Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 20:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe
-
Size
453KB
-
MD5
782ec8d725856c099794e4f8e7b9c4a0
-
SHA1
1340978970548913fa4f4d2f56be0f54a547eaa9
-
SHA256
94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1
-
SHA512
e264f4afdd4902da3cab52f621b35b9bf82660b0ba4b7fb9e5a1d58c06ffbdbe99a18681ceec08bde26c85d4c4395d92b2f0f2fde7362fe16cebd2a71a559773
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbef:q7Tc2NYHUrAwfMp3CDf
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4460-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3664-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3328-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4844-23-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1604-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3628-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2952-50-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1680-56-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2452-68-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4192-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/716-81-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/436-87-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3576-100-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4004-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3240-94-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4820-110-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4448-122-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3948-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4196-140-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2588-146-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/740-139-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2792-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4552-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1404-176-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2896-185-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5100-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3032-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2652-204-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3940-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1108-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4024-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4596-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4364-233-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/516-246-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1396-250-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4896-254-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3132-276-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4772-295-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1860-299-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3308-309-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3240-316-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4004-326-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4204-333-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3484-349-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3404-359-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1504-360-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1812-367-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2412-371-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1100-378-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4816-385-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2552-392-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1748-402-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/912-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/924-447-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1552-451-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2284-461-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3952-519-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/956-547-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1100-575-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4848-606-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2052-823-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2172-866-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1348-1011-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4108-1965-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3664 rlfxflf.exe 1872 pppvj.exe 3328 vvddj.exe 4844 40208.exe 1604 frrxrxx.exe 712 ffrrlxf.exe 3628 606066.exe 2952 ntbbtn.exe 1680 jvvpp.exe 4828 xrlffff.exe 2452 hbtnnn.exe 4192 9lrlflr.exe 4036 7bhbbb.exe 716 dddvj.exe 436 28882.exe 3240 rlfxrff.exe 3576 g0260.exe 4004 24482.exe 4820 26006.exe 4448 266600.exe 1936 86866.exe 3948 vdvpd.exe 740 606026.exe 4196 vvpjd.exe 2588 fxrfxrl.exe 2792 9vpjv.exe 1244 0804484.exe 4552 4888822.exe 1848 nbnnht.exe 1404 fxffflr.exe 2896 08482.exe 5100 tntntb.exe 4476 6288882.exe 3192 86824.exe 3032 flxrrrx.exe 2652 44666.exe 3940 26662.exe 1108 6280000.exe 4024 3nhnbn.exe 4596 tthhbb.exe 3688 djdvv.exe 220 w08846.exe 1652 5tbbtb.exe 4364 808822.exe 3736 660448.exe 1868 a4460.exe 1168 42208.exe 516 9btnnn.exe 1396 llffxrl.exe 4896 2882604.exe 1640 284860.exe 1588 tbtnhb.exe 224 00086.exe 4492 hnnhtb.exe 4716 jvpjv.exe 1828 1rfxlxr.exe 3132 88486.exe 1824 bhhhhh.exe 2960 nnbbnh.exe 4956 486262.exe 1432 0466266.exe 2664 268222.exe 4772 4422280.exe 1860 02004.exe -
resource yara_rule behavioral2/memory/4460-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3664-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3328-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3328-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4844-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1604-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3628-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2952-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1680-56-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2452-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4036-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4192-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/716-81-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/436-87-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3576-100-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3240-94-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4820-110-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4448-122-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3948-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4196-140-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2588-146-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/740-139-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2792-151-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2792-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4552-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1404-176-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2896-185-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5100-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3032-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2652-204-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3940-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1108-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4024-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4596-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4364-233-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/516-246-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1396-250-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4896-254-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3132-276-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4772-295-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1860-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-309-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3240-316-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4004-326-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4204-333-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3484-349-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3404-359-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1812-367-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2412-371-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1100-378-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4816-385-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2552-392-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1748-402-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/912-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/924-447-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1552-451-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2284-461-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3952-519-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/956-547-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1100-575-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4848-606-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2052-823-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2172-866-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4422280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 426888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8804224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 622662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rrfffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 602248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o626404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6888226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u844880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q40866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0804484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 264040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2000404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rfxffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6220400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 402666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3664 4460 94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe 83 PID 4460 wrote to memory of 3664 4460 94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe 83 PID 4460 wrote to memory of 3664 4460 94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe 83 PID 3664 wrote to memory of 1872 3664 rlfxflf.exe 84 PID 3664 wrote to memory of 1872 3664 rlfxflf.exe 84 PID 3664 wrote to memory of 1872 3664 rlfxflf.exe 84 PID 1872 wrote to memory of 3328 1872 pppvj.exe 85 PID 1872 wrote to memory of 3328 1872 pppvj.exe 85 PID 1872 wrote to memory of 3328 1872 pppvj.exe 85 PID 3328 wrote to memory of 4844 3328 vvddj.exe 86 PID 3328 wrote to memory of 4844 3328 vvddj.exe 86 PID 3328 wrote to memory of 4844 3328 vvddj.exe 86 PID 4844 wrote to memory of 1604 4844 40208.exe 87 PID 4844 wrote to memory of 1604 4844 40208.exe 87 PID 4844 wrote to memory of 1604 4844 40208.exe 87 PID 1604 wrote to memory of 712 1604 frrxrxx.exe 88 PID 1604 wrote to memory of 712 1604 frrxrxx.exe 88 PID 1604 wrote to memory of 712 1604 frrxrxx.exe 88 PID 712 wrote to memory of 3628 712 ffrrlxf.exe 89 PID 712 wrote to memory of 3628 712 ffrrlxf.exe 89 PID 712 wrote to memory of 3628 712 ffrrlxf.exe 89 PID 3628 wrote to memory of 2952 3628 606066.exe 90 PID 3628 wrote to memory of 2952 3628 606066.exe 90 PID 3628 wrote to memory of 2952 3628 606066.exe 90 PID 2952 wrote to memory of 1680 2952 ntbbtn.exe 91 PID 2952 wrote to memory of 1680 2952 ntbbtn.exe 91 PID 2952 wrote to memory of 1680 2952 ntbbtn.exe 91 PID 1680 wrote to memory of 4828 1680 jvvpp.exe 92 PID 1680 wrote to memory of 4828 1680 jvvpp.exe 92 PID 1680 wrote to memory of 4828 1680 jvvpp.exe 92 PID 4828 wrote to memory of 2452 4828 xrlffff.exe 93 PID 4828 wrote to memory of 2452 4828 xrlffff.exe 93 PID 4828 wrote to memory of 2452 4828 xrlffff.exe 93 PID 2452 wrote to memory of 4192 2452 hbtnnn.exe 94 PID 2452 wrote to memory of 4192 2452 hbtnnn.exe 94 PID 2452 wrote to memory of 4192 2452 hbtnnn.exe 94 PID 4192 wrote to memory of 4036 4192 9lrlflr.exe 95 PID 4192 wrote to memory of 4036 4192 9lrlflr.exe 95 PID 4192 wrote to memory of 4036 4192 9lrlflr.exe 95 PID 4036 wrote to memory of 716 4036 7bhbbb.exe 96 PID 4036 wrote to memory of 716 4036 7bhbbb.exe 96 PID 4036 wrote to memory of 716 4036 7bhbbb.exe 96 PID 716 wrote to memory of 436 716 dddvj.exe 97 PID 716 wrote to memory of 436 716 dddvj.exe 97 PID 716 wrote to memory of 436 716 dddvj.exe 97 PID 436 wrote to memory of 3240 436 28882.exe 98 PID 436 wrote to memory of 3240 436 28882.exe 98 PID 436 wrote to memory of 3240 436 28882.exe 98 PID 3240 wrote to memory of 3576 3240 rlfxrff.exe 99 PID 3240 wrote to memory of 3576 3240 rlfxrff.exe 99 PID 3240 wrote to memory of 3576 3240 rlfxrff.exe 99 PID 3576 wrote to memory of 4004 3576 g0260.exe 100 PID 3576 wrote to memory of 4004 3576 g0260.exe 100 PID 3576 wrote to memory of 4004 3576 g0260.exe 100 PID 4004 wrote to memory of 4820 4004 24482.exe 101 PID 4004 wrote to memory of 4820 4004 24482.exe 101 PID 4004 wrote to memory of 4820 4004 24482.exe 101 PID 4820 wrote to memory of 4448 4820 26006.exe 102 PID 4820 wrote to memory of 4448 4820 26006.exe 102 PID 4820 wrote to memory of 4448 4820 26006.exe 102 PID 4448 wrote to memory of 1936 4448 266600.exe 103 PID 4448 wrote to memory of 1936 4448 266600.exe 103 PID 4448 wrote to memory of 1936 4448 266600.exe 103 PID 1936 wrote to memory of 3948 1936 86866.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe"C:\Users\Admin\AppData\Local\Temp\94edf12a1654fdfe9543603faf716808128606c626e4bda5daaf0297abc2dae1N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
\??\c:\rlfxflf.exec:\rlfxflf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\pppvj.exec:\pppvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\vvddj.exec:\vvddj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
\??\c:\40208.exec:\40208.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\frrxrxx.exec:\frrxrxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\ffrrlxf.exec:\ffrrlxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
\??\c:\606066.exec:\606066.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\ntbbtn.exec:\ntbbtn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\jvvpp.exec:\jvvpp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\xrlffff.exec:\xrlffff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\hbtnnn.exec:\hbtnnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\9lrlflr.exec:\9lrlflr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\7bhbbb.exec:\7bhbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
\??\c:\dddvj.exec:\dddvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:716 -
\??\c:\28882.exec:\28882.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\rlfxrff.exec:\rlfxrff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
\??\c:\g0260.exec:\g0260.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
\??\c:\24482.exec:\24482.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\26006.exec:\26006.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\266600.exec:\266600.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\86866.exec:\86866.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\vdvpd.exec:\vdvpd.exe23⤵
- Executes dropped EXE
PID:3948 -
\??\c:\606026.exec:\606026.exe24⤵
- Executes dropped EXE
PID:740 -
\??\c:\vvpjd.exec:\vvpjd.exe25⤵
- Executes dropped EXE
PID:4196 -
\??\c:\fxrfxrl.exec:\fxrfxrl.exe26⤵
- Executes dropped EXE
PID:2588 -
\??\c:\9vpjv.exec:\9vpjv.exe27⤵
- Executes dropped EXE
PID:2792 -
\??\c:\0804484.exec:\0804484.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1244 -
\??\c:\4888822.exec:\4888822.exe29⤵
- Executes dropped EXE
PID:4552 -
\??\c:\nbnnht.exec:\nbnnht.exe30⤵
- Executes dropped EXE
PID:1848 -
\??\c:\fxffflr.exec:\fxffflr.exe31⤵
- Executes dropped EXE
PID:1404 -
\??\c:\08482.exec:\08482.exe32⤵
- Executes dropped EXE
PID:2896 -
\??\c:\tntntb.exec:\tntntb.exe33⤵
- Executes dropped EXE
PID:5100 -
\??\c:\6288882.exec:\6288882.exe34⤵
- Executes dropped EXE
PID:4476 -
\??\c:\86824.exec:\86824.exe35⤵
- Executes dropped EXE
PID:3192 -
\??\c:\flxrrrx.exec:\flxrrrx.exe36⤵
- Executes dropped EXE
PID:3032 -
\??\c:\44666.exec:\44666.exe37⤵
- Executes dropped EXE
PID:2652 -
\??\c:\26662.exec:\26662.exe38⤵
- Executes dropped EXE
PID:3940 -
\??\c:\6280000.exec:\6280000.exe39⤵
- Executes dropped EXE
PID:1108 -
\??\c:\3nhnbn.exec:\3nhnbn.exe40⤵
- Executes dropped EXE
PID:4024 -
\??\c:\tthhbb.exec:\tthhbb.exe41⤵
- Executes dropped EXE
PID:4596 -
\??\c:\djdvv.exec:\djdvv.exe42⤵
- Executes dropped EXE
PID:3688 -
\??\c:\w08846.exec:\w08846.exe43⤵
- Executes dropped EXE
PID:220 -
\??\c:\5tbbtb.exec:\5tbbtb.exe44⤵
- Executes dropped EXE
PID:1652 -
\??\c:\808822.exec:\808822.exe45⤵
- Executes dropped EXE
PID:4364 -
\??\c:\660448.exec:\660448.exe46⤵
- Executes dropped EXE
PID:3736 -
\??\c:\a4460.exec:\a4460.exe47⤵
- Executes dropped EXE
PID:1868 -
\??\c:\42208.exec:\42208.exe48⤵
- Executes dropped EXE
PID:1168 -
\??\c:\9btnnn.exec:\9btnnn.exe49⤵
- Executes dropped EXE
PID:516 -
\??\c:\llffxrl.exec:\llffxrl.exe50⤵
- Executes dropped EXE
PID:1396 -
\??\c:\2882604.exec:\2882604.exe51⤵
- Executes dropped EXE
PID:4896 -
\??\c:\284860.exec:\284860.exe52⤵
- Executes dropped EXE
PID:1640 -
\??\c:\tbtnhb.exec:\tbtnhb.exe53⤵
- Executes dropped EXE
PID:1588 -
\??\c:\00086.exec:\00086.exe54⤵
- Executes dropped EXE
PID:224 -
\??\c:\hnnhtb.exec:\hnnhtb.exe55⤵
- Executes dropped EXE
PID:4492 -
\??\c:\jvpjv.exec:\jvpjv.exe56⤵
- Executes dropped EXE
PID:4716 -
\??\c:\1rfxlxr.exec:\1rfxlxr.exe57⤵
- Executes dropped EXE
PID:1828 -
\??\c:\88486.exec:\88486.exe58⤵
- Executes dropped EXE
PID:3132 -
\??\c:\bhhhhh.exec:\bhhhhh.exe59⤵
- Executes dropped EXE
PID:1824 -
\??\c:\nnbbnh.exec:\nnbbnh.exe60⤵
- Executes dropped EXE
PID:2960 -
\??\c:\486262.exec:\486262.exe61⤵
- Executes dropped EXE
PID:4956 -
\??\c:\0466266.exec:\0466266.exe62⤵
- Executes dropped EXE
PID:1432 -
\??\c:\268222.exec:\268222.exe63⤵
- Executes dropped EXE
PID:2664 -
\??\c:\4422280.exec:\4422280.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772 -
\??\c:\02004.exec:\02004.exe65⤵
- Executes dropped EXE
PID:1860 -
\??\c:\82222.exec:\82222.exe66⤵PID:1960
-
\??\c:\s0220.exec:\s0220.exe67⤵PID:716
-
\??\c:\48280.exec:\48280.exe68⤵PID:3308
-
\??\c:\lrrllrr.exec:\lrrllrr.exe69⤵PID:2800
-
\??\c:\rflffrf.exec:\rflffrf.exe70⤵PID:3240
-
\??\c:\w62648.exec:\w62648.exe71⤵PID:2112
-
\??\c:\s6888.exec:\s6888.exe72⤵PID:1356
-
\??\c:\04882.exec:\04882.exe73⤵PID:4004
-
\??\c:\hbbtnh.exec:\hbbtnh.exe74⤵PID:996
-
\??\c:\hhhbtt.exec:\hhhbtt.exe75⤵PID:4204
-
\??\c:\7tbbbb.exec:\7tbbbb.exe76⤵PID:3088
-
\??\c:\c400888.exec:\c400888.exe77⤵PID:4736
-
\??\c:\868806.exec:\868806.exe78⤵PID:4880
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe79⤵PID:3152
-
\??\c:\426888.exec:\426888.exe80⤵
- System Location Discovery: System Language Discovery
PID:3484 -
\??\c:\8208042.exec:\8208042.exe81⤵PID:4172
-
\??\c:\8404422.exec:\8404422.exe82⤵PID:1036
-
\??\c:\0660066.exec:\0660066.exe83⤵PID:3404
-
\??\c:\1hhbbb.exec:\1hhbbb.exe84⤵PID:1504
-
\??\c:\84466.exec:\84466.exe85⤵PID:1812
-
\??\c:\xrrllrx.exec:\xrrllrx.exe86⤵PID:2412
-
\??\c:\402846.exec:\402846.exe87⤵PID:3436
-
\??\c:\dpdvv.exec:\dpdvv.exe88⤵PID:1100
-
\??\c:\nnttnh.exec:\nnttnh.exe89⤵PID:5008
-
\??\c:\ttnhhh.exec:\ttnhhh.exe90⤵PID:4816
-
\??\c:\480060.exec:\480060.exe91⤵PID:4672
-
\??\c:\vpjjd.exec:\vpjjd.exe92⤵PID:2552
-
\??\c:\o648608.exec:\o648608.exe93⤵PID:960
-
\??\c:\282682.exec:\282682.exe94⤵PID:4540
-
\??\c:\4028086.exec:\4028086.exe95⤵PID:1748
-
\??\c:\282682.exec:\282682.exe96⤵PID:912
-
\??\c:\7fxrfff.exec:\7fxrfff.exe97⤵PID:3940
-
\??\c:\1rrllll.exec:\1rrllll.exe98⤵PID:2660
-
\??\c:\28820.exec:\28820.exe99⤵PID:4024
-
\??\c:\6202602.exec:\6202602.exe100⤵PID:4648
-
\??\c:\626602.exec:\626602.exe101⤵PID:992
-
\??\c:\8620022.exec:\8620022.exe102⤵PID:3624
-
\??\c:\bbtnnh.exec:\bbtnnh.exe103⤵PID:2280
-
\??\c:\028828.exec:\028828.exe104⤵PID:1744
-
\??\c:\880066.exec:\880066.exe105⤵PID:5096
-
\??\c:\6222226.exec:\6222226.exe106⤵PID:4168
-
\??\c:\60266.exec:\60266.exe107⤵PID:1120
-
\??\c:\bbtnhb.exec:\bbtnhb.exe108⤵PID:3768
-
\??\c:\tntnhh.exec:\tntnhh.exe109⤵PID:924
-
\??\c:\jjpjd.exec:\jjpjd.exe110⤵PID:1552
-
\??\c:\bbthtb.exec:\bbthtb.exe111⤵PID:1604
-
\??\c:\hnnnhh.exec:\hnnnhh.exe112⤵PID:2288
-
\??\c:\46226.exec:\46226.exe113⤵PID:2284
-
\??\c:\rfllxfr.exec:\rfllxfr.exe114⤵PID:3704
-
\??\c:\s2888.exec:\s2888.exe115⤵PID:1956
-
\??\c:\ttthth.exec:\ttthth.exe116⤵PID:1696
-
\??\c:\82684.exec:\82684.exe117⤵PID:1780
-
\??\c:\9nnbnt.exec:\9nnbnt.exe118⤵PID:4496
-
\??\c:\6048046.exec:\6048046.exe119⤵PID:4012
-
\??\c:\u806266.exec:\u806266.exe120⤵PID:4180
-
\??\c:\88648.exec:\88648.exe121⤵PID:4600
-
\??\c:\4408208.exec:\4408208.exe122⤵PID:1096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-