Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 19:43
Behavioral task
behavioral1
Sample
0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe
Resource
win7-20240903-en
General
-
Target
0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe
-
Size
331KB
-
MD5
0338c99c86b68b6963301fb49170f14c
-
SHA1
a18f6c295f1aeb0c77bb5439d6c4a954fd73957e
-
SHA256
0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181
-
SHA512
13a1732b6fe58436abff3366cb369686f37150ffd3c0749a788376c2c6a29860c9217c4bda2cde90ccd4a8c85e6d2c966f808a219b84e9ea300ff6abfb3b0641
-
SSDEEP
6144:vcm4FmowdHoStJdJIjaRleL42bL37BoTPkhu9gX5yGsTshQc8R0nxA5ij8+RC7tI:94wFHoStJdSjylh2b77BoTMA9gX59sTg
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
Processes:
resource yara_rule behavioral2/memory/2808-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/572-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3616-15-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3512-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4180-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1700-43-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1864-49-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1916-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2392-57-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1908-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4252-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4044-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4012-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1400-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2376-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4680-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4340-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4092-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/548-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1880-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2736-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1524-179-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1828-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1432-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4576-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2116-154-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/808-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/772-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/220-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4244-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4852-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3200-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2368-87-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4740-230-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4684-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3512-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3300-239-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3860-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5020-253-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2984-256-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3208-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4044-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5032-269-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2112-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5068-301-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2612-304-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1872-323-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-326-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4792-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3608-367-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1700-382-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4356-391-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4476-424-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4820-449-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2440-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2580-499-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5080-554-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/368-709-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-823-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4092-1161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1236-1287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
6408660.exetntnhh.exerlxrfxr.exeo688402.exe442260.exevjvjd.exe06060.exe426020.exe4226482.exe0244444.exe08668.exehnnnnt.exe80400.exeu088228.exebtnhhh.exe80666.exenbhnnn.exejdddv.exe68422.exepjvvp.exe88886.exejjppj.exe0620882.exelrrrxfx.exe2626000.exepvvpj.exennnhtt.exe862664.exe888260.exerxfxlfx.exe26264.exebbbnhb.exe8204000.exe6682660.exe00604.exe628264.exe886044.exe062600.exethhnhn.exe606000.exe28044.exei020224.exe60604.exehhnhnn.exe6404826.exethnhbb.exe048682.exe006682.exelllfxll.exe88602.exelxfxrlf.exehbbnhb.exerflxrfx.exe664400.exe42262.exe06488.exe4404822.exe66440.exe880060.exe8842866.exe6226880.exehbhhtt.exe02882.exentbtnn.exepid process 572 6408660.exe 3616 tntnhh.exe 3324 rlxrfxr.exe 4440 o688402.exe 4740 442260.exe 3512 vjvjd.exe 4180 06060.exe 1700 426020.exe 1864 4226482.exe 1916 0244444.exe 2392 08668.exe 1908 hnnnnt.exe 1636 80400.exe 4044 u088228.exe 4252 btnhhh.exe 2220 80666.exe 2368 nbhnnn.exe 3200 jdddv.exe 4852 68422.exe 4012 pjvvp.exe 4204 88886.exe 4244 jjppj.exe 5116 0620882.exe 1712 lrrrxfx.exe 3056 2626000.exe 4972 pvvpj.exe 220 nnnhtt.exe 772 862664.exe 808 888260.exe 8 rxfxlfx.exe 3816 26264.exe 2116 bbbnhb.exe 1400 8204000.exe 2540 6682660.exe 4916 00604.exe 456 628264.exe 4576 886044.exe 5036 062600.exe 1432 thhnhn.exe 4188 606000.exe 1828 28044.exe 1524 i020224.exe 2864 60604.exe 1576 hhnhnn.exe 3736 6404826.exe 1956 thnhbb.exe 2376 048682.exe 4680 006682.exe 4340 lllfxll.exe 2176 88602.exe 2736 lxfxrlf.exe 4092 hbbnhb.exe 1880 rflxrfx.exe 548 664400.exe 4080 42262.exe 4932 06488.exe 3948 4404822.exe 3820 66440.exe 3324 880060.exe 3944 8842866.exe 3488 6226880.exe 3752 hbhhtt.exe 4740 02882.exe 4684 ntbtnn.exe -
Processes:
resource yara_rule behavioral2/memory/2808-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\6408660.exe upx behavioral2/memory/2808-4-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tntnhh.exe upx behavioral2/memory/572-9-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlxrfxr.exe upx behavioral2/memory/3616-15-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\o688402.exe upx C:\442260.exe upx behavioral2/memory/4440-23-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vjvjd.exe upx behavioral2/memory/3512-29-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\06060.exe upx behavioral2/memory/3512-33-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4180-38-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\426020.exe upx behavioral2/memory/1700-43-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\4226482.exe upx C:\0244444.exe upx behavioral2/memory/1864-49-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\08668.exe upx behavioral2/memory/1916-52-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hnnnnt.exe upx behavioral2/memory/2392-57-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\80400.exe upx behavioral2/memory/1908-63-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\u088228.exe upx C:\btnhhh.exe upx behavioral2/memory/4252-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4044-72-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\80666.exe upx C:\nbhnnn.exe upx C:\jdddv.exe upx C:\68422.exe upx behavioral2/memory/4852-93-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pjvvp.exe upx behavioral2/memory/4012-99-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\88886.exe upx \??\c:\jjppj.exe upx \??\c:\lrrrxfx.exe upx \??\c:\nnnhtt.exe upx \??\c:\888260.exe upx C:\bbbnhb.exe upx behavioral2/memory/1400-157-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2376-190-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4680-193-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4340-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4092-204-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/548-209-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1880-208-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2736-201-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1524-179-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1828-176-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1432-171-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4576-166-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2116-154-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\26264.exe upx \??\c:\rxfxlfx.exe upx behavioral2/memory/808-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/772-136-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\862664.exe upx behavioral2/memory/220-131-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pvvpj.exe upx \??\c:\2626000.exe upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fxrrlll.exe3llfxlf.exe040448.exe9nnhbb.exejvddj.exevpjvv.exeo624882.exetnbttn.exexlflllx.exelfrrxxx.exerlxrxxr.exe5fxxxxr.exe66440.exepdvjp.exexrxxllx.exe62820.exenbnhtt.exe42604.exe2008604.exejjdjv.exevdvvj.exellxfrrr.exexlffrlf.exe3hnhtt.exenttthb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3llfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 040448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9nnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o624882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlflllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fxxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2008604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxfrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlffrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe6408660.exetntnhh.exerlxrfxr.exeo688402.exe442260.exevjvjd.exe06060.exe426020.exe4226482.exe0244444.exe08668.exehnnnnt.exe80400.exeu088228.exebtnhhh.exe80666.exenbhnnn.exejdddv.exe68422.exepjvvp.exe88886.exedescription pid process target process PID 2808 wrote to memory of 572 2808 0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe 6408660.exe PID 2808 wrote to memory of 572 2808 0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe 6408660.exe PID 2808 wrote to memory of 572 2808 0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe 6408660.exe PID 572 wrote to memory of 3616 572 6408660.exe tntnhh.exe PID 572 wrote to memory of 3616 572 6408660.exe tntnhh.exe PID 572 wrote to memory of 3616 572 6408660.exe tntnhh.exe PID 3616 wrote to memory of 3324 3616 tntnhh.exe rlxrfxr.exe PID 3616 wrote to memory of 3324 3616 tntnhh.exe rlxrfxr.exe PID 3616 wrote to memory of 3324 3616 tntnhh.exe rlxrfxr.exe PID 3324 wrote to memory of 4440 3324 rlxrfxr.exe o688402.exe PID 3324 wrote to memory of 4440 3324 rlxrfxr.exe o688402.exe PID 3324 wrote to memory of 4440 3324 rlxrfxr.exe o688402.exe PID 4440 wrote to memory of 4740 4440 o688402.exe 442260.exe PID 4440 wrote to memory of 4740 4440 o688402.exe 442260.exe PID 4440 wrote to memory of 4740 4440 o688402.exe 442260.exe PID 4740 wrote to memory of 3512 4740 442260.exe vjvjd.exe PID 4740 wrote to memory of 3512 4740 442260.exe vjvjd.exe PID 4740 wrote to memory of 3512 4740 442260.exe vjvjd.exe PID 3512 wrote to memory of 4180 3512 vjvjd.exe 06060.exe PID 3512 wrote to memory of 4180 3512 vjvjd.exe 06060.exe PID 3512 wrote to memory of 4180 3512 vjvjd.exe 06060.exe PID 4180 wrote to memory of 1700 4180 06060.exe 426020.exe PID 4180 wrote to memory of 1700 4180 06060.exe 426020.exe PID 4180 wrote to memory of 1700 4180 06060.exe 426020.exe PID 1700 wrote to memory of 1864 1700 426020.exe 4226482.exe PID 1700 wrote to memory of 1864 1700 426020.exe 4226482.exe PID 1700 wrote to memory of 1864 1700 426020.exe 4226482.exe PID 1864 wrote to memory of 1916 1864 4226482.exe 0244444.exe PID 1864 wrote to memory of 1916 1864 4226482.exe 0244444.exe PID 1864 wrote to memory of 1916 1864 4226482.exe 0244444.exe PID 1916 wrote to memory of 2392 1916 0244444.exe 08668.exe PID 1916 wrote to memory of 2392 1916 0244444.exe 08668.exe PID 1916 wrote to memory of 2392 1916 0244444.exe 08668.exe PID 2392 wrote to memory of 1908 2392 08668.exe hnnnnt.exe PID 2392 wrote to memory of 1908 2392 08668.exe hnnnnt.exe PID 2392 wrote to memory of 1908 2392 08668.exe hnnnnt.exe PID 1908 wrote to memory of 1636 1908 hnnnnt.exe 80400.exe PID 1908 wrote to memory of 1636 1908 hnnnnt.exe 80400.exe PID 1908 wrote to memory of 1636 1908 hnnnnt.exe 80400.exe PID 1636 wrote to memory of 4044 1636 80400.exe u088228.exe PID 1636 wrote to memory of 4044 1636 80400.exe u088228.exe PID 1636 wrote to memory of 4044 1636 80400.exe u088228.exe PID 4044 wrote to memory of 4252 4044 u088228.exe btnhhh.exe PID 4044 wrote to memory of 4252 4044 u088228.exe btnhhh.exe PID 4044 wrote to memory of 4252 4044 u088228.exe btnhhh.exe PID 4252 wrote to memory of 2220 4252 btnhhh.exe 80666.exe PID 4252 wrote to memory of 2220 4252 btnhhh.exe 80666.exe PID 4252 wrote to memory of 2220 4252 btnhhh.exe 80666.exe PID 2220 wrote to memory of 2368 2220 80666.exe nbhnnn.exe PID 2220 wrote to memory of 2368 2220 80666.exe nbhnnn.exe PID 2220 wrote to memory of 2368 2220 80666.exe nbhnnn.exe PID 2368 wrote to memory of 3200 2368 nbhnnn.exe jdddv.exe PID 2368 wrote to memory of 3200 2368 nbhnnn.exe jdddv.exe PID 2368 wrote to memory of 3200 2368 nbhnnn.exe jdddv.exe PID 3200 wrote to memory of 4852 3200 jdddv.exe 68422.exe PID 3200 wrote to memory of 4852 3200 jdddv.exe 68422.exe PID 3200 wrote to memory of 4852 3200 jdddv.exe 68422.exe PID 4852 wrote to memory of 4012 4852 68422.exe pjvvp.exe PID 4852 wrote to memory of 4012 4852 68422.exe pjvvp.exe PID 4852 wrote to memory of 4012 4852 68422.exe pjvvp.exe PID 4012 wrote to memory of 4204 4012 pjvvp.exe 88886.exe PID 4012 wrote to memory of 4204 4012 pjvvp.exe 88886.exe PID 4012 wrote to memory of 4204 4012 pjvvp.exe 88886.exe PID 4204 wrote to memory of 4244 4204 88886.exe jjppj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe"C:\Users\Admin\AppData\Local\Temp\0caee27f352a68f9eaaea874441415300bf888984803f0a65117db25cac4c181.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\6408660.exec:\6408660.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\tntnhh.exec:\tntnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\rlxrfxr.exec:\rlxrfxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
\??\c:\o688402.exec:\o688402.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\442260.exec:\442260.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
\??\c:\vjvjd.exec:\vjvjd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\06060.exec:\06060.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\426020.exec:\426020.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\4226482.exec:\4226482.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\0244444.exec:\0244444.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\08668.exec:\08668.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\hnnnnt.exec:\hnnnnt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\80400.exec:\80400.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\u088228.exec:\u088228.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\btnhhh.exec:\btnhhh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\80666.exec:\80666.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\nbhnnn.exec:\nbhnnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\jdddv.exec:\jdddv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\68422.exec:\68422.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\pjvvp.exec:\pjvvp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\88886.exec:\88886.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
\??\c:\jjppj.exec:\jjppj.exe23⤵
- Executes dropped EXE
PID:4244 -
\??\c:\0620882.exec:\0620882.exe24⤵
- Executes dropped EXE
PID:5116 -
\??\c:\lrrrxfx.exec:\lrrrxfx.exe25⤵
- Executes dropped EXE
PID:1712 -
\??\c:\2626000.exec:\2626000.exe26⤵
- Executes dropped EXE
PID:3056 -
\??\c:\pvvpj.exec:\pvvpj.exe27⤵
- Executes dropped EXE
PID:4972 -
\??\c:\nnnhtt.exec:\nnnhtt.exe28⤵
- Executes dropped EXE
PID:220 -
\??\c:\862664.exec:\862664.exe29⤵
- Executes dropped EXE
PID:772 -
\??\c:\888260.exec:\888260.exe30⤵
- Executes dropped EXE
PID:808 -
\??\c:\rxfxlfx.exec:\rxfxlfx.exe31⤵
- Executes dropped EXE
PID:8 -
\??\c:\26264.exec:\26264.exe32⤵
- Executes dropped EXE
PID:3816 -
\??\c:\bbbnhb.exec:\bbbnhb.exe33⤵
- Executes dropped EXE
PID:2116 -
\??\c:\8204000.exec:\8204000.exe34⤵
- Executes dropped EXE
PID:1400 -
\??\c:\6682660.exec:\6682660.exe35⤵
- Executes dropped EXE
PID:2540 -
\??\c:\00604.exec:\00604.exe36⤵
- Executes dropped EXE
PID:4916 -
\??\c:\628264.exec:\628264.exe37⤵
- Executes dropped EXE
PID:456 -
\??\c:\886044.exec:\886044.exe38⤵
- Executes dropped EXE
PID:4576 -
\??\c:\062600.exec:\062600.exe39⤵
- Executes dropped EXE
PID:5036 -
\??\c:\thhnhn.exec:\thhnhn.exe40⤵
- Executes dropped EXE
PID:1432 -
\??\c:\606000.exec:\606000.exe41⤵
- Executes dropped EXE
PID:4188 -
\??\c:\28044.exec:\28044.exe42⤵
- Executes dropped EXE
PID:1828 -
\??\c:\i020224.exec:\i020224.exe43⤵
- Executes dropped EXE
PID:1524 -
\??\c:\60604.exec:\60604.exe44⤵
- Executes dropped EXE
PID:2864 -
\??\c:\hhnhnn.exec:\hhnhnn.exe45⤵
- Executes dropped EXE
PID:1576 -
\??\c:\6404826.exec:\6404826.exe46⤵
- Executes dropped EXE
PID:3736 -
\??\c:\thnhbb.exec:\thnhbb.exe47⤵
- Executes dropped EXE
PID:1956 -
\??\c:\048682.exec:\048682.exe48⤵
- Executes dropped EXE
PID:2376 -
\??\c:\006682.exec:\006682.exe49⤵
- Executes dropped EXE
PID:4680 -
\??\c:\lllfxll.exec:\lllfxll.exe50⤵
- Executes dropped EXE
PID:4340 -
\??\c:\88602.exec:\88602.exe51⤵
- Executes dropped EXE
PID:2176 -
\??\c:\lxfxrlf.exec:\lxfxrlf.exe52⤵
- Executes dropped EXE
PID:2736 -
\??\c:\hbbnhb.exec:\hbbnhb.exe53⤵
- Executes dropped EXE
PID:4092 -
\??\c:\rflxrfx.exec:\rflxrfx.exe54⤵
- Executes dropped EXE
PID:1880 -
\??\c:\664400.exec:\664400.exe55⤵
- Executes dropped EXE
PID:548 -
\??\c:\42262.exec:\42262.exe56⤵
- Executes dropped EXE
PID:4080 -
\??\c:\06488.exec:\06488.exe57⤵
- Executes dropped EXE
PID:4932 -
\??\c:\4404822.exec:\4404822.exe58⤵
- Executes dropped EXE
PID:3948 -
\??\c:\66440.exec:\66440.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3820 -
\??\c:\880060.exec:\880060.exe60⤵
- Executes dropped EXE
PID:3324 -
\??\c:\8842866.exec:\8842866.exe61⤵
- Executes dropped EXE
PID:3944 -
\??\c:\6226880.exec:\6226880.exe62⤵
- Executes dropped EXE
PID:3488 -
\??\c:\hbhhtt.exec:\hbhhtt.exe63⤵
- Executes dropped EXE
PID:3752 -
\??\c:\02882.exec:\02882.exe64⤵
- Executes dropped EXE
PID:4740 -
\??\c:\ntbtnn.exec:\ntbtnn.exe65⤵
- Executes dropped EXE
PID:4684 -
\??\c:\80888.exec:\80888.exe66⤵PID:3512
-
\??\c:\884426.exec:\884426.exe67⤵PID:3300
-
\??\c:\ppjdv.exec:\ppjdv.exe68⤵PID:952
-
\??\c:\lfrfxrr.exec:\lfrfxrr.exe69⤵PID:3896
-
\??\c:\a2822.exec:\a2822.exe70⤵PID:2660
-
\??\c:\4006628.exec:\4006628.exe71⤵PID:2948
-
\??\c:\a6828.exec:\a6828.exe72⤵PID:3860
-
\??\c:\7nnhbt.exec:\7nnhbt.exe73⤵PID:5020
-
\??\c:\3bhbhh.exec:\3bhbhh.exe74⤵PID:2984
-
\??\c:\5rrlxxr.exec:\5rrlxxr.exe75⤵PID:3208
-
\??\c:\08620.exec:\08620.exe76⤵PID:428
-
\??\c:\86484.exec:\86484.exe77⤵PID:1636
-
\??\c:\hhbttt.exec:\hhbttt.exe78⤵PID:4044
-
\??\c:\thttbh.exec:\thttbh.exe79⤵PID:5032
-
\??\c:\fxflfrl.exec:\fxflfrl.exe80⤵PID:3952
-
\??\c:\q68820.exec:\q68820.exe81⤵PID:2112
-
\??\c:\628842.exec:\628842.exe82⤵PID:2220
-
\??\c:\2402622.exec:\2402622.exe83⤵PID:980
-
\??\c:\4286640.exec:\4286640.exe84⤵PID:3200
-
\??\c:\ffxlrrf.exec:\ffxlrrf.exe85⤵PID:4100
-
\??\c:\8288284.exec:\8288284.exe86⤵PID:3068
-
\??\c:\3nbthb.exec:\3nbthb.exe87⤵PID:2692
-
\??\c:\w06648.exec:\w06648.exe88⤵PID:4204
-
\??\c:\fxrllff.exec:\fxrllff.exe89⤵PID:4244
-
\??\c:\6202242.exec:\6202242.exe90⤵PID:3440
-
\??\c:\e82260.exec:\e82260.exe91⤵PID:1712
-
\??\c:\4260848.exec:\4260848.exe92⤵PID:312
-
\??\c:\86260.exec:\86260.exe93⤵PID:4972
-
\??\c:\dvpdp.exec:\dvpdp.exe94⤵PID:5068
-
\??\c:\00604.exec:\00604.exe95⤵PID:2612
-
\??\c:\206048.exec:\206048.exe96⤵PID:2200
-
\??\c:\c066848.exec:\c066848.exe97⤵PID:8
-
\??\c:\3rxrllf.exec:\3rxrllf.exe98⤵PID:4300
-
\??\c:\e84264.exec:\e84264.exe99⤵PID:780
-
\??\c:\3hnhtt.exec:\3hnhtt.exe100⤵
- System Location Discovery: System Language Discovery
PID:528 -
\??\c:\fxfxrlf.exec:\fxfxrlf.exe101⤵PID:1268
-
\??\c:\q66488.exec:\q66488.exe102⤵PID:2008
-
\??\c:\22448.exec:\22448.exe103⤵PID:1772
-
\??\c:\8682666.exec:\8682666.exe104⤵PID:1872
-
\??\c:\00600.exec:\00600.exe105⤵PID:5040
-
\??\c:\fxxlxfr.exec:\fxxlxfr.exe106⤵PID:3844
-
\??\c:\lxfrrll.exec:\lxfrrll.exe107⤵PID:3088
-
\??\c:\24048.exec:\24048.exe108⤵PID:4672
-
\??\c:\5ppjv.exec:\5ppjv.exe109⤵PID:2976
-
\??\c:\5xllllf.exec:\5xllllf.exe110⤵PID:3332
-
\??\c:\4026000.exec:\4026000.exe111⤵PID:3828
-
\??\c:\66842.exec:\66842.exe112⤵PID:3708
-
\??\c:\2868644.exec:\2868644.exe113⤵PID:3308
-
\??\c:\1pvpp.exec:\1pvpp.exe114⤵PID:2444
-
\??\c:\jvddj.exec:\jvddj.exe115⤵
- System Location Discovery: System Language Discovery
PID:2264 -
\??\c:\0260488.exec:\0260488.exe116⤵PID:1164
-
\??\c:\lxrxffr.exec:\lxrxffr.exe117⤵PID:232
-
\??\c:\4226482.exec:\4226482.exe118⤵PID:4792
-
\??\c:\hbnhhb.exec:\hbnhhb.exe119⤵PID:572
-
\??\c:\662660.exec:\662660.exe120⤵PID:2432
-
\??\c:\4620222.exec:\4620222.exe121⤵PID:1476
-
\??\c:\440860.exec:\440860.exe122⤵PID:4648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-