Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 07:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe
-
Size
298KB
-
MD5
54df9ac7d36d7ba1259a43c114ec5ce0
-
SHA1
ee9aa1bfbbcf37abe0490c3802099caadd9041ad
-
SHA256
30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834e
-
SHA512
457e144f3402c143fab04b7fdb5cfcd705bc12df45c261c25f716e9b7cd5fe002f53d1d96fa116fd8ff1283e6fd3d76bf9cb54e87c511804f4ffeadf1e0bb9a8
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvs:n3C9uDVOXLmHBKWyn+Pgvs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 29 IoCs
resource yara_rule behavioral2/memory/3680-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3680-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1444-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4436-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2172-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1588-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1696-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1140-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1516-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2800-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1092-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4212-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2176-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/996-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3932-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1708-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/740-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2588-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1812-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4588-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4296-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4884-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4436 pjpjd.exe 1444 jdjpv.exe 2172 8826082.exe 4492 6226600.exe 1588 u866442.exe 1696 02288.exe 1140 0662666.exe 1768 664600.exe 5052 3ppjd.exe 1516 280488.exe 2800 640460.exe 1092 a8482.exe 4212 vpjjj.exe 2176 042622.exe 1548 w24448.exe 996 lffxxfx.exe 3932 lllfxfr.exe 3724 bntnhb.exe 1708 bhtnhh.exe 3948 288260.exe 740 60842.exe 4196 1frlffx.exe 2588 rlrrlrr.exe 5020 dpppj.exe 1812 jdjdv.exe 4588 tbnnnt.exe 1684 a2260.exe 4296 lffxrrl.exe 3652 djppj.exe 4000 8444440.exe 4884 jjjdv.exe 3032 240426.exe 2748 640848.exe 4576 i464882.exe 1088 44882.exe 1536 266626.exe 3188 i842660.exe 2076 u848288.exe 2372 ddjdd.exe 4836 pppjd.exe 1520 26004.exe 2284 dvpjd.exe 4168 6626000.exe 2236 9pppj.exe 4916 bbbtnn.exe 1624 4000444.exe 712 dvvpp.exe 1636 062200.exe 1352 c288266.exe 2072 hhhbtt.exe 2388 0686046.exe 1824 rxxxllf.exe 3524 488266.exe 5080 8828660.exe 1432 48826.exe 2664 hbtbth.exe 4772 k04044.exe 3968 04228.exe 1860 bbhbtt.exe 1092 w84480.exe 5012 vpvdp.exe 3204 2004488.exe 1252 5dvvp.exe 4820 a2442.exe -
resource yara_rule behavioral2/memory/3680-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3680-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1444-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2172-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1588-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1588-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2800-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1092-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4212-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2176-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/996-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1708-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/740-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2588-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1812-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4296-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4884-211-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 844860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxlxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i868682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4828044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xlfrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i842042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i848480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w44004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4286042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4436 3680 30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe 83 PID 3680 wrote to memory of 4436 3680 30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe 83 PID 3680 wrote to memory of 4436 3680 30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe 83 PID 4436 wrote to memory of 1444 4436 pjpjd.exe 84 PID 4436 wrote to memory of 1444 4436 pjpjd.exe 84 PID 4436 wrote to memory of 1444 4436 pjpjd.exe 84 PID 1444 wrote to memory of 2172 1444 jdjpv.exe 85 PID 1444 wrote to memory of 2172 1444 jdjpv.exe 85 PID 1444 wrote to memory of 2172 1444 jdjpv.exe 85 PID 2172 wrote to memory of 4492 2172 8826082.exe 86 PID 2172 wrote to memory of 4492 2172 8826082.exe 86 PID 2172 wrote to memory of 4492 2172 8826082.exe 86 PID 4492 wrote to memory of 1588 4492 6226600.exe 87 PID 4492 wrote to memory of 1588 4492 6226600.exe 87 PID 4492 wrote to memory of 1588 4492 6226600.exe 87 PID 1588 wrote to memory of 1696 1588 u866442.exe 88 PID 1588 wrote to memory of 1696 1588 u866442.exe 88 PID 1588 wrote to memory of 1696 1588 u866442.exe 88 PID 1696 wrote to memory of 1140 1696 02288.exe 89 PID 1696 wrote to memory of 1140 1696 02288.exe 89 PID 1696 wrote to memory of 1140 1696 02288.exe 89 PID 1140 wrote to memory of 1768 1140 0662666.exe 90 PID 1140 wrote to memory of 1768 1140 0662666.exe 90 PID 1140 wrote to memory of 1768 1140 0662666.exe 90 PID 1768 wrote to memory of 5052 1768 664600.exe 91 PID 1768 wrote to memory of 5052 1768 664600.exe 91 PID 1768 wrote to memory of 5052 1768 664600.exe 91 PID 5052 wrote to memory of 1516 5052 3ppjd.exe 92 PID 5052 wrote to memory of 1516 5052 3ppjd.exe 92 PID 5052 wrote to memory of 1516 5052 3ppjd.exe 92 PID 1516 wrote to memory of 2800 1516 280488.exe 93 PID 1516 wrote to memory of 2800 1516 280488.exe 93 PID 1516 wrote to memory of 2800 1516 280488.exe 93 PID 2800 wrote to memory of 1092 2800 640460.exe 94 PID 2800 wrote to memory of 1092 2800 640460.exe 94 PID 2800 wrote to memory of 1092 2800 640460.exe 94 PID 1092 wrote to memory of 4212 1092 a8482.exe 95 PID 1092 wrote to memory of 4212 1092 a8482.exe 95 PID 1092 wrote to memory of 4212 1092 a8482.exe 95 PID 4212 wrote to memory of 2176 4212 vpjjj.exe 96 PID 4212 wrote to memory of 2176 4212 vpjjj.exe 96 PID 4212 wrote to memory of 2176 4212 vpjjj.exe 96 PID 2176 wrote to memory of 1548 2176 042622.exe 97 PID 2176 wrote to memory of 1548 2176 042622.exe 97 PID 2176 wrote to memory of 1548 2176 042622.exe 97 PID 1548 wrote to memory of 996 1548 w24448.exe 98 PID 1548 wrote to memory of 996 1548 w24448.exe 98 PID 1548 wrote to memory of 996 1548 w24448.exe 98 PID 996 wrote to memory of 3932 996 lffxxfx.exe 99 PID 996 wrote to memory of 3932 996 lffxxfx.exe 99 PID 996 wrote to memory of 3932 996 lffxxfx.exe 99 PID 3932 wrote to memory of 3724 3932 lllfxfr.exe 100 PID 3932 wrote to memory of 3724 3932 lllfxfr.exe 100 PID 3932 wrote to memory of 3724 3932 lllfxfr.exe 100 PID 3724 wrote to memory of 1708 3724 bntnhb.exe 101 PID 3724 wrote to memory of 1708 3724 bntnhb.exe 101 PID 3724 wrote to memory of 1708 3724 bntnhb.exe 101 PID 1708 wrote to memory of 3948 1708 bhtnhh.exe 102 PID 1708 wrote to memory of 3948 1708 bhtnhh.exe 102 PID 1708 wrote to memory of 3948 1708 bhtnhh.exe 102 PID 3948 wrote to memory of 740 3948 288260.exe 103 PID 3948 wrote to memory of 740 3948 288260.exe 103 PID 3948 wrote to memory of 740 3948 288260.exe 103 PID 740 wrote to memory of 4196 740 60842.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe"C:\Users\Admin\AppData\Local\Temp\30a3bc79dae20581b18f0e262172570ad2b41614dad616e8475e9314be34834eN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\pjpjd.exec:\pjpjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
\??\c:\jdjpv.exec:\jdjpv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
\??\c:\8826082.exec:\8826082.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\6226600.exec:\6226600.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
\??\c:\u866442.exec:\u866442.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\02288.exec:\02288.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\0662666.exec:\0662666.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
\??\c:\664600.exec:\664600.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\3ppjd.exec:\3ppjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\280488.exec:\280488.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\640460.exec:\640460.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\a8482.exec:\a8482.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
\??\c:\vpjjj.exec:\vpjjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\042622.exec:\042622.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\w24448.exec:\w24448.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\lffxxfx.exec:\lffxxfx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\lllfxfr.exec:\lllfxfr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\bntnhb.exec:\bntnhb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\bhtnhh.exec:\bhtnhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\288260.exec:\288260.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\60842.exec:\60842.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\1frlffx.exec:\1frlffx.exe23⤵
- Executes dropped EXE
PID:4196 -
\??\c:\rlrrlrr.exec:\rlrrlrr.exe24⤵
- Executes dropped EXE
PID:2588 -
\??\c:\dpppj.exec:\dpppj.exe25⤵
- Executes dropped EXE
PID:5020 -
\??\c:\jdjdv.exec:\jdjdv.exe26⤵
- Executes dropped EXE
PID:1812 -
\??\c:\tbnnnt.exec:\tbnnnt.exe27⤵
- Executes dropped EXE
PID:4588 -
\??\c:\a2260.exec:\a2260.exe28⤵
- Executes dropped EXE
PID:1684 -
\??\c:\lffxrrl.exec:\lffxrrl.exe29⤵
- Executes dropped EXE
PID:4296 -
\??\c:\djppj.exec:\djppj.exe30⤵
- Executes dropped EXE
PID:3652 -
\??\c:\8444440.exec:\8444440.exe31⤵
- Executes dropped EXE
PID:4000 -
\??\c:\jjjdv.exec:\jjjdv.exe32⤵
- Executes dropped EXE
PID:4884 -
\??\c:\240426.exec:\240426.exe33⤵
- Executes dropped EXE
PID:3032 -
\??\c:\640848.exec:\640848.exe34⤵
- Executes dropped EXE
PID:2748 -
\??\c:\i464882.exec:\i464882.exe35⤵
- Executes dropped EXE
PID:4576 -
\??\c:\44882.exec:\44882.exe36⤵
- Executes dropped EXE
PID:1088 -
\??\c:\266626.exec:\266626.exe37⤵
- Executes dropped EXE
PID:1536 -
\??\c:\i842660.exec:\i842660.exe38⤵
- Executes dropped EXE
PID:3188 -
\??\c:\u848288.exec:\u848288.exe39⤵
- Executes dropped EXE
PID:2076 -
\??\c:\ddjdd.exec:\ddjdd.exe40⤵
- Executes dropped EXE
PID:2372 -
\??\c:\pppjd.exec:\pppjd.exe41⤵
- Executes dropped EXE
PID:4836 -
\??\c:\1llxlfx.exec:\1llxlfx.exe42⤵PID:1744
-
\??\c:\26004.exec:\26004.exe43⤵
- Executes dropped EXE
PID:1520 -
\??\c:\dvpjd.exec:\dvpjd.exe44⤵
- Executes dropped EXE
PID:2284 -
\??\c:\6626000.exec:\6626000.exe45⤵
- Executes dropped EXE
PID:4168 -
\??\c:\9pppj.exec:\9pppj.exe46⤵
- Executes dropped EXE
PID:2236 -
\??\c:\bbbtnn.exec:\bbbtnn.exe47⤵
- Executes dropped EXE
PID:4916 -
\??\c:\4000444.exec:\4000444.exe48⤵
- Executes dropped EXE
PID:1624 -
\??\c:\dvvpp.exec:\dvvpp.exe49⤵
- Executes dropped EXE
PID:712 -
\??\c:\062200.exec:\062200.exe50⤵
- Executes dropped EXE
PID:1636 -
\??\c:\c288266.exec:\c288266.exe51⤵
- Executes dropped EXE
PID:1352 -
\??\c:\hhhbtt.exec:\hhhbtt.exe52⤵
- Executes dropped EXE
PID:2072 -
\??\c:\0686046.exec:\0686046.exe53⤵
- Executes dropped EXE
PID:2388 -
\??\c:\rxxxllf.exec:\rxxxllf.exe54⤵
- Executes dropped EXE
PID:1824 -
\??\c:\488266.exec:\488266.exe55⤵
- Executes dropped EXE
PID:3524 -
\??\c:\8828660.exec:\8828660.exe56⤵
- Executes dropped EXE
PID:5080 -
\??\c:\48826.exec:\48826.exe57⤵
- Executes dropped EXE
PID:1432 -
\??\c:\hbtbth.exec:\hbtbth.exe58⤵
- Executes dropped EXE
PID:2664 -
\??\c:\k04044.exec:\k04044.exe59⤵
- Executes dropped EXE
PID:4772 -
\??\c:\04228.exec:\04228.exe60⤵
- Executes dropped EXE
PID:3968 -
\??\c:\bbhbtt.exec:\bbhbtt.exe61⤵
- Executes dropped EXE
PID:1860 -
\??\c:\w84480.exec:\w84480.exe62⤵
- Executes dropped EXE
PID:1092 -
\??\c:\vpvdp.exec:\vpvdp.exe63⤵
- Executes dropped EXE
PID:5012 -
\??\c:\2004488.exec:\2004488.exe64⤵
- Executes dropped EXE
PID:3204 -
\??\c:\5dvvp.exec:\5dvvp.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1252 -
\??\c:\a2442.exec:\a2442.exe66⤵
- Executes dropped EXE
PID:4820 -
\??\c:\0686622.exec:\0686622.exe67⤵PID:3760
-
\??\c:\5lxlxrf.exec:\5lxlxrf.exe68⤵PID:4668
-
\??\c:\622260.exec:\622260.exe69⤵PID:3088
-
\??\c:\flffflf.exec:\flffflf.exe70⤵PID:2684
-
\??\c:\frxlxlf.exec:\frxlxlf.exe71⤵PID:2732
-
\??\c:\djpvv.exec:\djpvv.exe72⤵PID:3152
-
\??\c:\204444.exec:\204444.exe73⤵PID:4172
-
\??\c:\824826.exec:\824826.exe74⤵PID:3404
-
\??\c:\frlxfxr.exec:\frlxfxr.exe75⤵PID:2620
-
\??\c:\w84848.exec:\w84848.exe76⤵PID:2356
-
\??\c:\0644000.exec:\0644000.exe77⤵PID:744
-
\??\c:\hbnttt.exec:\hbnttt.exe78⤵PID:3740
-
\??\c:\484422.exec:\484422.exe79⤵PID:1880
-
\??\c:\jjpvv.exec:\jjpvv.exe80⤵PID:3708
-
\??\c:\q46400.exec:\q46400.exe81⤵PID:5008
-
\??\c:\pddjv.exec:\pddjv.exe82⤵PID:1568
-
\??\c:\nhnnhh.exec:\nhnnhh.exe83⤵PID:1488
-
\??\c:\httthh.exec:\httthh.exe84⤵PID:4000
-
\??\c:\s2260.exec:\s2260.exe85⤵PID:408
-
\??\c:\o244440.exec:\o244440.exe86⤵PID:3988
-
\??\c:\8882608.exec:\8882608.exe87⤵PID:3592
-
\??\c:\860426.exec:\860426.exe88⤵PID:3008
-
\??\c:\bhhthb.exec:\bhhthb.exe89⤵PID:5040
-
\??\c:\6000882.exec:\6000882.exe90⤵PID:3624
-
\??\c:\pvpvv.exec:\pvpvv.exe91⤵PID:1448
-
\??\c:\hhhbnt.exec:\hhhbnt.exe92⤵PID:4776
-
\??\c:\40286.exec:\40286.exe93⤵PID:684
-
\??\c:\088044.exec:\088044.exe94⤵PID:4356
-
\??\c:\9tbbbh.exec:\9tbbbh.exe95⤵PID:4148
-
\??\c:\o422660.exec:\o422660.exe96⤵PID:3736
-
\??\c:\ttbthb.exec:\ttbthb.exe97⤵PID:2052
-
\??\c:\1jppj.exec:\1jppj.exe98⤵PID:3328
-
\??\c:\1djvd.exec:\1djvd.exe99⤵PID:4936
-
\??\c:\042222.exec:\042222.exe100⤵PID:4924
-
\??\c:\dppjj.exec:\dppjj.exe101⤵PID:1628
-
\??\c:\rrrflxl.exec:\rrrflxl.exe102⤵PID:1392
-
\??\c:\0842606.exec:\0842606.exe103⤵PID:3368
-
\??\c:\44082.exec:\44082.exe104⤵PID:3704
-
\??\c:\9ttnhh.exec:\9ttnhh.exe105⤵PID:2944
-
\??\c:\3bbnbt.exec:\3bbnbt.exe106⤵PID:4456
-
\??\c:\480400.exec:\480400.exe107⤵PID:1680
-
\??\c:\rllfxxx.exec:\rllfxxx.exe108⤵PID:1928
-
\??\c:\bhhbbt.exec:\bhhbbt.exe109⤵PID:2840
-
\??\c:\5vpjv.exec:\5vpjv.exe110⤵PID:4036
-
\??\c:\4082688.exec:\4082688.exe111⤵PID:1096
-
\??\c:\xxlfxxr.exec:\xxlfxxr.exe112⤵PID:628
-
\??\c:\jddvj.exec:\jddvj.exe113⤵PID:1516
-
\??\c:\5jjpd.exec:\5jjpd.exe114⤵PID:4648
-
\??\c:\xflffff.exec:\xflffff.exe115⤵PID:4832
-
\??\c:\866488.exec:\866488.exe116⤵PID:3240
-
\??\c:\vjjjj.exec:\vjjjj.exe117⤵PID:3728
-
\??\c:\ttntnn.exec:\ttntnn.exe118⤵PID:3900
-
\??\c:\6844882.exec:\6844882.exe119⤵PID:652
-
\??\c:\0026262.exec:\0026262.exe120⤵PID:868
-
\??\c:\42204.exec:\42204.exe121⤵PID:3576
-
\??\c:\0426888.exec:\0426888.exe122⤵PID:404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-