Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 03:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b7012da042209abcfec2d6da31936af0N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
b7012da042209abcfec2d6da31936af0N.exe
-
Size
62KB
-
MD5
b7012da042209abcfec2d6da31936af0
-
SHA1
e649f450275764e6cf128636e79d6a3cbe2b72f7
-
SHA256
aadd3e41eada708919c0d74ef8a9db26afcff915113249c5dee297284229cd1a
-
SHA512
f47ff6c839484ea3c011fd00cae29fd4d1549460be09c0104958aaa9df996b68c5fb884b267d73009bea2ac282449ffdc5f6b89451e6fad1165af742905b5cdd
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIrmCeRo:ymb3NkkiQ3mdBjFIjey
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/4960-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3272-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1316-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3988-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3580-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/752-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4596-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1144-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4512-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2608-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1484-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3704-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2400-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1708-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3532-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5048-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3716-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4144-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4292-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3272 llrllrr.exe 3088 vjdvv.exe 1316 04660.exe 2312 622262.exe 3096 fxxxlll.exe 3988 s0660.exe 3580 jdppj.exe 752 xrrrlll.exe 4796 vpjdd.exe 4596 bnttnn.exe 4744 ppjjv.exe 5068 k26426.exe 1144 bnhtnh.exe 4512 8022660.exe 2608 jppjd.exe 1484 btnhtt.exe 3704 bhntnn.exe 788 httnbt.exe 4900 4226482.exe 4828 lllxffx.exe 2400 6204826.exe 1708 m0042.exe 3532 222600.exe 5020 60260.exe 4856 2646482.exe 4960 3hhbbb.exe 2364 btbthb.exe 3716 frxrfff.exe 4144 dpvdp.exe 4292 2008620.exe 4460 242442.exe 3804 44282.exe 1532 rlrfrxl.exe 4496 26042.exe 2028 flrfxff.exe 2704 22826.exe 2972 664088.exe 4596 vddpd.exe 3408 vvjdj.exe 3832 q84248.exe 4864 i408088.exe 2872 42264.exe 2504 428260.exe 3756 0000260.exe 4664 3tttnn.exe 232 k66204.exe 4104 xrxxlrf.exe 3128 8282482.exe 3232 q28266.exe 3620 fffrlxf.exe 4792 44280.exe 4708 8424028.exe 2020 00802.exe 4992 284860.exe 4356 hbthtb.exe 4728 1jpdv.exe 3324 nbtbtn.exe 4520 dpdvj.exe 1296 62860.exe 2804 pjjvd.exe 3068 7bhbtn.exe 4232 8608260.exe 4332 ddjdp.exe 636 lffxllf.exe -
resource yara_rule behavioral2/memory/4960-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4960-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3272-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1316-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2312-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3988-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3580-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3580-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3580-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3580-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/752-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4596-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4596-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4744-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1144-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4512-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2608-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1484-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3704-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1708-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3532-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5048-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3716-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4144-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4292-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i660426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 688880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2062064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2442608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8440662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4282828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2026482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llllrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c440802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i400668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 646044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3272 4960 b7012da042209abcfec2d6da31936af0N.exe 90 PID 4960 wrote to memory of 3272 4960 b7012da042209abcfec2d6da31936af0N.exe 90 PID 4960 wrote to memory of 3272 4960 b7012da042209abcfec2d6da31936af0N.exe 90 PID 3272 wrote to memory of 3088 3272 llrllrr.exe 91 PID 3272 wrote to memory of 3088 3272 llrllrr.exe 91 PID 3272 wrote to memory of 3088 3272 llrllrr.exe 91 PID 3088 wrote to memory of 1316 3088 vjdvv.exe 92 PID 3088 wrote to memory of 1316 3088 vjdvv.exe 92 PID 3088 wrote to memory of 1316 3088 vjdvv.exe 92 PID 1316 wrote to memory of 2312 1316 04660.exe 93 PID 1316 wrote to memory of 2312 1316 04660.exe 93 PID 1316 wrote to memory of 2312 1316 04660.exe 93 PID 2312 wrote to memory of 3096 2312 622262.exe 94 PID 2312 wrote to memory of 3096 2312 622262.exe 94 PID 2312 wrote to memory of 3096 2312 622262.exe 94 PID 3096 wrote to memory of 3988 3096 fxxxlll.exe 95 PID 3096 wrote to memory of 3988 3096 fxxxlll.exe 95 PID 3096 wrote to memory of 3988 3096 fxxxlll.exe 95 PID 3988 wrote to memory of 3580 3988 s0660.exe 96 PID 3988 wrote to memory of 3580 3988 s0660.exe 96 PID 3988 wrote to memory of 3580 3988 s0660.exe 96 PID 3580 wrote to memory of 752 3580 jdppj.exe 97 PID 3580 wrote to memory of 752 3580 jdppj.exe 97 PID 3580 wrote to memory of 752 3580 jdppj.exe 97 PID 752 wrote to memory of 4796 752 xrrrlll.exe 98 PID 752 wrote to memory of 4796 752 xrrrlll.exe 98 PID 752 wrote to memory of 4796 752 xrrrlll.exe 98 PID 4796 wrote to memory of 4596 4796 vpjdd.exe 100 PID 4796 wrote to memory of 4596 4796 vpjdd.exe 100 PID 4796 wrote to memory of 4596 4796 vpjdd.exe 100 PID 4596 wrote to memory of 4744 4596 bnttnn.exe 101 PID 4596 wrote to memory of 4744 4596 bnttnn.exe 101 PID 4596 wrote to memory of 4744 4596 bnttnn.exe 101 PID 4744 wrote to memory of 5068 4744 ppjjv.exe 102 PID 4744 wrote to memory of 5068 4744 ppjjv.exe 102 PID 4744 wrote to memory of 5068 4744 ppjjv.exe 102 PID 5068 wrote to memory of 1144 5068 k26426.exe 103 PID 5068 wrote to memory of 1144 5068 k26426.exe 103 PID 5068 wrote to memory of 1144 5068 k26426.exe 103 PID 1144 wrote to memory of 4512 1144 bnhtnh.exe 104 PID 1144 wrote to memory of 4512 1144 bnhtnh.exe 104 PID 1144 wrote to memory of 4512 1144 bnhtnh.exe 104 PID 4512 wrote to memory of 2608 4512 8022660.exe 105 PID 4512 wrote to memory of 2608 4512 8022660.exe 105 PID 4512 wrote to memory of 2608 4512 8022660.exe 105 PID 2608 wrote to memory of 1484 2608 jppjd.exe 106 PID 2608 wrote to memory of 1484 2608 jppjd.exe 106 PID 2608 wrote to memory of 1484 2608 jppjd.exe 106 PID 1484 wrote to memory of 3704 1484 btnhtt.exe 107 PID 1484 wrote to memory of 3704 1484 btnhtt.exe 107 PID 1484 wrote to memory of 3704 1484 btnhtt.exe 107 PID 3704 wrote to memory of 788 3704 bhntnn.exe 109 PID 3704 wrote to memory of 788 3704 bhntnn.exe 109 PID 3704 wrote to memory of 788 3704 bhntnn.exe 109 PID 788 wrote to memory of 4900 788 httnbt.exe 110 PID 788 wrote to memory of 4900 788 httnbt.exe 110 PID 788 wrote to memory of 4900 788 httnbt.exe 110 PID 4900 wrote to memory of 4828 4900 4226482.exe 111 PID 4900 wrote to memory of 4828 4900 4226482.exe 111 PID 4900 wrote to memory of 4828 4900 4226482.exe 111 PID 4828 wrote to memory of 2400 4828 lllxffx.exe 112 PID 4828 wrote to memory of 2400 4828 lllxffx.exe 112 PID 4828 wrote to memory of 2400 4828 lllxffx.exe 112 PID 2400 wrote to memory of 1708 2400 6204826.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7012da042209abcfec2d6da31936af0N.exe"C:\Users\Admin\AppData\Local\Temp\b7012da042209abcfec2d6da31936af0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
\??\c:\llrllrr.exec:\llrllrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
\??\c:\vjdvv.exec:\vjdvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\04660.exec:\04660.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
\??\c:\622262.exec:\622262.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\fxxxlll.exec:\fxxxlll.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\s0660.exec:\s0660.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\jdppj.exec:\jdppj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\xrrrlll.exec:\xrrrlll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
\??\c:\vpjdd.exec:\vpjdd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\bnttnn.exec:\bnttnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\ppjjv.exec:\ppjjv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
\??\c:\k26426.exec:\k26426.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\bnhtnh.exec:\bnhtnh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\8022660.exec:\8022660.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
\??\c:\jppjd.exec:\jppjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\btnhtt.exec:\btnhtt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
\??\c:\bhntnn.exec:\bhntnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
\??\c:\httnbt.exec:\httnbt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
\??\c:\4226482.exec:\4226482.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\lllxffx.exec:\lllxffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\6204826.exec:\6204826.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\m0042.exec:\m0042.exe23⤵
- Executes dropped EXE
PID:1708 -
\??\c:\222600.exec:\222600.exe24⤵
- Executes dropped EXE
PID:3532 -
\??\c:\60260.exec:\60260.exe25⤵
- Executes dropped EXE
PID:5020 -
\??\c:\2646482.exec:\2646482.exe26⤵
- Executes dropped EXE
PID:4856 -
\??\c:\1pvvv.exec:\1pvvv.exe27⤵PID:5048
-
\??\c:\3hhbbb.exec:\3hhbbb.exe28⤵
- Executes dropped EXE
PID:4960 -
\??\c:\btbthb.exec:\btbthb.exe29⤵
- Executes dropped EXE
PID:2364 -
\??\c:\frxrfff.exec:\frxrfff.exe30⤵
- Executes dropped EXE
PID:3716 -
\??\c:\dpvdp.exec:\dpvdp.exe31⤵
- Executes dropped EXE
PID:4144 -
\??\c:\2008620.exec:\2008620.exe32⤵
- Executes dropped EXE
PID:4292 -
\??\c:\242442.exec:\242442.exe33⤵
- Executes dropped EXE
PID:4460 -
\??\c:\44282.exec:\44282.exe34⤵
- Executes dropped EXE
PID:3804 -
\??\c:\rlrfrxl.exec:\rlrfrxl.exe35⤵
- Executes dropped EXE
PID:1532 -
\??\c:\26042.exec:\26042.exe36⤵
- Executes dropped EXE
PID:4496 -
\??\c:\flrfxff.exec:\flrfxff.exe37⤵
- Executes dropped EXE
PID:2028 -
\??\c:\22826.exec:\22826.exe38⤵
- Executes dropped EXE
PID:2704 -
\??\c:\664088.exec:\664088.exe39⤵
- Executes dropped EXE
PID:2972 -
\??\c:\vddpd.exec:\vddpd.exe40⤵
- Executes dropped EXE
PID:4596 -
\??\c:\vvjdj.exec:\vvjdj.exe41⤵
- Executes dropped EXE
PID:3408 -
\??\c:\q84248.exec:\q84248.exe42⤵
- Executes dropped EXE
PID:3832 -
\??\c:\i408088.exec:\i408088.exe43⤵
- Executes dropped EXE
PID:4864 -
\??\c:\42264.exec:\42264.exe44⤵
- Executes dropped EXE
PID:2872 -
\??\c:\428260.exec:\428260.exe45⤵
- Executes dropped EXE
PID:2504 -
\??\c:\0000260.exec:\0000260.exe46⤵
- Executes dropped EXE
PID:3756 -
\??\c:\3tttnn.exec:\3tttnn.exe47⤵
- Executes dropped EXE
PID:4664 -
\??\c:\k66204.exec:\k66204.exe48⤵
- Executes dropped EXE
PID:232 -
\??\c:\xrxxlrf.exec:\xrxxlrf.exe49⤵
- Executes dropped EXE
PID:4104 -
\??\c:\8282482.exec:\8282482.exe50⤵
- Executes dropped EXE
PID:3128 -
\??\c:\q28266.exec:\q28266.exe51⤵
- Executes dropped EXE
PID:3232 -
\??\c:\fffrlxf.exec:\fffrlxf.exe52⤵
- Executes dropped EXE
PID:3620 -
\??\c:\44280.exec:\44280.exe53⤵
- Executes dropped EXE
PID:4792 -
\??\c:\8424028.exec:\8424028.exe54⤵
- Executes dropped EXE
PID:4708 -
\??\c:\00802.exec:\00802.exe55⤵
- Executes dropped EXE
PID:2020 -
\??\c:\284860.exec:\284860.exe56⤵
- Executes dropped EXE
PID:4992 -
\??\c:\hbthtb.exec:\hbthtb.exe57⤵
- Executes dropped EXE
PID:4356 -
\??\c:\1jpdv.exec:\1jpdv.exe58⤵
- Executes dropped EXE
PID:4728 -
\??\c:\nbtbtn.exec:\nbtbtn.exe59⤵
- Executes dropped EXE
PID:3324 -
\??\c:\dpdvj.exec:\dpdvj.exe60⤵
- Executes dropped EXE
PID:4520 -
\??\c:\62860.exec:\62860.exe61⤵
- Executes dropped EXE
PID:1296 -
\??\c:\pjjvd.exec:\pjjvd.exe62⤵
- Executes dropped EXE
PID:2804 -
\??\c:\7bhbtn.exec:\7bhbtn.exe63⤵
- Executes dropped EXE
PID:3068 -
\??\c:\8608260.exec:\8608260.exe64⤵
- Executes dropped EXE
PID:4232 -
\??\c:\ddjdp.exec:\ddjdp.exe65⤵
- Executes dropped EXE
PID:4332 -
\??\c:\lffxllf.exec:\lffxllf.exe66⤵
- Executes dropped EXE
PID:636 -
\??\c:\82264.exec:\82264.exe67⤵PID:1208
-
\??\c:\66264.exec:\66264.exe68⤵PID:2072
-
\??\c:\0628004.exec:\0628004.exe69⤵PID:3940
-
\??\c:\s2204.exec:\s2204.exe70⤵PID:1532
-
\??\c:\q06082.exec:\q06082.exe71⤵PID:4388
-
\??\c:\m6608.exec:\m6608.exe72⤵PID:4544
-
\??\c:\hthhtn.exec:\hthhtn.exe73⤵PID:4364
-
\??\c:\e22600.exec:\e22600.exe74⤵PID:1432
-
\??\c:\024826.exec:\024826.exe75⤵PID:1936
-
\??\c:\6426482.exec:\6426482.exe76⤵PID:1992
-
\??\c:\rflxrrf.exec:\rflxrrf.exe77⤵PID:4508
-
\??\c:\826482.exec:\826482.exe78⤵PID:1204
-
\??\c:\jvpjv.exec:\jvpjv.exe79⤵PID:820
-
\??\c:\fxrxlfx.exec:\fxrxlfx.exe80⤵PID:2792
-
\??\c:\262226.exec:\262226.exe81⤵PID:2420
-
\??\c:\5jdpd.exec:\5jdpd.exe82⤵PID:4076
-
\??\c:\2200284.exec:\2200284.exe83⤵PID:1588
-
\??\c:\llxrlfx.exec:\llxrlfx.exe84⤵PID:4844
-
\??\c:\28482.exec:\28482.exe85⤵PID:4736
-
\??\c:\48044.exec:\48044.exe86⤵PID:3660
-
\??\c:\frrxllf.exec:\frrxllf.exe87⤵PID:3884
-
\??\c:\vpdvj.exec:\vpdvj.exe88⤵PID:5052
-
\??\c:\vjjdj.exec:\vjjdj.exe89⤵PID:4976
-
\??\c:\7lffxxx.exec:\7lffxxx.exe90⤵PID:4052
-
\??\c:\bnbbbh.exec:\bnbbbh.exe91⤵PID:4340
-
\??\c:\jdpjj.exec:\jdpjj.exe92⤵PID:4964
-
\??\c:\c022026.exec:\c022026.exe93⤵PID:3528
-
\??\c:\9vdvv.exec:\9vdvv.exe94⤵PID:4220
-
\??\c:\jjjpp.exec:\jjjpp.exe95⤵PID:2860
-
\??\c:\3thbtn.exec:\3thbtn.exe96⤵PID:5008
-
\??\c:\jdjdv.exec:\jdjdv.exe97⤵PID:4224
-
\??\c:\240804.exec:\240804.exe98⤵PID:4292
-
\??\c:\jjpdd.exec:\jjpdd.exe99⤵PID:4820
-
\??\c:\26424.exec:\26424.exe100⤵PID:4464
-
\??\c:\02608.exec:\02608.exe101⤵PID:4112
-
\??\c:\64662.exec:\64662.exe102⤵PID:2868
-
\??\c:\880866.exec:\880866.exe103⤵PID:1976
-
\??\c:\7rxrlll.exec:\7rxrlll.exe104⤵PID:764
-
\??\c:\0020260.exec:\0020260.exe105⤵PID:3064
-
\??\c:\rxxxrlf.exec:\rxxxrlf.exe106⤵PID:3564
-
\??\c:\04280.exec:\04280.exe107⤵PID:4904
-
\??\c:\vppdp.exec:\vppdp.exe108⤵PID:5068
-
\??\c:\rfxrfxr.exec:\rfxrfxr.exe109⤵PID:3288
-
\??\c:\628204.exec:\628204.exe110⤵PID:2872
-
\??\c:\i460488.exec:\i460488.exe111⤵PID:872
-
\??\c:\068644.exec:\068644.exe112⤵PID:4572
-
\??\c:\frllrxx.exec:\frllrxx.exe113⤵PID:404
-
\??\c:\284822.exec:\284822.exe114⤵PID:772
-
\??\c:\u660266.exec:\u660266.exe115⤵PID:4396
-
\??\c:\jjdvp.exec:\jjdvp.exe116⤵PID:3116
-
\??\c:\228040.exec:\228040.exe117⤵PID:3232
-
\??\c:\00026.exec:\00026.exe118⤵PID:4500
-
\??\c:\80644.exec:\80644.exe119⤵PID:4624
-
\??\c:\62264.exec:\62264.exe120⤵PID:4024
-
\??\c:\djdvp.exec:\djdvp.exe121⤵PID:4708
-
\??\c:\2288866.exec:\2288866.exe122⤵PID:4324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-