Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe
Resource
win7-20240903-en
General
-
Target
d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe
-
Size
349KB
-
MD5
c127df286098c6e50dcc0f98b10238be
-
SHA1
01493860a0e40fa19b8e9787316dc79f9db6d558
-
SHA256
d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606
-
SHA512
d005189b32569ca993f161e097f60762db154c053fdd432f1c2dd3c853ffdb8399acfec88e77cef27048b4c7ddbde2e08c2cbcbf7162eda1e5c4615db3f473d1
-
SSDEEP
6144:Xcm7ImGddXgYW5fNZWB5hFfci3Add4kGYA4K:l7TcbWXZshJX2VGd4K
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
Processes:
resource yara_rule behavioral2/memory/1588-5-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2284-11-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4140-48-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4748-38-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4144-33-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3892-30-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4084-58-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4612-71-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4956-89-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4028-95-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1596-117-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1740-138-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/5104-189-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2928-195-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2360-202-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4220-213-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4944-232-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3300-245-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4312-249-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1588-255-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1564-265-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1064-291-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3084-302-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4940-322-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4212-335-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/376-352-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1476-365-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2928-384-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3432-437-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/456-447-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4328-451-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3928-480-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/5096-433-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2488-346-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3452-318-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3444-295-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3028-281-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1972-242-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/5036-236-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2916-225-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2056-206-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1292-167-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4052-161-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1976-154-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/964-147-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/228-130-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1908-125-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4952-107-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3044-100-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4348-83-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1236-76-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3936-65-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3912-24-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/1744-18-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/5116-546-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4280-551-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3696-645-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3588-697-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/2756-753-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/3520-818-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4748-1567-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon behavioral2/memory/4136-1763-0x0000000000400000-0x0000000000428000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
4802260.exejdvjd.exe82262.exefrrllfx.exelxfxrrr.exetnnttn.exefrrfxrl.exe44606.exe888622.exethtnhb.exe6848882.exe284622.exe444604.exetnttnn.exexfrlrrf.exebbhhhn.exe7tthnt.exe0022600.exe64062.exevdpvp.exeddvjd.exexrfxlfx.exe08048.exedjpjj.exevvpjj.exe8204804.exe000048.exe82266.exexrlfrlf.exeppvjv.exe4480862.exerxlfxrl.exepvpjv.exe6226004.exeppddv.exepjjdv.exe6666622.exe022440.exe1vpjd.exe228002.exe26406.exefrxfllf.exebntnhh.exe9bttnt.exe68044.exe486420.exerxrlfff.exem8260.exe460888.exe080048.exe2426420.exebbbbbb.exe1nbbtt.exenhbbtb.exehbhbhn.exehbnntb.exem4262.exejdvjp.exexfrrlrl.exenhnnhh.exe6624422.exe8640482.exe268266.exe08440.exepid process 2284 4802260.exe 1744 jdvjd.exe 3912 82262.exe 4144 frrllfx.exe 3892 lxfxrrr.exe 4748 tnnttn.exe 2908 frrfxrl.exe 4140 44606.exe 4084 888622.exe 3936 thtnhb.exe 4612 6848882.exe 1236 284622.exe 4348 444604.exe 4956 tnttnn.exe 4028 xfrlrrf.exe 3044 bbhhhn.exe 4952 7tthnt.exe 3720 0022600.exe 1596 64062.exe 1908 vdpvp.exe 228 ddvjd.exe 4484 xrfxlfx.exe 1740 08048.exe 3236 djpjj.exe 964 vvpjj.exe 1976 8204804.exe 4052 000048.exe 1292 82266.exe 5116 xrlfrlf.exe 3808 ppvjv.exe 4840 4480862.exe 5104 rxlfxrl.exe 4736 pvpjv.exe 2928 6226004.exe 3376 ppddv.exe 2360 pjjdv.exe 2056 6666622.exe 1172 022440.exe 4220 1vpjd.exe 1264 228002.exe 1604 26406.exe 2084 frxfllf.exe 2916 bntnhh.exe 644 9bttnt.exe 4944 68044.exe 5036 486420.exe 4116 rxrlfff.exe 1972 m8260.exe 3300 460888.exe 4312 080048.exe 4328 2426420.exe 1588 bbbbbb.exe 4360 1nbbtt.exe 4480 nhbbtb.exe 1564 hbhbhn.exe 4080 hbnntb.exe 4828 m4262.exe 3612 jdvjp.exe 1968 xfrrlrl.exe 3028 nhnnhh.exe 4584 6624422.exe 3696 8640482.exe 1064 268266.exe 3444 08440.exe -
Processes:
resource yara_rule behavioral2/memory/1588-5-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2284-11-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3912-19-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4140-48-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4748-38-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4144-33-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3892-30-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4084-58-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4612-71-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4956-89-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4028-95-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1596-117-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1740-138-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/5104-189-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2928-195-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2360-202-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4220-213-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4944-232-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3300-245-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4312-249-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1588-255-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1564-265-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1064-291-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3084-302-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4940-322-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4212-335-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/376-352-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1476-365-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2928-384-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3432-437-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/456-447-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4328-451-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3928-480-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2160-469-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/5096-433-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2488-346-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3452-318-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3444-295-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3028-281-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-242-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/5036-236-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2916-225-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2056-206-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1292-167-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4052-161-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1976-154-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/964-147-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/228-130-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1908-125-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4952-107-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4952-102-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3044-100-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4348-83-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1236-76-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3936-65-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3912-24-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1744-18-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/5116-546-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/4280-551-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3696-645-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3588-697-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3312-734-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/2756-753-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3520-818-0x0000000000400000-0x0000000000428000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
frrrlxx.exe028440.exe26266.exe6226004.exe04642.exe062206.exe666866.exebhnhnb.exes6802.exevjddp.exetntnnh.exedddpj.exedvddv.exe804208.exebbhhhh.exetthhhh.exe248446.exexfrlrrf.exe7tthnt.exe62844.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6226004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 666866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 804208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 248446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe4802260.exejdvjd.exe82262.exefrrllfx.exelxfxrrr.exetnnttn.exefrrfxrl.exe44606.exe888622.exethtnhb.exe6848882.exe284622.exe444604.exetnttnn.exexfrlrrf.exebbhhhn.exe7tthnt.exe0022600.exe64062.exevdpvp.exeddvjd.exedescription pid process target process PID 1588 wrote to memory of 2284 1588 d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe 4802260.exe PID 1588 wrote to memory of 2284 1588 d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe 4802260.exe PID 1588 wrote to memory of 2284 1588 d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe 4802260.exe PID 2284 wrote to memory of 1744 2284 4802260.exe jdvjd.exe PID 2284 wrote to memory of 1744 2284 4802260.exe jdvjd.exe PID 2284 wrote to memory of 1744 2284 4802260.exe jdvjd.exe PID 1744 wrote to memory of 3912 1744 jdvjd.exe 82262.exe PID 1744 wrote to memory of 3912 1744 jdvjd.exe 82262.exe PID 1744 wrote to memory of 3912 1744 jdvjd.exe 82262.exe PID 3912 wrote to memory of 4144 3912 82262.exe frrllfx.exe PID 3912 wrote to memory of 4144 3912 82262.exe frrllfx.exe PID 3912 wrote to memory of 4144 3912 82262.exe frrllfx.exe PID 4144 wrote to memory of 3892 4144 frrllfx.exe lxfxrrr.exe PID 4144 wrote to memory of 3892 4144 frrllfx.exe lxfxrrr.exe PID 4144 wrote to memory of 3892 4144 frrllfx.exe lxfxrrr.exe PID 3892 wrote to memory of 4748 3892 lxfxrrr.exe tnnttn.exe PID 3892 wrote to memory of 4748 3892 lxfxrrr.exe tnnttn.exe PID 3892 wrote to memory of 4748 3892 lxfxrrr.exe tnnttn.exe PID 4748 wrote to memory of 2908 4748 tnnttn.exe frrfxrl.exe PID 4748 wrote to memory of 2908 4748 tnnttn.exe frrfxrl.exe PID 4748 wrote to memory of 2908 4748 tnnttn.exe frrfxrl.exe PID 2908 wrote to memory of 4140 2908 frrfxrl.exe 44606.exe PID 2908 wrote to memory of 4140 2908 frrfxrl.exe 44606.exe PID 2908 wrote to memory of 4140 2908 frrfxrl.exe 44606.exe PID 4140 wrote to memory of 4084 4140 44606.exe 888622.exe PID 4140 wrote to memory of 4084 4140 44606.exe 888622.exe PID 4140 wrote to memory of 4084 4140 44606.exe 888622.exe PID 4084 wrote to memory of 3936 4084 888622.exe thtnhb.exe PID 4084 wrote to memory of 3936 4084 888622.exe thtnhb.exe PID 4084 wrote to memory of 3936 4084 888622.exe thtnhb.exe PID 3936 wrote to memory of 4612 3936 thtnhb.exe 6848882.exe PID 3936 wrote to memory of 4612 3936 thtnhb.exe 6848882.exe PID 3936 wrote to memory of 4612 3936 thtnhb.exe 6848882.exe PID 4612 wrote to memory of 1236 4612 6848882.exe 284622.exe PID 4612 wrote to memory of 1236 4612 6848882.exe 284622.exe PID 4612 wrote to memory of 1236 4612 6848882.exe 284622.exe PID 1236 wrote to memory of 4348 1236 284622.exe 444604.exe PID 1236 wrote to memory of 4348 1236 284622.exe 444604.exe PID 1236 wrote to memory of 4348 1236 284622.exe 444604.exe PID 4348 wrote to memory of 4956 4348 444604.exe tnttnn.exe PID 4348 wrote to memory of 4956 4348 444604.exe tnttnn.exe PID 4348 wrote to memory of 4956 4348 444604.exe tnttnn.exe PID 4956 wrote to memory of 4028 4956 tnttnn.exe xfrlrrf.exe PID 4956 wrote to memory of 4028 4956 tnttnn.exe xfrlrrf.exe PID 4956 wrote to memory of 4028 4956 tnttnn.exe xfrlrrf.exe PID 4028 wrote to memory of 3044 4028 xfrlrrf.exe bbhhhn.exe PID 4028 wrote to memory of 3044 4028 xfrlrrf.exe bbhhhn.exe PID 4028 wrote to memory of 3044 4028 xfrlrrf.exe bbhhhn.exe PID 3044 wrote to memory of 4952 3044 bbhhhn.exe 7tthnt.exe PID 3044 wrote to memory of 4952 3044 bbhhhn.exe 7tthnt.exe PID 3044 wrote to memory of 4952 3044 bbhhhn.exe 7tthnt.exe PID 4952 wrote to memory of 3720 4952 7tthnt.exe 0022600.exe PID 4952 wrote to memory of 3720 4952 7tthnt.exe 0022600.exe PID 4952 wrote to memory of 3720 4952 7tthnt.exe 0022600.exe PID 3720 wrote to memory of 1596 3720 0022600.exe 64062.exe PID 3720 wrote to memory of 1596 3720 0022600.exe 64062.exe PID 3720 wrote to memory of 1596 3720 0022600.exe 64062.exe PID 1596 wrote to memory of 1908 1596 64062.exe vdpvp.exe PID 1596 wrote to memory of 1908 1596 64062.exe vdpvp.exe PID 1596 wrote to memory of 1908 1596 64062.exe vdpvp.exe PID 1908 wrote to memory of 228 1908 vdpvp.exe ddvjd.exe PID 1908 wrote to memory of 228 1908 vdpvp.exe ddvjd.exe PID 1908 wrote to memory of 228 1908 vdpvp.exe ddvjd.exe PID 228 wrote to memory of 4484 228 ddvjd.exe xrfxlfx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe"C:\Users\Admin\AppData\Local\Temp\d63abe588b87bbbc1854f05ee027b12f613a64ebc031c71044fcefc4a0108606.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\4802260.exec:\4802260.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\jdvjd.exec:\jdvjd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\82262.exec:\82262.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
\??\c:\frrllfx.exec:\frrllfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\lxfxrrr.exec:\lxfxrrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
\??\c:\tnnttn.exec:\tnnttn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\frrfxrl.exec:\frrfxrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\44606.exec:\44606.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
\??\c:\888622.exec:\888622.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\thtnhb.exec:\thtnhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\6848882.exec:\6848882.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\284622.exec:\284622.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\444604.exec:\444604.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
\??\c:\tnttnn.exec:\tnttnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\xfrlrrf.exec:\xfrlrrf.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
\??\c:\bbhhhn.exec:\bbhhhn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\7tthnt.exec:\7tthnt.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\0022600.exec:\0022600.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\64062.exec:\64062.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\vdpvp.exec:\vdpvp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\ddvjd.exec:\ddvjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
\??\c:\xrfxlfx.exec:\xrfxlfx.exe23⤵
- Executes dropped EXE
PID:4484 -
\??\c:\08048.exec:\08048.exe24⤵
- Executes dropped EXE
PID:1740 -
\??\c:\djpjj.exec:\djpjj.exe25⤵
- Executes dropped EXE
PID:3236 -
\??\c:\vvpjj.exec:\vvpjj.exe26⤵
- Executes dropped EXE
PID:964 -
\??\c:\8204804.exec:\8204804.exe27⤵
- Executes dropped EXE
PID:1976 -
\??\c:\000048.exec:\000048.exe28⤵
- Executes dropped EXE
PID:4052 -
\??\c:\82266.exec:\82266.exe29⤵
- Executes dropped EXE
PID:1292 -
\??\c:\xrlfrlf.exec:\xrlfrlf.exe30⤵
- Executes dropped EXE
PID:5116 -
\??\c:\ppvjv.exec:\ppvjv.exe31⤵
- Executes dropped EXE
PID:3808 -
\??\c:\4480862.exec:\4480862.exe32⤵
- Executes dropped EXE
PID:4840 -
\??\c:\rxlfxrl.exec:\rxlfxrl.exe33⤵
- Executes dropped EXE
PID:5104 -
\??\c:\pvpjv.exec:\pvpjv.exe34⤵
- Executes dropped EXE
PID:4736 -
\??\c:\6226004.exec:\6226004.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\ppddv.exec:\ppddv.exe36⤵
- Executes dropped EXE
PID:3376 -
\??\c:\pjjdv.exec:\pjjdv.exe37⤵
- Executes dropped EXE
PID:2360 -
\??\c:\6666622.exec:\6666622.exe38⤵
- Executes dropped EXE
PID:2056 -
\??\c:\022440.exec:\022440.exe39⤵
- Executes dropped EXE
PID:1172 -
\??\c:\1vpjd.exec:\1vpjd.exe40⤵
- Executes dropped EXE
PID:4220 -
\??\c:\228002.exec:\228002.exe41⤵
- Executes dropped EXE
PID:1264 -
\??\c:\26406.exec:\26406.exe42⤵
- Executes dropped EXE
PID:1604 -
\??\c:\frxfllf.exec:\frxfllf.exe43⤵
- Executes dropped EXE
PID:2084 -
\??\c:\bntnhh.exec:\bntnhh.exe44⤵
- Executes dropped EXE
PID:2916 -
\??\c:\9bttnt.exec:\9bttnt.exe45⤵
- Executes dropped EXE
PID:644 -
\??\c:\68044.exec:\68044.exe46⤵
- Executes dropped EXE
PID:4944 -
\??\c:\486420.exec:\486420.exe47⤵
- Executes dropped EXE
PID:5036 -
\??\c:\rxrlfff.exec:\rxrlfff.exe48⤵
- Executes dropped EXE
PID:4116 -
\??\c:\m8260.exec:\m8260.exe49⤵
- Executes dropped EXE
PID:1972 -
\??\c:\460888.exec:\460888.exe50⤵
- Executes dropped EXE
PID:3300 -
\??\c:\080048.exec:\080048.exe51⤵
- Executes dropped EXE
PID:4312 -
\??\c:\2426420.exec:\2426420.exe52⤵
- Executes dropped EXE
PID:4328 -
\??\c:\bbbbbb.exec:\bbbbbb.exe53⤵
- Executes dropped EXE
PID:1588 -
\??\c:\1nbbtt.exec:\1nbbtt.exe54⤵
- Executes dropped EXE
PID:4360 -
\??\c:\nhbbtb.exec:\nhbbtb.exe55⤵
- Executes dropped EXE
PID:4480 -
\??\c:\hbhbhn.exec:\hbhbhn.exe56⤵
- Executes dropped EXE
PID:1564 -
\??\c:\hbnntb.exec:\hbnntb.exe57⤵
- Executes dropped EXE
PID:4080 -
\??\c:\m4262.exec:\m4262.exe58⤵
- Executes dropped EXE
PID:4828 -
\??\c:\jdvjp.exec:\jdvjp.exe59⤵
- Executes dropped EXE
PID:3612 -
\??\c:\xfrrlrl.exec:\xfrrlrl.exe60⤵
- Executes dropped EXE
PID:1968 -
\??\c:\nhnnhh.exec:\nhnnhh.exe61⤵
- Executes dropped EXE
PID:3028 -
\??\c:\6624422.exec:\6624422.exe62⤵
- Executes dropped EXE
PID:4584 -
\??\c:\8640482.exec:\8640482.exe63⤵
- Executes dropped EXE
PID:3696 -
\??\c:\268266.exec:\268266.exe64⤵
- Executes dropped EXE
PID:1064 -
\??\c:\08440.exec:\08440.exe65⤵
- Executes dropped EXE
PID:3444 -
\??\c:\44280.exec:\44280.exe66⤵PID:3568
-
\??\c:\3dpjj.exec:\3dpjj.exe67⤵PID:3084
-
\??\c:\62860.exec:\62860.exe68⤵PID:1824
-
\??\c:\82826.exec:\82826.exe69⤵PID:3652
-
\??\c:\xlrrrff.exec:\xlrrrff.exe70⤵PID:3836
-
\??\c:\tbnhbt.exec:\tbnhbt.exe71⤵PID:432
-
\??\c:\hbhnnt.exec:\hbhnnt.exe72⤵PID:3452
-
\??\c:\vdjjp.exec:\vdjjp.exe73⤵PID:4940
-
\??\c:\nhntbt.exec:\nhntbt.exe74⤵PID:3044
-
\??\c:\84200.exec:\84200.exe75⤵PID:112
-
\??\c:\jvjdd.exec:\jvjdd.exe76⤵PID:1948
-
\??\c:\lfrrxfr.exec:\lfrrxfr.exe77⤵PID:4212
-
\??\c:\g4060.exec:\g4060.exe78⤵PID:2848
-
\??\c:\vvvpp.exec:\vvvpp.exe79⤵PID:4064
-
\??\c:\jvvpj.exec:\jvvpj.exe80⤵PID:2488
-
\??\c:\48646.exec:\48646.exe81⤵PID:2788
-
\??\c:\k44866.exec:\k44866.exe82⤵PID:376
-
\??\c:\66604.exec:\66604.exe83⤵PID:4900
-
\??\c:\7nthnh.exec:\7nthnh.exe84⤵PID:4804
-
\??\c:\tnnnhb.exec:\tnnnhb.exe85⤵PID:4092
-
\??\c:\vdvpj.exec:\vdvpj.exe86⤵PID:1476
-
\??\c:\4286404.exec:\4286404.exe87⤵PID:2416
-
\??\c:\6666822.exec:\6666822.exe88⤵PID:4280
-
\??\c:\jjpjj.exec:\jjpjj.exe89⤵PID:4840
-
\??\c:\064404.exec:\064404.exe90⤵PID:1580
-
\??\c:\lrrlxxr.exec:\lrrlxxr.exe91⤵PID:720
-
\??\c:\fxlrllx.exec:\fxlrllx.exe92⤵PID:2928
-
\??\c:\62606.exec:\62606.exe93⤵PID:1756
-
\??\c:\dpjvp.exec:\dpjvp.exe94⤵PID:1860
-
\??\c:\6248266.exec:\6248266.exe95⤵PID:2360
-
\??\c:\448022.exec:\448022.exe96⤵PID:1964
-
\??\c:\bhhbtn.exec:\bhhbtn.exe97⤵PID:3068
-
\??\c:\866464.exec:\866464.exe98⤵PID:2624
-
\??\c:\htbtbt.exec:\htbtbt.exe99⤵PID:3400
-
\??\c:\2226646.exec:\2226646.exe100⤵PID:4220
-
\??\c:\1rrlrrl.exec:\1rrlrrl.exe101⤵PID:1264
-
\??\c:\dpvpp.exec:\dpvpp.exe102⤵PID:4996
-
\??\c:\84446.exec:\84446.exe103⤵PID:3128
-
\??\c:\806468.exec:\806468.exe104⤵PID:2280
-
\??\c:\nbnbnt.exec:\nbnbnt.exe105⤵PID:2900
-
\??\c:\8460860.exec:\8460860.exe106⤵PID:1584
-
\??\c:\rxrffxx.exec:\rxrffxx.exe107⤵PID:2868
-
\??\c:\200208.exec:\200208.exe108⤵PID:5096
-
\??\c:\82460.exec:\82460.exe109⤵PID:3432
-
\??\c:\640426.exec:\640426.exe110⤵PID:1972
-
\??\c:\440426.exec:\440426.exe111⤵PID:4292
-
\??\c:\hhhnbb.exec:\hhhnbb.exe112⤵PID:456
-
\??\c:\jjppj.exec:\jjppj.exe113⤵PID:4328
-
\??\c:\rxrfxfx.exec:\rxrfxfx.exe114⤵PID:4236
-
\??\c:\82048.exec:\82048.exe115⤵PID:2892
-
\??\c:\648826.exec:\648826.exe116⤵PID:5076
-
\??\c:\btthbh.exec:\btthbh.exe117⤵PID:2840
-
\??\c:\rxxrlrx.exec:\rxxrlrx.exe118⤵PID:2812
-
\??\c:\828088.exec:\828088.exe119⤵PID:4828
-
\??\c:\jjjdj.exec:\jjjdj.exe120⤵PID:2160
-
\??\c:\lfxxxff.exec:\lfxxxff.exe121⤵PID:2748
-
\??\c:\40600.exec:\40600.exe122⤵PID:3928
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-