Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 05:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe
-
Size
67KB
-
MD5
dc1da99ec8ddc07b09536060c824760c
-
SHA1
c279ac114ae52732f48f24ceaa04e385c4487c9b
-
SHA256
db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc
-
SHA512
21a9935477f132441a6438a471dc359266149539dff893512b76b024d1977cc6410eeec69a96765f2ca67294f73e952d213f2fd523ae8d1b78483507539c6427
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxe7:ymb3NkkiQ3mdBjF0y7kbU7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/4736-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4088-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1248-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1364-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1364-44-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2380-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3984-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2400-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2632-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4144-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4632-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/724-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1172-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2516-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1688-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3208-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4964-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3444-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1304-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/852-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4860 rrrrlrl.exe 4088 hbhhnn.exe 1248 rfllffr.exe 1816 bbhhht.exe 1364 xllxffx.exe 2380 m6282.exe 312 pvddp.exe 4560 868288.exe 3984 80266.exe 4184 xlfxllf.exe 1396 480828.exe 2400 4022268.exe 2180 6666604.exe 2632 g2222.exe 4144 hbbtnn.exe 4632 48660.exe 724 bttthh.exe 2924 1ffxxxx.exe 1172 lrrlxrf.exe 2312 hthhhn.exe 5028 jvddd.exe 2516 64262.exe 4504 nbtbth.exe 1688 pdjvj.exe 3208 480084.exe 4964 c006004.exe 3444 bthnbh.exe 1304 6686040.exe 3432 7frlrlr.exe 852 u280066.exe 3172 tnbttn.exe 1564 s0244.exe 2560 0804484.exe 3400 6644068.exe 4640 842268.exe 4628 k88826.exe 3344 044488.exe 3608 m2826.exe 4600 20882.exe 508 20840.exe 1676 02282.exe 4176 jvjpd.exe 3632 nntnbb.exe 5092 024822.exe 4248 0628264.exe 1428 800486.exe 3204 2866666.exe 3460 xllffxx.exe 3928 djjdv.exe 3372 jjvjj.exe 3320 llxxxfx.exe 540 rflffff.exe 2224 0622488.exe 224 jdddv.exe 212 rflxrff.exe 3992 22266.exe 700 40226.exe 5076 1rxrllf.exe 4932 hbhbbb.exe 2184 60622.exe 1164 7xfxlll.exe 4968 028426.exe 3660 thhbbb.exe 2672 3jppj.exe -
resource yara_rule behavioral2/memory/4736-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4088-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4088-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4088-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1364-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3984-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3984-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2632-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4144-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4632-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/724-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1172-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2312-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2516-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3208-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4964-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3444-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1304-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/852-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k86066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 022028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c866442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4844464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9llffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m2800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m4226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4860 4736 db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe 82 PID 4736 wrote to memory of 4860 4736 db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe 82 PID 4736 wrote to memory of 4860 4736 db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe 82 PID 4860 wrote to memory of 4088 4860 rrrrlrl.exe 83 PID 4860 wrote to memory of 4088 4860 rrrrlrl.exe 83 PID 4860 wrote to memory of 4088 4860 rrrrlrl.exe 83 PID 4088 wrote to memory of 1248 4088 hbhhnn.exe 84 PID 4088 wrote to memory of 1248 4088 hbhhnn.exe 84 PID 4088 wrote to memory of 1248 4088 hbhhnn.exe 84 PID 1248 wrote to memory of 1816 1248 rfllffr.exe 85 PID 1248 wrote to memory of 1816 1248 rfllffr.exe 85 PID 1248 wrote to memory of 1816 1248 rfllffr.exe 85 PID 1816 wrote to memory of 1364 1816 bbhhht.exe 86 PID 1816 wrote to memory of 1364 1816 bbhhht.exe 86 PID 1816 wrote to memory of 1364 1816 bbhhht.exe 86 PID 1364 wrote to memory of 2380 1364 xllxffx.exe 87 PID 1364 wrote to memory of 2380 1364 xllxffx.exe 87 PID 1364 wrote to memory of 2380 1364 xllxffx.exe 87 PID 2380 wrote to memory of 312 2380 m6282.exe 88 PID 2380 wrote to memory of 312 2380 m6282.exe 88 PID 2380 wrote to memory of 312 2380 m6282.exe 88 PID 312 wrote to memory of 4560 312 pvddp.exe 89 PID 312 wrote to memory of 4560 312 pvddp.exe 89 PID 312 wrote to memory of 4560 312 pvddp.exe 89 PID 4560 wrote to memory of 3984 4560 868288.exe 90 PID 4560 wrote to memory of 3984 4560 868288.exe 90 PID 4560 wrote to memory of 3984 4560 868288.exe 90 PID 3984 wrote to memory of 4184 3984 80266.exe 91 PID 3984 wrote to memory of 4184 3984 80266.exe 91 PID 3984 wrote to memory of 4184 3984 80266.exe 91 PID 4184 wrote to memory of 1396 4184 xlfxllf.exe 92 PID 4184 wrote to memory of 1396 4184 xlfxllf.exe 92 PID 4184 wrote to memory of 1396 4184 xlfxllf.exe 92 PID 1396 wrote to memory of 2400 1396 480828.exe 93 PID 1396 wrote to memory of 2400 1396 480828.exe 93 PID 1396 wrote to memory of 2400 1396 480828.exe 93 PID 2400 wrote to memory of 2180 2400 4022268.exe 94 PID 2400 wrote to memory of 2180 2400 4022268.exe 94 PID 2400 wrote to memory of 2180 2400 4022268.exe 94 PID 2180 wrote to memory of 2632 2180 6666604.exe 95 PID 2180 wrote to memory of 2632 2180 6666604.exe 95 PID 2180 wrote to memory of 2632 2180 6666604.exe 95 PID 2632 wrote to memory of 4144 2632 g2222.exe 96 PID 2632 wrote to memory of 4144 2632 g2222.exe 96 PID 2632 wrote to memory of 4144 2632 g2222.exe 96 PID 4144 wrote to memory of 4632 4144 hbbtnn.exe 97 PID 4144 wrote to memory of 4632 4144 hbbtnn.exe 97 PID 4144 wrote to memory of 4632 4144 hbbtnn.exe 97 PID 4632 wrote to memory of 724 4632 48660.exe 98 PID 4632 wrote to memory of 724 4632 48660.exe 98 PID 4632 wrote to memory of 724 4632 48660.exe 98 PID 724 wrote to memory of 2924 724 bttthh.exe 99 PID 724 wrote to memory of 2924 724 bttthh.exe 99 PID 724 wrote to memory of 2924 724 bttthh.exe 99 PID 2924 wrote to memory of 1172 2924 1ffxxxx.exe 100 PID 2924 wrote to memory of 1172 2924 1ffxxxx.exe 100 PID 2924 wrote to memory of 1172 2924 1ffxxxx.exe 100 PID 1172 wrote to memory of 2312 1172 lrrlxrf.exe 101 PID 1172 wrote to memory of 2312 1172 lrrlxrf.exe 101 PID 1172 wrote to memory of 2312 1172 lrrlxrf.exe 101 PID 2312 wrote to memory of 5028 2312 hthhhn.exe 102 PID 2312 wrote to memory of 5028 2312 hthhhn.exe 102 PID 2312 wrote to memory of 5028 2312 hthhhn.exe 102 PID 5028 wrote to memory of 2516 5028 jvddd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe"C:\Users\Admin\AppData\Local\Temp\db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\rrrrlrl.exec:\rrrrlrl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\hbhhnn.exec:\hbhhnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\rfllffr.exec:\rfllffr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\bbhhht.exec:\bbhhht.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\xllxffx.exec:\xllxffx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
\??\c:\m6282.exec:\m6282.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\pvddp.exec:\pvddp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
\??\c:\868288.exec:\868288.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\80266.exec:\80266.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
\??\c:\xlfxllf.exec:\xlfxllf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
\??\c:\480828.exec:\480828.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
\??\c:\4022268.exec:\4022268.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\6666604.exec:\6666604.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\g2222.exec:\g2222.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\hbbtnn.exec:\hbbtnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\48660.exec:\48660.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
\??\c:\bttthh.exec:\bttthh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
\??\c:\1ffxxxx.exec:\1ffxxxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\lrrlxrf.exec:\lrrlxrf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\hthhhn.exec:\hthhhn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\jvddd.exec:\jvddd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\64262.exec:\64262.exe23⤵
- Executes dropped EXE
PID:2516 -
\??\c:\nbtbth.exec:\nbtbth.exe24⤵
- Executes dropped EXE
PID:4504 -
\??\c:\pdjvj.exec:\pdjvj.exe25⤵
- Executes dropped EXE
PID:1688 -
\??\c:\480084.exec:\480084.exe26⤵
- Executes dropped EXE
PID:3208 -
\??\c:\c006004.exec:\c006004.exe27⤵
- Executes dropped EXE
PID:4964 -
\??\c:\bthnbh.exec:\bthnbh.exe28⤵
- Executes dropped EXE
PID:3444 -
\??\c:\6686040.exec:\6686040.exe29⤵
- Executes dropped EXE
PID:1304 -
\??\c:\7frlrlr.exec:\7frlrlr.exe30⤵
- Executes dropped EXE
PID:3432 -
\??\c:\u280066.exec:\u280066.exe31⤵
- Executes dropped EXE
PID:852 -
\??\c:\tnbttn.exec:\tnbttn.exe32⤵
- Executes dropped EXE
PID:3172 -
\??\c:\s0244.exec:\s0244.exe33⤵
- Executes dropped EXE
PID:1564 -
\??\c:\0804484.exec:\0804484.exe34⤵
- Executes dropped EXE
PID:2560 -
\??\c:\6644068.exec:\6644068.exe35⤵
- Executes dropped EXE
PID:3400 -
\??\c:\842268.exec:\842268.exe36⤵
- Executes dropped EXE
PID:4640 -
\??\c:\k88826.exec:\k88826.exe37⤵
- Executes dropped EXE
PID:4628 -
\??\c:\044488.exec:\044488.exe38⤵
- Executes dropped EXE
PID:3344 -
\??\c:\m2826.exec:\m2826.exe39⤵
- Executes dropped EXE
PID:3608 -
\??\c:\20882.exec:\20882.exe40⤵
- Executes dropped EXE
PID:4600 -
\??\c:\20840.exec:\20840.exe41⤵
- Executes dropped EXE
PID:508 -
\??\c:\02282.exec:\02282.exe42⤵
- Executes dropped EXE
PID:1676 -
\??\c:\jvjpd.exec:\jvjpd.exe43⤵
- Executes dropped EXE
PID:4176 -
\??\c:\nntnbb.exec:\nntnbb.exe44⤵
- Executes dropped EXE
PID:3632 -
\??\c:\024822.exec:\024822.exe45⤵
- Executes dropped EXE
PID:5092 -
\??\c:\0628264.exec:\0628264.exe46⤵
- Executes dropped EXE
PID:4248 -
\??\c:\82688.exec:\82688.exe47⤵PID:1244
-
\??\c:\800486.exec:\800486.exe48⤵
- Executes dropped EXE
PID:1428 -
\??\c:\2866666.exec:\2866666.exe49⤵
- Executes dropped EXE
PID:3204 -
\??\c:\xllffxx.exec:\xllffxx.exe50⤵
- Executes dropped EXE
PID:3460 -
\??\c:\djjdv.exec:\djjdv.exe51⤵
- Executes dropped EXE
PID:3928 -
\??\c:\jjvjj.exec:\jjvjj.exe52⤵
- Executes dropped EXE
PID:3372 -
\??\c:\llxxxfx.exec:\llxxxfx.exe53⤵
- Executes dropped EXE
PID:3320 -
\??\c:\rflffff.exec:\rflffff.exe54⤵
- Executes dropped EXE
PID:540 -
\??\c:\0622488.exec:\0622488.exe55⤵
- Executes dropped EXE
PID:2224 -
\??\c:\jdddv.exec:\jdddv.exe56⤵
- Executes dropped EXE
PID:224 -
\??\c:\rflxrff.exec:\rflxrff.exe57⤵
- Executes dropped EXE
PID:212 -
\??\c:\22266.exec:\22266.exe58⤵
- Executes dropped EXE
PID:3992 -
\??\c:\40226.exec:\40226.exe59⤵
- Executes dropped EXE
PID:700 -
\??\c:\1rxrllf.exec:\1rxrllf.exe60⤵
- Executes dropped EXE
PID:5076 -
\??\c:\hbhbbb.exec:\hbhbbb.exe61⤵
- Executes dropped EXE
PID:4932 -
\??\c:\60622.exec:\60622.exe62⤵
- Executes dropped EXE
PID:2184 -
\??\c:\7xfxlll.exec:\7xfxlll.exe63⤵
- Executes dropped EXE
PID:1164 -
\??\c:\028426.exec:\028426.exe64⤵
- Executes dropped EXE
PID:4968 -
\??\c:\thhbbb.exec:\thhbbb.exe65⤵
- Executes dropped EXE
PID:3660 -
\??\c:\3jppj.exec:\3jppj.exe66⤵
- Executes dropped EXE
PID:2672 -
\??\c:\ttnhtt.exec:\ttnhtt.exe67⤵PID:4852
-
\??\c:\jddvj.exec:\jddvj.exe68⤵PID:1048
-
\??\c:\20208.exec:\20208.exe69⤵PID:3652
-
\??\c:\624066.exec:\624066.exe70⤵PID:3888
-
\??\c:\9jjjd.exec:\9jjjd.exe71⤵PID:2660
-
\??\c:\rrfffxx.exec:\rrfffxx.exe72⤵PID:724
-
\??\c:\c866442.exec:\c866442.exe73⤵
- System Location Discovery: System Language Discovery
PID:4100 -
\??\c:\q22488.exec:\q22488.exe74⤵PID:2004
-
\??\c:\rlxrlll.exec:\rlxrlll.exe75⤵PID:3648
-
\??\c:\8066666.exec:\8066666.exe76⤵PID:3876
-
\??\c:\hbhbhh.exec:\hbhbhh.exe77⤵PID:3368
-
\??\c:\bbhttt.exec:\bbhttt.exe78⤵PID:1192
-
\??\c:\044400.exec:\044400.exe79⤵PID:4908
-
\??\c:\48822.exec:\48822.exe80⤵PID:1808
-
\??\c:\lfxlfff.exec:\lfxlfff.exe81⤵PID:4872
-
\??\c:\28440.exec:\28440.exe82⤵PID:3560
-
\??\c:\1xxxrrr.exec:\1xxxrrr.exe83⤵PID:1988
-
\??\c:\3thnnn.exec:\3thnnn.exe84⤵PID:3528
-
\??\c:\c404884.exec:\c404884.exe85⤵PID:4200
-
\??\c:\264428.exec:\264428.exe86⤵PID:1240
-
\??\c:\2400440.exec:\2400440.exe87⤵PID:3132
-
\??\c:\060062.exec:\060062.exe88⤵PID:4708
-
\??\c:\048806.exec:\048806.exe89⤵PID:4948
-
\??\c:\rrxxxxf.exec:\rrxxxxf.exe90⤵
- System Location Discovery: System Language Discovery
PID:1592 -
\??\c:\bhhhhh.exec:\bhhhhh.exe91⤵PID:3788
-
\??\c:\e88444.exec:\e88444.exe92⤵PID:2040
-
\??\c:\pdpjd.exec:\pdpjd.exe93⤵PID:2248
-
\??\c:\68060.exec:\68060.exe94⤵PID:1732
-
\??\c:\4040444.exec:\4040444.exe95⤵PID:2364
-
\??\c:\ttbbtt.exec:\ttbbtt.exe96⤵PID:2460
-
\??\c:\7djjj.exec:\7djjj.exe97⤵PID:4152
-
\??\c:\3dppv.exec:\3dppv.exe98⤵PID:3884
-
\??\c:\fxxxllf.exec:\fxxxllf.exe99⤵PID:4276
-
\??\c:\xrxxrrr.exec:\xrxxrrr.exe100⤵PID:364
-
\??\c:\tnhhhh.exec:\tnhhhh.exe101⤵PID:1628
-
\??\c:\5ntthh.exec:\5ntthh.exe102⤵PID:4020
-
\??\c:\lxffrrl.exec:\lxffrrl.exe103⤵PID:4484
-
\??\c:\jdjjd.exec:\jdjjd.exe104⤵PID:1012
-
\??\c:\2844440.exec:\2844440.exe105⤵PID:4340
-
\??\c:\9llfxxr.exec:\9llfxxr.exe106⤵PID:1608
-
\??\c:\4626004.exec:\4626004.exe107⤵PID:4860
-
\??\c:\04668.exec:\04668.exe108⤵PID:1616
-
\??\c:\u402002.exec:\u402002.exe109⤵PID:1504
-
\??\c:\008248.exec:\008248.exe110⤵PID:1776
-
\??\c:\0026884.exec:\0026884.exe111⤵PID:3952
-
\??\c:\q84426.exec:\q84426.exe112⤵PID:1000
-
\??\c:\hbtnht.exec:\hbtnht.exe113⤵PID:948
-
\??\c:\440488.exec:\440488.exe114⤵PID:3988
-
\??\c:\u228226.exec:\u228226.exe115⤵PID:4392
-
\??\c:\bbhhbb.exec:\bbhhbb.exe116⤵PID:116
-
\??\c:\ppjdd.exec:\ppjdd.exe117⤵PID:2052
-
\??\c:\jjjdv.exec:\jjjdv.exe118⤵PID:1144
-
\??\c:\666600.exec:\666600.exe119⤵PID:64
-
\??\c:\hnnnnn.exec:\hnnnnn.exe120⤵PID:740
-
\??\c:\dvdvp.exec:\dvdvp.exe121⤵PID:1696
-
\??\c:\004428.exec:\004428.exe122⤵PID:2200
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-