Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 04:29
Behavioral task
behavioral1
Sample
373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe
-
Size
332KB
-
MD5
7f4296ed797775b852a1a0ab3b047a30
-
SHA1
36a4eb32effcdb6503dbe16ae03124a09df8840b
-
SHA256
373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43
-
SHA512
796e8ec7c5202387fcad44855531a568f141e6e207714bb5af53f52ea2595f29c5d78597e9ff05b6bc4e135de418e5209dc0ff1f2a37ea2af4729674f749a76e
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAbeH9:R4wFHoSHYHUrAwfMp3CDH9
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/1652-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2276-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3964-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2816-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3080-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2408-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4572-34-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/528-48-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4128-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/912-53-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/316-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1568-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4548-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-73-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2348-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4200-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3808-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1532-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2400-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2872-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3676-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1844-133-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1028-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5008-144-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1688-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2940-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1876-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2416-175-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2588-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3492-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1392-186-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4940-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1856-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4144-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4452-200-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4936-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2640-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3140-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2292-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5068-239-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4776-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1312-255-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3608-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1172-263-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2400-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2176-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3868-314-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2892-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3704-320-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4532-329-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2316-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2092-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/456-358-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3156-365-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2360-386-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3768-389-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2408-396-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3088-409-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4308-442-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4208-491-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4784-548-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3804-692-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4480-747-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1952-1316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1652 vpvpj.exe 2816 228802.exe 3964 462266.exe 3080 lflfllr.exe 2408 vjdvp.exe 4572 rrrfxxr.exe 2372 80228.exe 4128 4860888.exe 528 3nhbtb.exe 912 jdjjd.exe 316 bttbnh.exe 1568 xrlrrxl.exe 4548 40048.exe 1388 7nhbbh.exe 2348 vdvjp.exe 4200 ntthbt.exe 3808 22860.exe 4424 frlxlxr.exe 2116 0200440.exe 1532 nnnbnh.exe 2400 xrlxlxr.exe 1028 tbbtnn.exe 2872 pddvp.exe 1720 86282.exe 4652 pdddv.exe 3676 e06604.exe 1844 62824.exe 2044 280088.exe 5008 5fllrrx.exe 1688 684226.exe 2940 9tnnnn.exe 2824 6680884.exe 3344 60044.exe 1876 fxrxxll.exe 1440 hhtnnn.exe 3168 3xffxxr.exe 5112 q26446.exe 4656 0204068.exe 3216 nnnbtt.exe 2416 2866664.exe 2588 1bhbbb.exe 3492 dvvpd.exe 3576 60222.exe 1392 40226.exe 3308 62448.exe 4940 ppdvd.exe 1856 jvdvj.exe 4144 ffffxxx.exe 4452 hhnnhb.exe 4936 hbbbtb.exe 2640 jdjjp.exe 3140 w42228.exe 1648 lllffff.exe 4336 nbtttb.exe 1340 dpvvv.exe 3192 ttbtnn.exe 1404 dddvv.exe 2292 604888.exe 4572 840444.exe 1852 9rfxrrl.exe 2372 08688.exe 1524 rrfrlrr.exe 528 84040.exe 1136 26622.exe -
resource yara_rule behavioral2/memory/2276-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000b000000023b3c-3.dat upx behavioral2/memory/1652-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2276-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b40-9.dat upx behavioral2/files/0x000a000000023b41-11.dat upx behavioral2/memory/3964-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2816-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b42-19.dat upx behavioral2/files/0x000a000000023b43-23.dat upx behavioral2/memory/3080-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b44-29.dat upx behavioral2/memory/2408-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b45-33.dat upx behavioral2/memory/4572-34-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b46-38.dat upx behavioral2/files/0x000a000000023b47-42.dat upx behavioral2/memory/528-45-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b48-49.dat upx behavioral2/memory/528-48-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4128-44-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/912-53-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b49-55.dat upx behavioral2/memory/316-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b4a-60.dat upx behavioral2/files/0x000b000000023b3d-64.dat upx behavioral2/memory/1568-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b4b-69.dat upx behavioral2/memory/4548-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b4d-74.dat upx behavioral2/memory/1388-73-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b4e-79.dat upx behavioral2/memory/2348-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4200-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b4f-84.dat upx behavioral2/files/0x000a000000023b50-89.dat upx behavioral2/memory/3808-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b51-94.dat upx behavioral2/files/0x000a000000023b52-97.dat upx behavioral2/files/0x000a000000023b53-102.dat upx behavioral2/memory/1532-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b54-106.dat upx behavioral2/memory/2400-108-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b55-112.dat upx behavioral2/memory/2872-116-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b56-118.dat upx behavioral2/memory/3676-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1844-133-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b59-130.dat upx behavioral2/files/0x000a000000023b58-125.dat upx behavioral2/files/0x000a000000023b5a-135.dat upx behavioral2/files/0x000a000000023b57-122.dat upx behavioral2/memory/1028-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b5b-138.dat upx behavioral2/files/0x0031000000023b5c-143.dat upx behavioral2/memory/5008-144-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0031000000023b5d-149.dat upx behavioral2/memory/1688-148-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2940-153-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5e-155.dat upx behavioral2/memory/1876-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2416-175-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2588-178-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3492-181-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ttnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2240448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6406644.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o466668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bhtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6864888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bbhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxflrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2048260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2020404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4260864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnbt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1652 2276 373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe 83 PID 2276 wrote to memory of 1652 2276 373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe 83 PID 2276 wrote to memory of 1652 2276 373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe 83 PID 1652 wrote to memory of 2816 1652 vpvpj.exe 84 PID 1652 wrote to memory of 2816 1652 vpvpj.exe 84 PID 1652 wrote to memory of 2816 1652 vpvpj.exe 84 PID 2816 wrote to memory of 3964 2816 228802.exe 85 PID 2816 wrote to memory of 3964 2816 228802.exe 85 PID 2816 wrote to memory of 3964 2816 228802.exe 85 PID 3964 wrote to memory of 3080 3964 462266.exe 86 PID 3964 wrote to memory of 3080 3964 462266.exe 86 PID 3964 wrote to memory of 3080 3964 462266.exe 86 PID 3080 wrote to memory of 2408 3080 lflfllr.exe 87 PID 3080 wrote to memory of 2408 3080 lflfllr.exe 87 PID 3080 wrote to memory of 2408 3080 lflfllr.exe 87 PID 2408 wrote to memory of 4572 2408 vjdvp.exe 88 PID 2408 wrote to memory of 4572 2408 vjdvp.exe 88 PID 2408 wrote to memory of 4572 2408 vjdvp.exe 88 PID 4572 wrote to memory of 2372 4572 rrrfxxr.exe 89 PID 4572 wrote to memory of 2372 4572 rrrfxxr.exe 89 PID 4572 wrote to memory of 2372 4572 rrrfxxr.exe 89 PID 2372 wrote to memory of 4128 2372 80228.exe 90 PID 2372 wrote to memory of 4128 2372 80228.exe 90 PID 2372 wrote to memory of 4128 2372 80228.exe 90 PID 4128 wrote to memory of 528 4128 4860888.exe 91 PID 4128 wrote to memory of 528 4128 4860888.exe 91 PID 4128 wrote to memory of 528 4128 4860888.exe 91 PID 528 wrote to memory of 912 528 3nhbtb.exe 92 PID 528 wrote to memory of 912 528 3nhbtb.exe 92 PID 528 wrote to memory of 912 528 3nhbtb.exe 92 PID 912 wrote to memory of 316 912 jdjjd.exe 93 PID 912 wrote to memory of 316 912 jdjjd.exe 93 PID 912 wrote to memory of 316 912 jdjjd.exe 93 PID 316 wrote to memory of 1568 316 bttbnh.exe 94 PID 316 wrote to memory of 1568 316 bttbnh.exe 94 PID 316 wrote to memory of 1568 316 bttbnh.exe 94 PID 1568 wrote to memory of 4548 1568 xrlrrxl.exe 95 PID 1568 wrote to memory of 4548 1568 xrlrrxl.exe 95 PID 1568 wrote to memory of 4548 1568 xrlrrxl.exe 95 PID 4548 wrote to memory of 1388 4548 40048.exe 96 PID 4548 wrote to memory of 1388 4548 40048.exe 96 PID 4548 wrote to memory of 1388 4548 40048.exe 96 PID 1388 wrote to memory of 2348 1388 7nhbbh.exe 97 PID 1388 wrote to memory of 2348 1388 7nhbbh.exe 97 PID 1388 wrote to memory of 2348 1388 7nhbbh.exe 97 PID 2348 wrote to memory of 4200 2348 vdvjp.exe 98 PID 2348 wrote to memory of 4200 2348 vdvjp.exe 98 PID 2348 wrote to memory of 4200 2348 vdvjp.exe 98 PID 4200 wrote to memory of 3808 4200 ntthbt.exe 99 PID 4200 wrote to memory of 3808 4200 ntthbt.exe 99 PID 4200 wrote to memory of 3808 4200 ntthbt.exe 99 PID 3808 wrote to memory of 4424 3808 22860.exe 100 PID 3808 wrote to memory of 4424 3808 22860.exe 100 PID 3808 wrote to memory of 4424 3808 22860.exe 100 PID 4424 wrote to memory of 2116 4424 frlxlxr.exe 101 PID 4424 wrote to memory of 2116 4424 frlxlxr.exe 101 PID 4424 wrote to memory of 2116 4424 frlxlxr.exe 101 PID 2116 wrote to memory of 1532 2116 0200440.exe 102 PID 2116 wrote to memory of 1532 2116 0200440.exe 102 PID 2116 wrote to memory of 1532 2116 0200440.exe 102 PID 1532 wrote to memory of 2400 1532 nnnbnh.exe 103 PID 1532 wrote to memory of 2400 1532 nnnbnh.exe 103 PID 1532 wrote to memory of 2400 1532 nnnbnh.exe 103 PID 2400 wrote to memory of 1028 2400 xrlxlxr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe"C:\Users\Admin\AppData\Local\Temp\373c8790ab47d0db98fa504889ebdac29b6c46db05c1b1fba9211e913c95dd43N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\vpvpj.exec:\vpvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\228802.exec:\228802.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\462266.exec:\462266.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\lflfllr.exec:\lflfllr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\vjdvp.exec:\vjdvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\rrrfxxr.exec:\rrrfxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\80228.exec:\80228.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\4860888.exec:\4860888.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
\??\c:\3nhbtb.exec:\3nhbtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
\??\c:\jdjjd.exec:\jdjjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
\??\c:\bttbnh.exec:\bttbnh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\xrlrrxl.exec:\xrlrrxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
\??\c:\40048.exec:\40048.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
\??\c:\7nhbbh.exec:\7nhbbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\vdvjp.exec:\vdvjp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\ntthbt.exec:\ntthbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\22860.exec:\22860.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\frlxlxr.exec:\frlxlxr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\0200440.exec:\0200440.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\nnnbnh.exec:\nnnbnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\xrlxlxr.exec:\xrlxlxr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\tbbtnn.exec:\tbbtnn.exe23⤵
- Executes dropped EXE
PID:1028 -
\??\c:\pddvp.exec:\pddvp.exe24⤵
- Executes dropped EXE
PID:2872 -
\??\c:\86282.exec:\86282.exe25⤵
- Executes dropped EXE
PID:1720 -
\??\c:\pdddv.exec:\pdddv.exe26⤵
- Executes dropped EXE
PID:4652 -
\??\c:\e06604.exec:\e06604.exe27⤵
- Executes dropped EXE
PID:3676 -
\??\c:\62824.exec:\62824.exe28⤵
- Executes dropped EXE
PID:1844 -
\??\c:\280088.exec:\280088.exe29⤵
- Executes dropped EXE
PID:2044 -
\??\c:\5fllrrx.exec:\5fllrrx.exe30⤵
- Executes dropped EXE
PID:5008 -
\??\c:\684226.exec:\684226.exe31⤵
- Executes dropped EXE
PID:1688 -
\??\c:\9tnnnn.exec:\9tnnnn.exe32⤵
- Executes dropped EXE
PID:2940 -
\??\c:\6680884.exec:\6680884.exe33⤵
- Executes dropped EXE
PID:2824 -
\??\c:\60044.exec:\60044.exe34⤵
- Executes dropped EXE
PID:3344 -
\??\c:\fxrxxll.exec:\fxrxxll.exe35⤵
- Executes dropped EXE
PID:1876 -
\??\c:\hhtnnn.exec:\hhtnnn.exe36⤵
- Executes dropped EXE
PID:1440 -
\??\c:\3xffxxr.exec:\3xffxxr.exe37⤵
- Executes dropped EXE
PID:3168 -
\??\c:\q26446.exec:\q26446.exe38⤵
- Executes dropped EXE
PID:5112 -
\??\c:\0204068.exec:\0204068.exe39⤵
- Executes dropped EXE
PID:4656 -
\??\c:\nnnbtt.exec:\nnnbtt.exe40⤵
- Executes dropped EXE
PID:3216 -
\??\c:\2866664.exec:\2866664.exe41⤵
- Executes dropped EXE
PID:2416 -
\??\c:\1bhbbb.exec:\1bhbbb.exe42⤵
- Executes dropped EXE
PID:2588 -
\??\c:\dvvpd.exec:\dvvpd.exe43⤵
- Executes dropped EXE
PID:3492 -
\??\c:\60222.exec:\60222.exe44⤵
- Executes dropped EXE
PID:3576 -
\??\c:\40226.exec:\40226.exe45⤵
- Executes dropped EXE
PID:1392 -
\??\c:\62448.exec:\62448.exe46⤵
- Executes dropped EXE
PID:3308 -
\??\c:\ppdvd.exec:\ppdvd.exe47⤵
- Executes dropped EXE
PID:4940 -
\??\c:\jvdvj.exec:\jvdvj.exe48⤵
- Executes dropped EXE
PID:1856 -
\??\c:\ffffxxx.exec:\ffffxxx.exe49⤵
- Executes dropped EXE
PID:4144 -
\??\c:\hhnnhb.exec:\hhnnhb.exe50⤵
- Executes dropped EXE
PID:4452 -
\??\c:\hbbbtb.exec:\hbbbtb.exe51⤵
- Executes dropped EXE
PID:4936 -
\??\c:\jdjjp.exec:\jdjjp.exe52⤵
- Executes dropped EXE
PID:2640 -
\??\c:\w42228.exec:\w42228.exe53⤵
- Executes dropped EXE
PID:3140 -
\??\c:\lllffff.exec:\lllffff.exe54⤵
- Executes dropped EXE
PID:1648 -
\??\c:\nbtttb.exec:\nbtttb.exe55⤵
- Executes dropped EXE
PID:4336 -
\??\c:\dpvvv.exec:\dpvvv.exe56⤵
- Executes dropped EXE
PID:1340 -
\??\c:\ttbtnn.exec:\ttbtnn.exe57⤵
- Executes dropped EXE
PID:3192 -
\??\c:\dddvv.exec:\dddvv.exe58⤵
- Executes dropped EXE
PID:1404 -
\??\c:\604888.exec:\604888.exe59⤵
- Executes dropped EXE
PID:2292 -
\??\c:\840444.exec:\840444.exe60⤵
- Executes dropped EXE
PID:4572 -
\??\c:\9rfxrrl.exec:\9rfxrrl.exe61⤵
- Executes dropped EXE
PID:1852 -
\??\c:\08688.exec:\08688.exe62⤵
- Executes dropped EXE
PID:2372 -
\??\c:\rrfrlrr.exec:\rrfrlrr.exe63⤵
- Executes dropped EXE
PID:1524 -
\??\c:\84040.exec:\84040.exe64⤵
- Executes dropped EXE
PID:528 -
\??\c:\26622.exec:\26622.exe65⤵
- Executes dropped EXE
PID:1136 -
\??\c:\7ffrlff.exec:\7ffrlff.exe66⤵PID:4512
-
\??\c:\djjdj.exec:\djjdj.exe67⤵PID:5068
-
\??\c:\8248888.exec:\8248888.exe68⤵PID:2004
-
\??\c:\dpvpj.exec:\dpvpj.exe69⤵PID:1568
-
\??\c:\xrllllr.exec:\xrllllr.exe70⤵PID:4776
-
\??\c:\86884.exec:\86884.exe71⤵PID:1176
-
\??\c:\000444.exec:\000444.exe72⤵PID:1388
-
\??\c:\1hnhbb.exec:\1hnhbb.exe73⤵PID:5032
-
\??\c:\ffrrxll.exec:\ffrrxll.exe74⤵PID:1312
-
\??\c:\6848822.exec:\6848822.exe75⤵PID:3040
-
\??\c:\3nttnt.exec:\3nttnt.exe76⤵PID:3608
-
\??\c:\60660.exec:\60660.exe77⤵PID:1172
-
\??\c:\lfrlxrl.exec:\lfrlxrl.exe78⤵PID:4424
-
\??\c:\frxfffx.exec:\frxfffx.exe79⤵PID:1096
-
\??\c:\ppjpd.exec:\ppjpd.exe80⤵PID:5028
-
\??\c:\hbhttt.exec:\hbhttt.exe81⤵PID:1532
-
\??\c:\lxxxrxx.exec:\lxxxrxx.exe82⤵PID:2400
-
\??\c:\jddpp.exec:\jddpp.exe83⤵PID:3376
-
\??\c:\vpjdp.exec:\vpjdp.exe84⤵PID:4748
-
\??\c:\hbtbtn.exec:\hbtbtn.exe85⤵PID:2176
-
\??\c:\djpdv.exec:\djpdv.exe86⤵PID:748
-
\??\c:\xrxlrll.exec:\xrxlrll.exe87⤵PID:4888
-
\??\c:\btbbtb.exec:\btbbtb.exe88⤵PID:1520
-
\??\c:\q66822.exec:\q66822.exe89⤵PID:916
-
\??\c:\bhhbht.exec:\bhhbht.exe90⤵PID:4724
-
\??\c:\jdjdp.exec:\jdjdp.exe91⤵PID:1304
-
\??\c:\040006.exec:\040006.exe92⤵PID:3184
-
\??\c:\nbnnhh.exec:\nbnnhh.exe93⤵PID:3312
-
\??\c:\ffxxrxr.exec:\ffxxrxr.exe94⤵PID:4984
-
\??\c:\rrxxffl.exec:\rrxxffl.exe95⤵PID:1688
-
\??\c:\9pvpj.exec:\9pvpj.exe96⤵PID:4712
-
\??\c:\80266.exec:\80266.exe97⤵PID:4836
-
\??\c:\q46600.exec:\q46600.exe98⤵PID:3012
-
\??\c:\086662.exec:\086662.exe99⤵PID:3344
-
\??\c:\lflfllr.exec:\lflfllr.exe100⤵PID:1040
-
\??\c:\5xffxxr.exec:\5xffxxr.exe101⤵PID:3868
-
\??\c:\s8482.exec:\s8482.exe102⤵PID:2892
-
\??\c:\g8646.exec:\g8646.exe103⤵PID:3704
-
\??\c:\1rxrlfx.exec:\1rxrlfx.exe104⤵PID:4656
-
\??\c:\8648248.exec:\8648248.exe105⤵PID:1664
-
\??\c:\hnbbhn.exec:\hnbbhn.exe106⤵PID:2820
-
\??\c:\e66082.exec:\e66082.exe107⤵PID:4532
-
\??\c:\pdpdp.exec:\pdpdp.exe108⤵PID:4428
-
\??\c:\60826.exec:\60826.exe109⤵PID:2316
-
\??\c:\2226046.exec:\2226046.exe110⤵PID:2900
-
\??\c:\rfxxrxx.exec:\rfxxrxx.exe111⤵PID:1984
-
\??\c:\nnthtb.exec:\nnthtb.exe112⤵PID:4940
-
\??\c:\nhhbtt.exec:\nhhbtt.exe113⤵PID:2092
-
\??\c:\828288.exec:\828288.exe114⤵PID:4368
-
\??\c:\9ppdj.exec:\9ppdj.exe115⤵PID:3936
-
\??\c:\ntnhnn.exec:\ntnhnn.exe116⤵PID:516
-
\??\c:\0804822.exec:\0804822.exe117⤵PID:976
-
\??\c:\w44886.exec:\w44886.exe118⤵PID:3452
-
\??\c:\64802.exec:\64802.exe119⤵
- System Location Discovery: System Language Discovery
PID:2816 -
\??\c:\rlrlxrf.exec:\rlrlxrf.exe120⤵PID:456
-
\??\c:\3tbhhn.exec:\3tbhhn.exe121⤵PID:2804
-
\??\c:\jvpjv.exec:\jvpjv.exe122⤵PID:2628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-