Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 13:38
Static task
static1
Behavioral task
behavioral1
Sample
b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe
Resource
win7-20240729-en
General
-
Target
b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe
-
Size
76KB
-
MD5
a7a28e6bc1e5d1c8fb54c18889c8e7bf
-
SHA1
2acaff2087071c04cf89dbb6fb0c30537bb1f5d0
-
SHA256
b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e
-
SHA512
c369dc61f692ed9e238616bd1350c15ad441160b0b054998efcc11ff880313e32992ccd6fb35e16305bd72a0bea02dcbbca5045611a5d3007722c1541b3d5fde
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmsf:ymb3NkkiQ3mdBjFIvl358nLA89OMFVHp
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/3276-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1640-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1980-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4196-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3980-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3528-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/852-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4228-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4496-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4372-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2188-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3012-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3672-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3680-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1212-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2300 24486.exe 1640 hbhbtt.exe 1980 rrxlxxl.exe 408 1tnhtt.exe 4196 6228802.exe 3096 26260.exe 3980 a8226.exe 4228 4228288.exe 3528 nbnnhh.exe 852 40220.exe 2732 bnbtbt.exe 4496 22822.exe 4372 u082888.exe 2188 jjjdv.exe 3012 00424.exe 3672 nthnhh.exe 2956 6684880.exe 928 24004.exe 1244 9jdvp.exe 3556 xrxrffx.exe 1816 48440.exe 5040 6044844.exe 1700 42448.exe 3736 w28266.exe 2252 ppjjv.exe 3680 860428.exe 4172 3nthtn.exe 4384 02482.exe 4048 2060848.exe 2156 48486.exe 1212 hnnhtn.exe 368 btbnhb.exe 4808 nbbnbt.exe 1416 6860482.exe 3620 40008.exe 796 2282486.exe 3432 pjdvj.exe 4632 pdpjp.exe 3376 i664260.exe 3648 08822.exe 3552 2442082.exe 3664 lrrfxrf.exe 4960 dpdvd.exe 2616 7fflxrl.exe 4004 08044.exe 4436 0882266.exe 4676 7pjdp.exe 636 482204.exe 2196 fllxlxr.exe 2128 e68822.exe 1208 vpdpd.exe 1980 m2868.exe 2892 thbtnh.exe 3988 nbhtbt.exe 1624 2482084.exe 3268 xxxrfxl.exe 3480 6288608.exe 2360 tbtthn.exe 2512 4000826.exe 1756 tbthtt.exe 4712 66602.exe 3128 a2864.exe 4380 866084.exe 1004 802600.exe -
resource yara_rule behavioral2/memory/3276-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2300-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1640-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4196-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3528-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/852-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4372-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2188-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3012-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3672-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3680-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1212-211-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrflff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4622222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 662082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxrlrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2300 3276 b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe 83 PID 3276 wrote to memory of 2300 3276 b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe 83 PID 3276 wrote to memory of 2300 3276 b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe 83 PID 2300 wrote to memory of 1640 2300 24486.exe 84 PID 2300 wrote to memory of 1640 2300 24486.exe 84 PID 2300 wrote to memory of 1640 2300 24486.exe 84 PID 1640 wrote to memory of 1980 1640 hbhbtt.exe 85 PID 1640 wrote to memory of 1980 1640 hbhbtt.exe 85 PID 1640 wrote to memory of 1980 1640 hbhbtt.exe 85 PID 1980 wrote to memory of 408 1980 rrxlxxl.exe 86 PID 1980 wrote to memory of 408 1980 rrxlxxl.exe 86 PID 1980 wrote to memory of 408 1980 rrxlxxl.exe 86 PID 408 wrote to memory of 4196 408 1tnhtt.exe 87 PID 408 wrote to memory of 4196 408 1tnhtt.exe 87 PID 408 wrote to memory of 4196 408 1tnhtt.exe 87 PID 4196 wrote to memory of 3096 4196 6228802.exe 88 PID 4196 wrote to memory of 3096 4196 6228802.exe 88 PID 4196 wrote to memory of 3096 4196 6228802.exe 88 PID 3096 wrote to memory of 3980 3096 26260.exe 89 PID 3096 wrote to memory of 3980 3096 26260.exe 89 PID 3096 wrote to memory of 3980 3096 26260.exe 89 PID 3980 wrote to memory of 4228 3980 a8226.exe 90 PID 3980 wrote to memory of 4228 3980 a8226.exe 90 PID 3980 wrote to memory of 4228 3980 a8226.exe 90 PID 4228 wrote to memory of 3528 4228 4228288.exe 91 PID 4228 wrote to memory of 3528 4228 4228288.exe 91 PID 4228 wrote to memory of 3528 4228 4228288.exe 91 PID 3528 wrote to memory of 852 3528 nbnnhh.exe 92 PID 3528 wrote to memory of 852 3528 nbnnhh.exe 92 PID 3528 wrote to memory of 852 3528 nbnnhh.exe 92 PID 852 wrote to memory of 2732 852 40220.exe 93 PID 852 wrote to memory of 2732 852 40220.exe 93 PID 852 wrote to memory of 2732 852 40220.exe 93 PID 2732 wrote to memory of 4496 2732 bnbtbt.exe 94 PID 2732 wrote to memory of 4496 2732 bnbtbt.exe 94 PID 2732 wrote to memory of 4496 2732 bnbtbt.exe 94 PID 4496 wrote to memory of 4372 4496 22822.exe 95 PID 4496 wrote to memory of 4372 4496 22822.exe 95 PID 4496 wrote to memory of 4372 4496 22822.exe 95 PID 4372 wrote to memory of 2188 4372 u082888.exe 96 PID 4372 wrote to memory of 2188 4372 u082888.exe 96 PID 4372 wrote to memory of 2188 4372 u082888.exe 96 PID 2188 wrote to memory of 3012 2188 jjjdv.exe 97 PID 2188 wrote to memory of 3012 2188 jjjdv.exe 97 PID 2188 wrote to memory of 3012 2188 jjjdv.exe 97 PID 3012 wrote to memory of 3672 3012 00424.exe 98 PID 3012 wrote to memory of 3672 3012 00424.exe 98 PID 3012 wrote to memory of 3672 3012 00424.exe 98 PID 3672 wrote to memory of 2956 3672 nthnhh.exe 99 PID 3672 wrote to memory of 2956 3672 nthnhh.exe 99 PID 3672 wrote to memory of 2956 3672 nthnhh.exe 99 PID 2956 wrote to memory of 928 2956 6684880.exe 100 PID 2956 wrote to memory of 928 2956 6684880.exe 100 PID 2956 wrote to memory of 928 2956 6684880.exe 100 PID 928 wrote to memory of 1244 928 24004.exe 101 PID 928 wrote to memory of 1244 928 24004.exe 101 PID 928 wrote to memory of 1244 928 24004.exe 101 PID 1244 wrote to memory of 3556 1244 9jdvp.exe 102 PID 1244 wrote to memory of 3556 1244 9jdvp.exe 102 PID 1244 wrote to memory of 3556 1244 9jdvp.exe 102 PID 3556 wrote to memory of 1816 3556 xrxrffx.exe 103 PID 3556 wrote to memory of 1816 3556 xrxrffx.exe 103 PID 3556 wrote to memory of 1816 3556 xrxrffx.exe 103 PID 1816 wrote to memory of 5040 1816 48440.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe"C:\Users\Admin\AppData\Local\Temp\b39b23d6ffd020d594e16b0ce25e34d104746426f0c53951346904cbc755cf4e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
\??\c:\24486.exec:\24486.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\hbhbtt.exec:\hbhbtt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
\??\c:\rrxlxxl.exec:\rrxlxxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\1tnhtt.exec:\1tnhtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
\??\c:\6228802.exec:\6228802.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
\??\c:\26260.exec:\26260.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\a8226.exec:\a8226.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
\??\c:\4228288.exec:\4228288.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\nbnnhh.exec:\nbnnhh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\40220.exec:\40220.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
\??\c:\bnbtbt.exec:\bnbtbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\22822.exec:\22822.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\u082888.exec:\u082888.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
\??\c:\jjjdv.exec:\jjjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\00424.exec:\00424.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\nthnhh.exec:\nthnhh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
\??\c:\6684880.exec:\6684880.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\24004.exec:\24004.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\9jdvp.exec:\9jdvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
\??\c:\xrxrffx.exec:\xrxrffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\48440.exec:\48440.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
\??\c:\6044844.exec:\6044844.exe23⤵
- Executes dropped EXE
PID:5040 -
\??\c:\42448.exec:\42448.exe24⤵
- Executes dropped EXE
PID:1700 -
\??\c:\w28266.exec:\w28266.exe25⤵
- Executes dropped EXE
PID:3736 -
\??\c:\ppjjv.exec:\ppjjv.exe26⤵
- Executes dropped EXE
PID:2252 -
\??\c:\860428.exec:\860428.exe27⤵
- Executes dropped EXE
PID:3680 -
\??\c:\3nthtn.exec:\3nthtn.exe28⤵
- Executes dropped EXE
PID:4172 -
\??\c:\02482.exec:\02482.exe29⤵
- Executes dropped EXE
PID:4384 -
\??\c:\2060848.exec:\2060848.exe30⤵
- Executes dropped EXE
PID:4048 -
\??\c:\48486.exec:\48486.exe31⤵
- Executes dropped EXE
PID:2156 -
\??\c:\hnnhtn.exec:\hnnhtn.exe32⤵
- Executes dropped EXE
PID:1212 -
\??\c:\btbnhb.exec:\btbnhb.exe33⤵
- Executes dropped EXE
PID:368 -
\??\c:\nbbnbt.exec:\nbbnbt.exe34⤵
- Executes dropped EXE
PID:4808 -
\??\c:\6860482.exec:\6860482.exe35⤵
- Executes dropped EXE
PID:1416 -
\??\c:\40008.exec:\40008.exe36⤵
- Executes dropped EXE
PID:3620 -
\??\c:\2282486.exec:\2282486.exe37⤵
- Executes dropped EXE
PID:796 -
\??\c:\pjdvj.exec:\pjdvj.exe38⤵
- Executes dropped EXE
PID:3432 -
\??\c:\pdpjp.exec:\pdpjp.exe39⤵
- Executes dropped EXE
PID:4632 -
\??\c:\i664260.exec:\i664260.exe40⤵
- Executes dropped EXE
PID:3376 -
\??\c:\08822.exec:\08822.exe41⤵
- Executes dropped EXE
PID:3648 -
\??\c:\2442082.exec:\2442082.exe42⤵
- Executes dropped EXE
PID:3552 -
\??\c:\lrrfxrf.exec:\lrrfxrf.exe43⤵
- Executes dropped EXE
PID:3664 -
\??\c:\dpdvd.exec:\dpdvd.exe44⤵
- Executes dropped EXE
PID:4960 -
\??\c:\7fflxrl.exec:\7fflxrl.exe45⤵
- Executes dropped EXE
PID:2616 -
\??\c:\08044.exec:\08044.exe46⤵
- Executes dropped EXE
PID:4004 -
\??\c:\0882266.exec:\0882266.exe47⤵
- Executes dropped EXE
PID:4436 -
\??\c:\7pjdp.exec:\7pjdp.exe48⤵
- Executes dropped EXE
PID:4676 -
\??\c:\482204.exec:\482204.exe49⤵
- Executes dropped EXE
PID:636 -
\??\c:\fllxlxr.exec:\fllxlxr.exe50⤵
- Executes dropped EXE
PID:2196 -
\??\c:\e68822.exec:\e68822.exe51⤵
- Executes dropped EXE
PID:2128 -
\??\c:\vpdpd.exec:\vpdpd.exe52⤵
- Executes dropped EXE
PID:1208 -
\??\c:\m2868.exec:\m2868.exe53⤵
- Executes dropped EXE
PID:1980 -
\??\c:\thbtnh.exec:\thbtnh.exe54⤵
- Executes dropped EXE
PID:2892 -
\??\c:\nbhtbt.exec:\nbhtbt.exe55⤵
- Executes dropped EXE
PID:3988 -
\??\c:\2482084.exec:\2482084.exe56⤵
- Executes dropped EXE
PID:1624 -
\??\c:\xxxrfxl.exec:\xxxrfxl.exe57⤵
- Executes dropped EXE
PID:3268 -
\??\c:\6288608.exec:\6288608.exe58⤵
- Executes dropped EXE
PID:3480 -
\??\c:\tbtthn.exec:\tbtthn.exe59⤵
- Executes dropped EXE
PID:2360 -
\??\c:\4000826.exec:\4000826.exe60⤵
- Executes dropped EXE
PID:2512 -
\??\c:\tbthtt.exec:\tbthtt.exe61⤵
- Executes dropped EXE
PID:1756 -
\??\c:\66602.exec:\66602.exe62⤵
- Executes dropped EXE
PID:4712 -
\??\c:\a2864.exec:\a2864.exe63⤵
- Executes dropped EXE
PID:3128 -
\??\c:\866084.exec:\866084.exe64⤵
- Executes dropped EXE
PID:4380 -
\??\c:\802600.exec:\802600.exe65⤵
- Executes dropped EXE
PID:1004 -
\??\c:\422042.exec:\422042.exe66⤵PID:3844
-
\??\c:\0064608.exec:\0064608.exe67⤵PID:556
-
\??\c:\a8202.exec:\a8202.exe68⤵PID:1356
-
\??\c:\c660088.exec:\c660088.exe69⤵PID:4948
-
\??\c:\ppjpd.exec:\ppjpd.exe70⤵PID:4404
-
\??\c:\0842604.exec:\0842604.exe71⤵PID:1888
-
\??\c:\pddpd.exec:\pddpd.exe72⤵PID:3196
-
\??\c:\nnnbhb.exec:\nnnbhb.exe73⤵PID:3692
-
\??\c:\64442.exec:\64442.exe74⤵PID:2560
-
\??\c:\o482042.exec:\o482042.exe75⤵PID:4020
-
\??\c:\8062460.exec:\8062460.exe76⤵PID:2224
-
\??\c:\rrxxrrf.exec:\rrxxrrf.exe77⤵PID:1852
-
\??\c:\lxlfrlx.exec:\lxlfrlx.exe78⤵PID:2408
-
\??\c:\k66482.exec:\k66482.exe79⤵PID:3044
-
\??\c:\rxxrxxl.exec:\rxxrxxl.exe80⤵PID:4640
-
\??\c:\lflfrrl.exec:\lflfrrl.exe81⤵PID:4992
-
\??\c:\848208.exec:\848208.exe82⤵PID:2252
-
\??\c:\bntnhn.exec:\bntnhn.exe83⤵
- System Location Discovery: System Language Discovery
PID:1628 -
\??\c:\dppvv.exec:\dppvv.exe84⤵PID:2864
-
\??\c:\086086.exec:\086086.exe85⤵PID:4600
-
\??\c:\c804600.exec:\c804600.exe86⤵PID:2428
-
\??\c:\xxrrrff.exec:\xxrrrff.exe87⤵PID:952
-
\??\c:\06288.exec:\06288.exe88⤵PID:4896
-
\??\c:\046668.exec:\046668.exe89⤵PID:3568
-
\??\c:\fxllrrf.exec:\fxllrrf.exe90⤵PID:1132
-
\??\c:\bbhbtb.exec:\bbhbtb.exe91⤵PID:4824
-
\??\c:\pvpdv.exec:\pvpdv.exe92⤵PID:3124
-
\??\c:\dvvjv.exec:\dvvjv.exe93⤵PID:2940
-
\??\c:\m2820.exec:\m2820.exe94⤵PID:4772
-
\??\c:\rllxxrf.exec:\rllxxrf.exe95⤵PID:2632
-
\??\c:\2848686.exec:\2848686.exe96⤵PID:4632
-
\??\c:\ntnhbb.exec:\ntnhbb.exe97⤵PID:4100
-
\??\c:\5nhthb.exec:\5nhthb.exe98⤵PID:2604
-
\??\c:\640424.exec:\640424.exe99⤵PID:3884
-
\??\c:\9vvpd.exec:\9vvpd.exe100⤵PID:2816
-
\??\c:\lrlrlfr.exec:\lrlrlfr.exe101⤵PID:4128
-
\??\c:\24086.exec:\24086.exe102⤵PID:1632
-
\??\c:\pdpdv.exec:\pdpdv.exe103⤵PID:2012
-
\??\c:\rrrlfxl.exec:\rrrlfxl.exe104⤵PID:3928
-
\??\c:\xxfrfxl.exec:\xxfrfxl.exe105⤵PID:3652
-
\??\c:\flxrfxr.exec:\flxrfxr.exe106⤵PID:4952
-
\??\c:\pvvjv.exec:\pvvjv.exe107⤵PID:1644
-
\??\c:\jvpdp.exec:\jvpdp.exe108⤵PID:676
-
\??\c:\m4466.exec:\m4466.exe109⤵PID:888
-
\??\c:\lfrrfxx.exec:\lfrrfxx.exe110⤵PID:2796
-
\??\c:\rlxrfxr.exec:\rlxrfxr.exe111⤵PID:2464
-
\??\c:\bbhbbt.exec:\bbhbbt.exe112⤵PID:2368
-
\??\c:\20042.exec:\20042.exe113⤵PID:3220
-
\??\c:\k22082.exec:\k22082.exe114⤵PID:4296
-
\??\c:\nbhttn.exec:\nbhttn.exe115⤵PID:4620
-
\??\c:\vppjd.exec:\vppjd.exe116⤵PID:5084
-
\??\c:\xlrlfxx.exec:\xlrlfxx.exe117⤵PID:4496
-
\??\c:\jpjdd.exec:\jpjdd.exe118⤵PID:4084
-
\??\c:\0886486.exec:\0886486.exe119⤵PID:536
-
\??\c:\q22082.exec:\q22082.exe120⤵PID:2832
-
\??\c:\8686600.exec:\8686600.exe121⤵PID:1576
-
\??\c:\6408648.exec:\6408648.exe122⤵PID:32
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-