Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 01:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe
-
Size
453KB
-
MD5
115d6b888b5aec6c8e4d86e66f060e3f
-
SHA1
ad79dce13e451cd9804ef47fedf5f538dee48a10
-
SHA256
b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4
-
SHA512
c1b2f2acf7c594e435a5de5b01981a29a9e24b1ed6f9e195259e3adc5cb11925bb1527d9ad5ef44f5a113a01891d2842b3d9d9db30ba6ebb0cb6f6df57b456d2
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeb:q7Tc2NYHUrAwfMp3CDb
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/2912-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/312-23-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3004-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1152-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2816-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4240-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/652-33-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2264-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1712-59-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1632-52-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4928-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3552-77-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4404-84-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/744-90-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1616-94-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1272-99-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1512-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/608-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2080-123-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2652-129-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4500-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3776-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3536-166-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4808-184-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/636-178-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4480-213-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2656-217-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4336-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2836-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/396-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2540-249-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3584-253-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/312-260-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4164-267-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3836-271-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4700-281-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3820-288-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4744-301-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4004-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2312-312-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2908-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3616-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5032-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4560-364-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2380-368-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4368-402-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2008-424-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4916-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4464-447-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4256-472-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3772-476-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2432-480-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/764-487-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3440-497-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3252-510-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1528-529-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1468-557-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/244-671-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1528-696-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1804-883-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-1155-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4120-1303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3584-1905-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1152 fxlxlrf.exe 2816 nnhhtn.exe 3004 3pjdp.exe 312 jvpjp.exe 652 rlfxxfl.exe 4240 nnnhhh.exe 2264 866048.exe 1632 pvdvv.exe 2432 o660488.exe 1712 228600.exe 4928 60660.exe 3552 088200.exe 4404 jvdvp.exe 744 0462604.exe 1616 8848826.exe 1272 7frllll.exe 1512 lflfxrl.exe 2364 nhhhbb.exe 608 202622.exe 2080 6448484.exe 2652 btnnhh.exe 3776 2228260.exe 464 pjjdv.exe 4500 80882.exe 3852 pvjdv.exe 1468 lfxxxxx.exe 2252 802448.exe 3536 04862.exe 3496 tbbtnn.exe 636 pvjvj.exe 4808 046282.exe 4456 rfrfxlf.exe 2368 406800.exe 4916 tthhhh.exe 4368 84486.exe 2060 288264.exe 3368 864862.exe 5080 048642.exe 1324 06622.exe 4480 a6642.exe 2656 4842086.exe 4596 rrlxrlx.exe 184 602488.exe 4908 nhtbtn.exe 4944 8082008.exe 4336 frrfrlx.exe 2836 60088.exe 396 3jddj.exe 1336 204422.exe 2540 lrrfrfx.exe 3584 66648.exe 3476 vddjd.exe 312 pjvvj.exe 2420 2004084.exe 4164 7fxfxlx.exe 3836 dvpdp.exe 2248 vvpdj.exe 3788 hnhbth.exe 4700 nbhbbb.exe 764 tbhbnn.exe 3820 c660448.exe 696 20260.exe 5052 w84260.exe 1608 bbbhbb.exe -
resource yara_rule behavioral2/memory/2912-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/312-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3004-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1152-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4240-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2264-41-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/652-33-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2264-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1712-59-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1632-52-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3552-77-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4404-84-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/744-90-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1616-94-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1272-99-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1512-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/608-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2080-123-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2652-121-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2652-129-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3776-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3536-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4808-184-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/636-178-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4480-213-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4596-218-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2656-217-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4336-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2836-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/396-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2540-249-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3584-253-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/312-260-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4164-267-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3836-271-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4700-281-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3820-288-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4744-301-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-308-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2312-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2908-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3616-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5032-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4560-364-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2380-368-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4368-402-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2008-424-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4916-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4464-447-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4256-472-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-476-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2432-480-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/764-487-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3440-497-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3252-510-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1528-529-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1468-557-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2432-649-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/244-671-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1528-696-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1804-883-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5vvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 600488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 448222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3frxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6226004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rlxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2682884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1152 2912 b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe 85 PID 2912 wrote to memory of 1152 2912 b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe 85 PID 2912 wrote to memory of 1152 2912 b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe 85 PID 1152 wrote to memory of 2816 1152 fxlxlrf.exe 86 PID 1152 wrote to memory of 2816 1152 fxlxlrf.exe 86 PID 1152 wrote to memory of 2816 1152 fxlxlrf.exe 86 PID 2816 wrote to memory of 3004 2816 nnhhtn.exe 87 PID 2816 wrote to memory of 3004 2816 nnhhtn.exe 87 PID 2816 wrote to memory of 3004 2816 nnhhtn.exe 87 PID 3004 wrote to memory of 312 3004 3pjdp.exe 88 PID 3004 wrote to memory of 312 3004 3pjdp.exe 88 PID 3004 wrote to memory of 312 3004 3pjdp.exe 88 PID 312 wrote to memory of 652 312 jvpjp.exe 89 PID 312 wrote to memory of 652 312 jvpjp.exe 89 PID 312 wrote to memory of 652 312 jvpjp.exe 89 PID 652 wrote to memory of 4240 652 rlfxxfl.exe 90 PID 652 wrote to memory of 4240 652 rlfxxfl.exe 90 PID 652 wrote to memory of 4240 652 rlfxxfl.exe 90 PID 4240 wrote to memory of 2264 4240 nnnhhh.exe 91 PID 4240 wrote to memory of 2264 4240 nnnhhh.exe 91 PID 4240 wrote to memory of 2264 4240 nnnhhh.exe 91 PID 2264 wrote to memory of 1632 2264 866048.exe 92 PID 2264 wrote to memory of 1632 2264 866048.exe 92 PID 2264 wrote to memory of 1632 2264 866048.exe 92 PID 1632 wrote to memory of 2432 1632 pvdvv.exe 93 PID 1632 wrote to memory of 2432 1632 pvdvv.exe 93 PID 1632 wrote to memory of 2432 1632 pvdvv.exe 93 PID 2432 wrote to memory of 1712 2432 o660488.exe 94 PID 2432 wrote to memory of 1712 2432 o660488.exe 94 PID 2432 wrote to memory of 1712 2432 o660488.exe 94 PID 1712 wrote to memory of 4928 1712 228600.exe 95 PID 1712 wrote to memory of 4928 1712 228600.exe 95 PID 1712 wrote to memory of 4928 1712 228600.exe 95 PID 4928 wrote to memory of 3552 4928 60660.exe 96 PID 4928 wrote to memory of 3552 4928 60660.exe 96 PID 4928 wrote to memory of 3552 4928 60660.exe 96 PID 3552 wrote to memory of 4404 3552 088200.exe 97 PID 3552 wrote to memory of 4404 3552 088200.exe 97 PID 3552 wrote to memory of 4404 3552 088200.exe 97 PID 4404 wrote to memory of 744 4404 jvdvp.exe 98 PID 4404 wrote to memory of 744 4404 jvdvp.exe 98 PID 4404 wrote to memory of 744 4404 jvdvp.exe 98 PID 744 wrote to memory of 1616 744 0462604.exe 99 PID 744 wrote to memory of 1616 744 0462604.exe 99 PID 744 wrote to memory of 1616 744 0462604.exe 99 PID 1616 wrote to memory of 1272 1616 8848826.exe 100 PID 1616 wrote to memory of 1272 1616 8848826.exe 100 PID 1616 wrote to memory of 1272 1616 8848826.exe 100 PID 1272 wrote to memory of 1512 1272 7frllll.exe 101 PID 1272 wrote to memory of 1512 1272 7frllll.exe 101 PID 1272 wrote to memory of 1512 1272 7frllll.exe 101 PID 1512 wrote to memory of 2364 1512 lflfxrl.exe 102 PID 1512 wrote to memory of 2364 1512 lflfxrl.exe 102 PID 1512 wrote to memory of 2364 1512 lflfxrl.exe 102 PID 2364 wrote to memory of 608 2364 nhhhbb.exe 103 PID 2364 wrote to memory of 608 2364 nhhhbb.exe 103 PID 2364 wrote to memory of 608 2364 nhhhbb.exe 103 PID 608 wrote to memory of 2080 608 202622.exe 104 PID 608 wrote to memory of 2080 608 202622.exe 104 PID 608 wrote to memory of 2080 608 202622.exe 104 PID 2080 wrote to memory of 2652 2080 6448484.exe 105 PID 2080 wrote to memory of 2652 2080 6448484.exe 105 PID 2080 wrote to memory of 2652 2080 6448484.exe 105 PID 2652 wrote to memory of 3776 2652 btnnhh.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe"C:\Users\Admin\AppData\Local\Temp\b8058d1dee529ebcb82558093957efe08c0104afeb399c4589f8276b20d4a2d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\fxlxlrf.exec:\fxlxlrf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\nnhhtn.exec:\nnhhtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\3pjdp.exec:\3pjdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\jvpjp.exec:\jvpjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
\??\c:\rlfxxfl.exec:\rlfxxfl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
\??\c:\nnnhhh.exec:\nnnhhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\866048.exec:\866048.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\pvdvv.exec:\pvdvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\o660488.exec:\o660488.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\228600.exec:\228600.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\60660.exec:\60660.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\088200.exec:\088200.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
\??\c:\jvdvp.exec:\jvdvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\0462604.exec:\0462604.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
\??\c:\8848826.exec:\8848826.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\7frllll.exec:\7frllll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\lflfxrl.exec:\lflfxrl.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\nhhhbb.exec:\nhhhbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\202622.exec:\202622.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
\??\c:\6448484.exec:\6448484.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\btnnhh.exec:\btnnhh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\2228260.exec:\2228260.exe23⤵
- Executes dropped EXE
PID:3776 -
\??\c:\pjjdv.exec:\pjjdv.exe24⤵
- Executes dropped EXE
PID:464 -
\??\c:\80882.exec:\80882.exe25⤵
- Executes dropped EXE
PID:4500 -
\??\c:\pvjdv.exec:\pvjdv.exe26⤵
- Executes dropped EXE
PID:3852 -
\??\c:\lfxxxxx.exec:\lfxxxxx.exe27⤵
- Executes dropped EXE
PID:1468 -
\??\c:\802448.exec:\802448.exe28⤵
- Executes dropped EXE
PID:2252 -
\??\c:\04862.exec:\04862.exe29⤵
- Executes dropped EXE
PID:3536 -
\??\c:\tbbtnn.exec:\tbbtnn.exe30⤵
- Executes dropped EXE
PID:3496 -
\??\c:\pvjvj.exec:\pvjvj.exe31⤵
- Executes dropped EXE
PID:636 -
\??\c:\046282.exec:\046282.exe32⤵
- Executes dropped EXE
PID:4808 -
\??\c:\rfrfxlf.exec:\rfrfxlf.exe33⤵
- Executes dropped EXE
PID:4456 -
\??\c:\406800.exec:\406800.exe34⤵
- Executes dropped EXE
PID:2368 -
\??\c:\tthhhh.exec:\tthhhh.exe35⤵
- Executes dropped EXE
PID:4916 -
\??\c:\84486.exec:\84486.exe36⤵
- Executes dropped EXE
PID:4368 -
\??\c:\288264.exec:\288264.exe37⤵
- Executes dropped EXE
PID:2060 -
\??\c:\864862.exec:\864862.exe38⤵
- Executes dropped EXE
PID:3368 -
\??\c:\048642.exec:\048642.exe39⤵
- Executes dropped EXE
PID:5080 -
\??\c:\06622.exec:\06622.exe40⤵
- Executes dropped EXE
PID:1324 -
\??\c:\a6642.exec:\a6642.exe41⤵
- Executes dropped EXE
PID:4480 -
\??\c:\4842086.exec:\4842086.exe42⤵
- Executes dropped EXE
PID:2656 -
\??\c:\rrlxrlx.exec:\rrlxrlx.exe43⤵
- Executes dropped EXE
PID:4596 -
\??\c:\602488.exec:\602488.exe44⤵
- Executes dropped EXE
PID:184 -
\??\c:\nhtbtn.exec:\nhtbtn.exe45⤵
- Executes dropped EXE
PID:4908 -
\??\c:\8082008.exec:\8082008.exe46⤵
- Executes dropped EXE
PID:4944 -
\??\c:\frrfrlx.exec:\frrfrlx.exe47⤵
- Executes dropped EXE
PID:4336 -
\??\c:\60088.exec:\60088.exe48⤵
- Executes dropped EXE
PID:2836 -
\??\c:\3jddj.exec:\3jddj.exe49⤵
- Executes dropped EXE
PID:396 -
\??\c:\204422.exec:\204422.exe50⤵
- Executes dropped EXE
PID:1336 -
\??\c:\lrrfrfx.exec:\lrrfrfx.exe51⤵
- Executes dropped EXE
PID:2540 -
\??\c:\66648.exec:\66648.exe52⤵
- Executes dropped EXE
PID:3584 -
\??\c:\vddjd.exec:\vddjd.exe53⤵
- Executes dropped EXE
PID:3476 -
\??\c:\pjvvj.exec:\pjvvj.exe54⤵
- Executes dropped EXE
PID:312 -
\??\c:\2004084.exec:\2004084.exe55⤵
- Executes dropped EXE
PID:2420 -
\??\c:\7fxfxlx.exec:\7fxfxlx.exe56⤵
- Executes dropped EXE
PID:4164 -
\??\c:\dvpdp.exec:\dvpdp.exe57⤵
- Executes dropped EXE
PID:3836 -
\??\c:\vvpdj.exec:\vvpdj.exe58⤵
- Executes dropped EXE
PID:2248 -
\??\c:\hnhbth.exec:\hnhbth.exe59⤵
- Executes dropped EXE
PID:3788 -
\??\c:\nbhbbb.exec:\nbhbbb.exe60⤵
- Executes dropped EXE
PID:4700 -
\??\c:\tbhbnn.exec:\tbhbnn.exe61⤵
- Executes dropped EXE
PID:764 -
\??\c:\c660448.exec:\c660448.exe62⤵
- Executes dropped EXE
PID:3820 -
\??\c:\20260.exec:\20260.exe63⤵
- Executes dropped EXE
PID:696 -
\??\c:\w84260.exec:\w84260.exe64⤵
- Executes dropped EXE
PID:5052 -
\??\c:\bbbhbb.exec:\bbbhbb.exe65⤵
- Executes dropped EXE
PID:1608 -
\??\c:\s8882.exec:\s8882.exe66⤵PID:4744
-
\??\c:\nntnbb.exec:\nntnbb.exe67⤵PID:2428
-
\??\c:\84004.exec:\84004.exe68⤵PID:4004
-
\??\c:\vpjdv.exec:\vpjdv.exe69⤵PID:2312
-
\??\c:\4426020.exec:\4426020.exe70⤵PID:2908
-
\??\c:\frxrlfl.exec:\frxrlfl.exe71⤵PID:2208
-
\??\c:\8626048.exec:\8626048.exe72⤵PID:1904
-
\??\c:\c264860.exec:\c264860.exe73⤵PID:3540
-
\??\c:\lxxxrll.exec:\lxxxrll.exe74⤵PID:2016
-
\??\c:\866422.exec:\866422.exe75⤵PID:3616
-
\??\c:\08488.exec:\08488.exe76⤵PID:3392
-
\??\c:\88864.exec:\88864.exe77⤵PID:3480
-
\??\c:\vjpjd.exec:\vjpjd.exe78⤵PID:5032
-
\??\c:\2064488.exec:\2064488.exe79⤵PID:1216
-
\??\c:\2286426.exec:\2286426.exe80⤵PID:1008
-
\??\c:\228086.exec:\228086.exe81⤵PID:464
-
\??\c:\7frxlfx.exec:\7frxlfx.exe82⤵PID:1424
-
\??\c:\64024.exec:\64024.exe83⤵PID:1468
-
\??\c:\4286646.exec:\4286646.exe84⤵PID:1624
-
\??\c:\btbtnt.exec:\btbtnt.exe85⤵PID:4560
-
\??\c:\4004604.exec:\4004604.exe86⤵PID:2380
-
\??\c:\g0820.exec:\g0820.exe87⤵PID:3916
-
\??\c:\440486.exec:\440486.exe88⤵PID:2344
-
\??\c:\28820.exec:\28820.exe89⤵PID:3496
-
\??\c:\vdjpd.exec:\vdjpd.exe90⤵PID:2960
-
\??\c:\0660860.exec:\0660860.exe91⤵PID:752
-
\??\c:\40660.exec:\40660.exe92⤵PID:1620
-
\??\c:\thhthh.exec:\thhthh.exe93⤵PID:4400
-
\??\c:\628866.exec:\628866.exe94⤵PID:2864
-
\??\c:\6288666.exec:\6288666.exe95⤵PID:2368
-
\??\c:\u888260.exec:\u888260.exe96⤵PID:4916
-
\??\c:\thhbbt.exec:\thhbbt.exe97⤵PID:4368
-
\??\c:\8848660.exec:\8848660.exe98⤵PID:1516
-
\??\c:\844202.exec:\844202.exe99⤵PID:4000
-
\??\c:\vddpv.exec:\vddpv.exe100⤵PID:4676
-
\??\c:\g2204.exec:\g2204.exe101⤵PID:3320
-
\??\c:\62848.exec:\62848.exe102⤵PID:4356
-
\??\c:\068200.exec:\068200.exe103⤵PID:2200
-
\??\c:\jdvvd.exec:\jdvvd.exe104⤵PID:2008
-
\??\c:\3fxlxrr.exec:\3fxlxrr.exe105⤵PID:1132
-
\??\c:\80044.exec:\80044.exe106⤵PID:3572
-
\??\c:\6004226.exec:\6004226.exe107⤵PID:4316
-
\??\c:\e62646.exec:\e62646.exe108⤵PID:1224
-
\??\c:\frrfrlf.exec:\frrfrlf.exe109⤵PID:4452
-
\??\c:\606486.exec:\606486.exe110⤵PID:880
-
\??\c:\20200.exec:\20200.exe111⤵PID:4464
-
\??\c:\u848608.exec:\u848608.exe112⤵PID:3004
-
\??\c:\lxxlrlx.exec:\lxxlrlx.exe113⤵PID:4388
-
\??\c:\6248448.exec:\6248448.exe114⤵PID:2052
-
\??\c:\0804822.exec:\0804822.exe115⤵PID:3376
-
\??\c:\08264.exec:\08264.exe116⤵PID:2416
-
\??\c:\nhnhhh.exec:\nhnhhh.exe117⤵PID:3324
-
\??\c:\040860.exec:\040860.exe118⤵PID:4008
-
\??\c:\062662.exec:\062662.exe119⤵PID:4256
-
\??\c:\pvvjv.exec:\pvvjv.exe120⤵PID:3772
-
\??\c:\ffffrfr.exec:\ffffrfr.exe121⤵PID:2432
-
\??\c:\w88262.exec:\w88262.exe122⤵PID:4860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-