Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 02:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe
-
Size
61KB
-
MD5
f2c1b49e9873f3f1a4baa2b407b87308
-
SHA1
0f1545db8235abd2602d76bc95d573c59f0001bb
-
SHA256
8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f
-
SHA512
3976b702d5721fb24e52a83fbf7d5d34799f312c80d37d98c3ffcdb925b4cc858f5e9f6bbbd0f4fd060013e6e95e373277e20bede98b0a9fdb677b08e992af7f
-
SSDEEP
1536:mAocdpeVoBDulhzHMb7xNAa04Mcg5IKvlNJiT:0cdpeeBSHHMHLf9RyIEQT
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2612-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1944-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1496-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2392-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/384-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3636-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4212-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1036-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3512-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1932-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3676-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1612-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3280-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1996-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2716-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/100-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2908-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3936-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2692-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1220-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/900-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3256-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/512-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3220-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1100-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2876-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4300-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4408-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3440-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4992-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3896-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/708-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1012-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3124-325-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1492-332-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4724-339-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4296-364-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-375-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2240-403-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/776-408-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3996-459-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3512-466-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3516-473-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3176-504-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1348-514-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4036-545-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-588-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2204-595-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2992-698-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2664-702-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4232-724-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3380-734-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1652-864-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2828-928-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4196-1133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-1662-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1036 04428.exe 1944 dvvpd.exe 1496 4848600.exe 4212 262602.exe 2392 tbbbbt.exe 3636 bntthb.exe 5108 02888.exe 384 frxrrrl.exe 3512 08864.exe 2576 4405dj.exe 3676 044622.exe 1932 84042.exe 1852 xrlfxrf.exe 1612 4422200.exe 2820 k62266.exe 3280 k80422.exe 1996 442888.exe 2716 lffffff.exe 100 6666482.exe 2908 xxlfxxf.exe 4536 8888228.exe 3936 hnttnt.exe 3052 024248.exe 2692 dpdjj.exe 3640 440008.exe 1220 dddvd.exe 4964 lrrlffr.exe 900 ppjdd.exe 2400 nbbhbn.exe 3256 jdpvd.exe 3684 646284.exe 3180 thbtnt.exe 512 hbtnhh.exe 4160 nbbbnh.exe 4460 4806806.exe 3220 xxxxxrx.exe 2308 8222626.exe 4844 48044.exe 1100 20048.exe 2236 ntbbhh.exe 2876 44608.exe 2280 620422.exe 4124 24622.exe 2724 44442.exe 1576 rrlxrlf.exe 4300 bhhhbt.exe 4408 xlrlxxr.exe 4032 240448.exe 3440 5flfrxx.exe 4640 446884.exe 5076 rrlllff.exe 2164 668804.exe 2672 68488.exe 4992 bnthtt.exe 3908 pdvvp.exe 3996 htnnbt.exe 3896 jjdvj.exe 2088 48404.exe 1796 0682860.exe 3516 rfllfff.exe 920 pvdvp.exe 3468 nnnbnn.exe 708 jjpjj.exe 1012 664808.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2644480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6600662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0626048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0682860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 604826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxllff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 806226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1036 2612 8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe 80 PID 2612 wrote to memory of 1036 2612 8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe 80 PID 2612 wrote to memory of 1036 2612 8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe 80 PID 1036 wrote to memory of 1944 1036 04428.exe 81 PID 1036 wrote to memory of 1944 1036 04428.exe 81 PID 1036 wrote to memory of 1944 1036 04428.exe 81 PID 1944 wrote to memory of 1496 1944 dvvpd.exe 82 PID 1944 wrote to memory of 1496 1944 dvvpd.exe 82 PID 1944 wrote to memory of 1496 1944 dvvpd.exe 82 PID 1496 wrote to memory of 4212 1496 4848600.exe 83 PID 1496 wrote to memory of 4212 1496 4848600.exe 83 PID 1496 wrote to memory of 4212 1496 4848600.exe 83 PID 4212 wrote to memory of 2392 4212 262602.exe 84 PID 4212 wrote to memory of 2392 4212 262602.exe 84 PID 4212 wrote to memory of 2392 4212 262602.exe 84 PID 2392 wrote to memory of 3636 2392 tbbbbt.exe 85 PID 2392 wrote to memory of 3636 2392 tbbbbt.exe 85 PID 2392 wrote to memory of 3636 2392 tbbbbt.exe 85 PID 3636 wrote to memory of 5108 3636 bntthb.exe 86 PID 3636 wrote to memory of 5108 3636 bntthb.exe 86 PID 3636 wrote to memory of 5108 3636 bntthb.exe 86 PID 5108 wrote to memory of 384 5108 02888.exe 87 PID 5108 wrote to memory of 384 5108 02888.exe 87 PID 5108 wrote to memory of 384 5108 02888.exe 87 PID 384 wrote to memory of 3512 384 frxrrrl.exe 88 PID 384 wrote to memory of 3512 384 frxrrrl.exe 88 PID 384 wrote to memory of 3512 384 frxrrrl.exe 88 PID 3512 wrote to memory of 2576 3512 08864.exe 89 PID 3512 wrote to memory of 2576 3512 08864.exe 89 PID 3512 wrote to memory of 2576 3512 08864.exe 89 PID 2576 wrote to memory of 3676 2576 4405dj.exe 91 PID 2576 wrote to memory of 3676 2576 4405dj.exe 91 PID 2576 wrote to memory of 3676 2576 4405dj.exe 91 PID 3676 wrote to memory of 1932 3676 044622.exe 92 PID 3676 wrote to memory of 1932 3676 044622.exe 92 PID 3676 wrote to memory of 1932 3676 044622.exe 92 PID 1932 wrote to memory of 1852 1932 84042.exe 93 PID 1932 wrote to memory of 1852 1932 84042.exe 93 PID 1932 wrote to memory of 1852 1932 84042.exe 93 PID 1852 wrote to memory of 1612 1852 xrlfxrf.exe 94 PID 1852 wrote to memory of 1612 1852 xrlfxrf.exe 94 PID 1852 wrote to memory of 1612 1852 xrlfxrf.exe 94 PID 1612 wrote to memory of 2820 1612 4422200.exe 96 PID 1612 wrote to memory of 2820 1612 4422200.exe 96 PID 1612 wrote to memory of 2820 1612 4422200.exe 96 PID 2820 wrote to memory of 3280 2820 k62266.exe 97 PID 2820 wrote to memory of 3280 2820 k62266.exe 97 PID 2820 wrote to memory of 3280 2820 k62266.exe 97 PID 3280 wrote to memory of 1996 3280 k80422.exe 98 PID 3280 wrote to memory of 1996 3280 k80422.exe 98 PID 3280 wrote to memory of 1996 3280 k80422.exe 98 PID 1996 wrote to memory of 2716 1996 442888.exe 99 PID 1996 wrote to memory of 2716 1996 442888.exe 99 PID 1996 wrote to memory of 2716 1996 442888.exe 99 PID 2716 wrote to memory of 100 2716 lffffff.exe 100 PID 2716 wrote to memory of 100 2716 lffffff.exe 100 PID 2716 wrote to memory of 100 2716 lffffff.exe 100 PID 100 wrote to memory of 2908 100 6666482.exe 101 PID 100 wrote to memory of 2908 100 6666482.exe 101 PID 100 wrote to memory of 2908 100 6666482.exe 101 PID 2908 wrote to memory of 4536 2908 xxlfxxf.exe 102 PID 2908 wrote to memory of 4536 2908 xxlfxxf.exe 102 PID 2908 wrote to memory of 4536 2908 xxlfxxf.exe 102 PID 4536 wrote to memory of 3936 4536 8888228.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe"C:\Users\Admin\AppData\Local\Temp\8b78e4a870372ede7622c024335bab7c307f61808384034c476dd2440024cc5f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\04428.exec:\04428.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
\??\c:\dvvpd.exec:\dvvpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\4848600.exec:\4848600.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
\??\c:\262602.exec:\262602.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\tbbbbt.exec:\tbbbbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\bntthb.exec:\bntthb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\02888.exec:\02888.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\frxrrrl.exec:\frxrrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
\??\c:\08864.exec:\08864.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\4405dj.exec:\4405dj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\044622.exec:\044622.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\84042.exec:\84042.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\xrlfxrf.exec:\xrlfxrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\4422200.exec:\4422200.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\k62266.exec:\k62266.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\k80422.exec:\k80422.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\442888.exec:\442888.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\lffffff.exec:\lffffff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\6666482.exec:\6666482.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
\??\c:\xxlfxxf.exec:\xxlfxxf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\8888228.exec:\8888228.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
\??\c:\hnttnt.exec:\hnttnt.exe23⤵
- Executes dropped EXE
PID:3936 -
\??\c:\024248.exec:\024248.exe24⤵
- Executes dropped EXE
PID:3052 -
\??\c:\dpdjj.exec:\dpdjj.exe25⤵
- Executes dropped EXE
PID:2692 -
\??\c:\440008.exec:\440008.exe26⤵
- Executes dropped EXE
PID:3640 -
\??\c:\dddvd.exec:\dddvd.exe27⤵
- Executes dropped EXE
PID:1220 -
\??\c:\lrrlffr.exec:\lrrlffr.exe28⤵
- Executes dropped EXE
PID:4964 -
\??\c:\ppjdd.exec:\ppjdd.exe29⤵
- Executes dropped EXE
PID:900 -
\??\c:\nbbhbn.exec:\nbbhbn.exe30⤵
- Executes dropped EXE
PID:2400 -
\??\c:\jdpvd.exec:\jdpvd.exe31⤵
- Executes dropped EXE
PID:3256 -
\??\c:\646284.exec:\646284.exe32⤵
- Executes dropped EXE
PID:3684 -
\??\c:\thbtnt.exec:\thbtnt.exe33⤵
- Executes dropped EXE
PID:3180 -
\??\c:\hbtnhh.exec:\hbtnhh.exe34⤵
- Executes dropped EXE
PID:512 -
\??\c:\nbbbnh.exec:\nbbbnh.exe35⤵
- Executes dropped EXE
PID:4160 -
\??\c:\4806806.exec:\4806806.exe36⤵
- Executes dropped EXE
PID:4460 -
\??\c:\xxxxxrx.exec:\xxxxxrx.exe37⤵
- Executes dropped EXE
PID:3220 -
\??\c:\8222626.exec:\8222626.exe38⤵
- Executes dropped EXE
PID:2308 -
\??\c:\48044.exec:\48044.exe39⤵
- Executes dropped EXE
PID:4844 -
\??\c:\20048.exec:\20048.exe40⤵
- Executes dropped EXE
PID:1100 -
\??\c:\ntbbhh.exec:\ntbbhh.exe41⤵
- Executes dropped EXE
PID:2236 -
\??\c:\44608.exec:\44608.exe42⤵
- Executes dropped EXE
PID:2876 -
\??\c:\620422.exec:\620422.exe43⤵
- Executes dropped EXE
PID:2280 -
\??\c:\24622.exec:\24622.exe44⤵
- Executes dropped EXE
PID:4124 -
\??\c:\44442.exec:\44442.exe45⤵
- Executes dropped EXE
PID:2724 -
\??\c:\rrlxrlf.exec:\rrlxrlf.exe46⤵
- Executes dropped EXE
PID:1576 -
\??\c:\bhhhbt.exec:\bhhhbt.exe47⤵
- Executes dropped EXE
PID:4300 -
\??\c:\xlrlxxr.exec:\xlrlxxr.exe48⤵
- Executes dropped EXE
PID:4408 -
\??\c:\240448.exec:\240448.exe49⤵
- Executes dropped EXE
PID:4032 -
\??\c:\5flfrxx.exec:\5flfrxx.exe50⤵
- Executes dropped EXE
PID:3440 -
\??\c:\446884.exec:\446884.exe51⤵
- Executes dropped EXE
PID:4640 -
\??\c:\rrlllff.exec:\rrlllff.exe52⤵
- Executes dropped EXE
PID:5076 -
\??\c:\668804.exec:\668804.exe53⤵
- Executes dropped EXE
PID:2164 -
\??\c:\68488.exec:\68488.exe54⤵
- Executes dropped EXE
PID:2672 -
\??\c:\bnthtt.exec:\bnthtt.exe55⤵
- Executes dropped EXE
PID:4992 -
\??\c:\pdvvp.exec:\pdvvp.exe56⤵
- Executes dropped EXE
PID:3908 -
\??\c:\htnnbt.exec:\htnnbt.exe57⤵
- Executes dropped EXE
PID:3996 -
\??\c:\jjdvj.exec:\jjdvj.exe58⤵
- Executes dropped EXE
PID:3896 -
\??\c:\48404.exec:\48404.exe59⤵
- Executes dropped EXE
PID:2088 -
\??\c:\0682860.exec:\0682860.exe60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796 -
\??\c:\rfllfff.exec:\rfllfff.exe61⤵
- Executes dropped EXE
PID:3516 -
\??\c:\pvdvp.exec:\pvdvp.exe62⤵
- Executes dropped EXE
PID:920 -
\??\c:\nnnbnn.exec:\nnnbnn.exe63⤵
- Executes dropped EXE
PID:3468 -
\??\c:\jjpjj.exec:\jjpjj.exe64⤵
- Executes dropped EXE
PID:708 -
\??\c:\664808.exec:\664808.exe65⤵
- Executes dropped EXE
PID:1012 -
\??\c:\4424680.exec:\4424680.exe66⤵PID:1652
-
\??\c:\dpvvp.exec:\dpvvp.exe67⤵PID:2084
-
\??\c:\484826.exec:\484826.exe68⤵PID:3768
-
\??\c:\pjvdp.exec:\pjvdp.exe69⤵PID:2072
-
\??\c:\828268.exec:\828268.exe70⤵PID:4012
-
\??\c:\nbbthh.exec:\nbbthh.exe71⤵PID:3176
-
\??\c:\62886.exec:\62886.exe72⤵PID:220
-
\??\c:\2022044.exec:\2022044.exe73⤵PID:3124
-
\??\c:\xlrlxrl.exec:\xlrlxrl.exe74⤵PID:3040
-
\??\c:\fffxlff.exec:\fffxlff.exe75⤵PID:1492
-
\??\c:\4800000.exec:\4800000.exe76⤵PID:4072
-
\??\c:\04224.exec:\04224.exe77⤵PID:4724
-
\??\c:\8060886.exec:\8060886.exe78⤵PID:3120
-
\??\c:\nnnthn.exec:\nnnthn.exe79⤵PID:3620
-
\??\c:\jdjvp.exec:\jdjvp.exe80⤵PID:3184
-
\??\c:\k84826.exec:\k84826.exe81⤵PID:4232
-
\??\c:\262682.exec:\262682.exe82⤵PID:5096
-
\??\c:\0044664.exec:\0044664.exe83⤵PID:3252
-
\??\c:\828826.exec:\828826.exe84⤵PID:1028
-
\??\c:\q28864.exec:\q28864.exe85⤵PID:4296
-
\??\c:\xxxrflf.exec:\xxxrflf.exe86⤵PID:2704
-
\??\c:\xrlffxr.exec:\xrlffxr.exe87⤵PID:2508
-
\??\c:\xxfxrlf.exec:\xxfxrlf.exe88⤵PID:3096
-
\??\c:\268264.exec:\268264.exe89⤵PID:3328
-
\??\c:\hnntnb.exec:\hnntnb.exe90⤵PID:4100
-
\??\c:\4022682.exec:\4022682.exe91⤵PID:4276
-
\??\c:\044860.exec:\044860.exe92⤵PID:1336
-
\??\c:\httnbt.exec:\httnbt.exe93⤵PID:4524
-
\??\c:\9xlfffr.exec:\9xlfffr.exe94⤵PID:1084
-
\??\c:\jdjjd.exec:\jdjjd.exe95⤵PID:4432
-
\??\c:\xrffrrx.exec:\xrffrrx.exe96⤵PID:4268
-
\??\c:\666602.exec:\666602.exe97⤵PID:2240
-
\??\c:\bhhbtn.exec:\bhhbtn.exe98⤵PID:776
-
\??\c:\ffxrllx.exec:\ffxrllx.exe99⤵PID:1224
-
\??\c:\xrrlffx.exec:\xrrlffx.exe100⤵PID:2160
-
\??\c:\i066482.exec:\i066482.exe101⤵PID:4712
-
\??\c:\ttthbb.exec:\ttthbb.exe102⤵PID:1384
-
\??\c:\rrflxlx.exec:\rrflxlx.exe103⤵PID:4892
-
\??\c:\fflfxrl.exec:\fflfxrl.exe104⤵PID:4340
-
\??\c:\6022628.exec:\6022628.exe105⤵PID:2224
-
\??\c:\68048.exec:\68048.exe106⤵PID:3572
-
\??\c:\28280.exec:\28280.exe107⤵PID:4024
-
\??\c:\btbtnn.exec:\btbtnn.exe108⤵PID:704
-
\??\c:\hbbtnn.exec:\hbbtnn.exe109⤵PID:3444
-
\??\c:\80684.exec:\80684.exe110⤵PID:2320
-
\??\c:\rlfrfxr.exec:\rlfrfxr.exe111⤵PID:3764
-
\??\c:\pjdvp.exec:\pjdvp.exe112⤵PID:5072
-
\??\c:\xrfxlfx.exec:\xrfxlfx.exe113⤵PID:3268
-
\??\c:\dppdj.exec:\dppdj.exe114⤵PID:3908
-
\??\c:\44420.exec:\44420.exe115⤵PID:3996
-
\??\c:\2886048.exec:\2886048.exe116⤵PID:3896
-
\??\c:\060000.exec:\060000.exe117⤵PID:3512
-
\??\c:\frlffxr.exec:\frlffxr.exe118⤵PID:4004
-
\??\c:\26262.exec:\26262.exe119⤵PID:3516
-
\??\c:\3vjdp.exec:\3vjdp.exe120⤵PID:4532
-
\??\c:\ffxrrlf.exec:\ffxrrlf.exe121⤵PID:1852
-
\??\c:\xxffrrx.exec:\xxffrrx.exe122⤵PID:4064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-