Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 01:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe
-
Size
453KB
-
MD5
1767a84134b8741183ff99cb91227d91
-
SHA1
ace019c2b92f5183dcc683aa302c2530018428df
-
SHA256
a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5
-
SHA512
397d2decccd1046f78848d8e5fcdce92ac2342ffca6e1a398edf86817484a83371d576467b88eb64af8c5acd93714b0915db90206edb3beeee9af220d8bc7053
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeN:q7Tc2NYHUrAwfMp3CDN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/3716-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/444-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2928-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/736-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1408-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3436-34-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4692-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1864-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4992-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4928-73-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3252-78-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3756-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5032-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4192-107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3192-113-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3320-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2980-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3352-137-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/220-148-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1568-160-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3444-169-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2036-176-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3200-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2368-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4140-197-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4584-201-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1984-207-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3804-211-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3064-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4916-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1580-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3196-241-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/540-251-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4640-255-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2300-262-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2192-272-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/700-289-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3932-325-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5004-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5080-336-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3192-344-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1096-340-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3616-357-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1072-367-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1936-393-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2560-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3496-413-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5040-423-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2264-439-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4408-482-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4716-510-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/760-520-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2156-569-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4584-585-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/864-608-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1152-683-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2696-723-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4412-742-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3580-924-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/836-1095-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1048-1147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3096-1885-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 736 vpvpj.exe 2928 00662.exe 444 20268.exe 1408 242248.exe 3436 82042.exe 5052 80882.exe 3504 i422482.exe 4692 thnhhb.exe 2088 g4486.exe 4992 4264260.exe 1864 pvvjd.exe 4928 84882.exe 3252 e44608.exe 3756 204864.exe 1332 6264860.exe 728 044426.exe 5032 vjvjv.exe 3320 pdpdd.exe 4192 vppdv.exe 3192 o860820.exe 2980 8462088.exe 4696 8486486.exe 544 ddjvd.exe 3352 8824642.exe 220 a2860.exe 548 jddvp.exe 3056 dvvjd.exe 1568 60644.exe 3444 pvvjv.exe 2036 htnhtn.exe 3200 q88260.exe 2368 vvdjp.exe 4308 262264.exe 2924 rflfxrl.exe 4140 rlfrrll.exe 4584 hbthtn.exe 4952 9dvjv.exe 1984 nbbnnb.exe 3804 28424.exe 3064 204820.exe 4916 6660826.exe 1580 080208.exe 3712 tbhhhn.exe 1272 6604264.exe 1052 48862.exe 3980 7fxlxrf.exe 3196 k84266.exe 1376 djpvp.exe 4360 pddpj.exe 540 hbhtbh.exe 4640 djdvj.exe 5008 8026460.exe 2300 9llxxrx.exe 3624 q06820.exe 804 6226820.exe 2192 0882004.exe 664 s6046.exe 2024 6068260.exe 2080 0660864.exe 2712 206482.exe 700 866026.exe 4676 lfxflxl.exe 536 xlrfxrf.exe 3212 dvpdp.exe -
resource yara_rule behavioral2/memory/3716-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/444-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2928-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/736-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1408-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5052-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3436-34-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1864-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4992-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-73-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3252-78-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3756-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5032-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4192-107-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3192-113-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2980-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3320-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2980-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3352-137-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/220-148-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1568-160-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3444-169-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2036-176-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3200-182-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2368-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4140-197-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4584-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1984-207-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3804-211-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3064-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4916-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1580-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3712-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3196-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/540-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4640-255-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2300-262-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2192-272-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/700-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3932-325-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5004-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5080-336-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3192-344-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1096-340-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3616-357-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1072-367-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1936-393-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2560-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3496-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-423-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2264-439-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4408-482-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4716-510-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/760-520-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2156-569-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4584-585-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/864-608-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1152-683-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2696-723-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4412-742-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/228-881-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3580-924-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xxlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nntnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnthth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrlrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2242008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8620480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3716 wrote to memory of 736 3716 a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe 83 PID 3716 wrote to memory of 736 3716 a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe 83 PID 3716 wrote to memory of 736 3716 a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe 83 PID 736 wrote to memory of 2928 736 vpvpj.exe 84 PID 736 wrote to memory of 2928 736 vpvpj.exe 84 PID 736 wrote to memory of 2928 736 vpvpj.exe 84 PID 2928 wrote to memory of 444 2928 00662.exe 85 PID 2928 wrote to memory of 444 2928 00662.exe 85 PID 2928 wrote to memory of 444 2928 00662.exe 85 PID 444 wrote to memory of 1408 444 20268.exe 86 PID 444 wrote to memory of 1408 444 20268.exe 86 PID 444 wrote to memory of 1408 444 20268.exe 86 PID 1408 wrote to memory of 3436 1408 242248.exe 87 PID 1408 wrote to memory of 3436 1408 242248.exe 87 PID 1408 wrote to memory of 3436 1408 242248.exe 87 PID 3436 wrote to memory of 5052 3436 82042.exe 88 PID 3436 wrote to memory of 5052 3436 82042.exe 88 PID 3436 wrote to memory of 5052 3436 82042.exe 88 PID 5052 wrote to memory of 3504 5052 80882.exe 89 PID 5052 wrote to memory of 3504 5052 80882.exe 89 PID 5052 wrote to memory of 3504 5052 80882.exe 89 PID 3504 wrote to memory of 4692 3504 i422482.exe 90 PID 3504 wrote to memory of 4692 3504 i422482.exe 90 PID 3504 wrote to memory of 4692 3504 i422482.exe 90 PID 4692 wrote to memory of 2088 4692 thnhhb.exe 91 PID 4692 wrote to memory of 2088 4692 thnhhb.exe 91 PID 4692 wrote to memory of 2088 4692 thnhhb.exe 91 PID 2088 wrote to memory of 4992 2088 g4486.exe 92 PID 2088 wrote to memory of 4992 2088 g4486.exe 92 PID 2088 wrote to memory of 4992 2088 g4486.exe 92 PID 4992 wrote to memory of 1864 4992 4264260.exe 93 PID 4992 wrote to memory of 1864 4992 4264260.exe 93 PID 4992 wrote to memory of 1864 4992 4264260.exe 93 PID 1864 wrote to memory of 4928 1864 pvvjd.exe 94 PID 1864 wrote to memory of 4928 1864 pvvjd.exe 94 PID 1864 wrote to memory of 4928 1864 pvvjd.exe 94 PID 4928 wrote to memory of 3252 4928 84882.exe 95 PID 4928 wrote to memory of 3252 4928 84882.exe 95 PID 4928 wrote to memory of 3252 4928 84882.exe 95 PID 3252 wrote to memory of 3756 3252 e44608.exe 96 PID 3252 wrote to memory of 3756 3252 e44608.exe 96 PID 3252 wrote to memory of 3756 3252 e44608.exe 96 PID 3756 wrote to memory of 1332 3756 204864.exe 97 PID 3756 wrote to memory of 1332 3756 204864.exe 97 PID 3756 wrote to memory of 1332 3756 204864.exe 97 PID 1332 wrote to memory of 728 1332 6264860.exe 98 PID 1332 wrote to memory of 728 1332 6264860.exe 98 PID 1332 wrote to memory of 728 1332 6264860.exe 98 PID 728 wrote to memory of 5032 728 044426.exe 99 PID 728 wrote to memory of 5032 728 044426.exe 99 PID 728 wrote to memory of 5032 728 044426.exe 99 PID 5032 wrote to memory of 3320 5032 vjvjv.exe 100 PID 5032 wrote to memory of 3320 5032 vjvjv.exe 100 PID 5032 wrote to memory of 3320 5032 vjvjv.exe 100 PID 3320 wrote to memory of 4192 3320 pdpdd.exe 101 PID 3320 wrote to memory of 4192 3320 pdpdd.exe 101 PID 3320 wrote to memory of 4192 3320 pdpdd.exe 101 PID 4192 wrote to memory of 3192 4192 vppdv.exe 102 PID 4192 wrote to memory of 3192 4192 vppdv.exe 102 PID 4192 wrote to memory of 3192 4192 vppdv.exe 102 PID 3192 wrote to memory of 2980 3192 o860820.exe 103 PID 3192 wrote to memory of 2980 3192 o860820.exe 103 PID 3192 wrote to memory of 2980 3192 o860820.exe 103 PID 2980 wrote to memory of 4696 2980 8462088.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe"C:\Users\Admin\AppData\Local\Temp\a0513790c80db293a82e9e71bcedc31618da52d7434ae9142fec4fc3a6048ec5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
\??\c:\vpvpj.exec:\vpvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\00662.exec:\00662.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\20268.exec:\20268.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:444 -
\??\c:\242248.exec:\242248.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\82042.exec:\82042.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\80882.exec:\80882.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\i422482.exec:\i422482.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
\??\c:\thnhhb.exec:\thnhhb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\g4486.exec:\g4486.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\4264260.exec:\4264260.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
\??\c:\pvvjd.exec:\pvvjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\84882.exec:\84882.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\e44608.exec:\e44608.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\204864.exec:\204864.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
\??\c:\6264860.exec:\6264860.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\044426.exec:\044426.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:728 -
\??\c:\vjvjv.exec:\vjvjv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\pdpdd.exec:\pdpdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
\??\c:\vppdv.exec:\vppdv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\o860820.exec:\o860820.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
\??\c:\8462088.exec:\8462088.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\8486486.exec:\8486486.exe23⤵
- Executes dropped EXE
PID:4696 -
\??\c:\ddjvd.exec:\ddjvd.exe24⤵
- Executes dropped EXE
PID:544 -
\??\c:\8824642.exec:\8824642.exe25⤵
- Executes dropped EXE
PID:3352 -
\??\c:\a2860.exec:\a2860.exe26⤵
- Executes dropped EXE
PID:220 -
\??\c:\jddvp.exec:\jddvp.exe27⤵
- Executes dropped EXE
PID:548 -
\??\c:\dvvjd.exec:\dvvjd.exe28⤵
- Executes dropped EXE
PID:3056 -
\??\c:\60644.exec:\60644.exe29⤵
- Executes dropped EXE
PID:1568 -
\??\c:\pvvjv.exec:\pvvjv.exe30⤵
- Executes dropped EXE
PID:3444 -
\??\c:\htnhtn.exec:\htnhtn.exe31⤵
- Executes dropped EXE
PID:2036 -
\??\c:\q88260.exec:\q88260.exe32⤵
- Executes dropped EXE
PID:3200 -
\??\c:\vvdjp.exec:\vvdjp.exe33⤵
- Executes dropped EXE
PID:2368 -
\??\c:\262264.exec:\262264.exe34⤵
- Executes dropped EXE
PID:4308 -
\??\c:\rflfxrl.exec:\rflfxrl.exe35⤵
- Executes dropped EXE
PID:2924 -
\??\c:\rlfrrll.exec:\rlfrrll.exe36⤵
- Executes dropped EXE
PID:4140 -
\??\c:\hbthtn.exec:\hbthtn.exe37⤵
- Executes dropped EXE
PID:4584 -
\??\c:\9dvjv.exec:\9dvjv.exe38⤵
- Executes dropped EXE
PID:4952 -
\??\c:\nbbnnb.exec:\nbbnnb.exe39⤵
- Executes dropped EXE
PID:1984 -
\??\c:\28424.exec:\28424.exe40⤵
- Executes dropped EXE
PID:3804 -
\??\c:\204820.exec:\204820.exe41⤵
- Executes dropped EXE
PID:3064 -
\??\c:\6660826.exec:\6660826.exe42⤵
- Executes dropped EXE
PID:4916 -
\??\c:\080208.exec:\080208.exe43⤵
- Executes dropped EXE
PID:1580 -
\??\c:\tbhhhn.exec:\tbhhhn.exe44⤵
- Executes dropped EXE
PID:3712 -
\??\c:\6604264.exec:\6604264.exe45⤵
- Executes dropped EXE
PID:1272 -
\??\c:\48862.exec:\48862.exe46⤵
- Executes dropped EXE
PID:1052 -
\??\c:\7fxlxrf.exec:\7fxlxrf.exe47⤵
- Executes dropped EXE
PID:3980 -
\??\c:\k84266.exec:\k84266.exe48⤵
- Executes dropped EXE
PID:3196 -
\??\c:\djpvp.exec:\djpvp.exe49⤵
- Executes dropped EXE
PID:1376 -
\??\c:\pddpj.exec:\pddpj.exe50⤵
- Executes dropped EXE
PID:4360 -
\??\c:\hbhtbh.exec:\hbhtbh.exe51⤵
- Executes dropped EXE
PID:540 -
\??\c:\djdvj.exec:\djdvj.exe52⤵
- Executes dropped EXE
PID:4640 -
\??\c:\8026460.exec:\8026460.exe53⤵
- Executes dropped EXE
PID:5008 -
\??\c:\9llxxrx.exec:\9llxxrx.exe54⤵
- Executes dropped EXE
PID:2300 -
\??\c:\q06820.exec:\q06820.exe55⤵
- Executes dropped EXE
PID:3624 -
\??\c:\6226820.exec:\6226820.exe56⤵
- Executes dropped EXE
PID:804 -
\??\c:\0882004.exec:\0882004.exe57⤵
- Executes dropped EXE
PID:2192 -
\??\c:\s6046.exec:\s6046.exe58⤵
- Executes dropped EXE
PID:664 -
\??\c:\6068260.exec:\6068260.exe59⤵
- Executes dropped EXE
PID:2024 -
\??\c:\0660864.exec:\0660864.exe60⤵
- Executes dropped EXE
PID:2080 -
\??\c:\206482.exec:\206482.exe61⤵
- Executes dropped EXE
PID:2712 -
\??\c:\866026.exec:\866026.exe62⤵
- Executes dropped EXE
PID:700 -
\??\c:\lfxflxl.exec:\lfxflxl.exe63⤵
- Executes dropped EXE
PID:4676 -
\??\c:\xlrfxrf.exec:\xlrfxrf.exe64⤵
- Executes dropped EXE
PID:536 -
\??\c:\dvpdp.exec:\dvpdp.exe65⤵
- Executes dropped EXE
PID:3212 -
\??\c:\9bthbt.exec:\9bthbt.exe66⤵PID:4940
-
\??\c:\vjpdv.exec:\vjpdv.exe67⤵PID:1864
-
\??\c:\tnnbhb.exec:\tnnbhb.exe68⤵PID:4804
-
\??\c:\nnnhnh.exec:\nnnhnh.exe69⤵PID:1964
-
\??\c:\0068082.exec:\0068082.exe70⤵PID:2756
-
\??\c:\htthtn.exec:\htthtn.exe71⤵PID:3092
-
\??\c:\thnbtn.exec:\thnbtn.exe72⤵PID:1256
-
\??\c:\vdjpd.exec:\vdjpd.exe73⤵PID:1540
-
\??\c:\4002468.exec:\4002468.exe74⤵PID:3932
-
\??\c:\480882.exec:\480882.exe75⤵PID:2496
-
\??\c:\m4000.exec:\m4000.exe76⤵PID:5004
-
\??\c:\46600.exec:\46600.exe77⤵PID:5080
-
\??\c:\frfrrlx.exec:\frfrrlx.exe78⤵PID:1096
-
\??\c:\g6204.exec:\g6204.exe79⤵PID:3192
-
\??\c:\7bbttn.exec:\7bbttn.exe80⤵PID:1040
-
\??\c:\vvpjv.exec:\vvpjv.exe81⤵PID:4800
-
\??\c:\k40404.exec:\k40404.exe82⤵PID:1620
-
\??\c:\dvdpj.exec:\dvdpj.exe83⤵PID:3616
-
\??\c:\thhthb.exec:\thhthb.exe84⤵PID:3772
-
\??\c:\o402082.exec:\o402082.exe85⤵PID:4348
-
\??\c:\fllxlxl.exec:\fllxlxl.exe86⤵PID:1072
-
\??\c:\0882426.exec:\0882426.exe87⤵PID:1392
-
\??\c:\rxfxrlf.exec:\rxfxrlf.exe88⤵PID:324
-
\??\c:\00042.exec:\00042.exe89⤵PID:1644
-
\??\c:\3jdpd.exec:\3jdpd.exe90⤵PID:1308
-
\??\c:\xlxrlfr.exec:\xlxrlfr.exe91⤵PID:4352
-
\??\c:\httnbh.exec:\httnbh.exe92⤵
- System Location Discovery: System Language Discovery
PID:4820 -
\??\c:\00608.exec:\00608.exe93⤵PID:3684
-
\??\c:\e84826.exec:\e84826.exe94⤵PID:2084
-
\??\c:\dvpjv.exec:\dvpjv.exe95⤵PID:1936
-
\??\c:\dvpjv.exec:\dvpjv.exe96⤵PID:3556
-
\??\c:\5lxrlfr.exec:\5lxrlfr.exe97⤵PID:4852
-
\??\c:\vjpjp.exec:\vjpjp.exe98⤵PID:1416
-
\??\c:\ntthbt.exec:\ntthbt.exe99⤵PID:2560
-
\??\c:\u006420.exec:\u006420.exe100⤵PID:3096
-
\??\c:\644826.exec:\644826.exe101⤵PID:3496
-
\??\c:\q00426.exec:\q00426.exe102⤵PID:4828
-
\??\c:\3jdjp.exec:\3jdjp.exe103⤵PID:3988
-
\??\c:\tbbhnb.exec:\tbbhnb.exe104⤵PID:5040
-
\??\c:\8620482.exec:\8620482.exe105⤵PID:4164
-
\??\c:\3jddp.exec:\3jddp.exe106⤵PID:3992
-
\??\c:\2662604.exec:\2662604.exe107⤵PID:3076
-
\??\c:\lrfrffr.exec:\lrfrffr.exe108⤵PID:4680
-
\??\c:\7flxlxl.exec:\7flxlxl.exe109⤵PID:2264
-
\??\c:\lxxrllx.exec:\lxxrllx.exe110⤵PID:4776
-
\??\c:\nnbbhh.exec:\nnbbhh.exe111⤵PID:4068
-
\??\c:\46660.exec:\46660.exe112⤵PID:3220
-
\??\c:\2800444.exec:\2800444.exe113⤵PID:4848
-
\??\c:\5hhttn.exec:\5hhttn.exe114⤵PID:1752
-
\??\c:\7tnbtn.exec:\7tnbtn.exe115⤵
- System Location Discovery: System Language Discovery
PID:4768 -
\??\c:\w40826.exec:\w40826.exe116⤵PID:860
-
\??\c:\htbbtt.exec:\htbbtt.exe117⤵PID:3364
-
\??\c:\xxxlfrf.exec:\xxxlfrf.exe118⤵PID:4864
-
\??\c:\bnthbt.exec:\bnthbt.exe119⤵PID:3968
-
\??\c:\g4044.exec:\g4044.exe120⤵PID:3436
-
\??\c:\rllfxxr.exec:\rllfxxr.exe121⤵PID:5060
-
\??\c:\lrxlxxl.exec:\lrxlxxl.exe122⤵PID:2340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-