Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe
Resource
win7-20241010-en
General
-
Target
e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe
-
Size
82KB
-
MD5
acae12dc9085ea2dde270e9af4e1fd8c
-
SHA1
2afcfb4da423537df8765513dcbc7bdb292274f4
-
SHA256
e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70
-
SHA512
837fecc45c3f29720879657e8e2e3314c7e1b2639ef333004183db677ecb2bfced574c273c2f2abfb8d8bd5bd52193cf80aebe12431e2c91e76cee813d1e23fb
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73tgygQwKjiawEmB5GtJ:ymb3NkkiQ3mdBjFo73thgQ/wEko
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/4180-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4180-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3804-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4588-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3980-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2392-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1344-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4348-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3020-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4348-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/684-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5084-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2532-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3540-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/748-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2604-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2944-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/388-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3860-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1604-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4976-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4056-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3804 xxlxlxf.exe 4588 42666.exe 4264 nnttnn.exe 3980 rrrrfrr.exe 2392 ppddv.exe 1344 g8404.exe 4348 vdvpp.exe 3020 666264.exe 684 rlxxfff.exe 5084 nbnbhh.exe 2532 62840.exe 3540 llflxxl.exe 748 8648608.exe 2604 48868.exe 3712 64486.exe 2944 frlflfx.exe 388 jjpdp.exe 3860 xxfxxxr.exe 5052 i060882.exe 1604 rlrlllx.exe 2576 268842.exe 1584 44666.exe 3632 04606.exe 5004 lfxxlll.exe 4976 w84888.exe 2936 84482.exe 4056 648260.exe 1944 6082228.exe 2756 828826.exe 4044 404086.exe 2344 2804448.exe 1348 ntnbbn.exe 1636 ttnnbb.exe 1736 4808260.exe 4636 2808406.exe 2996 0448686.exe 2272 lflrxlr.exe 1176 nbbtnn.exe 1028 ddvpj.exe 1128 808488.exe 1124 fxrlfxr.exe 4672 llrrfxr.exe 4884 42860.exe 1956 84620.exe 4484 60604.exe 1988 4682026.exe 900 002206.exe 4572 e42688.exe 3896 hhbnbt.exe 3388 1lrlrfx.exe 4232 460420.exe 4292 xxlllxl.exe 684 btbhbb.exe 3132 xfxfxfx.exe 3036 dpjpd.exe 2532 004822.exe 4868 1llrxlr.exe 3540 frlflrl.exe 2368 42608.exe 3164 tnhbtb.exe 516 468882.exe 464 02224.exe 2028 jdvpj.exe 4628 m0604.exe -
resource yara_rule behavioral2/memory/4180-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4180-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3804-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4264-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2392-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1344-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3020-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/684-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/684-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/684-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5084-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5084-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2532-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3540-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2604-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/388-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3860-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1604-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4976-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2936-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8226004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 486666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0464248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nbtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlrlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4222888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 666264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4060448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1llrxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lffxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 3804 4180 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 84 PID 4180 wrote to memory of 3804 4180 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 84 PID 4180 wrote to memory of 3804 4180 e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe 84 PID 3804 wrote to memory of 4588 3804 xxlxlxf.exe 85 PID 3804 wrote to memory of 4588 3804 xxlxlxf.exe 85 PID 3804 wrote to memory of 4588 3804 xxlxlxf.exe 85 PID 4588 wrote to memory of 4264 4588 42666.exe 86 PID 4588 wrote to memory of 4264 4588 42666.exe 86 PID 4588 wrote to memory of 4264 4588 42666.exe 86 PID 4264 wrote to memory of 3980 4264 nnttnn.exe 87 PID 4264 wrote to memory of 3980 4264 nnttnn.exe 87 PID 4264 wrote to memory of 3980 4264 nnttnn.exe 87 PID 3980 wrote to memory of 2392 3980 rrrrfrr.exe 88 PID 3980 wrote to memory of 2392 3980 rrrrfrr.exe 88 PID 3980 wrote to memory of 2392 3980 rrrrfrr.exe 88 PID 2392 wrote to memory of 1344 2392 ppddv.exe 89 PID 2392 wrote to memory of 1344 2392 ppddv.exe 89 PID 2392 wrote to memory of 1344 2392 ppddv.exe 89 PID 1344 wrote to memory of 4348 1344 g8404.exe 90 PID 1344 wrote to memory of 4348 1344 g8404.exe 90 PID 1344 wrote to memory of 4348 1344 g8404.exe 90 PID 4348 wrote to memory of 3020 4348 vdvpp.exe 91 PID 4348 wrote to memory of 3020 4348 vdvpp.exe 91 PID 4348 wrote to memory of 3020 4348 vdvpp.exe 91 PID 3020 wrote to memory of 684 3020 666264.exe 92 PID 3020 wrote to memory of 684 3020 666264.exe 92 PID 3020 wrote to memory of 684 3020 666264.exe 92 PID 684 wrote to memory of 5084 684 rlxxfff.exe 93 PID 684 wrote to memory of 5084 684 rlxxfff.exe 93 PID 684 wrote to memory of 5084 684 rlxxfff.exe 93 PID 5084 wrote to memory of 2532 5084 nbnbhh.exe 94 PID 5084 wrote to memory of 2532 5084 nbnbhh.exe 94 PID 5084 wrote to memory of 2532 5084 nbnbhh.exe 94 PID 2532 wrote to memory of 3540 2532 62840.exe 95 PID 2532 wrote to memory of 3540 2532 62840.exe 95 PID 2532 wrote to memory of 3540 2532 62840.exe 95 PID 3540 wrote to memory of 748 3540 llflxxl.exe 96 PID 3540 wrote to memory of 748 3540 llflxxl.exe 96 PID 3540 wrote to memory of 748 3540 llflxxl.exe 96 PID 748 wrote to memory of 2604 748 8648608.exe 97 PID 748 wrote to memory of 2604 748 8648608.exe 97 PID 748 wrote to memory of 2604 748 8648608.exe 97 PID 2604 wrote to memory of 3712 2604 48868.exe 98 PID 2604 wrote to memory of 3712 2604 48868.exe 98 PID 2604 wrote to memory of 3712 2604 48868.exe 98 PID 3712 wrote to memory of 2944 3712 64486.exe 99 PID 3712 wrote to memory of 2944 3712 64486.exe 99 PID 3712 wrote to memory of 2944 3712 64486.exe 99 PID 2944 wrote to memory of 388 2944 frlflfx.exe 100 PID 2944 wrote to memory of 388 2944 frlflfx.exe 100 PID 2944 wrote to memory of 388 2944 frlflfx.exe 100 PID 388 wrote to memory of 3860 388 jjpdp.exe 101 PID 388 wrote to memory of 3860 388 jjpdp.exe 101 PID 388 wrote to memory of 3860 388 jjpdp.exe 101 PID 3860 wrote to memory of 5052 3860 xxfxxxr.exe 102 PID 3860 wrote to memory of 5052 3860 xxfxxxr.exe 102 PID 3860 wrote to memory of 5052 3860 xxfxxxr.exe 102 PID 5052 wrote to memory of 1604 5052 i060882.exe 103 PID 5052 wrote to memory of 1604 5052 i060882.exe 103 PID 5052 wrote to memory of 1604 5052 i060882.exe 103 PID 1604 wrote to memory of 2576 1604 rlrlllx.exe 104 PID 1604 wrote to memory of 2576 1604 rlrlllx.exe 104 PID 1604 wrote to memory of 2576 1604 rlrlllx.exe 104 PID 2576 wrote to memory of 1584 2576 268842.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe"C:\Users\Admin\AppData\Local\Temp\e2b72f00de046b5f89bcbfed2e10a4a0bf3959667c1b989aec3626afa0f18a70.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\xxlxlxf.exec:\xxlxlxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3804 -
\??\c:\42666.exec:\42666.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
\??\c:\nnttnn.exec:\nnttnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\rrrrfrr.exec:\rrrrfrr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
\??\c:\ppddv.exec:\ppddv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\g8404.exec:\g8404.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\vdvpp.exec:\vdvpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
\??\c:\666264.exec:\666264.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\rlxxfff.exec:\rlxxfff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\nbnbhh.exec:\nbnbhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\62840.exec:\62840.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\llflxxl.exec:\llflxxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
\??\c:\8648608.exec:\8648608.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\48868.exec:\48868.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\64486.exec:\64486.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\frlflfx.exec:\frlflfx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\jjpdp.exec:\jjpdp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\xxfxxxr.exec:\xxfxxxr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\i060882.exec:\i060882.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\rlrlllx.exec:\rlrlllx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\268842.exec:\268842.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\44666.exec:\44666.exe23⤵
- Executes dropped EXE
PID:1584 -
\??\c:\04606.exec:\04606.exe24⤵
- Executes dropped EXE
PID:3632 -
\??\c:\lfxxlll.exec:\lfxxlll.exe25⤵
- Executes dropped EXE
PID:5004 -
\??\c:\w84888.exec:\w84888.exe26⤵
- Executes dropped EXE
PID:4976 -
\??\c:\84482.exec:\84482.exe27⤵
- Executes dropped EXE
PID:2936 -
\??\c:\648260.exec:\648260.exe28⤵
- Executes dropped EXE
PID:4056 -
\??\c:\6082228.exec:\6082228.exe29⤵
- Executes dropped EXE
PID:1944 -
\??\c:\828826.exec:\828826.exe30⤵
- Executes dropped EXE
PID:2756 -
\??\c:\404086.exec:\404086.exe31⤵
- Executes dropped EXE
PID:4044 -
\??\c:\2804448.exec:\2804448.exe32⤵
- Executes dropped EXE
PID:2344 -
\??\c:\ntnbbn.exec:\ntnbbn.exe33⤵
- Executes dropped EXE
PID:1348 -
\??\c:\ttnnbb.exec:\ttnnbb.exe34⤵
- Executes dropped EXE
PID:1636 -
\??\c:\4808260.exec:\4808260.exe35⤵
- Executes dropped EXE
PID:1736 -
\??\c:\2808406.exec:\2808406.exe36⤵
- Executes dropped EXE
PID:4636 -
\??\c:\0448686.exec:\0448686.exe37⤵
- Executes dropped EXE
PID:2996 -
\??\c:\lflrxlr.exec:\lflrxlr.exe38⤵
- Executes dropped EXE
PID:2272 -
\??\c:\nbbtnn.exec:\nbbtnn.exe39⤵
- Executes dropped EXE
PID:1176 -
\??\c:\ddvpj.exec:\ddvpj.exe40⤵
- Executes dropped EXE
PID:1028 -
\??\c:\808488.exec:\808488.exe41⤵
- Executes dropped EXE
PID:1128 -
\??\c:\fxrlfxr.exec:\fxrlfxr.exe42⤵
- Executes dropped EXE
PID:1124 -
\??\c:\llrrfxr.exec:\llrrfxr.exe43⤵
- Executes dropped EXE
PID:4672 -
\??\c:\42860.exec:\42860.exe44⤵
- Executes dropped EXE
PID:4884 -
\??\c:\84620.exec:\84620.exe45⤵
- Executes dropped EXE
PID:1956 -
\??\c:\60604.exec:\60604.exe46⤵
- Executes dropped EXE
PID:4484 -
\??\c:\4682026.exec:\4682026.exe47⤵
- Executes dropped EXE
PID:1988 -
\??\c:\002206.exec:\002206.exe48⤵
- Executes dropped EXE
PID:900 -
\??\c:\e42688.exec:\e42688.exe49⤵
- Executes dropped EXE
PID:4572 -
\??\c:\hhbnbt.exec:\hhbnbt.exe50⤵
- Executes dropped EXE
PID:3896 -
\??\c:\1lrlrfx.exec:\1lrlrfx.exe51⤵
- Executes dropped EXE
PID:3388 -
\??\c:\460420.exec:\460420.exe52⤵
- Executes dropped EXE
PID:4232 -
\??\c:\xxlllxl.exec:\xxlllxl.exe53⤵
- Executes dropped EXE
PID:4292 -
\??\c:\btbhbb.exec:\btbhbb.exe54⤵
- Executes dropped EXE
PID:684 -
\??\c:\xfxfxfx.exec:\xfxfxfx.exe55⤵
- Executes dropped EXE
PID:3132 -
\??\c:\dpjpd.exec:\dpjpd.exe56⤵
- Executes dropped EXE
PID:3036 -
\??\c:\004822.exec:\004822.exe57⤵
- Executes dropped EXE
PID:2532 -
\??\c:\1llrxlr.exec:\1llrxlr.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4868 -
\??\c:\frlflrl.exec:\frlflrl.exe59⤵
- Executes dropped EXE
PID:3540 -
\??\c:\42608.exec:\42608.exe60⤵
- Executes dropped EXE
PID:2368 -
\??\c:\tnhbtb.exec:\tnhbtb.exe61⤵
- Executes dropped EXE
PID:3164 -
\??\c:\468882.exec:\468882.exe62⤵
- Executes dropped EXE
PID:516 -
\??\c:\02224.exec:\02224.exe63⤵
- Executes dropped EXE
PID:464 -
\??\c:\jdvpj.exec:\jdvpj.exe64⤵
- Executes dropped EXE
PID:2028 -
\??\c:\m0604.exec:\m0604.exe65⤵
- Executes dropped EXE
PID:4628 -
\??\c:\vdjvp.exec:\vdjvp.exe66⤵PID:1516
-
\??\c:\c408826.exec:\c408826.exe67⤵PID:1684
-
\??\c:\vddpj.exec:\vddpj.exe68⤵PID:4920
-
\??\c:\466206.exec:\466206.exe69⤵PID:440
-
\??\c:\3ppdv.exec:\3ppdv.exe70⤵PID:1660
-
\??\c:\4264242.exec:\4264242.exe71⤵PID:1656
-
\??\c:\2682068.exec:\2682068.exe72⤵PID:3128
-
\??\c:\3jppd.exec:\3jppd.exe73⤵PID:3632
-
\??\c:\288866.exec:\288866.exe74⤵PID:4860
-
\??\c:\xflrfff.exec:\xflrfff.exe75⤵PID:4976
-
\??\c:\6486486.exec:\6486486.exe76⤵PID:720
-
\??\c:\jjjvp.exec:\jjjvp.exe77⤵PID:3768
-
\??\c:\26822.exec:\26822.exe78⤵PID:2148
-
\??\c:\vjdvj.exec:\vjdvj.exe79⤵PID:2956
-
\??\c:\606442.exec:\606442.exe80⤵PID:4992
-
\??\c:\46408.exec:\46408.exe81⤵PID:4044
-
\??\c:\5xffxxr.exec:\5xffxxr.exe82⤵PID:4332
-
\??\c:\68666.exec:\68666.exe83⤵PID:4732
-
\??\c:\o282046.exec:\o282046.exe84⤵PID:868
-
\??\c:\42642.exec:\42642.exe85⤵PID:4016
-
\??\c:\tttnbb.exec:\tttnbb.exe86⤵PID:3116
-
\??\c:\00642.exec:\00642.exe87⤵PID:1240
-
\??\c:\628248.exec:\628248.exe88⤵PID:2528
-
\??\c:\44086.exec:\44086.exe89⤵PID:2252
-
\??\c:\k22204.exec:\k22204.exe90⤵PID:640
-
\??\c:\c404826.exec:\c404826.exe91⤵PID:844
-
\??\c:\062644.exec:\062644.exe92⤵PID:1260
-
\??\c:\nbnhtt.exec:\nbnhtt.exe93⤵PID:3172
-
\??\c:\ppjdd.exec:\ppjdd.exe94⤵PID:4364
-
\??\c:\2848600.exec:\2848600.exe95⤵PID:2276
-
\??\c:\04006.exec:\04006.exe96⤵PID:1828
-
\??\c:\nhhtnh.exec:\nhhtnh.exe97⤵PID:4812
-
\??\c:\rflfxlr.exec:\rflfxlr.exe98⤵
- System Location Discovery: System Language Discovery
PID:1988 -
\??\c:\btbtnh.exec:\btbtnh.exe99⤵PID:2116
-
\??\c:\3btthb.exec:\3btthb.exe100⤵PID:4712
-
\??\c:\rlfrrrl.exec:\rlfrrrl.exe101⤵PID:1272
-
\??\c:\84648.exec:\84648.exe102⤵PID:3388
-
\??\c:\008088.exec:\008088.exe103⤵PID:3104
-
\??\c:\048266.exec:\048266.exe104⤵PID:3248
-
\??\c:\hbhhbb.exec:\hbhhbb.exe105⤵PID:5084
-
\??\c:\648688.exec:\648688.exe106⤵PID:2032
-
\??\c:\htnbth.exec:\htnbth.exe107⤵PID:2336
-
\??\c:\84242.exec:\84242.exe108⤵PID:1592
-
\??\c:\bhhbtn.exec:\bhhbtn.exe109⤵PID:208
-
\??\c:\486666.exec:\486666.exe110⤵
- System Location Discovery: System Language Discovery
PID:2324 -
\??\c:\462644.exec:\462644.exe111⤵PID:1680
-
\??\c:\xlxrlll.exec:\xlxrlll.exe112⤵PID:4444
-
\??\c:\46226.exec:\46226.exe113⤵PID:1556
-
\??\c:\6022882.exec:\6022882.exe114⤵PID:4740
-
\??\c:\060422.exec:\060422.exe115⤵PID:4872
-
\??\c:\dvpjj.exec:\dvpjj.exe116⤵PID:5052
-
\??\c:\0820662.exec:\0820662.exe117⤵PID:1608
-
\??\c:\rflllll.exec:\rflllll.exe118⤵PID:2712
-
\??\c:\6060044.exec:\6060044.exe119⤵PID:4920
-
\??\c:\vvdvp.exec:\vvdvp.exe120⤵PID:1444
-
\??\c:\nbnbnn.exec:\nbnbnn.exe121⤵PID:4020
-
\??\c:\tththh.exec:\tththh.exe122⤵PID:4604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-