Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe
Resource
win7-20241010-en
General
-
Target
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe
-
Size
89KB
-
MD5
f891b4e0104d419684830cfb7653df6e
-
SHA1
0558b2f23024e30754c82a8ea2450a9a923f5ba8
-
SHA256
f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995
-
SHA512
8499aef9637c0e483905a2d61e7e66f9a10d56a400d2292159bfd921b786fb16bc7bd8618eb20e809612ae303b4fbbf09781ae576a6fe827d6f712b14288ae50
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAXPfgr2hKmdbcPi2vhdW/:ymb3NkkiQ3mdBjFo6Pfgy3dbc/hdW/
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/3612-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4188-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1528-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2552-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3652-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1060-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2608-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1276-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/572-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1720-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3480-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/100-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1536-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1236-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/780-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1192-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1100-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4712-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/224-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4188 4884842.exe 1528 06260.exe 2552 hbhhtt.exe 4540 hbhtnn.exe 1796 rlfxxrr.exe 3652 jvjdp.exe 1060 1pvdd.exe 3964 fxrllll.exe 2608 68488.exe 4424 rllfxxx.exe 2244 jvpjv.exe 1276 60482.exe 572 hbbnbt.exe 1720 868082.exe 3480 084048.exe 5040 264888.exe 100 pjdvp.exe 4860 pvjdv.exe 3624 fxfrxrx.exe 1536 5dpjv.exe 1236 2048042.exe 780 q06426.exe 1192 pdjjv.exe 1100 fffrfxl.exe 2676 dpppj.exe 3668 8020060.exe 4712 fxrxxff.exe 4920 0466228.exe 2524 22888.exe 224 hbbbtn.exe 4036 tbbnht.exe 1772 bnnbnh.exe 1404 20648.exe 112 0048208.exe 4216 06862.exe 1900 2042206.exe 3660 rfxrrrr.exe 3096 22820.exe 1656 86204.exe 3408 djpjd.exe 3808 fffrxrf.exe 1116 pddpj.exe 1872 frlxllx.exe 3960 xrfxllx.exe 4444 ppjvj.exe 4292 448204.exe 1644 0460488.exe 3860 vvddp.exe 1828 4024400.exe 4804 204860.exe 5112 w64800.exe 4968 884204.exe 3156 9bhbhh.exe 4736 42608.exe 4056 406026.exe 1592 06608.exe 3652 bthtbn.exe 5048 rlfrfxr.exe 4168 tttnhb.exe 1132 w48204.exe 2608 42042.exe 2092 s8864.exe 4336 206460.exe 4928 pvpdp.exe -
resource yara_rule behavioral2/memory/3612-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3612-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4188-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3652-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2608-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1276-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/572-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1720-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/100-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1536-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1236-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/780-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1100-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4712-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/224-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 088204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4024400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 444444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2226482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlffrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnthtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bnhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4188 3612 f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe 83 PID 3612 wrote to memory of 4188 3612 f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe 83 PID 3612 wrote to memory of 4188 3612 f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe 83 PID 4188 wrote to memory of 1528 4188 4884842.exe 84 PID 4188 wrote to memory of 1528 4188 4884842.exe 84 PID 4188 wrote to memory of 1528 4188 4884842.exe 84 PID 1528 wrote to memory of 2552 1528 06260.exe 85 PID 1528 wrote to memory of 2552 1528 06260.exe 85 PID 1528 wrote to memory of 2552 1528 06260.exe 85 PID 2552 wrote to memory of 4540 2552 hbhhtt.exe 86 PID 2552 wrote to memory of 4540 2552 hbhhtt.exe 86 PID 2552 wrote to memory of 4540 2552 hbhhtt.exe 86 PID 4540 wrote to memory of 1796 4540 hbhtnn.exe 87 PID 4540 wrote to memory of 1796 4540 hbhtnn.exe 87 PID 4540 wrote to memory of 1796 4540 hbhtnn.exe 87 PID 1796 wrote to memory of 3652 1796 rlfxxrr.exe 88 PID 1796 wrote to memory of 3652 1796 rlfxxrr.exe 88 PID 1796 wrote to memory of 3652 1796 rlfxxrr.exe 88 PID 3652 wrote to memory of 1060 3652 jvjdp.exe 89 PID 3652 wrote to memory of 1060 3652 jvjdp.exe 89 PID 3652 wrote to memory of 1060 3652 jvjdp.exe 89 PID 1060 wrote to memory of 3964 1060 1pvdd.exe 90 PID 1060 wrote to memory of 3964 1060 1pvdd.exe 90 PID 1060 wrote to memory of 3964 1060 1pvdd.exe 90 PID 3964 wrote to memory of 2608 3964 fxrllll.exe 91 PID 3964 wrote to memory of 2608 3964 fxrllll.exe 91 PID 3964 wrote to memory of 2608 3964 fxrllll.exe 91 PID 2608 wrote to memory of 4424 2608 68488.exe 92 PID 2608 wrote to memory of 4424 2608 68488.exe 92 PID 2608 wrote to memory of 4424 2608 68488.exe 92 PID 4424 wrote to memory of 2244 4424 rllfxxx.exe 93 PID 4424 wrote to memory of 2244 4424 rllfxxx.exe 93 PID 4424 wrote to memory of 2244 4424 rllfxxx.exe 93 PID 2244 wrote to memory of 1276 2244 jvpjv.exe 94 PID 2244 wrote to memory of 1276 2244 jvpjv.exe 94 PID 2244 wrote to memory of 1276 2244 jvpjv.exe 94 PID 1276 wrote to memory of 572 1276 60482.exe 95 PID 1276 wrote to memory of 572 1276 60482.exe 95 PID 1276 wrote to memory of 572 1276 60482.exe 95 PID 572 wrote to memory of 1720 572 hbbnbt.exe 96 PID 572 wrote to memory of 1720 572 hbbnbt.exe 96 PID 572 wrote to memory of 1720 572 hbbnbt.exe 96 PID 1720 wrote to memory of 3480 1720 868082.exe 97 PID 1720 wrote to memory of 3480 1720 868082.exe 97 PID 1720 wrote to memory of 3480 1720 868082.exe 97 PID 3480 wrote to memory of 5040 3480 084048.exe 98 PID 3480 wrote to memory of 5040 3480 084048.exe 98 PID 3480 wrote to memory of 5040 3480 084048.exe 98 PID 5040 wrote to memory of 100 5040 264888.exe 99 PID 5040 wrote to memory of 100 5040 264888.exe 99 PID 5040 wrote to memory of 100 5040 264888.exe 99 PID 100 wrote to memory of 4860 100 pjdvp.exe 100 PID 100 wrote to memory of 4860 100 pjdvp.exe 100 PID 100 wrote to memory of 4860 100 pjdvp.exe 100 PID 4860 wrote to memory of 3624 4860 pvjdv.exe 101 PID 4860 wrote to memory of 3624 4860 pvjdv.exe 101 PID 4860 wrote to memory of 3624 4860 pvjdv.exe 101 PID 3624 wrote to memory of 1536 3624 fxfrxrx.exe 102 PID 3624 wrote to memory of 1536 3624 fxfrxrx.exe 102 PID 3624 wrote to memory of 1536 3624 fxfrxrx.exe 102 PID 1536 wrote to memory of 1236 1536 5dpjv.exe 103 PID 1536 wrote to memory of 1236 1536 5dpjv.exe 103 PID 1536 wrote to memory of 1236 1536 5dpjv.exe 103 PID 1236 wrote to memory of 780 1236 2048042.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe"C:\Users\Admin\AppData\Local\Temp\f63c1573e9607c6635c9adfbcb79d4918e1fe502946222de8d06c59b1fb4a995.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
\??\c:\4884842.exec:\4884842.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
\??\c:\06260.exec:\06260.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\hbhhtt.exec:\hbhhtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\hbhtnn.exec:\hbhtnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\rlfxxrr.exec:\rlfxxrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\jvjdp.exec:\jvjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\1pvdd.exec:\1pvdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
\??\c:\fxrllll.exec:\fxrllll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\68488.exec:\68488.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\rllfxxx.exec:\rllfxxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\jvpjv.exec:\jvpjv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\60482.exec:\60482.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\hbbnbt.exec:\hbbnbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\868082.exec:\868082.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\084048.exec:\084048.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\264888.exec:\264888.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\pjdvp.exec:\pjdvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
\??\c:\pvjdv.exec:\pvjdv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\fxfrxrx.exec:\fxfrxrx.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\5dpjv.exec:\5dpjv.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\2048042.exec:\2048042.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\q06426.exec:\q06426.exe23⤵
- Executes dropped EXE
PID:780 -
\??\c:\pdjjv.exec:\pdjjv.exe24⤵
- Executes dropped EXE
PID:1192 -
\??\c:\fffrfxl.exec:\fffrfxl.exe25⤵
- Executes dropped EXE
PID:1100 -
\??\c:\dpppj.exec:\dpppj.exe26⤵
- Executes dropped EXE
PID:2676 -
\??\c:\8020060.exec:\8020060.exe27⤵
- Executes dropped EXE
PID:3668 -
\??\c:\fxrxxff.exec:\fxrxxff.exe28⤵
- Executes dropped EXE
PID:4712 -
\??\c:\0466228.exec:\0466228.exe29⤵
- Executes dropped EXE
PID:4920 -
\??\c:\22888.exec:\22888.exe30⤵
- Executes dropped EXE
PID:2524 -
\??\c:\hbbbtn.exec:\hbbbtn.exe31⤵
- Executes dropped EXE
PID:224 -
\??\c:\tbbnht.exec:\tbbnht.exe32⤵
- Executes dropped EXE
PID:4036 -
\??\c:\bnnbnh.exec:\bnnbnh.exe33⤵
- Executes dropped EXE
PID:1772 -
\??\c:\20648.exec:\20648.exe34⤵
- Executes dropped EXE
PID:1404 -
\??\c:\0048208.exec:\0048208.exe35⤵
- Executes dropped EXE
PID:112 -
\??\c:\06862.exec:\06862.exe36⤵
- Executes dropped EXE
PID:4216 -
\??\c:\2042206.exec:\2042206.exe37⤵
- Executes dropped EXE
PID:1900 -
\??\c:\rfxrrrr.exec:\rfxrrrr.exe38⤵
- Executes dropped EXE
PID:3660 -
\??\c:\22820.exec:\22820.exe39⤵
- Executes dropped EXE
PID:3096 -
\??\c:\86204.exec:\86204.exe40⤵
- Executes dropped EXE
PID:1656 -
\??\c:\djpjd.exec:\djpjd.exe41⤵
- Executes dropped EXE
PID:3408 -
\??\c:\fffrxrf.exec:\fffrxrf.exe42⤵
- Executes dropped EXE
PID:3808 -
\??\c:\pddpj.exec:\pddpj.exe43⤵
- Executes dropped EXE
PID:1116 -
\??\c:\frlxllx.exec:\frlxllx.exe44⤵
- Executes dropped EXE
PID:1872 -
\??\c:\xrfxllx.exec:\xrfxllx.exe45⤵
- Executes dropped EXE
PID:3960 -
\??\c:\ppjvj.exec:\ppjvj.exe46⤵
- Executes dropped EXE
PID:4444 -
\??\c:\448204.exec:\448204.exe47⤵
- Executes dropped EXE
PID:4292 -
\??\c:\0460488.exec:\0460488.exe48⤵
- Executes dropped EXE
PID:1644 -
\??\c:\vvddp.exec:\vvddp.exe49⤵
- Executes dropped EXE
PID:3860 -
\??\c:\4024400.exec:\4024400.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1828 -
\??\c:\204860.exec:\204860.exe51⤵
- Executes dropped EXE
PID:4804 -
\??\c:\w64800.exec:\w64800.exe52⤵
- Executes dropped EXE
PID:5112 -
\??\c:\884204.exec:\884204.exe53⤵
- Executes dropped EXE
PID:4968 -
\??\c:\9bhbhh.exec:\9bhbhh.exe54⤵
- Executes dropped EXE
PID:3156 -
\??\c:\42608.exec:\42608.exe55⤵
- Executes dropped EXE
PID:4736 -
\??\c:\406026.exec:\406026.exe56⤵
- Executes dropped EXE
PID:4056 -
\??\c:\06608.exec:\06608.exe57⤵
- Executes dropped EXE
PID:1592 -
\??\c:\bthtbn.exec:\bthtbn.exe58⤵
- Executes dropped EXE
PID:3652 -
\??\c:\rlfrfxr.exec:\rlfrfxr.exe59⤵
- Executes dropped EXE
PID:5048 -
\??\c:\tttnhb.exec:\tttnhb.exe60⤵
- Executes dropped EXE
PID:4168 -
\??\c:\w48204.exec:\w48204.exe61⤵
- Executes dropped EXE
PID:1132 -
\??\c:\42042.exec:\42042.exe62⤵
- Executes dropped EXE
PID:2608 -
\??\c:\s8864.exec:\s8864.exe63⤵
- Executes dropped EXE
PID:2092 -
\??\c:\206460.exec:\206460.exe64⤵
- Executes dropped EXE
PID:4336 -
\??\c:\pvpdp.exec:\pvpdp.exe65⤵
- Executes dropped EXE
PID:4928 -
\??\c:\22864.exec:\22864.exe66⤵PID:2504
-
\??\c:\426022.exec:\426022.exe67⤵PID:4456
-
\??\c:\pppjd.exec:\pppjd.exe68⤵PID:4796
-
\??\c:\lxxlffx.exec:\lxxlffx.exe69⤵PID:4576
-
\??\c:\04262.exec:\04262.exe70⤵PID:412
-
\??\c:\a4082.exec:\a4082.exe71⤵PID:2356
-
\??\c:\xxfxlfx.exec:\xxfxlfx.exe72⤵PID:4976
-
\??\c:\082866.exec:\082866.exe73⤵PID:2728
-
\??\c:\nbbnbt.exec:\nbbnbt.exe74⤵PID:4860
-
\??\c:\jdvpj.exec:\jdvpj.exe75⤵PID:3624
-
\??\c:\3hhttn.exec:\3hhttn.exe76⤵PID:3980
-
\??\c:\s4420.exec:\s4420.exe77⤵PID:3908
-
\??\c:\jvpjp.exec:\jvpjp.exe78⤵PID:844
-
\??\c:\8882626.exec:\8882626.exe79⤵PID:2108
-
\??\c:\htnhtn.exec:\htnhtn.exe80⤵PID:1100
-
\??\c:\262604.exec:\262604.exe81⤵PID:4500
-
\??\c:\646082.exec:\646082.exe82⤵PID:4676
-
\??\c:\0882688.exec:\0882688.exe83⤵PID:4744
-
\??\c:\2020404.exec:\2020404.exe84⤵PID:4784
-
\??\c:\w28488.exec:\w28488.exe85⤵PID:948
-
\??\c:\7lxrffx.exec:\7lxrffx.exe86⤵PID:2216
-
\??\c:\dppjd.exec:\dppjd.exe87⤵PID:628
-
\??\c:\fxlxxxx.exec:\fxlxxxx.exe88⤵PID:3548
-
\??\c:\rrxxxxf.exec:\rrxxxxf.exe89⤵PID:2948
-
\??\c:\28886.exec:\28886.exe90⤵PID:1244
-
\??\c:\nbnnhb.exec:\nbnnhb.exe91⤵PID:4840
-
\??\c:\4686660.exec:\4686660.exe92⤵PID:3224
-
\??\c:\a4482.exec:\a4482.exe93⤵PID:3064
-
\??\c:\668620.exec:\668620.exe94⤵PID:2756
-
\??\c:\nhnhtt.exec:\nhnhtt.exe95⤵PID:5068
-
\??\c:\u406486.exec:\u406486.exe96⤵PID:3616
-
\??\c:\jvvpd.exec:\jvvpd.exe97⤵PID:816
-
\??\c:\9tthtn.exec:\9tthtn.exe98⤵PID:2844
-
\??\c:\bbhbtb.exec:\bbhbtb.exe99⤵PID:3488
-
\??\c:\rlrxlff.exec:\rlrxlff.exe100⤵PID:4428
-
\??\c:\5jdpd.exec:\5jdpd.exe101⤵PID:1212
-
\??\c:\nbthbh.exec:\nbthbh.exe102⤵PID:768
-
\??\c:\htbbbt.exec:\htbbbt.exe103⤵PID:3860
-
\??\c:\8848822.exec:\8848822.exe104⤵PID:4364
-
\??\c:\httnnh.exec:\httnnh.exe105⤵PID:1448
-
\??\c:\1hthtn.exec:\1hthtn.exe106⤵PID:3340
-
\??\c:\022604.exec:\022604.exe107⤵PID:4736
-
\??\c:\86608.exec:\86608.exe108⤵PID:1592
-
\??\c:\440862.exec:\440862.exe109⤵PID:3652
-
\??\c:\vpdpp.exec:\vpdpp.exe110⤵PID:4332
-
\??\c:\62420.exec:\62420.exe111⤵PID:4884
-
\??\c:\e84804.exec:\e84804.exe112⤵PID:4320
-
\??\c:\40048.exec:\40048.exe113⤵PID:1472
-
\??\c:\866862.exec:\866862.exe114⤵PID:1756
-
\??\c:\vddpv.exec:\vddpv.exe115⤵PID:4928
-
\??\c:\806204.exec:\806204.exe116⤵PID:2504
-
\??\c:\40086.exec:\40086.exe117⤵PID:4456
-
\??\c:\4226486.exec:\4226486.exe118⤵PID:1720
-
\??\c:\tnnhbt.exec:\tnnhbt.exe119⤵PID:3480
-
\??\c:\0400404.exec:\0400404.exe120⤵PID:1380
-
\??\c:\htbthb.exec:\htbthb.exe121⤵PID:100
-
\??\c:\i204260.exec:\i204260.exe122⤵PID:2064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-