Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe
Resource
win7-20240903-en
General
-
Target
e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe
-
Size
83KB
-
MD5
cd2fde1720a881eba4eb87e33be52a30
-
SHA1
3304e72b8218b518a3dbf3550ba307da0bb536a6
-
SHA256
e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1
-
SHA512
e15c589ab1a88c0b5e8406578bcc168065859c5043d5eb5a4a4e7ab15cd76f5c6d81391002249f7bb8a419cb45da76f9713227b84a5f7edc55ead7942bbebfb1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Qz:ymb3NkkiQ3mdBjFIIp9L9QrrA8C
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/2156-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/844-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3284-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5060-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1876-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2824-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4296-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2004-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/640-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1672-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3860-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4676-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3176-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1244-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 844 jdvpp.exe 3284 lrlxlrr.exe 5060 086420.exe 1876 4626060.exe 3692 4280222.exe 4592 rxllrff.exe 3088 rxffxxl.exe 2108 vdddd.exe 2824 tnnnhb.exe 3556 046408.exe 4296 1pjpd.exe 2004 o848288.exe 640 frrrllf.exe 1648 e28226.exe 3668 pjvvv.exe 60 062260.exe 1672 vvvpj.exe 3748 08844.exe 3860 046048.exe 4676 464440.exe 3484 3flfxfx.exe 3476 884266.exe 2420 jdjvp.exe 5100 rrxrrrr.exe 4792 nhttbt.exe 4440 02042.exe 720 vjvpv.exe 3176 6802008.exe 1244 vdjjd.exe 1224 2040200.exe 1524 pddvp.exe 4884 4244006.exe 4876 xflrrxr.exe 3912 jdddp.exe 4732 xfllfff.exe 5024 600044.exe 1064 624848.exe 1420 480060.exe 2268 6068206.exe 3956 2484444.exe 4136 484822.exe 3552 0866448.exe 4468 0288260.exe 3212 llfxrrr.exe 804 pjjdv.exe 3252 82820.exe 4148 480240.exe 1828 c282660.exe 4000 tttnnn.exe 4008 4426660.exe 2112 e00044.exe 3580 hbhntb.exe 1280 8022600.exe 4592 7thbtt.exe 4436 xrrrfff.exe 4204 fxllffl.exe 2980 260200.exe 4580 llfrlff.exe 4624 e28044.exe 1688 4404200.exe 3204 46260.exe 4296 dvjdp.exe 3576 fffxrlx.exe 2608 dpjvj.exe -
resource yara_rule behavioral2/memory/2156-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3284-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2824-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4296-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2004-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/640-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3860-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4676-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1244-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-217-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w24840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u444444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 844 2156 e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe 82 PID 2156 wrote to memory of 844 2156 e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe 82 PID 2156 wrote to memory of 844 2156 e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe 82 PID 844 wrote to memory of 3284 844 jdvpp.exe 83 PID 844 wrote to memory of 3284 844 jdvpp.exe 83 PID 844 wrote to memory of 3284 844 jdvpp.exe 83 PID 3284 wrote to memory of 5060 3284 lrlxlrr.exe 84 PID 3284 wrote to memory of 5060 3284 lrlxlrr.exe 84 PID 3284 wrote to memory of 5060 3284 lrlxlrr.exe 84 PID 5060 wrote to memory of 1876 5060 086420.exe 85 PID 5060 wrote to memory of 1876 5060 086420.exe 85 PID 5060 wrote to memory of 1876 5060 086420.exe 85 PID 1876 wrote to memory of 3692 1876 4626060.exe 86 PID 1876 wrote to memory of 3692 1876 4626060.exe 86 PID 1876 wrote to memory of 3692 1876 4626060.exe 86 PID 3692 wrote to memory of 4592 3692 4280222.exe 87 PID 3692 wrote to memory of 4592 3692 4280222.exe 87 PID 3692 wrote to memory of 4592 3692 4280222.exe 87 PID 4592 wrote to memory of 3088 4592 rxllrff.exe 88 PID 4592 wrote to memory of 3088 4592 rxllrff.exe 88 PID 4592 wrote to memory of 3088 4592 rxllrff.exe 88 PID 3088 wrote to memory of 2108 3088 rxffxxl.exe 89 PID 3088 wrote to memory of 2108 3088 rxffxxl.exe 89 PID 3088 wrote to memory of 2108 3088 rxffxxl.exe 89 PID 2108 wrote to memory of 2824 2108 vdddd.exe 90 PID 2108 wrote to memory of 2824 2108 vdddd.exe 90 PID 2108 wrote to memory of 2824 2108 vdddd.exe 90 PID 2824 wrote to memory of 3556 2824 tnnnhb.exe 91 PID 2824 wrote to memory of 3556 2824 tnnnhb.exe 91 PID 2824 wrote to memory of 3556 2824 tnnnhb.exe 91 PID 3556 wrote to memory of 4296 3556 046408.exe 92 PID 3556 wrote to memory of 4296 3556 046408.exe 92 PID 3556 wrote to memory of 4296 3556 046408.exe 92 PID 4296 wrote to memory of 2004 4296 1pjpd.exe 93 PID 4296 wrote to memory of 2004 4296 1pjpd.exe 93 PID 4296 wrote to memory of 2004 4296 1pjpd.exe 93 PID 2004 wrote to memory of 640 2004 o848288.exe 94 PID 2004 wrote to memory of 640 2004 o848288.exe 94 PID 2004 wrote to memory of 640 2004 o848288.exe 94 PID 640 wrote to memory of 1648 640 frrrllf.exe 95 PID 640 wrote to memory of 1648 640 frrrllf.exe 95 PID 640 wrote to memory of 1648 640 frrrllf.exe 95 PID 1648 wrote to memory of 3668 1648 e28226.exe 96 PID 1648 wrote to memory of 3668 1648 e28226.exe 96 PID 1648 wrote to memory of 3668 1648 e28226.exe 96 PID 3668 wrote to memory of 60 3668 pjvvv.exe 97 PID 3668 wrote to memory of 60 3668 pjvvv.exe 97 PID 3668 wrote to memory of 60 3668 pjvvv.exe 97 PID 60 wrote to memory of 1672 60 062260.exe 98 PID 60 wrote to memory of 1672 60 062260.exe 98 PID 60 wrote to memory of 1672 60 062260.exe 98 PID 1672 wrote to memory of 3748 1672 vvvpj.exe 99 PID 1672 wrote to memory of 3748 1672 vvvpj.exe 99 PID 1672 wrote to memory of 3748 1672 vvvpj.exe 99 PID 3748 wrote to memory of 3860 3748 08844.exe 100 PID 3748 wrote to memory of 3860 3748 08844.exe 100 PID 3748 wrote to memory of 3860 3748 08844.exe 100 PID 3860 wrote to memory of 4676 3860 046048.exe 101 PID 3860 wrote to memory of 4676 3860 046048.exe 101 PID 3860 wrote to memory of 4676 3860 046048.exe 101 PID 4676 wrote to memory of 3484 4676 464440.exe 102 PID 4676 wrote to memory of 3484 4676 464440.exe 102 PID 4676 wrote to memory of 3484 4676 464440.exe 102 PID 3484 wrote to memory of 3476 3484 3flfxfx.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe"C:\Users\Admin\AppData\Local\Temp\e504885c56c6ba6a298092c1d058a594960b96133bef4cc8599640679ccf95d1N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\jdvpp.exec:\jdvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
\??\c:\lrlxlrr.exec:\lrlxlrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
\??\c:\086420.exec:\086420.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\4626060.exec:\4626060.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\4280222.exec:\4280222.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\rxllrff.exec:\rxllrff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\rxffxxl.exec:\rxffxxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\vdddd.exec:\vdddd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\tnnnhb.exec:\tnnnhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\046408.exec:\046408.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\1pjpd.exec:\1pjpd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
\??\c:\o848288.exec:\o848288.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\frrrllf.exec:\frrrllf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\e28226.exec:\e28226.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\pjvvv.exec:\pjvvv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\062260.exec:\062260.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
\??\c:\vvvpj.exec:\vvvpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\08844.exec:\08844.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
\??\c:\046048.exec:\046048.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\464440.exec:\464440.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
\??\c:\3flfxfx.exec:\3flfxfx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
\??\c:\884266.exec:\884266.exe23⤵
- Executes dropped EXE
PID:3476 -
\??\c:\jdjvp.exec:\jdjvp.exe24⤵
- Executes dropped EXE
PID:2420 -
\??\c:\rrxrrrr.exec:\rrxrrrr.exe25⤵
- Executes dropped EXE
PID:5100 -
\??\c:\nhttbt.exec:\nhttbt.exe26⤵
- Executes dropped EXE
PID:4792 -
\??\c:\02042.exec:\02042.exe27⤵
- Executes dropped EXE
PID:4440 -
\??\c:\vjvpv.exec:\vjvpv.exe28⤵
- Executes dropped EXE
PID:720 -
\??\c:\6802008.exec:\6802008.exe29⤵
- Executes dropped EXE
PID:3176 -
\??\c:\vdjjd.exec:\vdjjd.exe30⤵
- Executes dropped EXE
PID:1244 -
\??\c:\2040200.exec:\2040200.exe31⤵
- Executes dropped EXE
PID:1224 -
\??\c:\pddvp.exec:\pddvp.exe32⤵
- Executes dropped EXE
PID:1524 -
\??\c:\4244006.exec:\4244006.exe33⤵
- Executes dropped EXE
PID:4884 -
\??\c:\xflrrxr.exec:\xflrrxr.exe34⤵
- Executes dropped EXE
PID:4876 -
\??\c:\jdddp.exec:\jdddp.exe35⤵
- Executes dropped EXE
PID:3912 -
\??\c:\xfllfff.exec:\xfllfff.exe36⤵
- Executes dropped EXE
PID:4732 -
\??\c:\600044.exec:\600044.exe37⤵
- Executes dropped EXE
PID:5024 -
\??\c:\624848.exec:\624848.exe38⤵
- Executes dropped EXE
PID:1064 -
\??\c:\480060.exec:\480060.exe39⤵
- Executes dropped EXE
PID:1420 -
\??\c:\6068206.exec:\6068206.exe40⤵
- Executes dropped EXE
PID:2268 -
\??\c:\2484444.exec:\2484444.exe41⤵
- Executes dropped EXE
PID:3956 -
\??\c:\484822.exec:\484822.exe42⤵
- Executes dropped EXE
PID:4136 -
\??\c:\0866448.exec:\0866448.exe43⤵
- Executes dropped EXE
PID:3552 -
\??\c:\0288260.exec:\0288260.exe44⤵
- Executes dropped EXE
PID:4468 -
\??\c:\llfxrrr.exec:\llfxrrr.exe45⤵
- Executes dropped EXE
PID:3212 -
\??\c:\pjjdv.exec:\pjjdv.exe46⤵
- Executes dropped EXE
PID:804 -
\??\c:\82820.exec:\82820.exe47⤵
- Executes dropped EXE
PID:3252 -
\??\c:\480240.exec:\480240.exe48⤵
- Executes dropped EXE
PID:4148 -
\??\c:\c282660.exec:\c282660.exe49⤵
- Executes dropped EXE
PID:1828 -
\??\c:\tttnnn.exec:\tttnnn.exe50⤵
- Executes dropped EXE
PID:4000 -
\??\c:\4426660.exec:\4426660.exe51⤵
- Executes dropped EXE
PID:4008 -
\??\c:\e00044.exec:\e00044.exe52⤵
- Executes dropped EXE
PID:2112 -
\??\c:\hbhntb.exec:\hbhntb.exe53⤵
- Executes dropped EXE
PID:3580 -
\??\c:\8022600.exec:\8022600.exe54⤵
- Executes dropped EXE
PID:1280 -
\??\c:\7thbtt.exec:\7thbtt.exe55⤵
- Executes dropped EXE
PID:4592 -
\??\c:\xrrrfff.exec:\xrrrfff.exe56⤵
- Executes dropped EXE
PID:4436 -
\??\c:\fxllffl.exec:\fxllffl.exe57⤵
- Executes dropped EXE
PID:4204 -
\??\c:\260200.exec:\260200.exe58⤵
- Executes dropped EXE
PID:2980 -
\??\c:\llfrlff.exec:\llfrlff.exe59⤵
- Executes dropped EXE
PID:4580 -
\??\c:\e28044.exec:\e28044.exe60⤵
- Executes dropped EXE
PID:4624 -
\??\c:\4404200.exec:\4404200.exe61⤵
- Executes dropped EXE
PID:1688 -
\??\c:\46260.exec:\46260.exe62⤵
- Executes dropped EXE
PID:3204 -
\??\c:\dvjdp.exec:\dvjdp.exe63⤵
- Executes dropped EXE
PID:4296 -
\??\c:\fffxrlx.exec:\fffxrlx.exe64⤵
- Executes dropped EXE
PID:3576 -
\??\c:\dpjvj.exec:\dpjvj.exe65⤵
- Executes dropped EXE
PID:2608 -
\??\c:\688688.exec:\688688.exe66⤵PID:2476
-
\??\c:\9djdv.exec:\9djdv.exe67⤵PID:1516
-
\??\c:\pvvpd.exec:\pvvpd.exe68⤵PID:3668
-
\??\c:\xxflrfx.exec:\xxflrfx.exe69⤵PID:512
-
\??\c:\q88888.exec:\q88888.exe70⤵PID:60
-
\??\c:\jvppj.exec:\jvppj.exe71⤵PID:1464
-
\??\c:\fflfxrl.exec:\fflfxrl.exe72⤵PID:3096
-
\??\c:\pppjd.exec:\pppjd.exe73⤵
- System Location Discovery: System Language Discovery
PID:4016 -
\??\c:\4800826.exec:\4800826.exe74⤵PID:3688
-
\??\c:\m8820.exec:\m8820.exe75⤵PID:4340
-
\??\c:\rrrllll.exec:\rrrllll.exe76⤵PID:4932
-
\??\c:\4064888.exec:\4064888.exe77⤵PID:4228
-
\??\c:\xllrrxx.exec:\xllrrxx.exe78⤵PID:4552
-
\??\c:\vpvdd.exec:\vpvdd.exe79⤵PID:5056
-
\??\c:\02882.exec:\02882.exe80⤵PID:3936
-
\??\c:\842088.exec:\842088.exe81⤵PID:3488
-
\??\c:\88486.exec:\88486.exe82⤵PID:1732
-
\??\c:\thtttt.exec:\thtttt.exe83⤵PID:1968
-
\??\c:\pddpj.exec:\pddpj.exe84⤵PID:4620
-
\??\c:\60204.exec:\60204.exe85⤵PID:2080
-
\??\c:\jjpjd.exec:\jjpjd.exe86⤵PID:2324
-
\??\c:\0400448.exec:\0400448.exe87⤵PID:4860
-
\??\c:\4824822.exec:\4824822.exe88⤵PID:2264
-
\??\c:\6044826.exec:\6044826.exe89⤵PID:2620
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe90⤵PID:4992
-
\??\c:\3lllfxr.exec:\3lllfxr.exe91⤵PID:2288
-
\??\c:\k80028.exec:\k80028.exe92⤵PID:2452
-
\??\c:\jddvv.exec:\jddvv.exe93⤵PID:4928
-
\??\c:\4004826.exec:\4004826.exe94⤵PID:4428
-
\??\c:\bbnhhh.exec:\bbnhhh.exe95⤵PID:4608
-
\??\c:\i248204.exec:\i248204.exe96⤵PID:2384
-
\??\c:\djddv.exec:\djddv.exe97⤵PID:2756
-
\??\c:\5jjdv.exec:\5jjdv.exe98⤵PID:2852
-
\??\c:\q40086.exec:\q40086.exe99⤵PID:4444
-
\??\c:\pjjvj.exec:\pjjvj.exe100⤵PID:812
-
\??\c:\4884260.exec:\4884260.exe101⤵PID:4468
-
\??\c:\hbtttn.exec:\hbtttn.exe102⤵PID:460
-
\??\c:\rxrfrlf.exec:\rxrfrlf.exe103⤵PID:2784
-
\??\c:\nhbtbb.exec:\nhbtbb.exe104⤵PID:4940
-
\??\c:\2288662.exec:\2288662.exe105⤵PID:4232
-
\??\c:\2460004.exec:\2460004.exe106⤵PID:840
-
\??\c:\jdddd.exec:\jdddd.exe107⤵PID:2644
-
\??\c:\vddvj.exec:\vddvj.exe108⤵PID:4116
-
\??\c:\42222.exec:\42222.exe109⤵PID:3700
-
\??\c:\08084.exec:\08084.exe110⤵PID:3396
-
\??\c:\6248660.exec:\6248660.exe111⤵PID:756
-
\??\c:\8622888.exec:\8622888.exe112⤵PID:3492
-
\??\c:\a6044.exec:\a6044.exe113⤵PID:3088
-
\??\c:\vpjvd.exec:\vpjvd.exe114⤵PID:2440
-
\??\c:\jpvpj.exec:\jpvpj.exe115⤵PID:5068
-
\??\c:\pjvpv.exec:\pjvpv.exe116⤵PID:4580
-
\??\c:\024248.exec:\024248.exe117⤵PID:4624
-
\??\c:\bnnbnh.exec:\bnnbnh.exe118⤵PID:3880
-
\??\c:\htnhtn.exec:\htnhtn.exe119⤵PID:3204
-
\??\c:\42044.exec:\42044.exe120⤵PID:3304
-
\??\c:\nttnbt.exec:\nttnbt.exe121⤵PID:3576
-
\??\c:\dppjp.exec:\dppjp.exe122⤵PID:2608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-