Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe
Resource
win7-20240903-en
General
-
Target
f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe
-
Size
74KB
-
MD5
93bbf19da1860bd5e537ab11edeee0d0
-
SHA1
5e9c3ea3b0c64d659963147734a5c060b973e6fb
-
SHA256
f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47
-
SHA512
a8c07f28f39e149af4bc8e8bdc6499c736c14bd58756b7c5785b4190bbebc2983f827826a63826381ef988fc3460f1625d928bd670a213cb7ce005bbf70d9825
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmP5O:ymb3NkkiQ3mdBjFIvl358nLA89OMFVHN
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/2328-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4272-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1300-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/688-35-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4216-49-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4216-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/688-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2700-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5096-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/764-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4068-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/884-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4588-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4376-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3216-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4136-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1188-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1744-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4948-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4840-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/916-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4272 406004.exe 4848 06886.exe 1300 nbthbn.exe 688 u262468.exe 4864 xxxxrrr.exe 4216 lrflflf.exe 2700 hbbtnn.exe 5096 2808226.exe 4644 2004260.exe 764 5djdp.exe 4068 lffxlfx.exe 884 3ttbtn.exe 2568 bnthbt.exe 4588 g8222.exe 3348 thbntb.exe 4376 lffflfx.exe 4616 s6646.exe 4300 3ffxrrl.exe 3216 i428006.exe 4136 268800.exe 4764 vvddp.exe 1188 622204.exe 1744 llxffxf.exe 5092 5pdjv.exe 4948 06666.exe 4968 8026604.exe 636 02260.exe 4840 djpjv.exe 916 4224288.exe 4924 bnnbth.exe 4828 fllxfxr.exe 4412 pddpj.exe 1000 k80206.exe 4816 7lrllrr.exe 2788 pjpjv.exe 3652 64460.exe 4084 xfxlffr.exe 4000 lfrlrxx.exe 4456 pvvdj.exe 1512 862420.exe 1388 k68688.exe 3316 24684.exe 2072 600088.exe 3844 w84484.exe 2344 22260.exe 1172 hbbnbb.exe 3900 bnhbtt.exe 2260 tnnhbt.exe 936 s0264.exe 1232 024240.exe 1604 hntnth.exe 4588 3rrlxlf.exe 1752 6622042.exe 1964 lffxlff.exe 1584 vvddv.exe 4820 flrffll.exe 2216 280022.exe 4300 jpvpd.exe 1428 462644.exe 8 66224.exe 2908 q66224.exe 1944 thbttb.exe 3432 062644.exe 3928 rrfflrr.exe -
resource yara_rule behavioral2/memory/2328-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2328-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4272-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1300-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2700-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4216-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/688-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2700-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5096-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/764-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4068-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/884-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4376-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3216-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4136-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1188-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1744-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4948-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4840-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/916-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rfflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4844848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k62288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 286606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxrlxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 040488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4272 2328 f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe 89 PID 2328 wrote to memory of 4272 2328 f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe 89 PID 2328 wrote to memory of 4272 2328 f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe 89 PID 4272 wrote to memory of 4848 4272 406004.exe 90 PID 4272 wrote to memory of 4848 4272 406004.exe 90 PID 4272 wrote to memory of 4848 4272 406004.exe 90 PID 4848 wrote to memory of 1300 4848 06886.exe 91 PID 4848 wrote to memory of 1300 4848 06886.exe 91 PID 4848 wrote to memory of 1300 4848 06886.exe 91 PID 1300 wrote to memory of 688 1300 nbthbn.exe 92 PID 1300 wrote to memory of 688 1300 nbthbn.exe 92 PID 1300 wrote to memory of 688 1300 nbthbn.exe 92 PID 688 wrote to memory of 4864 688 u262468.exe 93 PID 688 wrote to memory of 4864 688 u262468.exe 93 PID 688 wrote to memory of 4864 688 u262468.exe 93 PID 4864 wrote to memory of 4216 4864 xxxxrrr.exe 94 PID 4864 wrote to memory of 4216 4864 xxxxrrr.exe 94 PID 4864 wrote to memory of 4216 4864 xxxxrrr.exe 94 PID 4216 wrote to memory of 2700 4216 lrflflf.exe 95 PID 4216 wrote to memory of 2700 4216 lrflflf.exe 95 PID 4216 wrote to memory of 2700 4216 lrflflf.exe 95 PID 2700 wrote to memory of 5096 2700 hbbtnn.exe 96 PID 2700 wrote to memory of 5096 2700 hbbtnn.exe 96 PID 2700 wrote to memory of 5096 2700 hbbtnn.exe 96 PID 5096 wrote to memory of 4644 5096 2808226.exe 97 PID 5096 wrote to memory of 4644 5096 2808226.exe 97 PID 5096 wrote to memory of 4644 5096 2808226.exe 97 PID 4644 wrote to memory of 764 4644 2004260.exe 98 PID 4644 wrote to memory of 764 4644 2004260.exe 98 PID 4644 wrote to memory of 764 4644 2004260.exe 98 PID 764 wrote to memory of 4068 764 5djdp.exe 99 PID 764 wrote to memory of 4068 764 5djdp.exe 99 PID 764 wrote to memory of 4068 764 5djdp.exe 99 PID 4068 wrote to memory of 884 4068 lffxlfx.exe 100 PID 4068 wrote to memory of 884 4068 lffxlfx.exe 100 PID 4068 wrote to memory of 884 4068 lffxlfx.exe 100 PID 884 wrote to memory of 2568 884 3ttbtn.exe 101 PID 884 wrote to memory of 2568 884 3ttbtn.exe 101 PID 884 wrote to memory of 2568 884 3ttbtn.exe 101 PID 2568 wrote to memory of 4588 2568 bnthbt.exe 102 PID 2568 wrote to memory of 4588 2568 bnthbt.exe 102 PID 2568 wrote to memory of 4588 2568 bnthbt.exe 102 PID 4588 wrote to memory of 3348 4588 g8222.exe 103 PID 4588 wrote to memory of 3348 4588 g8222.exe 103 PID 4588 wrote to memory of 3348 4588 g8222.exe 103 PID 3348 wrote to memory of 4376 3348 thbntb.exe 104 PID 3348 wrote to memory of 4376 3348 thbntb.exe 104 PID 3348 wrote to memory of 4376 3348 thbntb.exe 104 PID 4376 wrote to memory of 4616 4376 lffflfx.exe 105 PID 4376 wrote to memory of 4616 4376 lffflfx.exe 105 PID 4376 wrote to memory of 4616 4376 lffflfx.exe 105 PID 4616 wrote to memory of 4300 4616 s6646.exe 106 PID 4616 wrote to memory of 4300 4616 s6646.exe 106 PID 4616 wrote to memory of 4300 4616 s6646.exe 106 PID 4300 wrote to memory of 3216 4300 3ffxrrl.exe 107 PID 4300 wrote to memory of 3216 4300 3ffxrrl.exe 107 PID 4300 wrote to memory of 3216 4300 3ffxrrl.exe 107 PID 3216 wrote to memory of 4136 3216 i428006.exe 108 PID 3216 wrote to memory of 4136 3216 i428006.exe 108 PID 3216 wrote to memory of 4136 3216 i428006.exe 108 PID 4136 wrote to memory of 4764 4136 268800.exe 109 PID 4136 wrote to memory of 4764 4136 268800.exe 109 PID 4136 wrote to memory of 4764 4136 268800.exe 109 PID 4764 wrote to memory of 1188 4764 vvddp.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe"C:\Users\Admin\AppData\Local\Temp\f9b57753d8a24987669f07e596989aec4c377eaeaf94fb639ea8cbaa6ca2cd47N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\406004.exec:\406004.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\06886.exec:\06886.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\nbthbn.exec:\nbthbn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\u262468.exec:\u262468.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\xxxxrrr.exec:\xxxxrrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\lrflflf.exec:\lrflflf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
\??\c:\hbbtnn.exec:\hbbtnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\2808226.exec:\2808226.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
\??\c:\2004260.exec:\2004260.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\5djdp.exec:\5djdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\lffxlfx.exec:\lffxlfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\3ttbtn.exec:\3ttbtn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\bnthbt.exec:\bnthbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\g8222.exec:\g8222.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\thbntb.exec:\thbntb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\lffflfx.exec:\lffflfx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\s6646.exec:\s6646.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\3ffxrrl.exec:\3ffxrrl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\i428006.exec:\i428006.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\268800.exec:\268800.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
\??\c:\vvddp.exec:\vvddp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
\??\c:\622204.exec:\622204.exe23⤵
- Executes dropped EXE
PID:1188 -
\??\c:\llxffxf.exec:\llxffxf.exe24⤵
- Executes dropped EXE
PID:1744 -
\??\c:\5pdjv.exec:\5pdjv.exe25⤵
- Executes dropped EXE
PID:5092 -
\??\c:\06666.exec:\06666.exe26⤵
- Executes dropped EXE
PID:4948 -
\??\c:\8026604.exec:\8026604.exe27⤵
- Executes dropped EXE
PID:4968 -
\??\c:\02260.exec:\02260.exe28⤵
- Executes dropped EXE
PID:636 -
\??\c:\djpjv.exec:\djpjv.exe29⤵
- Executes dropped EXE
PID:4840 -
\??\c:\4224288.exec:\4224288.exe30⤵
- Executes dropped EXE
PID:916 -
\??\c:\bnnbth.exec:\bnnbth.exe31⤵
- Executes dropped EXE
PID:4924 -
\??\c:\fllxfxr.exec:\fllxfxr.exe32⤵
- Executes dropped EXE
PID:4828 -
\??\c:\pddpj.exec:\pddpj.exe33⤵
- Executes dropped EXE
PID:4412 -
\??\c:\k80206.exec:\k80206.exe34⤵
- Executes dropped EXE
PID:1000 -
\??\c:\7lrllrr.exec:\7lrllrr.exe35⤵
- Executes dropped EXE
PID:4816 -
\??\c:\pjpjv.exec:\pjpjv.exe36⤵
- Executes dropped EXE
PID:2788 -
\??\c:\64460.exec:\64460.exe37⤵
- Executes dropped EXE
PID:3652 -
\??\c:\xfxlffr.exec:\xfxlffr.exe38⤵
- Executes dropped EXE
PID:4084 -
\??\c:\lfrlrxx.exec:\lfrlrxx.exe39⤵
- Executes dropped EXE
PID:4000 -
\??\c:\pvvdj.exec:\pvvdj.exe40⤵
- Executes dropped EXE
PID:4456 -
\??\c:\862420.exec:\862420.exe41⤵
- Executes dropped EXE
PID:1512 -
\??\c:\k68688.exec:\k68688.exe42⤵
- Executes dropped EXE
PID:1388 -
\??\c:\24684.exec:\24684.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3316 -
\??\c:\600088.exec:\600088.exe44⤵
- Executes dropped EXE
PID:2072 -
\??\c:\w84484.exec:\w84484.exe45⤵
- Executes dropped EXE
PID:3844 -
\??\c:\22260.exec:\22260.exe46⤵
- Executes dropped EXE
PID:2344 -
\??\c:\hbbnbb.exec:\hbbnbb.exe47⤵
- Executes dropped EXE
PID:1172 -
\??\c:\bnhbtt.exec:\bnhbtt.exe48⤵
- Executes dropped EXE
PID:3900 -
\??\c:\tnnhbt.exec:\tnnhbt.exe49⤵
- Executes dropped EXE
PID:2260 -
\??\c:\s0264.exec:\s0264.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:936 -
\??\c:\024240.exec:\024240.exe51⤵
- Executes dropped EXE
PID:1232 -
\??\c:\hntnth.exec:\hntnth.exe52⤵
- Executes dropped EXE
PID:1604 -
\??\c:\3rrlxlf.exec:\3rrlxlf.exe53⤵
- Executes dropped EXE
PID:4588 -
\??\c:\6622042.exec:\6622042.exe54⤵
- Executes dropped EXE
PID:1752 -
\??\c:\lffxlff.exec:\lffxlff.exe55⤵
- Executes dropped EXE
PID:1964 -
\??\c:\vvddv.exec:\vvddv.exe56⤵
- Executes dropped EXE
PID:1584 -
\??\c:\flrffll.exec:\flrffll.exe57⤵
- Executes dropped EXE
PID:4820 -
\??\c:\280022.exec:\280022.exe58⤵
- Executes dropped EXE
PID:2216 -
\??\c:\jpvpd.exec:\jpvpd.exe59⤵
- Executes dropped EXE
PID:4300 -
\??\c:\462644.exec:\462644.exe60⤵
- Executes dropped EXE
PID:1428 -
\??\c:\66224.exec:\66224.exe61⤵
- Executes dropped EXE
PID:8 -
\??\c:\q66224.exec:\q66224.exe62⤵
- Executes dropped EXE
PID:2908 -
\??\c:\thbttb.exec:\thbttb.exe63⤵
- Executes dropped EXE
PID:1944 -
\??\c:\062644.exec:\062644.exe64⤵
- Executes dropped EXE
PID:3432 -
\??\c:\rrfflrr.exec:\rrfflrr.exe65⤵
- Executes dropped EXE
PID:3928 -
\??\c:\pvdvv.exec:\pvdvv.exe66⤵PID:2408
-
\??\c:\86264.exec:\86264.exe67⤵PID:3888
-
\??\c:\40040.exec:\40040.exe68⤵PID:4284
-
\??\c:\dvpjd.exec:\dvpjd.exe69⤵PID:1040
-
\??\c:\rfffrlf.exec:\rfffrlf.exe70⤵PID:3552
-
\??\c:\488226.exec:\488226.exe71⤵PID:468
-
\??\c:\rxxxfrl.exec:\rxxxfrl.exe72⤵PID:4920
-
\??\c:\tttnnt.exec:\tttnnt.exe73⤵PID:4632
-
\??\c:\flxxrxr.exec:\flxxrxr.exe74⤵PID:4436
-
\??\c:\tnhbbb.exec:\tnhbbb.exe75⤵PID:2448
-
\??\c:\48688.exec:\48688.exe76⤵PID:3232
-
\??\c:\04622.exec:\04622.exe77⤵PID:620
-
\??\c:\vppjd.exec:\vppjd.exe78⤵PID:2728
-
\??\c:\lrlfrlx.exec:\lrlfrlx.exe79⤵PID:4556
-
\??\c:\btnnhh.exec:\btnnhh.exe80⤵PID:3992
-
\??\c:\9hnhtt.exec:\9hnhtt.exe81⤵PID:4116
-
\??\c:\jvjdd.exec:\jvjdd.exe82⤵PID:3672
-
\??\c:\826060.exec:\826060.exe83⤵PID:2108
-
\??\c:\2288602.exec:\2288602.exe84⤵PID:4604
-
\??\c:\vppjd.exec:\vppjd.exe85⤵PID:2700
-
\??\c:\a0088.exec:\a0088.exe86⤵PID:3512
-
\??\c:\tbbtnb.exec:\tbbtnb.exe87⤵PID:2992
-
\??\c:\w26040.exec:\w26040.exe88⤵PID:2508
-
\??\c:\vjjdv.exec:\vjjdv.exe89⤵PID:3388
-
\??\c:\440482.exec:\440482.exe90⤵PID:3924
-
\??\c:\xrfllll.exec:\xrfllll.exe91⤵PID:1480
-
\??\c:\htnbtn.exec:\htnbtn.exe92⤵PID:2456
-
\??\c:\o024882.exec:\o024882.exe93⤵PID:3964
-
\??\c:\2002060.exec:\2002060.exe94⤵PID:416
-
\??\c:\c882604.exec:\c882604.exe95⤵PID:3348
-
\??\c:\jvvpj.exec:\jvvpj.exe96⤵PID:3300
-
\??\c:\6004826.exec:\6004826.exe97⤵PID:2152
-
\??\c:\pvvvj.exec:\pvvvj.exe98⤵PID:452
-
\??\c:\0882604.exec:\0882604.exe99⤵PID:4780
-
\??\c:\jvvpj.exec:\jvvpj.exe100⤵PID:792
-
\??\c:\rffxlfx.exec:\rffxlfx.exe101⤵PID:1860
-
\??\c:\fxlrfll.exec:\fxlrfll.exe102⤵PID:220
-
\??\c:\pjddv.exec:\pjddv.exe103⤵PID:2316
-
\??\c:\ththnb.exec:\ththnb.exe104⤵PID:2228
-
\??\c:\68468.exec:\68468.exe105⤵PID:3888
-
\??\c:\o466048.exec:\o466048.exe106⤵PID:4284
-
\??\c:\ffxxlrl.exec:\ffxxlrl.exe107⤵PID:4840
-
\??\c:\60600.exec:\60600.exe108⤵PID:3552
-
\??\c:\nthnnb.exec:\nthnnb.exe109⤵PID:468
-
\??\c:\lfffxxr.exec:\lfffxxr.exe110⤵PID:2516
-
\??\c:\u664204.exec:\u664204.exe111⤵PID:4420
-
\??\c:\04268.exec:\04268.exe112⤵PID:2732
-
\??\c:\xlxllfr.exec:\xlxllfr.exe113⤵PID:2448
-
\??\c:\9nntth.exec:\9nntth.exe114⤵PID:4272
-
\??\c:\8266822.exec:\8266822.exe115⤵PID:3424
-
\??\c:\24004.exec:\24004.exe116⤵PID:4848
-
\??\c:\q06048.exec:\q06048.exe117⤵PID:4556
-
\??\c:\662828.exec:\662828.exe118⤵PID:4188
-
\??\c:\5bhbtt.exec:\5bhbtt.exe119⤵PID:1200
-
\??\c:\ffrxlrr.exec:\ffrxlrr.exe120⤵PID:1920
-
\??\c:\1lllfll.exec:\1lllfll.exe121⤵PID:3028
-
\??\c:\tnttnn.exec:\tnttnn.exe122⤵PID:4612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-