Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe
Resource
win7-20240903-en
General
-
Target
110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe
-
Size
83KB
-
MD5
d1d3e9489add38205e2bb5a88cdc7d00
-
SHA1
cd4b6082f7330245c821ea876beeca3891aa488f
-
SHA256
110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dc
-
SHA512
c0fdafa7447b52a17575c0c10a9a6cd3088b498ec7b59f1413ed76b79729b5249bb30d68a72e5b8cbf9b73efaf4b692db2721cad90df301e4d5a41f173b9291a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QD:ymb3NkkiQ3mdBjFIIp9L9QrrA8k
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/2604-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3364-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4612-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4388-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2460-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2984-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3312-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1192-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1192-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1600-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/748-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1744-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/544-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4684-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/220-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3884-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/884-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1240-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3364 8240006.exe 4000 o844888.exe 2848 fllfffr.exe 4612 62822.exe 1748 pjdpj.exe 4388 xrffrfx.exe 2460 1pvvj.exe 2984 pjjdj.exe 3312 rrlfffr.exe 1192 pdpdj.exe 2728 224226.exe 1600 nbnnbt.exe 748 026284.exe 1744 jppvv.exe 544 64204.exe 4588 c842266.exe 3624 vppvj.exe 4376 bhnhht.exe 1340 tttntt.exe 424 ffrrfff.exe 3908 dpjpj.exe 4492 rffxrfx.exe 4684 hnttth.exe 220 ddvpv.exe 1540 060020.exe 3884 o804444.exe 884 hntntn.exe 1240 8466000.exe 2912 62822.exe 2928 26882.exe 380 w86488.exe 3000 1vdvj.exe 752 tnbbth.exe 1320 84026.exe 4972 48044.exe 4232 6660000.exe 3520 vvjjv.exe 4252 hhbtnh.exe 1476 642422.exe 2976 068460.exe 2068 pvddd.exe 2292 28864.exe 3400 q28648.exe 1300 622604.exe 3076 68022.exe 4460 q88248.exe 5068 64486.exe 4556 2062626.exe 4576 602028.exe 920 dddvp.exe 4776 3nnbtn.exe 388 828484.exe 3428 220488.exe 3588 606806.exe 2300 60044.exe 5020 9jddj.exe 1020 3llxrll.exe 2984 fffflrr.exe 820 vjpvd.exe 3416 8804882.exe 620 fxfrfxl.exe 2728 5xxxxxx.exe 2212 4226886.exe 4412 hnhbnh.exe -
resource yara_rule behavioral2/memory/2604-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2604-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3364-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4612-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4388-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2460-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3312-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1192-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1600-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1744-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/544-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4684-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/220-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3884-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/884-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1240-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8886224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 024488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0444886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllrflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rlfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6408884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbth.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 3364 2604 110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe 83 PID 2604 wrote to memory of 3364 2604 110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe 83 PID 2604 wrote to memory of 3364 2604 110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe 83 PID 3364 wrote to memory of 4000 3364 8240006.exe 84 PID 3364 wrote to memory of 4000 3364 8240006.exe 84 PID 3364 wrote to memory of 4000 3364 8240006.exe 84 PID 4000 wrote to memory of 2848 4000 o844888.exe 85 PID 4000 wrote to memory of 2848 4000 o844888.exe 85 PID 4000 wrote to memory of 2848 4000 o844888.exe 85 PID 2848 wrote to memory of 4612 2848 fllfffr.exe 86 PID 2848 wrote to memory of 4612 2848 fllfffr.exe 86 PID 2848 wrote to memory of 4612 2848 fllfffr.exe 86 PID 4612 wrote to memory of 1748 4612 62822.exe 87 PID 4612 wrote to memory of 1748 4612 62822.exe 87 PID 4612 wrote to memory of 1748 4612 62822.exe 87 PID 1748 wrote to memory of 4388 1748 pjdpj.exe 88 PID 1748 wrote to memory of 4388 1748 pjdpj.exe 88 PID 1748 wrote to memory of 4388 1748 pjdpj.exe 88 PID 4388 wrote to memory of 2460 4388 xrffrfx.exe 89 PID 4388 wrote to memory of 2460 4388 xrffrfx.exe 89 PID 4388 wrote to memory of 2460 4388 xrffrfx.exe 89 PID 2460 wrote to memory of 2984 2460 1pvvj.exe 90 PID 2460 wrote to memory of 2984 2460 1pvvj.exe 90 PID 2460 wrote to memory of 2984 2460 1pvvj.exe 90 PID 2984 wrote to memory of 3312 2984 pjjdj.exe 91 PID 2984 wrote to memory of 3312 2984 pjjdj.exe 91 PID 2984 wrote to memory of 3312 2984 pjjdj.exe 91 PID 3312 wrote to memory of 1192 3312 rrlfffr.exe 92 PID 3312 wrote to memory of 1192 3312 rrlfffr.exe 92 PID 3312 wrote to memory of 1192 3312 rrlfffr.exe 92 PID 1192 wrote to memory of 2728 1192 pdpdj.exe 93 PID 1192 wrote to memory of 2728 1192 pdpdj.exe 93 PID 1192 wrote to memory of 2728 1192 pdpdj.exe 93 PID 2728 wrote to memory of 1600 2728 224226.exe 94 PID 2728 wrote to memory of 1600 2728 224226.exe 94 PID 2728 wrote to memory of 1600 2728 224226.exe 94 PID 1600 wrote to memory of 748 1600 nbnnbt.exe 95 PID 1600 wrote to memory of 748 1600 nbnnbt.exe 95 PID 1600 wrote to memory of 748 1600 nbnnbt.exe 95 PID 748 wrote to memory of 1744 748 026284.exe 96 PID 748 wrote to memory of 1744 748 026284.exe 96 PID 748 wrote to memory of 1744 748 026284.exe 96 PID 1744 wrote to memory of 544 1744 jppvv.exe 97 PID 1744 wrote to memory of 544 1744 jppvv.exe 97 PID 1744 wrote to memory of 544 1744 jppvv.exe 97 PID 544 wrote to memory of 4588 544 64204.exe 98 PID 544 wrote to memory of 4588 544 64204.exe 98 PID 544 wrote to memory of 4588 544 64204.exe 98 PID 4588 wrote to memory of 3624 4588 c842266.exe 99 PID 4588 wrote to memory of 3624 4588 c842266.exe 99 PID 4588 wrote to memory of 3624 4588 c842266.exe 99 PID 3624 wrote to memory of 4376 3624 vppvj.exe 100 PID 3624 wrote to memory of 4376 3624 vppvj.exe 100 PID 3624 wrote to memory of 4376 3624 vppvj.exe 100 PID 4376 wrote to memory of 1340 4376 bhnhht.exe 101 PID 4376 wrote to memory of 1340 4376 bhnhht.exe 101 PID 4376 wrote to memory of 1340 4376 bhnhht.exe 101 PID 1340 wrote to memory of 424 1340 tttntt.exe 102 PID 1340 wrote to memory of 424 1340 tttntt.exe 102 PID 1340 wrote to memory of 424 1340 tttntt.exe 102 PID 424 wrote to memory of 3908 424 ffrrfff.exe 103 PID 424 wrote to memory of 3908 424 ffrrfff.exe 103 PID 424 wrote to memory of 3908 424 ffrrfff.exe 103 PID 3908 wrote to memory of 4492 3908 dpjpj.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe"C:\Users\Admin\AppData\Local\Temp\110fd24f8b5be837137b074536d0f9b7c0dcf6b6f2ca1eb996bfbc1bbb1a09dcN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\8240006.exec:\8240006.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
\??\c:\o844888.exec:\o844888.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\fllfffr.exec:\fllfffr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\62822.exec:\62822.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\pjdpj.exec:\pjdpj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\xrffrfx.exec:\xrffrfx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
\??\c:\1pvvj.exec:\1pvvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\pjjdj.exec:\pjjdj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\rrlfffr.exec:\rrlfffr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\pdpdj.exec:\pdpdj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
\??\c:\224226.exec:\224226.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\nbnnbt.exec:\nbnnbt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\026284.exec:\026284.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\jppvv.exec:\jppvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\64204.exec:\64204.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\c842266.exec:\c842266.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\vppvj.exec:\vppvj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\bhnhht.exec:\bhnhht.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\tttntt.exec:\tttntt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
\??\c:\ffrrfff.exec:\ffrrfff.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:424 -
\??\c:\dpjpj.exec:\dpjpj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\rffxrfx.exec:\rffxrfx.exe23⤵
- Executes dropped EXE
PID:4492 -
\??\c:\hnttth.exec:\hnttth.exe24⤵
- Executes dropped EXE
PID:4684 -
\??\c:\ddvpv.exec:\ddvpv.exe25⤵
- Executes dropped EXE
PID:220 -
\??\c:\060020.exec:\060020.exe26⤵
- Executes dropped EXE
PID:1540 -
\??\c:\o804444.exec:\o804444.exe27⤵
- Executes dropped EXE
PID:3884 -
\??\c:\hntntn.exec:\hntntn.exe28⤵
- Executes dropped EXE
PID:884 -
\??\c:\8466000.exec:\8466000.exe29⤵
- Executes dropped EXE
PID:1240 -
\??\c:\62822.exec:\62822.exe30⤵
- Executes dropped EXE
PID:2912 -
\??\c:\26882.exec:\26882.exe31⤵
- Executes dropped EXE
PID:2928 -
\??\c:\w86488.exec:\w86488.exe32⤵
- Executes dropped EXE
PID:380 -
\??\c:\1vdvj.exec:\1vdvj.exe33⤵
- Executes dropped EXE
PID:3000 -
\??\c:\tnbbth.exec:\tnbbth.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752 -
\??\c:\84026.exec:\84026.exe35⤵
- Executes dropped EXE
PID:1320 -
\??\c:\48044.exec:\48044.exe36⤵
- Executes dropped EXE
PID:4972 -
\??\c:\6660000.exec:\6660000.exe37⤵
- Executes dropped EXE
PID:4232 -
\??\c:\vvjjv.exec:\vvjjv.exe38⤵
- Executes dropped EXE
PID:3520 -
\??\c:\hhbtnh.exec:\hhbtnh.exe39⤵
- Executes dropped EXE
PID:4252 -
\??\c:\642422.exec:\642422.exe40⤵
- Executes dropped EXE
PID:1476 -
\??\c:\068460.exec:\068460.exe41⤵
- Executes dropped EXE
PID:2976 -
\??\c:\pvddd.exec:\pvddd.exe42⤵
- Executes dropped EXE
PID:2068 -
\??\c:\28864.exec:\28864.exe43⤵
- Executes dropped EXE
PID:2292 -
\??\c:\q28648.exec:\q28648.exe44⤵
- Executes dropped EXE
PID:3400 -
\??\c:\622604.exec:\622604.exe45⤵
- Executes dropped EXE
PID:1300 -
\??\c:\68022.exec:\68022.exe46⤵
- Executes dropped EXE
PID:3076 -
\??\c:\q88248.exec:\q88248.exe47⤵
- Executes dropped EXE
PID:4460 -
\??\c:\64486.exec:\64486.exe48⤵
- Executes dropped EXE
PID:5068 -
\??\c:\2062626.exec:\2062626.exe49⤵
- Executes dropped EXE
PID:4556 -
\??\c:\602028.exec:\602028.exe50⤵
- Executes dropped EXE
PID:4576 -
\??\c:\dddvp.exec:\dddvp.exe51⤵
- Executes dropped EXE
PID:920 -
\??\c:\3nnbtn.exec:\3nnbtn.exe52⤵
- Executes dropped EXE
PID:4776 -
\??\c:\828484.exec:\828484.exe53⤵
- Executes dropped EXE
PID:388 -
\??\c:\220488.exec:\220488.exe54⤵
- Executes dropped EXE
PID:3428 -
\??\c:\606806.exec:\606806.exe55⤵
- Executes dropped EXE
PID:3588 -
\??\c:\60044.exec:\60044.exe56⤵
- Executes dropped EXE
PID:2300 -
\??\c:\9jddj.exec:\9jddj.exe57⤵
- Executes dropped EXE
PID:5020 -
\??\c:\3llxrll.exec:\3llxrll.exe58⤵
- Executes dropped EXE
PID:1020 -
\??\c:\fffflrr.exec:\fffflrr.exe59⤵
- Executes dropped EXE
PID:2984 -
\??\c:\vjpvd.exec:\vjpvd.exe60⤵
- Executes dropped EXE
PID:820 -
\??\c:\8804882.exec:\8804882.exe61⤵
- Executes dropped EXE
PID:3416 -
\??\c:\fxfrfxl.exec:\fxfrfxl.exe62⤵
- Executes dropped EXE
PID:620 -
\??\c:\5xxxxxx.exec:\5xxxxxx.exe63⤵
- Executes dropped EXE
PID:2728 -
\??\c:\4226886.exec:\4226886.exe64⤵
- Executes dropped EXE
PID:2212 -
\??\c:\hnhbnh.exec:\hnhbnh.exe65⤵
- Executes dropped EXE
PID:4412 -
\??\c:\62066.exec:\62066.exe66⤵PID:1312
-
\??\c:\djjjj.exec:\djjjj.exe67⤵PID:5076
-
\??\c:\i480448.exec:\i480448.exe68⤵PID:4516
-
\??\c:\q68828.exec:\q68828.exe69⤵PID:4900
-
\??\c:\vvjdv.exec:\vvjdv.exe70⤵PID:4368
-
\??\c:\hbhhhh.exec:\hbhhhh.exe71⤵PID:432
-
\??\c:\1dvvv.exec:\1dvvv.exe72⤵PID:3772
-
\??\c:\ppddj.exec:\ppddj.exe73⤵PID:5028
-
\??\c:\ntbhhn.exec:\ntbhhn.exe74⤵PID:424
-
\??\c:\6866600.exec:\6866600.exe75⤵PID:1836
-
\??\c:\vpvpj.exec:\vpvpj.exe76⤵PID:4820
-
\??\c:\86826.exec:\86826.exe77⤵PID:2452
-
\??\c:\ppvpv.exec:\ppvpv.exe78⤵PID:4684
-
\??\c:\e20062.exec:\e20062.exe79⤵PID:1480
-
\??\c:\i088000.exec:\i088000.exe80⤵PID:3820
-
\??\c:\028822.exec:\028822.exe81⤵PID:5044
-
\??\c:\hhbbhh.exec:\hhbbhh.exe82⤵PID:1912
-
\??\c:\c602662.exec:\c602662.exe83⤵PID:4080
-
\??\c:\m0406.exec:\m0406.exe84⤵PID:384
-
\??\c:\06608.exec:\06608.exe85⤵PID:1236
-
\??\c:\5rxlrxr.exec:\5rxlrxr.exe86⤵PID:1036
-
\??\c:\a0606.exec:\a0606.exe87⤵PID:2784
-
\??\c:\0422886.exec:\0422886.exe88⤵PID:4456
-
\??\c:\u826048.exec:\u826048.exe89⤵PID:3164
-
\??\c:\08088.exec:\08088.exe90⤵PID:4792
-
\??\c:\c284600.exec:\c284600.exe91⤵PID:4796
-
\??\c:\xrlrfxr.exec:\xrlrfxr.exe92⤵PID:4568
-
\??\c:\4804480.exec:\4804480.exe93⤵PID:1844
-
\??\c:\1fxrlfx.exec:\1fxrlfx.exe94⤵PID:640
-
\??\c:\002888.exec:\002888.exe95⤵PID:3904
-
\??\c:\08602.exec:\08602.exe96⤵PID:2288
-
\??\c:\7hnhnb.exec:\7hnhnb.exe97⤵PID:2652
-
\??\c:\jpppd.exec:\jpppd.exe98⤵PID:3656
-
\??\c:\6860486.exec:\6860486.exe99⤵PID:2524
-
\??\c:\6006044.exec:\6006044.exe100⤵PID:1464
-
\??\c:\204826.exec:\204826.exe101⤵PID:1160
-
\??\c:\64088.exec:\64088.exe102⤵PID:3152
-
\??\c:\8248800.exec:\8248800.exe103⤵PID:4336
-
\??\c:\fffxlfx.exec:\fffxlfx.exe104⤵PID:4596
-
\??\c:\dpvpp.exec:\dpvpp.exe105⤵PID:2528
-
\??\c:\3pjpp.exec:\3pjpp.exe106⤵PID:2256
-
\??\c:\i404222.exec:\i404222.exe107⤵PID:4600
-
\??\c:\w40000.exec:\w40000.exe108⤵PID:2356
-
\??\c:\8208844.exec:\8208844.exe109⤵PID:920
-
\??\c:\7dvvv.exec:\7dvvv.exe110⤵PID:4776
-
\??\c:\djvvd.exec:\djvvd.exe111⤵PID:3996
-
\??\c:\fxxxrfx.exec:\fxxxrfx.exe112⤵PID:4112
-
\??\c:\hnttnn.exec:\hnttnn.exe113⤵PID:3560
-
\??\c:\jddvd.exec:\jddvd.exe114⤵PID:2300
-
\??\c:\064226.exec:\064226.exe115⤵PID:3108
-
\??\c:\rlxxrlf.exec:\rlxxrlf.exe116⤵
- System Location Discovery: System Language Discovery
PID:1020 -
\??\c:\48444.exec:\48444.exe117⤵PID:2984
-
\??\c:\264402.exec:\264402.exe118⤵PID:2540
-
\??\c:\m2844.exec:\m2844.exe119⤵PID:3568
-
\??\c:\vvppp.exec:\vvppp.exe120⤵PID:620
-
\??\c:\a8600.exec:\a8600.exe121⤵PID:2728
-
\??\c:\62842.exec:\62842.exe122⤵PID:1140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-