Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 22:16
Behavioral task
behavioral1
Sample
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe
Resource
win7-20240729-en
General
-
Target
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe
-
Size
1.9MB
-
MD5
739a4cc33f07c69c7a37b5848967ce9b
-
SHA1
a2aab686705709fa39475da23b327a4c919867d9
-
SHA256
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747
-
SHA512
886d831ef51a8c5709fc818080f6262f71a1fd9ad954704d49812fd7485af6fe7719c2a676203fb2b04385f0d26627edd7ff25449bf40e8e39e55d8d2a39a564
-
SSDEEP
24576:gC8d36kLBXlnB8j7v5Ta+hLLQ20JmXSeWwa1oWJQjk0svTS/PPsbb1hwR4j:gCOfN6X5tLLQTg20ITS/PPs/1kk
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
Processes:
resource yara_rule behavioral2/memory/3288-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3256-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4484-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3260-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4220-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4064-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2664-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2560-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2532-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3060-61-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2112-65-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4512-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4396-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3820-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4132-95-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4360-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2744-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2264-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1964-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1132-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5008-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4236-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1788-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2300-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3532-185-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2240-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2316-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1828-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/936-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3896-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1808-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2076-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1048-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2156-279-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1684-283-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3252-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3952-300-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2196-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1964-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5100-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2956-332-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3740-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4496-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4720-356-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3720-369-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5084-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-398-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4632-408-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2196-454-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2628-466-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2940-500-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4500-509-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2516-529-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/844-594-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1348-613-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3936-620-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3580-736-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4592-815-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4912-879-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3936-901-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4496-914-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
Processes:
66624.exefxfrxfr.exe88660.exe864848.exenhhnhb.exenthhtt.exe4082884.exexrllffr.exes6240.exevpjjd.exefllfffl.exe1frrrrr.exellfffll.exe820886.exe2666080.exe2400882.exee88884.exe0680000.exe4826486.exe06220.exexrlrrrx.exe26482.exe22248.exeddpvv.exe802280.exepddvp.exe224266.exerlrfllx.exe22206.exe204204.exe9nbtth.exebbbnhb.exec224204.exennbtbn.exe422226.exeppppv.exe880488.exelrrllff.exerxllxrr.exerrxflxf.exe46286.exe028684.exe06464.exe0244062.exentnnnt.exebtnbnt.exebbhbhh.exevdvpp.exek48200.exe84864.exe0840066.exe086446.exe486288.exejjddv.exe000260.exe8686684.exeffrfxff.exec602020.exerxfffll.exe84002.exeddjpv.exejpddd.exe6222202.exebtbhht.exepid process 3256 66624.exe 4484 fxfrxfr.exe 3260 88660.exe 4220 864848.exe 4064 nhhnhb.exe 2664 nthhtt.exe 2560 4082884.exe 2532 xrllffr.exe 3060 s6240.exe 2112 vpjjd.exe 4512 fllfffl.exe 4396 1frrrrr.exe 1896 llfffll.exe 3820 820886.exe 4132 2666080.exe 4892 2400882.exe 4360 e88884.exe 2744 0680000.exe 2264 4826486.exe 3708 06220.exe 452 xrlrrrx.exe 1964 26482.exe 4660 22248.exe 3512 ddpvv.exe 1132 802280.exe 5008 pddvp.exe 4236 224266.exe 4556 rlrfllx.exe 1788 22206.exe 2300 204204.exe 3532 9nbtth.exe 812 bbbnhb.exe 2084 c224204.exe 4440 nnbtbn.exe 1676 422226.exe 2240 ppppv.exe 2316 880488.exe 4932 lrrllff.exe 1828 rxllxrr.exe 936 rrxflxf.exe 3896 46286.exe 4336 028684.exe 1808 06464.exe 4320 0244062.exe 2076 ntnnnt.exe 3104 btnbnt.exe 3604 bbhbhh.exe 3004 vdvpp.exe 3036 k48200.exe 4888 84864.exe 2712 0840066.exe 1048 086446.exe 4512 486288.exe 3912 jjddv.exe 4792 000260.exe 2028 8686684.exe 1556 ffrfxff.exe 388 c602020.exe 2156 rxfffll.exe 1684 84002.exe 4956 ddjpv.exe 1352 jpddd.exe 3252 6222202.exe 1824 btbhht.exe -
Processes:
resource yara_rule behavioral2/memory/3288-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\66624.exe upx behavioral2/memory/3256-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3288-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fxfrxfr.exe upx behavioral2/memory/3256-12-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\88660.exe upx behavioral2/memory/4484-18-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\864848.exe upx behavioral2/memory/3260-25-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhhnhb.exe upx behavioral2/memory/4220-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4064-37-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nthhtt.exe upx behavioral2/memory/2664-38-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\4082884.exe upx C:\xrllffr.exe upx behavioral2/memory/2560-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2532-54-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\s6240.exe upx \??\c:\vpjjd.exe upx behavioral2/memory/3060-61-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fllfffl.exe upx behavioral2/memory/2112-65-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\1frrrrr.exe upx behavioral2/memory/4396-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4512-73-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\llfffll.exe upx behavioral2/memory/4396-80-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\820886.exe upx behavioral2/memory/3820-91-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\2666080.exe upx C:\2400882.exe upx behavioral2/memory/4132-95-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\e88884.exe upx C:\0680000.exe upx behavioral2/memory/4360-107-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\4826486.exe upx behavioral2/memory/2744-113-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\06220.exe upx behavioral2/memory/3708-120-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2264-119-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xrlrrrx.exe upx \??\c:\26482.exe upx behavioral2/memory/1964-129-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1964-136-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\22248.exe upx C:\ddpvv.exe upx C:\802280.exe upx behavioral2/memory/1132-152-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pddvp.exe upx C:\224266.exe upx behavioral2/memory/5008-157-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4236-164-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rlrfllx.exe upx \??\c:\22206.exe upx behavioral2/memory/1788-173-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\204204.exe upx C:\9nbtth.exe upx behavioral2/memory/2300-180-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbbnhb.exe upx behavioral2/memory/3532-185-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4440-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2240-203-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
04244.exevvjjj.exerrrrlfl.exelllrfrr.exe404842.exeo020446.exe666628.exepddvp.exe80662.exedppvj.exefllllxf.exe66446.exevdpdj.exepvjjj.exe668662.exe4480686.exec600640.exerrlrflx.exerllrrrr.exebbnbtb.exellxlxrx.exe026480.exehbhntb.exellfffll.exetnbnnb.exejjjpd.exe460004.exehhnhhn.exe06028.exe06446.exexrlrxrf.exebbnnnh.exe0828686.exe468488.exejpjvp.exe8086628.exeq28884.exehhttnt.exe68684.exe046684.exentnnnt.exe686426.exe2048204.exeddvpp.exebnhttt.exevjvdp.exe064066.exew82842.exexfxlfxl.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllrfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 404842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o020446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 666628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllllxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 668662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4480686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c600640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlrflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxlxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 026480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 460004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0828686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8086628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q28884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046684.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 686426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2048204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 064066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w82842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxlfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe66624.exefxfrxfr.exe88660.exe864848.exenhhnhb.exenthhtt.exe4082884.exexrllffr.exes6240.exevpjjd.exefllfffl.exe1frrrrr.exellfffll.exe820886.exe2666080.exe2400882.exee88884.exe0680000.exe4826486.exe06220.exexrlrrrx.exedescription pid process target process PID 3288 wrote to memory of 3256 3288 30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe 66624.exe PID 3288 wrote to memory of 3256 3288 30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe 66624.exe PID 3288 wrote to memory of 3256 3288 30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe 66624.exe PID 3256 wrote to memory of 4484 3256 66624.exe fxfrxfr.exe PID 3256 wrote to memory of 4484 3256 66624.exe fxfrxfr.exe PID 3256 wrote to memory of 4484 3256 66624.exe fxfrxfr.exe PID 4484 wrote to memory of 3260 4484 fxfrxfr.exe 88660.exe PID 4484 wrote to memory of 3260 4484 fxfrxfr.exe 88660.exe PID 4484 wrote to memory of 3260 4484 fxfrxfr.exe 88660.exe PID 3260 wrote to memory of 4220 3260 88660.exe 864848.exe PID 3260 wrote to memory of 4220 3260 88660.exe 864848.exe PID 3260 wrote to memory of 4220 3260 88660.exe 864848.exe PID 4220 wrote to memory of 4064 4220 864848.exe nhhnhb.exe PID 4220 wrote to memory of 4064 4220 864848.exe nhhnhb.exe PID 4220 wrote to memory of 4064 4220 864848.exe nhhnhb.exe PID 4064 wrote to memory of 2664 4064 nhhnhb.exe nthhtt.exe PID 4064 wrote to memory of 2664 4064 nhhnhb.exe nthhtt.exe PID 4064 wrote to memory of 2664 4064 nhhnhb.exe nthhtt.exe PID 2664 wrote to memory of 2560 2664 nthhtt.exe 4082884.exe PID 2664 wrote to memory of 2560 2664 nthhtt.exe 4082884.exe PID 2664 wrote to memory of 2560 2664 nthhtt.exe 4082884.exe PID 2560 wrote to memory of 2532 2560 4082884.exe xrllffr.exe PID 2560 wrote to memory of 2532 2560 4082884.exe xrllffr.exe PID 2560 wrote to memory of 2532 2560 4082884.exe xrllffr.exe PID 2532 wrote to memory of 3060 2532 xrllffr.exe s6240.exe PID 2532 wrote to memory of 3060 2532 xrllffr.exe s6240.exe PID 2532 wrote to memory of 3060 2532 xrllffr.exe s6240.exe PID 3060 wrote to memory of 2112 3060 s6240.exe vpjjd.exe PID 3060 wrote to memory of 2112 3060 s6240.exe vpjjd.exe PID 3060 wrote to memory of 2112 3060 s6240.exe vpjjd.exe PID 2112 wrote to memory of 4512 2112 vpjjd.exe fllfffl.exe PID 2112 wrote to memory of 4512 2112 vpjjd.exe fllfffl.exe PID 2112 wrote to memory of 4512 2112 vpjjd.exe fllfffl.exe PID 4512 wrote to memory of 4396 4512 fllfffl.exe 1frrrrr.exe PID 4512 wrote to memory of 4396 4512 fllfffl.exe 1frrrrr.exe PID 4512 wrote to memory of 4396 4512 fllfffl.exe 1frrrrr.exe PID 4396 wrote to memory of 1896 4396 1frrrrr.exe llfffll.exe PID 4396 wrote to memory of 1896 4396 1frrrrr.exe llfffll.exe PID 4396 wrote to memory of 1896 4396 1frrrrr.exe llfffll.exe PID 1896 wrote to memory of 3820 1896 llfffll.exe 820886.exe PID 1896 wrote to memory of 3820 1896 llfffll.exe 820886.exe PID 1896 wrote to memory of 3820 1896 llfffll.exe 820886.exe PID 3820 wrote to memory of 4132 3820 820886.exe 2666080.exe PID 3820 wrote to memory of 4132 3820 820886.exe 2666080.exe PID 3820 wrote to memory of 4132 3820 820886.exe 2666080.exe PID 4132 wrote to memory of 4892 4132 2666080.exe 2400882.exe PID 4132 wrote to memory of 4892 4132 2666080.exe 2400882.exe PID 4132 wrote to memory of 4892 4132 2666080.exe 2400882.exe PID 4892 wrote to memory of 4360 4892 2400882.exe e88884.exe PID 4892 wrote to memory of 4360 4892 2400882.exe e88884.exe PID 4892 wrote to memory of 4360 4892 2400882.exe e88884.exe PID 4360 wrote to memory of 2744 4360 e88884.exe 0680000.exe PID 4360 wrote to memory of 2744 4360 e88884.exe 0680000.exe PID 4360 wrote to memory of 2744 4360 e88884.exe 0680000.exe PID 2744 wrote to memory of 2264 2744 0680000.exe 4826486.exe PID 2744 wrote to memory of 2264 2744 0680000.exe 4826486.exe PID 2744 wrote to memory of 2264 2744 0680000.exe 4826486.exe PID 2264 wrote to memory of 3708 2264 4826486.exe 06220.exe PID 2264 wrote to memory of 3708 2264 4826486.exe 06220.exe PID 2264 wrote to memory of 3708 2264 4826486.exe 06220.exe PID 3708 wrote to memory of 452 3708 06220.exe xrlrrrx.exe PID 3708 wrote to memory of 452 3708 06220.exe xrlrrrx.exe PID 3708 wrote to memory of 452 3708 06220.exe xrlrrrx.exe PID 452 wrote to memory of 1964 452 xrlrrrx.exe 26482.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe"C:\Users\Admin\AppData\Local\Temp\30238636680235647405104d7d771295b462bab8383ab70c596fdc036d707747.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
\??\c:\66624.exec:\66624.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
\??\c:\fxfrxfr.exec:\fxfrxfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
\??\c:\88660.exec:\88660.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
\??\c:\864848.exec:\864848.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\nhhnhb.exec:\nhhnhb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
\??\c:\nthhtt.exec:\nthhtt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\4082884.exec:\4082884.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\xrllffr.exec:\xrllffr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\s6240.exec:\s6240.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\vpjjd.exec:\vpjjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\fllfffl.exec:\fllfffl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
\??\c:\1frrrrr.exec:\1frrrrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\llfffll.exec:\llfffll.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\820886.exec:\820886.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3820 -
\??\c:\2666080.exec:\2666080.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
\??\c:\2400882.exec:\2400882.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\e88884.exec:\e88884.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
\??\c:\0680000.exec:\0680000.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\4826486.exec:\4826486.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\06220.exec:\06220.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\xrlrrrx.exec:\xrlrrrx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
\??\c:\26482.exec:\26482.exe23⤵
- Executes dropped EXE
PID:1964 -
\??\c:\22248.exec:\22248.exe24⤵
- Executes dropped EXE
PID:4660 -
\??\c:\ddpvv.exec:\ddpvv.exe25⤵
- Executes dropped EXE
PID:3512 -
\??\c:\802280.exec:\802280.exe26⤵
- Executes dropped EXE
PID:1132 -
\??\c:\pddvp.exec:\pddvp.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008 -
\??\c:\224266.exec:\224266.exe28⤵
- Executes dropped EXE
PID:4236 -
\??\c:\rlrfllx.exec:\rlrfllx.exe29⤵
- Executes dropped EXE
PID:4556 -
\??\c:\22206.exec:\22206.exe30⤵
- Executes dropped EXE
PID:1788 -
\??\c:\204204.exec:\204204.exe31⤵
- Executes dropped EXE
PID:2300 -
\??\c:\9nbtth.exec:\9nbtth.exe32⤵
- Executes dropped EXE
PID:3532 -
\??\c:\bbbnhb.exec:\bbbnhb.exe33⤵
- Executes dropped EXE
PID:812 -
\??\c:\c224204.exec:\c224204.exe34⤵
- Executes dropped EXE
PID:2084 -
\??\c:\nnbtbn.exec:\nnbtbn.exe35⤵
- Executes dropped EXE
PID:4440 -
\??\c:\422226.exec:\422226.exe36⤵
- Executes dropped EXE
PID:1676 -
\??\c:\ppppv.exec:\ppppv.exe37⤵
- Executes dropped EXE
PID:2240 -
\??\c:\880488.exec:\880488.exe38⤵
- Executes dropped EXE
PID:2316 -
\??\c:\lrrllff.exec:\lrrllff.exe39⤵
- Executes dropped EXE
PID:4932 -
\??\c:\rxllxrr.exec:\rxllxrr.exe40⤵
- Executes dropped EXE
PID:1828 -
\??\c:\rrxflxf.exec:\rrxflxf.exe41⤵
- Executes dropped EXE
PID:936 -
\??\c:\46286.exec:\46286.exe42⤵
- Executes dropped EXE
PID:3896 -
\??\c:\028684.exec:\028684.exe43⤵
- Executes dropped EXE
PID:4336 -
\??\c:\06464.exec:\06464.exe44⤵
- Executes dropped EXE
PID:1808 -
\??\c:\0244062.exec:\0244062.exe45⤵
- Executes dropped EXE
PID:4320 -
\??\c:\ntnnnt.exec:\ntnnnt.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2076 -
\??\c:\btnbnt.exec:\btnbnt.exe47⤵
- Executes dropped EXE
PID:3104 -
\??\c:\bbhbhh.exec:\bbhbhh.exe48⤵
- Executes dropped EXE
PID:3604 -
\??\c:\vdvpp.exec:\vdvpp.exe49⤵
- Executes dropped EXE
PID:3004 -
\??\c:\k48200.exec:\k48200.exe50⤵
- Executes dropped EXE
PID:3036 -
\??\c:\84864.exec:\84864.exe51⤵
- Executes dropped EXE
PID:4888 -
\??\c:\0840066.exec:\0840066.exe52⤵
- Executes dropped EXE
PID:2712 -
\??\c:\086446.exec:\086446.exe53⤵
- Executes dropped EXE
PID:1048 -
\??\c:\486288.exec:\486288.exe54⤵
- Executes dropped EXE
PID:4512 -
\??\c:\jjddv.exec:\jjddv.exe55⤵
- Executes dropped EXE
PID:3912 -
\??\c:\000260.exec:\000260.exe56⤵
- Executes dropped EXE
PID:4792 -
\??\c:\8686684.exec:\8686684.exe57⤵
- Executes dropped EXE
PID:2028 -
\??\c:\ffrfxff.exec:\ffrfxff.exe58⤵
- Executes dropped EXE
PID:1556 -
\??\c:\c602020.exec:\c602020.exe59⤵
- Executes dropped EXE
PID:388 -
\??\c:\rxfffll.exec:\rxfffll.exe60⤵
- Executes dropped EXE
PID:2156 -
\??\c:\84002.exec:\84002.exe61⤵
- Executes dropped EXE
PID:1684 -
\??\c:\ddjpv.exec:\ddjpv.exe62⤵
- Executes dropped EXE
PID:4956 -
\??\c:\jpddd.exec:\jpddd.exe63⤵
- Executes dropped EXE
PID:1352 -
\??\c:\6222202.exec:\6222202.exe64⤵
- Executes dropped EXE
PID:3252 -
\??\c:\btbhht.exec:\btbhht.exe65⤵
- Executes dropped EXE
PID:1824 -
\??\c:\rlrfflx.exec:\rlrfflx.exe66⤵PID:3952
-
\??\c:\tnttbh.exec:\tnttbh.exe67⤵PID:2196
-
\??\c:\9fxxffl.exec:\9fxxffl.exe68⤵PID:2936
-
\??\c:\k66066.exec:\k66066.exe69⤵PID:3608
-
\??\c:\828608.exec:\828608.exe70⤵PID:4032
-
\??\c:\xfrrffr.exec:\xfrrffr.exe71⤵PID:1964
-
\??\c:\xxxxfll.exec:\xxxxfll.exe72⤵PID:1920
-
\??\c:\88666.exec:\88666.exe73⤵PID:1648
-
\??\c:\xlflrfl.exec:\xlflrfl.exe74⤵PID:5100
-
\??\c:\rlflfff.exec:\rlflfff.exe75⤵PID:2956
-
\??\c:\8600060.exec:\8600060.exe76⤵PID:808
-
\??\c:\rlllflf.exec:\rlllflf.exe77⤵PID:1908
-
\??\c:\608882.exec:\608882.exe78⤵PID:744
-
\??\c:\tnbhnb.exec:\tnbhnb.exe79⤵PID:4164
-
\??\c:\42668.exec:\42668.exe80⤵PID:3740
-
\??\c:\nhtthh.exec:\nhtthh.exe81⤵PID:4496
-
\??\c:\4008464.exec:\4008464.exe82⤵PID:4720
-
\??\c:\vjppp.exec:\vjppp.exe83⤵PID:4216
-
\??\c:\rxrrrrr.exec:\rxrrrrr.exe84⤵PID:4968
-
\??\c:\8222648.exec:\8222648.exe85⤵PID:2084
-
\??\c:\djpdd.exec:\djpdd.exe86⤵PID:3720
-
\??\c:\4260420.exec:\4260420.exe87⤵PID:4672
-
\??\c:\hthntb.exec:\hthntb.exe88⤵PID:2384
-
\??\c:\rxxxfrx.exec:\rxxxfrx.exe89⤵PID:4576
-
\??\c:\lfxxxxx.exec:\lfxxxxx.exe90⤵PID:952
-
\??\c:\fxlrxxl.exec:\fxlrxxl.exe91⤵PID:392
-
\??\c:\84084.exec:\84084.exe92⤵PID:2104
-
\??\c:\ppdvj.exec:\ppdvj.exe93⤵PID:1620
-
\??\c:\04426.exec:\04426.exe94⤵PID:5084
-
\??\c:\vvddj.exec:\vvddj.exe95⤵PID:3132
-
\??\c:\ppjpj.exec:\ppjpj.exe96⤵PID:1304
-
\??\c:\htbttt.exec:\htbttt.exe97⤵PID:3880
-
\??\c:\00868.exec:\00868.exe98⤵PID:4632
-
\??\c:\lfrllrr.exec:\lfrllrr.exe99⤵PID:4888
-
\??\c:\hhnbhh.exec:\hhnbhh.exe100⤵PID:4516
-
\??\c:\thnbhh.exec:\thnbhh.exe101⤵PID:1048
-
\??\c:\86822.exec:\86822.exe102⤵PID:2944
-
\??\c:\hbnhhn.exec:\hbnhhn.exe103⤵PID:3912
-
\??\c:\82082.exec:\82082.exe104⤵PID:3960
-
\??\c:\nttbtt.exec:\nttbtt.exe105⤵PID:2028
-
\??\c:\dvppv.exec:\dvppv.exe106⤵PID:4036
-
\??\c:\rfflffl.exec:\rfflffl.exe107⤵PID:3860
-
\??\c:\flffrlf.exec:\flffrlf.exe108⤵PID:4360
-
\??\c:\dddvp.exec:\dddvp.exe109⤵PID:2264
-
\??\c:\tbttnh.exec:\tbttnh.exe110⤵PID:1072
-
\??\c:\xxxxflr.exec:\xxxxflr.exe111⤵PID:4976
-
\??\c:\fflrxll.exec:\fflrxll.exe112⤵PID:3760
-
\??\c:\60024.exec:\60024.exe113⤵PID:2196
-
\??\c:\9rxrfxx.exec:\9rxrfxx.exe114⤵PID:672
-
\??\c:\nhhtht.exec:\nhhtht.exe115⤵PID:3116
-
\??\c:\ntbtbt.exec:\ntbtbt.exe116⤵PID:1972
-
\??\c:\084060.exec:\084060.exe117⤵PID:2628
-
\??\c:\xrrrllx.exec:\xrrrllx.exe118⤵PID:1920
-
\??\c:\24820.exec:\24820.exe119⤵PID:2200
-
\??\c:\9vdpj.exec:\9vdpj.exe120⤵PID:1596
-
\??\c:\fxllfll.exec:\fxllfll.exe121⤵PID:2344
-
\??\c:\280222.exec:\280222.exe122⤵PID:3936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-