Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 13:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe
-
Size
63KB
-
MD5
c8ce151fa3fcd0b1c20882d3a9997df5
-
SHA1
c37d8301a59f9d77912c6eb1587cb7e2c367b57a
-
SHA256
f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543
-
SHA512
78a4ecfee64582cd9da0be6eaa9aba068e3273cb5e859fe50d626650fbc6084159ec63630cc288212c4379907bd86b4b9bd895f8c2a054f32af2551da10c52e1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIrmCeRMBJ:ymb3NkkiQ3mdBjFIjeuv
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
resource yara_rule behavioral2/memory/4888-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1388-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1432-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1852-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1852-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4324-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3840-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4800-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4840-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4456-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4456-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3992-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/980-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1572-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1672-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/392-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2844-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2092-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4048-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4632-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1248-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2840-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/952-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4548-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1388 446600.exe 1432 e62606.exe 1852 42420.exe 4324 tnhbtn.exe 5032 9ddjd.exe 3840 llxrfxl.exe 3628 5lffxxr.exe 4800 dvpvp.exe 4840 9pdpj.exe 4456 28266.exe 3992 2008280.exe 980 8688282.exe 1572 7xlxrll.exe 1672 5xrllfx.exe 2732 7nhhnh.exe 3088 7ddjj.exe 392 pjdvv.exe 2720 20222.exe 216 hhtnbt.exe 2844 006088.exe 2092 9lfrllf.exe 4168 246604.exe 4660 5lfxlfx.exe 4048 pjpjd.exe 4632 g4004.exe 1248 pjjdp.exe 772 s2482.exe 2840 3ntnhh.exe 952 nthbnn.exe 4280 hhnhbh.exe 4548 ppdvd.exe 4264 rrllrrr.exe 684 8066622.exe 4032 28042.exe 1432 q68266.exe 2848 662224.exe 1852 3bbnhh.exe 2156 rfllxxx.exe 4516 lllrrlf.exe 2144 7vdvd.exe 3732 408686.exe 2336 lfllrfx.exe 2648 a8600.exe 3588 llrfrlf.exe 2392 i422226.exe 4900 8844266.exe 2060 xrfxxrr.exe 3556 frxxxxf.exe 1472 tnnnnn.exe 3068 o026066.exe 1708 0888664.exe 1520 ffxxrrr.exe 3280 pjvpj.exe 4208 nbnhbn.exe 3432 e00482.exe 2656 ttnbbt.exe 2720 m8240.exe 3652 0022008.exe 4520 846040.exe 4476 fxrxlfr.exe 472 42804.exe 4168 8464264.exe 1648 c666048.exe 3564 nbhbtn.exe -
resource yara_rule behavioral2/memory/4888-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1432-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1432-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1852-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1852-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1852-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3840-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3840-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4800-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4840-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3992-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/980-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1572-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/392-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2844-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2092-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4048-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4632-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2840-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/952-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4548-215-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5lfxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8604882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6008888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xrlxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0004228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1388 4888 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 89 PID 4888 wrote to memory of 1388 4888 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 89 PID 4888 wrote to memory of 1388 4888 f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe 89 PID 1388 wrote to memory of 1432 1388 446600.exe 90 PID 1388 wrote to memory of 1432 1388 446600.exe 90 PID 1388 wrote to memory of 1432 1388 446600.exe 90 PID 1432 wrote to memory of 1852 1432 e62606.exe 91 PID 1432 wrote to memory of 1852 1432 e62606.exe 91 PID 1432 wrote to memory of 1852 1432 e62606.exe 91 PID 1852 wrote to memory of 4324 1852 42420.exe 92 PID 1852 wrote to memory of 4324 1852 42420.exe 92 PID 1852 wrote to memory of 4324 1852 42420.exe 92 PID 4324 wrote to memory of 5032 4324 tnhbtn.exe 93 PID 4324 wrote to memory of 5032 4324 tnhbtn.exe 93 PID 4324 wrote to memory of 5032 4324 tnhbtn.exe 93 PID 5032 wrote to memory of 3840 5032 9ddjd.exe 94 PID 5032 wrote to memory of 3840 5032 9ddjd.exe 94 PID 5032 wrote to memory of 3840 5032 9ddjd.exe 94 PID 3840 wrote to memory of 3628 3840 llxrfxl.exe 95 PID 3840 wrote to memory of 3628 3840 llxrfxl.exe 95 PID 3840 wrote to memory of 3628 3840 llxrfxl.exe 95 PID 3628 wrote to memory of 4800 3628 5lffxxr.exe 96 PID 3628 wrote to memory of 4800 3628 5lffxxr.exe 96 PID 3628 wrote to memory of 4800 3628 5lffxxr.exe 96 PID 4800 wrote to memory of 4840 4800 dvpvp.exe 97 PID 4800 wrote to memory of 4840 4800 dvpvp.exe 97 PID 4800 wrote to memory of 4840 4800 dvpvp.exe 97 PID 4840 wrote to memory of 4456 4840 9pdpj.exe 98 PID 4840 wrote to memory of 4456 4840 9pdpj.exe 98 PID 4840 wrote to memory of 4456 4840 9pdpj.exe 98 PID 4456 wrote to memory of 3992 4456 28266.exe 99 PID 4456 wrote to memory of 3992 4456 28266.exe 99 PID 4456 wrote to memory of 3992 4456 28266.exe 99 PID 3992 wrote to memory of 980 3992 2008280.exe 100 PID 3992 wrote to memory of 980 3992 2008280.exe 100 PID 3992 wrote to memory of 980 3992 2008280.exe 100 PID 980 wrote to memory of 1572 980 8688282.exe 101 PID 980 wrote to memory of 1572 980 8688282.exe 101 PID 980 wrote to memory of 1572 980 8688282.exe 101 PID 1572 wrote to memory of 1672 1572 7xlxrll.exe 102 PID 1572 wrote to memory of 1672 1572 7xlxrll.exe 102 PID 1572 wrote to memory of 1672 1572 7xlxrll.exe 102 PID 1672 wrote to memory of 2732 1672 5xrllfx.exe 103 PID 1672 wrote to memory of 2732 1672 5xrllfx.exe 103 PID 1672 wrote to memory of 2732 1672 5xrllfx.exe 103 PID 2732 wrote to memory of 3088 2732 7nhhnh.exe 104 PID 2732 wrote to memory of 3088 2732 7nhhnh.exe 104 PID 2732 wrote to memory of 3088 2732 7nhhnh.exe 104 PID 3088 wrote to memory of 392 3088 7ddjj.exe 105 PID 3088 wrote to memory of 392 3088 7ddjj.exe 105 PID 3088 wrote to memory of 392 3088 7ddjj.exe 105 PID 392 wrote to memory of 2720 392 pjdvv.exe 106 PID 392 wrote to memory of 2720 392 pjdvv.exe 106 PID 392 wrote to memory of 2720 392 pjdvv.exe 106 PID 2720 wrote to memory of 216 2720 20222.exe 107 PID 2720 wrote to memory of 216 2720 20222.exe 107 PID 2720 wrote to memory of 216 2720 20222.exe 107 PID 216 wrote to memory of 2844 216 hhtnbt.exe 108 PID 216 wrote to memory of 2844 216 hhtnbt.exe 108 PID 216 wrote to memory of 2844 216 hhtnbt.exe 108 PID 2844 wrote to memory of 2092 2844 006088.exe 109 PID 2844 wrote to memory of 2092 2844 006088.exe 109 PID 2844 wrote to memory of 2092 2844 006088.exe 109 PID 2092 wrote to memory of 4168 2092 9lfrllf.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe"C:\Users\Admin\AppData\Local\Temp\f1978ba6de51a3170774d29352aeb6b34d8e5d6ad2f8fea3b8e7e54c93dbd543.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\446600.exec:\446600.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\e62606.exec:\e62606.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
\??\c:\42420.exec:\42420.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\tnhbtn.exec:\tnhbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\9ddjd.exec:\9ddjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\llxrfxl.exec:\llxrfxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
\??\c:\5lffxxr.exec:\5lffxxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\dvpvp.exec:\dvpvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\9pdpj.exec:\9pdpj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\28266.exec:\28266.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\2008280.exec:\2008280.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
\??\c:\8688282.exec:\8688282.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\7xlxrll.exec:\7xlxrll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\5xrllfx.exec:\5xrllfx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\7nhhnh.exec:\7nhhnh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\7ddjj.exec:\7ddjj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\pjdvv.exec:\pjdvv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
\??\c:\20222.exec:\20222.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\hhtnbt.exec:\hhtnbt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\006088.exec:\006088.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\9lfrllf.exec:\9lfrllf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\246604.exec:\246604.exe23⤵
- Executes dropped EXE
PID:4168 -
\??\c:\5lfxlfx.exec:\5lfxlfx.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4660 -
\??\c:\pjpjd.exec:\pjpjd.exe25⤵
- Executes dropped EXE
PID:4048 -
\??\c:\g4004.exec:\g4004.exe26⤵
- Executes dropped EXE
PID:4632 -
\??\c:\pjjdp.exec:\pjjdp.exe27⤵
- Executes dropped EXE
PID:1248 -
\??\c:\s2482.exec:\s2482.exe28⤵
- Executes dropped EXE
PID:772 -
\??\c:\3ntnhh.exec:\3ntnhh.exe29⤵
- Executes dropped EXE
PID:2840 -
\??\c:\nthbnn.exec:\nthbnn.exe30⤵
- Executes dropped EXE
PID:952 -
\??\c:\hhnhbh.exec:\hhnhbh.exe31⤵
- Executes dropped EXE
PID:4280 -
\??\c:\ppdvd.exec:\ppdvd.exe32⤵
- Executes dropped EXE
PID:4548 -
\??\c:\rrllrrr.exec:\rrllrrr.exe33⤵
- Executes dropped EXE
PID:4264 -
\??\c:\8066622.exec:\8066622.exe34⤵
- Executes dropped EXE
PID:684 -
\??\c:\28042.exec:\28042.exe35⤵
- Executes dropped EXE
PID:4032 -
\??\c:\q68266.exec:\q68266.exe36⤵
- Executes dropped EXE
PID:1432 -
\??\c:\662224.exec:\662224.exe37⤵
- Executes dropped EXE
PID:2848 -
\??\c:\3bbnhh.exec:\3bbnhh.exe38⤵
- Executes dropped EXE
PID:1852 -
\??\c:\rfllxxx.exec:\rfllxxx.exe39⤵
- Executes dropped EXE
PID:2156 -
\??\c:\lllrrlf.exec:\lllrrlf.exe40⤵
- Executes dropped EXE
PID:4516 -
\??\c:\7vdvd.exec:\7vdvd.exe41⤵
- Executes dropped EXE
PID:2144 -
\??\c:\408686.exec:\408686.exe42⤵
- Executes dropped EXE
PID:3732 -
\??\c:\lfllrfx.exec:\lfllrfx.exe43⤵
- Executes dropped EXE
PID:2336 -
\??\c:\a8600.exec:\a8600.exe44⤵
- Executes dropped EXE
PID:2648 -
\??\c:\llrfrlf.exec:\llrfrlf.exe45⤵
- Executes dropped EXE
PID:3588 -
\??\c:\i422226.exec:\i422226.exe46⤵
- Executes dropped EXE
PID:2392 -
\??\c:\8844266.exec:\8844266.exe47⤵
- Executes dropped EXE
PID:4900 -
\??\c:\xrfxxrr.exec:\xrfxxrr.exe48⤵
- Executes dropped EXE
PID:2060 -
\??\c:\frxxxxf.exec:\frxxxxf.exe49⤵
- Executes dropped EXE
PID:3556 -
\??\c:\tnnnnn.exec:\tnnnnn.exe50⤵
- Executes dropped EXE
PID:1472 -
\??\c:\o026066.exec:\o026066.exe51⤵
- Executes dropped EXE
PID:3068 -
\??\c:\0888664.exec:\0888664.exe52⤵
- Executes dropped EXE
PID:1708 -
\??\c:\ffxxrrr.exec:\ffxxrrr.exe53⤵
- Executes dropped EXE
PID:1520 -
\??\c:\pjvpj.exec:\pjvpj.exe54⤵
- Executes dropped EXE
PID:3280 -
\??\c:\nbnhbn.exec:\nbnhbn.exe55⤵
- Executes dropped EXE
PID:4208 -
\??\c:\e00482.exec:\e00482.exe56⤵
- Executes dropped EXE
PID:3432 -
\??\c:\ttnbbt.exec:\ttnbbt.exe57⤵
- Executes dropped EXE
PID:2656 -
\??\c:\m8240.exec:\m8240.exe58⤵
- Executes dropped EXE
PID:2720 -
\??\c:\0022008.exec:\0022008.exe59⤵
- Executes dropped EXE
PID:3652 -
\??\c:\846040.exec:\846040.exe60⤵
- Executes dropped EXE
PID:4520 -
\??\c:\fxrxlfr.exec:\fxrxlfr.exe61⤵
- Executes dropped EXE
PID:4476 -
\??\c:\42804.exec:\42804.exe62⤵
- Executes dropped EXE
PID:472 -
\??\c:\8464264.exec:\8464264.exe63⤵
- Executes dropped EXE
PID:4168 -
\??\c:\c666048.exec:\c666048.exe64⤵
- Executes dropped EXE
PID:1648 -
\??\c:\nbhbtn.exec:\nbhbtn.exe65⤵
- Executes dropped EXE
PID:3564 -
\??\c:\6862666.exec:\6862666.exe66⤵PID:1940
-
\??\c:\bbtbth.exec:\bbtbth.exe67⤵PID:4808
-
\??\c:\bhhtnh.exec:\bhhtnh.exe68⤵PID:1248
-
\??\c:\tnnhtn.exec:\tnnhtn.exe69⤵PID:4348
-
\??\c:\1bnnbt.exec:\1bnnbt.exe70⤵PID:2840
-
\??\c:\088648.exec:\088648.exe71⤵PID:4004
-
\??\c:\rlxrlll.exec:\rlxrlll.exe72⤵PID:4948
-
\??\c:\u664822.exec:\u664822.exe73⤵PID:2964
-
\??\c:\lxxrlff.exec:\lxxrlff.exe74⤵PID:3060
-
\??\c:\rxrrfxr.exec:\rxrrfxr.exe75⤵PID:1656
-
\??\c:\288826.exec:\288826.exe76⤵PID:1880
-
\??\c:\pvpjd.exec:\pvpjd.exe77⤵PID:4032
-
\??\c:\nhnnhh.exec:\nhnnhh.exe78⤵PID:4676
-
\??\c:\48426.exec:\48426.exe79⤵PID:1416
-
\??\c:\bthttn.exec:\bthttn.exe80⤵PID:4324
-
\??\c:\3flxfxr.exec:\3flxfxr.exe81⤵PID:2156
-
\??\c:\440488.exec:\440488.exe82⤵PID:4516
-
\??\c:\1rrlxxx.exec:\1rrlxxx.exe83⤵PID:4652
-
\??\c:\48482.exec:\48482.exe84⤵PID:5004
-
\??\c:\846206.exec:\846206.exe85⤵PID:3832
-
\??\c:\48842.exec:\48842.exe86⤵PID:4528
-
\??\c:\800484.exec:\800484.exe87⤵PID:4672
-
\??\c:\606666.exec:\606666.exe88⤵PID:4120
-
\??\c:\9jjvj.exec:\9jjvj.exe89⤵PID:2948
-
\??\c:\k00424.exec:\k00424.exe90⤵PID:5104
-
\??\c:\5dvpd.exec:\5dvpd.exe91⤵PID:1252
-
\??\c:\604866.exec:\604866.exe92⤵PID:3208
-
\??\c:\u424208.exec:\u424208.exe93⤵PID:656
-
\??\c:\c226626.exec:\c226626.exe94⤵PID:3480
-
\??\c:\hhhhhh.exec:\hhhhhh.exe95⤵PID:1672
-
\??\c:\7lfrfxx.exec:\7lfrfxx.exe96⤵PID:1520
-
\??\c:\662688.exec:\662688.exe97⤵PID:4980
-
\??\c:\djjvj.exec:\djjvj.exe98⤵PID:4192
-
\??\c:\vppdd.exec:\vppdd.exe99⤵PID:4972
-
\??\c:\pdpjd.exec:\pdpjd.exe100⤵PID:1220
-
\??\c:\1dddd.exec:\1dddd.exe101⤵PID:3828
-
\??\c:\84080.exec:\84080.exe102⤵PID:2316
-
\??\c:\868626.exec:\868626.exe103⤵PID:632
-
\??\c:\a4008.exec:\a4008.exe104⤵PID:3460
-
\??\c:\0260260.exec:\0260260.exe105⤵PID:2960
-
\??\c:\6842662.exec:\6842662.exe106⤵PID:2184
-
\??\c:\fffxxxx.exec:\fffxxxx.exe107⤵PID:1648
-
\??\c:\vppjd.exec:\vppjd.exe108⤵PID:4632
-
\??\c:\9hhhnh.exec:\9hhhnh.exe109⤵PID:3304
-
\??\c:\1pvjj.exec:\1pvjj.exe110⤵PID:3052
-
\??\c:\rrrrffr.exec:\rrrrffr.exe111⤵PID:4792
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe112⤵PID:728
-
\??\c:\s2260.exec:\s2260.exe113⤵PID:4428
-
\??\c:\8660820.exec:\8660820.exe114⤵PID:4280
-
\??\c:\w68248.exec:\w68248.exe115⤵PID:4948
-
\??\c:\40480.exec:\40480.exe116⤵PID:3648
-
\??\c:\flflxrx.exec:\flflxrx.exe117⤵PID:720
-
\??\c:\djvjd.exec:\djvjd.exe118⤵PID:1656
-
\??\c:\vppdp.exec:\vppdp.exe119⤵PID:764
-
\??\c:\u408608.exec:\u408608.exe120⤵PID:3120
-
\??\c:\680422.exec:\680422.exe121⤵PID:2400
-
\??\c:\rxfxrxx.exec:\rxfxrxx.exe122⤵PID:4736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-