Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe
Resource
win7-20240903-en
General
-
Target
54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe
-
Size
93KB
-
MD5
c7a144a473cf69e5981399ffbec26cb0
-
SHA1
6c1f27e22f1f22683e0d1aa78b6f96e517d6813a
-
SHA256
54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079
-
SHA512
ac2a31e0fa4145390e8a25c3fddea55cea92962bd3b57b0a7803d4469621ac7cc677d8bca45a6858c46df821f789f64db16afb6ff6671520b8b3a74b5148119c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZaRBQ:ymb3NkkiQ3mdBjFIVLd2hWZGreRCYBVa
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
resource yara_rule behavioral2/memory/2804-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2804-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1504-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-35-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1020-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4356-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3732-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/860-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-57-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3024-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3376-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3700-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4452-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3252-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1280-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4324-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4248-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2184-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1976-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/872-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1880-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3024-5746-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1504 rffxxrr.exe 860 nttnbh.exe 3732 0060820.exe 4612 3jjdp.exe 1020 006082.exe 4356 4262662.exe 3024 4400000.exe 3376 rfxxrfx.exe 5012 bhntbn.exe 3700 400204.exe 1636 640460.exe 4452 60260.exe 3252 hbbnbb.exe 1280 686460.exe 4736 thbthb.exe 4324 420482.exe 2128 g4202.exe 4656 vpjpj.exe 4248 0886488.exe 4784 hbbttn.exe 2516 lfrlxrl.exe 3240 200688.exe 3080 pjpvv.exe 3720 jdjdd.exe 4588 bttbht.exe 2184 pdjdd.exe 1976 dpvvp.exe 872 pdvpv.exe 408 7djdj.exe 1880 pppjj.exe 1564 o688266.exe 4288 6248226.exe 4200 6008648.exe 1452 ppddd.exe 324 86848.exe 4100 22226.exe 2400 842660.exe 3064 vpvdj.exe 1020 tttnht.exe 960 e20048.exe 1352 nntnhh.exe 2452 bhbbtt.exe 4796 84662.exe 4016 5jvpd.exe 4448 22608.exe 828 u244488.exe 3124 o644002.exe 1732 c284882.exe 4380 jvvvp.exe 4988 o464822.exe 2296 thbbtb.exe 2424 8848822.exe 4940 s4000.exe 1148 7nnbtt.exe 3680 jdvdd.exe 2128 rxrxfll.exe 4656 6860422.exe 2252 fxxrllf.exe 1824 5nbtbb.exe 3420 lxrfrfx.exe 2516 m8448.exe 4748 dpppj.exe 4468 4220820.exe 3588 684488.exe -
resource yara_rule behavioral2/memory/2804-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2804-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1504-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1020-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4356-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3732-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/860-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3376-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3700-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3700-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3252-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1280-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4248-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/872-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1880-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3024-5746-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6244888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0486044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c826004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i848660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 006088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c282660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5nbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0424622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 008046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 1504 2804 54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe 91 PID 2804 wrote to memory of 1504 2804 54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe 91 PID 2804 wrote to memory of 1504 2804 54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe 91 PID 1504 wrote to memory of 860 1504 rffxxrr.exe 92 PID 1504 wrote to memory of 860 1504 rffxxrr.exe 92 PID 1504 wrote to memory of 860 1504 rffxxrr.exe 92 PID 860 wrote to memory of 3732 860 nttnbh.exe 93 PID 860 wrote to memory of 3732 860 nttnbh.exe 93 PID 860 wrote to memory of 3732 860 nttnbh.exe 93 PID 3732 wrote to memory of 4612 3732 0060820.exe 94 PID 3732 wrote to memory of 4612 3732 0060820.exe 94 PID 3732 wrote to memory of 4612 3732 0060820.exe 94 PID 4612 wrote to memory of 1020 4612 3jjdp.exe 95 PID 4612 wrote to memory of 1020 4612 3jjdp.exe 95 PID 4612 wrote to memory of 1020 4612 3jjdp.exe 95 PID 1020 wrote to memory of 4356 1020 006082.exe 96 PID 1020 wrote to memory of 4356 1020 006082.exe 96 PID 1020 wrote to memory of 4356 1020 006082.exe 96 PID 4356 wrote to memory of 3024 4356 4262662.exe 97 PID 4356 wrote to memory of 3024 4356 4262662.exe 97 PID 4356 wrote to memory of 3024 4356 4262662.exe 97 PID 3024 wrote to memory of 3376 3024 4400000.exe 98 PID 3024 wrote to memory of 3376 3024 4400000.exe 98 PID 3024 wrote to memory of 3376 3024 4400000.exe 98 PID 3376 wrote to memory of 5012 3376 rfxxrfx.exe 99 PID 3376 wrote to memory of 5012 3376 rfxxrfx.exe 99 PID 3376 wrote to memory of 5012 3376 rfxxrfx.exe 99 PID 5012 wrote to memory of 3700 5012 bhntbn.exe 100 PID 5012 wrote to memory of 3700 5012 bhntbn.exe 100 PID 5012 wrote to memory of 3700 5012 bhntbn.exe 100 PID 3700 wrote to memory of 1636 3700 400204.exe 101 PID 3700 wrote to memory of 1636 3700 400204.exe 101 PID 3700 wrote to memory of 1636 3700 400204.exe 101 PID 1636 wrote to memory of 4452 1636 640460.exe 102 PID 1636 wrote to memory of 4452 1636 640460.exe 102 PID 1636 wrote to memory of 4452 1636 640460.exe 102 PID 4452 wrote to memory of 3252 4452 60260.exe 103 PID 4452 wrote to memory of 3252 4452 60260.exe 103 PID 4452 wrote to memory of 3252 4452 60260.exe 103 PID 3252 wrote to memory of 1280 3252 hbbnbb.exe 104 PID 3252 wrote to memory of 1280 3252 hbbnbb.exe 104 PID 3252 wrote to memory of 1280 3252 hbbnbb.exe 104 PID 1280 wrote to memory of 4736 1280 686460.exe 105 PID 1280 wrote to memory of 4736 1280 686460.exe 105 PID 1280 wrote to memory of 4736 1280 686460.exe 105 PID 4736 wrote to memory of 4324 4736 thbthb.exe 106 PID 4736 wrote to memory of 4324 4736 thbthb.exe 106 PID 4736 wrote to memory of 4324 4736 thbthb.exe 106 PID 4324 wrote to memory of 2128 4324 420482.exe 107 PID 4324 wrote to memory of 2128 4324 420482.exe 107 PID 4324 wrote to memory of 2128 4324 420482.exe 107 PID 2128 wrote to memory of 4656 2128 g4202.exe 108 PID 2128 wrote to memory of 4656 2128 g4202.exe 108 PID 2128 wrote to memory of 4656 2128 g4202.exe 108 PID 4656 wrote to memory of 4248 4656 vpjpj.exe 109 PID 4656 wrote to memory of 4248 4656 vpjpj.exe 109 PID 4656 wrote to memory of 4248 4656 vpjpj.exe 109 PID 4248 wrote to memory of 4784 4248 0886488.exe 110 PID 4248 wrote to memory of 4784 4248 0886488.exe 110 PID 4248 wrote to memory of 4784 4248 0886488.exe 110 PID 4784 wrote to memory of 2516 4784 hbbttn.exe 111 PID 4784 wrote to memory of 2516 4784 hbbttn.exe 111 PID 4784 wrote to memory of 2516 4784 hbbttn.exe 111 PID 2516 wrote to memory of 3240 2516 lfrlxrl.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe"C:\Users\Admin\AppData\Local\Temp\54884db18fc2626d3651f24d882548c568426dbab9fe91ffba5d9ca69c5a9079N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\rffxxrr.exec:\rffxxrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\nttnbh.exec:\nttnbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\0060820.exec:\0060820.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\3jjdp.exec:\3jjdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\006082.exec:\006082.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\4262662.exec:\4262662.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\4400000.exec:\4400000.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\rfxxrfx.exec:\rfxxrfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
\??\c:\bhntbn.exec:\bhntbn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\400204.exec:\400204.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3700 -
\??\c:\640460.exec:\640460.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\60260.exec:\60260.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\hbbnbb.exec:\hbbnbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\686460.exec:\686460.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\thbthb.exec:\thbthb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\420482.exec:\420482.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\g4202.exec:\g4202.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\vpjpj.exec:\vpjpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
\??\c:\0886488.exec:\0886488.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\hbbttn.exec:\hbbttn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\lfrlxrl.exec:\lfrlxrl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\200688.exec:\200688.exe23⤵
- Executes dropped EXE
PID:3240 -
\??\c:\pjpvv.exec:\pjpvv.exe24⤵
- Executes dropped EXE
PID:3080 -
\??\c:\jdjdd.exec:\jdjdd.exe25⤵
- Executes dropped EXE
PID:3720 -
\??\c:\bttbht.exec:\bttbht.exe26⤵
- Executes dropped EXE
PID:4588 -
\??\c:\pdjdd.exec:\pdjdd.exe27⤵
- Executes dropped EXE
PID:2184 -
\??\c:\dpvvp.exec:\dpvvp.exe28⤵
- Executes dropped EXE
PID:1976 -
\??\c:\pdvpv.exec:\pdvpv.exe29⤵
- Executes dropped EXE
PID:872 -
\??\c:\7djdj.exec:\7djdj.exe30⤵
- Executes dropped EXE
PID:408 -
\??\c:\pppjj.exec:\pppjj.exe31⤵
- Executes dropped EXE
PID:1880 -
\??\c:\o688266.exec:\o688266.exe32⤵
- Executes dropped EXE
PID:1564 -
\??\c:\6248226.exec:\6248226.exe33⤵
- Executes dropped EXE
PID:4288 -
\??\c:\6008648.exec:\6008648.exe34⤵
- Executes dropped EXE
PID:4200 -
\??\c:\ppddd.exec:\ppddd.exe35⤵
- Executes dropped EXE
PID:1452 -
\??\c:\86848.exec:\86848.exe36⤵
- Executes dropped EXE
PID:324 -
\??\c:\22226.exec:\22226.exe37⤵
- Executes dropped EXE
PID:4100 -
\??\c:\842660.exec:\842660.exe38⤵
- Executes dropped EXE
PID:2400 -
\??\c:\vpvdj.exec:\vpvdj.exe39⤵
- Executes dropped EXE
PID:3064 -
\??\c:\tttnht.exec:\tttnht.exe40⤵
- Executes dropped EXE
PID:1020 -
\??\c:\e20048.exec:\e20048.exe41⤵
- Executes dropped EXE
PID:960 -
\??\c:\nntnhh.exec:\nntnhh.exe42⤵
- Executes dropped EXE
PID:1352 -
\??\c:\bhbbtt.exec:\bhbbtt.exe43⤵
- Executes dropped EXE
PID:2452 -
\??\c:\84662.exec:\84662.exe44⤵
- Executes dropped EXE
PID:4796 -
\??\c:\5jvpd.exec:\5jvpd.exe45⤵
- Executes dropped EXE
PID:4016 -
\??\c:\22608.exec:\22608.exe46⤵
- Executes dropped EXE
PID:4448 -
\??\c:\u244488.exec:\u244488.exe47⤵
- Executes dropped EXE
PID:828 -
\??\c:\o644002.exec:\o644002.exe48⤵
- Executes dropped EXE
PID:3124 -
\??\c:\c284882.exec:\c284882.exe49⤵
- Executes dropped EXE
PID:1732 -
\??\c:\jvvvp.exec:\jvvvp.exe50⤵
- Executes dropped EXE
PID:4380 -
\??\c:\o464822.exec:\o464822.exe51⤵
- Executes dropped EXE
PID:4988 -
\??\c:\thbbtb.exec:\thbbtb.exe52⤵
- Executes dropped EXE
PID:2296 -
\??\c:\8848822.exec:\8848822.exe53⤵
- Executes dropped EXE
PID:2424 -
\??\c:\s4000.exec:\s4000.exe54⤵
- Executes dropped EXE
PID:4940 -
\??\c:\7nnbtt.exec:\7nnbtt.exe55⤵
- Executes dropped EXE
PID:1148 -
\??\c:\jdvdd.exec:\jdvdd.exe56⤵
- Executes dropped EXE
PID:3680 -
\??\c:\rxrxfll.exec:\rxrxfll.exe57⤵
- Executes dropped EXE
PID:2128 -
\??\c:\6860422.exec:\6860422.exe58⤵
- Executes dropped EXE
PID:4656 -
\??\c:\fxxrllf.exec:\fxxrllf.exe59⤵
- Executes dropped EXE
PID:2252 -
\??\c:\5nbtbb.exec:\5nbtbb.exe60⤵
- Executes dropped EXE
PID:1824 -
\??\c:\lxrfrfx.exec:\lxrfrfx.exe61⤵
- Executes dropped EXE
PID:3420 -
\??\c:\m8448.exec:\m8448.exe62⤵
- Executes dropped EXE
PID:2516 -
\??\c:\dpppj.exec:\dpppj.exe63⤵
- Executes dropped EXE
PID:4748 -
\??\c:\4220820.exec:\4220820.exe64⤵
- Executes dropped EXE
PID:4468 -
\??\c:\684488.exec:\684488.exe65⤵
- Executes dropped EXE
PID:3588 -
\??\c:\4848004.exec:\4848004.exe66⤵PID:4220
-
\??\c:\xxllxxl.exec:\xxllxxl.exe67⤵PID:4588
-
\??\c:\flrffxx.exec:\flrffxx.exe68⤵PID:712
-
\??\c:\6448660.exec:\6448660.exe69⤵PID:5064
-
\??\c:\9lrlfxf.exec:\9lrlfxf.exe70⤵PID:2988
-
\??\c:\ttnhbt.exec:\ttnhbt.exe71⤵PID:1348
-
\??\c:\s4460.exec:\s4460.exe72⤵PID:448
-
\??\c:\0486044.exec:\0486044.exe73⤵
- System Location Discovery: System Language Discovery
PID:2024 -
\??\c:\606644.exec:\606644.exe74⤵PID:4440
-
\??\c:\82000.exec:\82000.exe75⤵PID:4704
-
\??\c:\bbnhbb.exec:\bbnhbb.exe76⤵PID:3344
-
\??\c:\20404.exec:\20404.exe77⤵PID:208
-
\??\c:\4404882.exec:\4404882.exe78⤵PID:1684
-
\??\c:\828882.exec:\828882.exe79⤵
- System Location Discovery: System Language Discovery
PID:228 -
\??\c:\828246.exec:\828246.exe80⤵PID:3652
-
\??\c:\i288440.exec:\i288440.exe81⤵PID:3128
-
\??\c:\jpdvv.exec:\jpdvv.exe82⤵PID:2160
-
\??\c:\284888.exec:\284888.exe83⤵PID:1140
-
\??\c:\bnnnbb.exec:\bnnnbb.exe84⤵PID:4356
-
\??\c:\bbtthh.exec:\bbtthh.exe85⤵PID:3504
-
\??\c:\o648622.exec:\o648622.exe86⤵PID:2248
-
\??\c:\rrxxffl.exec:\rrxxffl.exe87⤵PID:5104
-
\??\c:\jpvvd.exec:\jpvvd.exe88⤵PID:2608
-
\??\c:\846628.exec:\846628.exe89⤵PID:3520
-
\??\c:\pjjdv.exec:\pjjdv.exe90⤵PID:3700
-
\??\c:\024866.exec:\024866.exe91⤵PID:3124
-
\??\c:\e64888.exec:\e64888.exe92⤵PID:4824
-
\??\c:\4282266.exec:\4282266.exe93⤵PID:2396
-
\??\c:\2666066.exec:\2666066.exe94⤵PID:4988
-
\??\c:\84628.exec:\84628.exe95⤵PID:3464
-
\??\c:\lffxrrl.exec:\lffxrrl.exe96⤵PID:2424
-
\??\c:\c400044.exec:\c400044.exe97⤵PID:4104
-
\??\c:\q22048.exec:\q22048.exe98⤵PID:2868
-
\??\c:\llfxrrr.exec:\llfxrrr.exe99⤵PID:3680
-
\??\c:\m0600.exec:\m0600.exe100⤵PID:2004
-
\??\c:\k06644.exec:\k06644.exe101⤵PID:4656
-
\??\c:\hbtnhb.exec:\hbtnhb.exe102⤵PID:3096
-
\??\c:\nthbtt.exec:\nthbtt.exe103⤵PID:1072
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe104⤵PID:3420
-
\??\c:\o448882.exec:\o448882.exe105⤵PID:2516
-
\??\c:\48600.exec:\48600.exe106⤵PID:3708
-
\??\c:\nnbhhb.exec:\nnbhhb.exe107⤵PID:4468
-
\??\c:\vdddv.exec:\vdddv.exe108⤵PID:996
-
\??\c:\806600.exec:\806600.exe109⤵PID:3780
-
\??\c:\vjvvp.exec:\vjvvp.exe110⤵PID:1172
-
\??\c:\84826.exec:\84826.exe111⤵PID:2460
-
\??\c:\3bhhbn.exec:\3bhhbn.exe112⤵PID:1212
-
\??\c:\868200.exec:\868200.exe113⤵PID:1712
-
\??\c:\22000.exec:\22000.exe114⤵PID:440
-
\??\c:\1tthtt.exec:\1tthtt.exe115⤵PID:4304
-
\??\c:\s6480.exec:\s6480.exe116⤵PID:2312
-
\??\c:\ntbnbt.exec:\ntbnbt.exe117⤵PID:4440
-
\??\c:\688244.exec:\688244.exe118⤵PID:2216
-
\??\c:\dpvvj.exec:\dpvvj.exe119⤵PID:860
-
\??\c:\462068.exec:\462068.exe120⤵PID:208
-
\??\c:\jjvvv.exec:\jjvvv.exe121⤵PID:1176
-
\??\c:\vjvjv.exec:\vjvjv.exe122⤵PID:4168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-