Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 10:41
Behavioral task
behavioral1
Sample
54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe
-
Size
67KB
-
MD5
87fd57d32f54a02186b4850acdb92c89
-
SHA1
6f6dbb996ae8a20e6138620cada0eac8dbe543ff
-
SHA256
54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d
-
SHA512
f03914a30a1180860c9667285bb45ccd01d522071c5c9f6e52687367ea214d51fd7cbce9ed2a96a402e3e635c0b526052f8b9b73872d5fd5823cc0f649ae9495
-
SSDEEP
1536:/vQBeOGtrYS3srx93UBWfwC6Ggnouy8jb5DiLKrb08I:/hOmTsF93UYfwC6GIoutcKbe
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/3156-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1004-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/876-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2508-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4772-31-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2428-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1152-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2260-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2244-57-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5016-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1840-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3516-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2400-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2212-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1068-98-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4060-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/760-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1464-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4848-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4548-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4232-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4560-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/212-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/816-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4932-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2092-192-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4200-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/456-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3040-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1568-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3204-211-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4720-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2380-240-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-250-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4864-254-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-258-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/856-274-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2260-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-306-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1500-310-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4684-320-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3920-324-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3344-331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4464-335-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2280-373-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4052-380-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3012-393-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2092-397-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4796-416-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2620-438-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2144-463-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4820-485-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4944-507-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4832-526-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/820-563-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1708-567-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2684-607-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4172-710-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2916-720-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2020-751-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3620-988-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3224-1117-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1876-1116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1004 406266.exe 2508 rxrlxrx.exe 876 rxlfxlf.exe 4772 i480268.exe 2428 dppdp.exe 1152 m8024.exe 3764 ntbnhh.exe 2260 pjjdd.exe 2244 pvjvj.exe 5016 htbnhb.exe 1840 dppvp.exe 3828 622200.exe 2212 62602.exe 2400 04028.exe 3516 48266.exe 1068 dvvvp.exe 4940 btbttn.exe 4260 hbnnbb.exe 4060 jddjv.exe 2388 rrxrfxx.exe 760 frxrrxl.exe 3392 20822.exe 1464 402668.exe 4848 5tthbt.exe 4548 4066488.exe 4232 8244624.exe 2132 7xxrllr.exe 4560 rfrlrxx.exe 212 u026624.exe 2912 jvdvv.exe 816 lrxxxxx.exe 4932 jdppj.exe 2092 244848.exe 4200 264628.exe 456 ppvvj.exe 3040 xrfllrx.exe 1568 pppjj.exe 3204 nntntt.exe 4452 482240.exe 3968 dvppd.exe 2636 jddjp.exe 4720 pjpjd.exe 3740 224044.exe 4700 a8666.exe 1964 808260.exe 3280 06004.exe 2380 80260.exe 3020 1vdpj.exe 1392 042660.exe 4840 ttnbbh.exe 4864 66842.exe 3132 262600.exe 1904 o248282.exe 3872 nthttn.exe 3788 60824.exe 3868 462604.exe 856 2446848.exe 628 086868.exe 5020 5vddv.exe 2260 jjdvp.exe 960 jpddj.exe 4128 68048.exe 1524 vvpjv.exe 1496 jdddj.exe -
resource yara_rule behavioral2/memory/3156-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0009000000023c57-3.dat upx behavioral2/memory/3156-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023ca7-9.dat upx behavioral2/memory/1004-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cab-12.dat upx behavioral2/memory/876-18-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2508-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cac-21.dat upx behavioral2/memory/4772-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023caf-34.dat upx behavioral2/memory/2428-30-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cae-27.dat upx behavioral2/files/0x0007000000023cb0-38.dat upx behavioral2/memory/1152-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb1-44.dat upx behavioral2/files/0x0007000000023cb2-49.dat upx behavioral2/memory/2260-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb3-55.dat upx behavioral2/memory/2244-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb4-61.dat upx behavioral2/memory/5016-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1840-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb5-69.dat upx behavioral2/files/0x0007000000023cb6-73.dat upx behavioral2/memory/2212-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb7-80.dat upx behavioral2/files/0x0007000000023cb8-85.dat upx behavioral2/memory/3516-89-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cb9-92.dat upx behavioral2/memory/1068-93-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2400-88-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2212-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000023ca8-97.dat upx behavioral2/memory/1068-98-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cba-102.dat upx behavioral2/files/0x0007000000023cbb-107.dat upx behavioral2/files/0x0007000000023cbc-114.dat upx behavioral2/memory/4060-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cbd-119.dat upx behavioral2/files/0x0007000000023cbe-125.dat upx behavioral2/memory/760-124-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc0-129.dat upx behavioral2/files/0x0007000000023cc1-134.dat upx behavioral2/memory/1464-138-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4848-141-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc2-142.dat upx behavioral2/memory/4548-147-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc3-149.dat upx behavioral2/memory/4232-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc4-153.dat upx behavioral2/files/0x0007000000023cc5-159.dat upx behavioral2/memory/4560-162-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc6-165.dat upx behavioral2/memory/212-167-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc7-170.dat upx behavioral2/memory/212-172-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc8-176.dat upx behavioral2/memory/816-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023cc9-182.dat upx behavioral2/memory/4932-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2092-192-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4200-196-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/456-199-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4626666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6240000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k46600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2640428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6868288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 642622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6824008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 1004 3156 54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe 83 PID 3156 wrote to memory of 1004 3156 54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe 83 PID 3156 wrote to memory of 1004 3156 54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe 83 PID 1004 wrote to memory of 2508 1004 406266.exe 84 PID 1004 wrote to memory of 2508 1004 406266.exe 84 PID 1004 wrote to memory of 2508 1004 406266.exe 84 PID 2508 wrote to memory of 876 2508 rxrlxrx.exe 85 PID 2508 wrote to memory of 876 2508 rxrlxrx.exe 85 PID 2508 wrote to memory of 876 2508 rxrlxrx.exe 85 PID 876 wrote to memory of 4772 876 rxlfxlf.exe 86 PID 876 wrote to memory of 4772 876 rxlfxlf.exe 86 PID 876 wrote to memory of 4772 876 rxlfxlf.exe 86 PID 4772 wrote to memory of 2428 4772 i480268.exe 87 PID 4772 wrote to memory of 2428 4772 i480268.exe 87 PID 4772 wrote to memory of 2428 4772 i480268.exe 87 PID 2428 wrote to memory of 1152 2428 dppdp.exe 88 PID 2428 wrote to memory of 1152 2428 dppdp.exe 88 PID 2428 wrote to memory of 1152 2428 dppdp.exe 88 PID 1152 wrote to memory of 3764 1152 m8024.exe 89 PID 1152 wrote to memory of 3764 1152 m8024.exe 89 PID 1152 wrote to memory of 3764 1152 m8024.exe 89 PID 3764 wrote to memory of 2260 3764 ntbnhh.exe 90 PID 3764 wrote to memory of 2260 3764 ntbnhh.exe 90 PID 3764 wrote to memory of 2260 3764 ntbnhh.exe 90 PID 2260 wrote to memory of 2244 2260 pjjdd.exe 91 PID 2260 wrote to memory of 2244 2260 pjjdd.exe 91 PID 2260 wrote to memory of 2244 2260 pjjdd.exe 91 PID 2244 wrote to memory of 5016 2244 pvjvj.exe 92 PID 2244 wrote to memory of 5016 2244 pvjvj.exe 92 PID 2244 wrote to memory of 5016 2244 pvjvj.exe 92 PID 5016 wrote to memory of 1840 5016 htbnhb.exe 93 PID 5016 wrote to memory of 1840 5016 htbnhb.exe 93 PID 5016 wrote to memory of 1840 5016 htbnhb.exe 93 PID 1840 wrote to memory of 3828 1840 dppvp.exe 94 PID 1840 wrote to memory of 3828 1840 dppvp.exe 94 PID 1840 wrote to memory of 3828 1840 dppvp.exe 94 PID 3828 wrote to memory of 2212 3828 622200.exe 95 PID 3828 wrote to memory of 2212 3828 622200.exe 95 PID 3828 wrote to memory of 2212 3828 622200.exe 95 PID 2212 wrote to memory of 2400 2212 62602.exe 96 PID 2212 wrote to memory of 2400 2212 62602.exe 96 PID 2212 wrote to memory of 2400 2212 62602.exe 96 PID 2400 wrote to memory of 3516 2400 04028.exe 97 PID 2400 wrote to memory of 3516 2400 04028.exe 97 PID 2400 wrote to memory of 3516 2400 04028.exe 97 PID 3516 wrote to memory of 1068 3516 48266.exe 98 PID 3516 wrote to memory of 1068 3516 48266.exe 98 PID 3516 wrote to memory of 1068 3516 48266.exe 98 PID 1068 wrote to memory of 4940 1068 dvvvp.exe 99 PID 1068 wrote to memory of 4940 1068 dvvvp.exe 99 PID 1068 wrote to memory of 4940 1068 dvvvp.exe 99 PID 4940 wrote to memory of 4260 4940 btbttn.exe 100 PID 4940 wrote to memory of 4260 4940 btbttn.exe 100 PID 4940 wrote to memory of 4260 4940 btbttn.exe 100 PID 4260 wrote to memory of 4060 4260 hbnnbb.exe 101 PID 4260 wrote to memory of 4060 4260 hbnnbb.exe 101 PID 4260 wrote to memory of 4060 4260 hbnnbb.exe 101 PID 4060 wrote to memory of 2388 4060 jddjv.exe 102 PID 4060 wrote to memory of 2388 4060 jddjv.exe 102 PID 4060 wrote to memory of 2388 4060 jddjv.exe 102 PID 2388 wrote to memory of 760 2388 rrxrfxx.exe 103 PID 2388 wrote to memory of 760 2388 rrxrfxx.exe 103 PID 2388 wrote to memory of 760 2388 rrxrfxx.exe 103 PID 760 wrote to memory of 3392 760 frxrrxl.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe"C:\Users\Admin\AppData\Local\Temp\54dfd30f8476669fa88b6d84cfb89c2d92502ca5aaed6b290e39d1e6fde1a48d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
\??\c:\406266.exec:\406266.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\rxrlxrx.exec:\rxrlxrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\rxlfxlf.exec:\rxlfxlf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\i480268.exec:\i480268.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
\??\c:\dppdp.exec:\dppdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\m8024.exec:\m8024.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\ntbnhh.exec:\ntbnhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\pjjdd.exec:\pjjdd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\pvjvj.exec:\pvjvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\htbnhb.exec:\htbnhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\dppvp.exec:\dppvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
\??\c:\622200.exec:\622200.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
\??\c:\62602.exec:\62602.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\04028.exec:\04028.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\48266.exec:\48266.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
\??\c:\dvvvp.exec:\dvvvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\btbttn.exec:\btbttn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\hbnnbb.exec:\hbnnbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
\??\c:\jddjv.exec:\jddjv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\rrxrfxx.exec:\rrxrfxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\frxrrxl.exec:\frxrrxl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\20822.exec:\20822.exe23⤵
- Executes dropped EXE
PID:3392 -
\??\c:\402668.exec:\402668.exe24⤵
- Executes dropped EXE
PID:1464 -
\??\c:\5tthbt.exec:\5tthbt.exe25⤵
- Executes dropped EXE
PID:4848 -
\??\c:\4066488.exec:\4066488.exe26⤵
- Executes dropped EXE
PID:4548 -
\??\c:\8244624.exec:\8244624.exe27⤵
- Executes dropped EXE
PID:4232 -
\??\c:\7xxrllr.exec:\7xxrllr.exe28⤵
- Executes dropped EXE
PID:2132 -
\??\c:\rfrlrxx.exec:\rfrlrxx.exe29⤵
- Executes dropped EXE
PID:4560 -
\??\c:\u026624.exec:\u026624.exe30⤵
- Executes dropped EXE
PID:212 -
\??\c:\jvdvv.exec:\jvdvv.exe31⤵
- Executes dropped EXE
PID:2912 -
\??\c:\lrxxxxx.exec:\lrxxxxx.exe32⤵
- Executes dropped EXE
PID:816 -
\??\c:\jdppj.exec:\jdppj.exe33⤵
- Executes dropped EXE
PID:4932 -
\??\c:\244848.exec:\244848.exe34⤵
- Executes dropped EXE
PID:2092 -
\??\c:\264628.exec:\264628.exe35⤵
- Executes dropped EXE
PID:4200 -
\??\c:\ppvvj.exec:\ppvvj.exe36⤵
- Executes dropped EXE
PID:456 -
\??\c:\xrfllrx.exec:\xrfllrx.exe37⤵
- Executes dropped EXE
PID:3040 -
\??\c:\pppjj.exec:\pppjj.exe38⤵
- Executes dropped EXE
PID:1568 -
\??\c:\nntntt.exec:\nntntt.exe39⤵
- Executes dropped EXE
PID:3204 -
\??\c:\482240.exec:\482240.exe40⤵
- Executes dropped EXE
PID:4452 -
\??\c:\dvppd.exec:\dvppd.exe41⤵
- Executes dropped EXE
PID:3968 -
\??\c:\jddjp.exec:\jddjp.exe42⤵
- Executes dropped EXE
PID:2636 -
\??\c:\pjpjd.exec:\pjpjd.exe43⤵
- Executes dropped EXE
PID:4720 -
\??\c:\224044.exec:\224044.exe44⤵
- Executes dropped EXE
PID:3740 -
\??\c:\a8666.exec:\a8666.exe45⤵
- Executes dropped EXE
PID:4700 -
\??\c:\808260.exec:\808260.exe46⤵
- Executes dropped EXE
PID:1964 -
\??\c:\06004.exec:\06004.exe47⤵
- Executes dropped EXE
PID:3280 -
\??\c:\80260.exec:\80260.exe48⤵
- Executes dropped EXE
PID:2380 -
\??\c:\1vdpj.exec:\1vdpj.exe49⤵
- Executes dropped EXE
PID:3020 -
\??\c:\042660.exec:\042660.exe50⤵
- Executes dropped EXE
PID:1392 -
\??\c:\ttnbbh.exec:\ttnbbh.exe51⤵
- Executes dropped EXE
PID:4840 -
\??\c:\66842.exec:\66842.exe52⤵
- Executes dropped EXE
PID:4864 -
\??\c:\262600.exec:\262600.exe53⤵
- Executes dropped EXE
PID:3132 -
\??\c:\o248282.exec:\o248282.exe54⤵
- Executes dropped EXE
PID:1904 -
\??\c:\nthttn.exec:\nthttn.exe55⤵
- Executes dropped EXE
PID:3872 -
\??\c:\60824.exec:\60824.exe56⤵
- Executes dropped EXE
PID:3788 -
\??\c:\462604.exec:\462604.exe57⤵
- Executes dropped EXE
PID:3868 -
\??\c:\2446848.exec:\2446848.exe58⤵
- Executes dropped EXE
PID:856 -
\??\c:\086868.exec:\086868.exe59⤵
- Executes dropped EXE
PID:628 -
\??\c:\5vddv.exec:\5vddv.exe60⤵
- Executes dropped EXE
PID:5020 -
\??\c:\jjdvp.exec:\jjdvp.exe61⤵
- Executes dropped EXE
PID:2260 -
\??\c:\jpddj.exec:\jpddj.exe62⤵
- Executes dropped EXE
PID:960 -
\??\c:\68048.exec:\68048.exe63⤵
- Executes dropped EXE
PID:4128 -
\??\c:\vvpjv.exec:\vvpjv.exe64⤵
- Executes dropped EXE
PID:1524 -
\??\c:\jdddj.exec:\jdddj.exe65⤵
- Executes dropped EXE
PID:1496 -
\??\c:\82442.exec:\82442.exe66⤵PID:2920
-
\??\c:\bbbbtt.exec:\bbbbtt.exe67⤵PID:2628
-
\??\c:\66004.exec:\66004.exe68⤵PID:4764
-
\??\c:\44880.exec:\44880.exe69⤵PID:1500
-
\??\c:\s4600.exec:\s4600.exe70⤵PID:4484
-
\??\c:\vjddp.exec:\vjddp.exe71⤵PID:3640
-
\??\c:\82600.exec:\82600.exe72⤵PID:4684
-
\??\c:\rlrrrlf.exec:\rlrrrlf.exe73⤵PID:3920
-
\??\c:\dvpjp.exec:\dvpjp.exe74⤵PID:4272
-
\??\c:\04044.exec:\04044.exe75⤵PID:3344
-
\??\c:\226688.exec:\226688.exe76⤵PID:4464
-
\??\c:\9djdd.exec:\9djdd.exe77⤵PID:3172
-
\??\c:\ffllrrf.exec:\ffllrrf.exe78⤵PID:4716
-
\??\c:\rfffxll.exec:\rfffxll.exe79⤵PID:1148
-
\??\c:\xffllrr.exec:\xffllrr.exe80⤵PID:2476
-
\??\c:\c028882.exec:\c028882.exe81⤵PID:1564
-
\??\c:\hbtbbb.exec:\hbtbbb.exe82⤵PID:1464
-
\??\c:\fflfllx.exec:\fflfllx.exe83⤵PID:4004
-
\??\c:\rlxfffl.exec:\rlxfffl.exe84⤵PID:4868
-
\??\c:\66826.exec:\66826.exe85⤵PID:3604
-
\??\c:\200088.exec:\200088.exe86⤵PID:5032
-
\??\c:\xrrlfff.exec:\xrrlfff.exe87⤵PID:3792
-
\??\c:\htttnn.exec:\htttnn.exe88⤵PID:2280
-
\??\c:\jjpdj.exec:\jjpdj.exe89⤵PID:3200
-
\??\c:\xfxrlfx.exec:\xfxrlfx.exe90⤵PID:4052
-
\??\c:\hbttbh.exec:\hbttbh.exe91⤵PID:4788
-
\??\c:\vjdvd.exec:\vjdvd.exe92⤵PID:1520
-
\??\c:\lfflfff.exec:\lfflfff.exe93⤵PID:4816
-
\??\c:\820062.exec:\820062.exe94⤵PID:3012
-
\??\c:\2688424.exec:\2688424.exe95⤵PID:2092
-
\??\c:\482266.exec:\482266.exe96⤵PID:4200
-
\??\c:\pdjvd.exec:\pdjvd.exe97⤵PID:3284
-
\??\c:\0244880.exec:\0244880.exe98⤵PID:2608
-
\??\c:\vvppj.exec:\vvppj.exe99⤵PID:2888
-
\??\c:\6400000.exec:\6400000.exe100⤵PID:4292
-
\??\c:\rrxrrlr.exec:\rrxrrlr.exe101⤵PID:4796
-
\??\c:\82222.exec:\82222.exe102⤵PID:2828
-
\??\c:\402822.exec:\402822.exe103⤵PID:4088
-
\??\c:\bhhhhh.exec:\bhhhhh.exe104⤵PID:4948
-
\??\c:\628884.exec:\628884.exe105⤵PID:3216
-
\??\c:\thnhbb.exec:\thnhbb.exe106⤵PID:1048
-
\??\c:\nhbbbb.exec:\nhbbbb.exe107⤵PID:4956
-
\??\c:\2666222.exec:\2666222.exe108⤵PID:2620
-
\??\c:\288444.exec:\288444.exe109⤵PID:4412
-
\??\c:\266666.exec:\266666.exe110⤵PID:3584
-
\??\c:\pdjdd.exec:\pdjdd.exe111⤵PID:1504
-
\??\c:\bhbttt.exec:\bhbttt.exe112⤵PID:1668
-
\??\c:\rxxrrff.exec:\rxxrrff.exe113⤵PID:3876
-
\??\c:\00462.exec:\00462.exe114⤵PID:3780
-
\??\c:\lllflrx.exec:\lllflrx.exe115⤵PID:1448
-
\??\c:\2480406.exec:\2480406.exe116⤵PID:2144
-
\??\c:\xfflfff.exec:\xfflfff.exe117⤵PID:1640
-
\??\c:\q24400.exec:\q24400.exe118⤵PID:4756
-
\??\c:\7pppp.exec:\7pppp.exe119⤵PID:1152
-
\??\c:\048222.exec:\048222.exe120⤵PID:4880
-
\??\c:\hhhnhh.exec:\hhhnhh.exe121⤵PID:3460
-
\??\c:\hnbbnn.exec:\hnbbnn.exe122⤵PID:4296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-