Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe
Resource
win7-20241010-en
General
-
Target
37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe
-
Size
73KB
-
MD5
75ce39d43ef52bdf3215491a2e294a01
-
SHA1
a5fd26f0887dcbe3b07e039511c6d84839658891
-
SHA256
37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a
-
SHA512
d32db1f2f221aaee73a4bc7afdd531226357ab693689ad24e315aa0d6c2afde94c75b4fb4d432a4caa48b6e52fa60566ceab350533ca40b6a7d4ea170ca9971c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUPqrDZ5RxfVK5DTj:ymb3NkkiQ3mdBjF0yUmrfVcr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/532-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3228-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/640-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4052-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1720-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4552-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3288-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4584-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4500-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1960-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/216-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2084-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2604-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3516-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4508-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/904-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1004-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2892 hbnntn.exe 3228 204426.exe 640 062248.exe 4000 9xlflfr.exe 4052 9llfrrf.exe 1720 rllrlrl.exe 5040 4444260.exe 712 k62082.exe 4552 rxrlxrl.exe 1020 8426460.exe 3288 u00865l.exe 4584 nbtnhh.exe 4500 lfrfxrl.exe 3148 g4608.exe 1960 lfxxrxx.exe 216 6426260.exe 4616 tnbhtb.exe 2084 424260.exe 996 jjvjv.exe 2604 6006488.exe 1636 xxxrxrl.exe 3516 6882426.exe 4508 4866404.exe 3624 8486048.exe 4656 rxxlfxr.exe 4216 646448.exe 4576 tbthnh.exe 904 fxxlfxl.exe 3556 pvpvd.exe 928 044822.exe 1004 btnhtb.exe 4564 1ntntb.exe 1772 bntnbt.exe 3568 thhbnt.exe 3844 djjdp.exe 3404 vvppp.exe 4636 nhnnnh.exe 1760 dvjpv.exe 2280 002428.exe 1548 606288.exe 2752 4484028.exe 3824 9nnbtn.exe 4704 ththtn.exe 2756 s2480.exe 2416 bbttb.exe 4684 9xxxrxr.exe 2148 jdppv.exe 1616 hbbbtt.exe 4604 htbbtt.exe 528 040088.exe 4908 ttnhhh.exe 5060 9xfffff.exe 2872 q68246.exe 4760 dvvjd.exe 5092 rrxrrfx.exe 2192 q00000.exe 2712 48408.exe 2028 rlrrxrx.exe 3736 3nhhbb.exe 712 bbhhtt.exe 3840 frxrrrl.exe 2456 rllrfxl.exe 3108 i866222.exe 3288 c668066.exe -
resource yara_rule behavioral2/memory/532-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3228-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/640-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4052-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1720-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4552-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4552-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3288-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4584-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4500-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1960-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/216-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2084-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2604-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3516-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4508-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/904-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1004-204-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2044040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6488240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4848226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrfxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttthh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 2892 532 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 83 PID 532 wrote to memory of 2892 532 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 83 PID 532 wrote to memory of 2892 532 37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe 83 PID 2892 wrote to memory of 3228 2892 hbnntn.exe 84 PID 2892 wrote to memory of 3228 2892 hbnntn.exe 84 PID 2892 wrote to memory of 3228 2892 hbnntn.exe 84 PID 3228 wrote to memory of 640 3228 204426.exe 85 PID 3228 wrote to memory of 640 3228 204426.exe 85 PID 3228 wrote to memory of 640 3228 204426.exe 85 PID 640 wrote to memory of 4000 640 062248.exe 86 PID 640 wrote to memory of 4000 640 062248.exe 86 PID 640 wrote to memory of 4000 640 062248.exe 86 PID 4000 wrote to memory of 4052 4000 9xlflfr.exe 87 PID 4000 wrote to memory of 4052 4000 9xlflfr.exe 87 PID 4000 wrote to memory of 4052 4000 9xlflfr.exe 87 PID 4052 wrote to memory of 1720 4052 9llfrrf.exe 88 PID 4052 wrote to memory of 1720 4052 9llfrrf.exe 88 PID 4052 wrote to memory of 1720 4052 9llfrrf.exe 88 PID 1720 wrote to memory of 5040 1720 rllrlrl.exe 89 PID 1720 wrote to memory of 5040 1720 rllrlrl.exe 89 PID 1720 wrote to memory of 5040 1720 rllrlrl.exe 89 PID 5040 wrote to memory of 712 5040 4444260.exe 90 PID 5040 wrote to memory of 712 5040 4444260.exe 90 PID 5040 wrote to memory of 712 5040 4444260.exe 90 PID 712 wrote to memory of 4552 712 k62082.exe 91 PID 712 wrote to memory of 4552 712 k62082.exe 91 PID 712 wrote to memory of 4552 712 k62082.exe 91 PID 4552 wrote to memory of 1020 4552 rxrlxrl.exe 92 PID 4552 wrote to memory of 1020 4552 rxrlxrl.exe 92 PID 4552 wrote to memory of 1020 4552 rxrlxrl.exe 92 PID 1020 wrote to memory of 3288 1020 8426460.exe 93 PID 1020 wrote to memory of 3288 1020 8426460.exe 93 PID 1020 wrote to memory of 3288 1020 8426460.exe 93 PID 3288 wrote to memory of 4584 3288 u00865l.exe 94 PID 3288 wrote to memory of 4584 3288 u00865l.exe 94 PID 3288 wrote to memory of 4584 3288 u00865l.exe 94 PID 4584 wrote to memory of 4500 4584 nbtnhh.exe 95 PID 4584 wrote to memory of 4500 4584 nbtnhh.exe 95 PID 4584 wrote to memory of 4500 4584 nbtnhh.exe 95 PID 4500 wrote to memory of 3148 4500 lfrfxrl.exe 96 PID 4500 wrote to memory of 3148 4500 lfrfxrl.exe 96 PID 4500 wrote to memory of 3148 4500 lfrfxrl.exe 96 PID 3148 wrote to memory of 1960 3148 g4608.exe 97 PID 3148 wrote to memory of 1960 3148 g4608.exe 97 PID 3148 wrote to memory of 1960 3148 g4608.exe 97 PID 1960 wrote to memory of 216 1960 lfxxrxx.exe 98 PID 1960 wrote to memory of 216 1960 lfxxrxx.exe 98 PID 1960 wrote to memory of 216 1960 lfxxrxx.exe 98 PID 216 wrote to memory of 4616 216 6426260.exe 99 PID 216 wrote to memory of 4616 216 6426260.exe 99 PID 216 wrote to memory of 4616 216 6426260.exe 99 PID 4616 wrote to memory of 2084 4616 tnbhtb.exe 100 PID 4616 wrote to memory of 2084 4616 tnbhtb.exe 100 PID 4616 wrote to memory of 2084 4616 tnbhtb.exe 100 PID 2084 wrote to memory of 996 2084 424260.exe 101 PID 2084 wrote to memory of 996 2084 424260.exe 101 PID 2084 wrote to memory of 996 2084 424260.exe 101 PID 996 wrote to memory of 2604 996 jjvjv.exe 102 PID 996 wrote to memory of 2604 996 jjvjv.exe 102 PID 996 wrote to memory of 2604 996 jjvjv.exe 102 PID 2604 wrote to memory of 1636 2604 6006488.exe 103 PID 2604 wrote to memory of 1636 2604 6006488.exe 103 PID 2604 wrote to memory of 1636 2604 6006488.exe 103 PID 1636 wrote to memory of 3516 1636 xxxrxrl.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe"C:\Users\Admin\AppData\Local\Temp\37ad94d257ca8b5be88ecb7de8ca42fda589ea307c54d92d0d9abe5646828d4a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\hbnntn.exec:\hbnntn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\204426.exec:\204426.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
\??\c:\062248.exec:\062248.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\9xlflfr.exec:\9xlflfr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\9llfrrf.exec:\9llfrrf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
\??\c:\rllrlrl.exec:\rllrlrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\4444260.exec:\4444260.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\k62082.exec:\k62082.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
\??\c:\rxrlxrl.exec:\rxrlxrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
\??\c:\8426460.exec:\8426460.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
\??\c:\u00865l.exec:\u00865l.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
\??\c:\nbtnhh.exec:\nbtnhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
\??\c:\lfrfxrl.exec:\lfrfxrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\g4608.exec:\g4608.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\lfxxrxx.exec:\lfxxrxx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\6426260.exec:\6426260.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
\??\c:\tnbhtb.exec:\tnbhtb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\424260.exec:\424260.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\jjvjv.exec:\jjvjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\6006488.exec:\6006488.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\xxxrxrl.exec:\xxxrxrl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\6882426.exec:\6882426.exe23⤵
- Executes dropped EXE
PID:3516 -
\??\c:\4866404.exec:\4866404.exe24⤵
- Executes dropped EXE
PID:4508 -
\??\c:\8486048.exec:\8486048.exe25⤵
- Executes dropped EXE
PID:3624 -
\??\c:\rxxlfxr.exec:\rxxlfxr.exe26⤵
- Executes dropped EXE
PID:4656 -
\??\c:\646448.exec:\646448.exe27⤵
- Executes dropped EXE
PID:4216 -
\??\c:\tbthnh.exec:\tbthnh.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4576 -
\??\c:\fxxlfxl.exec:\fxxlfxl.exe29⤵
- Executes dropped EXE
PID:904 -
\??\c:\pvpvd.exec:\pvpvd.exe30⤵
- Executes dropped EXE
PID:3556 -
\??\c:\044822.exec:\044822.exe31⤵
- Executes dropped EXE
PID:928 -
\??\c:\btnhtb.exec:\btnhtb.exe32⤵
- Executes dropped EXE
PID:1004 -
\??\c:\1ntntb.exec:\1ntntb.exe33⤵
- Executes dropped EXE
PID:4564 -
\??\c:\bntnbt.exec:\bntnbt.exe34⤵
- Executes dropped EXE
PID:1772 -
\??\c:\thhbnt.exec:\thhbnt.exe35⤵
- Executes dropped EXE
PID:3568 -
\??\c:\djjdp.exec:\djjdp.exe36⤵
- Executes dropped EXE
PID:3844 -
\??\c:\vvppp.exec:\vvppp.exe37⤵
- Executes dropped EXE
PID:3404 -
\??\c:\nhnnnh.exec:\nhnnnh.exe38⤵
- Executes dropped EXE
PID:4636 -
\??\c:\dvjpv.exec:\dvjpv.exe39⤵
- Executes dropped EXE
PID:1760 -
\??\c:\002428.exec:\002428.exe40⤵
- Executes dropped EXE
PID:2280 -
\??\c:\606288.exec:\606288.exe41⤵
- Executes dropped EXE
PID:1548 -
\??\c:\4484028.exec:\4484028.exe42⤵
- Executes dropped EXE
PID:2752 -
\??\c:\9nnbtn.exec:\9nnbtn.exe43⤵
- Executes dropped EXE
PID:3824 -
\??\c:\ththtn.exec:\ththtn.exe44⤵
- Executes dropped EXE
PID:4704 -
\??\c:\s2480.exec:\s2480.exe45⤵
- Executes dropped EXE
PID:2756 -
\??\c:\bbttb.exec:\bbttb.exe46⤵
- Executes dropped EXE
PID:2416 -
\??\c:\9xxxrxr.exec:\9xxxrxr.exe47⤵
- Executes dropped EXE
PID:4684 -
\??\c:\jdppv.exec:\jdppv.exe48⤵
- Executes dropped EXE
PID:2148 -
\??\c:\hbbbtt.exec:\hbbbtt.exe49⤵
- Executes dropped EXE
PID:1616 -
\??\c:\htbbtt.exec:\htbbtt.exe50⤵
- Executes dropped EXE
PID:4604 -
\??\c:\040088.exec:\040088.exe51⤵
- Executes dropped EXE
PID:528 -
\??\c:\ttnhhh.exec:\ttnhhh.exe52⤵
- Executes dropped EXE
PID:4908 -
\??\c:\9xfffff.exec:\9xfffff.exe53⤵
- Executes dropped EXE
PID:5060 -
\??\c:\q68246.exec:\q68246.exe54⤵
- Executes dropped EXE
PID:2872 -
\??\c:\dvvjd.exec:\dvvjd.exe55⤵
- Executes dropped EXE
PID:4760 -
\??\c:\rrxrrfx.exec:\rrxrrfx.exe56⤵
- Executes dropped EXE
PID:5092 -
\??\c:\q00000.exec:\q00000.exe57⤵
- Executes dropped EXE
PID:2192 -
\??\c:\48408.exec:\48408.exe58⤵
- Executes dropped EXE
PID:2712 -
\??\c:\rlrrxrx.exec:\rlrrxrx.exe59⤵
- Executes dropped EXE
PID:2028 -
\??\c:\3nhhbb.exec:\3nhhbb.exe60⤵
- Executes dropped EXE
PID:3736 -
\??\c:\bbhhtt.exec:\bbhhtt.exe61⤵
- Executes dropped EXE
PID:712 -
\??\c:\frxrrrl.exec:\frxrrrl.exe62⤵
- Executes dropped EXE
PID:3840 -
\??\c:\rllrfxl.exec:\rllrfxl.exe63⤵
- Executes dropped EXE
PID:2456 -
\??\c:\i866222.exec:\i866222.exe64⤵
- Executes dropped EXE
PID:3108 -
\??\c:\c668066.exec:\c668066.exe65⤵
- Executes dropped EXE
PID:3288 -
\??\c:\lxxxxfx.exec:\lxxxxfx.exe66⤵PID:2748
-
\??\c:\9dddd.exec:\9dddd.exe67⤵PID:4832
-
\??\c:\8248440.exec:\8248440.exe68⤵PID:2568
-
\??\c:\m8482.exec:\m8482.exe69⤵PID:1676
-
\??\c:\402600.exec:\402600.exe70⤵PID:2780
-
\??\c:\thtnhh.exec:\thtnhh.exe71⤵PID:4504
-
\??\c:\04008.exec:\04008.exe72⤵PID:3832
-
\??\c:\e46088.exec:\e46088.exe73⤵PID:1712
-
\??\c:\46602.exec:\46602.exe74⤵PID:2352
-
\??\c:\w80444.exec:\w80444.exe75⤵PID:4844
-
\??\c:\fxffllx.exec:\fxffllx.exe76⤵PID:1452
-
\??\c:\bnbbbh.exec:\bnbbbh.exe77⤵PID:3816
-
\??\c:\bhnbnt.exec:\bhnbnt.exe78⤵PID:1128
-
\??\c:\rrrllll.exec:\rrrllll.exe79⤵PID:468
-
\??\c:\vpvpv.exec:\vpvpv.exe80⤵PID:3156
-
\??\c:\8626060.exec:\8626060.exe81⤵PID:408
-
\??\c:\268488.exec:\268488.exe82⤵PID:4136
-
\??\c:\48208.exec:\48208.exe83⤵PID:4960
-
\??\c:\ffrfxlf.exec:\ffrfxlf.exe84⤵PID:4060
-
\??\c:\pvvpd.exec:\pvvpd.exe85⤵PID:4392
-
\??\c:\42820.exec:\42820.exe86⤵PID:1504
-
\??\c:\dpdvp.exec:\dpdvp.exe87⤵PID:904
-
\??\c:\82848.exec:\82848.exe88⤵PID:4304
-
\??\c:\rlllfff.exec:\rlllfff.exe89⤵PID:4680
-
\??\c:\8280066.exec:\8280066.exe90⤵PID:752
-
\??\c:\hthhhh.exec:\hthhhh.exe91⤵PID:2716
-
\??\c:\266666.exec:\266666.exe92⤵PID:1764
-
\??\c:\hbtnhh.exec:\hbtnhh.exe93⤵PID:2244
-
\??\c:\88060.exec:\88060.exe94⤵PID:3568
-
\??\c:\ddjdd.exec:\ddjdd.exe95⤵PID:1684
-
\??\c:\s6888.exec:\s6888.exe96⤵PID:2668
-
\??\c:\0860006.exec:\0860006.exe97⤵PID:4240
-
\??\c:\400600.exec:\400600.exe98⤵PID:1760
-
\??\c:\xlfffrl.exec:\xlfffrl.exe99⤵PID:4108
-
\??\c:\40604.exec:\40604.exe100⤵PID:1668
-
\??\c:\tttbnb.exec:\tttbnb.exe101⤵PID:4044
-
\??\c:\hntnnh.exec:\hntnnh.exe102⤵PID:1480
-
\??\c:\xxlfxxx.exec:\xxlfxxx.exe103⤵PID:2572
-
\??\c:\rxxfffr.exec:\rxxfffr.exe104⤵PID:3756
-
\??\c:\q06622.exec:\q06622.exe105⤵PID:804
-
\??\c:\jjjpp.exec:\jjjpp.exe106⤵PID:4684
-
\??\c:\60842.exec:\60842.exe107⤵PID:1384
-
\??\c:\bhtnhh.exec:\bhtnhh.exe108⤵PID:4528
-
\??\c:\tttthh.exec:\tttthh.exe109⤵PID:1224
-
\??\c:\vvjdp.exec:\vvjdp.exe110⤵PID:760
-
\??\c:\64048.exec:\64048.exe111⤵PID:4896
-
\??\c:\0400848.exec:\0400848.exe112⤵PID:3116
-
\??\c:\bnhhbb.exec:\bnhhbb.exe113⤵PID:4900
-
\??\c:\vjpjj.exec:\vjpjj.exe114⤵PID:2144
-
\??\c:\820488.exec:\820488.exe115⤵PID:2768
-
\??\c:\g0600.exec:\g0600.exe116⤵PID:4160
-
\??\c:\u066402.exec:\u066402.exe117⤵PID:3580
-
\??\c:\262828.exec:\262828.exe118⤵PID:556
-
\??\c:\828246.exec:\828246.exe119⤵PID:3752
-
\??\c:\662222.exec:\662222.exe120⤵PID:2300
-
\??\c:\60026.exec:\60026.exe121⤵PID:1104
-
\??\c:\jvvjd.exec:\jvvjd.exe122⤵PID:2376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-