Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2024, 19:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe
Resource
win7-20240708-en
7 signatures
120 seconds
General
-
Target
7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe
-
Size
453KB
-
MD5
f198af124d5f5d4a299cf383a86afb20
-
SHA1
5298ed0789a74e651f48150d2dd2d1c202fd5115
-
SHA256
7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155
-
SHA512
7611dfcfa3386d099d0bc4356c4f2cb63176874fb512453855b41775023cbe45306e761a0f6457df031226afee126a96bb975cfd4a9071bc99a86337802c0700
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeM:q7Tc2NYHUrAwfMp3CDM
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/3936-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1796-24-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1544-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1924-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1772-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4568-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/116-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3808-100-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/468-115-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3028-148-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1208-154-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3960-201-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5100-206-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1284-217-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4364-233-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4744-252-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3964-260-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1680-263-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2104-279-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4572-283-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4916-290-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3904-335-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2904-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2248-353-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4904-370-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4144-405-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4664-418-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1596-452-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2508-474-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4872-506-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4548-490-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1940-560-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2868-377-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1976-357-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3772-349-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3544-310-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2412-306-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2372-256-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4764-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4024-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3472-194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4836-189-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4976-184-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1976-175-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1792-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3484-161-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3208-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3728-120-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4200-98-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3004-82-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2004-77-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2104-64-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3760-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/800-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1384-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1748-600-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2644-604-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1796-608-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3704-726-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2404-955-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2388-1174-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4356-1938-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3936 260860.exe 800 88082.exe 1796 frfrxxr.exe 1544 u680482.exe 1924 c886486.exe 3760 ntbnht.exe 1772 2020848.exe 4580 s6642.exe 4568 882086.exe 2104 2402046.exe 116 thnhbb.exe 2004 220460.exe 3004 hnnbbn.exe 2376 dpjvj.exe 4200 dvvpj.exe 3808 ddjvd.exe 4424 vpvdp.exe 2096 4440062.exe 468 2860444.exe 3728 ttbnbt.exe 3208 g4482.exe 3376 q80488.exe 1260 a8220.exe 748 5rxxrff.exe 3028 204864.exe 1208 i888608.exe 3484 o408086.exe 1792 822622.exe 1976 7tthtn.exe 4836 6888888.exe 4976 vjjjd.exe 3868 xxxlrrf.exe 3472 5hnhhh.exe 4024 60482.exe 3960 6820882.exe 5100 868222.exe 4268 404860.exe 4764 20482.exe 1284 402264.exe 5104 thbtnn.exe 1184 g4642.exe 4144 62642.exe 4364 xfxrfxl.exe 4320 5lrlrrx.exe 2640 2240482.exe 3156 5dvjd.exe 1020 rrlllff.exe 2408 thnhbb.exe 4744 866066.exe 2372 u442608.exe 3964 flxrlll.exe 1680 e44448.exe 892 jpjdp.exe 968 a2266.exe 5096 8664422.exe 3524 682462.exe 2104 4688202.exe 4572 0660422.exe 2004 ttnbnh.exe 4916 u042048.exe 1764 tntnhb.exe 3212 a6820.exe 3040 5hhbtb.exe 3032 1vvjd.exe -
resource yara_rule behavioral2/memory/3936-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1544-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1796-24-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1544-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1924-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1772-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4568-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/116-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3808-100-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-115-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1260-132-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3028-148-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1208-154-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3960-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5100-206-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4268-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1284-217-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4364-233-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4744-252-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1680-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2104-279-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4572-283-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4916-290-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3904-335-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2904-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2248-353-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4904-370-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4144-405-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4664-418-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1596-452-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2508-474-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4872-506-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4136-510-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4548-490-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1940-560-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2868-377-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1976-357-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-349-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3544-310-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2412-306-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2372-256-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4764-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3472-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-189-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4976-184-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4836-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3728-176-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1976-175-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1792-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1976-169-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1792-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3484-161-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3728-120-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/468-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4200-98-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3004-82-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2004-77-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2104-64-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3760-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/800-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1384-5-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0626004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ppdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m8208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 662648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i626666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4608204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lfrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q44826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q00826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3936 1384 7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe 83 PID 1384 wrote to memory of 3936 1384 7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe 83 PID 1384 wrote to memory of 3936 1384 7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe 83 PID 3936 wrote to memory of 800 3936 260860.exe 84 PID 3936 wrote to memory of 800 3936 260860.exe 84 PID 3936 wrote to memory of 800 3936 260860.exe 84 PID 800 wrote to memory of 1796 800 88082.exe 85 PID 800 wrote to memory of 1796 800 88082.exe 85 PID 800 wrote to memory of 1796 800 88082.exe 85 PID 1796 wrote to memory of 1544 1796 frfrxxr.exe 86 PID 1796 wrote to memory of 1544 1796 frfrxxr.exe 86 PID 1796 wrote to memory of 1544 1796 frfrxxr.exe 86 PID 1544 wrote to memory of 1924 1544 u680482.exe 87 PID 1544 wrote to memory of 1924 1544 u680482.exe 87 PID 1544 wrote to memory of 1924 1544 u680482.exe 87 PID 1924 wrote to memory of 3760 1924 c886486.exe 88 PID 1924 wrote to memory of 3760 1924 c886486.exe 88 PID 1924 wrote to memory of 3760 1924 c886486.exe 88 PID 3760 wrote to memory of 1772 3760 ntbnht.exe 89 PID 3760 wrote to memory of 1772 3760 ntbnht.exe 89 PID 3760 wrote to memory of 1772 3760 ntbnht.exe 89 PID 1772 wrote to memory of 4580 1772 2020848.exe 90 PID 1772 wrote to memory of 4580 1772 2020848.exe 90 PID 1772 wrote to memory of 4580 1772 2020848.exe 90 PID 4580 wrote to memory of 4568 4580 s6642.exe 91 PID 4580 wrote to memory of 4568 4580 s6642.exe 91 PID 4580 wrote to memory of 4568 4580 s6642.exe 91 PID 4568 wrote to memory of 2104 4568 882086.exe 139 PID 4568 wrote to memory of 2104 4568 882086.exe 139 PID 4568 wrote to memory of 2104 4568 882086.exe 139 PID 2104 wrote to memory of 116 2104 2402046.exe 93 PID 2104 wrote to memory of 116 2104 2402046.exe 93 PID 2104 wrote to memory of 116 2104 2402046.exe 93 PID 116 wrote to memory of 2004 116 thnhbb.exe 141 PID 116 wrote to memory of 2004 116 thnhbb.exe 141 PID 116 wrote to memory of 2004 116 thnhbb.exe 141 PID 2004 wrote to memory of 3004 2004 220460.exe 95 PID 2004 wrote to memory of 3004 2004 220460.exe 95 PID 2004 wrote to memory of 3004 2004 220460.exe 95 PID 3004 wrote to memory of 2376 3004 hnnbbn.exe 96 PID 3004 wrote to memory of 2376 3004 hnnbbn.exe 96 PID 3004 wrote to memory of 2376 3004 hnnbbn.exe 96 PID 2376 wrote to memory of 4200 2376 dpjvj.exe 97 PID 2376 wrote to memory of 4200 2376 dpjvj.exe 97 PID 2376 wrote to memory of 4200 2376 dpjvj.exe 97 PID 4200 wrote to memory of 3808 4200 dvvpj.exe 98 PID 4200 wrote to memory of 3808 4200 dvvpj.exe 98 PID 4200 wrote to memory of 3808 4200 dvvpj.exe 98 PID 3808 wrote to memory of 4424 3808 ddjvd.exe 99 PID 3808 wrote to memory of 4424 3808 ddjvd.exe 99 PID 3808 wrote to memory of 4424 3808 ddjvd.exe 99 PID 4424 wrote to memory of 2096 4424 vpvdp.exe 100 PID 4424 wrote to memory of 2096 4424 vpvdp.exe 100 PID 4424 wrote to memory of 2096 4424 vpvdp.exe 100 PID 2096 wrote to memory of 468 2096 4440062.exe 101 PID 2096 wrote to memory of 468 2096 4440062.exe 101 PID 2096 wrote to memory of 468 2096 4440062.exe 101 PID 468 wrote to memory of 3728 468 2860444.exe 102 PID 468 wrote to memory of 3728 468 2860444.exe 102 PID 468 wrote to memory of 3728 468 2860444.exe 102 PID 3728 wrote to memory of 3208 3728 ttbnbt.exe 103 PID 3728 wrote to memory of 3208 3728 ttbnbt.exe 103 PID 3728 wrote to memory of 3208 3728 ttbnbt.exe 103 PID 3208 wrote to memory of 3376 3208 g4482.exe 104
Processes
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe"C:\Users\Admin\AppData\Local\Temp\7fb6cdf4c597f1e19b8cb8f16eda47f06efcfabff3fae2d5cfb5691393c4d155N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
\??\c:\260860.exec:\260860.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\88082.exec:\88082.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
\??\c:\frfrxxr.exec:\frfrxxr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\u680482.exec:\u680482.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1544 -
\??\c:\c886486.exec:\c886486.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\ntbnht.exec:\ntbnht.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
\??\c:\2020848.exec:\2020848.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
\??\c:\s6642.exec:\s6642.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
\??\c:\882086.exec:\882086.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
\??\c:\2402046.exec:\2402046.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\thnhbb.exec:\thnhbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\220460.exec:\220460.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\hnnbbn.exec:\hnnbbn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\dpjvj.exec:\dpjvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\dvvpj.exec:\dvvpj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\ddjvd.exec:\ddjvd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\vpvdp.exec:\vpvdp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\4440062.exec:\4440062.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\2860444.exec:\2860444.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
\??\c:\ttbnbt.exec:\ttbnbt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\g4482.exec:\g4482.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\q80488.exec:\q80488.exe23⤵
- Executes dropped EXE
PID:3376 -
\??\c:\a8220.exec:\a8220.exe24⤵
- Executes dropped EXE
PID:1260 -
\??\c:\5rxxrff.exec:\5rxxrff.exe25⤵
- Executes dropped EXE
PID:748 -
\??\c:\204864.exec:\204864.exe26⤵
- Executes dropped EXE
PID:3028 -
\??\c:\i888608.exec:\i888608.exe27⤵
- Executes dropped EXE
PID:1208 -
\??\c:\o408086.exec:\o408086.exe28⤵
- Executes dropped EXE
PID:3484 -
\??\c:\822622.exec:\822622.exe29⤵
- Executes dropped EXE
PID:1792 -
\??\c:\7tthtn.exec:\7tthtn.exe30⤵
- Executes dropped EXE
PID:1976 -
\??\c:\6888888.exec:\6888888.exe31⤵
- Executes dropped EXE
PID:4836 -
\??\c:\vjjjd.exec:\vjjjd.exe32⤵
- Executes dropped EXE
PID:4976 -
\??\c:\xxxlrrf.exec:\xxxlrrf.exe33⤵
- Executes dropped EXE
PID:3868 -
\??\c:\5hnhhh.exec:\5hnhhh.exe34⤵
- Executes dropped EXE
PID:3472 -
\??\c:\60482.exec:\60482.exe35⤵
- Executes dropped EXE
PID:4024 -
\??\c:\6820882.exec:\6820882.exe36⤵
- Executes dropped EXE
PID:3960 -
\??\c:\868222.exec:\868222.exe37⤵
- Executes dropped EXE
PID:5100 -
\??\c:\404860.exec:\404860.exe38⤵
- Executes dropped EXE
PID:4268 -
\??\c:\20482.exec:\20482.exe39⤵
- Executes dropped EXE
PID:4764 -
\??\c:\402264.exec:\402264.exe40⤵
- Executes dropped EXE
PID:1284 -
\??\c:\thbtnn.exec:\thbtnn.exe41⤵
- Executes dropped EXE
PID:5104 -
\??\c:\g4642.exec:\g4642.exe42⤵
- Executes dropped EXE
PID:1184 -
\??\c:\62642.exec:\62642.exe43⤵
- Executes dropped EXE
PID:4144 -
\??\c:\xfxrfxl.exec:\xfxrfxl.exe44⤵
- Executes dropped EXE
PID:4364 -
\??\c:\5lrlrrx.exec:\5lrlrrx.exe45⤵
- Executes dropped EXE
PID:4320 -
\??\c:\2240482.exec:\2240482.exe46⤵
- Executes dropped EXE
PID:2640 -
\??\c:\5dvjd.exec:\5dvjd.exe47⤵
- Executes dropped EXE
PID:3156 -
\??\c:\rrlllff.exec:\rrlllff.exe48⤵
- Executes dropped EXE
PID:1020 -
\??\c:\thnhbb.exec:\thnhbb.exe49⤵
- Executes dropped EXE
PID:2408 -
\??\c:\866066.exec:\866066.exe50⤵
- Executes dropped EXE
PID:4744 -
\??\c:\u442608.exec:\u442608.exe51⤵
- Executes dropped EXE
PID:2372 -
\??\c:\flxrlll.exec:\flxrlll.exe52⤵
- Executes dropped EXE
PID:3964 -
\??\c:\e44448.exec:\e44448.exe53⤵
- Executes dropped EXE
PID:1680 -
\??\c:\jpjdp.exec:\jpjdp.exe54⤵
- Executes dropped EXE
PID:892 -
\??\c:\a2266.exec:\a2266.exe55⤵
- Executes dropped EXE
PID:968 -
\??\c:\8664422.exec:\8664422.exe56⤵
- Executes dropped EXE
PID:5096 -
\??\c:\682462.exec:\682462.exe57⤵
- Executes dropped EXE
PID:3524 -
\??\c:\4688202.exec:\4688202.exe58⤵
- Executes dropped EXE
PID:2104 -
\??\c:\0660422.exec:\0660422.exe59⤵
- Executes dropped EXE
PID:4572 -
\??\c:\ttnbnh.exec:\ttnbnh.exe60⤵
- Executes dropped EXE
PID:2004 -
\??\c:\u042048.exec:\u042048.exe61⤵
- Executes dropped EXE
PID:4916 -
\??\c:\tntnhb.exec:\tntnhb.exe62⤵
- Executes dropped EXE
PID:1764 -
\??\c:\a6820.exec:\a6820.exe63⤵
- Executes dropped EXE
PID:3212 -
\??\c:\5hhbtb.exec:\5hhbtb.exe64⤵
- Executes dropped EXE
PID:3040 -
\??\c:\1vvjd.exec:\1vvjd.exe65⤵
- Executes dropped EXE
PID:3032 -
\??\c:\q26082.exec:\q26082.exe66⤵PID:2412
-
\??\c:\lxxrrll.exec:\lxxrrll.exe67⤵PID:5028
-
\??\c:\22406.exec:\22406.exe68⤵PID:3544
-
\??\c:\9rxrxrx.exec:\9rxrxrx.exe69⤵PID:2912
-
\??\c:\628686.exec:\628686.exe70⤵PID:3728
-
\??\c:\84448.exec:\84448.exe71⤵PID:1720
-
\??\c:\tthbhh.exec:\tthbhh.exe72⤵PID:1272
-
\??\c:\dppjv.exec:\dppjv.exe73⤵PID:2908
-
\??\c:\s2608.exec:\s2608.exe74⤵PID:1344
-
\??\c:\864844.exec:\864844.exe75⤵PID:3904
-
\??\c:\9djvj.exec:\9djvj.exe76⤵PID:3548
-
\??\c:\8606448.exec:\8606448.exe77⤵PID:2904
-
\??\c:\886448.exec:\886448.exe78⤵PID:396
-
\??\c:\dpjvp.exec:\dpjvp.exe79⤵PID:3772
-
\??\c:\c442682.exec:\c442682.exe80⤵PID:2248
-
\??\c:\840482.exec:\840482.exe81⤵PID:1976
-
\??\c:\vpjvp.exec:\vpjvp.exe82⤵PID:3644
-
\??\c:\rlrfrxr.exec:\rlrfrxr.exe83⤵PID:4124
-
\??\c:\464866.exec:\464866.exe84⤵PID:4656
-
\??\c:\tnnbnn.exec:\tnnbnn.exe85⤵PID:4904
-
\??\c:\5jdvj.exec:\5jdvj.exe86⤵PID:4024
-
\??\c:\66662.exec:\66662.exe87⤵PID:2868
-
\??\c:\tnbthb.exec:\tnbthb.exe88⤵PID:2596
-
\??\c:\0686004.exec:\0686004.exe89⤵PID:4428
-
\??\c:\5dpjv.exec:\5dpjv.exe90⤵PID:4300
-
\??\c:\4608642.exec:\4608642.exe91⤵PID:1256
-
\??\c:\lrfrlff.exec:\lrfrlff.exe92⤵PID:2260
-
\??\c:\g2864.exec:\g2864.exe93⤵PID:4992
-
\??\c:\k08648.exec:\k08648.exe94⤵PID:1964
-
\??\c:\frfrfxl.exec:\frfrfxl.exe95⤵PID:1184
-
\??\c:\84426.exec:\84426.exe96⤵PID:4144
-
\??\c:\3vpjp.exec:\3vpjp.exe97⤵PID:4984
-
\??\c:\w84226.exec:\w84226.exe98⤵PID:3016
-
\??\c:\bnhnnn.exec:\bnhnnn.exe99⤵PID:940
-
\??\c:\200084.exec:\200084.exe100⤵PID:4664
-
\??\c:\nhthtn.exec:\nhthtn.exe101⤵PID:2060
-
\??\c:\ntthth.exec:\ntthth.exe102⤵PID:4884
-
\??\c:\600208.exec:\600208.exe103⤵PID:2896
-
\??\c:\w44086.exec:\w44086.exe104⤵PID:4748
-
\??\c:\460808.exec:\460808.exe105⤵PID:4744
-
\??\c:\2264208.exec:\2264208.exe106⤵PID:2040
-
\??\c:\pdpdv.exec:\pdpdv.exe107⤵PID:3964
-
\??\c:\lrxrllx.exec:\lrxrllx.exe108⤵PID:4396
-
\??\c:\thtnbt.exec:\thtnbt.exe109⤵PID:2652
-
\??\c:\5xrrfxl.exec:\5xrrfxl.exe110⤵PID:1148
-
\??\c:\666420.exec:\666420.exe111⤵PID:1596
-
\??\c:\dpjvj.exec:\dpjvj.exe112⤵PID:1880
-
\??\c:\04600.exec:\04600.exe113⤵PID:4068
-
\??\c:\djvjv.exec:\djvjv.exe114⤵PID:3616
-
\??\c:\8648608.exec:\8648608.exe115⤵PID:4572
-
\??\c:\664608.exec:\664608.exe116⤵PID:3004
-
\??\c:\xlxlxrf.exec:\xlxlxrf.exe117⤵PID:3520
-
\??\c:\rllffxl.exec:\rllffxl.exe118⤵PID:2508
-
\??\c:\3lxlxrf.exec:\3lxlxrf.exe119⤵PID:2272
-
\??\c:\7rlxrlx.exec:\7rlxrlx.exe120⤵PID:448
-
\??\c:\djjdj.exec:\djjdj.exe121⤵PID:316
-
\??\c:\000420.exec:\000420.exe122⤵PID:2400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-