Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:35
Behavioral task
behavioral1
Sample
3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe
Resource
win7-20241010-en
General
-
Target
3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe
-
Size
334KB
-
MD5
0300135ee0ae4dee9f7e5ce6970d70ef
-
SHA1
4cac0bd04268dd18ed8073616a6412cebaa75185
-
SHA256
3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582
-
SHA512
8936023e21166dff7efa5df699b0db77c551b3c4d7a22d8a22b92850d17a109ec97fed3eedd0668015160e231e194785f6eaefb4063f1aa6a83029b845b043f2
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbeRi:R4wFHoSHYHUrAwfMp3CDRi
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3168-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4088-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1244-12-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3928-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4448-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3440-26-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3500-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4640-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3928-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4460-258-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1576-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4236-238-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1544-235-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4424-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4716-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/372-212-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4032-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3664-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1760-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1404-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4400-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2460-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4364-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/224-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/376-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4124-143-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3992-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3980-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1088-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2872-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1920-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3216-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2352-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3472-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2432-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1524-77-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/624-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4940-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3424-62-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/820-53-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1420-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2252-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1368-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2180-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2960-295-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2352-306-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4984-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4904-320-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4452-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4032-362-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2908-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3376-375-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4020-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4888-383-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1576-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4240-405-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2672-430-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2952-448-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-470-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2704-553-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2696-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1984-688-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1544-782-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3732-977-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ppvvv.exe262604.exefrxxlfx.exexfffrxl.exe884040.exepjvpj.exevvvdd.exe028488.exerlrllxr.exe4428642.exe682064.exe8068266.exe5fxrrlf.exedvddd.exerrrrlrr.exe00280.exehbtnhh.exerffxrrl.exetbtttt.exe220044.exe6808086.exepvvvd.exe226600.exennnhbb.exe6868086.exeg8400.exevvvvv.exehbbtnn.exeu288888.exe048084.exentthtn.exek66442.exebnnbtt.exeg8662.exe26228.exe84200.exehnhbtt.exe8206424.exexlrrlrf.exeg2480.exe0404484.exehtbtnn.exea0844.exes6408.exebhnnhh.exevvjjv.exe2824620.exedjjvj.exe0644860.exe6060606.exec642804.exe8400448.exexrffxxr.exevjvpp.exetntnnn.exe6804006.exebhnhhb.exe062600.exe2226666.exe9dvpv.exehntnhh.exevddvv.exerxlllll.exe3hnntb.exepid process 3168 ppvvv.exe 1244 262604.exe 3928 frxxlfx.exe 3440 xfffrxl.exe 4448 884040.exe 2180 pjvpj.exe 1368 vvvdd.exe 2252 028488.exe 1420 rlrllxr.exe 820 4428642.exe 3348 682064.exe 3424 8068266.exe 4940 5fxrrlf.exe 624 dvddd.exe 1524 rrrrlrr.exe 2432 00280.exe 3472 hbtnhh.exe 2352 rffxrrl.exe 3216 tbtttt.exe 1920 220044.exe 2872 6808086.exe 436 pvvvd.exe 2136 226600.exe 1908 nnnhbb.exe 1088 6868086.exe 4904 g8400.exe 3980 vvvvv.exe 3992 hbbtnn.exe 4124 u288888.exe 2736 048084.exe 5088 ntthtn.exe 376 k66442.exe 2268 bnnbtt.exe 224 g8662.exe 2040 26228.exe 3500 84200.exe 4364 hnhbtt.exe 2460 8206424.exe 4856 xlrrlrf.exe 4400 g2480.exe 1404 0404484.exe 4920 htbtnn.exe 4408 a0844.exe 2456 s6408.exe 1760 bhnnhh.exe 1424 vvjjv.exe 2368 2824620.exe 3148 djjvj.exe 3976 0644860.exe 3664 6060606.exe 3044 c642804.exe 2480 8400448.exe 4032 xrffxxr.exe 1948 vjvpp.exe 372 tntnnn.exe 2908 6804006.exe 1944 bhnhhb.exe 3376 062600.exe 4228 2226666.exe 4516 9dvpv.exe 1924 hntnhh.exe 4716 vddvv.exe 384 rxlllll.exe 4424 3hnntb.exe -
Processes:
resource yara_rule behavioral2/memory/4088-0-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ppvvv.exe upx behavioral2/memory/3168-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4088-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\262604.exe upx behavioral2/memory/1244-12-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\frxxlfx.exe upx behavioral2/memory/3928-16-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xfffrxl.exe upx C:\884040.exe upx C:\pjvpj.exe upx behavioral2/memory/4448-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3440-26-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvvdd.exe upx C:\682064.exe upx \??\c:\rffxrrl.exe upx \??\c:\6808086.exe upx \??\c:\vvvvv.exe upx behavioral2/memory/3500-166-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4640-280-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3928-275-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4460-258-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1576-244-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4236-238-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1544-235-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4424-232-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4716-227-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/372-212-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4032-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3664-200-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1760-189-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1404-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4400-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2460-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4364-169-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/224-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/376-156-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\k66442.exe upx \??\c:\ntthtn.exe upx \??\c:\048084.exe upx behavioral2/memory/4124-143-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\u288888.exe upx behavioral2/memory/3992-138-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hbbtnn.exe upx behavioral2/memory/3980-133-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\g8400.exe upx behavioral2/memory/1088-124-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\6868086.exe upx \??\c:\nnnhbb.exe upx \??\c:\226600.exe upx \??\c:\pvvvd.exe upx behavioral2/memory/2872-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1920-102-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\220044.exe upx behavioral2/memory/3216-97-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tbtttt.exe upx behavioral2/memory/2352-92-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3472-87-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hbtnhh.exe upx behavioral2/memory/2432-82-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\00280.exe upx behavioral2/memory/1524-77-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rrrrlrr.exe upx behavioral2/memory/624-72-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2804000.exe6226004.exerrfxxxx.exe7lllrlx.exe1nnntn.exe266600.exexrxllll.exeq02446.exerxxxrlf.exek40444.exerrxlrxx.exebnhhbn.exedvdvd.exejdvvd.exe2048448.exeo204666.exeu426608.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2804000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6226004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lllrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q02446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k40444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxlrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2048448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o204666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u426608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exeppvvv.exe262604.exefrxxlfx.exexfffrxl.exe884040.exepjvpj.exevvvdd.exe028488.exerlrllxr.exe4428642.exe682064.exe8068266.exe5fxrrlf.exedvddd.exerrrrlrr.exe00280.exehbtnhh.exerffxrrl.exetbtttt.exe220044.exe6808086.exedescription pid process target process PID 4088 wrote to memory of 3168 4088 3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe ppvvv.exe PID 4088 wrote to memory of 3168 4088 3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe ppvvv.exe PID 4088 wrote to memory of 3168 4088 3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe ppvvv.exe PID 3168 wrote to memory of 1244 3168 ppvvv.exe 262604.exe PID 3168 wrote to memory of 1244 3168 ppvvv.exe 262604.exe PID 3168 wrote to memory of 1244 3168 ppvvv.exe 262604.exe PID 1244 wrote to memory of 3928 1244 262604.exe bbtbbh.exe PID 1244 wrote to memory of 3928 1244 262604.exe bbtbbh.exe PID 1244 wrote to memory of 3928 1244 262604.exe bbtbbh.exe PID 3928 wrote to memory of 3440 3928 frxxlfx.exe xfffrxl.exe PID 3928 wrote to memory of 3440 3928 frxxlfx.exe xfffrxl.exe PID 3928 wrote to memory of 3440 3928 frxxlfx.exe xfffrxl.exe PID 3440 wrote to memory of 4448 3440 xfffrxl.exe 884040.exe PID 3440 wrote to memory of 4448 3440 xfffrxl.exe 884040.exe PID 3440 wrote to memory of 4448 3440 xfffrxl.exe 884040.exe PID 4448 wrote to memory of 2180 4448 884040.exe pjvpj.exe PID 4448 wrote to memory of 2180 4448 884040.exe pjvpj.exe PID 4448 wrote to memory of 2180 4448 884040.exe pjvpj.exe PID 2180 wrote to memory of 1368 2180 pjvpj.exe vvvdd.exe PID 2180 wrote to memory of 1368 2180 pjvpj.exe vvvdd.exe PID 2180 wrote to memory of 1368 2180 pjvpj.exe vvvdd.exe PID 1368 wrote to memory of 2252 1368 vvvdd.exe 028488.exe PID 1368 wrote to memory of 2252 1368 vvvdd.exe 028488.exe PID 1368 wrote to memory of 2252 1368 vvvdd.exe 028488.exe PID 2252 wrote to memory of 1420 2252 028488.exe rlrllxr.exe PID 2252 wrote to memory of 1420 2252 028488.exe rlrllxr.exe PID 2252 wrote to memory of 1420 2252 028488.exe rlrllxr.exe PID 1420 wrote to memory of 820 1420 rlrllxr.exe 4428642.exe PID 1420 wrote to memory of 820 1420 rlrllxr.exe 4428642.exe PID 1420 wrote to memory of 820 1420 rlrllxr.exe 4428642.exe PID 820 wrote to memory of 3348 820 4428642.exe 682064.exe PID 820 wrote to memory of 3348 820 4428642.exe 682064.exe PID 820 wrote to memory of 3348 820 4428642.exe 682064.exe PID 3348 wrote to memory of 3424 3348 682064.exe 8068266.exe PID 3348 wrote to memory of 3424 3348 682064.exe 8068266.exe PID 3348 wrote to memory of 3424 3348 682064.exe 8068266.exe PID 3424 wrote to memory of 4940 3424 8068266.exe 5fxrrlf.exe PID 3424 wrote to memory of 4940 3424 8068266.exe 5fxrrlf.exe PID 3424 wrote to memory of 4940 3424 8068266.exe 5fxrrlf.exe PID 4940 wrote to memory of 624 4940 5fxrrlf.exe dvddd.exe PID 4940 wrote to memory of 624 4940 5fxrrlf.exe dvddd.exe PID 4940 wrote to memory of 624 4940 5fxrrlf.exe dvddd.exe PID 624 wrote to memory of 1524 624 dvddd.exe 88284.exe PID 624 wrote to memory of 1524 624 dvddd.exe 88284.exe PID 624 wrote to memory of 1524 624 dvddd.exe 88284.exe PID 1524 wrote to memory of 2432 1524 rrrrlrr.exe 00280.exe PID 1524 wrote to memory of 2432 1524 rrrrlrr.exe 00280.exe PID 1524 wrote to memory of 2432 1524 rrrrlrr.exe 00280.exe PID 2432 wrote to memory of 3472 2432 00280.exe tnhbhh.exe PID 2432 wrote to memory of 3472 2432 00280.exe tnhbhh.exe PID 2432 wrote to memory of 3472 2432 00280.exe tnhbhh.exe PID 3472 wrote to memory of 2352 3472 hbtnhh.exe 3bthbb.exe PID 3472 wrote to memory of 2352 3472 hbtnhh.exe 3bthbb.exe PID 3472 wrote to memory of 2352 3472 hbtnhh.exe 3bthbb.exe PID 2352 wrote to memory of 3216 2352 rffxrrl.exe tbtttt.exe PID 2352 wrote to memory of 3216 2352 rffxrrl.exe tbtttt.exe PID 2352 wrote to memory of 3216 2352 rffxrrl.exe tbtttt.exe PID 3216 wrote to memory of 1920 3216 tbtttt.exe 220044.exe PID 3216 wrote to memory of 1920 3216 tbtttt.exe 220044.exe PID 3216 wrote to memory of 1920 3216 tbtttt.exe 220044.exe PID 1920 wrote to memory of 2872 1920 220044.exe 6808086.exe PID 1920 wrote to memory of 2872 1920 220044.exe 6808086.exe PID 1920 wrote to memory of 2872 1920 220044.exe 6808086.exe PID 2872 wrote to memory of 436 2872 6808086.exe pvvvd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe"C:\Users\Admin\AppData\Local\Temp\3318a8da6ee4ff29b69ceba44a02cb8e1db123a6a866b48a5aa9bb808e97b582.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\ppvvv.exec:\ppvvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\262604.exec:\262604.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
\??\c:\frxxlfx.exec:\frxxlfx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
\??\c:\xfffrxl.exec:\xfffrxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\884040.exec:\884040.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\pjvpj.exec:\pjvpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\vvvdd.exec:\vvvdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
\??\c:\028488.exec:\028488.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\rlrllxr.exec:\rlrllxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
\??\c:\4428642.exec:\4428642.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
\??\c:\682064.exec:\682064.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\8068266.exec:\8068266.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
\??\c:\5fxrrlf.exec:\5fxrrlf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\dvddd.exec:\dvddd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
\??\c:\rrrrlrr.exec:\rrrrlrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\00280.exec:\00280.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\hbtnhh.exec:\hbtnhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
\??\c:\rffxrrl.exec:\rffxrrl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\tbtttt.exec:\tbtttt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\220044.exec:\220044.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\6808086.exec:\6808086.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\pvvvd.exec:\pvvvd.exe23⤵
- Executes dropped EXE
PID:436 -
\??\c:\226600.exec:\226600.exe24⤵
- Executes dropped EXE
PID:2136 -
\??\c:\nnnhbb.exec:\nnnhbb.exe25⤵
- Executes dropped EXE
PID:1908 -
\??\c:\6868086.exec:\6868086.exe26⤵
- Executes dropped EXE
PID:1088 -
\??\c:\g8400.exec:\g8400.exe27⤵
- Executes dropped EXE
PID:4904 -
\??\c:\vvvvv.exec:\vvvvv.exe28⤵
- Executes dropped EXE
PID:3980 -
\??\c:\hbbtnn.exec:\hbbtnn.exe29⤵
- Executes dropped EXE
PID:3992 -
\??\c:\u288888.exec:\u288888.exe30⤵
- Executes dropped EXE
PID:4124 -
\??\c:\048084.exec:\048084.exe31⤵
- Executes dropped EXE
PID:2736 -
\??\c:\ntthtn.exec:\ntthtn.exe32⤵
- Executes dropped EXE
PID:5088 -
\??\c:\k66442.exec:\k66442.exe33⤵
- Executes dropped EXE
PID:376 -
\??\c:\bnnbtt.exec:\bnnbtt.exe34⤵
- Executes dropped EXE
PID:2268 -
\??\c:\g8662.exec:\g8662.exe35⤵
- Executes dropped EXE
PID:224 -
\??\c:\26228.exec:\26228.exe36⤵
- Executes dropped EXE
PID:2040 -
\??\c:\84200.exec:\84200.exe37⤵
- Executes dropped EXE
PID:3500 -
\??\c:\hnhbtt.exec:\hnhbtt.exe38⤵
- Executes dropped EXE
PID:4364 -
\??\c:\8206424.exec:\8206424.exe39⤵
- Executes dropped EXE
PID:2460 -
\??\c:\xlrrlrf.exec:\xlrrlrf.exe40⤵
- Executes dropped EXE
PID:4856 -
\??\c:\g2480.exec:\g2480.exe41⤵
- Executes dropped EXE
PID:4400 -
\??\c:\0404484.exec:\0404484.exe42⤵
- Executes dropped EXE
PID:1404 -
\??\c:\htbtnn.exec:\htbtnn.exe43⤵
- Executes dropped EXE
PID:4920 -
\??\c:\a0844.exec:\a0844.exe44⤵
- Executes dropped EXE
PID:4408 -
\??\c:\s6408.exec:\s6408.exe45⤵
- Executes dropped EXE
PID:2456 -
\??\c:\bhnnhh.exec:\bhnnhh.exe46⤵
- Executes dropped EXE
PID:1760 -
\??\c:\vvjjv.exec:\vvjjv.exe47⤵
- Executes dropped EXE
PID:1424 -
\??\c:\2824620.exec:\2824620.exe48⤵
- Executes dropped EXE
PID:2368 -
\??\c:\djjvj.exec:\djjvj.exe49⤵
- Executes dropped EXE
PID:3148 -
\??\c:\0644860.exec:\0644860.exe50⤵
- Executes dropped EXE
PID:3976 -
\??\c:\6060606.exec:\6060606.exe51⤵
- Executes dropped EXE
PID:3664 -
\??\c:\c642804.exec:\c642804.exe52⤵
- Executes dropped EXE
PID:3044 -
\??\c:\8400448.exec:\8400448.exe53⤵
- Executes dropped EXE
PID:2480 -
\??\c:\xrffxxr.exec:\xrffxxr.exe54⤵
- Executes dropped EXE
PID:4032 -
\??\c:\vjvpp.exec:\vjvpp.exe55⤵
- Executes dropped EXE
PID:1948 -
\??\c:\tntnnn.exec:\tntnnn.exe56⤵
- Executes dropped EXE
PID:372 -
\??\c:\6804006.exec:\6804006.exe57⤵
- Executes dropped EXE
PID:2908 -
\??\c:\bhnhhb.exec:\bhnhhb.exe58⤵
- Executes dropped EXE
PID:1944 -
\??\c:\062600.exec:\062600.exe59⤵
- Executes dropped EXE
PID:3376 -
\??\c:\2226666.exec:\2226666.exe60⤵
- Executes dropped EXE
PID:4228 -
\??\c:\9dvpv.exec:\9dvpv.exe61⤵
- Executes dropped EXE
PID:4516 -
\??\c:\hntnhh.exec:\hntnhh.exe62⤵
- Executes dropped EXE
PID:1924 -
\??\c:\vddvv.exec:\vddvv.exe63⤵
- Executes dropped EXE
PID:4716 -
\??\c:\rxlllll.exec:\rxlllll.exe64⤵
- Executes dropped EXE
PID:384 -
\??\c:\3hnntb.exec:\3hnntb.exe65⤵
- Executes dropped EXE
PID:4424 -
\??\c:\a8006.exec:\a8006.exe66⤵PID:1544
-
\??\c:\8684882.exec:\8684882.exe67⤵PID:4236
-
\??\c:\hnhbht.exec:\hnhbht.exe68⤵PID:4052
-
\??\c:\btbbbh.exec:\btbbbh.exe69⤵PID:4436
-
\??\c:\i288886.exec:\i288886.exe70⤵PID:1576
-
\??\c:\pjjdv.exec:\pjjdv.exe71⤵PID:4264
-
\??\c:\9hhhbb.exec:\9hhhbb.exe72⤵PID:3704
-
\??\c:\244422.exec:\244422.exe73⤵PID:4644
-
\??\c:\22426.exec:\22426.exe74⤵PID:4792
-
\??\c:\rrfxxxx.exec:\rrfxxxx.exe75⤵
- System Location Discovery: System Language Discovery
PID:4324 -
\??\c:\06082.exec:\06082.exe76⤵PID:4460
-
\??\c:\bnhbbb.exec:\bnhbbb.exe77⤵PID:4564
-
\??\c:\xrxllll.exec:\xrxllll.exe78⤵
- System Location Discovery: System Language Discovery
PID:4088 -
\??\c:\lxffxxr.exec:\lxffxxr.exe79⤵PID:3168
-
\??\c:\486484.exec:\486484.exe80⤵PID:2704
-
\??\c:\064004.exec:\064004.exe81⤵PID:2732
-
\??\c:\s2882.exec:\s2882.exe82⤵PID:3604
-
\??\c:\bhnntt.exec:\bhnntt.exe83⤵PID:5048
-
\??\c:\bbtbbh.exec:\bbtbbh.exe84⤵PID:3928
-
\??\c:\4060448.exec:\4060448.exe85⤵PID:3408
-
\??\c:\7xxrxxx.exec:\7xxrxxx.exe86⤵PID:4640
-
\??\c:\jdpvd.exec:\jdpvd.exe87⤵PID:5080
-
\??\c:\rxxrlrl.exec:\rxxrlrl.exe88⤵PID:1872
-
\??\c:\nhtntb.exec:\nhtntb.exe89⤵PID:4952
-
\??\c:\rrfxllf.exec:\rrfxllf.exe90⤵PID:4504
-
\??\c:\vpvjv.exec:\vpvjv.exe91⤵PID:5008
-
\??\c:\vvdvp.exec:\vvdvp.exe92⤵PID:2440
-
\??\c:\bbnnhb.exec:\bbnnhb.exe93⤵PID:2960
-
\??\c:\3ntnhh.exec:\3ntnhh.exe94⤵PID:2892
-
\??\c:\88284.exec:\88284.exe95⤵PID:1524
-
\??\c:\lllfxff.exec:\lllfxff.exe96⤵PID:2512
-
\??\c:\tnhbhh.exec:\tnhbhh.exe97⤵PID:3472
-
\??\c:\3bthbb.exec:\3bthbb.exe98⤵PID:2352
-
\??\c:\884484.exec:\884484.exe99⤵PID:4024
-
\??\c:\lxrlflx.exec:\lxrlflx.exe100⤵PID:4984
-
\??\c:\5bhhhb.exec:\5bhhhb.exe101⤵PID:4492
-
\??\c:\204422.exec:\204422.exe102⤵PID:2376
-
\??\c:\1jdvp.exec:\1jdvp.exe103⤵PID:208
-
\??\c:\llxrrff.exec:\llxrrff.exe104⤵PID:4904
-
\??\c:\02882.exec:\02882.exe105⤵PID:828
-
\??\c:\864820.exec:\864820.exe106⤵PID:4452
-
\??\c:\e60080.exec:\e60080.exe107⤵PID:4380
-
\??\c:\dvjdp.exec:\dvjdp.exe108⤵PID:1268
-
\??\c:\xxrxlrf.exec:\xxrxlrf.exe109⤵PID:3924
-
\??\c:\xrflxrr.exec:\xrflxrr.exe110⤵PID:876
-
\??\c:\ddjdd.exec:\ddjdd.exe111⤵PID:1448
-
\??\c:\84226.exec:\84226.exe112⤵PID:2968
-
\??\c:\80246.exec:\80246.exe113⤵PID:3672
-
\??\c:\a4620.exec:\a4620.exe114⤵PID:4804
-
\??\c:\808088.exec:\808088.exe115⤵PID:2612
-
\??\c:\lrxrrfl.exec:\lrxrrfl.exe116⤵PID:692
-
\??\c:\xxlflll.exec:\xxlflll.exe117⤵PID:4408
-
\??\c:\3bhhhn.exec:\3bhhhn.exe118⤵PID:3244
-
\??\c:\686244.exec:\686244.exe119⤵PID:1424
-
\??\c:\htthnh.exec:\htthnh.exe120⤵PID:4908
-
\??\c:\68000.exec:\68000.exe121⤵PID:1776
-
\??\c:\20844.exec:\20844.exe122⤵PID:1096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-