Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 16:22
Static task
static1
Behavioral task
behavioral1
Sample
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe
Resource
win7-20240903-en
General
-
Target
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe
-
Size
245KB
-
MD5
bf2695c48bf77c994421e0592f2d2953
-
SHA1
71abe1c2be83a5402a3bdeb9f13c12475ac3f903
-
SHA256
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3
-
SHA512
b5c8d482dda726c8dee89bf8d14f975d6b046019684acc38870fab911a83451257027b239efc3bba22c18221cc8074933c63f9135deb13682818e41d9f741dc8
-
SSDEEP
6144:n3C9BRo7tvnJ9oEz2Eu9XgcVyDOoZU0wGiv/U:n3C9ytvnV2NQAo20wGivs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/3508-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3508-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4716-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4856-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3172-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1352-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5064-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3900-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3184-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1788-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2356-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/876-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2544-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1292-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2100-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4360-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1316-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4452-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3936-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5072-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4384-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5088-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
484222.exe240044.exerffllrl.exetbhnht.exe4864002.exeu848288.exepjvpj.exe02808.exe266266.exe9xlfxfl.exe60604.exe800040.exe7hhbtt.exetttttn.exes6824.exew88866.exedjvpp.exevjpjd.exe8244002.exepjdvv.exehbhbbb.exexxxrllf.exerlfxfff.exefrrlfff.exejdjjd.exerxfffff.exenbbbbn.exe60204.exebtbtnn.exeffrlfff.exexffff.exenhbtnn.exe4282000.exeddddv.exedjjdp.exebhbtnn.exevpdjj.exe7vjdp.exepvddv.exepjpjd.exe266044.exe82044.exe4882600.exe0804884.exea2822.exe06826.exedvpjv.exelrxrrll.exe4060000.exe1xlffxx.exebhnhhh.exe8800400.exe4466000.exehttnhh.exe44000.exenbnhbb.exe1lrlrrx.exe8466000.exe08482.exenthttt.exenbbbnn.exe220080.exea0442.exe3pdvv.exepid Process 3168 484222.exe 4716 240044.exe 3900 rffllrl.exe 5064 tbhnht.exe 1352 4864002.exe 3616 u848288.exe 4856 pjvpj.exe 3172 02808.exe 3184 266266.exe 1788 9xlfxfl.exe 2356 60604.exe 876 800040.exe 2544 7hhbtt.exe 2556 tttttn.exe 1292 s6824.exe 2648 w88866.exe 3292 djvpp.exe 2100 vjpjd.exe 1448 8244002.exe 5044 pjdvv.exe 4360 hbhbbb.exe 1316 xxxrllf.exe 4452 rlfxfff.exe 5052 frrlfff.exe 4936 jdjjd.exe 3936 rxfffff.exe 5072 nbbbbn.exe 4384 60204.exe 4328 btbtnn.exe 5088 ffrlfff.exe 4504 xffff.exe 2844 nhbtnn.exe 2168 4282000.exe 3884 ddddv.exe 2344 djjdp.exe 972 bhbtnn.exe 4200 vpdjj.exe 2312 7vjdp.exe 3252 pvddv.exe 3664 pjpjd.exe 3768 266044.exe 764 82044.exe 3956 4882600.exe 5040 0804884.exe 4072 a2822.exe 4212 06826.exe 5064 dvpjv.exe 3780 lrxrrll.exe 816 4060000.exe 3096 1xlffxx.exe 1640 bhnhhh.exe 2368 8800400.exe 2564 4466000.exe 4584 httnhh.exe 1128 44000.exe 2392 nbnhbb.exe 1788 1lrlrrx.exe 1032 8466000.exe 3476 08482.exe 3788 nthttt.exe 1952 nbbbnn.exe 4760 220080.exe 2556 a0442.exe 1292 3pdvv.exe -
Processes:
resource yara_rule behavioral2/memory/3508-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3508-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3172-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1352-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5064-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3900-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3184-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1788-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2356-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/876-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2544-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1292-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2648-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2100-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1316-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3936-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5072-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4384-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5088-198-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
48004.exe60604.exe200428.exeffllffx.exebbhbtt.exevvdvp.exe6622604.exe0426262.exe0422824.exe44000.exe42826.exeffrrxxf.exe04080.exee20684.exe86866.exe7ttthh.exelfllffx.exek28266.exe088644.exe402044.exe6004480.exe2082880.exe1jppj.exedpvdv.exe7bnhnn.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 200428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6622604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0426262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0422824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e20684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ttthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k28266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 402044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6004480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2082880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe484222.exe240044.exerffllrl.exetbhnht.exe4864002.exeu848288.exepjvpj.exe02808.exe266266.exe9xlfxfl.exe60604.exe800040.exe7hhbtt.exetttttn.exes6824.exew88866.exedjvpp.exevjpjd.exe8244002.exepjdvv.exehbhbbb.exedescription pid Process procid_target PID 3508 wrote to memory of 3168 3508 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe 82 PID 3508 wrote to memory of 3168 3508 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe 82 PID 3508 wrote to memory of 3168 3508 ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe 82 PID 3168 wrote to memory of 4716 3168 484222.exe 83 PID 3168 wrote to memory of 4716 3168 484222.exe 83 PID 3168 wrote to memory of 4716 3168 484222.exe 83 PID 4716 wrote to memory of 3900 4716 240044.exe 84 PID 4716 wrote to memory of 3900 4716 240044.exe 84 PID 4716 wrote to memory of 3900 4716 240044.exe 84 PID 3900 wrote to memory of 5064 3900 rffllrl.exe 85 PID 3900 wrote to memory of 5064 3900 rffllrl.exe 85 PID 3900 wrote to memory of 5064 3900 rffllrl.exe 85 PID 5064 wrote to memory of 1352 5064 tbhnht.exe 86 PID 5064 wrote to memory of 1352 5064 tbhnht.exe 86 PID 5064 wrote to memory of 1352 5064 tbhnht.exe 86 PID 1352 wrote to memory of 3616 1352 4864002.exe 87 PID 1352 wrote to memory of 3616 1352 4864002.exe 87 PID 1352 wrote to memory of 3616 1352 4864002.exe 87 PID 3616 wrote to memory of 4856 3616 u848288.exe 88 PID 3616 wrote to memory of 4856 3616 u848288.exe 88 PID 3616 wrote to memory of 4856 3616 u848288.exe 88 PID 4856 wrote to memory of 3172 4856 pjvpj.exe 89 PID 4856 wrote to memory of 3172 4856 pjvpj.exe 89 PID 4856 wrote to memory of 3172 4856 pjvpj.exe 89 PID 3172 wrote to memory of 3184 3172 02808.exe 90 PID 3172 wrote to memory of 3184 3172 02808.exe 90 PID 3172 wrote to memory of 3184 3172 02808.exe 90 PID 3184 wrote to memory of 1788 3184 266266.exe 91 PID 3184 wrote to memory of 1788 3184 266266.exe 91 PID 3184 wrote to memory of 1788 3184 266266.exe 91 PID 1788 wrote to memory of 2356 1788 9xlfxfl.exe 92 PID 1788 wrote to memory of 2356 1788 9xlfxfl.exe 92 PID 1788 wrote to memory of 2356 1788 9xlfxfl.exe 92 PID 2356 wrote to memory of 876 2356 60604.exe 93 PID 2356 wrote to memory of 876 2356 60604.exe 93 PID 2356 wrote to memory of 876 2356 60604.exe 93 PID 876 wrote to memory of 2544 876 800040.exe 94 PID 876 wrote to memory of 2544 876 800040.exe 94 PID 876 wrote to memory of 2544 876 800040.exe 94 PID 2544 wrote to memory of 2556 2544 7hhbtt.exe 95 PID 2544 wrote to memory of 2556 2544 7hhbtt.exe 95 PID 2544 wrote to memory of 2556 2544 7hhbtt.exe 95 PID 2556 wrote to memory of 1292 2556 tttttn.exe 96 PID 2556 wrote to memory of 1292 2556 tttttn.exe 96 PID 2556 wrote to memory of 1292 2556 tttttn.exe 96 PID 1292 wrote to memory of 2648 1292 s6824.exe 97 PID 1292 wrote to memory of 2648 1292 s6824.exe 97 PID 1292 wrote to memory of 2648 1292 s6824.exe 97 PID 2648 wrote to memory of 3292 2648 w88866.exe 98 PID 2648 wrote to memory of 3292 2648 w88866.exe 98 PID 2648 wrote to memory of 3292 2648 w88866.exe 98 PID 3292 wrote to memory of 2100 3292 djvpp.exe 99 PID 3292 wrote to memory of 2100 3292 djvpp.exe 99 PID 3292 wrote to memory of 2100 3292 djvpp.exe 99 PID 2100 wrote to memory of 1448 2100 vjpjd.exe 100 PID 2100 wrote to memory of 1448 2100 vjpjd.exe 100 PID 2100 wrote to memory of 1448 2100 vjpjd.exe 100 PID 1448 wrote to memory of 5044 1448 8244002.exe 101 PID 1448 wrote to memory of 5044 1448 8244002.exe 101 PID 1448 wrote to memory of 5044 1448 8244002.exe 101 PID 5044 wrote to memory of 4360 5044 pjdvv.exe 102 PID 5044 wrote to memory of 4360 5044 pjdvv.exe 102 PID 5044 wrote to memory of 4360 5044 pjdvv.exe 102 PID 4360 wrote to memory of 1316 4360 hbhbbb.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe"C:\Users\Admin\AppData\Local\Temp\ee2cd552202dfeaf289b4135085782adab6e332c195284c32543f16a762a4ff3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
\??\c:\484222.exec:\484222.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\240044.exec:\240044.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\rffllrl.exec:\rffllrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
\??\c:\tbhnht.exec:\tbhnht.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
\??\c:\4864002.exec:\4864002.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\u848288.exec:\u848288.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\pjvpj.exec:\pjvpj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
\??\c:\02808.exec:\02808.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
\??\c:\266266.exec:\266266.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
\??\c:\9xlfxfl.exec:\9xlfxfl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\60604.exec:\60604.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\800040.exec:\800040.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\7hhbtt.exec:\7hhbtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\tttttn.exec:\tttttn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\s6824.exec:\s6824.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\w88866.exec:\w88866.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\djvpp.exec:\djvpp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
\??\c:\vjpjd.exec:\vjpjd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\8244002.exec:\8244002.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\pjdvv.exec:\pjdvv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\hbhbbb.exec:\hbhbbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
\??\c:\xxxrllf.exec:\xxxrllf.exe23⤵
- Executes dropped EXE
PID:1316 -
\??\c:\rlfxfff.exec:\rlfxfff.exe24⤵
- Executes dropped EXE
PID:4452 -
\??\c:\frrlfff.exec:\frrlfff.exe25⤵
- Executes dropped EXE
PID:5052 -
\??\c:\jdjjd.exec:\jdjjd.exe26⤵
- Executes dropped EXE
PID:4936 -
\??\c:\rxfffff.exec:\rxfffff.exe27⤵
- Executes dropped EXE
PID:3936 -
\??\c:\nbbbbn.exec:\nbbbbn.exe28⤵
- Executes dropped EXE
PID:5072 -
\??\c:\60204.exec:\60204.exe29⤵
- Executes dropped EXE
PID:4384 -
\??\c:\btbtnn.exec:\btbtnn.exe30⤵
- Executes dropped EXE
PID:4328 -
\??\c:\ffrlfff.exec:\ffrlfff.exe31⤵
- Executes dropped EXE
PID:5088 -
\??\c:\xffff.exec:\xffff.exe32⤵
- Executes dropped EXE
PID:4504 -
\??\c:\nhbtnn.exec:\nhbtnn.exe33⤵
- Executes dropped EXE
PID:2844 -
\??\c:\4282000.exec:\4282000.exe34⤵
- Executes dropped EXE
PID:2168 -
\??\c:\ddddv.exec:\ddddv.exe35⤵
- Executes dropped EXE
PID:3884 -
\??\c:\djjdp.exec:\djjdp.exe36⤵
- Executes dropped EXE
PID:2344 -
\??\c:\bhbtnn.exec:\bhbtnn.exe37⤵
- Executes dropped EXE
PID:972 -
\??\c:\vpdjj.exec:\vpdjj.exe38⤵
- Executes dropped EXE
PID:4200 -
\??\c:\7vjdp.exec:\7vjdp.exe39⤵
- Executes dropped EXE
PID:2312 -
\??\c:\pvddv.exec:\pvddv.exe40⤵
- Executes dropped EXE
PID:3252 -
\??\c:\pjpjd.exec:\pjpjd.exe41⤵
- Executes dropped EXE
PID:3664 -
\??\c:\266044.exec:\266044.exe42⤵
- Executes dropped EXE
PID:3768 -
\??\c:\82044.exec:\82044.exe43⤵
- Executes dropped EXE
PID:764 -
\??\c:\4882600.exec:\4882600.exe44⤵
- Executes dropped EXE
PID:3956 -
\??\c:\0804884.exec:\0804884.exe45⤵
- Executes dropped EXE
PID:5040 -
\??\c:\a2822.exec:\a2822.exe46⤵
- Executes dropped EXE
PID:4072 -
\??\c:\06826.exec:\06826.exe47⤵
- Executes dropped EXE
PID:4212 -
\??\c:\dvpjv.exec:\dvpjv.exe48⤵
- Executes dropped EXE
PID:5064 -
\??\c:\lrxrrll.exec:\lrxrrll.exe49⤵
- Executes dropped EXE
PID:3780 -
\??\c:\4060000.exec:\4060000.exe50⤵
- Executes dropped EXE
PID:816 -
\??\c:\1xlffxx.exec:\1xlffxx.exe51⤵
- Executes dropped EXE
PID:3096 -
\??\c:\bhnhhh.exec:\bhnhhh.exe52⤵
- Executes dropped EXE
PID:1640 -
\??\c:\8800400.exec:\8800400.exe53⤵
- Executes dropped EXE
PID:2368 -
\??\c:\4466000.exec:\4466000.exe54⤵
- Executes dropped EXE
PID:2564 -
\??\c:\httnhh.exec:\httnhh.exe55⤵
- Executes dropped EXE
PID:4584 -
\??\c:\44000.exec:\44000.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1128 -
\??\c:\nbnhbb.exec:\nbnhbb.exe57⤵
- Executes dropped EXE
PID:2392 -
\??\c:\1lrlrrx.exec:\1lrlrrx.exe58⤵
- Executes dropped EXE
PID:1788 -
\??\c:\8466000.exec:\8466000.exe59⤵
- Executes dropped EXE
PID:1032 -
\??\c:\08482.exec:\08482.exe60⤵
- Executes dropped EXE
PID:3476 -
\??\c:\nthttt.exec:\nthttt.exe61⤵
- Executes dropped EXE
PID:3788 -
\??\c:\nbbbnn.exec:\nbbbnn.exe62⤵
- Executes dropped EXE
PID:1952 -
\??\c:\220080.exec:\220080.exe63⤵
- Executes dropped EXE
PID:4760 -
\??\c:\a0442.exec:\a0442.exe64⤵
- Executes dropped EXE
PID:2556 -
\??\c:\3pdvv.exec:\3pdvv.exe65⤵
- Executes dropped EXE
PID:1292 -
\??\c:\020482.exec:\020482.exe66⤵PID:228
-
\??\c:\lflxrrr.exec:\lflxrrr.exe67⤵PID:2732
-
\??\c:\7lllllf.exec:\7lllllf.exe68⤵PID:3532
-
\??\c:\lxlfrrl.exec:\lxlfrrl.exe69⤵PID:2912
-
\??\c:\w66600.exec:\w66600.exe70⤵PID:1448
-
\??\c:\c886044.exec:\c886044.exe71⤵PID:2036
-
\??\c:\htbttt.exec:\htbttt.exe72⤵PID:2452
-
\??\c:\3ttnhb.exec:\3ttnhb.exe73⤵PID:4008
-
\??\c:\5pppd.exec:\5pppd.exe74⤵PID:1364
-
\??\c:\6622666.exec:\6622666.exe75⤵PID:4904
-
\??\c:\u844226.exec:\u844226.exe76⤵PID:5004
-
\??\c:\422644.exec:\422644.exe77⤵PID:3620
-
\??\c:\vjjpj.exec:\vjjpj.exe78⤵PID:1404
-
\??\c:\8260488.exec:\8260488.exe79⤵PID:3436
-
\??\c:\3bhbhb.exec:\3bhbhb.exe80⤵PID:1456
-
\??\c:\0448222.exec:\0448222.exe81⤵PID:4324
-
\??\c:\8642626.exec:\8642626.exe82⤵PID:388
-
\??\c:\pdddv.exec:\pdddv.exe83⤵PID:2364
-
\??\c:\fxllflf.exec:\fxllflf.exe84⤵PID:4876
-
\??\c:\g4460.exec:\g4460.exe85⤵PID:1508
-
\??\c:\2866044.exec:\2866044.exe86⤵PID:3000
-
\??\c:\0066600.exec:\0066600.exe87⤵PID:5060
-
\??\c:\82044.exec:\82044.exe88⤵PID:4824
-
\??\c:\vvjdv.exec:\vvjdv.exe89⤵PID:1592
-
\??\c:\5bhtnn.exec:\5bhtnn.exe90⤵PID:4368
-
\??\c:\tntttt.exec:\tntttt.exe91⤵PID:4032
-
\??\c:\88822.exec:\88822.exe92⤵PID:4928
-
\??\c:\8262600.exec:\8262600.exe93⤵PID:208
-
\??\c:\m6260.exec:\m6260.exe94⤵PID:3284
-
\??\c:\hbhbtt.exec:\hbhbtt.exe95⤵PID:4084
-
\??\c:\844826.exec:\844826.exe96⤵PID:4364
-
\??\c:\4460444.exec:\4460444.exe97⤵PID:2028
-
\??\c:\48444.exec:\48444.exe98⤵PID:2996
-
\??\c:\o282668.exec:\o282668.exe99⤵PID:1460
-
\??\c:\w02088.exec:\w02088.exe100⤵PID:1420
-
\??\c:\9lrlffx.exec:\9lrlffx.exe101⤵PID:2904
-
\??\c:\80666.exec:\80666.exe102⤵PID:3280
-
\??\c:\24048.exec:\24048.exe103⤵PID:1684
-
\??\c:\s2048.exec:\s2048.exe104⤵PID:4660
-
\??\c:\xxfxllf.exec:\xxfxllf.exe105⤵PID:4036
-
\??\c:\rlrxxxx.exec:\rlrxxxx.exe106⤵PID:3184
-
\??\c:\1bhttt.exec:\1bhttt.exe107⤵PID:3856
-
\??\c:\64048.exec:\64048.exe108⤵PID:1032
-
\??\c:\602600.exec:\602600.exe109⤵PID:3476
-
\??\c:\3djvd.exec:\3djvd.exe110⤵PID:4588
-
\??\c:\jpvpd.exec:\jpvpd.exe111⤵PID:2720
-
\??\c:\846088.exec:\846088.exe112⤵PID:3944
-
\??\c:\bttnhh.exec:\bttnhh.exe113⤵PID:4140
-
\??\c:\020004.exec:\020004.exe114⤵PID:3504
-
\??\c:\w68666.exec:\w68666.exe115⤵PID:2920
-
\??\c:\dvpvv.exec:\dvpvv.exe116⤵PID:1564
-
\??\c:\ththbt.exec:\ththbt.exe117⤵PID:3724
-
\??\c:\a0260.exec:\a0260.exe118⤵PID:4624
-
\??\c:\0064822.exec:\0064822.exe119⤵PID:3964
-
\??\c:\7bbtnh.exec:\7bbtnh.exe120⤵PID:4360
-
\??\c:\60664.exec:\60664.exe121⤵PID:2516
-
\??\c:\268844.exec:\268844.exe122⤵PID:4452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-