Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe
Resource
win7-20241010-en
7 signatures
120 seconds
General
-
Target
95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe
-
Size
454KB
-
MD5
59859c3a14a2f2ce896f7a287b277c50
-
SHA1
f993b0eba18aafcf985843d285935f8c84682fe0
-
SHA256
95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2
-
SHA512
6113c5ec2dde22e30dcfd9fbdd7d66ec7ea4f1e7753f809f3e6b6d076b2745f244b5cfe63d48e5f8ce46491c9d0f7befdb25e26e20c2c8bd98902e3ba55f68e1
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeT8:q7Tc2NYHUrAwfMp3CDo
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 62 IoCs
resource yara_rule behavioral2/memory/3692-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3120-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2328-16-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4404-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4956-33-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1328-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4324-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2124-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/960-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1360-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3392-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4980-67-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3964-79-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1508-90-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3124-95-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2316-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4264-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4860-116-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3832-122-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1164-128-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2220-133-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3080-114-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1732-153-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4748-164-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1916-170-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5056-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3712-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2984-188-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3936-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1500-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4888-203-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2140-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4212-223-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/804-230-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1776-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4508-247-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4648-290-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2596-315-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3536-325-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2284-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/860-336-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4572-340-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2988-344-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1168-351-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2524-373-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4768-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2384-396-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2376-440-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3948-444-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1596-451-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4416-455-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2896-459-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1048-475-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3500-488-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3620-576-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3388-604-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1268-614-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4484-650-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1508-741-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1612-757-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3532-809-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3172-1092-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4404 4842664.exe 3120 jdjdv.exe 2328 64604.exe 4956 flrrlrr.exe 1328 pdjjd.exe 4324 llxrrxr.exe 2124 nnbtht.exe 960 nnhtbh.exe 1360 lxfxllf.exe 4980 hnhbhn.exe 3392 7vpvv.exe 3964 9xxrxfl.exe 1628 bnnnnb.exe 1508 s0420.exe 3124 frfxrrl.exe 2316 a8066.exe 4264 nhnnbb.exe 4860 q80444.exe 3080 dpjdv.exe 3832 xrfflrx.exe 1164 fxlflll.exe 2220 i408888.exe 2464 46082.exe 4656 jddvv.exe 1732 280088.exe 2860 httnhb.exe 4748 m2480.exe 1916 08040.exe 5056 httnhh.exe 3712 6048002.exe 2984 62826.exe 3936 880400.exe 744 lxxrllf.exe 1500 k06042.exe 4888 06226.exe 4756 frxxxrf.exe 1576 7pvpj.exe 1568 684048.exe 2140 rfrlllf.exe 1720 20248.exe 4212 04266.exe 404 vdpjp.exe 804 djdpj.exe 4760 pvdvp.exe 3308 2666064.exe 1776 0468440.exe 4184 7nthbb.exe 4508 ttttnn.exe 3604 40482.exe 2960 tbthbt.exe 3692 c680646.exe 4040 q64808.exe 4992 06022.exe 3172 jvvjj.exe 2328 62448.exe 4956 28048.exe 2320 3jppj.exe 3988 68482.exe 3196 pjjjd.exe 760 jvjdp.exe 1524 606088.exe 4648 hnbbtn.exe 3368 0060800.exe 3912 a4640.exe -
resource yara_rule behavioral2/memory/3692-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3120-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2328-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4404-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3120-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4956-24-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4956-33-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1328-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/960-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2124-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/960-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1360-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3392-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4980-67-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1508-90-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3124-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2316-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4264-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4860-116-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3832-122-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1164-128-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2220-133-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3080-114-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1732-153-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4748-164-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1916-170-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5056-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3712-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2984-188-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3936-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1500-199-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4888-203-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2140-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4212-223-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/804-230-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1776-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4508-247-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4648-290-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2596-315-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3536-325-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2284-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/860-336-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4572-340-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2988-344-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1168-351-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2524-373-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4768-383-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2384-396-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2376-440-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3948-444-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1596-451-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4416-455-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2896-459-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1048-475-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3500-488-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3620-576-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3388-604-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1268-614-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4484-646-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/744-645-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4484-650-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1508-741-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hthbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrlffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w22600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2666064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlfrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxlfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 206046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xrrlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4404 3692 95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe 83 PID 3692 wrote to memory of 4404 3692 95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe 83 PID 3692 wrote to memory of 4404 3692 95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe 83 PID 4404 wrote to memory of 3120 4404 4842664.exe 84 PID 4404 wrote to memory of 3120 4404 4842664.exe 84 PID 4404 wrote to memory of 3120 4404 4842664.exe 84 PID 3120 wrote to memory of 2328 3120 jdjdv.exe 85 PID 3120 wrote to memory of 2328 3120 jdjdv.exe 85 PID 3120 wrote to memory of 2328 3120 jdjdv.exe 85 PID 2328 wrote to memory of 4956 2328 64604.exe 86 PID 2328 wrote to memory of 4956 2328 64604.exe 86 PID 2328 wrote to memory of 4956 2328 64604.exe 86 PID 4956 wrote to memory of 1328 4956 flrrlrr.exe 87 PID 4956 wrote to memory of 1328 4956 flrrlrr.exe 87 PID 4956 wrote to memory of 1328 4956 flrrlrr.exe 87 PID 1328 wrote to memory of 4324 1328 pdjjd.exe 88 PID 1328 wrote to memory of 4324 1328 pdjjd.exe 88 PID 1328 wrote to memory of 4324 1328 pdjjd.exe 88 PID 4324 wrote to memory of 2124 4324 llxrrxr.exe 89 PID 4324 wrote to memory of 2124 4324 llxrrxr.exe 89 PID 4324 wrote to memory of 2124 4324 llxrrxr.exe 89 PID 2124 wrote to memory of 960 2124 nnbtht.exe 90 PID 2124 wrote to memory of 960 2124 nnbtht.exe 90 PID 2124 wrote to memory of 960 2124 nnbtht.exe 90 PID 960 wrote to memory of 1360 960 nnhtbh.exe 91 PID 960 wrote to memory of 1360 960 nnhtbh.exe 91 PID 960 wrote to memory of 1360 960 nnhtbh.exe 91 PID 1360 wrote to memory of 4980 1360 lxfxllf.exe 92 PID 1360 wrote to memory of 4980 1360 lxfxllf.exe 92 PID 1360 wrote to memory of 4980 1360 lxfxllf.exe 92 PID 4980 wrote to memory of 3392 4980 hnhbhn.exe 93 PID 4980 wrote to memory of 3392 4980 hnhbhn.exe 93 PID 4980 wrote to memory of 3392 4980 hnhbhn.exe 93 PID 3392 wrote to memory of 3964 3392 7vpvv.exe 94 PID 3392 wrote to memory of 3964 3392 7vpvv.exe 94 PID 3392 wrote to memory of 3964 3392 7vpvv.exe 94 PID 3964 wrote to memory of 1628 3964 9xxrxfl.exe 95 PID 3964 wrote to memory of 1628 3964 9xxrxfl.exe 95 PID 3964 wrote to memory of 1628 3964 9xxrxfl.exe 95 PID 1628 wrote to memory of 1508 1628 bnnnnb.exe 96 PID 1628 wrote to memory of 1508 1628 bnnnnb.exe 96 PID 1628 wrote to memory of 1508 1628 bnnnnb.exe 96 PID 1508 wrote to memory of 3124 1508 s0420.exe 97 PID 1508 wrote to memory of 3124 1508 s0420.exe 97 PID 1508 wrote to memory of 3124 1508 s0420.exe 97 PID 3124 wrote to memory of 2316 3124 frfxrrl.exe 98 PID 3124 wrote to memory of 2316 3124 frfxrrl.exe 98 PID 3124 wrote to memory of 2316 3124 frfxrrl.exe 98 PID 2316 wrote to memory of 4264 2316 a8066.exe 99 PID 2316 wrote to memory of 4264 2316 a8066.exe 99 PID 2316 wrote to memory of 4264 2316 a8066.exe 99 PID 4264 wrote to memory of 4860 4264 nhnnbb.exe 100 PID 4264 wrote to memory of 4860 4264 nhnnbb.exe 100 PID 4264 wrote to memory of 4860 4264 nhnnbb.exe 100 PID 4860 wrote to memory of 3080 4860 q80444.exe 101 PID 4860 wrote to memory of 3080 4860 q80444.exe 101 PID 4860 wrote to memory of 3080 4860 q80444.exe 101 PID 3080 wrote to memory of 3832 3080 dpjdv.exe 102 PID 3080 wrote to memory of 3832 3080 dpjdv.exe 102 PID 3080 wrote to memory of 3832 3080 dpjdv.exe 102 PID 3832 wrote to memory of 1164 3832 xrfflrx.exe 103 PID 3832 wrote to memory of 1164 3832 xrfflrx.exe 103 PID 3832 wrote to memory of 1164 3832 xrfflrx.exe 103 PID 1164 wrote to memory of 2220 1164 fxlflll.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe"C:\Users\Admin\AppData\Local\Temp\95c8e539630b8edf258114fb57c4241a9ae8a9e1d3c03bf2c3f8c1f5efaf32a2N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
\??\c:\4842664.exec:\4842664.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\jdjdv.exec:\jdjdv.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
\??\c:\64604.exec:\64604.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\flrrlrr.exec:\flrrlrr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\pdjjd.exec:\pdjjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
\??\c:\llxrrxr.exec:\llxrrxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\nnbtht.exec:\nnbtht.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\nnhtbh.exec:\nnhtbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\lxfxllf.exec:\lxfxllf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
\??\c:\hnhbhn.exec:\hnhbhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\7vpvv.exec:\7vpvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
\??\c:\9xxrxfl.exec:\9xxrxfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\bnnnnb.exec:\bnnnnb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\s0420.exec:\s0420.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\frfxrrl.exec:\frfxrrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\a8066.exec:\a8066.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\nhnnbb.exec:\nhnnbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
\??\c:\q80444.exec:\q80444.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\dpjdv.exec:\dpjdv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\xrfflrx.exec:\xrfflrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\fxlflll.exec:\fxlflll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\i408888.exec:\i408888.exe23⤵
- Executes dropped EXE
PID:2220 -
\??\c:\46082.exec:\46082.exe24⤵
- Executes dropped EXE
PID:2464 -
\??\c:\jddvv.exec:\jddvv.exe25⤵
- Executes dropped EXE
PID:4656 -
\??\c:\280088.exec:\280088.exe26⤵
- Executes dropped EXE
PID:1732 -
\??\c:\httnhb.exec:\httnhb.exe27⤵
- Executes dropped EXE
PID:2860 -
\??\c:\m2480.exec:\m2480.exe28⤵
- Executes dropped EXE
PID:4748 -
\??\c:\08040.exec:\08040.exe29⤵
- Executes dropped EXE
PID:1916 -
\??\c:\httnhh.exec:\httnhh.exe30⤵
- Executes dropped EXE
PID:5056 -
\??\c:\6048002.exec:\6048002.exe31⤵
- Executes dropped EXE
PID:3712 -
\??\c:\62826.exec:\62826.exe32⤵
- Executes dropped EXE
PID:2984 -
\??\c:\880400.exec:\880400.exe33⤵
- Executes dropped EXE
PID:3936 -
\??\c:\lxxrllf.exec:\lxxrllf.exe34⤵
- Executes dropped EXE
PID:744 -
\??\c:\k06042.exec:\k06042.exe35⤵
- Executes dropped EXE
PID:1500 -
\??\c:\06226.exec:\06226.exe36⤵
- Executes dropped EXE
PID:4888 -
\??\c:\frxxxrf.exec:\frxxxrf.exe37⤵
- Executes dropped EXE
PID:4756 -
\??\c:\7pvpj.exec:\7pvpj.exe38⤵
- Executes dropped EXE
PID:1576 -
\??\c:\684048.exec:\684048.exe39⤵
- Executes dropped EXE
PID:1568 -
\??\c:\rfrlllf.exec:\rfrlllf.exe40⤵
- Executes dropped EXE
PID:2140 -
\??\c:\20248.exec:\20248.exe41⤵
- Executes dropped EXE
PID:1720 -
\??\c:\04266.exec:\04266.exe42⤵
- Executes dropped EXE
PID:4212 -
\??\c:\vdpjp.exec:\vdpjp.exe43⤵
- Executes dropped EXE
PID:404 -
\??\c:\djdpj.exec:\djdpj.exe44⤵
- Executes dropped EXE
PID:804 -
\??\c:\pvdvp.exec:\pvdvp.exe45⤵
- Executes dropped EXE
PID:4760 -
\??\c:\2666064.exec:\2666064.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308 -
\??\c:\0468440.exec:\0468440.exe47⤵
- Executes dropped EXE
PID:1776 -
\??\c:\7nthbb.exec:\7nthbb.exe48⤵
- Executes dropped EXE
PID:4184 -
\??\c:\ttttnn.exec:\ttttnn.exe49⤵
- Executes dropped EXE
PID:4508 -
\??\c:\40482.exec:\40482.exe50⤵
- Executes dropped EXE
PID:3604 -
\??\c:\tbthbt.exec:\tbthbt.exe51⤵
- Executes dropped EXE
PID:2960 -
\??\c:\c680646.exec:\c680646.exe52⤵
- Executes dropped EXE
PID:3692 -
\??\c:\q64808.exec:\q64808.exe53⤵
- Executes dropped EXE
PID:4040 -
\??\c:\06022.exec:\06022.exe54⤵
- Executes dropped EXE
PID:4992 -
\??\c:\jvvjj.exec:\jvvjj.exe55⤵
- Executes dropped EXE
PID:3172 -
\??\c:\62448.exec:\62448.exe56⤵
- Executes dropped EXE
PID:2328 -
\??\c:\28048.exec:\28048.exe57⤵
- Executes dropped EXE
PID:4956 -
\??\c:\3jppj.exec:\3jppj.exe58⤵
- Executes dropped EXE
PID:2320 -
\??\c:\68482.exec:\68482.exe59⤵
- Executes dropped EXE
PID:3988 -
\??\c:\pjjjd.exec:\pjjjd.exe60⤵
- Executes dropped EXE
PID:3196 -
\??\c:\jvjdp.exec:\jvjdp.exe61⤵
- Executes dropped EXE
PID:760 -
\??\c:\606088.exec:\606088.exe62⤵
- Executes dropped EXE
PID:1524 -
\??\c:\hnbbtn.exec:\hnbbtn.exe63⤵
- Executes dropped EXE
PID:4648 -
\??\c:\0060800.exec:\0060800.exe64⤵
- Executes dropped EXE
PID:3368 -
\??\c:\a4640.exec:\a4640.exe65⤵
- Executes dropped EXE
PID:3912 -
\??\c:\bttttb.exec:\bttttb.exe66⤵PID:2108
-
\??\c:\lfxrllx.exec:\lfxrllx.exe67⤵PID:2772
-
\??\c:\g8600.exec:\g8600.exe68⤵PID:860
-
\??\c:\628200.exec:\628200.exe69⤵PID:1700
-
\??\c:\tttthn.exec:\tttthn.exe70⤵PID:3964
-
\??\c:\8868066.exec:\8868066.exe71⤵PID:2596
-
\??\c:\04606.exec:\04606.exe72⤵PID:3684
-
\??\c:\024822.exec:\024822.exe73⤵PID:2164
-
\??\c:\rllfxrl.exec:\rllfxrl.exe74⤵
- System Location Discovery: System Language Discovery
PID:3536 -
\??\c:\m4044.exec:\m4044.exe75⤵PID:2284
-
\??\c:\8066066.exec:\8066066.exe76⤵PID:4264
-
\??\c:\46206.exec:\46206.exe77⤵PID:1252
-
\??\c:\dvjdv.exec:\dvjdv.exe78⤵PID:4572
-
\??\c:\xfrrffl.exec:\xfrrffl.exe79⤵PID:2988
-
\??\c:\dvvpj.exec:\dvvpj.exe80⤵PID:4952
-
\??\c:\46222.exec:\46222.exe81⤵PID:1168
-
\??\c:\486628.exec:\486628.exe82⤵PID:4432
-
\??\c:\8466602.exec:\8466602.exe83⤵PID:4340
-
\??\c:\lfxxrrr.exec:\lfxxrrr.exe84⤵PID:2568
-
\??\c:\llxxlrl.exec:\llxxlrl.exe85⤵PID:5076
-
\??\c:\26860.exec:\26860.exe86⤵PID:2820
-
\??\c:\jpvpp.exec:\jpvpp.exe87⤵PID:1412
-
\??\c:\jdddv.exec:\jdddv.exe88⤵PID:2524
-
\??\c:\pjpvp.exec:\pjpvp.exe89⤵PID:2860
-
\??\c:\ddpjd.exec:\ddpjd.exe90⤵PID:4640
-
\??\c:\402600.exec:\402600.exe91⤵PID:4768
-
\??\c:\9dvjd.exec:\9dvjd.exe92⤵PID:2936
-
\??\c:\0886488.exec:\0886488.exe93⤵PID:2288
-
\??\c:\444080.exec:\444080.exe94⤵PID:4584
-
\??\c:\6646246.exec:\6646246.exe95⤵PID:2384
-
\??\c:\tnnntt.exec:\tnnntt.exe96⤵PID:3472
-
\??\c:\nhnnnt.exec:\nhnnnt.exe97⤵PID:2508
-
\??\c:\26266.exec:\26266.exe98⤵PID:3452
-
\??\c:\5lxrlff.exec:\5lxrlff.exe99⤵PID:3640
-
\??\c:\844044.exec:\844044.exe100⤵PID:1388
-
\??\c:\hthbtb.exec:\hthbtb.exe101⤵
- System Location Discovery: System Language Discovery
PID:4052 -
\??\c:\nhhbtt.exec:\nhhbtt.exe102⤵PID:2396
-
\??\c:\6008226.exec:\6008226.exe103⤵PID:4644
-
\??\c:\hnbnth.exec:\hnbnth.exe104⤵PID:1864
-
\??\c:\llllfxr.exec:\llllfxr.exe105⤵PID:3700
-
\??\c:\dpdvp.exec:\dpdvp.exe106⤵PID:1264
-
\??\c:\jjjvp.exec:\jjjvp.exe107⤵PID:4104
-
\??\c:\a4426.exec:\a4426.exe108⤵PID:2432
-
\??\c:\lxxxrlf.exec:\lxxxrlf.exe109⤵PID:2376
-
\??\c:\m8062.exec:\m8062.exe110⤵PID:3948
-
\??\c:\4026826.exec:\4026826.exe111⤵PID:2972
-
\??\c:\628260.exec:\628260.exe112⤵PID:1596
-
\??\c:\7tbttt.exec:\7tbttt.exe113⤵PID:4416
-
\??\c:\5rrlrrl.exec:\5rrlrrl.exe114⤵PID:2896
-
\??\c:\u080448.exec:\u080448.exe115⤵PID:3112
-
\??\c:\262622.exec:\262622.exe116⤵PID:4008
-
\??\c:\tbnhbb.exec:\tbnhbb.exe117⤵PID:1444
-
\??\c:\nhnhbn.exec:\nhnhbn.exe118⤵PID:1140
-
\??\c:\080860.exec:\080860.exe119⤵PID:1048
-
\??\c:\60282.exec:\60282.exe120⤵PID:4588
-
\??\c:\lrfrxxr.exec:\lrfrxxr.exe121⤵PID:4132
-
\??\c:\ddjvp.exec:\ddjvp.exe122⤵PID:2052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-