Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe
Resource
win7-20240903-en
General
-
Target
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe
-
Size
91KB
-
MD5
6af719a5edf29e38892683f1a4bd57f0
-
SHA1
43088ca57e32503dedc3819c04ccea38ae096628
-
SHA256
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8
-
SHA512
fa8175bd8d1e8ff76879daee88c59f5ab1fe962f31d4c729e4a7e66eda997e8993f731dd2ac28c6c9daf6d43606fd96bae6a3e2a11499c37b2f3a46368577a18
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iJvRirE0DmmdL2jqWkBc:ymb3NkkiQ3mdBjF+3TU2iBRioSumWS1a
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 29 IoCs
Processes:
resource yara_rule behavioral2/memory/2152-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1748-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4728-43-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2776-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5072-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2876-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4728-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1116-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1116-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2988-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3108-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3724-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5008-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2644-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/456-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1912-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3596-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1204-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3180-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2620-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1388-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/228-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
40826.exe802266.exe8246060.exee80444.exepppjd.exedjjdv.exehbhhnb.exe2468660.exes8204.exe0466228.exe6662282.exe1xxrlll.exe5tnhht.exefrfffff.exec028282.exe00662.exehnnhbt.exenbhtnn.exejpppp.exevjjdd.exe9jpjj.exe622826.exe08040.exe4466406.exerlrllxx.exebbbbhh.exe6400424.exepjpjp.exetttbbb.exe606000.exedppjj.exepvddp.exebhhbnt.exeo066666.exe4448822.exe1hbtnt.exe9vdvp.exe2048248.exenhbttt.exerlrrxxf.exe0806666.exe48228.exe48882.exe84662.exedpvjj.exepjvpd.exe606444.exe2248882.exei200060.exetbtttn.exerrrxlrr.exe848086.exeppvvv.exelrrrlrl.exe5thnbn.exe6406668.exepddjj.exeppdvv.exexlxrllf.exeffllxxx.exe6808820.exe8426048.exejdvpj.exe244646.exepid process 1748 40826.exe 4504 802266.exe 4736 8246060.exe 2556 e80444.exe 4728 pppjd.exe 2876 djjdv.exe 5072 hbhhnb.exe 2776 2468660.exe 1116 s8204.exe 2988 0466228.exe 3108 6662282.exe 3724 1xxrlll.exe 5008 5tnhht.exe 2644 frfffff.exe 456 c028282.exe 4796 00662.exe 1912 hnnhbt.exe 3596 nbhtnn.exe 4040 jpppp.exe 1204 vjjdd.exe 464 9jpjj.exe 3180 622826.exe 3148 08040.exe 4696 4466406.exe 2620 rlrllxx.exe 1388 bbbbhh.exe 1672 6400424.exe 756 pjpjp.exe 2052 tttbbb.exe 2420 606000.exe 228 dppjj.exe 4080 pvddp.exe 3248 bhhbnt.exe 3376 o066666.exe 1244 4448822.exe 2256 1hbtnt.exe 1656 9vdvp.exe 4524 2048248.exe 3092 nhbttt.exe 4864 rlrrxxf.exe 1296 0806666.exe 2140 48228.exe 1540 48882.exe 3024 84662.exe 4612 dpvjj.exe 4228 pjvpd.exe 4408 606444.exe 3948 2248882.exe 1824 i200060.exe 5016 tbtttn.exe 3820 rrrxlrr.exe 4508 848086.exe 4504 ppvvv.exe 708 lrrrlrl.exe 1812 5thnbn.exe 3944 6406668.exe 1580 pddjj.exe 4572 ppdvv.exe 2192 xlxrllf.exe 1084 ffllxxx.exe 4948 6808820.exe 4016 8426048.exe 3348 jdvpj.exe 1096 244646.exe -
Processes:
resource yara_rule behavioral2/memory/2152-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1748-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5072-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2876-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4728-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2988-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3108-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3724-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5008-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2644-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1912-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3596-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1204-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3180-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2620-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a6844.exe8288822.exedjdvj.exe6204226.exepdvjd.exe8886840.exee08266.exe2448882.exennhbhh.exe4444888.exe600422.exepjvpd.exe1pdvp.exe4404444.exeo244826.exefllrxll.exe08040.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8288822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6204226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8886840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e08266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2448882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4444888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 600422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4404444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o244826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08040.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe40826.exe802266.exe8246060.exee80444.exepppjd.exedjjdv.exehbhhnb.exe2468660.exes8204.exe0466228.exe6662282.exe1xxrlll.exe5tnhht.exefrfffff.exec028282.exe00662.exehnnhbt.exenbhtnn.exejpppp.exevjjdd.exe9jpjj.exedescription pid process target process PID 2152 wrote to memory of 1748 2152 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe 40826.exe PID 2152 wrote to memory of 1748 2152 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe 40826.exe PID 2152 wrote to memory of 1748 2152 091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe 40826.exe PID 1748 wrote to memory of 4504 1748 40826.exe 802266.exe PID 1748 wrote to memory of 4504 1748 40826.exe 802266.exe PID 1748 wrote to memory of 4504 1748 40826.exe 802266.exe PID 4504 wrote to memory of 4736 4504 802266.exe 8246060.exe PID 4504 wrote to memory of 4736 4504 802266.exe 8246060.exe PID 4504 wrote to memory of 4736 4504 802266.exe 8246060.exe PID 4736 wrote to memory of 2556 4736 8246060.exe e80444.exe PID 4736 wrote to memory of 2556 4736 8246060.exe e80444.exe PID 4736 wrote to memory of 2556 4736 8246060.exe e80444.exe PID 2556 wrote to memory of 4728 2556 e80444.exe pppjd.exe PID 2556 wrote to memory of 4728 2556 e80444.exe pppjd.exe PID 2556 wrote to memory of 4728 2556 e80444.exe pppjd.exe PID 4728 wrote to memory of 2876 4728 pppjd.exe djjdv.exe PID 4728 wrote to memory of 2876 4728 pppjd.exe djjdv.exe PID 4728 wrote to memory of 2876 4728 pppjd.exe djjdv.exe PID 2876 wrote to memory of 5072 2876 djjdv.exe hbhhnb.exe PID 2876 wrote to memory of 5072 2876 djjdv.exe hbhhnb.exe PID 2876 wrote to memory of 5072 2876 djjdv.exe hbhhnb.exe PID 5072 wrote to memory of 2776 5072 hbhhnb.exe 2468660.exe PID 5072 wrote to memory of 2776 5072 hbhhnb.exe 2468660.exe PID 5072 wrote to memory of 2776 5072 hbhhnb.exe 2468660.exe PID 2776 wrote to memory of 1116 2776 2468660.exe s8204.exe PID 2776 wrote to memory of 1116 2776 2468660.exe s8204.exe PID 2776 wrote to memory of 1116 2776 2468660.exe s8204.exe PID 1116 wrote to memory of 2988 1116 s8204.exe 0466228.exe PID 1116 wrote to memory of 2988 1116 s8204.exe 0466228.exe PID 1116 wrote to memory of 2988 1116 s8204.exe 0466228.exe PID 2988 wrote to memory of 3108 2988 0466228.exe 6662282.exe PID 2988 wrote to memory of 3108 2988 0466228.exe 6662282.exe PID 2988 wrote to memory of 3108 2988 0466228.exe 6662282.exe PID 3108 wrote to memory of 3724 3108 6662282.exe 1xxrlll.exe PID 3108 wrote to memory of 3724 3108 6662282.exe 1xxrlll.exe PID 3108 wrote to memory of 3724 3108 6662282.exe 1xxrlll.exe PID 3724 wrote to memory of 5008 3724 1xxrlll.exe 5tnhht.exe PID 3724 wrote to memory of 5008 3724 1xxrlll.exe 5tnhht.exe PID 3724 wrote to memory of 5008 3724 1xxrlll.exe 5tnhht.exe PID 5008 wrote to memory of 2644 5008 5tnhht.exe frfffff.exe PID 5008 wrote to memory of 2644 5008 5tnhht.exe frfffff.exe PID 5008 wrote to memory of 2644 5008 5tnhht.exe frfffff.exe PID 2644 wrote to memory of 456 2644 frfffff.exe c028282.exe PID 2644 wrote to memory of 456 2644 frfffff.exe c028282.exe PID 2644 wrote to memory of 456 2644 frfffff.exe c028282.exe PID 456 wrote to memory of 4796 456 c028282.exe 00662.exe PID 456 wrote to memory of 4796 456 c028282.exe 00662.exe PID 456 wrote to memory of 4796 456 c028282.exe 00662.exe PID 4796 wrote to memory of 1912 4796 00662.exe hnnhbt.exe PID 4796 wrote to memory of 1912 4796 00662.exe hnnhbt.exe PID 4796 wrote to memory of 1912 4796 00662.exe hnnhbt.exe PID 1912 wrote to memory of 3596 1912 hnnhbt.exe nbhtnn.exe PID 1912 wrote to memory of 3596 1912 hnnhbt.exe nbhtnn.exe PID 1912 wrote to memory of 3596 1912 hnnhbt.exe nbhtnn.exe PID 3596 wrote to memory of 4040 3596 nbhtnn.exe jpppp.exe PID 3596 wrote to memory of 4040 3596 nbhtnn.exe jpppp.exe PID 3596 wrote to memory of 4040 3596 nbhtnn.exe jpppp.exe PID 4040 wrote to memory of 1204 4040 jpppp.exe vjjdd.exe PID 4040 wrote to memory of 1204 4040 jpppp.exe vjjdd.exe PID 4040 wrote to memory of 1204 4040 jpppp.exe vjjdd.exe PID 1204 wrote to memory of 464 1204 vjjdd.exe 9jpjj.exe PID 1204 wrote to memory of 464 1204 vjjdd.exe 9jpjj.exe PID 1204 wrote to memory of 464 1204 vjjdd.exe 9jpjj.exe PID 464 wrote to memory of 3180 464 9jpjj.exe 622826.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe"C:\Users\Admin\AppData\Local\Temp\091f39c2ac1698aac61599ca09d852ad8a8df5c5f7d9ac574d1fa76f830d5cc8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\40826.exec:\40826.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\802266.exec:\802266.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\8246060.exec:\8246060.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\e80444.exec:\e80444.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\pppjd.exec:\pppjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
\??\c:\djjdv.exec:\djjdv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\hbhhnb.exec:\hbhhnb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\2468660.exec:\2468660.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\s8204.exec:\s8204.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\0466228.exec:\0466228.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\6662282.exec:\6662282.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
\??\c:\1xxrlll.exec:\1xxrlll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\5tnhht.exec:\5tnhht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\frfffff.exec:\frfffff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\c028282.exec:\c028282.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\00662.exec:\00662.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\hnnhbt.exec:\hnnhbt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\nbhtnn.exec:\nbhtnn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\jpppp.exec:\jpppp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
\??\c:\vjjdd.exec:\vjjdd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\9jpjj.exec:\9jpjj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\622826.exec:\622826.exe23⤵
- Executes dropped EXE
PID:3180 -
\??\c:\08040.exec:\08040.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148 -
\??\c:\4466406.exec:\4466406.exe25⤵
- Executes dropped EXE
PID:4696 -
\??\c:\rlrllxx.exec:\rlrllxx.exe26⤵
- Executes dropped EXE
PID:2620 -
\??\c:\bbbbhh.exec:\bbbbhh.exe27⤵
- Executes dropped EXE
PID:1388 -
\??\c:\6400424.exec:\6400424.exe28⤵
- Executes dropped EXE
PID:1672 -
\??\c:\pjpjp.exec:\pjpjp.exe29⤵
- Executes dropped EXE
PID:756 -
\??\c:\tttbbb.exec:\tttbbb.exe30⤵
- Executes dropped EXE
PID:2052 -
\??\c:\606000.exec:\606000.exe31⤵
- Executes dropped EXE
PID:2420 -
\??\c:\dppjj.exec:\dppjj.exe32⤵
- Executes dropped EXE
PID:228 -
\??\c:\pvddp.exec:\pvddp.exe33⤵
- Executes dropped EXE
PID:4080 -
\??\c:\bhhbnt.exec:\bhhbnt.exe34⤵
- Executes dropped EXE
PID:3248 -
\??\c:\o066666.exec:\o066666.exe35⤵
- Executes dropped EXE
PID:3376 -
\??\c:\4448822.exec:\4448822.exe36⤵
- Executes dropped EXE
PID:1244 -
\??\c:\1hbtnt.exec:\1hbtnt.exe37⤵
- Executes dropped EXE
PID:2256 -
\??\c:\9vdvp.exec:\9vdvp.exe38⤵
- Executes dropped EXE
PID:1656 -
\??\c:\2048248.exec:\2048248.exe39⤵
- Executes dropped EXE
PID:4524 -
\??\c:\nhbttt.exec:\nhbttt.exe40⤵
- Executes dropped EXE
PID:3092 -
\??\c:\rlrrxxf.exec:\rlrrxxf.exe41⤵
- Executes dropped EXE
PID:4864 -
\??\c:\0806666.exec:\0806666.exe42⤵
- Executes dropped EXE
PID:1296 -
\??\c:\48228.exec:\48228.exe43⤵
- Executes dropped EXE
PID:2140 -
\??\c:\48882.exec:\48882.exe44⤵
- Executes dropped EXE
PID:1540 -
\??\c:\84662.exec:\84662.exe45⤵
- Executes dropped EXE
PID:3024 -
\??\c:\dpvjj.exec:\dpvjj.exe46⤵
- Executes dropped EXE
PID:4612 -
\??\c:\pjvpd.exec:\pjvpd.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4228 -
\??\c:\606444.exec:\606444.exe48⤵
- Executes dropped EXE
PID:4408 -
\??\c:\2248882.exec:\2248882.exe49⤵
- Executes dropped EXE
PID:3948 -
\??\c:\i200060.exec:\i200060.exe50⤵
- Executes dropped EXE
PID:1824 -
\??\c:\tbtttn.exec:\tbtttn.exe51⤵
- Executes dropped EXE
PID:5016 -
\??\c:\rrrxlrr.exec:\rrrxlrr.exe52⤵
- Executes dropped EXE
PID:3820 -
\??\c:\848086.exec:\848086.exe53⤵
- Executes dropped EXE
PID:4508 -
\??\c:\ppvvv.exec:\ppvvv.exe54⤵
- Executes dropped EXE
PID:4504 -
\??\c:\lrrrlrl.exec:\lrrrlrl.exe55⤵
- Executes dropped EXE
PID:708 -
\??\c:\5thnbn.exec:\5thnbn.exe56⤵
- Executes dropped EXE
PID:1812 -
\??\c:\6406668.exec:\6406668.exe57⤵
- Executes dropped EXE
PID:3944 -
\??\c:\pddjj.exec:\pddjj.exe58⤵
- Executes dropped EXE
PID:1580 -
\??\c:\ppdvv.exec:\ppdvv.exe59⤵
- Executes dropped EXE
PID:4572 -
\??\c:\xlxrllf.exec:\xlxrllf.exe60⤵
- Executes dropped EXE
PID:2192 -
\??\c:\ffllxxx.exec:\ffllxxx.exe61⤵
- Executes dropped EXE
PID:1084 -
\??\c:\6808820.exec:\6808820.exe62⤵
- Executes dropped EXE
PID:4948 -
\??\c:\8426048.exec:\8426048.exe63⤵
- Executes dropped EXE
PID:4016 -
\??\c:\jdvpj.exec:\jdvpj.exe64⤵
- Executes dropped EXE
PID:3348 -
\??\c:\244646.exec:\244646.exe65⤵
- Executes dropped EXE
PID:1096 -
\??\c:\ntbnth.exec:\ntbnth.exe66⤵PID:3924
-
\??\c:\vpddp.exec:\vpddp.exe67⤵PID:1996
-
\??\c:\s8442.exec:\s8442.exe68⤵PID:5000
-
\??\c:\40266.exec:\40266.exe69⤵PID:2016
-
\??\c:\bthtnn.exec:\bthtnn.exe70⤵PID:1056
-
\??\c:\hnbbtt.exec:\hnbbtt.exe71⤵PID:2736
-
\??\c:\608848.exec:\608848.exe72⤵PID:2268
-
\??\c:\8282222.exec:\8282222.exe73⤵PID:1848
-
\??\c:\7vddv.exec:\7vddv.exe74⤵PID:3520
-
\??\c:\thbtbt.exec:\thbtbt.exe75⤵PID:3920
-
\??\c:\u688400.exec:\u688400.exe76⤵PID:8
-
\??\c:\w00482.exec:\w00482.exe77⤵PID:3560
-
\??\c:\lxfflxl.exec:\lxfflxl.exe78⤵PID:4292
-
\??\c:\bhhhbh.exec:\bhhhbh.exe79⤵PID:2332
-
\??\c:\8624688.exec:\8624688.exe80⤵PID:3396
-
\??\c:\8602402.exec:\8602402.exe81⤵PID:3192
-
\??\c:\bhhhhh.exec:\bhhhhh.exe82⤵PID:1760
-
\??\c:\vddvp.exec:\vddvp.exe83⤵PID:4604
-
\??\c:\htbntt.exec:\htbntt.exe84⤵PID:4500
-
\??\c:\xfxlfxx.exec:\xfxlfxx.exe85⤵PID:3544
-
\??\c:\84004.exec:\84004.exe86⤵PID:1992
-
\??\c:\04004.exec:\04004.exe87⤵PID:3996
-
\??\c:\466606.exec:\466606.exe88⤵PID:1348
-
\??\c:\rrrlffl.exec:\rrrlffl.exe89⤵PID:2348
-
\??\c:\c822622.exec:\c822622.exe90⤵PID:1076
-
\??\c:\xrxrrrx.exec:\xrxrrrx.exe91⤵PID:932
-
\??\c:\bhtthb.exec:\bhtthb.exe92⤵PID:4904
-
\??\c:\g2488.exec:\g2488.exe93⤵PID:3132
-
\??\c:\3rxrlff.exec:\3rxrlff.exe94⤵PID:3164
-
\??\c:\04448.exec:\04448.exe95⤵PID:1396
-
\??\c:\3ntnhb.exec:\3ntnhb.exe96⤵PID:1244
-
\??\c:\a4622.exec:\a4622.exe97⤵PID:3328
-
\??\c:\u200668.exec:\u200668.exe98⤵PID:4788
-
\??\c:\vvvvj.exec:\vvvvj.exe99⤵PID:4684
-
\??\c:\4422600.exec:\4422600.exe100⤵PID:4880
-
\??\c:\240882.exec:\240882.exe101⤵PID:3860
-
\??\c:\42880.exec:\42880.exe102⤵PID:3976
-
\??\c:\dpvjd.exec:\dpvjd.exe103⤵PID:1948
-
\??\c:\048044.exec:\048044.exe104⤵PID:4964
-
\??\c:\rfllxxf.exec:\rfllxxf.exe105⤵PID:4448
-
\??\c:\04086.exec:\04086.exe106⤵PID:380
-
\??\c:\bhnhbt.exec:\bhnhbt.exe107⤵PID:560
-
\??\c:\pjdjj.exec:\pjdjj.exe108⤵PID:5016
-
\??\c:\6082682.exec:\6082682.exe109⤵PID:2272
-
\??\c:\jdjvd.exec:\jdjvd.exe110⤵PID:1112
-
\??\c:\vjppj.exec:\vjppj.exe111⤵PID:2844
-
\??\c:\284422.exec:\284422.exe112⤵PID:1812
-
\??\c:\82226.exec:\82226.exe113⤵PID:5028
-
\??\c:\42826.exec:\42826.exe114⤵PID:888
-
\??\c:\q62266.exec:\q62266.exe115⤵PID:2884
-
\??\c:\8800444.exec:\8800444.exe116⤵PID:4568
-
\??\c:\nbbbtt.exec:\nbbbtt.exe117⤵PID:964
-
\??\c:\44880.exec:\44880.exe118⤵PID:1460
-
\??\c:\02886.exec:\02886.exe119⤵PID:3348
-
\??\c:\lxxrrrr.exec:\lxxrrrr.exe120⤵PID:1096
-
\??\c:\082844.exec:\082844.exe121⤵PID:2184
-
\??\c:\1pdvp.exec:\1pdvp.exe122⤵
- System Location Discovery: System Language Discovery
PID:3724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-