Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 16:35
Behavioral task
behavioral1
Sample
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
General
-
Target
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe
-
Size
3.8MB
-
MD5
d0501ac2c9d1e495e9c67666f8aaee40
-
SHA1
3cd59eb00c8473018bd68be0d685c7e6a5639a06
-
SHA256
c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712
-
SHA512
8e23012928fb3d4e959a3d5e73fa17e20a37d3c56bc2c3dbe90ce1ff51a9070de1aa32812303d9752b4bc665f451e962f94299498bcddf3566aad11259c2f114
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98g:U6XLq/qPPslzKx/dJg1ErmNn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/3148-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3256-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2748-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3852-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3024-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3772-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1416-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1300-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1784-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2944-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/772-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4504-105-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2564-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4580-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/232-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4968-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3744-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4464-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3916-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4548-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1500-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1932-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3504-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/864-228-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1904-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4692-242-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4204-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3228-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2260-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2052-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4944-292-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4804-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2128-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/812-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2384-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/396-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1096-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4788-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1652-381-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1232-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4036-419-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3148-423-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1124-490-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2268-497-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4500-501-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1076-514-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4748-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3324-603-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3588-613-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/640-647-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-669-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2120-673-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2664-731-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4428-741-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4076-781-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1076-791-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3740-1029-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3316-1147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2444 xrllfxl.exe 5116 lrlxxff.exe 3256 9jdjj.exe 2952 pvvjj.exe 2748 lrffflr.exe 3852 tthhnh.exe 1628 pjjvd.exe 3024 vvppv.exe 776 fxfllrf.exe 3304 btbhbt.exe 3772 3fffxff.exe 1416 rxrrxlr.exe 1300 jvdvp.exe 1784 pvjjp.exe 2944 ppvdd.exe 772 xffffff.exe 1856 pjdjp.exe 4504 pvdpv.exe 2564 htntbh.exe 1464 pjjdp.exe 1376 jdvjv.exe 4580 hhhnth.exe 232 pdpvd.exe 372 nhhbtn.exe 4036 tnbhtt.exe 3224 1vvdd.exe 3744 ddvvp.exe 4968 bbhttt.exe 4464 btbbhn.exe 3244 vvpvv.exe 3564 jvvdd.exe 3720 bnnntb.exe 2568 7vddd.exe 3916 frrxxll.exe 4548 jvddp.exe 3600 rxrffff.exe 1500 hbtnhh.exe 1932 3jjjp.exe 3268 rlrrlll.exe 2920 hbntbt.exe 3504 rlrfffr.exe 4828 xrflflx.exe 1288 tnnnnn.exe 3416 hthnbn.exe 864 djvjj.exe 5092 vpvdp.exe 1904 rlfxllf.exe 3964 hbtbbn.exe 4692 bnbhht.exe 4204 vdvvd.exe 4552 pjvjp.exe 3228 jpjpv.exe 5072 lrrxxxx.exe 2868 bnhbtt.exe 3252 dpdpp.exe 2260 dvpvj.exe 3392 lxxrrrx.exe 1520 lxfffff.exe 2052 nhttbb.exe 376 tbhhht.exe 3460 dvjpp.exe 804 pvdjd.exe 3224 lrffllx.exe 4944 nbbhth.exe -
resource yara_rule behavioral2/memory/3148-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023cc7-3.dat upx behavioral2/memory/3148-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc8-9.dat upx behavioral2/files/0x0009000000023cc5-12.dat upx behavioral2/memory/5116-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc9-20.dat upx behavioral2/memory/3256-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cca-27.dat upx behavioral2/memory/2748-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2952-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccb-33.dat upx behavioral2/memory/3852-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccc-39.dat upx behavioral2/memory/3024-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ccd-45.dat upx behavioral2/files/0x0007000000023cce-51.dat upx behavioral2/files/0x0002000000022dc9-55.dat upx behavioral2/files/0x0002000000022dcd-60.dat upx behavioral2/memory/3772-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000f000000023b8f-67.dat upx behavioral2/memory/1416-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b90-72.dat upx behavioral2/memory/1300-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023ccf-80.dat upx behavioral2/memory/1300-79-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023cd1-84.dat upx behavioral2/memory/1784-85-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd2-89.dat upx behavioral2/memory/2944-91-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd3-95.dat upx behavioral2/memory/1856-99-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/772-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd4-102.dat upx behavioral2/memory/4504-105-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd5-110.dat upx behavioral2/files/0x0007000000023cd6-113.dat upx behavioral2/memory/2564-116-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd8-119.dat upx behavioral2/files/0x0007000000023cd9-124.dat upx behavioral2/files/0x0007000000023cda-129.dat upx behavioral2/memory/4580-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cdb-135.dat upx behavioral2/memory/232-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cdc-140.dat upx behavioral2/files/0x0007000000023cdd-146.dat upx behavioral2/memory/4036-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cdf-151.dat upx behavioral2/memory/3224-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ce0-157.dat upx behavioral2/memory/4968-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3744-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ce1-166.dat upx behavioral2/files/0x0007000000023ce2-168.dat upx behavioral2/memory/4464-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023ce3-177.dat upx behavioral2/files/0x0007000000023ce4-180.dat upx behavioral2/memory/3916-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4548-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1500-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1932-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3504-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/864-228-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1904-235-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflxlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrxxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9thhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxlxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfllrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhbnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflxrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbbn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 2444 3148 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe 84 PID 3148 wrote to memory of 2444 3148 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe 84 PID 3148 wrote to memory of 2444 3148 c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe 84 PID 2444 wrote to memory of 5116 2444 xrllfxl.exe 87 PID 2444 wrote to memory of 5116 2444 xrllfxl.exe 87 PID 2444 wrote to memory of 5116 2444 xrllfxl.exe 87 PID 5116 wrote to memory of 3256 5116 lrlxxff.exe 89 PID 5116 wrote to memory of 3256 5116 lrlxxff.exe 89 PID 5116 wrote to memory of 3256 5116 lrlxxff.exe 89 PID 3256 wrote to memory of 2952 3256 9jdjj.exe 90 PID 3256 wrote to memory of 2952 3256 9jdjj.exe 90 PID 3256 wrote to memory of 2952 3256 9jdjj.exe 90 PID 2952 wrote to memory of 2748 2952 pvvjj.exe 91 PID 2952 wrote to memory of 2748 2952 pvvjj.exe 91 PID 2952 wrote to memory of 2748 2952 pvvjj.exe 91 PID 2748 wrote to memory of 3852 2748 lrffflr.exe 92 PID 2748 wrote to memory of 3852 2748 lrffflr.exe 92 PID 2748 wrote to memory of 3852 2748 lrffflr.exe 92 PID 3852 wrote to memory of 1628 3852 tthhnh.exe 93 PID 3852 wrote to memory of 1628 3852 tthhnh.exe 93 PID 3852 wrote to memory of 1628 3852 tthhnh.exe 93 PID 1628 wrote to memory of 3024 1628 pjjvd.exe 94 PID 1628 wrote to memory of 3024 1628 pjjvd.exe 94 PID 1628 wrote to memory of 3024 1628 pjjvd.exe 94 PID 3024 wrote to memory of 776 3024 vvppv.exe 95 PID 3024 wrote to memory of 776 3024 vvppv.exe 95 PID 3024 wrote to memory of 776 3024 vvppv.exe 95 PID 776 wrote to memory of 3304 776 fxfllrf.exe 96 PID 776 wrote to memory of 3304 776 fxfllrf.exe 96 PID 776 wrote to memory of 3304 776 fxfllrf.exe 96 PID 3304 wrote to memory of 3772 3304 btbhbt.exe 97 PID 3304 wrote to memory of 3772 3304 btbhbt.exe 97 PID 3304 wrote to memory of 3772 3304 btbhbt.exe 97 PID 3772 wrote to memory of 1416 3772 3fffxff.exe 98 PID 3772 wrote to memory of 1416 3772 3fffxff.exe 98 PID 3772 wrote to memory of 1416 3772 3fffxff.exe 98 PID 1416 wrote to memory of 1300 1416 rxrrxlr.exe 99 PID 1416 wrote to memory of 1300 1416 rxrrxlr.exe 99 PID 1416 wrote to memory of 1300 1416 rxrrxlr.exe 99 PID 1300 wrote to memory of 1784 1300 jvdvp.exe 100 PID 1300 wrote to memory of 1784 1300 jvdvp.exe 100 PID 1300 wrote to memory of 1784 1300 jvdvp.exe 100 PID 1784 wrote to memory of 2944 1784 pvjjp.exe 101 PID 1784 wrote to memory of 2944 1784 pvjjp.exe 101 PID 1784 wrote to memory of 2944 1784 pvjjp.exe 101 PID 2944 wrote to memory of 772 2944 ppvdd.exe 102 PID 2944 wrote to memory of 772 2944 ppvdd.exe 102 PID 2944 wrote to memory of 772 2944 ppvdd.exe 102 PID 772 wrote to memory of 1856 772 xffffff.exe 103 PID 772 wrote to memory of 1856 772 xffffff.exe 103 PID 772 wrote to memory of 1856 772 xffffff.exe 103 PID 1856 wrote to memory of 4504 1856 pjdjp.exe 104 PID 1856 wrote to memory of 4504 1856 pjdjp.exe 104 PID 1856 wrote to memory of 4504 1856 pjdjp.exe 104 PID 4504 wrote to memory of 2564 4504 pvdpv.exe 107 PID 4504 wrote to memory of 2564 4504 pvdpv.exe 107 PID 4504 wrote to memory of 2564 4504 pvdpv.exe 107 PID 2564 wrote to memory of 1464 2564 htntbh.exe 109 PID 2564 wrote to memory of 1464 2564 htntbh.exe 109 PID 2564 wrote to memory of 1464 2564 htntbh.exe 109 PID 1464 wrote to memory of 1376 1464 pjjdp.exe 111 PID 1464 wrote to memory of 1376 1464 pjjdp.exe 111 PID 1464 wrote to memory of 1376 1464 pjjdp.exe 111 PID 1376 wrote to memory of 4580 1376 jdvjv.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"C:\Users\Admin\AppData\Local\Temp\c614fbe1ca114ba28a5c6c7f5e55dfb01ee8795998f7844a104783df8b9cb712N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\xrllfxl.exec:\xrllfxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\lrlxxff.exec:\lrlxxff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\9jdjj.exec:\9jdjj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
\??\c:\pvvjj.exec:\pvvjj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\lrffflr.exec:\lrffflr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\tthhnh.exec:\tthhnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3852 -
\??\c:\pjjvd.exec:\pjjvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\vvppv.exec:\vvppv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\fxfllrf.exec:\fxfllrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:776 -
\??\c:\btbhbt.exec:\btbhbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\3fffxff.exec:\3fffxff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\rxrrxlr.exec:\rxrrxlr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
\??\c:\jvdvp.exec:\jvdvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
\??\c:\pvjjp.exec:\pvjjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\ppvdd.exec:\ppvdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\xffffff.exec:\xffffff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\pjdjp.exec:\pjdjp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\pvdpv.exec:\pvdpv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
\??\c:\htntbh.exec:\htntbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\pjjdp.exec:\pjjdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\jdvjv.exec:\jdvjv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\hhhnth.exec:\hhhnth.exe23⤵
- Executes dropped EXE
PID:4580 -
\??\c:\pdpvd.exec:\pdpvd.exe24⤵
- Executes dropped EXE
PID:232 -
\??\c:\nhhbtn.exec:\nhhbtn.exe25⤵
- Executes dropped EXE
PID:372 -
\??\c:\tnbhtt.exec:\tnbhtt.exe26⤵
- Executes dropped EXE
PID:4036 -
\??\c:\1vvdd.exec:\1vvdd.exe27⤵
- Executes dropped EXE
PID:3224 -
\??\c:\ddvvp.exec:\ddvvp.exe28⤵
- Executes dropped EXE
PID:3744 -
\??\c:\bbhttt.exec:\bbhttt.exe29⤵
- Executes dropped EXE
PID:4968 -
\??\c:\btbbhn.exec:\btbbhn.exe30⤵
- Executes dropped EXE
PID:4464 -
\??\c:\vvpvv.exec:\vvpvv.exe31⤵
- Executes dropped EXE
PID:3244 -
\??\c:\jvvdd.exec:\jvvdd.exe32⤵
- Executes dropped EXE
PID:3564 -
\??\c:\bnnntb.exec:\bnnntb.exe33⤵
- Executes dropped EXE
PID:3720 -
\??\c:\7vddd.exec:\7vddd.exe34⤵
- Executes dropped EXE
PID:2568 -
\??\c:\frrxxll.exec:\frrxxll.exe35⤵
- Executes dropped EXE
PID:3916 -
\??\c:\jvddp.exec:\jvddp.exe36⤵
- Executes dropped EXE
PID:4548 -
\??\c:\rxrffff.exec:\rxrffff.exe37⤵
- Executes dropped EXE
PID:3600 -
\??\c:\hbtnhh.exec:\hbtnhh.exe38⤵
- Executes dropped EXE
PID:1500 -
\??\c:\3jjjp.exec:\3jjjp.exe39⤵
- Executes dropped EXE
PID:1932 -
\??\c:\rlrrlll.exec:\rlrrlll.exe40⤵
- Executes dropped EXE
PID:3268 -
\??\c:\hbntbt.exec:\hbntbt.exe41⤵
- Executes dropped EXE
PID:2920 -
\??\c:\rlrfffr.exec:\rlrfffr.exe42⤵
- Executes dropped EXE
PID:3504 -
\??\c:\xrflflx.exec:\xrflflx.exe43⤵
- Executes dropped EXE
PID:4828 -
\??\c:\tnnnnn.exec:\tnnnnn.exe44⤵
- Executes dropped EXE
PID:1288 -
\??\c:\hthnbn.exec:\hthnbn.exe45⤵
- Executes dropped EXE
PID:3416 -
\??\c:\djvjj.exec:\djvjj.exe46⤵
- Executes dropped EXE
PID:864 -
\??\c:\vpvdp.exec:\vpvdp.exe47⤵
- Executes dropped EXE
PID:5092 -
\??\c:\rlfxllf.exec:\rlfxllf.exe48⤵
- Executes dropped EXE
PID:1904 -
\??\c:\hbtbbn.exec:\hbtbbn.exe49⤵
- Executes dropped EXE
PID:3964 -
\??\c:\bnbhht.exec:\bnbhht.exe50⤵
- Executes dropped EXE
PID:4692 -
\??\c:\vdvvd.exec:\vdvvd.exe51⤵
- Executes dropped EXE
PID:4204 -
\??\c:\pjvjp.exec:\pjvjp.exe52⤵
- Executes dropped EXE
PID:4552 -
\??\c:\jpjpv.exec:\jpjpv.exe53⤵
- Executes dropped EXE
PID:3228 -
\??\c:\lrrxxxx.exec:\lrrxxxx.exe54⤵
- Executes dropped EXE
PID:5072 -
\??\c:\bnhbtt.exec:\bnhbtt.exe55⤵
- Executes dropped EXE
PID:2868 -
\??\c:\dpdpp.exec:\dpdpp.exe56⤵
- Executes dropped EXE
PID:3252 -
\??\c:\dvpvj.exec:\dvpvj.exe57⤵
- Executes dropped EXE
PID:2260 -
\??\c:\lxxrrrx.exec:\lxxrrrx.exe58⤵
- Executes dropped EXE
PID:3392 -
\??\c:\lxfffff.exec:\lxfffff.exe59⤵
- Executes dropped EXE
PID:1520 -
\??\c:\nhttbb.exec:\nhttbb.exe60⤵
- Executes dropped EXE
PID:2052 -
\??\c:\tbhhht.exec:\tbhhht.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:376 -
\??\c:\dvjpp.exec:\dvjpp.exe62⤵
- Executes dropped EXE
PID:3460 -
\??\c:\pvdjd.exec:\pvdjd.exe63⤵
- Executes dropped EXE
PID:804 -
\??\c:\lrffllx.exec:\lrffllx.exe64⤵
- Executes dropped EXE
PID:3224 -
\??\c:\nbbhth.exec:\nbbhth.exe65⤵
- Executes dropped EXE
PID:4944 -
\??\c:\tbtbhb.exec:\tbtbhb.exe66⤵PID:2500
-
\??\c:\pjjpp.exec:\pjjpp.exe67⤵PID:2456
-
\??\c:\lfxlxlx.exec:\lfxlxlx.exe68⤵PID:4804
-
\??\c:\fflllll.exec:\fflllll.exe69⤵PID:2040
-
\??\c:\tbhhnb.exec:\tbhhnb.exe70⤵PID:2128
-
\??\c:\dvpdj.exec:\dvpdj.exe71⤵PID:2768
-
\??\c:\xlffrxf.exec:\xlffrxf.exe72⤵PID:2908
-
\??\c:\tbhntn.exec:\tbhntn.exe73⤵PID:3448
-
\??\c:\bbbbtb.exec:\bbbbtb.exe74⤵PID:1472
-
\??\c:\jdjdd.exec:\jdjdd.exe75⤵PID:812
-
\??\c:\vjjpp.exec:\vjjpp.exe76⤵PID:4068
-
\??\c:\rllrrlx.exec:\rllrrlx.exe77⤵PID:3864
-
\??\c:\hnbhth.exec:\hnbhth.exe78⤵PID:4536
-
\??\c:\jpdpp.exec:\jpdpp.exe79⤵PID:2772
-
\??\c:\pvpvd.exec:\pvpvd.exe80⤵PID:1360
-
\??\c:\rrfxxfl.exec:\rrfxxfl.exe81⤵PID:2384
-
\??\c:\tttbhn.exec:\tttbhn.exe82⤵PID:3264
-
\??\c:\nnhtbt.exec:\nnhtbt.exe83⤵PID:396
-
\??\c:\vjvvd.exec:\vjvvd.exe84⤵PID:1760
-
\??\c:\rlrrxlf.exec:\rlrrxlf.exe85⤵PID:2944
-
\??\c:\rfxlxfl.exec:\rfxlxfl.exe86⤵PID:1096
-
\??\c:\rrfxrlx.exec:\rrfxrlx.exe87⤵PID:4652
-
\??\c:\ntbhhn.exec:\ntbhhn.exe88⤵PID:1456
-
\??\c:\dvvpd.exec:\dvvpd.exe89⤵PID:4788
-
\??\c:\rxfxfxr.exec:\rxfxfxr.exe90⤵PID:4532
-
\??\c:\rrllxlr.exec:\rrllxlr.exe91⤵PID:1756
-
\??\c:\htthhh.exec:\htthhh.exe92⤵PID:1652
-
\??\c:\jpppd.exec:\jpppd.exe93⤵PID:4300
-
\??\c:\flrrrlr.exec:\flrrrlr.exe94⤵PID:2360
-
\??\c:\bbttnn.exec:\bbttnn.exe95⤵PID:1708
-
\??\c:\vjdvp.exec:\vjdvp.exe96⤵PID:1232
-
\??\c:\xxfrlfx.exec:\xxfrlfx.exe97⤵PID:232
-
\??\c:\llrxxff.exec:\llrxxff.exe98⤵
- System Location Discovery: System Language Discovery
PID:1000 -
\??\c:\htntth.exec:\htntth.exe99⤵PID:3944
-
\??\c:\jjjpv.exec:\jjjpv.exe100⤵PID:2076
-
\??\c:\pvvdv.exec:\pvvdv.exe101⤵PID:1800
-
\??\c:\llrrrrl.exec:\llrrrrl.exe102⤵PID:2188
-
\??\c:\tbhbht.exec:\tbhbht.exe103⤵PID:1356
-
\??\c:\pjddd.exec:\pjddd.exe104⤵PID:4036
-
\??\c:\pdjpd.exec:\pdjpd.exe105⤵
- System Location Discovery: System Language Discovery
PID:3148 -
\??\c:\lrlrxll.exec:\lrlrxll.exe106⤵PID:4024
-
\??\c:\thtnhn.exec:\thtnhn.exe107⤵PID:860
-
\??\c:\7nhbtt.exec:\7nhbtt.exe108⤵PID:2396
-
\??\c:\vpvjp.exec:\vpvjp.exe109⤵PID:4800
-
\??\c:\lrlxrff.exec:\lrlxrff.exe110⤵PID:4288
-
\??\c:\llffllr.exec:\llffllr.exe111⤵PID:5116
-
\??\c:\tthhbb.exec:\tthhbb.exe112⤵PID:732
-
\??\c:\1vdjv.exec:\1vdjv.exe113⤵PID:1684
-
\??\c:\llrxrff.exec:\llrxrff.exe114⤵PID:2568
-
\??\c:\nhnnbt.exec:\nhnnbt.exe115⤵PID:2764
-
\??\c:\hhttbn.exec:\hhttbn.exe116⤵PID:464
-
\??\c:\vjjdd.exec:\vjjdd.exe117⤵PID:2160
-
\??\c:\xrfxlxl.exec:\xrfxlxl.exe118⤵PID:5088
-
\??\c:\5rfllrr.exec:\5rfllrr.exe119⤵PID:2932
-
\??\c:\nnhhhn.exec:\nnhhhn.exe120⤵PID:3268
-
\??\c:\5nbbbh.exec:\5nbbbh.exe121⤵PID:2920
-
\??\c:\nbnnnh.exec:\nbnnnh.exe122⤵PID:4836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-