Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 07:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe
-
Size
72KB
-
MD5
c87b1e04cf065062e516255230eae513
-
SHA1
49b5ba4738560e18eee190d6f3bd3fdf9b7b6114
-
SHA256
7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5
-
SHA512
e32a94c83208f03c857d2a4898d190f974d2c068df14863dc738207d4587676f36165cbd0f29d6b2abd0ef10ff480f74ff0a937414d17faf35bf99fed24eaa34
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdJUDbAIdiW65k:ymb3NkkiQ3mdBjFIFdJ8bViW62
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/1760-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1760-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4932-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4880-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1880-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1272-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1388-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2288-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2444-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/876-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2772-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5012-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1452-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3504-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/868-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2516-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2184-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2852-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2664-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4324-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4928 9bhtnt.exe 4932 lrfrrrr.exe 4880 tnhhhh.exe 1880 pjvdv.exe 3616 k02600.exe 1272 rrfxxff.exe 2028 tntbbh.exe 1388 jjppe.exe 2288 8682026.exe 2444 08028.exe 876 228840.exe 2772 088020.exe 5012 6688822.exe 1968 w28888.exe 1452 646828.exe 3504 lllffxl.exe 1164 hhnttt.exe 4228 xrlffff.exe 868 882222.exe 2036 04262.exe 3368 rrflxll.exe 2516 48008.exe 4264 llxxffr.exe 4904 nnnnhn.exe 2184 g8882.exe 4768 3bbtnh.exe 2340 680208.exe 2952 20226.exe 2852 a4022.exe 2664 dppjd.exe 4324 c004888.exe 2320 tbnntt.exe 3228 20224.exe 4428 xlrrllf.exe 2360 e46004.exe 972 84840.exe 4200 nhhhbb.exe 708 242486.exe 4800 0422480.exe 2336 jjvvd.exe 4972 622042.exe 764 i066088.exe 4948 5xlxrrr.exe 2944 vvvvv.exe 4284 42482.exe 4732 880428.exe 4932 vdjpj.exe 1352 86826.exe 4072 06626.exe 3268 7hbttb.exe 1608 880004.exe 3616 9rlfxxx.exe 3096 c200880.exe 2904 llllflf.exe 1972 1tntht.exe 4292 640044.exe 4036 4622066.exe 4240 1djjj.exe 1860 60000.exe 3796 44600.exe 876 vjddv.exe 1904 rlxxlll.exe 3756 264040.exe 1384 rxrlfrr.exe -
resource yara_rule behavioral2/memory/1760-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1760-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4932-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4880-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1880-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1272-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1272-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2288-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2288-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/876-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2772-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5012-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1452-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3504-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/868-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2516-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4264-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2852-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2664-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-211-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 880668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u226004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6288844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8282662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrllx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4928 1760 7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe 82 PID 1760 wrote to memory of 4928 1760 7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe 82 PID 1760 wrote to memory of 4928 1760 7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe 82 PID 4928 wrote to memory of 4932 4928 9bhtnt.exe 83 PID 4928 wrote to memory of 4932 4928 9bhtnt.exe 83 PID 4928 wrote to memory of 4932 4928 9bhtnt.exe 83 PID 4932 wrote to memory of 4880 4932 lrfrrrr.exe 84 PID 4932 wrote to memory of 4880 4932 lrfrrrr.exe 84 PID 4932 wrote to memory of 4880 4932 lrfrrrr.exe 84 PID 4880 wrote to memory of 1880 4880 tnhhhh.exe 85 PID 4880 wrote to memory of 1880 4880 tnhhhh.exe 85 PID 4880 wrote to memory of 1880 4880 tnhhhh.exe 85 PID 1880 wrote to memory of 3616 1880 pjvdv.exe 86 PID 1880 wrote to memory of 3616 1880 pjvdv.exe 86 PID 1880 wrote to memory of 3616 1880 pjvdv.exe 86 PID 3616 wrote to memory of 1272 3616 k02600.exe 87 PID 3616 wrote to memory of 1272 3616 k02600.exe 87 PID 3616 wrote to memory of 1272 3616 k02600.exe 87 PID 1272 wrote to memory of 2028 1272 rrfxxff.exe 88 PID 1272 wrote to memory of 2028 1272 rrfxxff.exe 88 PID 1272 wrote to memory of 2028 1272 rrfxxff.exe 88 PID 2028 wrote to memory of 1388 2028 tntbbh.exe 89 PID 2028 wrote to memory of 1388 2028 tntbbh.exe 89 PID 2028 wrote to memory of 1388 2028 tntbbh.exe 89 PID 1388 wrote to memory of 2288 1388 jjppe.exe 90 PID 1388 wrote to memory of 2288 1388 jjppe.exe 90 PID 1388 wrote to memory of 2288 1388 jjppe.exe 90 PID 2288 wrote to memory of 2444 2288 8682026.exe 91 PID 2288 wrote to memory of 2444 2288 8682026.exe 91 PID 2288 wrote to memory of 2444 2288 8682026.exe 91 PID 2444 wrote to memory of 876 2444 08028.exe 92 PID 2444 wrote to memory of 876 2444 08028.exe 92 PID 2444 wrote to memory of 876 2444 08028.exe 92 PID 876 wrote to memory of 2772 876 228840.exe 93 PID 876 wrote to memory of 2772 876 228840.exe 93 PID 876 wrote to memory of 2772 876 228840.exe 93 PID 2772 wrote to memory of 5012 2772 088020.exe 94 PID 2772 wrote to memory of 5012 2772 088020.exe 94 PID 2772 wrote to memory of 5012 2772 088020.exe 94 PID 5012 wrote to memory of 1968 5012 6688822.exe 95 PID 5012 wrote to memory of 1968 5012 6688822.exe 95 PID 5012 wrote to memory of 1968 5012 6688822.exe 95 PID 1968 wrote to memory of 1452 1968 w28888.exe 96 PID 1968 wrote to memory of 1452 1968 w28888.exe 96 PID 1968 wrote to memory of 1452 1968 w28888.exe 96 PID 1452 wrote to memory of 3504 1452 646828.exe 97 PID 1452 wrote to memory of 3504 1452 646828.exe 97 PID 1452 wrote to memory of 3504 1452 646828.exe 97 PID 3504 wrote to memory of 1164 3504 lllffxl.exe 98 PID 3504 wrote to memory of 1164 3504 lllffxl.exe 98 PID 3504 wrote to memory of 1164 3504 lllffxl.exe 98 PID 1164 wrote to memory of 4228 1164 hhnttt.exe 99 PID 1164 wrote to memory of 4228 1164 hhnttt.exe 99 PID 1164 wrote to memory of 4228 1164 hhnttt.exe 99 PID 4228 wrote to memory of 868 4228 xrlffff.exe 100 PID 4228 wrote to memory of 868 4228 xrlffff.exe 100 PID 4228 wrote to memory of 868 4228 xrlffff.exe 100 PID 868 wrote to memory of 2036 868 882222.exe 101 PID 868 wrote to memory of 2036 868 882222.exe 101 PID 868 wrote to memory of 2036 868 882222.exe 101 PID 2036 wrote to memory of 3368 2036 04262.exe 102 PID 2036 wrote to memory of 3368 2036 04262.exe 102 PID 2036 wrote to memory of 3368 2036 04262.exe 102 PID 3368 wrote to memory of 2516 3368 rrflxll.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe"C:\Users\Admin\AppData\Local\Temp\7aa887eae0af0f1f611cd5470ae6410746b8b196cc7ce3286c9c7e6a134f2df5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\9bhtnt.exec:\9bhtnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\lrfrrrr.exec:\lrfrrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
\??\c:\tnhhhh.exec:\tnhhhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
\??\c:\pjvdv.exec:\pjvdv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\k02600.exec:\k02600.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\rrfxxff.exec:\rrfxxff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\tntbbh.exec:\tntbbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\jjppe.exec:\jjppe.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\8682026.exec:\8682026.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
\??\c:\08028.exec:\08028.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\228840.exec:\228840.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\088020.exec:\088020.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\6688822.exec:\6688822.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
\??\c:\w28888.exec:\w28888.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\646828.exec:\646828.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\lllffxl.exec:\lllffxl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
\??\c:\hhnttt.exec:\hhnttt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\xrlffff.exec:\xrlffff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\882222.exec:\882222.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
\??\c:\04262.exec:\04262.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\rrflxll.exec:\rrflxll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
\??\c:\48008.exec:\48008.exe23⤵
- Executes dropped EXE
PID:2516 -
\??\c:\llxxffr.exec:\llxxffr.exe24⤵
- Executes dropped EXE
PID:4264 -
\??\c:\nnnnhn.exec:\nnnnhn.exe25⤵
- Executes dropped EXE
PID:4904 -
\??\c:\g8882.exec:\g8882.exe26⤵
- Executes dropped EXE
PID:2184 -
\??\c:\3bbtnh.exec:\3bbtnh.exe27⤵
- Executes dropped EXE
PID:4768 -
\??\c:\680208.exec:\680208.exe28⤵
- Executes dropped EXE
PID:2340 -
\??\c:\20226.exec:\20226.exe29⤵
- Executes dropped EXE
PID:2952 -
\??\c:\a4022.exec:\a4022.exe30⤵
- Executes dropped EXE
PID:2852 -
\??\c:\dppjd.exec:\dppjd.exe31⤵
- Executes dropped EXE
PID:2664 -
\??\c:\c004888.exec:\c004888.exe32⤵
- Executes dropped EXE
PID:4324 -
\??\c:\tbnntt.exec:\tbnntt.exe33⤵
- Executes dropped EXE
PID:2320 -
\??\c:\20224.exec:\20224.exe34⤵
- Executes dropped EXE
PID:3228 -
\??\c:\xlrrllf.exec:\xlrrllf.exe35⤵
- Executes dropped EXE
PID:4428 -
\??\c:\e46004.exec:\e46004.exe36⤵
- Executes dropped EXE
PID:2360 -
\??\c:\84840.exec:\84840.exe37⤵
- Executes dropped EXE
PID:972 -
\??\c:\nhhhbb.exec:\nhhhbb.exe38⤵
- Executes dropped EXE
PID:4200 -
\??\c:\242486.exec:\242486.exe39⤵
- Executes dropped EXE
PID:708 -
\??\c:\0422480.exec:\0422480.exe40⤵
- Executes dropped EXE
PID:4800 -
\??\c:\jjvvd.exec:\jjvvd.exe41⤵
- Executes dropped EXE
PID:2336 -
\??\c:\622042.exec:\622042.exe42⤵
- Executes dropped EXE
PID:4972 -
\??\c:\i066088.exec:\i066088.exe43⤵
- Executes dropped EXE
PID:764 -
\??\c:\5xlxrrr.exec:\5xlxrrr.exe44⤵
- Executes dropped EXE
PID:4948 -
\??\c:\vvvvv.exec:\vvvvv.exe45⤵
- Executes dropped EXE
PID:2944 -
\??\c:\42482.exec:\42482.exe46⤵
- Executes dropped EXE
PID:4284 -
\??\c:\880428.exec:\880428.exe47⤵
- Executes dropped EXE
PID:4732 -
\??\c:\vdjpj.exec:\vdjpj.exe48⤵
- Executes dropped EXE
PID:4932 -
\??\c:\86826.exec:\86826.exe49⤵
- Executes dropped EXE
PID:1352 -
\??\c:\06626.exec:\06626.exe50⤵
- Executes dropped EXE
PID:4072 -
\??\c:\7hbttb.exec:\7hbttb.exe51⤵
- Executes dropped EXE
PID:3268 -
\??\c:\880004.exec:\880004.exe52⤵
- Executes dropped EXE
PID:1608 -
\??\c:\9rlfxxx.exec:\9rlfxxx.exe53⤵
- Executes dropped EXE
PID:3616 -
\??\c:\c200880.exec:\c200880.exe54⤵
- Executes dropped EXE
PID:3096 -
\??\c:\llllflf.exec:\llllflf.exe55⤵
- Executes dropped EXE
PID:2904 -
\??\c:\1tntht.exec:\1tntht.exe56⤵
- Executes dropped EXE
PID:1972 -
\??\c:\640044.exec:\640044.exe57⤵
- Executes dropped EXE
PID:4292 -
\??\c:\4622066.exec:\4622066.exe58⤵
- Executes dropped EXE
PID:4036 -
\??\c:\1djjj.exec:\1djjj.exe59⤵
- Executes dropped EXE
PID:4240 -
\??\c:\60000.exec:\60000.exe60⤵
- Executes dropped EXE
PID:1860 -
\??\c:\44600.exec:\44600.exe61⤵
- Executes dropped EXE
PID:3796 -
\??\c:\vjddv.exec:\vjddv.exe62⤵
- Executes dropped EXE
PID:876 -
\??\c:\rlxxlll.exec:\rlxxlll.exe63⤵
- Executes dropped EXE
PID:1904 -
\??\c:\264040.exec:\264040.exe64⤵
- Executes dropped EXE
PID:3756 -
\??\c:\rxrlfrr.exec:\rxrlfrr.exe65⤵
- Executes dropped EXE
PID:1384 -
\??\c:\k02222.exec:\k02222.exe66⤵PID:3336
-
\??\c:\ddvdv.exec:\ddvdv.exe67⤵PID:2304
-
\??\c:\08844.exec:\08844.exe68⤵PID:2212
-
\??\c:\fffxrrr.exec:\fffxrrr.exe69⤵PID:4228
-
\??\c:\7rlffll.exec:\7rlffll.exe70⤵PID:4112
-
\??\c:\082884.exec:\082884.exe71⤵PID:3356
-
\??\c:\406044.exec:\406044.exe72⤵PID:1816
-
\??\c:\5hnhnn.exec:\5hnhnn.exe73⤵PID:3368
-
\??\c:\vvpjj.exec:\vvpjj.exe74⤵PID:3068
-
\??\c:\e02820.exec:\e02820.exe75⤵PID:5052
-
\??\c:\rrfxllr.exec:\rrfxllr.exe76⤵PID:5084
-
\??\c:\xfxllrx.exec:\xfxllrx.exe77⤵PID:4896
-
\??\c:\frxfffx.exec:\frxfffx.exe78⤵PID:4828
-
\??\c:\020444.exec:\020444.exe79⤵PID:4520
-
\??\c:\jjddv.exec:\jjddv.exe80⤵
- System Location Discovery: System Language Discovery
PID:2232 -
\??\c:\nnbhnn.exec:\nnbhnn.exe81⤵PID:3552
-
\??\c:\q82228.exec:\q82228.exe82⤵PID:2852
-
\??\c:\bnttnn.exec:\bnttnn.exe83⤵PID:4916
-
\??\c:\1ddpp.exec:\1ddpp.exe84⤵PID:536
-
\??\c:\662068.exec:\662068.exe85⤵PID:3468
-
\??\c:\4404804.exec:\4404804.exe86⤵PID:956
-
\??\c:\jpjvv.exec:\jpjvv.exe87⤵PID:2364
-
\??\c:\ttttnn.exec:\ttttnn.exe88⤵PID:3992
-
\??\c:\8644008.exec:\8644008.exe89⤵PID:968
-
\??\c:\jpvvj.exec:\jpvvj.exe90⤵PID:3800
-
\??\c:\s4000.exec:\s4000.exe91⤵PID:1876
-
\??\c:\djvpj.exec:\djvpj.exe92⤵PID:5116
-
\??\c:\e64404.exec:\e64404.exe93⤵PID:3160
-
\??\c:\868266.exec:\868266.exe94⤵PID:4380
-
\??\c:\jjjdv.exec:\jjjdv.exe95⤵PID:1760
-
\??\c:\266600.exec:\266600.exe96⤵PID:2308
-
\??\c:\5hhbtt.exec:\5hhbtt.exe97⤵PID:2200
-
\??\c:\bhtthn.exec:\bhtthn.exe98⤵PID:1012
-
\??\c:\620864.exec:\620864.exe99⤵PID:4172
-
\??\c:\884828.exec:\884828.exe100⤵PID:3956
-
\??\c:\bbhhbb.exec:\bbhhbb.exe101⤵PID:3780
-
\??\c:\42480.exec:\42480.exe102⤵PID:3996
-
\??\c:\0626082.exec:\0626082.exe103⤵PID:1552
-
\??\c:\620066.exec:\620066.exe104⤵PID:3184
-
\??\c:\5rrrlll.exec:\5rrrlll.exe105⤵PID:1128
-
\??\c:\nhtbht.exec:\nhtbht.exe106⤵PID:2356
-
\??\c:\40886.exec:\40886.exe107⤵PID:1856
-
\??\c:\42400.exec:\42400.exe108⤵PID:2220
-
\??\c:\02222.exec:\02222.exe109⤵PID:4476
-
\??\c:\xlxrllf.exec:\xlxrllf.exe110⤵PID:640
-
\??\c:\hnbnht.exec:\hnbnht.exe111⤵PID:3944
-
\??\c:\68622.exec:\68622.exe112⤵PID:3100
-
\??\c:\8662424.exec:\8662424.exe113⤵PID:1452
-
\??\c:\htnnhh.exec:\htnnhh.exe114⤵PID:2100
-
\??\c:\02444.exec:\02444.exe115⤵PID:2920
-
\??\c:\dvjdp.exec:\dvjdp.exe116⤵PID:3224
-
\??\c:\xxlxxxl.exec:\xxlxxxl.exe117⤵PID:2604
-
\??\c:\tnhhbb.exec:\tnhhbb.exe118⤵PID:2036
-
\??\c:\i600668.exec:\i600668.exe119⤵PID:4884
-
\??\c:\pvvvd.exec:\pvvvd.exe120⤵PID:1480
-
\??\c:\nbtbtt.exec:\nbtbtt.exe121⤵PID:5080
-
\??\c:\hbhhhn.exec:\hbhhhn.exe122⤵PID:1288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-