
\??\c:\24664.exec:\24664.exe69⤵PID:640
-
\??\c:\40260.exec:\40260.exe70⤵PID:4216
-
\??\c:\c428624.exec:\c428624.exe71⤵PID:5032
-
\??\c:\a6660.exec:\a6660.exe72⤵PID:4648
-
\??\c:\48048.exec:\48048.exe73⤵PID:4160
-
\??\c:\vjjjd.exec:\vjjjd.exe74⤵PID:3208
-
\??\c:\vdvjv.exec:\vdvjv.exe75⤵PID:3896
-
\??\c:\26626.exec:\26626.exe76⤵PID:2752
-
\??\c:\66828.exec:\66828.exe77⤵PID:4776
-
\??\c:\4422288.exec:\4422288.exe78⤵PID:1676
-
\??\c:\446004.exec:\446004.exe79⤵PID:1960
-
\??\c:\1nhhhn.exec:\1nhhhn.exe80⤵PID:2344
-
\??\c:\4840866.exec:\4840866.exe81⤵PID:928
-
\??\c:\644444.exec:\644444.exe82⤵PID:4872
-
\??\c:\8660044.exec:\8660044.exe83⤵
- System Location Discovery: System Language Discovery
PID:1552 -
\??\c:\284448.exec:\284448.exe84⤵PID:3956
-
\??\c:\3jddd.exec:\3jddd.exe85⤵PID:4460
-
\??\c:\bthnnt.exec:\bthnnt.exe86⤵PID:4040
-
\??\c:\nhhbbh.exec:\nhhbbh.exe87⤵PID:2060
-
\??\c:\40886.exec:\40886.exe88⤵PID:552
-
\??\c:\fxfxfff.exec:\fxfxfff.exe89⤵PID:1060
-
\??\c:\dvjjd.exec:\dvjjd.exe90⤵PID:3876
-
\??\c:\428200.exec:\428200.exe91⤵PID:4480
-
\??\c:\w06644.exec:\w06644.exe92⤵PID:3736
-
\??\c:\44666.exec:\44666.exe93⤵PID:4988
-
\??\c:\60004.exec:\60004.exe94⤵PID:4512
-
\??\c:\nbhbtt.exec:\nbhbtt.exe95⤵PID:4340
-
\??\c:\66226.exec:\66226.exe96⤵PID:4908
-
\??\c:\5rxxxfr.exec:\5rxxxfr.exe97⤵PID:3504
-
\??\c:\fxrxlfx.exec:\fxrxlfx.exe98⤵PID:4332
-
\??\c:\bttbbh.exec:\bttbbh.exe99⤵PID:2940
-
\??\c:\djvvv.exec:\djvvv.exe100⤵PID:964
-
\??\c:\22044.exec:\22044.exe101⤵PID:4388
-
\??\c:\8466806.exec:\8466806.exe102⤵PID:4464
-
\??\c:\46860.exec:\46860.exe103⤵PID:4008
-
\??\c:\828888.exec:\828888.exe104⤵PID:2508
-
\??\c:\88048.exec:\88048.exe105⤵PID:1312
-
\??\c:\2462666.exec:\2462666.exe106⤵PID:3172
-
\??\c:\0826228.exec:\0826228.exe107⤵PID:3820
-
\??\c:\vpvpv.exec:\vpvpv.exe108⤵PID:3640
-
\??\c:\nnbnbt.exec:\nnbnbt.exe109⤵PID:3772
-
\??\c:\848268.exec:\848268.exe110⤵PID:4884
-
\??\c:\llxlxfl.exec:\llxlxfl.exe111⤵PID:264
-
\??\c:\42660.exec:\42660.exe112⤵PID:2428
-
\??\c:\k24680.exec:\k24680.exe113⤵PID:4252
-
\??\c:\vddvj.exec:\vddvj.exe114⤵PID:4956
-
\??\c:\440000.exec:\440000.exe115⤵PID:4788
-
\??\c:\rrffrrr.exec:\rrffrrr.exe116⤵PID:744
-
\??\c:\62444.exec:\62444.exe117⤵PID:3548
-
\??\c:\6428884.exec:\6428884.exe118⤵PID:4900
-
\??\c:\64206.exec:\64206.exe119⤵PID:4520
-
\??\c:\fllxffl.exec:\fllxffl.exe120⤵PID:1332
-
\??\c:\hhhtht.exec:\hhhtht.exe121⤵PID:2904
-
\??\c:\28864.exec:\28864.exe122⤵PID:1512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-