Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe
Resource
win7-20240903-en
General
-
Target
899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe
-
Size
82KB
-
MD5
f4f8241fc9d81bfd489ebead911bd6bb
-
SHA1
33500321b4f7a3fa6d059f6df286434dac12320f
-
SHA256
899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106
-
SHA512
dc09e95e0a13011ad9255c39f5ea1ee6abf6a10072b520990f77b2bd108c89e04fc62e35f489acb72469d4ef568e03314fafea261223629d08b6c17ec33757a5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q1:ymb3NkkiQ3mdBjFIIp9L9QrrA82
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/3764-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3764-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3368-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3368-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1640-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2836-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1552-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3520-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1764-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1696-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3488-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4968-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1596-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2624-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1980-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2840-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3060-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1836-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4616 vdvpp.exe 3368 0600222.exe 1640 20664.exe 2836 rlfffff.exe 3148 w68604.exe 1552 4022660.exe 2780 jjjpj.exe 4100 g8442.exe 2072 jvpjj.exe 3520 c244882.exe 3496 xxllllf.exe 3408 thbthh.exe 4864 5vdjp.exe 1764 868222.exe 3092 g2042.exe 4388 bnbthh.exe 1696 ffxxrxx.exe 3488 ddjvv.exe 4968 w44486.exe 1596 624482.exe 3560 bntttt.exe 2624 u826824.exe 1980 062020.exe 2840 jjppd.exe 4444 280802.exe 1660 w22604.exe 4992 46604.exe 3424 xllfxlf.exe 3060 9btnhh.exe 4964 xfxlllx.exe 1836 e40060.exe 3212 u006826.exe 2532 466460.exe 3528 lrllxfx.exe 1736 20064.exe 2528 20040.exe 2292 nbnbhb.exe 3916 46608.exe 2028 s8868.exe 4472 6262224.exe 4060 u682884.exe 3788 6848664.exe 4616 5lfxrlf.exe 4656 686406.exe 3564 2608268.exe 3936 0288448.exe 2836 rxxrrrf.exe 3476 vjppp.exe 2364 6028446.exe 2500 pddpd.exe 2780 vpjvj.exe 1600 4282262.exe 928 htbhbh.exe 4300 xrxrfxl.exe 2744 hthbnh.exe 2512 426248.exe 5004 ffxxflr.exe 648 20660.exe 2860 w82608.exe 1416 rlfrlfx.exe 3704 0208428.exe 4168 i688604.exe 1592 tnnbhb.exe 980 7nnhtn.exe -
resource yara_rule behavioral2/memory/3764-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3764-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3368-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3368-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3368-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2836-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1640-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2836-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1552-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4100-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3520-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1764-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3488-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4968-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1596-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2624-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2840-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3060-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1836-212-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6626044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0244882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8804604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w46828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 082082.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4616 3764 899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe 83 PID 3764 wrote to memory of 4616 3764 899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe 83 PID 3764 wrote to memory of 4616 3764 899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe 83 PID 4616 wrote to memory of 3368 4616 vdvpp.exe 84 PID 4616 wrote to memory of 3368 4616 vdvpp.exe 84 PID 4616 wrote to memory of 3368 4616 vdvpp.exe 84 PID 3368 wrote to memory of 1640 3368 0600222.exe 86 PID 3368 wrote to memory of 1640 3368 0600222.exe 86 PID 3368 wrote to memory of 1640 3368 0600222.exe 86 PID 1640 wrote to memory of 2836 1640 20664.exe 87 PID 1640 wrote to memory of 2836 1640 20664.exe 87 PID 1640 wrote to memory of 2836 1640 20664.exe 87 PID 2836 wrote to memory of 3148 2836 rlfffff.exe 88 PID 2836 wrote to memory of 3148 2836 rlfffff.exe 88 PID 2836 wrote to memory of 3148 2836 rlfffff.exe 88 PID 3148 wrote to memory of 1552 3148 w68604.exe 89 PID 3148 wrote to memory of 1552 3148 w68604.exe 89 PID 3148 wrote to memory of 1552 3148 w68604.exe 89 PID 1552 wrote to memory of 2780 1552 4022660.exe 91 PID 1552 wrote to memory of 2780 1552 4022660.exe 91 PID 1552 wrote to memory of 2780 1552 4022660.exe 91 PID 2780 wrote to memory of 4100 2780 jjjpj.exe 92 PID 2780 wrote to memory of 4100 2780 jjjpj.exe 92 PID 2780 wrote to memory of 4100 2780 jjjpj.exe 92 PID 4100 wrote to memory of 2072 4100 g8442.exe 93 PID 4100 wrote to memory of 2072 4100 g8442.exe 93 PID 4100 wrote to memory of 2072 4100 g8442.exe 93 PID 2072 wrote to memory of 3520 2072 jvpjj.exe 94 PID 2072 wrote to memory of 3520 2072 jvpjj.exe 94 PID 2072 wrote to memory of 3520 2072 jvpjj.exe 94 PID 3520 wrote to memory of 3496 3520 c244882.exe 95 PID 3520 wrote to memory of 3496 3520 c244882.exe 95 PID 3520 wrote to memory of 3496 3520 c244882.exe 95 PID 3496 wrote to memory of 3408 3496 xxllllf.exe 96 PID 3496 wrote to memory of 3408 3496 xxllllf.exe 96 PID 3496 wrote to memory of 3408 3496 xxllllf.exe 96 PID 3408 wrote to memory of 4864 3408 thbthh.exe 97 PID 3408 wrote to memory of 4864 3408 thbthh.exe 97 PID 3408 wrote to memory of 4864 3408 thbthh.exe 97 PID 4864 wrote to memory of 1764 4864 5vdjp.exe 98 PID 4864 wrote to memory of 1764 4864 5vdjp.exe 98 PID 4864 wrote to memory of 1764 4864 5vdjp.exe 98 PID 1764 wrote to memory of 3092 1764 868222.exe 99 PID 1764 wrote to memory of 3092 1764 868222.exe 99 PID 1764 wrote to memory of 3092 1764 868222.exe 99 PID 3092 wrote to memory of 4388 3092 g2042.exe 101 PID 3092 wrote to memory of 4388 3092 g2042.exe 101 PID 3092 wrote to memory of 4388 3092 g2042.exe 101 PID 4388 wrote to memory of 1696 4388 bnbthh.exe 102 PID 4388 wrote to memory of 1696 4388 bnbthh.exe 102 PID 4388 wrote to memory of 1696 4388 bnbthh.exe 102 PID 1696 wrote to memory of 3488 1696 ffxxrxx.exe 103 PID 1696 wrote to memory of 3488 1696 ffxxrxx.exe 103 PID 1696 wrote to memory of 3488 1696 ffxxrxx.exe 103 PID 3488 wrote to memory of 4968 3488 ddjvv.exe 104 PID 3488 wrote to memory of 4968 3488 ddjvv.exe 104 PID 3488 wrote to memory of 4968 3488 ddjvv.exe 104 PID 4968 wrote to memory of 1596 4968 w44486.exe 105 PID 4968 wrote to memory of 1596 4968 w44486.exe 105 PID 4968 wrote to memory of 1596 4968 w44486.exe 105 PID 1596 wrote to memory of 3560 1596 624482.exe 106 PID 1596 wrote to memory of 3560 1596 624482.exe 106 PID 1596 wrote to memory of 3560 1596 624482.exe 106 PID 3560 wrote to memory of 2624 3560 bntttt.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe"C:\Users\Admin\AppData\Local\Temp\899fc589a4a7c023e7497fe780629e6f9e04b3bd01bd2425179ce011894d5106.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\vdvpp.exec:\vdvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\0600222.exec:\0600222.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
\??\c:\20664.exec:\20664.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\rlfffff.exec:\rlfffff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\w68604.exec:\w68604.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\4022660.exec:\4022660.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\jjjpj.exec:\jjjpj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\g8442.exec:\g8442.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
\??\c:\jvpjj.exec:\jvpjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\c244882.exec:\c244882.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\xxllllf.exec:\xxllllf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
\??\c:\thbthh.exec:\thbthh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
\??\c:\5vdjp.exec:\5vdjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\868222.exec:\868222.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
\??\c:\g2042.exec:\g2042.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\bnbthh.exec:\bnbthh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
\??\c:\ffxxrxx.exec:\ffxxrxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\ddjvv.exec:\ddjvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
\??\c:\w44486.exec:\w44486.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
\??\c:\624482.exec:\624482.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\bntttt.exec:\bntttt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\u826824.exec:\u826824.exe23⤵
- Executes dropped EXE
PID:2624 -
\??\c:\062020.exec:\062020.exe24⤵
- Executes dropped EXE
PID:1980 -
\??\c:\jjppd.exec:\jjppd.exe25⤵
- Executes dropped EXE
PID:2840 -
\??\c:\280802.exec:\280802.exe26⤵
- Executes dropped EXE
PID:4444 -
\??\c:\w22604.exec:\w22604.exe27⤵
- Executes dropped EXE
PID:1660 -
\??\c:\46604.exec:\46604.exe28⤵
- Executes dropped EXE
PID:4992 -
\??\c:\xllfxlf.exec:\xllfxlf.exe29⤵
- Executes dropped EXE
PID:3424 -
\??\c:\9btnhh.exec:\9btnhh.exe30⤵
- Executes dropped EXE
PID:3060 -
\??\c:\xfxlllx.exec:\xfxlllx.exe31⤵
- Executes dropped EXE
PID:4964 -
\??\c:\e40060.exec:\e40060.exe32⤵
- Executes dropped EXE
PID:1836 -
\??\c:\u006826.exec:\u006826.exe33⤵
- Executes dropped EXE
PID:3212 -
\??\c:\466460.exec:\466460.exe34⤵
- Executes dropped EXE
PID:2532 -
\??\c:\lrllxfx.exec:\lrllxfx.exe35⤵
- Executes dropped EXE
PID:3528 -
\??\c:\20064.exec:\20064.exe36⤵
- Executes dropped EXE
PID:1736 -
\??\c:\20040.exec:\20040.exe37⤵
- Executes dropped EXE
PID:2528 -
\??\c:\nbnbhb.exec:\nbnbhb.exe38⤵
- Executes dropped EXE
PID:2292 -
\??\c:\46608.exec:\46608.exe39⤵
- Executes dropped EXE
PID:3916 -
\??\c:\s8868.exec:\s8868.exe40⤵
- Executes dropped EXE
PID:2028 -
\??\c:\6262224.exec:\6262224.exe41⤵
- Executes dropped EXE
PID:4472 -
\??\c:\u682884.exec:\u682884.exe42⤵
- Executes dropped EXE
PID:4060 -
\??\c:\6848664.exec:\6848664.exe43⤵
- Executes dropped EXE
PID:3788 -
\??\c:\5lfxrlf.exec:\5lfxrlf.exe44⤵
- Executes dropped EXE
PID:4616 -
\??\c:\686406.exec:\686406.exe45⤵
- Executes dropped EXE
PID:4656 -
\??\c:\2608268.exec:\2608268.exe46⤵
- Executes dropped EXE
PID:3564 -
\??\c:\0288448.exec:\0288448.exe47⤵
- Executes dropped EXE
PID:3936 -
\??\c:\rxxrrrf.exec:\rxxrrrf.exe48⤵
- Executes dropped EXE
PID:2836 -
\??\c:\vjppp.exec:\vjppp.exe49⤵
- Executes dropped EXE
PID:3476 -
\??\c:\6028446.exec:\6028446.exe50⤵
- Executes dropped EXE
PID:2364 -
\??\c:\pddpd.exec:\pddpd.exe51⤵
- Executes dropped EXE
PID:2500 -
\??\c:\vpjvj.exec:\vpjvj.exe52⤵
- Executes dropped EXE
PID:2780 -
\??\c:\4282262.exec:\4282262.exe53⤵
- Executes dropped EXE
PID:1600 -
\??\c:\htbhbh.exec:\htbhbh.exe54⤵
- Executes dropped EXE
PID:928 -
\??\c:\xrxrfxl.exec:\xrxrfxl.exe55⤵
- Executes dropped EXE
PID:4300 -
\??\c:\hthbnh.exec:\hthbnh.exe56⤵
- Executes dropped EXE
PID:2744 -
\??\c:\426248.exec:\426248.exe57⤵
- Executes dropped EXE
PID:2512 -
\??\c:\ffxxflr.exec:\ffxxflr.exe58⤵
- Executes dropped EXE
PID:5004 -
\??\c:\20660.exec:\20660.exe59⤵
- Executes dropped EXE
PID:648 -
\??\c:\w82608.exec:\w82608.exe60⤵
- Executes dropped EXE
PID:2860 -
\??\c:\rlfrlfx.exec:\rlfrlfx.exe61⤵
- Executes dropped EXE
PID:1416 -
\??\c:\0208428.exec:\0208428.exe62⤵
- Executes dropped EXE
PID:3704 -
\??\c:\i688604.exec:\i688604.exe63⤵
- Executes dropped EXE
PID:4168 -
\??\c:\tnnbhb.exec:\tnnbhb.exe64⤵
- Executes dropped EXE
PID:1592 -
\??\c:\7nnhtn.exec:\7nnhtn.exe65⤵
- Executes dropped EXE
PID:980 -
\??\c:\1vddp.exec:\1vddp.exe66⤵PID:640
-
\??\c:\44004.exec:\44004.exe67⤵PID:2736
-
\??\c:\nbbnbt.exec:\nbbnbt.exe68⤵PID:5100
-
\??\c:\ttthtn.exec:\ttthtn.exe69⤵PID:4576
-
\??\c:\w66482.exec:\w66482.exe70⤵PID:1012
-
\??\c:\lfxrfff.exec:\lfxrfff.exe71⤵PID:3544
-
\??\c:\xrfxfxf.exec:\xrfxfxf.exe72⤵PID:564
-
\??\c:\btbnht.exec:\btbnht.exe73⤵PID:4672
-
\??\c:\082424.exec:\082424.exe74⤵PID:5008
-
\??\c:\fxlfrlx.exec:\fxlfrlx.exe75⤵PID:4444
-
\??\c:\g4084.exec:\g4084.exe76⤵PID:4604
-
\??\c:\lxfrrlx.exec:\lxfrrlx.exe77⤵PID:856
-
\??\c:\4000848.exec:\4000848.exe78⤵PID:560
-
\??\c:\1hthbn.exec:\1hthbn.exe79⤵PID:3424
-
\??\c:\6246868.exec:\6246868.exe80⤵PID:2884
-
\??\c:\a0262.exec:\a0262.exe81⤵PID:1820
-
\??\c:\888608.exec:\888608.exe82⤵PID:3624
-
\??\c:\8066220.exec:\8066220.exe83⤵PID:3508
-
\??\c:\vjpjj.exec:\vjpjj.exe84⤵PID:5092
-
\??\c:\lxrfxrf.exec:\lxrfxrf.exe85⤵PID:552
-
\??\c:\488860.exec:\488860.exe86⤵PID:4048
-
\??\c:\2648042.exec:\2648042.exe87⤵PID:2664
-
\??\c:\lxxrlfr.exec:\lxxrlfr.exe88⤵PID:1588
-
\??\c:\nhbthb.exec:\nhbthb.exe89⤵PID:1216
-
\??\c:\jjvjv.exec:\jjvjv.exe90⤵PID:4468
-
\??\c:\pvvjv.exec:\pvvjv.exe91⤵PID:1484
-
\??\c:\bbbtbt.exec:\bbbtbt.exe92⤵PID:4588
-
\??\c:\dpjdv.exec:\dpjdv.exe93⤵PID:100
-
\??\c:\868604.exec:\868604.exe94⤵PID:776
-
\??\c:\4264882.exec:\4264882.exe95⤵PID:2628
-
\??\c:\462666.exec:\462666.exe96⤵PID:4532
-
\??\c:\0882462.exec:\0882462.exe97⤵PID:3936
-
\??\c:\c464882.exec:\c464882.exe98⤵PID:2836
-
\??\c:\e60426.exec:\e60426.exe99⤵PID:3464
-
\??\c:\3rrlfrf.exec:\3rrlfrf.exe100⤵PID:3628
-
\??\c:\dpvjd.exec:\dpvjd.exe101⤵PID:2500
-
\??\c:\6864202.exec:\6864202.exe102⤵PID:2440
-
\??\c:\xllfrrl.exec:\xllfrrl.exe103⤵PID:1600
-
\??\c:\7nhhht.exec:\7nhhht.exe104⤵PID:712
-
\??\c:\8264482.exec:\8264482.exe105⤵PID:1508
-
\??\c:\628848.exec:\628848.exe106⤵PID:3296
-
\??\c:\888866.exec:\888866.exe107⤵PID:3012
-
\??\c:\0068064.exec:\0068064.exe108⤵PID:484
-
\??\c:\rfrflfr.exec:\rfrflfr.exe109⤵PID:4944
-
\??\c:\g2422.exec:\g2422.exe110⤵PID:2556
-
\??\c:\dpjvv.exec:\dpjvv.exe111⤵PID:3548
-
\??\c:\w02248.exec:\w02248.exe112⤵PID:5012
-
\??\c:\rfxxfxx.exec:\rfxxfxx.exe113⤵PID:4292
-
\??\c:\tbtnnh.exec:\tbtnnh.exe114⤵PID:4388
-
\??\c:\444820.exec:\444820.exe115⤵PID:1696
-
\??\c:\bnnbnt.exec:\bnnbnt.exe116⤵PID:228
-
\??\c:\jpjdp.exec:\jpjdp.exe117⤵PID:3300
-
\??\c:\268264.exec:\268264.exe118⤵PID:2340
-
\??\c:\82264.exec:\82264.exe119⤵PID:1700
-
\??\c:\bntbth.exec:\bntbth.exe120⤵PID:3076
-
\??\c:\s0402.exec:\s0402.exe121⤵PID:956
-
\??\c:\vvjjp.exec:\vvjjp.exe122⤵PID:1284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-