Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 13:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe
-
Size
53KB
-
MD5
f137b6ff5ad0a3b66840201784875e9c
-
SHA1
5c17e8afcc7e0667646cb2d354bc725ced7db6a7
-
SHA256
73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49
-
SHA512
58d9ec00b033f24bf2245907e3328c94f4f46c12ec6533dbdb2373f081ae811a85de079722833123239896b24fc51499351c3eecfd2ef0ce6562f113919479f4
-
SSDEEP
1536:mAocdpeVoBDulhzHMb7xNAa04Mcg5IKvl5:0cdpeeBSHHMHLf9RyIa
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4616-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1004-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4804-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1368-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2080-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2140-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1844-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1100-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2564-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1880-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4980-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/208-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1720-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3220-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2740-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2736-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/468-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4744-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1328-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/876-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3648-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2804-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1316-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3100-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3684-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2040-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/852-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2896-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4684-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4060-307-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-311-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2844-324-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-328-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3248-332-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-342-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5036-346-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5064-368-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5088-375-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2956-427-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3416-453-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/628-462-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-472-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1444-485-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4380-561-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-565-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/768-581-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4552-604-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1280-641-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3664-687-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4816-721-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4296-725-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4680-907-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4616 828220.exe 4804 e06606.exe 2080 622600.exe 1368 thtbth.exe 2140 q24822.exe 1844 bnbtnn.exe 1100 624888.exe 2564 jpvpj.exe 1880 htthhh.exe 3000 22226.exe 2888 5ntnnn.exe 4980 2082884.exe 208 nnbbtb.exe 1720 e80000.exe 2936 s8486.exe 5020 bhhbnn.exe 3220 a2642.exe 3676 nnnhhh.exe 2740 e46000.exe 1568 062644.exe 4592 ppvpv.exe 2736 tnnhbt.exe 644 w428226.exe 5088 ddpjd.exe 3820 llxlxxx.exe 4556 bhhhhh.exe 468 4448800.exe 4744 2466666.exe 4224 bhhhbb.exe 5052 66226.exe 1328 hbhhbb.exe 876 nbtbbh.exe 3648 3vppj.exe 2804 htthtt.exe 1316 ppvpp.exe 4200 22600.exe 3116 3httnn.exe 4080 q40044.exe 1952 tbhhhb.exe 3176 4864606.exe 3768 e84822.exe 2700 u222600.exe 4140 4608822.exe 4792 tntntt.exe 660 xffxrlf.exe 3100 24226.exe 388 bnnnnn.exe 3280 lfffxrf.exe 3684 5lllxrr.exe 3544 44060.exe 3560 24482.exe 4912 tbtttt.exe 4616 e22266.exe 2152 nbhhnt.exe 1080 e24840.exe 2040 68222.exe 852 0626028.exe 2896 nnnhnn.exe 5028 g4482.exe 2184 7hnhhh.exe 3144 040022.exe 4332 620482.exe 544 ppddj.exe 4684 i404822.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0466488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 446600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4028288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6246666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frlxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u220486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8026048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhtt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4616 1004 73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe 82 PID 1004 wrote to memory of 4616 1004 73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe 82 PID 1004 wrote to memory of 4616 1004 73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe 82 PID 4616 wrote to memory of 4804 4616 828220.exe 83 PID 4616 wrote to memory of 4804 4616 828220.exe 83 PID 4616 wrote to memory of 4804 4616 828220.exe 83 PID 4804 wrote to memory of 2080 4804 e06606.exe 84 PID 4804 wrote to memory of 2080 4804 e06606.exe 84 PID 4804 wrote to memory of 2080 4804 e06606.exe 84 PID 2080 wrote to memory of 1368 2080 622600.exe 85 PID 2080 wrote to memory of 1368 2080 622600.exe 85 PID 2080 wrote to memory of 1368 2080 622600.exe 85 PID 1368 wrote to memory of 2140 1368 thtbth.exe 86 PID 1368 wrote to memory of 2140 1368 thtbth.exe 86 PID 1368 wrote to memory of 2140 1368 thtbth.exe 86 PID 2140 wrote to memory of 1844 2140 q24822.exe 87 PID 2140 wrote to memory of 1844 2140 q24822.exe 87 PID 2140 wrote to memory of 1844 2140 q24822.exe 87 PID 1844 wrote to memory of 1100 1844 bnbtnn.exe 88 PID 1844 wrote to memory of 1100 1844 bnbtnn.exe 88 PID 1844 wrote to memory of 1100 1844 bnbtnn.exe 88 PID 1100 wrote to memory of 2564 1100 624888.exe 89 PID 1100 wrote to memory of 2564 1100 624888.exe 89 PID 1100 wrote to memory of 2564 1100 624888.exe 89 PID 2564 wrote to memory of 1880 2564 jpvpj.exe 90 PID 2564 wrote to memory of 1880 2564 jpvpj.exe 90 PID 2564 wrote to memory of 1880 2564 jpvpj.exe 90 PID 1880 wrote to memory of 3000 1880 htthhh.exe 91 PID 1880 wrote to memory of 3000 1880 htthhh.exe 91 PID 1880 wrote to memory of 3000 1880 htthhh.exe 91 PID 3000 wrote to memory of 2888 3000 22226.exe 92 PID 3000 wrote to memory of 2888 3000 22226.exe 92 PID 3000 wrote to memory of 2888 3000 22226.exe 92 PID 2888 wrote to memory of 4980 2888 5ntnnn.exe 93 PID 2888 wrote to memory of 4980 2888 5ntnnn.exe 93 PID 2888 wrote to memory of 4980 2888 5ntnnn.exe 93 PID 4980 wrote to memory of 208 4980 2082884.exe 94 PID 4980 wrote to memory of 208 4980 2082884.exe 94 PID 4980 wrote to memory of 208 4980 2082884.exe 94 PID 208 wrote to memory of 1720 208 nnbbtb.exe 95 PID 208 wrote to memory of 1720 208 nnbbtb.exe 95 PID 208 wrote to memory of 1720 208 nnbbtb.exe 95 PID 1720 wrote to memory of 2936 1720 e80000.exe 96 PID 1720 wrote to memory of 2936 1720 e80000.exe 96 PID 1720 wrote to memory of 2936 1720 e80000.exe 96 PID 2936 wrote to memory of 5020 2936 s8486.exe 97 PID 2936 wrote to memory of 5020 2936 s8486.exe 97 PID 2936 wrote to memory of 5020 2936 s8486.exe 97 PID 5020 wrote to memory of 3220 5020 bhhbnn.exe 98 PID 5020 wrote to memory of 3220 5020 bhhbnn.exe 98 PID 5020 wrote to memory of 3220 5020 bhhbnn.exe 98 PID 3220 wrote to memory of 3676 3220 a2642.exe 99 PID 3220 wrote to memory of 3676 3220 a2642.exe 99 PID 3220 wrote to memory of 3676 3220 a2642.exe 99 PID 3676 wrote to memory of 2740 3676 nnnhhh.exe 100 PID 3676 wrote to memory of 2740 3676 nnnhhh.exe 100 PID 3676 wrote to memory of 2740 3676 nnnhhh.exe 100 PID 2740 wrote to memory of 1568 2740 e46000.exe 101 PID 2740 wrote to memory of 1568 2740 e46000.exe 101 PID 2740 wrote to memory of 1568 2740 e46000.exe 101 PID 1568 wrote to memory of 4592 1568 062644.exe 102 PID 1568 wrote to memory of 4592 1568 062644.exe 102 PID 1568 wrote to memory of 4592 1568 062644.exe 102 PID 4592 wrote to memory of 2736 4592 ppvpv.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe"C:\Users\Admin\AppData\Local\Temp\73fb34e2780202a04e897ba7a581e2db5423643b71c8d440eb92daa298b1cd49.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\828220.exec:\828220.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\e06606.exec:\e06606.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\622600.exec:\622600.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\thtbth.exec:\thtbth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
\??\c:\q24822.exec:\q24822.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\bnbtnn.exec:\bnbtnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\624888.exec:\624888.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
\??\c:\jpvpj.exec:\jpvpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\htthhh.exec:\htthhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\22226.exec:\22226.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\5ntnnn.exec:\5ntnnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\2082884.exec:\2082884.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\nnbbtb.exec:\nnbbtb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
\??\c:\e80000.exec:\e80000.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\s8486.exec:\s8486.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\bhhbnn.exec:\bhhbnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\a2642.exec:\a2642.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
\??\c:\nnnhhh.exec:\nnnhhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\e46000.exec:\e46000.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\062644.exec:\062644.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
\??\c:\ppvpv.exec:\ppvpv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\tnnhbt.exec:\tnnhbt.exe23⤵
- Executes dropped EXE
PID:2736 -
\??\c:\w428226.exec:\w428226.exe24⤵
- Executes dropped EXE
PID:644 -
\??\c:\ddpjd.exec:\ddpjd.exe25⤵
- Executes dropped EXE
PID:5088 -
\??\c:\llxlxxx.exec:\llxlxxx.exe26⤵
- Executes dropped EXE
PID:3820 -
\??\c:\bhhhhh.exec:\bhhhhh.exe27⤵
- Executes dropped EXE
PID:4556 -
\??\c:\4448800.exec:\4448800.exe28⤵
- Executes dropped EXE
PID:468 -
\??\c:\2466666.exec:\2466666.exe29⤵
- Executes dropped EXE
PID:4744 -
\??\c:\bhhhbb.exec:\bhhhbb.exe30⤵
- Executes dropped EXE
PID:4224 -
\??\c:\66226.exec:\66226.exe31⤵
- Executes dropped EXE
PID:5052 -
\??\c:\hbhhbb.exec:\hbhhbb.exe32⤵
- Executes dropped EXE
PID:1328 -
\??\c:\nbtbbh.exec:\nbtbbh.exe33⤵
- Executes dropped EXE
PID:876 -
\??\c:\3vppj.exec:\3vppj.exe34⤵
- Executes dropped EXE
PID:3648 -
\??\c:\htthtt.exec:\htthtt.exe35⤵
- Executes dropped EXE
PID:2804 -
\??\c:\ppvpp.exec:\ppvpp.exe36⤵
- Executes dropped EXE
PID:1316 -
\??\c:\22600.exec:\22600.exe37⤵
- Executes dropped EXE
PID:4200 -
\??\c:\3httnn.exec:\3httnn.exe38⤵
- Executes dropped EXE
PID:3116 -
\??\c:\q40044.exec:\q40044.exe39⤵
- Executes dropped EXE
PID:4080 -
\??\c:\tbhhhb.exec:\tbhhhb.exe40⤵
- Executes dropped EXE
PID:1952 -
\??\c:\4864606.exec:\4864606.exe41⤵
- Executes dropped EXE
PID:3176 -
\??\c:\e84822.exec:\e84822.exe42⤵
- Executes dropped EXE
PID:3768 -
\??\c:\u222600.exec:\u222600.exe43⤵
- Executes dropped EXE
PID:2700 -
\??\c:\4608822.exec:\4608822.exe44⤵
- Executes dropped EXE
PID:4140 -
\??\c:\tntntt.exec:\tntntt.exe45⤵
- Executes dropped EXE
PID:4792 -
\??\c:\xffxrlf.exec:\xffxrlf.exe46⤵
- Executes dropped EXE
PID:660 -
\??\c:\24226.exec:\24226.exe47⤵
- Executes dropped EXE
PID:3100 -
\??\c:\bnnnnn.exec:\bnnnnn.exe48⤵
- Executes dropped EXE
PID:388 -
\??\c:\lfffxrf.exec:\lfffxrf.exe49⤵
- Executes dropped EXE
PID:3280 -
\??\c:\5lllxrr.exec:\5lllxrr.exe50⤵
- Executes dropped EXE
PID:3684 -
\??\c:\44060.exec:\44060.exe51⤵
- Executes dropped EXE
PID:3544 -
\??\c:\24482.exec:\24482.exe52⤵
- Executes dropped EXE
PID:3560 -
\??\c:\tbtttt.exec:\tbtttt.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912 -
\??\c:\e22266.exec:\e22266.exe54⤵
- Executes dropped EXE
PID:4616 -
\??\c:\nbhhnt.exec:\nbhhnt.exe55⤵
- Executes dropped EXE
PID:2152 -
\??\c:\e24840.exec:\e24840.exe56⤵
- Executes dropped EXE
PID:1080 -
\??\c:\68222.exec:\68222.exe57⤵
- Executes dropped EXE
PID:2040 -
\??\c:\0626028.exec:\0626028.exe58⤵
- Executes dropped EXE
PID:852 -
\??\c:\nnnhnn.exec:\nnnhnn.exe59⤵
- Executes dropped EXE
PID:2896 -
\??\c:\g4482.exec:\g4482.exe60⤵
- Executes dropped EXE
PID:5028 -
\??\c:\7hnhhh.exec:\7hnhhh.exe61⤵
- Executes dropped EXE
PID:2184 -
\??\c:\040022.exec:\040022.exe62⤵
- Executes dropped EXE
PID:3144 -
\??\c:\620482.exec:\620482.exe63⤵
- Executes dropped EXE
PID:4332 -
\??\c:\ppddj.exec:\ppddj.exe64⤵
- Executes dropped EXE
PID:544 -
\??\c:\i404822.exec:\i404822.exe65⤵
- Executes dropped EXE
PID:4684 -
\??\c:\hntnnh.exec:\hntnnh.exe66⤵PID:4504
-
\??\c:\a6600.exec:\a6600.exe67⤵PID:4060
-
\??\c:\ffxrlff.exec:\ffxrlff.exe68⤵PID:3972
-
\??\c:\k26424.exec:\k26424.exe69⤵PID:1408
-
\??\c:\62882.exec:\62882.exe70⤵PID:4632
-
\??\c:\68004.exec:\68004.exe71⤵PID:3240
-
\??\c:\lfflffl.exec:\lfflffl.exe72⤵PID:2844
-
\??\c:\hntnht.exec:\hntnht.exe73⤵PID:3408
-
\??\c:\484220.exec:\484220.exe74⤵PID:3248
-
\??\c:\dpvpj.exec:\dpvpj.exe75⤵PID:2744
-
\??\c:\llfxlfx.exec:\llfxlfx.exe76⤵PID:3040
-
\??\c:\jjddv.exec:\jjddv.exe77⤵PID:4676
-
\??\c:\2866046.exec:\2866046.exe78⤵PID:5036
-
\??\c:\1jjjj.exec:\1jjjj.exe79⤵PID:1648
-
\??\c:\rxxlllr.exec:\rxxlllr.exe80⤵PID:1348
-
\??\c:\lxrxxxr.exec:\lxrxxxr.exe81⤵PID:4908
-
\??\c:\48862.exec:\48862.exe82⤵PID:2356
-
\??\c:\60004.exec:\60004.exe83⤵PID:3928
-
\??\c:\224888.exec:\224888.exe84⤵PID:2736
-
\??\c:\284866.exec:\284866.exe85⤵PID:5064
-
\??\c:\40222.exec:\40222.exe86⤵PID:4780
-
\??\c:\3hnnhh.exec:\3hnnhh.exe87⤵PID:5088
-
\??\c:\vdpjv.exec:\vdpjv.exe88⤵PID:1680
-
\??\c:\48482.exec:\48482.exe89⤵PID:4840
-
\??\c:\42820.exec:\42820.exe90⤵PID:1516
-
\??\c:\e28826.exec:\e28826.exe91⤵PID:1272
-
\??\c:\7hhhbb.exec:\7hhhbb.exe92⤵PID:4744
-
\??\c:\82486.exec:\82486.exe93⤵PID:1760
-
\??\c:\bbtnbb.exec:\bbtnbb.exe94⤵PID:1956
-
\??\c:\0460000.exec:\0460000.exe95⤵PID:3212
-
\??\c:\7nnhhb.exec:\7nnhhb.exe96⤵PID:1580
-
\??\c:\1jpjv.exec:\1jpjv.exe97⤵PID:816
-
\??\c:\dvjjv.exec:\dvjjv.exe98⤵PID:2720
-
\??\c:\040422.exec:\040422.exe99⤵PID:3648
-
\??\c:\jdvvj.exec:\jdvvj.exe100⤵PID:3868
-
\??\c:\htnhht.exec:\htnhht.exe101⤵PID:1496
-
\??\c:\1flfxll.exec:\1flfxll.exe102⤵PID:1388
-
\??\c:\5xfxfxf.exec:\5xfxfxf.exe103⤵PID:1864
-
\??\c:\o064820.exec:\o064820.exe104⤵PID:2956
-
\??\c:\hhbnnn.exec:\hhbnnn.exe105⤵PID:4080
-
\??\c:\jdddv.exec:\jdddv.exe106⤵PID:2372
-
\??\c:\066082.exec:\066082.exe107⤵PID:4520
-
\??\c:\fxrlxxr.exec:\fxrlxxr.exe108⤵PID:692
-
\??\c:\1nnhnn.exec:\1nnhnn.exe109⤵PID:3520
-
\??\c:\vvddv.exec:\vvddv.exe110⤵PID:4964
-
\??\c:\3hbnht.exec:\3hbnht.exe111⤵PID:4736
-
\??\c:\0426228.exec:\0426228.exe112⤵PID:5000
-
\??\c:\a0622.exec:\a0622.exe113⤵PID:3416
-
\??\c:\6282000.exec:\6282000.exe114⤵PID:3256
-
\??\c:\djppp.exec:\djppp.exe115⤵PID:628
-
\??\c:\e66264.exec:\e66264.exe116⤵PID:2924
-
\??\c:\xxxlxxr.exec:\xxxlxxr.exe117⤵PID:2176
-
\??\c:\640426.exec:\640426.exe118⤵PID:4160
-
\??\c:\httbnn.exec:\httbnn.exe119⤵PID:4596
-
\??\c:\1dpjd.exec:\1dpjd.exe120⤵PID:2056
-
\??\c:\406004.exec:\406004.exe121⤵PID:4616
-
\??\c:\9ttnnh.exec:\9ttnnh.exe122⤵PID:1444
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-