Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe
Resource
win7-20240729-en
General
-
Target
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe
-
Size
72KB
-
MD5
9b505f1dcf02dab70d5bfbcd3ddba70e
-
SHA1
437694a0e4a803b48e19716b00713a22f097970c
-
SHA256
fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394
-
SHA512
72a81776859465374cc6c6ed1b2ccc7a375dac80beb03f17447b615c5e985fc14680860cf97dd116ba69367824b6c9c22cb7e16ae7e9b9f3cf87e54b6e72aa76
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfUcicP/fG:ymb3NkkiQ3mdBjFI4V4ci2/fG
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/1660-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4452-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2748-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1708-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2716-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4088-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/764-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1532-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3692-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2304-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4136-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1052-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/648-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1952-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/712-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3800-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2664-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 5056 66822.exe 1708 5pppj.exe 4452 80640.exe 2748 0026404.exe 2716 06066.exe 4088 0626486.exe 5032 vjdpd.exe 3972 dppdp.exe 5052 1llxlfr.exe 764 s4648.exe 4688 rlfrllf.exe 2936 jdjdv.exe 1532 08004.exe 3692 602448.exe 4136 4884260.exe 2304 pjjvv.exe 3376 0808842.exe 3832 ppvvv.exe 1052 bhhbtn.exe 648 3dpjd.exe 1952 xrfrrlf.exe 1492 3dvjd.exe 2028 djjdd.exe 2648 3frlxrf.exe 712 vjjjd.exe 464 2048226.exe 4952 00264.exe 3800 hbhbbb.exe 2988 jppjd.exe 4364 dvpdv.exe 2664 vpjjj.exe 4620 080048.exe 4860 btbthh.exe 3000 e40044.exe 2152 26462.exe 1488 djjdp.exe 4868 dvpjj.exe 1672 5tbthb.exe 3492 446482.exe 392 28442.exe 1520 1xrlxrr.exe 1296 3bbtnn.exe 4872 w68822.exe 3052 2460882.exe 4960 3nhbtn.exe 3752 dpvpj.exe 4984 llxrffx.exe 4440 btnhhh.exe 4560 btnnbb.exe 744 4284888.exe 1524 s2844.exe 2740 4400404.exe 3468 80262.exe 1004 jvddv.exe 3500 pjpjv.exe 2716 lfxxfxf.exe 2816 bhnhhb.exe 3436 rllxrxf.exe 1156 2244400.exe 3972 66660.exe 2452 20664.exe 3408 26620.exe 2196 m8082.exe 5020 xflfrrl.exe -
resource yara_rule behavioral2/memory/1660-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4452-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2748-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1708-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2716-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4088-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/764-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2936-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1532-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3692-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4136-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1052-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/648-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1952-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3800-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2664-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0282604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4882648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 208226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 606668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fxrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lrlrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 5056 1660 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 82 PID 1660 wrote to memory of 5056 1660 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 82 PID 1660 wrote to memory of 5056 1660 fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe 82 PID 5056 wrote to memory of 1708 5056 66822.exe 83 PID 5056 wrote to memory of 1708 5056 66822.exe 83 PID 5056 wrote to memory of 1708 5056 66822.exe 83 PID 1708 wrote to memory of 4452 1708 5pppj.exe 84 PID 1708 wrote to memory of 4452 1708 5pppj.exe 84 PID 1708 wrote to memory of 4452 1708 5pppj.exe 84 PID 4452 wrote to memory of 2748 4452 80640.exe 85 PID 4452 wrote to memory of 2748 4452 80640.exe 85 PID 4452 wrote to memory of 2748 4452 80640.exe 85 PID 2748 wrote to memory of 2716 2748 0026404.exe 86 PID 2748 wrote to memory of 2716 2748 0026404.exe 86 PID 2748 wrote to memory of 2716 2748 0026404.exe 86 PID 2716 wrote to memory of 4088 2716 06066.exe 87 PID 2716 wrote to memory of 4088 2716 06066.exe 87 PID 2716 wrote to memory of 4088 2716 06066.exe 87 PID 4088 wrote to memory of 5032 4088 0626486.exe 88 PID 4088 wrote to memory of 5032 4088 0626486.exe 88 PID 4088 wrote to memory of 5032 4088 0626486.exe 88 PID 5032 wrote to memory of 3972 5032 vjdpd.exe 89 PID 5032 wrote to memory of 3972 5032 vjdpd.exe 89 PID 5032 wrote to memory of 3972 5032 vjdpd.exe 89 PID 3972 wrote to memory of 5052 3972 dppdp.exe 90 PID 3972 wrote to memory of 5052 3972 dppdp.exe 90 PID 3972 wrote to memory of 5052 3972 dppdp.exe 90 PID 5052 wrote to memory of 764 5052 1llxlfr.exe 91 PID 5052 wrote to memory of 764 5052 1llxlfr.exe 91 PID 5052 wrote to memory of 764 5052 1llxlfr.exe 91 PID 764 wrote to memory of 4688 764 s4648.exe 92 PID 764 wrote to memory of 4688 764 s4648.exe 92 PID 764 wrote to memory of 4688 764 s4648.exe 92 PID 4688 wrote to memory of 2936 4688 rlfrllf.exe 93 PID 4688 wrote to memory of 2936 4688 rlfrllf.exe 93 PID 4688 wrote to memory of 2936 4688 rlfrllf.exe 93 PID 2936 wrote to memory of 1532 2936 jdjdv.exe 94 PID 2936 wrote to memory of 1532 2936 jdjdv.exe 94 PID 2936 wrote to memory of 1532 2936 jdjdv.exe 94 PID 1532 wrote to memory of 3692 1532 08004.exe 95 PID 1532 wrote to memory of 3692 1532 08004.exe 95 PID 1532 wrote to memory of 3692 1532 08004.exe 95 PID 3692 wrote to memory of 4136 3692 602448.exe 96 PID 3692 wrote to memory of 4136 3692 602448.exe 96 PID 3692 wrote to memory of 4136 3692 602448.exe 96 PID 4136 wrote to memory of 2304 4136 4884260.exe 97 PID 4136 wrote to memory of 2304 4136 4884260.exe 97 PID 4136 wrote to memory of 2304 4136 4884260.exe 97 PID 2304 wrote to memory of 3376 2304 pjjvv.exe 98 PID 2304 wrote to memory of 3376 2304 pjjvv.exe 98 PID 2304 wrote to memory of 3376 2304 pjjvv.exe 98 PID 3376 wrote to memory of 3832 3376 0808842.exe 99 PID 3376 wrote to memory of 3832 3376 0808842.exe 99 PID 3376 wrote to memory of 3832 3376 0808842.exe 99 PID 3832 wrote to memory of 1052 3832 ppvvv.exe 100 PID 3832 wrote to memory of 1052 3832 ppvvv.exe 100 PID 3832 wrote to memory of 1052 3832 ppvvv.exe 100 PID 1052 wrote to memory of 648 1052 bhhbtn.exe 101 PID 1052 wrote to memory of 648 1052 bhhbtn.exe 101 PID 1052 wrote to memory of 648 1052 bhhbtn.exe 101 PID 648 wrote to memory of 1952 648 3dpjd.exe 102 PID 648 wrote to memory of 1952 648 3dpjd.exe 102 PID 648 wrote to memory of 1952 648 3dpjd.exe 102 PID 1952 wrote to memory of 1492 1952 xrfrrlf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe"C:\Users\Admin\AppData\Local\Temp\fa3093a22c61d8d47fc4edcfe379a354444ddb840cb1d4101dc20333ce66f394.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\66822.exec:\66822.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\5pppj.exec:\5pppj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\80640.exec:\80640.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\0026404.exec:\0026404.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\06066.exec:\06066.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\0626486.exec:\0626486.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\vjdpd.exec:\vjdpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\dppdp.exec:\dppdp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\1llxlfr.exec:\1llxlfr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\s4648.exec:\s4648.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
\??\c:\rlfrllf.exec:\rlfrllf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\jdjdv.exec:\jdjdv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\08004.exec:\08004.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\602448.exec:\602448.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\4884260.exec:\4884260.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
\??\c:\pjjvv.exec:\pjjvv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\0808842.exec:\0808842.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
\??\c:\ppvvv.exec:\ppvvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\bhhbtn.exec:\bhhbtn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\3dpjd.exec:\3dpjd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
\??\c:\xrfrrlf.exec:\xrfrrlf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\3dvjd.exec:\3dvjd.exe23⤵
- Executes dropped EXE
PID:1492 -
\??\c:\djjdd.exec:\djjdd.exe24⤵
- Executes dropped EXE
PID:2028 -
\??\c:\3frlxrf.exec:\3frlxrf.exe25⤵
- Executes dropped EXE
PID:2648 -
\??\c:\vjjjd.exec:\vjjjd.exe26⤵
- Executes dropped EXE
PID:712 -
\??\c:\2048226.exec:\2048226.exe27⤵
- Executes dropped EXE
PID:464 -
\??\c:\00264.exec:\00264.exe28⤵
- Executes dropped EXE
PID:4952 -
\??\c:\hbhbbb.exec:\hbhbbb.exe29⤵
- Executes dropped EXE
PID:3800 -
\??\c:\jppjd.exec:\jppjd.exe30⤵
- Executes dropped EXE
PID:2988 -
\??\c:\dvpdv.exec:\dvpdv.exe31⤵
- Executes dropped EXE
PID:4364 -
\??\c:\vpjjj.exec:\vpjjj.exe32⤵
- Executes dropped EXE
PID:2664 -
\??\c:\080048.exec:\080048.exe33⤵
- Executes dropped EXE
PID:4620 -
\??\c:\btbthh.exec:\btbthh.exe34⤵
- Executes dropped EXE
PID:4860 -
\??\c:\e40044.exec:\e40044.exe35⤵
- Executes dropped EXE
PID:3000 -
\??\c:\26462.exec:\26462.exe36⤵
- Executes dropped EXE
PID:2152 -
\??\c:\djjdp.exec:\djjdp.exe37⤵
- Executes dropped EXE
PID:1488 -
\??\c:\dvpjj.exec:\dvpjj.exe38⤵
- Executes dropped EXE
PID:4868 -
\??\c:\5tbthb.exec:\5tbthb.exe39⤵
- Executes dropped EXE
PID:1672 -
\??\c:\446482.exec:\446482.exe40⤵
- Executes dropped EXE
PID:3492 -
\??\c:\28442.exec:\28442.exe41⤵
- Executes dropped EXE
PID:392 -
\??\c:\1xrlxrr.exec:\1xrlxrr.exe42⤵
- Executes dropped EXE
PID:1520 -
\??\c:\3bbtnn.exec:\3bbtnn.exe43⤵
- Executes dropped EXE
PID:1296 -
\??\c:\w68822.exec:\w68822.exe44⤵
- Executes dropped EXE
PID:4872 -
\??\c:\2460882.exec:\2460882.exe45⤵
- Executes dropped EXE
PID:3052 -
\??\c:\3nhbtn.exec:\3nhbtn.exe46⤵
- Executes dropped EXE
PID:4960 -
\??\c:\dpvpj.exec:\dpvpj.exe47⤵
- Executes dropped EXE
PID:3752 -
\??\c:\llxrffx.exec:\llxrffx.exe48⤵
- Executes dropped EXE
PID:4984 -
\??\c:\btnhhh.exec:\btnhhh.exe49⤵
- Executes dropped EXE
PID:4440 -
\??\c:\btnnbb.exec:\btnnbb.exe50⤵
- Executes dropped EXE
PID:4560 -
\??\c:\4284888.exec:\4284888.exe51⤵
- Executes dropped EXE
PID:744 -
\??\c:\s2844.exec:\s2844.exe52⤵
- Executes dropped EXE
PID:1524 -
\??\c:\4400404.exec:\4400404.exe53⤵
- Executes dropped EXE
PID:2740 -
\??\c:\80262.exec:\80262.exe54⤵
- Executes dropped EXE
PID:3468 -
\??\c:\jvddv.exec:\jvddv.exe55⤵
- Executes dropped EXE
PID:1004 -
\??\c:\pjpjv.exec:\pjpjv.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500 -
\??\c:\lfxxfxf.exec:\lfxxfxf.exe57⤵
- Executes dropped EXE
PID:2716 -
\??\c:\bhnhhb.exec:\bhnhhb.exe58⤵
- Executes dropped EXE
PID:2816 -
\??\c:\rllxrxf.exec:\rllxrxf.exe59⤵
- Executes dropped EXE
PID:3436 -
\??\c:\2244400.exec:\2244400.exe60⤵
- Executes dropped EXE
PID:1156 -
\??\c:\66660.exec:\66660.exe61⤵
- Executes dropped EXE
PID:3972 -
\??\c:\20664.exec:\20664.exe62⤵
- Executes dropped EXE
PID:2452 -
\??\c:\26620.exec:\26620.exe63⤵
- Executes dropped EXE
PID:3408 -
\??\c:\m8082.exec:\m8082.exe64⤵
- Executes dropped EXE
PID:2196 -
\??\c:\xflfrrl.exec:\xflfrrl.exe65⤵
- Executes dropped EXE
PID:5020 -
\??\c:\0822660.exec:\0822660.exe66⤵PID:5108
-
\??\c:\04040.exec:\04040.exe67⤵PID:2264
-
\??\c:\6022228.exec:\6022228.exe68⤵PID:1532
-
\??\c:\26240.exec:\26240.exe69⤵PID:2972
-
\??\c:\0882604.exec:\0882604.exe70⤵PID:548
-
\??\c:\hnhnnn.exec:\hnhnnn.exe71⤵PID:3504
-
\??\c:\60048.exec:\60048.exe72⤵PID:1744
-
\??\c:\22400.exec:\22400.exe73⤵PID:2284
-
\??\c:\pvvpd.exec:\pvvpd.exe74⤵PID:3432
-
\??\c:\hbtnhb.exec:\hbtnhb.exe75⤵PID:2536
-
\??\c:\3vvpd.exec:\3vvpd.exe76⤵PID:3680
-
\??\c:\82048.exec:\82048.exe77⤵PID:5084
-
\??\c:\224826.exec:\224826.exe78⤵PID:4596
-
\??\c:\e86666.exec:\e86666.exe79⤵PID:4380
-
\??\c:\thhhtt.exec:\thhhtt.exe80⤵PID:4624
-
\??\c:\xlfxrrl.exec:\xlfxrrl.exe81⤵PID:636
-
\??\c:\xfxxrrl.exec:\xfxxrrl.exe82⤵
- System Location Discovery: System Language Discovery
PID:2028 -
\??\c:\hbbnhh.exec:\hbbnhh.exe83⤵PID:1044
-
\??\c:\2082004.exec:\2082004.exe84⤵PID:2388
-
\??\c:\nttnhh.exec:\nttnhh.exe85⤵PID:2956
-
\??\c:\httnnh.exec:\httnnh.exe86⤵PID:2092
-
\??\c:\266006.exec:\266006.exe87⤵PID:4064
-
\??\c:\fxfxlrl.exec:\fxfxlrl.exe88⤵PID:4516
-
\??\c:\vjpjv.exec:\vjpjv.exe89⤵PID:2004
-
\??\c:\02020.exec:\02020.exe90⤵PID:2052
-
\??\c:\e68604.exec:\e68604.exe91⤵PID:3792
-
\??\c:\402604.exec:\402604.exe92⤵PID:3012
-
\??\c:\jvvpj.exec:\jvvpj.exe93⤵PID:4244
-
\??\c:\068644.exec:\068644.exe94⤵PID:1632
-
\??\c:\4288882.exec:\4288882.exe95⤵PID:2468
-
\??\c:\i404448.exec:\i404448.exe96⤵PID:4916
-
\??\c:\228488.exec:\228488.exe97⤵PID:3492
-
\??\c:\64222.exec:\64222.exe98⤵PID:4628
-
\??\c:\k84860.exec:\k84860.exe99⤵PID:4956
-
\??\c:\xllfxxr.exec:\xllfxxr.exe100⤵PID:3944
-
\??\c:\222860.exec:\222860.exe101⤵PID:2020
-
\??\c:\408262.exec:\408262.exe102⤵PID:4552
-
\??\c:\lfffxrr.exec:\lfffxrr.exe103⤵PID:5068
-
\??\c:\xlfxrrr.exec:\xlfxrrr.exe104⤵PID:2692
-
\??\c:\402266.exec:\402266.exe105⤵PID:4440
-
\??\c:\0288226.exec:\0288226.exe106⤵PID:1564
-
\??\c:\48428.exec:\48428.exe107⤵PID:3312
-
\??\c:\hbnhtt.exec:\hbnhtt.exe108⤵PID:1708
-
\??\c:\9rrlfrr.exec:\9rrlfrr.exe109⤵PID:4452
-
\??\c:\2460040.exec:\2460040.exe110⤵PID:3144
-
\??\c:\64006.exec:\64006.exe111⤵PID:4084
-
\??\c:\1vpjd.exec:\1vpjd.exe112⤵PID:4940
-
\??\c:\3htnnn.exec:\3htnnn.exe113⤵PID:4156
-
\??\c:\nhnnhb.exec:\nhnnhb.exe114⤵PID:4160
-
\??\c:\xrrlffx.exec:\xrrlffx.exe115⤵PID:3860
-
\??\c:\fllxxrr.exec:\fllxxrr.exe116⤵PID:4812
-
\??\c:\6060004.exec:\6060004.exe117⤵PID:3972
-
\??\c:\7bhbtn.exec:\7bhbtn.exe118⤵PID:3400
-
\??\c:\628288.exec:\628288.exe119⤵PID:348
-
\??\c:\i400482.exec:\i400482.exe120⤵PID:3756
-
\??\c:\826044.exec:\826044.exe121⤵PID:4476
-
\??\c:\828222.exec:\828222.exe122⤵PID:1552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-