Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 00:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe
Resource
win7-20241023-en
windows7-x64
7 signatures
150 seconds
General
-
Target
83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe
-
Size
454KB
-
MD5
3860349dc828caa159a980ff515ced7a
-
SHA1
a6c9539a393e8f21e53539243a679d6b9a62fc8f
-
SHA256
83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1
-
SHA512
f97d8bbb88f60f1a138819a7e52711238aea8759746c5834535cf0dd9d8fcb3739009437c08cf48ce0fbb7f25aae5c02e289efa01a8dc4e019a9493ee5494167
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbet:q7Tc2NYHUrAwfMp3CDt
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/2268-6-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1840-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4420-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4668-23-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4120-40-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2352-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4316-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/524-53-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4032-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2692-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3304-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4272-83-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2016-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4540-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2284-115-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4308-122-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3308-127-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1648-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1116-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4008-151-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/976-157-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/720-178-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1644-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1676-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1100-206-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3884-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3408-214-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1388-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4320-241-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2268-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3596-255-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2908-268-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5092-272-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4876-278-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/392-282-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1132-286-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1864-290-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3616-312-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/528-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3844-320-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4692-327-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2044-337-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3648-341-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1112-363-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4948-370-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3792-374-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3140-390-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5004-394-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2880-401-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1908-405-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/808-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1924-437-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1000-441-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5072-472-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3380-489-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3280-520-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-704-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/860-750-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3596-812-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4392-1279-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2860-1389-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4788-1721-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1840 vppdp.exe 4420 fxlxfxf.exe 4668 2000048.exe 3380 62640.exe 2352 htthbn.exe 4120 m8602.exe 4316 u004220.exe 524 nhnhnn.exe 4032 tbbthh.exe 2692 8842026.exe 3868 vjvvp.exe 3616 hbhbtt.exe 4272 42204.exe 3304 0668204.exe 5040 6682608.exe 2680 868882.exe 2016 lfffrrx.exe 4540 864648.exe 2284 04086.exe 4308 rxxlxrf.exe 3308 ppvjd.exe 1648 440204.exe 1116 o064822.exe 3684 28420.exe 4008 240824.exe 976 dvpjd.exe 2272 rfllxfx.exe 3836 200220.exe 916 htbtbb.exe 720 fffrfxl.exe 4952 9xrfrlf.exe 3032 62844.exe 1644 fxfrrll.exe 4232 4442604.exe 2932 060464.exe 1676 08864.exe 1100 068248.exe 3884 frxxrfr.exe 3408 thbhbt.exe 1124 ntnbnn.exe 3812 2064486.exe 2332 44208.exe 2120 xflfxff.exe 5048 484826.exe 1388 1dppd.exe 1564 nbhbtt.exe 4320 4626004.exe 1760 hbhbnb.exe 4572 8622228.exe 2268 vdjpp.exe 3596 3rxxxxx.exe 4136 48440.exe 1128 rxlxrrr.exe 544 7vdpj.exe 2908 4400004.exe 5092 vdddd.exe 3380 2660004.exe 4876 06822.exe 392 o660448.exe 1132 lxfxxxx.exe 1864 66688.exe 3824 hntnhh.exe 1512 rrfxffl.exe 2344 602666.exe -
resource yara_rule behavioral2/memory/2268-6-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1840-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4420-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4668-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4120-40-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2352-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/524-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/524-53-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-59-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4032-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2692-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3304-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4272-83-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2016-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4540-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2284-115-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4308-122-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1648-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1116-134-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1116-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4008-151-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/976-157-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/720-178-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1644-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1676-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1100-206-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3884-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3408-214-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1388-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4320-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2268-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3596-255-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2908-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5092-272-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4876-278-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/392-282-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1132-286-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1864-290-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3616-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/528-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3844-320-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-327-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2044-337-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3648-341-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1112-363-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4948-370-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3792-374-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3140-390-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5004-394-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2880-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1908-405-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/808-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1924-437-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1000-441-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5072-472-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3380-489-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3280-520-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4496-704-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/860-750-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2488-781-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3596-812-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3884-1104-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q44860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 420860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0626060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 680488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxrrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 686600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 840488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4408204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0282666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80048.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1840 2268 83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe 83 PID 2268 wrote to memory of 1840 2268 83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe 83 PID 2268 wrote to memory of 1840 2268 83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe 83 PID 1840 wrote to memory of 4420 1840 vppdp.exe 84 PID 1840 wrote to memory of 4420 1840 vppdp.exe 84 PID 1840 wrote to memory of 4420 1840 vppdp.exe 84 PID 4420 wrote to memory of 4668 4420 fxlxfxf.exe 85 PID 4420 wrote to memory of 4668 4420 fxlxfxf.exe 85 PID 4420 wrote to memory of 4668 4420 fxlxfxf.exe 85 PID 4668 wrote to memory of 3380 4668 2000048.exe 86 PID 4668 wrote to memory of 3380 4668 2000048.exe 86 PID 4668 wrote to memory of 3380 4668 2000048.exe 86 PID 3380 wrote to memory of 2352 3380 62640.exe 87 PID 3380 wrote to memory of 2352 3380 62640.exe 87 PID 3380 wrote to memory of 2352 3380 62640.exe 87 PID 2352 wrote to memory of 4120 2352 htthbn.exe 88 PID 2352 wrote to memory of 4120 2352 htthbn.exe 88 PID 2352 wrote to memory of 4120 2352 htthbn.exe 88 PID 4120 wrote to memory of 4316 4120 m8602.exe 89 PID 4120 wrote to memory of 4316 4120 m8602.exe 89 PID 4120 wrote to memory of 4316 4120 m8602.exe 89 PID 4316 wrote to memory of 524 4316 u004220.exe 90 PID 4316 wrote to memory of 524 4316 u004220.exe 90 PID 4316 wrote to memory of 524 4316 u004220.exe 90 PID 524 wrote to memory of 4032 524 nhnhnn.exe 91 PID 524 wrote to memory of 4032 524 nhnhnn.exe 91 PID 524 wrote to memory of 4032 524 nhnhnn.exe 91 PID 4032 wrote to memory of 2692 4032 tbbthh.exe 92 PID 4032 wrote to memory of 2692 4032 tbbthh.exe 92 PID 4032 wrote to memory of 2692 4032 tbbthh.exe 92 PID 2692 wrote to memory of 3868 2692 8842026.exe 93 PID 2692 wrote to memory of 3868 2692 8842026.exe 93 PID 2692 wrote to memory of 3868 2692 8842026.exe 93 PID 3868 wrote to memory of 3616 3868 vjvvp.exe 94 PID 3868 wrote to memory of 3616 3868 vjvvp.exe 94 PID 3868 wrote to memory of 3616 3868 vjvvp.exe 94 PID 3616 wrote to memory of 4272 3616 hbhbtt.exe 95 PID 3616 wrote to memory of 4272 3616 hbhbtt.exe 95 PID 3616 wrote to memory of 4272 3616 hbhbtt.exe 95 PID 4272 wrote to memory of 3304 4272 42204.exe 96 PID 4272 wrote to memory of 3304 4272 42204.exe 96 PID 4272 wrote to memory of 3304 4272 42204.exe 96 PID 3304 wrote to memory of 5040 3304 0668204.exe 97 PID 3304 wrote to memory of 5040 3304 0668204.exe 97 PID 3304 wrote to memory of 5040 3304 0668204.exe 97 PID 5040 wrote to memory of 2680 5040 6682608.exe 98 PID 5040 wrote to memory of 2680 5040 6682608.exe 98 PID 5040 wrote to memory of 2680 5040 6682608.exe 98 PID 2680 wrote to memory of 2016 2680 868882.exe 99 PID 2680 wrote to memory of 2016 2680 868882.exe 99 PID 2680 wrote to memory of 2016 2680 868882.exe 99 PID 2016 wrote to memory of 4540 2016 lfffrrx.exe 100 PID 2016 wrote to memory of 4540 2016 lfffrrx.exe 100 PID 2016 wrote to memory of 4540 2016 lfffrrx.exe 100 PID 4540 wrote to memory of 2284 4540 864648.exe 101 PID 4540 wrote to memory of 2284 4540 864648.exe 101 PID 4540 wrote to memory of 2284 4540 864648.exe 101 PID 2284 wrote to memory of 4308 2284 04086.exe 102 PID 2284 wrote to memory of 4308 2284 04086.exe 102 PID 2284 wrote to memory of 4308 2284 04086.exe 102 PID 4308 wrote to memory of 3308 4308 rxxlxrf.exe 103 PID 4308 wrote to memory of 3308 4308 rxxlxrf.exe 103 PID 4308 wrote to memory of 3308 4308 rxxlxrf.exe 103 PID 3308 wrote to memory of 1648 3308 ppvjd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe"C:\Users\Admin\AppData\Local\Temp\83ecdb61aa4be397d1158ba61fc376200931168502162694350696ae07a2abd1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\vppdp.exec:\vppdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
\??\c:\fxlxfxf.exec:\fxlxfxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
\??\c:\2000048.exec:\2000048.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
\??\c:\62640.exec:\62640.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
\??\c:\htthbn.exec:\htthbn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\m8602.exec:\m8602.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
\??\c:\u004220.exec:\u004220.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
\??\c:\nhnhnn.exec:\nhnhnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\tbbthh.exec:\tbbthh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
\??\c:\8842026.exec:\8842026.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\vjvvp.exec:\vjvvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
\??\c:\hbhbtt.exec:\hbhbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\42204.exec:\42204.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\0668204.exec:\0668204.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
\??\c:\6682608.exec:\6682608.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\868882.exec:\868882.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\lfffrrx.exec:\lfffrrx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\864648.exec:\864648.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
\??\c:\04086.exec:\04086.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\rxxlxrf.exec:\rxxlxrf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
\??\c:\ppvjd.exec:\ppvjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
\??\c:\440204.exec:\440204.exe23⤵
- Executes dropped EXE
PID:1648 -
\??\c:\o064822.exec:\o064822.exe24⤵
- Executes dropped EXE
PID:1116 -
\??\c:\28420.exec:\28420.exe25⤵
- Executes dropped EXE
PID:3684 -
\??\c:\240824.exec:\240824.exe26⤵
- Executes dropped EXE
PID:4008 -
\??\c:\dvpjd.exec:\dvpjd.exe27⤵
- Executes dropped EXE
PID:976 -
\??\c:\rfllxfx.exec:\rfllxfx.exe28⤵
- Executes dropped EXE
PID:2272 -
\??\c:\200220.exec:\200220.exe29⤵
- Executes dropped EXE
PID:3836 -
\??\c:\htbtbb.exec:\htbtbb.exe30⤵
- Executes dropped EXE
PID:916 -
\??\c:\fffrfxl.exec:\fffrfxl.exe31⤵
- Executes dropped EXE
PID:720 -
\??\c:\9xrfrlf.exec:\9xrfrlf.exe32⤵
- Executes dropped EXE
PID:4952 -
\??\c:\62844.exec:\62844.exe33⤵
- Executes dropped EXE
PID:3032 -
\??\c:\fxfrrll.exec:\fxfrrll.exe34⤵
- Executes dropped EXE
PID:1644 -
\??\c:\4442604.exec:\4442604.exe35⤵
- Executes dropped EXE
PID:4232 -
\??\c:\060464.exec:\060464.exe36⤵
- Executes dropped EXE
PID:2932 -
\??\c:\08864.exec:\08864.exe37⤵
- Executes dropped EXE
PID:1676 -
\??\c:\068248.exec:\068248.exe38⤵
- Executes dropped EXE
PID:1100 -
\??\c:\frxxrfr.exec:\frxxrfr.exe39⤵
- Executes dropped EXE
PID:3884 -
\??\c:\thbhbt.exec:\thbhbt.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3408 -
\??\c:\ntnbnn.exec:\ntnbnn.exe41⤵
- Executes dropped EXE
PID:1124 -
\??\c:\2064486.exec:\2064486.exe42⤵
- Executes dropped EXE
PID:3812 -
\??\c:\44208.exec:\44208.exe43⤵
- Executes dropped EXE
PID:2332 -
\??\c:\xflfxff.exec:\xflfxff.exe44⤵
- Executes dropped EXE
PID:2120 -
\??\c:\484826.exec:\484826.exe45⤵
- Executes dropped EXE
PID:5048 -
\??\c:\1dppd.exec:\1dppd.exe46⤵
- Executes dropped EXE
PID:1388 -
\??\c:\nbhbtt.exec:\nbhbtt.exe47⤵
- Executes dropped EXE
PID:1564 -
\??\c:\4626004.exec:\4626004.exe48⤵
- Executes dropped EXE
PID:4320 -
\??\c:\hbhbnb.exec:\hbhbnb.exe49⤵
- Executes dropped EXE
PID:1760 -
\??\c:\8622228.exec:\8622228.exe50⤵
- Executes dropped EXE
PID:4572 -
\??\c:\vdjpp.exec:\vdjpp.exe51⤵
- Executes dropped EXE
PID:2268 -
\??\c:\3rxxxxx.exec:\3rxxxxx.exe52⤵
- Executes dropped EXE
PID:3596 -
\??\c:\48440.exec:\48440.exe53⤵
- Executes dropped EXE
PID:4136 -
\??\c:\rxlxrrr.exec:\rxlxrrr.exe54⤵
- Executes dropped EXE
PID:1128 -
\??\c:\7vdpj.exec:\7vdpj.exe55⤵
- Executes dropped EXE
PID:544 -
\??\c:\4400004.exec:\4400004.exe56⤵
- Executes dropped EXE
PID:2908 -
\??\c:\vdddd.exec:\vdddd.exe57⤵
- Executes dropped EXE
PID:5092 -
\??\c:\2660004.exec:\2660004.exe58⤵
- Executes dropped EXE
PID:3380 -
\??\c:\06822.exec:\06822.exe59⤵
- Executes dropped EXE
PID:4876 -
\??\c:\o660448.exec:\o660448.exe60⤵
- Executes dropped EXE
PID:392 -
\??\c:\lxfxxxx.exec:\lxfxxxx.exe61⤵
- Executes dropped EXE
PID:1132 -
\??\c:\66688.exec:\66688.exe62⤵
- Executes dropped EXE
PID:1864 -
\??\c:\hntnhh.exec:\hntnhh.exe63⤵
- Executes dropped EXE
PID:3824 -
\??\c:\rrfxffl.exec:\rrfxffl.exe64⤵
- Executes dropped EXE
PID:1512 -
\??\c:\602666.exec:\602666.exe65⤵
- Executes dropped EXE
PID:2344 -
\??\c:\xxrllll.exec:\xxrllll.exe66⤵PID:2276
-
\??\c:\jjpjp.exec:\jjpjp.exe67⤵PID:2416
-
\??\c:\c282660.exec:\c282660.exe68⤵PID:3008
-
\??\c:\rlrrlff.exec:\rlrrlff.exe69⤵PID:3616
-
\??\c:\480066.exec:\480066.exe70⤵PID:528
-
\??\c:\480600.exec:\480600.exe71⤵PID:3844
-
\??\c:\600004.exec:\600004.exe72⤵PID:1832
-
\??\c:\264484.exec:\264484.exe73⤵PID:4692
-
\??\c:\hbtntt.exec:\hbtntt.exe74⤵PID:4496
-
\??\c:\vvddv.exec:\vvddv.exe75⤵PID:388
-
\??\c:\424488.exec:\424488.exe76⤵PID:2044
-
\??\c:\222222.exec:\222222.exe77⤵PID:3648
-
\??\c:\6660000.exec:\6660000.exe78⤵PID:428
-
\??\c:\o004822.exec:\o004822.exe79⤵PID:372
-
\??\c:\4844440.exec:\4844440.exe80⤵PID:3244
-
\??\c:\2866600.exec:\2866600.exe81⤵PID:4980
-
\??\c:\262602.exec:\262602.exe82⤵PID:1560
-
\??\c:\lxffrrf.exec:\lxffrrf.exe83⤵PID:2336
-
\??\c:\dvdpj.exec:\dvdpj.exe84⤵PID:1112
-
\??\c:\e00044.exec:\e00044.exe85⤵PID:4356
-
\??\c:\jdpjd.exec:\jdpjd.exe86⤵PID:4948
-
\??\c:\3flfrrr.exec:\3flfrrr.exe87⤵PID:3792
-
\??\c:\8664804.exec:\8664804.exe88⤵PID:2564
-
\??\c:\1tbntb.exec:\1tbntb.exe89⤵PID:3796
-
\??\c:\jpdvp.exec:\jpdvp.exe90⤵PID:4188
-
\??\c:\llfxrrr.exec:\llfxrrr.exe91⤵PID:3120
-
\??\c:\q84044.exec:\q84044.exe92⤵PID:3140
-
\??\c:\pvjjp.exec:\pvjjp.exe93⤵PID:5004
-
\??\c:\bbbttt.exec:\bbbttt.exe94⤵PID:1272
-
\??\c:\3ffxrlf.exec:\3ffxrlf.exe95⤵PID:2880
-
\??\c:\bnbbbb.exec:\bnbbbb.exe96⤵PID:1908
-
\??\c:\7xrrlll.exec:\7xrrlll.exe97⤵PID:440
-
\??\c:\20604.exec:\20604.exe98⤵PID:912
-
\??\c:\1djdv.exec:\1djdv.exe99⤵PID:1676
-
\??\c:\nbhthh.exec:\nbhthh.exe100⤵PID:1100
-
\??\c:\lxlxrrr.exec:\lxlxrrr.exe101⤵PID:3612
-
\??\c:\rllfxxr.exec:\rllfxxr.exe102⤵PID:5100
-
\??\c:\06828.exec:\06828.exe103⤵PID:808
-
\??\c:\hthbtt.exec:\hthbtt.exe104⤵PID:3728
-
\??\c:\5hhbhb.exec:\5hhbhb.exe105⤵PID:2856
-
\??\c:\nhhbtb.exec:\nhhbtb.exe106⤵PID:1924
-
\??\c:\vppjj.exec:\vppjj.exe107⤵PID:1000
-
\??\c:\e08266.exec:\e08266.exe108⤵PID:1252
-
\??\c:\rflfffx.exec:\rflfffx.exe109⤵PID:1372
-
\??\c:\8404882.exec:\8404882.exe110⤵PID:4880
-
\??\c:\62482.exec:\62482.exe111⤵PID:4424
-
\??\c:\0400448.exec:\0400448.exe112⤵PID:4500
-
\??\c:\tnbbbb.exec:\tnbbbb.exe113⤵PID:2440
-
\??\c:\82822.exec:\82822.exe114⤵PID:2396
-
\??\c:\dpddd.exec:\dpddd.exe115⤵PID:3084
-
\??\c:\hhtnbb.exec:\hhtnbb.exe116⤵PID:2512
-
\??\c:\8284228.exec:\8284228.exe117⤵PID:5072
-
\??\c:\68488.exec:\68488.exe118⤵PID:1128
-
\??\c:\266048.exec:\266048.exe119⤵PID:348
-
\??\c:\60004.exec:\60004.exe120⤵PID:4756
-
\??\c:\062822.exec:\062822.exe121⤵PID:320
-
\??\c:\w28266.exec:\w28266.exe122⤵PID:3380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-