Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe
Resource
win7-20240903-en
General
-
Target
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe
-
Size
81KB
-
MD5
d2f821cac4d7cb591b05b998eeb065d8
-
SHA1
c5f55765f4cb8a55895509b7eb30b78879a8e40c
-
SHA256
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c
-
SHA512
7b2217ed103eea8f69b45f7ef46887970b5209fde5306ff0b316bf00bf83ae6fef53362119c20b8fb7632cd0ff5f37f2d75a91f92703ee6e0cf2de7488584894
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qoHrnZHaY3DLELsn8:ymb3NkkiQ3mdBjFIj+qYjhaoLD8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/2332-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2304-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4236-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2836-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/888-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4228-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1184-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3540-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1132-56-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1132-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2260-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2140-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4176-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4144-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3908-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2972-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2632-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3376-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/824-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1112-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
468226.exe40844.exe2066444.exe4282266.exe068444.exew00824.exec622666.exe66226.exe84626.exexxlrrff.exee66000.exe2604662.exe440482.exerxxlxxx.exetnnhhh.exeq20404.exee24482.exe482660.exehntnhh.exem0048.exe20022.exebnttnn.exe3xfxxxx.exejdddd.exetbhtnn.exejdpjd.exe628260.exe844488.exepvvvp.exe26664.exepdjpj.exe2400448.exe824400.exe60608.exe046644.exe4248886.exejdvvd.exe406222.exe200044.exe644488.exe206004.exepddvp.exexffxrrl.exepjddv.exejvvvv.exetbbthh.exe4480628.exe84482.exe624440.exew24888.exebbbbbb.exevpjjv.exellrxxxx.exe4066000.exebhhbbb.exe262262.exe8244264.exe6004844.exejdjdj.exefxfxxrr.exevvpjd.exe1jjvp.exe6082282.exeffrlfxr.exepid process 2304 468226.exe 2836 40844.exe 212 2066444.exe 4236 4282266.exe 888 068444.exe 4228 w00824.exe 1132 c622666.exe 5100 66226.exe 1184 84626.exe 3540 xxlrrff.exe 2912 e66000.exe 2260 2604662.exe 2140 440482.exe 4176 rxxlxxx.exe 4144 tnnhhh.exe 3908 q20404.exe 3172 e24482.exe 5060 482660.exe 4900 hntnhh.exe 1656 m0048.exe 2972 20022.exe 2632 bnttnn.exe 3376 3xfxxxx.exe 3476 jdddd.exe 440 tbhtnn.exe 3268 jdpjd.exe 368 628260.exe 824 844488.exe 3224 pvvvp.exe 1112 26664.exe 2076 pdjpj.exe 3260 2400448.exe 1648 824400.exe 4764 60608.exe 1140 046644.exe 3968 4248886.exe 400 jdvvd.exe 1572 406222.exe 820 200044.exe 3840 644488.exe 3916 206004.exe 3144 pddvp.exe 2284 xffxrrl.exe 4684 pjddv.exe 220 jvvvv.exe 2532 tbbthh.exe 3068 4480628.exe 1380 84482.exe 544 624440.exe 2148 w24888.exe 1468 bbbbbb.exe 2424 vpjjv.exe 4572 llrxxxx.exe 2096 4066000.exe 3904 bhhbbb.exe 404 262262.exe 4612 8244264.exe 2416 6004844.exe 2688 jdjdj.exe 2448 fxfxxrr.exe 4168 vvpjd.exe 4172 1jjvp.exe 2292 6082282.exe 3716 ffrlfxr.exe -
Processes:
resource yara_rule behavioral2/memory/2332-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2332-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4236-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2836-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/888-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3540-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1132-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2260-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2140-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4144-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2972-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2632-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3376-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/824-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1112-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
446600.exe3jvvd.exepjvpp.exe24048.exellffxxx.exek66600.exe464444.exe0022666.exe040000.exee68822.exefxfxrrr.exevpjjv.exe4400644.exefxfxxrr.exe002260.exentbbnt.exexrlrlrl.exe6000448.exevppjj.exe662260.exec404222.exexxrrxxx.exevpdvv.exebtbtht.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 446600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k66600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0022666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 040000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4400644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 002260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6000448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 662260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c404222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtht.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe468226.exe40844.exe2066444.exe4282266.exe068444.exew00824.exec622666.exe66226.exe84626.exexxlrrff.exee66000.exe2604662.exe440482.exerxxlxxx.exetnnhhh.exeq20404.exee24482.exe482660.exehntnhh.exem0048.exe20022.exedescription pid process target process PID 2332 wrote to memory of 2304 2332 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe 468226.exe PID 2332 wrote to memory of 2304 2332 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe 468226.exe PID 2332 wrote to memory of 2304 2332 e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe 468226.exe PID 2304 wrote to memory of 2836 2304 468226.exe 40844.exe PID 2304 wrote to memory of 2836 2304 468226.exe 40844.exe PID 2304 wrote to memory of 2836 2304 468226.exe 40844.exe PID 2836 wrote to memory of 212 2836 40844.exe 2066444.exe PID 2836 wrote to memory of 212 2836 40844.exe 2066444.exe PID 2836 wrote to memory of 212 2836 40844.exe 2066444.exe PID 212 wrote to memory of 4236 212 2066444.exe 4282266.exe PID 212 wrote to memory of 4236 212 2066444.exe 4282266.exe PID 212 wrote to memory of 4236 212 2066444.exe 4282266.exe PID 4236 wrote to memory of 888 4236 4282266.exe 068444.exe PID 4236 wrote to memory of 888 4236 4282266.exe 068444.exe PID 4236 wrote to memory of 888 4236 4282266.exe 068444.exe PID 888 wrote to memory of 4228 888 068444.exe w00824.exe PID 888 wrote to memory of 4228 888 068444.exe w00824.exe PID 888 wrote to memory of 4228 888 068444.exe w00824.exe PID 4228 wrote to memory of 1132 4228 w00824.exe c622666.exe PID 4228 wrote to memory of 1132 4228 w00824.exe c622666.exe PID 4228 wrote to memory of 1132 4228 w00824.exe c622666.exe PID 1132 wrote to memory of 5100 1132 c622666.exe 66226.exe PID 1132 wrote to memory of 5100 1132 c622666.exe 66226.exe PID 1132 wrote to memory of 5100 1132 c622666.exe 66226.exe PID 5100 wrote to memory of 1184 5100 66226.exe 84626.exe PID 5100 wrote to memory of 1184 5100 66226.exe 84626.exe PID 5100 wrote to memory of 1184 5100 66226.exe 84626.exe PID 1184 wrote to memory of 3540 1184 84626.exe xxlrrff.exe PID 1184 wrote to memory of 3540 1184 84626.exe xxlrrff.exe PID 1184 wrote to memory of 3540 1184 84626.exe xxlrrff.exe PID 3540 wrote to memory of 2912 3540 xxlrrff.exe e66000.exe PID 3540 wrote to memory of 2912 3540 xxlrrff.exe e66000.exe PID 3540 wrote to memory of 2912 3540 xxlrrff.exe e66000.exe PID 2912 wrote to memory of 2260 2912 e66000.exe 2604662.exe PID 2912 wrote to memory of 2260 2912 e66000.exe 2604662.exe PID 2912 wrote to memory of 2260 2912 e66000.exe 2604662.exe PID 2260 wrote to memory of 2140 2260 2604662.exe 440482.exe PID 2260 wrote to memory of 2140 2260 2604662.exe 440482.exe PID 2260 wrote to memory of 2140 2260 2604662.exe 440482.exe PID 2140 wrote to memory of 4176 2140 440482.exe rxxlxxx.exe PID 2140 wrote to memory of 4176 2140 440482.exe rxxlxxx.exe PID 2140 wrote to memory of 4176 2140 440482.exe rxxlxxx.exe PID 4176 wrote to memory of 4144 4176 rxxlxxx.exe tnnhhh.exe PID 4176 wrote to memory of 4144 4176 rxxlxxx.exe tnnhhh.exe PID 4176 wrote to memory of 4144 4176 rxxlxxx.exe tnnhhh.exe PID 4144 wrote to memory of 3908 4144 tnnhhh.exe q20404.exe PID 4144 wrote to memory of 3908 4144 tnnhhh.exe q20404.exe PID 4144 wrote to memory of 3908 4144 tnnhhh.exe q20404.exe PID 3908 wrote to memory of 3172 3908 q20404.exe e24482.exe PID 3908 wrote to memory of 3172 3908 q20404.exe e24482.exe PID 3908 wrote to memory of 3172 3908 q20404.exe e24482.exe PID 3172 wrote to memory of 5060 3172 e24482.exe 482660.exe PID 3172 wrote to memory of 5060 3172 e24482.exe 482660.exe PID 3172 wrote to memory of 5060 3172 e24482.exe 482660.exe PID 5060 wrote to memory of 4900 5060 482660.exe hntnhh.exe PID 5060 wrote to memory of 4900 5060 482660.exe hntnhh.exe PID 5060 wrote to memory of 4900 5060 482660.exe hntnhh.exe PID 4900 wrote to memory of 1656 4900 hntnhh.exe m0048.exe PID 4900 wrote to memory of 1656 4900 hntnhh.exe m0048.exe PID 4900 wrote to memory of 1656 4900 hntnhh.exe m0048.exe PID 1656 wrote to memory of 2972 1656 m0048.exe 20022.exe PID 1656 wrote to memory of 2972 1656 m0048.exe 20022.exe PID 1656 wrote to memory of 2972 1656 m0048.exe 20022.exe PID 2972 wrote to memory of 2632 2972 20022.exe bnttnn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe"C:\Users\Admin\AppData\Local\Temp\e0251dd1cee5b98043df04aa59eae520dad1554e443149d5c6e4c6d7ac02768c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\468226.exec:\468226.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\40844.exec:\40844.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\2066444.exec:\2066444.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\4282266.exec:\4282266.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\068444.exec:\068444.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\w00824.exec:\w00824.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\c622666.exec:\c622666.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\66226.exec:\66226.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\84626.exec:\84626.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\xxlrrff.exec:\xxlrrff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
\??\c:\e66000.exec:\e66000.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\2604662.exec:\2604662.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\440482.exec:\440482.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
\??\c:\rxxlxxx.exec:\rxxlxxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\tnnhhh.exec:\tnnhhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\q20404.exec:\q20404.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
\??\c:\e24482.exec:\e24482.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
\??\c:\482660.exec:\482660.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\hntnhh.exec:\hntnhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\m0048.exec:\m0048.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\20022.exec:\20022.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\bnttnn.exec:\bnttnn.exe23⤵
- Executes dropped EXE
PID:2632 -
\??\c:\3xfxxxx.exec:\3xfxxxx.exe24⤵
- Executes dropped EXE
PID:3376 -
\??\c:\jdddd.exec:\jdddd.exe25⤵
- Executes dropped EXE
PID:3476 -
\??\c:\tbhtnn.exec:\tbhtnn.exe26⤵
- Executes dropped EXE
PID:440 -
\??\c:\jdpjd.exec:\jdpjd.exe27⤵
- Executes dropped EXE
PID:3268 -
\??\c:\628260.exec:\628260.exe28⤵
- Executes dropped EXE
PID:368 -
\??\c:\844488.exec:\844488.exe29⤵
- Executes dropped EXE
PID:824 -
\??\c:\pvvvp.exec:\pvvvp.exe30⤵
- Executes dropped EXE
PID:3224 -
\??\c:\26664.exec:\26664.exe31⤵
- Executes dropped EXE
PID:1112 -
\??\c:\pdjpj.exec:\pdjpj.exe32⤵
- Executes dropped EXE
PID:2076 -
\??\c:\2400448.exec:\2400448.exe33⤵
- Executes dropped EXE
PID:3260 -
\??\c:\824400.exec:\824400.exe34⤵
- Executes dropped EXE
PID:1648 -
\??\c:\60608.exec:\60608.exe35⤵
- Executes dropped EXE
PID:4764 -
\??\c:\046644.exec:\046644.exe36⤵
- Executes dropped EXE
PID:1140 -
\??\c:\4248886.exec:\4248886.exe37⤵
- Executes dropped EXE
PID:3968 -
\??\c:\jdvvd.exec:\jdvvd.exe38⤵
- Executes dropped EXE
PID:400 -
\??\c:\406222.exec:\406222.exe39⤵
- Executes dropped EXE
PID:1572 -
\??\c:\200044.exec:\200044.exe40⤵
- Executes dropped EXE
PID:820 -
\??\c:\644488.exec:\644488.exe41⤵
- Executes dropped EXE
PID:3840 -
\??\c:\206004.exec:\206004.exe42⤵
- Executes dropped EXE
PID:3916 -
\??\c:\pddvp.exec:\pddvp.exe43⤵
- Executes dropped EXE
PID:3144 -
\??\c:\xffxrrl.exec:\xffxrrl.exe44⤵
- Executes dropped EXE
PID:2284 -
\??\c:\pjddv.exec:\pjddv.exe45⤵
- Executes dropped EXE
PID:4684 -
\??\c:\jvvvv.exec:\jvvvv.exe46⤵
- Executes dropped EXE
PID:220 -
\??\c:\tbbthh.exec:\tbbthh.exe47⤵
- Executes dropped EXE
PID:2532 -
\??\c:\4480628.exec:\4480628.exe48⤵
- Executes dropped EXE
PID:3068 -
\??\c:\84482.exec:\84482.exe49⤵
- Executes dropped EXE
PID:1380 -
\??\c:\624440.exec:\624440.exe50⤵
- Executes dropped EXE
PID:544 -
\??\c:\w24888.exec:\w24888.exe51⤵
- Executes dropped EXE
PID:2148 -
\??\c:\bbbbbb.exec:\bbbbbb.exe52⤵
- Executes dropped EXE
PID:1468 -
\??\c:\vpjjv.exec:\vpjjv.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
\??\c:\llrxxxx.exec:\llrxxxx.exe54⤵
- Executes dropped EXE
PID:4572 -
\??\c:\4066000.exec:\4066000.exe55⤵
- Executes dropped EXE
PID:2096 -
\??\c:\bhhbbb.exec:\bhhbbb.exe56⤵
- Executes dropped EXE
PID:3904 -
\??\c:\262262.exec:\262262.exe57⤵
- Executes dropped EXE
PID:404 -
\??\c:\8244264.exec:\8244264.exe58⤵
- Executes dropped EXE
PID:4612 -
\??\c:\6004844.exec:\6004844.exe59⤵
- Executes dropped EXE
PID:2416 -
\??\c:\jdjdj.exec:\jdjdj.exe60⤵
- Executes dropped EXE
PID:2688 -
\??\c:\fxfxxrr.exec:\fxfxxrr.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448 -
\??\c:\vvpjd.exec:\vvpjd.exe62⤵
- Executes dropped EXE
PID:4168 -
\??\c:\1jjvp.exec:\1jjvp.exe63⤵
- Executes dropped EXE
PID:4172 -
\??\c:\6082282.exec:\6082282.exe64⤵
- Executes dropped EXE
PID:2292 -
\??\c:\ffrlfxr.exec:\ffrlfxr.exe65⤵
- Executes dropped EXE
PID:3716 -
\??\c:\nbnhtt.exec:\nbnhtt.exe66⤵PID:2388
-
\??\c:\frfxrxl.exec:\frfxrxl.exe67⤵PID:860
-
\??\c:\rlrlrxx.exec:\rlrlrxx.exe68⤵PID:904
-
\??\c:\2644642.exec:\2644642.exe69⤵PID:2452
-
\??\c:\6460044.exec:\6460044.exe70⤵PID:2512
-
\??\c:\jpdpd.exec:\jpdpd.exe71⤵PID:1600
-
\??\c:\40260.exec:\40260.exe72⤵PID:1496
-
\??\c:\rrxxllr.exec:\rrxxllr.exe73⤵PID:3872
-
\??\c:\btbtnn.exec:\btbtnn.exe74⤵PID:452
-
\??\c:\hhhhnn.exec:\hhhhnn.exe75⤵PID:2576
-
\??\c:\e66228.exec:\e66228.exe76⤵PID:3284
-
\??\c:\q44826.exec:\q44826.exe77⤵PID:4100
-
\??\c:\rllfrrl.exec:\rllfrrl.exe78⤵PID:1628
-
\??\c:\0622226.exec:\0622226.exe79⤵PID:3176
-
\??\c:\6282260.exec:\6282260.exe80⤵PID:3588
-
\??\c:\484888.exec:\484888.exe81⤵PID:3376
-
\??\c:\bnhthh.exec:\bnhthh.exe82⤵PID:3476
-
\??\c:\482862.exec:\482862.exe83⤵PID:1348
-
\??\c:\44662.exec:\44662.exe84⤵PID:3624
-
\??\c:\8226004.exec:\8226004.exe85⤵PID:3268
-
\??\c:\680402.exec:\680402.exe86⤵PID:660
-
\??\c:\tbbbbb.exec:\tbbbbb.exe87⤵PID:2256
-
\??\c:\c060448.exec:\c060448.exe88⤵PID:924
-
\??\c:\42448.exec:\42448.exe89⤵PID:1884
-
\??\c:\7jjdv.exec:\7jjdv.exe90⤵PID:1592
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe91⤵PID:3600
-
\??\c:\640444.exec:\640444.exe92⤵PID:1152
-
\??\c:\jjdvv.exec:\jjdvv.exe93⤵PID:1240
-
\??\c:\nnbtnb.exec:\nnbtnb.exe94⤵PID:3772
-
\??\c:\1hnhhh.exec:\1hnhhh.exe95⤵PID:3188
-
\??\c:\pdddv.exec:\pdddv.exe96⤵PID:3808
-
\??\c:\ppvjj.exec:\ppvjj.exe97⤵PID:3896
-
\??\c:\086004.exec:\086004.exe98⤵PID:5116
-
\??\c:\4026006.exec:\4026006.exe99⤵PID:4068
-
\??\c:\4466800.exec:\4466800.exe100⤵PID:2524
-
\??\c:\jdjdv.exec:\jdjdv.exe101⤵PID:3504
-
\??\c:\fxlfffl.exec:\fxlfffl.exe102⤵PID:2612
-
\??\c:\nnnnbb.exec:\nnnnbb.exe103⤵PID:4484
-
\??\c:\ddppv.exec:\ddppv.exe104⤵PID:2332
-
\??\c:\tttnbb.exec:\tttnbb.exe105⤵PID:3660
-
\??\c:\pjvpp.exec:\pjvpp.exe106⤵
- System Location Discovery: System Language Discovery
PID:2308 -
\??\c:\2860826.exec:\2860826.exe107⤵PID:560
-
\??\c:\o002682.exec:\o002682.exe108⤵PID:4016
-
\??\c:\k66600.exec:\k66600.exe109⤵
- System Location Discovery: System Language Discovery
PID:512 -
\??\c:\3pjdd.exec:\3pjdd.exe110⤵PID:4344
-
\??\c:\xlfxrrl.exec:\xlfxrrl.exe111⤵PID:436
-
\??\c:\hbtbbb.exec:\hbtbbb.exe112⤵PID:3472
-
\??\c:\bhtthn.exec:\bhtthn.exe113⤵PID:1280
-
\??\c:\62042.exec:\62042.exe114⤵PID:1980
-
\??\c:\2682600.exec:\2682600.exe115⤵PID:2448
-
\??\c:\7rxrrll.exec:\7rxrrll.exe116⤵PID:936
-
\??\c:\m2226.exec:\m2226.exe117⤵PID:4172
-
\??\c:\pjjdd.exec:\pjjdd.exe118⤵PID:2204
-
\??\c:\1nnhbb.exec:\1nnhbb.exe119⤵PID:3716
-
\??\c:\rllrffx.exec:\rllrffx.exe120⤵PID:2792
-
\??\c:\5dddv.exec:\5dddv.exe121⤵PID:2064
-
\??\c:\tttbtt.exec:\tttbtt.exe122⤵PID:2084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-