Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe
Resource
win7-20241023-en
General
-
Target
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe
-
Size
88KB
-
MD5
3ba83c9a96a914bb6030d2b7f50a6e00
-
SHA1
4f60f6cfaa9edaecaeb89c64d9e436fc51b07526
-
SHA256
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54
-
SHA512
294a924bedbac134017992666f3da414fe7dfcf1d09200df55bdcc9126691a6933d4481f8009ff4ba6c6acd5531b92dca2edca4fdaf5a232d42afe1aef51cd92
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAXPfgr2hKmdbcPi2vhdWl:ymb3NkkiQ3mdBjFo6Pfgy3dbc/hdWl
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/3096-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2316-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4204-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4192-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3892-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1440-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2220-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3040-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/384-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2608-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4092-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2336-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4996-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/208-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3480-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3124-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4512-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2652-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3224-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1468-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
60604.exepvdpd.exe8448424.exepjjvj.exe1llxlfr.exe206486.exe8226482.exethhbnb.exefffxllf.exefxllrrx.exenhtthh.exe6626482.exenththn.exeflrfrll.exe0844862.exelrrfrlx.exevjpvd.exe26220.exeffffxxl.exe666664.exe6086688.exes4882.exe3bbthh.exe82222.exedvvpd.exe04640.exevppjd.exe1xfxxxr.exerxfflrx.exe4284822.exe486000.exe024082.exe8682666.exe888068.exejpvdp.exe622060.exe866488.exe44088.exepjvvp.exe7bnntt.exe8026448.exe1hbtnh.exe684264.exe248204.exebhhhtb.exec688224.exe2622228.exennbtbb.exe28044.exew20006.exerllfxxr.exepvddd.exe266044.exe66808.exepjppj.exe028606.exe0028888.exe0222666.exea2422.exelxrflrf.exeflrrfff.exebttttb.exe5jpvj.exe8248882.exepid process 2316 60604.exe 4204 pvdpd.exe 4620 8448424.exe 4192 pjjvj.exe 2028 1llxlfr.exe 3892 206486.exe 1440 8226482.exe 2220 thhbnb.exe 3040 fffxllf.exe 384 fxllrrx.exe 2608 nhtthh.exe 4092 6626482.exe 2336 nththn.exe 4840 flrfrll.exe 4996 0844862.exe 2788 lrrfrlx.exe 208 vjpvd.exe 2984 26220.exe 4052 ffffxxl.exe 3480 666664.exe 3124 6086688.exe 5068 s4882.exe 2256 3bbthh.exe 2748 82222.exe 3364 dvvpd.exe 2244 04640.exe 4512 vppjd.exe 2652 1xfxxxr.exe 3224 rxfflrx.exe 4156 4284822.exe 1468 486000.exe 2112 024082.exe 4428 8682666.exe 1328 888068.exe 2184 jpvdp.exe 1392 622060.exe 1216 866488.exe 4812 44088.exe 884 pjvvp.exe 1260 7bnntt.exe 2296 8026448.exe 4800 1hbtnh.exe 732 684264.exe 3828 248204.exe 1252 bhhhtb.exe 4076 c688224.exe 4904 2622228.exe 3620 nnbtbb.exe 2260 28044.exe 4488 w20006.exe 2344 rllfxxr.exe 4824 pvddd.exe 4284 266044.exe 3584 66808.exe 3692 pjppj.exe 3460 028606.exe 3532 0028888.exe 544 0222666.exe 2220 a2422.exe 3248 lxrflrf.exe 3944 flrrfff.exe 4980 bttttb.exe 4456 5jpvj.exe 2188 8248882.exe -
Processes:
resource yara_rule behavioral2/memory/3096-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2316-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4204-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4192-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3892-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2220-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2220-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3040-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/384-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2608-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4092-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2336-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4996-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/208-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4512-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2652-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3224-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1468-207-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
hhhbnt.exenbbbbb.exe2804448.exe4282628.exe820422.exe82448.exebttthh.exe84448.exexrffffr.exe9ntntt.exethhbnb.exelfffxxx.exexrfxffx.exe8022666.exe666226.exeppvvd.exe600666.exevvjjp.exerlrlfxx.exepppjd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2804448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4282628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ntntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfxffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8022666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 666226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 600666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrlfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe60604.exepvdpd.exe8448424.exepjjvj.exe1llxlfr.exe206486.exe8226482.exethhbnb.exefffxllf.exefxllrrx.exenhtthh.exe6626482.exenththn.exeflrfrll.exe0844862.exelrrfrlx.exevjpvd.exe26220.exeffffxxl.exe666664.exe6086688.exedescription pid process target process PID 3096 wrote to memory of 2316 3096 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 60604.exe PID 3096 wrote to memory of 2316 3096 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 60604.exe PID 3096 wrote to memory of 2316 3096 7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe 60604.exe PID 2316 wrote to memory of 4204 2316 60604.exe pvdpd.exe PID 2316 wrote to memory of 4204 2316 60604.exe pvdpd.exe PID 2316 wrote to memory of 4204 2316 60604.exe pvdpd.exe PID 4204 wrote to memory of 4620 4204 pvdpd.exe 8448424.exe PID 4204 wrote to memory of 4620 4204 pvdpd.exe 8448424.exe PID 4204 wrote to memory of 4620 4204 pvdpd.exe 8448424.exe PID 4620 wrote to memory of 4192 4620 8448424.exe pjjvj.exe PID 4620 wrote to memory of 4192 4620 8448424.exe pjjvj.exe PID 4620 wrote to memory of 4192 4620 8448424.exe pjjvj.exe PID 4192 wrote to memory of 2028 4192 pjjvj.exe 1llxlfr.exe PID 4192 wrote to memory of 2028 4192 pjjvj.exe 1llxlfr.exe PID 4192 wrote to memory of 2028 4192 pjjvj.exe 1llxlfr.exe PID 2028 wrote to memory of 3892 2028 1llxlfr.exe 206486.exe PID 2028 wrote to memory of 3892 2028 1llxlfr.exe 206486.exe PID 2028 wrote to memory of 3892 2028 1llxlfr.exe 206486.exe PID 3892 wrote to memory of 1440 3892 206486.exe 8226482.exe PID 3892 wrote to memory of 1440 3892 206486.exe 8226482.exe PID 3892 wrote to memory of 1440 3892 206486.exe 8226482.exe PID 1440 wrote to memory of 2220 1440 8226482.exe thhbnb.exe PID 1440 wrote to memory of 2220 1440 8226482.exe thhbnb.exe PID 1440 wrote to memory of 2220 1440 8226482.exe thhbnb.exe PID 2220 wrote to memory of 3040 2220 thhbnb.exe fffxllf.exe PID 2220 wrote to memory of 3040 2220 thhbnb.exe fffxllf.exe PID 2220 wrote to memory of 3040 2220 thhbnb.exe fffxllf.exe PID 3040 wrote to memory of 384 3040 fffxllf.exe fxllrrx.exe PID 3040 wrote to memory of 384 3040 fffxllf.exe fxllrrx.exe PID 3040 wrote to memory of 384 3040 fffxllf.exe fxllrrx.exe PID 384 wrote to memory of 2608 384 fxllrrx.exe nhtthh.exe PID 384 wrote to memory of 2608 384 fxllrrx.exe nhtthh.exe PID 384 wrote to memory of 2608 384 fxllrrx.exe nhtthh.exe PID 2608 wrote to memory of 4092 2608 nhtthh.exe 6626482.exe PID 2608 wrote to memory of 4092 2608 nhtthh.exe 6626482.exe PID 2608 wrote to memory of 4092 2608 nhtthh.exe 6626482.exe PID 4092 wrote to memory of 2336 4092 6626482.exe nththn.exe PID 4092 wrote to memory of 2336 4092 6626482.exe nththn.exe PID 4092 wrote to memory of 2336 4092 6626482.exe nththn.exe PID 2336 wrote to memory of 4840 2336 nththn.exe flrfrll.exe PID 2336 wrote to memory of 4840 2336 nththn.exe flrfrll.exe PID 2336 wrote to memory of 4840 2336 nththn.exe flrfrll.exe PID 4840 wrote to memory of 4996 4840 flrfrll.exe 0844862.exe PID 4840 wrote to memory of 4996 4840 flrfrll.exe 0844862.exe PID 4840 wrote to memory of 4996 4840 flrfrll.exe 0844862.exe PID 4996 wrote to memory of 2788 4996 0844862.exe lrrfrlx.exe PID 4996 wrote to memory of 2788 4996 0844862.exe lrrfrlx.exe PID 4996 wrote to memory of 2788 4996 0844862.exe lrrfrlx.exe PID 2788 wrote to memory of 208 2788 lrrfrlx.exe vjpvd.exe PID 2788 wrote to memory of 208 2788 lrrfrlx.exe vjpvd.exe PID 2788 wrote to memory of 208 2788 lrrfrlx.exe vjpvd.exe PID 208 wrote to memory of 2984 208 vjpvd.exe 26220.exe PID 208 wrote to memory of 2984 208 vjpvd.exe 26220.exe PID 208 wrote to memory of 2984 208 vjpvd.exe 26220.exe PID 2984 wrote to memory of 4052 2984 26220.exe ffffxxl.exe PID 2984 wrote to memory of 4052 2984 26220.exe ffffxxl.exe PID 2984 wrote to memory of 4052 2984 26220.exe ffffxxl.exe PID 4052 wrote to memory of 3480 4052 ffffxxl.exe 666664.exe PID 4052 wrote to memory of 3480 4052 ffffxxl.exe 666664.exe PID 4052 wrote to memory of 3480 4052 ffffxxl.exe 666664.exe PID 3480 wrote to memory of 3124 3480 666664.exe 6086688.exe PID 3480 wrote to memory of 3124 3480 666664.exe 6086688.exe PID 3480 wrote to memory of 3124 3480 666664.exe 6086688.exe PID 3124 wrote to memory of 5068 3124 6086688.exe s4882.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe"C:\Users\Admin\AppData\Local\Temp\7e29ae72be0d6b0ecfa2f32417015932bca32ce2807fc95b2d151b24e2d27e54N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\60604.exec:\60604.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\pvdpd.exec:\pvdpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
\??\c:\8448424.exec:\8448424.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\pjjvj.exec:\pjjvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\1llxlfr.exec:\1llxlfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\206486.exec:\206486.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
\??\c:\8226482.exec:\8226482.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\thhbnb.exec:\thhbnb.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\fffxllf.exec:\fffxllf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\fxllrrx.exec:\fxllrrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
\??\c:\nhtthh.exec:\nhtthh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\6626482.exec:\6626482.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
\??\c:\nththn.exec:\nththn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
\??\c:\flrfrll.exec:\flrfrll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\0844862.exec:\0844862.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\lrrfrlx.exec:\lrrfrlx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\vjpvd.exec:\vjpvd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
\??\c:\26220.exec:\26220.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\ffffxxl.exec:\ffffxxl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
\??\c:\666664.exec:\666664.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\6086688.exec:\6086688.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\s4882.exec:\s4882.exe23⤵
- Executes dropped EXE
PID:5068 -
\??\c:\3bbthh.exec:\3bbthh.exe24⤵
- Executes dropped EXE
PID:2256 -
\??\c:\82222.exec:\82222.exe25⤵
- Executes dropped EXE
PID:2748 -
\??\c:\dvvpd.exec:\dvvpd.exe26⤵
- Executes dropped EXE
PID:3364 -
\??\c:\04640.exec:\04640.exe27⤵
- Executes dropped EXE
PID:2244 -
\??\c:\vppjd.exec:\vppjd.exe28⤵
- Executes dropped EXE
PID:4512 -
\??\c:\1xfxxxr.exec:\1xfxxxr.exe29⤵
- Executes dropped EXE
PID:2652 -
\??\c:\rxfflrx.exec:\rxfflrx.exe30⤵
- Executes dropped EXE
PID:3224 -
\??\c:\4284822.exec:\4284822.exe31⤵
- Executes dropped EXE
PID:4156 -
\??\c:\486000.exec:\486000.exe32⤵
- Executes dropped EXE
PID:1468 -
\??\c:\024082.exec:\024082.exe33⤵
- Executes dropped EXE
PID:2112 -
\??\c:\8682666.exec:\8682666.exe34⤵
- Executes dropped EXE
PID:4428 -
\??\c:\888068.exec:\888068.exe35⤵
- Executes dropped EXE
PID:1328 -
\??\c:\jpvdp.exec:\jpvdp.exe36⤵
- Executes dropped EXE
PID:2184 -
\??\c:\622060.exec:\622060.exe37⤵
- Executes dropped EXE
PID:1392 -
\??\c:\866488.exec:\866488.exe38⤵
- Executes dropped EXE
PID:1216 -
\??\c:\44088.exec:\44088.exe39⤵
- Executes dropped EXE
PID:4812 -
\??\c:\pjvvp.exec:\pjvvp.exe40⤵
- Executes dropped EXE
PID:884 -
\??\c:\7bnntt.exec:\7bnntt.exe41⤵
- Executes dropped EXE
PID:1260 -
\??\c:\8026448.exec:\8026448.exe42⤵
- Executes dropped EXE
PID:2296 -
\??\c:\1hbtnh.exec:\1hbtnh.exe43⤵
- Executes dropped EXE
PID:4800 -
\??\c:\684264.exec:\684264.exe44⤵
- Executes dropped EXE
PID:732 -
\??\c:\248204.exec:\248204.exe45⤵
- Executes dropped EXE
PID:3828 -
\??\c:\bhhhtb.exec:\bhhhtb.exe46⤵
- Executes dropped EXE
PID:1252 -
\??\c:\c688224.exec:\c688224.exe47⤵
- Executes dropped EXE
PID:4076 -
\??\c:\q68880.exec:\q68880.exe48⤵PID:1140
-
\??\c:\2622228.exec:\2622228.exe49⤵
- Executes dropped EXE
PID:4904 -
\??\c:\nnbtbb.exec:\nnbtbb.exe50⤵
- Executes dropped EXE
PID:3620 -
\??\c:\28044.exec:\28044.exe51⤵
- Executes dropped EXE
PID:2260 -
\??\c:\w20006.exec:\w20006.exe52⤵
- Executes dropped EXE
PID:4488 -
\??\c:\rllfxxr.exec:\rllfxxr.exe53⤵
- Executes dropped EXE
PID:2344 -
\??\c:\pvddd.exec:\pvddd.exe54⤵
- Executes dropped EXE
PID:4824 -
\??\c:\266044.exec:\266044.exe55⤵
- Executes dropped EXE
PID:4284 -
\??\c:\66808.exec:\66808.exe56⤵
- Executes dropped EXE
PID:3584 -
\??\c:\pjppj.exec:\pjppj.exe57⤵
- Executes dropped EXE
PID:3692 -
\??\c:\028606.exec:\028606.exe58⤵
- Executes dropped EXE
PID:3460 -
\??\c:\0028888.exec:\0028888.exe59⤵
- Executes dropped EXE
PID:3532 -
\??\c:\0222666.exec:\0222666.exe60⤵
- Executes dropped EXE
PID:544 -
\??\c:\a2422.exec:\a2422.exe61⤵
- Executes dropped EXE
PID:2220 -
\??\c:\lxrflrf.exec:\lxrflrf.exe62⤵
- Executes dropped EXE
PID:3248 -
\??\c:\flrrfff.exec:\flrrfff.exe63⤵
- Executes dropped EXE
PID:3944 -
\??\c:\bttttb.exec:\bttttb.exe64⤵
- Executes dropped EXE
PID:4980 -
\??\c:\5jpvj.exec:\5jpvj.exe65⤵
- Executes dropped EXE
PID:4456 -
\??\c:\8248882.exec:\8248882.exe66⤵
- Executes dropped EXE
PID:2188 -
\??\c:\260466.exec:\260466.exe67⤵PID:3412
-
\??\c:\s4082.exec:\s4082.exe68⤵PID:1720
-
\??\c:\frxffxf.exec:\frxffxf.exe69⤵PID:1404
-
\??\c:\224440.exec:\224440.exe70⤵PID:2264
-
\??\c:\464484.exec:\464484.exe71⤵PID:3140
-
\??\c:\68404.exec:\68404.exe72⤵PID:4024
-
\??\c:\lfxrxxl.exec:\lfxrxxl.exe73⤵PID:1428
-
\??\c:\608602.exec:\608602.exe74⤵PID:3992
-
\??\c:\80004.exec:\80004.exe75⤵PID:4948
-
\??\c:\dpjdv.exec:\dpjdv.exe76⤵PID:3592
-
\??\c:\ffxxxrr.exec:\ffxxxrr.exe77⤵PID:2064
-
\??\c:\48042.exec:\48042.exe78⤵PID:1336
-
\??\c:\s8044.exec:\s8044.exe79⤵PID:4796
-
\??\c:\flllxlr.exec:\flllxlr.exe80⤵PID:1756
-
\??\c:\vddpp.exec:\vddpp.exe81⤵PID:4360
-
\??\c:\fxrrfff.exec:\fxrrfff.exe82⤵PID:2288
-
\??\c:\440006.exec:\440006.exe83⤵PID:3500
-
\??\c:\q28048.exec:\q28048.exe84⤵PID:4724
-
\??\c:\fffxrlx.exec:\fffxrlx.exe85⤵PID:4856
-
\??\c:\866224.exec:\866224.exe86⤵PID:3636
-
\??\c:\tthnnb.exec:\tthnnb.exe87⤵PID:4480
-
\??\c:\068866.exec:\068866.exe88⤵PID:3128
-
\??\c:\1hbtbb.exec:\1hbtbb.exe89⤵PID:1432
-
\??\c:\5pvpj.exec:\5pvpj.exe90⤵PID:4936
-
\??\c:\6688600.exec:\6688600.exe91⤵PID:2360
-
\??\c:\xfxflrx.exec:\xfxflrx.exe92⤵PID:3400
-
\??\c:\lfffllf.exec:\lfffllf.exe93⤵PID:4000
-
\??\c:\nhtttt.exec:\nhtttt.exe94⤵PID:3440
-
\??\c:\jvdvv.exec:\jvdvv.exe95⤵PID:3076
-
\??\c:\82848.exec:\82848.exe96⤵PID:4296
-
\??\c:\00600.exec:\00600.exe97⤵PID:2228
-
\??\c:\c660404.exec:\c660404.exe98⤵PID:4764
-
\??\c:\1vddv.exec:\1vddv.exe99⤵PID:1100
-
\??\c:\pjpjd.exec:\pjpjd.exe100⤵PID:3672
-
\??\c:\xrfxlrr.exec:\xrfxlrr.exe101⤵PID:1988
-
\??\c:\nnbbtt.exec:\nnbbtt.exe102⤵PID:4780
-
\??\c:\tnnttn.exec:\tnnttn.exe103⤵PID:4332
-
\??\c:\7bbtnh.exec:\7bbtnh.exe104⤵PID:4304
-
\??\c:\1vvvp.exec:\1vvvp.exe105⤵PID:2132
-
\??\c:\488268.exec:\488268.exe106⤵PID:2468
-
\??\c:\0682660.exec:\0682660.exe107⤵PID:3620
-
\??\c:\rllfxxx.exec:\rllfxxx.exe108⤵PID:2700
-
\??\c:\606662.exec:\606662.exe109⤵PID:4176
-
\??\c:\608888.exec:\608888.exe110⤵PID:1732
-
\??\c:\xlxlrrr.exec:\xlxlrrr.exe111⤵PID:4132
-
\??\c:\g2884.exec:\g2884.exe112⤵PID:1116
-
\??\c:\xrrlfrl.exec:\xrrlfrl.exe113⤵PID:4768
-
\??\c:\0262060.exec:\0262060.exe114⤵PID:4560
-
\??\c:\2042488.exec:\2042488.exe115⤵PID:4120
-
\??\c:\xlfxrxr.exec:\xlfxrxr.exe116⤵PID:4252
-
\??\c:\hhhhnh.exec:\hhhhnh.exe117⤵PID:3852
-
\??\c:\284882.exec:\284882.exe118⤵PID:3764
-
\??\c:\llxxrrl.exec:\llxxrrl.exe119⤵PID:5108
-
\??\c:\nnhnbt.exec:\nnhnbt.exe120⤵PID:1664
-
\??\c:\3vdvj.exec:\3vdvj.exe121⤵PID:2688
-
\??\c:\0622222.exec:\0622222.exe122⤵PID:636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-