Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 07:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe
Resource
win7-20241023-en
windows7-x64
7 signatures
150 seconds
General
-
Target
f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe
-
Size
455KB
-
MD5
0c29db0183e54122832b7c4c5ed874d9
-
SHA1
5c7086f2aac8c12a47809cded31bf27943a735b1
-
SHA256
f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82
-
SHA512
5b9407bb99383c30e725a52be81f5a0b93a86089158f34b0938e237383e3568b99f22470dd166c58d1e639b09d150806de6c4eacec7a20b30de382e1ee43048c
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeTY:q7Tc2NYHUrAwfMp3CDs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/1296-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1016-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1096-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2776-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3552-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2040-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4192-53-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2904-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1228-71-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1164-84-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5088-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2540-106-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4636-81-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3228-112-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1584-121-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2468-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4424-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4740-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1580-147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1480-152-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3928-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/384-174-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1944-180-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1804-188-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4872-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2484-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1700-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5048-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4708-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4432-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4312-232-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1860-261-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4016-275-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4468-291-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4048-301-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1988-305-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2200-324-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2676-343-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2924-362-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/512-375-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1392-382-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4184-386-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5008-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1148-425-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4748-435-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-439-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4156-467-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5108-474-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/664-478-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4492-524-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3132-528-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2624-547-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3968-569-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4004-615-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4868-631-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1968-644-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1580-694-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2676-698-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4040-937-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1116-977-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2896-990-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3116-1870-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1016 flxrfff.exe 1096 e88262.exe 552 84682.exe 2776 rrlrffx.exe 3552 24606.exe 2040 ffrrrxx.exe 3048 lrxfxlr.exe 504 628882.exe 4192 82642.exe 3596 00844.exe 2904 lxrfxfx.exe 1228 24444.exe 4636 nnbnnb.exe 1164 rxlxfxf.exe 4376 3vjvv.exe 5088 vppvv.exe 2540 3tthhh.exe 3228 vvjjp.exe 1460 dvvjv.exe 1584 0600048.exe 2468 jvdvp.exe 4740 8028288.exe 4424 86248.exe 1580 88848.exe 1480 pddpv.exe 3928 xrfrrxx.exe 2892 8628844.exe 5056 hhnhth.exe 384 hhnhbn.exe 1944 nhhhnt.exe 1804 44844.exe 2724 62626.exe 1352 5rxxllr.exe 4872 hthnnn.exe 2484 i482442.exe 1268 xllfrrf.exe 1700 fffxllf.exe 5048 8488282.exe 4708 0048048.exe 4432 hnbtnh.exe 1456 4622284.exe 2852 8646644.exe 4256 xxlllrf.exe 4312 jppdp.exe 1148 1ttntt.exe 5068 606606.exe 4948 g4844.exe 4992 htbtnh.exe 2152 lllrflr.exe 2776 5djpv.exe 5060 jjvpd.exe 3688 82064.exe 1860 hhhhnt.exe 1080 466442.exe 3516 xrllllx.exe 3336 220864.exe 4016 hhhnhh.exe 2856 20600.exe 3844 vjjjj.exe 4860 668806.exe 3932 ffrrxll.exe 4468 hnnbnt.exe 1532 24000.exe 3900 o206080.exe -
resource yara_rule behavioral2/memory/1296-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1096-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2776-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3552-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3552-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2040-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4192-53-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2904-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4636-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1228-71-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1164-84-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5088-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2540-106-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4636-81-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3228-112-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1584-121-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2468-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4424-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4740-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1580-147-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1480-152-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3928-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/384-174-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1944-180-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1804-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2724-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4872-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2484-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1700-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5048-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4708-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4432-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4312-232-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1860-261-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1080-259-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3516-265-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4016-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4468-291-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4048-301-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1988-305-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2200-324-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2676-343-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2924-362-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/512-375-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1392-382-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4184-386-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5008-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1148-425-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4748-435-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-439-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4156-467-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-474-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/664-478-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4492-524-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3132-528-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2624-547-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3968-569-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-615-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4868-631-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1968-644-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1580-694-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2676-698-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8208048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6064800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2048602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m4244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6008204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8608062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfxlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nntnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3frflfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 628042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfffxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8602482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o206080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k20022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bbthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffrlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 844688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrflfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 220864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0626646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrfrrxx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1016 1296 f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe 85 PID 1296 wrote to memory of 1016 1296 f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe 85 PID 1296 wrote to memory of 1016 1296 f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe 85 PID 1016 wrote to memory of 1096 1016 flxrfff.exe 86 PID 1016 wrote to memory of 1096 1016 flxrfff.exe 86 PID 1016 wrote to memory of 1096 1016 flxrfff.exe 86 PID 1096 wrote to memory of 552 1096 e88262.exe 87 PID 1096 wrote to memory of 552 1096 e88262.exe 87 PID 1096 wrote to memory of 552 1096 e88262.exe 87 PID 552 wrote to memory of 2776 552 84682.exe 88 PID 552 wrote to memory of 2776 552 84682.exe 88 PID 552 wrote to memory of 2776 552 84682.exe 88 PID 2776 wrote to memory of 3552 2776 rrlrffx.exe 89 PID 2776 wrote to memory of 3552 2776 rrlrffx.exe 89 PID 2776 wrote to memory of 3552 2776 rrlrffx.exe 89 PID 3552 wrote to memory of 2040 3552 24606.exe 90 PID 3552 wrote to memory of 2040 3552 24606.exe 90 PID 3552 wrote to memory of 2040 3552 24606.exe 90 PID 2040 wrote to memory of 3048 2040 ffrrrxx.exe 91 PID 2040 wrote to memory of 3048 2040 ffrrrxx.exe 91 PID 2040 wrote to memory of 3048 2040 ffrrrxx.exe 91 PID 3048 wrote to memory of 504 3048 lrxfxlr.exe 92 PID 3048 wrote to memory of 504 3048 lrxfxlr.exe 92 PID 3048 wrote to memory of 504 3048 lrxfxlr.exe 92 PID 504 wrote to memory of 4192 504 628882.exe 93 PID 504 wrote to memory of 4192 504 628882.exe 93 PID 504 wrote to memory of 4192 504 628882.exe 93 PID 4192 wrote to memory of 3596 4192 82642.exe 94 PID 4192 wrote to memory of 3596 4192 82642.exe 94 PID 4192 wrote to memory of 3596 4192 82642.exe 94 PID 3596 wrote to memory of 2904 3596 00844.exe 95 PID 3596 wrote to memory of 2904 3596 00844.exe 95 PID 3596 wrote to memory of 2904 3596 00844.exe 95 PID 2904 wrote to memory of 1228 2904 lxrfxfx.exe 96 PID 2904 wrote to memory of 1228 2904 lxrfxfx.exe 96 PID 2904 wrote to memory of 1228 2904 lxrfxfx.exe 96 PID 1228 wrote to memory of 4636 1228 24444.exe 97 PID 1228 wrote to memory of 4636 1228 24444.exe 97 PID 1228 wrote to memory of 4636 1228 24444.exe 97 PID 4636 wrote to memory of 1164 4636 nnbnnb.exe 98 PID 4636 wrote to memory of 1164 4636 nnbnnb.exe 98 PID 4636 wrote to memory of 1164 4636 nnbnnb.exe 98 PID 1164 wrote to memory of 4376 1164 rxlxfxf.exe 99 PID 1164 wrote to memory of 4376 1164 rxlxfxf.exe 99 PID 1164 wrote to memory of 4376 1164 rxlxfxf.exe 99 PID 4376 wrote to memory of 5088 4376 3vjvv.exe 100 PID 4376 wrote to memory of 5088 4376 3vjvv.exe 100 PID 4376 wrote to memory of 5088 4376 3vjvv.exe 100 PID 5088 wrote to memory of 2540 5088 vppvv.exe 101 PID 5088 wrote to memory of 2540 5088 vppvv.exe 101 PID 5088 wrote to memory of 2540 5088 vppvv.exe 101 PID 2540 wrote to memory of 3228 2540 3tthhh.exe 102 PID 2540 wrote to memory of 3228 2540 3tthhh.exe 102 PID 2540 wrote to memory of 3228 2540 3tthhh.exe 102 PID 3228 wrote to memory of 1460 3228 vvjjp.exe 103 PID 3228 wrote to memory of 1460 3228 vvjjp.exe 103 PID 3228 wrote to memory of 1460 3228 vvjjp.exe 103 PID 1460 wrote to memory of 1584 1460 dvvjv.exe 104 PID 1460 wrote to memory of 1584 1460 dvvjv.exe 104 PID 1460 wrote to memory of 1584 1460 dvvjv.exe 104 PID 1584 wrote to memory of 2468 1584 0600048.exe 105 PID 1584 wrote to memory of 2468 1584 0600048.exe 105 PID 1584 wrote to memory of 2468 1584 0600048.exe 105 PID 2468 wrote to memory of 4740 2468 jvdvp.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe"C:\Users\Admin\AppData\Local\Temp\f70165bd20574786f3ec6bc53cbb503e5fb3015a89dafd05592913b55b240a82.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\flxrfff.exec:\flxrfff.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\e88262.exec:\e88262.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\84682.exec:\84682.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\rrlrffx.exec:\rrlrffx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\24606.exec:\24606.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
\??\c:\ffrrrxx.exec:\ffrrrxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\lrxfxlr.exec:\lrxfxlr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\628882.exec:\628882.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:504 -
\??\c:\82642.exec:\82642.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\00844.exec:\00844.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
\??\c:\lxrfxfx.exec:\lxrfxfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\24444.exec:\24444.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
\??\c:\nnbnnb.exec:\nnbnnb.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\rxlxfxf.exec:\rxlxfxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\3vjvv.exec:\3vjvv.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\vppvv.exec:\vppvv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
\??\c:\3tthhh.exec:\3tthhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\vvjjp.exec:\vvjjp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
\??\c:\dvvjv.exec:\dvvjv.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\0600048.exec:\0600048.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\jvdvp.exec:\jvdvp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\8028288.exec:\8028288.exe23⤵
- Executes dropped EXE
PID:4740 -
\??\c:\86248.exec:\86248.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4424 -
\??\c:\88848.exec:\88848.exe25⤵
- Executes dropped EXE
PID:1580 -
\??\c:\pddpv.exec:\pddpv.exe26⤵
- Executes dropped EXE
PID:1480 -
\??\c:\xrfrrxx.exec:\xrfrrxx.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3928 -
\??\c:\8628844.exec:\8628844.exe28⤵
- Executes dropped EXE
PID:2892 -
\??\c:\hhnhth.exec:\hhnhth.exe29⤵
- Executes dropped EXE
PID:5056 -
\??\c:\hhnhbn.exec:\hhnhbn.exe30⤵
- Executes dropped EXE
PID:384 -
\??\c:\nhhhnt.exec:\nhhhnt.exe31⤵
- Executes dropped EXE
PID:1944 -
\??\c:\44844.exec:\44844.exe32⤵
- Executes dropped EXE
PID:1804 -
\??\c:\62626.exec:\62626.exe33⤵
- Executes dropped EXE
PID:2724 -
\??\c:\5rxxllr.exec:\5rxxllr.exe34⤵
- Executes dropped EXE
PID:1352 -
\??\c:\hthnnn.exec:\hthnnn.exe35⤵
- Executes dropped EXE
PID:4872 -
\??\c:\i482442.exec:\i482442.exe36⤵
- Executes dropped EXE
PID:2484 -
\??\c:\xllfrrf.exec:\xllfrrf.exe37⤵
- Executes dropped EXE
PID:1268 -
\??\c:\fffxllf.exec:\fffxllf.exe38⤵
- Executes dropped EXE
PID:1700 -
\??\c:\8488282.exec:\8488282.exe39⤵
- Executes dropped EXE
PID:5048 -
\??\c:\0048048.exec:\0048048.exe40⤵
- Executes dropped EXE
PID:4708 -
\??\c:\hnbtnh.exec:\hnbtnh.exe41⤵
- Executes dropped EXE
PID:4432 -
\??\c:\4622284.exec:\4622284.exe42⤵
- Executes dropped EXE
PID:1456 -
\??\c:\8646644.exec:\8646644.exe43⤵
- Executes dropped EXE
PID:2852 -
\??\c:\xxlllrf.exec:\xxlllrf.exe44⤵
- Executes dropped EXE
PID:4256 -
\??\c:\jppdp.exec:\jppdp.exe45⤵
- Executes dropped EXE
PID:4312 -
\??\c:\1ttntt.exec:\1ttntt.exe46⤵
- Executes dropped EXE
PID:1148 -
\??\c:\606606.exec:\606606.exe47⤵
- Executes dropped EXE
PID:5068 -
\??\c:\g4844.exec:\g4844.exe48⤵
- Executes dropped EXE
PID:4948 -
\??\c:\htbtnh.exec:\htbtnh.exe49⤵
- Executes dropped EXE
PID:4992 -
\??\c:\lllrflr.exec:\lllrflr.exe50⤵
- Executes dropped EXE
PID:2152 -
\??\c:\5djpv.exec:\5djpv.exe51⤵
- Executes dropped EXE
PID:2776 -
\??\c:\jjvpd.exec:\jjvpd.exe52⤵
- Executes dropped EXE
PID:5060 -
\??\c:\82064.exec:\82064.exe53⤵
- Executes dropped EXE
PID:3688 -
\??\c:\hhhhnt.exec:\hhhhnt.exe54⤵
- Executes dropped EXE
PID:1860 -
\??\c:\466442.exec:\466442.exe55⤵
- Executes dropped EXE
PID:1080 -
\??\c:\xrllllx.exec:\xrllllx.exe56⤵
- Executes dropped EXE
PID:3516 -
\??\c:\220864.exec:\220864.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3336 -
\??\c:\hhhnhh.exec:\hhhnhh.exe58⤵
- Executes dropped EXE
PID:4016 -
\??\c:\20600.exec:\20600.exe59⤵
- Executes dropped EXE
PID:2856 -
\??\c:\vjjjj.exec:\vjjjj.exe60⤵
- Executes dropped EXE
PID:3844 -
\??\c:\668806.exec:\668806.exe61⤵
- Executes dropped EXE
PID:4860 -
\??\c:\ffrrxll.exec:\ffrrxll.exe62⤵
- Executes dropped EXE
PID:3932 -
\??\c:\hnnbnt.exec:\hnnbnt.exe63⤵
- Executes dropped EXE
PID:4468 -
\??\c:\24000.exec:\24000.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\o206080.exec:\o206080.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3900 -
\??\c:\20228.exec:\20228.exe66⤵PID:4048
-
\??\c:\jddjd.exec:\jddjd.exe67⤵PID:1988
-
\??\c:\nthhth.exec:\nthhth.exe68⤵PID:856
-
\??\c:\u822046.exec:\u822046.exe69⤵PID:3232
-
\??\c:\bbhhtt.exec:\bbhhtt.exe70⤵PID:224
-
\??\c:\jddvd.exec:\jddvd.exe71⤵PID:4660
-
\??\c:\8282406.exec:\8282406.exe72⤵PID:3228
-
\??\c:\624668.exec:\624668.exe73⤵PID:2200
-
\??\c:\ddvpp.exec:\ddvpp.exe74⤵PID:232
-
\??\c:\btnbhh.exec:\btnbhh.exe75⤵PID:3012
-
\??\c:\fllrrlr.exec:\fllrrlr.exe76⤵PID:1544
-
\??\c:\pvvvj.exec:\pvvvj.exe77⤵PID:4924
-
\??\c:\024248.exec:\024248.exe78⤵PID:4424
-
\??\c:\e08222.exec:\e08222.exe79⤵PID:2676
-
\??\c:\vvjpd.exec:\vvjpd.exe80⤵PID:1064
-
\??\c:\480442.exec:\480442.exe81⤵PID:4892
-
\??\c:\rrxxxxx.exec:\rrxxxxx.exe82⤵PID:1868
-
\??\c:\s4666.exec:\s4666.exe83⤵PID:4680
-
\??\c:\nhbtbh.exec:\nhbtbh.exe84⤵PID:4812
-
\??\c:\648844.exec:\648844.exe85⤵PID:2924
-
\??\c:\88866.exec:\88866.exe86⤵PID:3940
-
\??\c:\228008.exec:\228008.exe87⤵PID:1736
-
\??\c:\0064480.exec:\0064480.exe88⤵PID:1588
-
\??\c:\frrrlll.exec:\frrrlll.exe89⤵PID:512
-
\??\c:\88864.exec:\88864.exe90⤵PID:4624
-
\??\c:\9frrxfr.exec:\9frrxfr.exe91⤵PID:1392
-
\??\c:\ddjjp.exec:\ddjjp.exe92⤵PID:4184
-
\??\c:\9pppj.exec:\9pppj.exe93⤵
- System Location Discovery: System Language Discovery
PID:1928 -
\??\c:\ffxfrff.exec:\ffxfrff.exe94⤵PID:2484
-
\??\c:\ntttbh.exec:\ntttbh.exe95⤵PID:2044
-
\??\c:\2204406.exec:\2204406.exe96⤵PID:4816
-
\??\c:\u266606.exec:\u266606.exe97⤵PID:4712
-
\??\c:\22066.exec:\22066.exe98⤵PID:5008
-
\??\c:\6600802.exec:\6600802.exe99⤵PID:3128
-
\??\c:\xrxflrx.exec:\xrxflrx.exe100⤵PID:2736
-
\??\c:\nnttnn.exec:\nnttnn.exe101⤵PID:4328
-
\??\c:\dpppp.exec:\dpppp.exe102⤵PID:4340
-
\??\c:\tttthn.exec:\tttthn.exe103⤵PID:2352
-
\??\c:\lfxrrrr.exec:\lfxrrrr.exe104⤵PID:1148
-
\??\c:\u462228.exec:\u462228.exe105⤵PID:4004
-
\??\c:\bhtttt.exec:\bhtttt.exe106⤵PID:3616
-
\??\c:\20804.exec:\20804.exe107⤵PID:4748
-
\??\c:\tbnnbn.exec:\tbnnbn.exe108⤵PID:552
-
\??\c:\0626646.exec:\0626646.exe109⤵
- System Location Discovery: System Language Discovery
PID:4036 -
\??\c:\668440.exec:\668440.exe110⤵PID:3688
-
\??\c:\0688444.exec:\0688444.exe111⤵PID:3024
-
\??\c:\8660888.exec:\8660888.exe112⤵PID:3792
-
\??\c:\884800.exec:\884800.exe113⤵PID:4248
-
\??\c:\dpppp.exec:\dpppp.exe114⤵PID:1080
-
\??\c:\008440.exec:\008440.exe115⤵PID:3516
-
\??\c:\86862.exec:\86862.exe116⤵PID:3336
-
\??\c:\bbhtbn.exec:\bbhtbn.exe117⤵PID:4156
-
\??\c:\66222.exec:\66222.exe118⤵PID:4068
-
\??\c:\nbhhnn.exec:\nbhhnn.exe119⤵PID:5108
-
\??\c:\048406.exec:\048406.exe120⤵PID:664
-
\??\c:\862664.exec:\862664.exe121⤵PID:4836
-
\??\c:\9jvpd.exec:\9jvpd.exe122⤵PID:3932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-