Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 23:59
Behavioral task
behavioral1
Sample
73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe
Resource
win7-20241010-en
9 signatures
150 seconds
General
-
Target
73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe
-
Size
3.7MB
-
MD5
ba1c24b2d74a8a09351d3f6a64a7af23
-
SHA1
3c0d35568a4525242cdba87ef34efce57b3eb424
-
SHA256
73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0
-
SHA512
cd690a7ec3464522421fbd87c11ebb5403f61745176fdeebc140a3f73928b9199c3a27a1791b76c6f22baa002142b017ba1cf9b66df7e1db790771764c317c1d
-
SSDEEP
49152:gCOfN6X5tLLQTg20ITS/PPs/1kS4eKRL/SRsj0Zuur1T75YqVUrmNF98l:U6XLq/qPPslzKx/dJg1ErmNI
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/4292-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3732-19-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1336-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4632-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2292-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4152-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1124-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4896-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4620-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4364-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2696-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4000-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4580-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1608-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2528-139-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1924-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1056-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4320-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2508-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4212-183-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4532-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/768-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2296-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4724-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2332-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/464-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3848-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/452-242-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2108-252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4480-262-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2968-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2696-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3820-283-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2700-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3636-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2264-295-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3144-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5108-309-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3512-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4932-344-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1396-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1016-371-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-378-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4924-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2164-419-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2484-432-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5088-475-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4300-488-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1520-522-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3860-538-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3108-600-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1364-632-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4020-759-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1804-1028-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1956-1044-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-1409-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2432-1665-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-1904-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Njrat family
-
Executes dropped EXE 64 IoCs
pid Process 2904 2800040.exe 1336 frxxrfx.exe 3732 22826.exe 4840 286664.exe 4632 s0860.exe 2404 4628260.exe 2292 k62200.exe 1124 m8266.exe 4152 3ttnhb.exe 4488 2800484.exe 4416 8062260.exe 4896 044460.exe 4620 420482.exe 4364 1hnttt.exe 2696 dpppj.exe 532 i862666.exe 4000 9xrfxrl.exe 3420 pvddp.exe 3388 204046.exe 4580 6840400.exe 4324 rlxrxxf.exe 1608 20482.exe 2528 m0660.exe 1924 jjpjj.exe 1056 tnnnnt.exe 4320 80882.exe 2508 pjjvp.exe 4928 424048.exe 3116 frxrrxx.exe 668 nhnhbt.exe 4212 tttnhh.exe 4532 nbhthh.exe 3632 1vvpd.exe 1388 64060.exe 1656 826020.exe 768 pddvp.exe 2296 lxrrlfl.exe 4520 w20044.exe 4456 g2626.exe 4724 pjjpj.exe 2332 lfllxxx.exe 464 886248.exe 3848 lfxrrrl.exe 448 20260.exe 3124 488840.exe 3588 dpvpj.exe 452 vddvp.exe 1088 6840006.exe 5096 lxlfxxx.exe 2108 lflxffr.exe 2796 jvvvp.exe 2164 7pjdv.exe 4480 22820.exe 2968 frfxllr.exe 656 jpdvj.exe 624 q04446.exe 2696 026644.exe 4728 26282.exe 3820 q82226.exe 2700 8820688.exe 3636 5dppp.exe 2264 rxrrrrr.exe 1144 220222.exe 3144 rlxxxxl.exe -
resource yara_rule behavioral2/memory/4292-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023c58-3.dat upx behavioral2/memory/4292-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbb-9.dat upx behavioral2/memory/2904-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023cb8-13.dat upx behavioral2/memory/3732-19-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1336-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbd-22.dat upx behavioral2/memory/4840-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbe-28.dat upx behavioral2/files/0x0007000000023cbf-33.dat upx behavioral2/memory/4632-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc0-39.dat upx behavioral2/memory/2292-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc1-45.dat upx behavioral2/files/0x0007000000023cc2-50.dat upx behavioral2/memory/4152-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1124-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc3-58.dat upx behavioral2/files/0x0007000000023cc4-62.dat upx behavioral2/files/0x0007000000023cc5-67.dat upx behavioral2/memory/4896-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc6-74.dat upx behavioral2/files/0x0007000000023cc7-78.dat upx behavioral2/memory/4620-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc8-84.dat upx behavioral2/memory/4364-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc9-90.dat upx behavioral2/memory/532-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2696-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cca-97.dat upx behavioral2/memory/4000-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000300000001e72a-105.dat upx behavioral2/files/0x0007000000023ccd-108.dat upx behavioral2/files/0x0007000000023cce-113.dat upx behavioral2/files/0x0007000000023ccf-119.dat upx behavioral2/memory/4580-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd0-124.dat upx behavioral2/memory/4324-126-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd1-130.dat upx behavioral2/memory/1608-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2528-139-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1924-140-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd3-137.dat upx behavioral2/files/0x0007000000023cd4-143.dat upx behavioral2/files/0x0007000000023cd5-148.dat upx behavioral2/memory/1056-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd6-154.dat upx behavioral2/memory/4320-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd7-160.dat upx behavioral2/memory/2508-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cd9-166.dat upx behavioral2/files/0x0007000000023cda-172.dat upx behavioral2/files/0x0007000000023cdb-176.dat upx behavioral2/files/0x0007000000023cdc-182.dat upx behavioral2/memory/4212-183-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4532-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1388-195-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/768-202-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2296-206-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4724-216-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/464-221-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2332-220-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w06688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nttbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k68000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 464822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4022262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rrlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0404062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxxrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 080640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 406606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 822822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 824066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlfxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfllxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0266466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c806660.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxrfxr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 2904 4292 73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe 82 PID 4292 wrote to memory of 2904 4292 73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe 82 PID 4292 wrote to memory of 2904 4292 73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe 82 PID 2904 wrote to memory of 1336 2904 2800040.exe 83 PID 2904 wrote to memory of 1336 2904 2800040.exe 83 PID 2904 wrote to memory of 1336 2904 2800040.exe 83 PID 1336 wrote to memory of 3732 1336 frxxrfx.exe 84 PID 1336 wrote to memory of 3732 1336 frxxrfx.exe 84 PID 1336 wrote to memory of 3732 1336 frxxrfx.exe 84 PID 3732 wrote to memory of 4840 3732 22826.exe 85 PID 3732 wrote to memory of 4840 3732 22826.exe 85 PID 3732 wrote to memory of 4840 3732 22826.exe 85 PID 4840 wrote to memory of 4632 4840 286664.exe 86 PID 4840 wrote to memory of 4632 4840 286664.exe 86 PID 4840 wrote to memory of 4632 4840 286664.exe 86 PID 4632 wrote to memory of 2404 4632 s0860.exe 87 PID 4632 wrote to memory of 2404 4632 s0860.exe 87 PID 4632 wrote to memory of 2404 4632 s0860.exe 87 PID 2404 wrote to memory of 2292 2404 4628260.exe 88 PID 2404 wrote to memory of 2292 2404 4628260.exe 88 PID 2404 wrote to memory of 2292 2404 4628260.exe 88 PID 2292 wrote to memory of 1124 2292 k62200.exe 89 PID 2292 wrote to memory of 1124 2292 k62200.exe 89 PID 2292 wrote to memory of 1124 2292 k62200.exe 89 PID 1124 wrote to memory of 4152 1124 m8266.exe 90 PID 1124 wrote to memory of 4152 1124 m8266.exe 90 PID 1124 wrote to memory of 4152 1124 m8266.exe 90 PID 4152 wrote to memory of 4488 4152 3ttnhb.exe 91 PID 4152 wrote to memory of 4488 4152 3ttnhb.exe 91 PID 4152 wrote to memory of 4488 4152 3ttnhb.exe 91 PID 4488 wrote to memory of 4416 4488 2800484.exe 92 PID 4488 wrote to memory of 4416 4488 2800484.exe 92 PID 4488 wrote to memory of 4416 4488 2800484.exe 92 PID 4416 wrote to memory of 4896 4416 8062260.exe 93 PID 4416 wrote to memory of 4896 4416 8062260.exe 93 PID 4416 wrote to memory of 4896 4416 8062260.exe 93 PID 4896 wrote to memory of 4620 4896 044460.exe 94 PID 4896 wrote to memory of 4620 4896 044460.exe 94 PID 4896 wrote to memory of 4620 4896 044460.exe 94 PID 4620 wrote to memory of 4364 4620 420482.exe 95 PID 4620 wrote to memory of 4364 4620 420482.exe 95 PID 4620 wrote to memory of 4364 4620 420482.exe 95 PID 4364 wrote to memory of 2696 4364 1hnttt.exe 96 PID 4364 wrote to memory of 2696 4364 1hnttt.exe 96 PID 4364 wrote to memory of 2696 4364 1hnttt.exe 96 PID 2696 wrote to memory of 532 2696 dpppj.exe 97 PID 2696 wrote to memory of 532 2696 dpppj.exe 97 PID 2696 wrote to memory of 532 2696 dpppj.exe 97 PID 532 wrote to memory of 4000 532 i862666.exe 98 PID 532 wrote to memory of 4000 532 i862666.exe 98 PID 532 wrote to memory of 4000 532 i862666.exe 98 PID 4000 wrote to memory of 3420 4000 9xrfxrl.exe 99 PID 4000 wrote to memory of 3420 4000 9xrfxrl.exe 99 PID 4000 wrote to memory of 3420 4000 9xrfxrl.exe 99 PID 3420 wrote to memory of 3388 3420 pvddp.exe 100 PID 3420 wrote to memory of 3388 3420 pvddp.exe 100 PID 3420 wrote to memory of 3388 3420 pvddp.exe 100 PID 3388 wrote to memory of 4580 3388 204046.exe 101 PID 3388 wrote to memory of 4580 3388 204046.exe 101 PID 3388 wrote to memory of 4580 3388 204046.exe 101 PID 4580 wrote to memory of 4324 4580 6840400.exe 104 PID 4580 wrote to memory of 4324 4580 6840400.exe 104 PID 4580 wrote to memory of 4324 4580 6840400.exe 104 PID 4324 wrote to memory of 1608 4324 rlxrxxf.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe"C:\Users\Admin\AppData\Local\Temp\73be99099641aa91746b4938124988dbccd195342f287be188406b57a98d2ba0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
\??\c:\2800040.exec:\2800040.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\frxxrfx.exec:\frxxrfx.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\22826.exec:\22826.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\286664.exec:\286664.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\s0860.exec:\s0860.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
\??\c:\4628260.exec:\4628260.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\k62200.exec:\k62200.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\m8266.exec:\m8266.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\3ttnhb.exec:\3ttnhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
\??\c:\2800484.exec:\2800484.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\8062260.exec:\8062260.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
\??\c:\044460.exec:\044460.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\420482.exec:\420482.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\1hnttt.exec:\1hnttt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\dpppj.exec:\dpppj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\i862666.exec:\i862666.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\9xrfxrl.exec:\9xrfxrl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\pvddp.exec:\pvddp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
\??\c:\204046.exec:\204046.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
\??\c:\6840400.exec:\6840400.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\rlxrxxf.exec:\rlxrxxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\20482.exec:\20482.exe23⤵
- Executes dropped EXE
PID:1608 -
\??\c:\m0660.exec:\m0660.exe24⤵
- Executes dropped EXE
PID:2528 -
\??\c:\jjpjj.exec:\jjpjj.exe25⤵
- Executes dropped EXE
PID:1924 -
\??\c:\tnnnnt.exec:\tnnnnt.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1056 -
\??\c:\80882.exec:\80882.exe27⤵
- Executes dropped EXE
PID:4320 -
\??\c:\pjjvp.exec:\pjjvp.exe28⤵
- Executes dropped EXE
PID:2508 -
\??\c:\424048.exec:\424048.exe29⤵
- Executes dropped EXE
PID:4928 -
\??\c:\frxrrxx.exec:\frxrrxx.exe30⤵
- Executes dropped EXE
PID:3116 -
\??\c:\nhnhbt.exec:\nhnhbt.exe31⤵
- Executes dropped EXE
PID:668 -
\??\c:\tttnhh.exec:\tttnhh.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4212 -
\??\c:\nbhthh.exec:\nbhthh.exe33⤵
- Executes dropped EXE
PID:4532 -
\??\c:\1vvpd.exec:\1vvpd.exe34⤵
- Executes dropped EXE
PID:3632 -
\??\c:\64060.exec:\64060.exe35⤵
- Executes dropped EXE
PID:1388 -
\??\c:\826020.exec:\826020.exe36⤵
- Executes dropped EXE
PID:1656 -
\??\c:\pddvp.exec:\pddvp.exe37⤵
- Executes dropped EXE
PID:768 -
\??\c:\lxrrlfl.exec:\lxrrlfl.exe38⤵
- Executes dropped EXE
PID:2296 -
\??\c:\w20044.exec:\w20044.exe39⤵
- Executes dropped EXE
PID:4520 -
\??\c:\g2626.exec:\g2626.exe40⤵
- Executes dropped EXE
PID:4456 -
\??\c:\pjjpj.exec:\pjjpj.exe41⤵
- Executes dropped EXE
PID:4724 -
\??\c:\lfllxxx.exec:\lfllxxx.exe42⤵
- Executes dropped EXE
PID:2332 -
\??\c:\886248.exec:\886248.exe43⤵
- Executes dropped EXE
PID:464 -
\??\c:\lfxrrrl.exec:\lfxrrrl.exe44⤵
- Executes dropped EXE
PID:3848 -
\??\c:\20260.exec:\20260.exe45⤵
- Executes dropped EXE
PID:448 -
\??\c:\488840.exec:\488840.exe46⤵
- Executes dropped EXE
PID:3124 -
\??\c:\dpvpj.exec:\dpvpj.exe47⤵
- Executes dropped EXE
PID:3588 -
\??\c:\vddvp.exec:\vddvp.exe48⤵
- Executes dropped EXE
PID:452 -
\??\c:\6840006.exec:\6840006.exe49⤵
- Executes dropped EXE
PID:1088 -
\??\c:\lxlfxxx.exec:\lxlfxxx.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5096 -
\??\c:\lflxffr.exec:\lflxffr.exe51⤵
- Executes dropped EXE
PID:2108 -
\??\c:\jvvvp.exec:\jvvvp.exe52⤵
- Executes dropped EXE
PID:2796 -
\??\c:\7pjdv.exec:\7pjdv.exe53⤵
- Executes dropped EXE
PID:2164 -
\??\c:\22820.exec:\22820.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4480 -
\??\c:\frfxllr.exec:\frfxllr.exe55⤵
- Executes dropped EXE
PID:2968 -
\??\c:\jpdvj.exec:\jpdvj.exe56⤵
- Executes dropped EXE
PID:656 -
\??\c:\q04446.exec:\q04446.exe57⤵
- Executes dropped EXE
PID:624 -
\??\c:\026644.exec:\026644.exe58⤵
- Executes dropped EXE
PID:2696 -
\??\c:\26282.exec:\26282.exe59⤵
- Executes dropped EXE
PID:4728 -
\??\c:\q82226.exec:\q82226.exe60⤵
- Executes dropped EXE
PID:3820 -
\??\c:\8820688.exec:\8820688.exe61⤵
- Executes dropped EXE
PID:2700 -
\??\c:\5dppp.exec:\5dppp.exe62⤵
- Executes dropped EXE
PID:3636 -
\??\c:\rxrrrrr.exec:\rxrrrrr.exe63⤵
- Executes dropped EXE
PID:2264 -
\??\c:\220222.exec:\220222.exe64⤵
- Executes dropped EXE
PID:1144 -
\??\c:\rlxxxxl.exec:\rlxxxxl.exe65⤵
- Executes dropped EXE
PID:3144 -
\??\c:\88804.exec:\88804.exe66⤵PID:776
-
\??\c:\fxrfxxl.exec:\fxrfxxl.exe67⤵PID:5108
-
\??\c:\24826.exec:\24826.exe68⤵PID:4072
-
\??\c:\600482.exec:\600482.exe69⤵PID:3512
-
\??\c:\vjdvv.exec:\vjdvv.exe70⤵PID:1924
-
\??\c:\o248220.exec:\o248220.exe71⤵PID:2788
-
\??\c:\8622260.exec:\8622260.exe72⤵PID:828
-
\??\c:\2844600.exec:\2844600.exe73⤵PID:4544
-
\??\c:\2022224.exec:\2022224.exe74⤵PID:1420
-
\??\c:\a4488.exec:\a4488.exe75⤵PID:224
-
\??\c:\xrrrfxf.exec:\xrrrfxf.exe76⤵PID:2524
-
\??\c:\vdjdj.exec:\vdjdj.exe77⤵PID:2872
-
\??\c:\88862.exec:\88862.exe78⤵PID:4932
-
\??\c:\tntnbb.exec:\tntnbb.exe79⤵PID:1256
-
\??\c:\g4284.exec:\g4284.exe80⤵PID:3196
-
\??\c:\60282.exec:\60282.exe81⤵PID:1396
-
\??\c:\bbhbtn.exec:\bbhbtn.exe82⤵PID:1388
-
\??\c:\g2844.exec:\g2844.exe83⤵PID:8
-
\??\c:\jjddd.exec:\jjddd.exe84⤵PID:3188
-
\??\c:\vjvpj.exec:\vjvpj.exe85⤵PID:3596
-
\??\c:\0240448.exec:\0240448.exe86⤵PID:1016
-
\??\c:\hhtnnn.exec:\hhtnnn.exe87⤵PID:3860
-
\??\c:\8644446.exec:\8644446.exe88⤵PID:2904
-
\??\c:\0000448.exec:\0000448.exe89⤵PID:3348
-
\??\c:\dvvdd.exec:\dvvdd.exe90⤵PID:4272
-
\??\c:\66444.exec:\66444.exe91⤵PID:432
-
\??\c:\lllffrl.exec:\lllffrl.exe92⤵PID:3844
-
\??\c:\xrllxfr.exec:\xrllxfr.exe93⤵PID:4924
-
\??\c:\lfffxrl.exec:\lfffxrl.exe94⤵
- System Location Discovery: System Language Discovery
PID:1832 -
\??\c:\2282226.exec:\2282226.exe95⤵PID:4008
-
\??\c:\088266.exec:\088266.exe96⤵PID:1632
-
\??\c:\jpvpj.exec:\jpvpj.exe97⤵PID:3992
-
\??\c:\djddd.exec:\djddd.exe98⤵PID:5096
-
\??\c:\668808.exec:\668808.exe99⤵PID:3068
-
\??\c:\flffxff.exec:\flffxff.exe100⤵PID:920
-
\??\c:\ttbttt.exec:\ttbttt.exe101⤵PID:2164
-
\??\c:\e66488.exec:\e66488.exe102⤵PID:2376
-
\??\c:\86266.exec:\86266.exe103⤵PID:2968
-
\??\c:\nhnttt.exec:\nhnttt.exe104⤵PID:5080
-
\??\c:\882042.exec:\882042.exe105⤵PID:2484
-
\??\c:\i220602.exec:\i220602.exe106⤵PID:736
-
\??\c:\820426.exec:\820426.exe107⤵PID:2660
-
\??\c:\7bhbtn.exec:\7bhbtn.exe108⤵PID:2776
-
\??\c:\7nhbtt.exec:\7nhbtt.exe109⤵PID:2244
-
\??\c:\xfrlfff.exec:\xfrlfff.exe110⤵
- System Location Discovery: System Language Discovery
PID:1432 -
\??\c:\02448.exec:\02448.exe111⤵PID:1020
-
\??\c:\hbbtnt.exec:\hbbtnt.exe112⤵PID:3576
-
\??\c:\lxxxxlf.exec:\lxxxxlf.exe113⤵PID:2440
-
\??\c:\842682.exec:\842682.exe114⤵PID:1756
-
\??\c:\1rlflff.exec:\1rlflff.exe115⤵PID:4652
-
\??\c:\644826.exec:\644826.exe116⤵PID:4100
-
\??\c:\vddpj.exec:\vddpj.exe117⤵PID:4512
-
\??\c:\0444882.exec:\0444882.exe118⤵PID:2528
-
\??\c:\lxxrrlf.exec:\lxxrrlf.exe119⤵PID:5088
-
\??\c:\i404040.exec:\i404040.exe120⤵PID:2004
-
\??\c:\8244882.exec:\8244882.exe121⤵PID:1204
-
\??\c:\m8226.exec:\m8226.exe122⤵PID:4036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-