Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe
Resource
win7-20240903-en
General
-
Target
ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe
-
Size
75KB
-
MD5
f0985b9122826e1f02a9b5c048e6eee4
-
SHA1
78296346200467974c34120e7d6ea37842c079c1
-
SHA256
ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7
-
SHA512
148b7583855d3c68365ecbd98499f2c6c4fe4959eace5111bb07a2894d81b8e57d2dfade487418bb0abc2fd96a6125556bd2a86273fef7eab01a82a4c76bd51c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmsL:ymb3NkkiQ3mdBjFIvl358nLA89OMFVH1
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/2372-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2372-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1212-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3100-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1332-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2432-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2456-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4244-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/564-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4780-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/512-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/996-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2360-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2812-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4600-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4384-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
4288462.exeu686046.exe8608688.exe840206.exe0668464.exentthbh.exe42608.exe282024.exe8082222.exellrrrxx.exebntnnt.exe822624.exepjvdv.exevpddj.exeddvpj.exefrxllll.exe0082482.exedpjdp.exe24242.exerlxffxf.exenbtthn.exe008646.exe3tbnbt.exe066604.exefrrfrlx.exeflrlxxl.exepppdv.exe844062.exefflflxl.exerrrffrr.exelfffxrr.exefflfrrf.exe4604260.exe862642.exe820060.exetttntt.exepvppj.exe2664488.exe688686.exepvvpj.exefxrffrf.exebnnhtn.exebttnhb.exerlxllrx.exejpdvp.exe9hhbnt.exe002666.exe8260442.exea2822.exehtbbbh.exevvvjp.exe0404848.exe46208.exejpvpj.exedjpdj.exe2448260.exebntnhh.exe24482.exe0022066.exejpvpp.exehhnhbb.exe20222.exejjddv.exe60666.exepid process 1212 4288462.exe 3920 u686046.exe 2968 8608688.exe 3100 840206.exe 1332 0668464.exe 2432 ntthbh.exe 5040 42608.exe 1584 282024.exe 5012 8082222.exe 2456 llrrrxx.exe 4244 bntnnt.exe 564 822624.exe 3060 pjvdv.exe 4832 vpddj.exe 4780 ddvpj.exe 2780 frxllll.exe 4616 0082482.exe 512 dpjdp.exe 996 24242.exe 1452 rlxffxf.exe 2804 nbtthn.exe 4620 008646.exe 4508 3tbnbt.exe 3468 066604.exe 2360 frrfrlx.exe 8 flrlxxl.exe 2812 pppdv.exe 4600 844062.exe 3356 fflflxl.exe 4384 rrrffrr.exe 2988 lfffxrr.exe 1596 fflfrrf.exe 828 4604260.exe 2244 862642.exe 3428 820060.exe 1684 tttntt.exe 3368 pvppj.exe 3760 2664488.exe 1184 688686.exe 4948 pvvpj.exe 1076 fxrffrf.exe 2660 bnnhtn.exe 4504 bttnhb.exe 4772 rlxllrx.exe 4684 jpdvp.exe 2148 9hhbnt.exe 4368 002666.exe 2944 8260442.exe 4516 a2822.exe 3304 htbbbh.exe 1224 vvvjp.exe 3744 0404848.exe 1156 46208.exe 4264 jpvpj.exe 1536 djpdj.exe 2192 2448260.exe 1720 bntnhh.exe 556 24482.exe 1700 0022066.exe 3840 jpvpp.exe 5012 hhnhbb.exe 2344 20222.exe 1104 jjddv.exe 1572 60666.exe -
Processes:
resource yara_rule behavioral2/memory/2372-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2372-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1212-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3100-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1332-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2456-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4244-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/564-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4832-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4780-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/512-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/996-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4508-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2360-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2812-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4600-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4384-202-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
thbnnh.exe028088.exeu686046.exe8422286.exepvdpj.exe828086.exenttttb.exevppjv.exe242086.exe864006.exe640826.exe2286864.exe0002482.exelrxfxxx.exei088888.exepdvjv.exe06824.exe040606.exevddvj.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u686046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8422286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 242086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 864006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2286864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0002482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i088888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 040606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddvj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe4288462.exeu686046.exe8608688.exe840206.exe0668464.exentthbh.exe42608.exe282024.exe8082222.exellrrrxx.exebntnnt.exe822624.exepjvdv.exevpddj.exeddvpj.exefrxllll.exe0082482.exedpjdp.exe24242.exerlxffxf.exenbtthn.exedescription pid process target process PID 2372 wrote to memory of 1212 2372 ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe 4288462.exe PID 2372 wrote to memory of 1212 2372 ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe 4288462.exe PID 2372 wrote to memory of 1212 2372 ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe 4288462.exe PID 1212 wrote to memory of 3920 1212 4288462.exe u686046.exe PID 1212 wrote to memory of 3920 1212 4288462.exe u686046.exe PID 1212 wrote to memory of 3920 1212 4288462.exe u686046.exe PID 3920 wrote to memory of 2968 3920 u686046.exe 8608688.exe PID 3920 wrote to memory of 2968 3920 u686046.exe 8608688.exe PID 3920 wrote to memory of 2968 3920 u686046.exe 8608688.exe PID 2968 wrote to memory of 3100 2968 8608688.exe 840206.exe PID 2968 wrote to memory of 3100 2968 8608688.exe 840206.exe PID 2968 wrote to memory of 3100 2968 8608688.exe 840206.exe PID 3100 wrote to memory of 1332 3100 840206.exe 0668464.exe PID 3100 wrote to memory of 1332 3100 840206.exe 0668464.exe PID 3100 wrote to memory of 1332 3100 840206.exe 0668464.exe PID 1332 wrote to memory of 2432 1332 0668464.exe ntthbh.exe PID 1332 wrote to memory of 2432 1332 0668464.exe ntthbh.exe PID 1332 wrote to memory of 2432 1332 0668464.exe ntthbh.exe PID 2432 wrote to memory of 5040 2432 ntthbh.exe 42608.exe PID 2432 wrote to memory of 5040 2432 ntthbh.exe 42608.exe PID 2432 wrote to memory of 5040 2432 ntthbh.exe 42608.exe PID 5040 wrote to memory of 1584 5040 42608.exe 282024.exe PID 5040 wrote to memory of 1584 5040 42608.exe 282024.exe PID 5040 wrote to memory of 1584 5040 42608.exe 282024.exe PID 1584 wrote to memory of 5012 1584 282024.exe 8082222.exe PID 1584 wrote to memory of 5012 1584 282024.exe 8082222.exe PID 1584 wrote to memory of 5012 1584 282024.exe 8082222.exe PID 5012 wrote to memory of 2456 5012 8082222.exe llrrrxx.exe PID 5012 wrote to memory of 2456 5012 8082222.exe llrrrxx.exe PID 5012 wrote to memory of 2456 5012 8082222.exe llrrrxx.exe PID 2456 wrote to memory of 4244 2456 llrrrxx.exe bntnnt.exe PID 2456 wrote to memory of 4244 2456 llrrrxx.exe bntnnt.exe PID 2456 wrote to memory of 4244 2456 llrrrxx.exe bntnnt.exe PID 4244 wrote to memory of 564 4244 bntnnt.exe 822624.exe PID 4244 wrote to memory of 564 4244 bntnnt.exe 822624.exe PID 4244 wrote to memory of 564 4244 bntnnt.exe 822624.exe PID 564 wrote to memory of 3060 564 822624.exe pjvdv.exe PID 564 wrote to memory of 3060 564 822624.exe pjvdv.exe PID 564 wrote to memory of 3060 564 822624.exe pjvdv.exe PID 3060 wrote to memory of 4832 3060 pjvdv.exe vpddj.exe PID 3060 wrote to memory of 4832 3060 pjvdv.exe vpddj.exe PID 3060 wrote to memory of 4832 3060 pjvdv.exe vpddj.exe PID 4832 wrote to memory of 4780 4832 vpddj.exe ddvpj.exe PID 4832 wrote to memory of 4780 4832 vpddj.exe ddvpj.exe PID 4832 wrote to memory of 4780 4832 vpddj.exe ddvpj.exe PID 4780 wrote to memory of 2780 4780 ddvpj.exe frxllll.exe PID 4780 wrote to memory of 2780 4780 ddvpj.exe frxllll.exe PID 4780 wrote to memory of 2780 4780 ddvpj.exe frxllll.exe PID 2780 wrote to memory of 4616 2780 frxllll.exe 0082482.exe PID 2780 wrote to memory of 4616 2780 frxllll.exe 0082482.exe PID 2780 wrote to memory of 4616 2780 frxllll.exe 0082482.exe PID 4616 wrote to memory of 512 4616 0082482.exe dpjdp.exe PID 4616 wrote to memory of 512 4616 0082482.exe dpjdp.exe PID 4616 wrote to memory of 512 4616 0082482.exe dpjdp.exe PID 512 wrote to memory of 996 512 dpjdp.exe 24242.exe PID 512 wrote to memory of 996 512 dpjdp.exe 24242.exe PID 512 wrote to memory of 996 512 dpjdp.exe 24242.exe PID 996 wrote to memory of 1452 996 24242.exe rlxffxf.exe PID 996 wrote to memory of 1452 996 24242.exe rlxffxf.exe PID 996 wrote to memory of 1452 996 24242.exe rlxffxf.exe PID 1452 wrote to memory of 2804 1452 rlxffxf.exe nbtthn.exe PID 1452 wrote to memory of 2804 1452 rlxffxf.exe nbtthn.exe PID 1452 wrote to memory of 2804 1452 rlxffxf.exe nbtthn.exe PID 2804 wrote to memory of 4620 2804 nbtthn.exe 008646.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe"C:\Users\Admin\AppData\Local\Temp\ef9d4d868825ddc61895a1af8d86e3dd638a036e6c4326c6318c0ef5052f0ce7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\4288462.exec:\4288462.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\u686046.exec:\u686046.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
\??\c:\8608688.exec:\8608688.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\840206.exec:\840206.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\0668464.exec:\0668464.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\ntthbh.exec:\ntthbh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\42608.exec:\42608.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\282024.exec:\282024.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\8082222.exec:\8082222.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\llrrrxx.exec:\llrrrxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\bntnnt.exec:\bntnnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
\??\c:\822624.exec:\822624.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
\??\c:\pjvdv.exec:\pjvdv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\vpddj.exec:\vpddj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
\??\c:\ddvpj.exec:\ddvpj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
\??\c:\frxllll.exec:\frxllll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\0082482.exec:\0082482.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\dpjdp.exec:\dpjdp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
\??\c:\24242.exec:\24242.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\rlxffxf.exec:\rlxffxf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\nbtthn.exec:\nbtthn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\008646.exec:\008646.exe23⤵
- Executes dropped EXE
PID:4620 -
\??\c:\3tbnbt.exec:\3tbnbt.exe24⤵
- Executes dropped EXE
PID:4508 -
\??\c:\066604.exec:\066604.exe25⤵
- Executes dropped EXE
PID:3468 -
\??\c:\frrfrlx.exec:\frrfrlx.exe26⤵
- Executes dropped EXE
PID:2360 -
\??\c:\flrlxxl.exec:\flrlxxl.exe27⤵
- Executes dropped EXE
PID:8 -
\??\c:\pppdv.exec:\pppdv.exe28⤵
- Executes dropped EXE
PID:2812 -
\??\c:\844062.exec:\844062.exe29⤵
- Executes dropped EXE
PID:4600 -
\??\c:\fflflxl.exec:\fflflxl.exe30⤵
- Executes dropped EXE
PID:3356 -
\??\c:\rrrffrr.exec:\rrrffrr.exe31⤵
- Executes dropped EXE
PID:4384 -
\??\c:\lfffxrr.exec:\lfffxrr.exe32⤵
- Executes dropped EXE
PID:2988 -
\??\c:\fflfrrf.exec:\fflfrrf.exe33⤵
- Executes dropped EXE
PID:1596 -
\??\c:\4604260.exec:\4604260.exe34⤵
- Executes dropped EXE
PID:828 -
\??\c:\862642.exec:\862642.exe35⤵
- Executes dropped EXE
PID:2244 -
\??\c:\820060.exec:\820060.exe36⤵
- Executes dropped EXE
PID:3428 -
\??\c:\tttntt.exec:\tttntt.exe37⤵
- Executes dropped EXE
PID:1684 -
\??\c:\pvppj.exec:\pvppj.exe38⤵
- Executes dropped EXE
PID:3368 -
\??\c:\2664488.exec:\2664488.exe39⤵
- Executes dropped EXE
PID:3760 -
\??\c:\688686.exec:\688686.exe40⤵
- Executes dropped EXE
PID:1184 -
\??\c:\pvvpj.exec:\pvvpj.exe41⤵
- Executes dropped EXE
PID:4948 -
\??\c:\fxrffrf.exec:\fxrffrf.exe42⤵
- Executes dropped EXE
PID:1076 -
\??\c:\bnnhtn.exec:\bnnhtn.exe43⤵
- Executes dropped EXE
PID:2660 -
\??\c:\bttnhb.exec:\bttnhb.exe44⤵
- Executes dropped EXE
PID:4504 -
\??\c:\rlxllrx.exec:\rlxllrx.exe45⤵
- Executes dropped EXE
PID:4772 -
\??\c:\jpdvp.exec:\jpdvp.exe46⤵
- Executes dropped EXE
PID:4684 -
\??\c:\9hhbnt.exec:\9hhbnt.exe47⤵
- Executes dropped EXE
PID:2148 -
\??\c:\002666.exec:\002666.exe48⤵
- Executes dropped EXE
PID:4368 -
\??\c:\8260442.exec:\8260442.exe49⤵
- Executes dropped EXE
PID:2944 -
\??\c:\a2822.exec:\a2822.exe50⤵
- Executes dropped EXE
PID:4516 -
\??\c:\htbbbh.exec:\htbbbh.exe51⤵
- Executes dropped EXE
PID:3304 -
\??\c:\vvvjp.exec:\vvvjp.exe52⤵
- Executes dropped EXE
PID:1224 -
\??\c:\0404848.exec:\0404848.exe53⤵
- Executes dropped EXE
PID:3744 -
\??\c:\46208.exec:\46208.exe54⤵
- Executes dropped EXE
PID:1156 -
\??\c:\jpvpj.exec:\jpvpj.exe55⤵
- Executes dropped EXE
PID:4264 -
\??\c:\djpdj.exec:\djpdj.exe56⤵
- Executes dropped EXE
PID:1536 -
\??\c:\2448260.exec:\2448260.exe57⤵
- Executes dropped EXE
PID:2192 -
\??\c:\bntnhh.exec:\bntnhh.exe58⤵
- Executes dropped EXE
PID:1720 -
\??\c:\24482.exec:\24482.exe59⤵
- Executes dropped EXE
PID:556 -
\??\c:\0022066.exec:\0022066.exe60⤵
- Executes dropped EXE
PID:1700 -
\??\c:\jpvpp.exec:\jpvpp.exe61⤵
- Executes dropped EXE
PID:3840 -
\??\c:\hhnhbb.exec:\hhnhbb.exe62⤵
- Executes dropped EXE
PID:5012 -
\??\c:\20222.exec:\20222.exe63⤵
- Executes dropped EXE
PID:2344 -
\??\c:\jjddv.exec:\jjddv.exe64⤵
- Executes dropped EXE
PID:1104 -
\??\c:\60666.exec:\60666.exe65⤵
- Executes dropped EXE
PID:1572 -
\??\c:\tbbnbt.exec:\tbbnbt.exe66⤵PID:696
-
\??\c:\xfrllrx.exec:\xfrllrx.exe67⤵PID:2740
-
\??\c:\rxlxlfl.exec:\rxlxlfl.exe68⤵PID:3440
-
\??\c:\4800406.exec:\4800406.exe69⤵PID:2972
-
\??\c:\bbhtnb.exec:\bbhtnb.exe70⤵PID:4652
-
\??\c:\rlflxrf.exec:\rlflxrf.exe71⤵PID:964
-
\??\c:\bhtbht.exec:\bhtbht.exe72⤵PID:4084
-
\??\c:\xlrxlxl.exec:\xlrxlxl.exe73⤵PID:1488
-
\??\c:\hhhbnb.exec:\hhhbnb.exe74⤵PID:2084
-
\??\c:\4604204.exec:\4604204.exe75⤵PID:1964
-
\??\c:\9hthtn.exec:\9hthtn.exe76⤵PID:1884
-
\??\c:\ttthbt.exec:\ttthbt.exe77⤵PID:3716
-
\??\c:\c268686.exec:\c268686.exe78⤵PID:1868
-
\??\c:\406222.exec:\406222.exe79⤵PID:4620
-
\??\c:\686020.exec:\686020.exe80⤵PID:4316
-
\??\c:\8008208.exec:\8008208.exe81⤵PID:2256
-
\??\c:\rfxrxxr.exec:\rfxrxxr.exe82⤵PID:3468
-
\??\c:\02824.exec:\02824.exe83⤵PID:4136
-
\??\c:\5vjdv.exec:\5vjdv.exe84⤵PID:4060
-
\??\c:\402880.exec:\402880.exe85⤵PID:2812
-
\??\c:\62204.exec:\62204.exe86⤵PID:900
-
\??\c:\040208.exec:\040208.exe87⤵PID:232
-
\??\c:\fllxxrl.exec:\fllxxrl.exe88⤵PID:1320
-
\??\c:\46248.exec:\46248.exe89⤵PID:1040
-
\??\c:\624660.exec:\624660.exe90⤵PID:1596
-
\??\c:\2668642.exec:\2668642.exe91⤵PID:1864
-
\??\c:\bhnhhh.exec:\bhnhhh.exe92⤵PID:4512
-
\??\c:\7vddv.exec:\7vddv.exe93⤵PID:2960
-
\??\c:\lrrfxrl.exec:\lrrfxrl.exe94⤵PID:4240
-
\??\c:\2286864.exec:\2286864.exe95⤵
- System Location Discovery: System Language Discovery
PID:3112 -
\??\c:\pppdj.exec:\pppdj.exe96⤵PID:3412
-
\??\c:\660226.exec:\660226.exe97⤵PID:4948
-
\??\c:\442684.exec:\442684.exe98⤵PID:3824
-
\??\c:\tnbttt.exec:\tnbttt.exe99⤵PID:3344
-
\??\c:\rlrflrr.exec:\rlrflrr.exe100⤵PID:1428
-
\??\c:\q06684.exec:\q06684.exe101⤵PID:1556
-
\??\c:\88286.exec:\88286.exe102⤵PID:3668
-
\??\c:\dvpdv.exec:\dvpdv.exe103⤵PID:804
-
\??\c:\fffxlfr.exec:\fffxlfr.exe104⤵PID:1616
-
\??\c:\60000.exec:\60000.exe105⤵PID:2956
-
\??\c:\206048.exec:\206048.exe106⤵PID:1220
-
\??\c:\pvjdp.exec:\pvjdp.exe107⤵PID:908
-
\??\c:\2260804.exec:\2260804.exe108⤵PID:896
-
\??\c:\9jvvj.exec:\9jvvj.exe109⤵PID:640
-
\??\c:\fxllfll.exec:\fxllfll.exe110⤵PID:2132
-
\??\c:\0080060.exec:\0080060.exe111⤵PID:4180
-
\??\c:\c406066.exec:\c406066.exe112⤵PID:2712
-
\??\c:\nthnnt.exec:\nthnnt.exe113⤵PID:712
-
\??\c:\02860.exec:\02860.exe114⤵PID:3956
-
\??\c:\8082822.exec:\8082822.exe115⤵PID:1844
-
\??\c:\622222.exec:\622222.exe116⤵PID:3736
-
\??\c:\860640.exec:\860640.exe117⤵PID:2392
-
\??\c:\0622802.exec:\0622802.exe118⤵PID:2344
-
\??\c:\3bhbtt.exec:\3bhbtt.exe119⤵PID:2424
-
\??\c:\2860662.exec:\2860662.exe120⤵PID:2908
-
\??\c:\xxllrfl.exec:\xxllrfl.exe121⤵PID:1960
-
\??\c:\028628.exec:\028628.exe122⤵PID:684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-