Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 02:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe
-
Size
71KB
-
MD5
5e7311becc25b8bbf4b9d800fafd50b0
-
SHA1
47b09cb4734bc8e673b44860309b439efbafb1f1
-
SHA256
221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5db
-
SHA512
30c043eb840e04395344e471af5bde04eb102e52e1fc570ddd22f0496e85a30c6fad352bc1eeafd6027390a7450c71bf7e6a3e0dcb2c5b79110ba2ed3b2204fd
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfj0:ymb3NkkiQ3mdBjFI4VE
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/3764-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4868-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2148-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2148-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4820-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4372-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1968-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/652-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1632-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/712-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3156-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/316-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3684-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1764-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1332-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2560-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4188-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/388-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/228-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3992-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4240-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4868 c244064.exe 4172 3llfxlf.exe 4820 2282604.exe 2148 lrlrllf.exe 3616 0282660.exe 4220 pvddv.exe 4372 7ppdj.exe 1968 426408.exe 2780 tnbhbn.exe 652 pjddd.exe 1632 w24204.exe 712 m2826.exe 3156 9rlxllf.exe 316 466460.exe 3684 80822.exe 4864 20840.exe 1764 pvvpj.exe 1332 jdvpd.exe 2560 2822604.exe 4224 nhhbbb.exe 4188 htbhbb.exe 388 bbbtht.exe 228 3btnhb.exe 3992 s8488.exe 1700 hnnbtn.exe 1012 hhhbbt.exe 3420 66222.exe 4240 8620002.exe 4672 24000.exe 4360 6680062.exe 3480 btbtnn.exe 2140 djpjv.exe 2096 a6220.exe 2152 rlfxffl.exe 4580 6424046.exe 3160 i800444.exe 3212 3ffxxxr.exe 4232 tbbnht.exe 5092 u642604.exe 1748 642880.exe 2276 nthtnb.exe 1680 64004.exe 5096 7pvvp.exe 5064 1rxrrrr.exe 3228 o222222.exe 1448 q62000.exe 4476 2622882.exe 3636 604200.exe 2544 ffxxlrl.exe 3368 6884446.exe 4588 fxxlfxx.exe 2836 86024.exe 3612 68604.exe 1228 jpjvp.exe 2828 402644.exe 5016 vjjvp.exe 4020 9vvvp.exe 4372 rfxrfxx.exe 4728 vdpdv.exe 2380 tbbtnh.exe 744 lxrxlrf.exe 5108 28028.exe 2440 frlxlxr.exe 928 9vpdv.exe -
resource yara_rule behavioral2/memory/3764-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3764-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4820-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4820-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4820-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4372-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1968-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/652-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1632-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3156-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/316-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3684-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1764-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1332-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2560-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4188-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/388-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3992-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4240-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 404682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 820262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7djjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2222888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffffrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rlfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 000082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c244064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2622606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4440004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4868 3764 221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe 83 PID 3764 wrote to memory of 4868 3764 221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe 83 PID 3764 wrote to memory of 4868 3764 221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe 83 PID 4868 wrote to memory of 4172 4868 c244064.exe 84 PID 4868 wrote to memory of 4172 4868 c244064.exe 84 PID 4868 wrote to memory of 4172 4868 c244064.exe 84 PID 4172 wrote to memory of 4820 4172 3llfxlf.exe 85 PID 4172 wrote to memory of 4820 4172 3llfxlf.exe 85 PID 4172 wrote to memory of 4820 4172 3llfxlf.exe 85 PID 4820 wrote to memory of 2148 4820 2282604.exe 86 PID 4820 wrote to memory of 2148 4820 2282604.exe 86 PID 4820 wrote to memory of 2148 4820 2282604.exe 86 PID 2148 wrote to memory of 3616 2148 lrlrllf.exe 87 PID 2148 wrote to memory of 3616 2148 lrlrllf.exe 87 PID 2148 wrote to memory of 3616 2148 lrlrllf.exe 87 PID 3616 wrote to memory of 4220 3616 0282660.exe 88 PID 3616 wrote to memory of 4220 3616 0282660.exe 88 PID 3616 wrote to memory of 4220 3616 0282660.exe 88 PID 4220 wrote to memory of 4372 4220 pvddv.exe 89 PID 4220 wrote to memory of 4372 4220 pvddv.exe 89 PID 4220 wrote to memory of 4372 4220 pvddv.exe 89 PID 4372 wrote to memory of 1968 4372 7ppdj.exe 90 PID 4372 wrote to memory of 1968 4372 7ppdj.exe 90 PID 4372 wrote to memory of 1968 4372 7ppdj.exe 90 PID 1968 wrote to memory of 2780 1968 426408.exe 91 PID 1968 wrote to memory of 2780 1968 426408.exe 91 PID 1968 wrote to memory of 2780 1968 426408.exe 91 PID 2780 wrote to memory of 652 2780 tnbhbn.exe 92 PID 2780 wrote to memory of 652 2780 tnbhbn.exe 92 PID 2780 wrote to memory of 652 2780 tnbhbn.exe 92 PID 652 wrote to memory of 1632 652 pjddd.exe 93 PID 652 wrote to memory of 1632 652 pjddd.exe 93 PID 652 wrote to memory of 1632 652 pjddd.exe 93 PID 1632 wrote to memory of 712 1632 w24204.exe 94 PID 1632 wrote to memory of 712 1632 w24204.exe 94 PID 1632 wrote to memory of 712 1632 w24204.exe 94 PID 712 wrote to memory of 3156 712 m2826.exe 95 PID 712 wrote to memory of 3156 712 m2826.exe 95 PID 712 wrote to memory of 3156 712 m2826.exe 95 PID 3156 wrote to memory of 316 3156 9rlxllf.exe 96 PID 3156 wrote to memory of 316 3156 9rlxllf.exe 96 PID 3156 wrote to memory of 316 3156 9rlxllf.exe 96 PID 316 wrote to memory of 3684 316 466460.exe 97 PID 316 wrote to memory of 3684 316 466460.exe 97 PID 316 wrote to memory of 3684 316 466460.exe 97 PID 3684 wrote to memory of 4864 3684 80822.exe 98 PID 3684 wrote to memory of 4864 3684 80822.exe 98 PID 3684 wrote to memory of 4864 3684 80822.exe 98 PID 4864 wrote to memory of 1764 4864 20840.exe 99 PID 4864 wrote to memory of 1764 4864 20840.exe 99 PID 4864 wrote to memory of 1764 4864 20840.exe 99 PID 1764 wrote to memory of 1332 1764 pvvpj.exe 100 PID 1764 wrote to memory of 1332 1764 pvvpj.exe 100 PID 1764 wrote to memory of 1332 1764 pvvpj.exe 100 PID 1332 wrote to memory of 2560 1332 jdvpd.exe 101 PID 1332 wrote to memory of 2560 1332 jdvpd.exe 101 PID 1332 wrote to memory of 2560 1332 jdvpd.exe 101 PID 2560 wrote to memory of 4224 2560 2822604.exe 102 PID 2560 wrote to memory of 4224 2560 2822604.exe 102 PID 2560 wrote to memory of 4224 2560 2822604.exe 102 PID 4224 wrote to memory of 4188 4224 nhhbbb.exe 103 PID 4224 wrote to memory of 4188 4224 nhhbbb.exe 103 PID 4224 wrote to memory of 4188 4224 nhhbbb.exe 103 PID 4188 wrote to memory of 388 4188 htbhbb.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe"C:\Users\Admin\AppData\Local\Temp\221e8c1bb311c20f59810f07efcbd1df7f9ce75fce474325462b1f31c853f5dbN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\c244064.exec:\c244064.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
\??\c:\3llfxlf.exec:\3llfxlf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\2282604.exec:\2282604.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\lrlrllf.exec:\lrlrllf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\0282660.exec:\0282660.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\pvddv.exec:\pvddv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\7ppdj.exec:\7ppdj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
\??\c:\426408.exec:\426408.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\tnbhbn.exec:\tnbhbn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\pjddd.exec:\pjddd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
\??\c:\w24204.exec:\w24204.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\m2826.exec:\m2826.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
\??\c:\9rlxllf.exec:\9rlxllf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
\??\c:\466460.exec:\466460.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\80822.exec:\80822.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
\??\c:\20840.exec:\20840.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\pvvpj.exec:\pvvpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
\??\c:\jdvpd.exec:\jdvpd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\2822604.exec:\2822604.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\nhhbbb.exec:\nhhbbb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\htbhbb.exec:\htbhbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
\??\c:\bbbtht.exec:\bbbtht.exe23⤵
- Executes dropped EXE
PID:388 -
\??\c:\3btnhb.exec:\3btnhb.exe24⤵
- Executes dropped EXE
PID:228 -
\??\c:\s8488.exec:\s8488.exe25⤵
- Executes dropped EXE
PID:3992 -
\??\c:\hnnbtn.exec:\hnnbtn.exe26⤵
- Executes dropped EXE
PID:1700 -
\??\c:\hhhbbt.exec:\hhhbbt.exe27⤵
- Executes dropped EXE
PID:1012 -
\??\c:\66222.exec:\66222.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420 -
\??\c:\8620002.exec:\8620002.exe29⤵
- Executes dropped EXE
PID:4240 -
\??\c:\24000.exec:\24000.exe30⤵
- Executes dropped EXE
PID:4672 -
\??\c:\6680062.exec:\6680062.exe31⤵
- Executes dropped EXE
PID:4360 -
\??\c:\btbtnn.exec:\btbtnn.exe32⤵
- Executes dropped EXE
PID:3480 -
\??\c:\djpjv.exec:\djpjv.exe33⤵
- Executes dropped EXE
PID:2140 -
\??\c:\a6220.exec:\a6220.exe34⤵
- Executes dropped EXE
PID:2096 -
\??\c:\rlfxffl.exec:\rlfxffl.exe35⤵
- Executes dropped EXE
PID:2152 -
\??\c:\6424046.exec:\6424046.exe36⤵
- Executes dropped EXE
PID:4580 -
\??\c:\i800444.exec:\i800444.exe37⤵
- Executes dropped EXE
PID:3160 -
\??\c:\3ffxxxr.exec:\3ffxxxr.exe38⤵
- Executes dropped EXE
PID:3212 -
\??\c:\tbbnht.exec:\tbbnht.exe39⤵
- Executes dropped EXE
PID:4232 -
\??\c:\u642604.exec:\u642604.exe40⤵
- Executes dropped EXE
PID:5092 -
\??\c:\642880.exec:\642880.exe41⤵
- Executes dropped EXE
PID:1748 -
\??\c:\nthtnb.exec:\nthtnb.exe42⤵
- Executes dropped EXE
PID:2276 -
\??\c:\64004.exec:\64004.exe43⤵
- Executes dropped EXE
PID:1680 -
\??\c:\7pvvp.exec:\7pvvp.exe44⤵
- Executes dropped EXE
PID:5096 -
\??\c:\1rxrrrr.exec:\1rxrrrr.exe45⤵
- Executes dropped EXE
PID:5064 -
\??\c:\o222222.exec:\o222222.exe46⤵
- Executes dropped EXE
PID:3228 -
\??\c:\q62000.exec:\q62000.exe47⤵
- Executes dropped EXE
PID:1448 -
\??\c:\2622882.exec:\2622882.exe48⤵
- Executes dropped EXE
PID:4476 -
\??\c:\604200.exec:\604200.exe49⤵
- Executes dropped EXE
PID:3636 -
\??\c:\ffxxlrl.exec:\ffxxlrl.exe50⤵
- Executes dropped EXE
PID:2544 -
\??\c:\6884446.exec:\6884446.exe51⤵
- Executes dropped EXE
PID:3368 -
\??\c:\fxxlfxx.exec:\fxxlfxx.exe52⤵
- Executes dropped EXE
PID:4588 -
\??\c:\86024.exec:\86024.exe53⤵
- Executes dropped EXE
PID:2836 -
\??\c:\68604.exec:\68604.exe54⤵
- Executes dropped EXE
PID:3612 -
\??\c:\jpjvp.exec:\jpjvp.exe55⤵
- Executes dropped EXE
PID:1228 -
\??\c:\402644.exec:\402644.exe56⤵
- Executes dropped EXE
PID:2828 -
\??\c:\vjjvp.exec:\vjjvp.exe57⤵
- Executes dropped EXE
PID:5016 -
\??\c:\9vvvp.exec:\9vvvp.exe58⤵
- Executes dropped EXE
PID:4020 -
\??\c:\rfxrfxx.exec:\rfxrfxx.exe59⤵
- Executes dropped EXE
PID:4372 -
\??\c:\vdpdv.exec:\vdpdv.exe60⤵
- Executes dropped EXE
PID:4728 -
\??\c:\tbbtnh.exec:\tbbtnh.exe61⤵
- Executes dropped EXE
PID:2380 -
\??\c:\lxrxlrf.exec:\lxrxlrf.exe62⤵
- Executes dropped EXE
PID:744 -
\??\c:\28028.exec:\28028.exe63⤵
- Executes dropped EXE
PID:5108 -
\??\c:\frlxlxr.exec:\frlxlxr.exe64⤵
- Executes dropped EXE
PID:2440 -
\??\c:\9vpdv.exec:\9vpdv.exe65⤵
- Executes dropped EXE
PID:928 -
\??\c:\fxlrfxl.exec:\fxlrfxl.exe66⤵PID:4884
-
\??\c:\pjjvj.exec:\pjjvj.exe67⤵PID:1576
-
\??\c:\ffrfxxl.exec:\ffrfxxl.exe68⤵PID:3156
-
\??\c:\g2884.exec:\g2884.exe69⤵PID:2512
-
\??\c:\7pjvj.exec:\7pjvj.exe70⤵PID:3460
-
\??\c:\406082.exec:\406082.exe71⤵PID:3860
-
\??\c:\2622240.exec:\2622240.exe72⤵PID:4252
-
\??\c:\884022.exec:\884022.exe73⤵PID:1416
-
\??\c:\0066222.exec:\0066222.exe74⤵PID:5012
-
\??\c:\9btnhh.exec:\9btnhh.exe75⤵PID:4836
-
\??\c:\i800442.exec:\i800442.exe76⤵PID:3504
-
\??\c:\2480860.exec:\2480860.exe77⤵PID:4332
-
\??\c:\662660.exec:\662660.exe78⤵PID:1792
-
\??\c:\pvdpd.exec:\pvdpd.exe79⤵PID:2588
-
\??\c:\g2286.exec:\g2286.exe80⤵PID:368
-
\??\c:\xrllxxr.exec:\xrllxxr.exe81⤵PID:2964
-
\??\c:\rxxlffr.exec:\rxxlffr.exe82⤵PID:436
-
\??\c:\1bnhbn.exec:\1bnhbn.exe83⤵PID:5068
-
\??\c:\fflflff.exec:\fflflff.exe84⤵PID:1980
-
\??\c:\6464044.exec:\6464044.exe85⤵PID:4632
-
\??\c:\1nnhbb.exec:\1nnhbb.exe86⤵PID:60
-
\??\c:\5rlfxrl.exec:\5rlfxrl.exe87⤵PID:1512
-
\??\c:\268604.exec:\268604.exe88⤵PID:2720
-
\??\c:\nnbhth.exec:\nnbhth.exe89⤵PID:3036
-
\??\c:\1rrlxrl.exec:\1rrlxrl.exe90⤵PID:2652
-
\??\c:\860060.exec:\860060.exe91⤵PID:3060
-
\??\c:\48848.exec:\48848.exe92⤵
- System Location Discovery: System Language Discovery
PID:1820 -
\??\c:\42446.exec:\42446.exe93⤵PID:3624
-
\??\c:\206044.exec:\206044.exe94⤵PID:4520
-
\??\c:\nhhhbh.exec:\nhhhbh.exe95⤵PID:2856
-
\??\c:\xrlxrlr.exec:\xrlxrlr.exe96⤵PID:940
-
\??\c:\djjdv.exec:\djjdv.exe97⤵PID:1304
-
\??\c:\jdvjp.exec:\jdvjp.exe98⤵PID:1748
-
\??\c:\8082680.exec:\8082680.exe99⤵PID:2664
-
\??\c:\pddvj.exec:\pddvj.exe100⤵PID:880
-
\??\c:\426424.exec:\426424.exe101⤵PID:1040
-
\??\c:\o682488.exec:\o682488.exe102⤵PID:4040
-
\??\c:\vjvvd.exec:\vjvvd.exe103⤵PID:4452
-
\??\c:\862666.exec:\862666.exe104⤵PID:1976
-
\??\c:\g4620.exec:\g4620.exe105⤵PID:4060
-
\??\c:\000082.exec:\000082.exe106⤵
- System Location Discovery: System Language Discovery
PID:4868 -
\??\c:\5xrlrxx.exec:\5xrlrxx.exe107⤵PID:4756
-
\??\c:\1vpvp.exec:\1vpvp.exe108⤵PID:4284
-
\??\c:\82660.exec:\82660.exe109⤵PID:1360
-
\??\c:\u448626.exec:\u448626.exe110⤵PID:3616
-
\??\c:\422602.exec:\422602.exe111⤵PID:1552
-
\??\c:\lxrxflf.exec:\lxrxflf.exe112⤵PID:1608
-
\??\c:\3xxrrxr.exec:\3xxrrxr.exe113⤵PID:1952
-
\??\c:\8226004.exec:\8226004.exe114⤵PID:4136
-
\??\c:\lfxrrrr.exec:\lfxrrrr.exe115⤵PID:4176
-
\??\c:\w66260.exec:\w66260.exe116⤵PID:4896
-
\??\c:\a4040.exec:\a4040.exe117⤵PID:4884
-
\??\c:\86664.exec:\86664.exe118⤵PID:3380
-
\??\c:\08486.exec:\08486.exe119⤵PID:3156
-
\??\c:\484860.exec:\484860.exe120⤵PID:3684
-
\??\c:\jpppj.exec:\jpppj.exe121⤵PID:2912
-
\??\c:\20608.exec:\20608.exe122⤵PID:1932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-