Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 04:03
Behavioral task
behavioral1
Sample
b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe
-
Size
333KB
-
MD5
0ec537d5a7ff2301be0b68bf73f26562
-
SHA1
0a532336db28d622c9c5f1b270386985aa38d8d9
-
SHA256
b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7
-
SHA512
13ba6de4cbf05c7ef841a901a6717c3f936459c07d13430b0cbe8f5e15de88675dfd7c0bee9fa51fbaac563e6effab3824d343d921936ad2acb38a4491fc4b2a
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbeTq:R4wFHoSHYHUrAwfMp3CD+
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/1348-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1124-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4420-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/540-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3936-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2464-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/324-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3500-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1056-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4748-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1648-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2768-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2744-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1756-79-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1780-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3080-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/636-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4396-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1940-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4936-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3112-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1684-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/780-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2304-151-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4924-159-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1952-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4920-163-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4920-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3632-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/880-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2628-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-193-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4916-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3660-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2756-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3616-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/552-218-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4352-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1212-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1676-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2200-238-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2192-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3656-254-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3328-279-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4572-288-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1004-310-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1176-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/880-342-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4740-351-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1900-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4368-385-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1124-396-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4332-427-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2244-442-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3472-523-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3012-580-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5108-597-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2064-622-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1176-847-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3640-1038-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1124 08600.exe 2828 826266.exe 4420 062826.exe 540 xflfrrf.exe 3936 dvppj.exe 3500 406226.exe 2464 600486.exe 324 dvvpj.exe 1056 jpvpp.exe 4748 6004448.exe 1648 rlffffl.exe 2608 86000.exe 2768 bnnhhb.exe 2744 jjpjj.exe 1756 hbbbtb.exe 1780 84400.exe 3080 28482.exe 4800 04600.exe 636 680826.exe 5040 dvjdd.exe 4396 8626604.exe 1940 lfrfrlx.exe 1200 086242.exe 4936 vddvp.exe 3112 802266.exe 1684 tbnbtn.exe 780 bnnnhb.exe 844 xffxxxr.exe 1712 hbttth.exe 2304 rrfxxxr.exe 3260 bnnhbb.exe 4924 jpdvd.exe 1952 hhtnhh.exe 4920 lxxxrrl.exe 2916 e84826.exe 3632 xxfxllf.exe 880 nnttbt.exe 1460 482264.exe 2628 vjjdv.exe 4984 djpvp.exe 4740 4028222.exe 624 2244822.exe 2640 thhhbb.exe 3684 84064.exe 4840 bnnhtn.exe 4916 u644448.exe 3660 vjppj.exe 232 26882.exe 2756 pdpjj.exe 760 pvjvd.exe 3616 xllfxxr.exe 4768 6204866.exe 3644 jddvp.exe 3540 044822.exe 552 frrlxxl.exe 4352 xrlxrlf.exe 1484 04666.exe 1676 0626004.exe 2764 vpvpj.exe 4804 hhhbbt.exe 4756 462200.exe 4420 8288484.exe 2200 60482.exe 2192 4262262.exe -
resource yara_rule behavioral2/memory/1348-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b8c-3.dat upx behavioral2/memory/1348-4-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c76-8.dat upx behavioral2/memory/1124-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c77-11.dat upx behavioral2/files/0x0007000000023c78-17.dat upx behavioral2/memory/4420-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c79-22.dat upx behavioral2/memory/540-23-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7a-27.dat upx behavioral2/memory/3936-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7b-32.dat upx behavioral2/files/0x0007000000023c7c-38.dat upx behavioral2/memory/2464-41-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/324-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3500-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7d-43.dat upx behavioral2/memory/1056-45-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023c73-48.dat upx behavioral2/memory/4748-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7e-53.dat upx behavioral2/memory/4748-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c7f-59.dat upx behavioral2/memory/1648-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c80-63.dat upx behavioral2/files/0x0007000000023c81-67.dat upx behavioral2/memory/2768-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2744-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1756-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c82-73.dat upx behavioral2/memory/1756-79-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c83-78.dat upx behavioral2/files/0x0007000000023c84-84.dat upx behavioral2/memory/1780-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c85-88.dat upx behavioral2/memory/3080-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c86-93.dat upx behavioral2/files/0x0007000000023c87-97.dat upx behavioral2/memory/636-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c88-102.dat upx behavioral2/memory/5040-104-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c89-108.dat upx behavioral2/memory/4396-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1940-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8a-112.dat upx behavioral2/files/0x0007000000023c8b-117.dat upx behavioral2/memory/4936-122-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8c-121.dat upx behavioral2/memory/3112-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8d-126.dat upx behavioral2/files/0x0007000000023c8e-130.dat upx behavioral2/memory/1684-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c8f-137.dat upx behavioral2/memory/780-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c90-141.dat upx behavioral2/memory/1712-146-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c91-145.dat upx behavioral2/files/0x0007000000023c92-150.dat upx behavioral2/memory/2304-151-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023c93-155.dat upx behavioral2/memory/4924-159-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1952-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4920-163-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntthnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 860044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xrfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1124 1348 b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe 83 PID 1348 wrote to memory of 1124 1348 b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe 83 PID 1348 wrote to memory of 1124 1348 b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe 83 PID 1124 wrote to memory of 2828 1124 08600.exe 84 PID 1124 wrote to memory of 2828 1124 08600.exe 84 PID 1124 wrote to memory of 2828 1124 08600.exe 84 PID 2828 wrote to memory of 4420 2828 826266.exe 85 PID 2828 wrote to memory of 4420 2828 826266.exe 85 PID 2828 wrote to memory of 4420 2828 826266.exe 85 PID 4420 wrote to memory of 540 4420 062826.exe 86 PID 4420 wrote to memory of 540 4420 062826.exe 86 PID 4420 wrote to memory of 540 4420 062826.exe 86 PID 540 wrote to memory of 3936 540 xflfrrf.exe 87 PID 540 wrote to memory of 3936 540 xflfrrf.exe 87 PID 540 wrote to memory of 3936 540 xflfrrf.exe 87 PID 3936 wrote to memory of 3500 3936 dvppj.exe 88 PID 3936 wrote to memory of 3500 3936 dvppj.exe 88 PID 3936 wrote to memory of 3500 3936 dvppj.exe 88 PID 3500 wrote to memory of 2464 3500 406226.exe 89 PID 3500 wrote to memory of 2464 3500 406226.exe 89 PID 3500 wrote to memory of 2464 3500 406226.exe 89 PID 2464 wrote to memory of 324 2464 600486.exe 90 PID 2464 wrote to memory of 324 2464 600486.exe 90 PID 2464 wrote to memory of 324 2464 600486.exe 90 PID 324 wrote to memory of 1056 324 dvvpj.exe 91 PID 324 wrote to memory of 1056 324 dvvpj.exe 91 PID 324 wrote to memory of 1056 324 dvvpj.exe 91 PID 1056 wrote to memory of 4748 1056 jpvpp.exe 92 PID 1056 wrote to memory of 4748 1056 jpvpp.exe 92 PID 1056 wrote to memory of 4748 1056 jpvpp.exe 92 PID 4748 wrote to memory of 1648 4748 6004448.exe 93 PID 4748 wrote to memory of 1648 4748 6004448.exe 93 PID 4748 wrote to memory of 1648 4748 6004448.exe 93 PID 1648 wrote to memory of 2608 1648 rlffffl.exe 94 PID 1648 wrote to memory of 2608 1648 rlffffl.exe 94 PID 1648 wrote to memory of 2608 1648 rlffffl.exe 94 PID 2608 wrote to memory of 2768 2608 86000.exe 95 PID 2608 wrote to memory of 2768 2608 86000.exe 95 PID 2608 wrote to memory of 2768 2608 86000.exe 95 PID 2768 wrote to memory of 2744 2768 bnnhhb.exe 96 PID 2768 wrote to memory of 2744 2768 bnnhhb.exe 96 PID 2768 wrote to memory of 2744 2768 bnnhhb.exe 96 PID 2744 wrote to memory of 1756 2744 jjpjj.exe 97 PID 2744 wrote to memory of 1756 2744 jjpjj.exe 97 PID 2744 wrote to memory of 1756 2744 jjpjj.exe 97 PID 1756 wrote to memory of 1780 1756 hbbbtb.exe 98 PID 1756 wrote to memory of 1780 1756 hbbbtb.exe 98 PID 1756 wrote to memory of 1780 1756 hbbbtb.exe 98 PID 1780 wrote to memory of 3080 1780 84400.exe 99 PID 1780 wrote to memory of 3080 1780 84400.exe 99 PID 1780 wrote to memory of 3080 1780 84400.exe 99 PID 3080 wrote to memory of 4800 3080 28482.exe 100 PID 3080 wrote to memory of 4800 3080 28482.exe 100 PID 3080 wrote to memory of 4800 3080 28482.exe 100 PID 4800 wrote to memory of 636 4800 04600.exe 101 PID 4800 wrote to memory of 636 4800 04600.exe 101 PID 4800 wrote to memory of 636 4800 04600.exe 101 PID 636 wrote to memory of 5040 636 680826.exe 102 PID 636 wrote to memory of 5040 636 680826.exe 102 PID 636 wrote to memory of 5040 636 680826.exe 102 PID 5040 wrote to memory of 4396 5040 dvjdd.exe 103 PID 5040 wrote to memory of 4396 5040 dvjdd.exe 103 PID 5040 wrote to memory of 4396 5040 dvjdd.exe 103 PID 4396 wrote to memory of 1940 4396 8626604.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe"C:\Users\Admin\AppData\Local\Temp\b146928b30228b12238fdb94b0ab8179518acff903bb31fb360b0189d2f2c7e7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
\??\c:\08600.exec:\08600.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
\??\c:\826266.exec:\826266.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\062826.exec:\062826.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
\??\c:\xflfrrf.exec:\xflfrrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
\??\c:\dvppj.exec:\dvppj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\406226.exec:\406226.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3500 -
\??\c:\600486.exec:\600486.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\dvvpj.exec:\dvvpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
\??\c:\jpvpp.exec:\jpvpp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\6004448.exec:\6004448.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\rlffffl.exec:\rlffffl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\86000.exec:\86000.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\bnnhhb.exec:\bnnhhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\jjpjj.exec:\jjpjj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\hbbbtb.exec:\hbbbtb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\84400.exec:\84400.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\28482.exec:\28482.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\04600.exec:\04600.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
\??\c:\680826.exec:\680826.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
\??\c:\dvjdd.exec:\dvjdd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\8626604.exec:\8626604.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\lfrfrlx.exec:\lfrfrlx.exe23⤵
- Executes dropped EXE
PID:1940 -
\??\c:\086242.exec:\086242.exe24⤵
- Executes dropped EXE
PID:1200 -
\??\c:\vddvp.exec:\vddvp.exe25⤵
- Executes dropped EXE
PID:4936 -
\??\c:\802266.exec:\802266.exe26⤵
- Executes dropped EXE
PID:3112 -
\??\c:\tbnbtn.exec:\tbnbtn.exe27⤵
- Executes dropped EXE
PID:1684 -
\??\c:\bnnnhb.exec:\bnnnhb.exe28⤵
- Executes dropped EXE
PID:780 -
\??\c:\xffxxxr.exec:\xffxxxr.exe29⤵
- Executes dropped EXE
PID:844 -
\??\c:\hbttth.exec:\hbttth.exe30⤵
- Executes dropped EXE
PID:1712 -
\??\c:\rrfxxxr.exec:\rrfxxxr.exe31⤵
- Executes dropped EXE
PID:2304 -
\??\c:\bnnhbb.exec:\bnnhbb.exe32⤵
- Executes dropped EXE
PID:3260 -
\??\c:\jpdvd.exec:\jpdvd.exe33⤵
- Executes dropped EXE
PID:4924 -
\??\c:\hhtnhh.exec:\hhtnhh.exe34⤵
- Executes dropped EXE
PID:1952 -
\??\c:\lxxxrrl.exec:\lxxxrrl.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920 -
\??\c:\e84826.exec:\e84826.exe36⤵
- Executes dropped EXE
PID:2916 -
\??\c:\xxfxllf.exec:\xxfxllf.exe37⤵
- Executes dropped EXE
PID:3632 -
\??\c:\nnttbt.exec:\nnttbt.exe38⤵
- Executes dropped EXE
PID:880 -
\??\c:\482264.exec:\482264.exe39⤵
- Executes dropped EXE
PID:1460 -
\??\c:\vjjdv.exec:\vjjdv.exe40⤵
- Executes dropped EXE
PID:2628 -
\??\c:\djpvp.exec:\djpvp.exe41⤵
- Executes dropped EXE
PID:4984 -
\??\c:\4028222.exec:\4028222.exe42⤵
- Executes dropped EXE
PID:4740 -
\??\c:\2244822.exec:\2244822.exe43⤵
- Executes dropped EXE
PID:624 -
\??\c:\thhhbb.exec:\thhhbb.exe44⤵
- Executes dropped EXE
PID:2640 -
\??\c:\84064.exec:\84064.exe45⤵
- Executes dropped EXE
PID:3684 -
\??\c:\bnnhtn.exec:\bnnhtn.exe46⤵
- Executes dropped EXE
PID:4840 -
\??\c:\u644448.exec:\u644448.exe47⤵
- Executes dropped EXE
PID:4916 -
\??\c:\vjppj.exec:\vjppj.exe48⤵
- Executes dropped EXE
PID:3660 -
\??\c:\26882.exec:\26882.exe49⤵
- Executes dropped EXE
PID:232 -
\??\c:\pdpjj.exec:\pdpjj.exe50⤵
- Executes dropped EXE
PID:2756 -
\??\c:\pvjvd.exec:\pvjvd.exe51⤵
- Executes dropped EXE
PID:760 -
\??\c:\xllfxxr.exec:\xllfxxr.exe52⤵
- Executes dropped EXE
PID:3616 -
\??\c:\6204866.exec:\6204866.exe53⤵
- Executes dropped EXE
PID:4768 -
\??\c:\jddvp.exec:\jddvp.exe54⤵
- Executes dropped EXE
PID:3644 -
\??\c:\044822.exec:\044822.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3540 -
\??\c:\frrlxxl.exec:\frrlxxl.exe56⤵
- Executes dropped EXE
PID:552 -
\??\c:\xrlxrlf.exec:\xrlxrlf.exe57⤵
- Executes dropped EXE
PID:4352 -
\??\c:\6048888.exec:\6048888.exe58⤵PID:1212
-
\??\c:\04666.exec:\04666.exe59⤵
- Executes dropped EXE
PID:1484 -
\??\c:\0626004.exec:\0626004.exe60⤵
- Executes dropped EXE
PID:1676 -
\??\c:\vpvpj.exec:\vpvpj.exe61⤵
- Executes dropped EXE
PID:2764 -
\??\c:\hhhbbt.exec:\hhhbbt.exe62⤵
- Executes dropped EXE
PID:4804 -
\??\c:\462200.exec:\462200.exe63⤵
- Executes dropped EXE
PID:4756 -
\??\c:\8288484.exec:\8288484.exe64⤵
- Executes dropped EXE
PID:4420 -
\??\c:\60482.exec:\60482.exe65⤵
- Executes dropped EXE
PID:2200 -
\??\c:\4262262.exec:\4262262.exe66⤵
- Executes dropped EXE
PID:2192 -
\??\c:\1dpvv.exec:\1dpvv.exe67⤵PID:3936
-
\??\c:\dppjd.exec:\dppjd.exe68⤵PID:4204
-
\??\c:\40260.exec:\40260.exe69⤵PID:4340
-
\??\c:\ddppv.exec:\ddppv.exe70⤵PID:4056
-
\??\c:\628422.exec:\628422.exe71⤵PID:3156
-
\??\c:\44664.exec:\44664.exe72⤵PID:3656
-
\??\c:\862048.exec:\862048.exe73⤵PID:3068
-
\??\c:\48004.exec:\48004.exe74⤵PID:5084
-
\??\c:\424888.exec:\424888.exe75⤵PID:1036
-
\??\c:\2642068.exec:\2642068.exe76⤵PID:2428
-
\??\c:\8226262.exec:\8226262.exe77⤵PID:1648
-
\??\c:\pjvdj.exec:\pjvdj.exe78⤵PID:4336
-
\??\c:\jjvpd.exec:\jjvpd.exe79⤵PID:5016
-
\??\c:\nthnnn.exec:\nthnnn.exe80⤵PID:208
-
\??\c:\bnbthh.exec:\bnbthh.exe81⤵PID:2244
-
\??\c:\thbthh.exec:\thbthh.exe82⤵PID:2016
-
\??\c:\22226.exec:\22226.exe83⤵PID:572
-
\??\c:\o626048.exec:\o626048.exe84⤵PID:3328
-
\??\c:\pdvjv.exec:\pdvjv.exe85⤵PID:4184
-
\??\c:\bbbbtt.exec:\bbbbtt.exe86⤵PID:3080
-
\??\c:\fxxrlll.exec:\fxxrlll.exe87⤵PID:4212
-
\??\c:\lrxrlll.exec:\lrxrlll.exe88⤵PID:4572
-
\??\c:\tbtnhh.exec:\tbtnhh.exe89⤵
- System Location Discovery: System Language Discovery
PID:636 -
\??\c:\044822.exec:\044822.exe90⤵PID:5040
-
\??\c:\dvvpj.exec:\dvvpj.exe91⤵PID:3384
-
\??\c:\880088.exec:\880088.exe92⤵PID:1416
-
\??\c:\hhhnbb.exec:\hhhnbb.exe93⤵PID:2272
-
\??\c:\dvvjj.exec:\dvvjj.exe94⤵PID:4952
-
\??\c:\lrrfxrf.exec:\lrrfxrf.exe95⤵PID:2280
-
\??\c:\26840.exec:\26840.exe96⤵PID:3120
-
\??\c:\nhhbnn.exec:\nhhbnn.exe97⤵PID:1532
-
\??\c:\400460.exec:\400460.exe98⤵PID:1004
-
\??\c:\htbthb.exec:\htbthb.exe99⤵PID:2820
-
\??\c:\5ttbnn.exec:\5ttbnn.exe100⤵PID:2864
-
\??\c:\pvpdp.exec:\pvpdp.exe101⤵PID:1176
-
\??\c:\2048204.exec:\2048204.exe102⤵PID:4440
-
\??\c:\xrfffxl.exec:\xrfffxl.exe103⤵PID:4820
-
\??\c:\jjjvj.exec:\jjjvj.exe104⤵PID:3196
-
\??\c:\080440.exec:\080440.exe105⤵PID:3668
-
\??\c:\666086.exec:\666086.exe106⤵PID:2656
-
\??\c:\44642.exec:\44642.exe107⤵PID:4676
-
\??\c:\8620208.exec:\8620208.exe108⤵PID:1064
-
\??\c:\6664426.exec:\6664426.exe109⤵PID:4744
-
\??\c:\lxrrfxl.exec:\lxrrfxl.exe110⤵PID:948
-
\??\c:\444204.exec:\444204.exe111⤵PID:4508
-
\??\c:\42682.exec:\42682.exe112⤵PID:3632
-
\??\c:\60480.exec:\60480.exe113⤵PID:880
-
\??\c:\80084.exec:\80084.exe114⤵PID:3716
-
\??\c:\666460.exec:\666460.exe115⤵PID:2628
-
\??\c:\ddddp.exec:\ddddp.exe116⤵PID:4984
-
\??\c:\k04208.exec:\k04208.exe117⤵PID:4740
-
\??\c:\6486820.exec:\6486820.exe118⤵PID:2204
-
\??\c:\6842046.exec:\6842046.exe119⤵PID:2640
-
\??\c:\jvpdj.exec:\jvpdj.exe120⤵PID:1900
-
\??\c:\vdvpj.exec:\vdvpj.exe121⤵PID:4484
-
\??\c:\q24260.exec:\q24260.exe122⤵PID:3064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-