Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe
-
Size
454KB
-
MD5
bcfe4c46c86c2b7c56b4bdb12d3631cf
-
SHA1
8624cdec18a12c3a287b2f27a76756caad07c00e
-
SHA256
e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1
-
SHA512
41f7820bbc7ed992da26d0c932a74ccd4129eb83bb9b4293d0e34e2938615f64c0dd22268ed9a325602cae6608153e89d461a438b86fe4f0a443d9f12cb661d4
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbe1L:q7Tc2NYHUrAwfMp3CD1L
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/3052-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/572-10-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1128-19-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3512-36-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2844-78-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3272-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1624-331-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1108-327-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4556-295-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1496-291-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2892-287-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1760-268-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3892-264-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/500-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1740-247-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1880-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2268-230-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3028-217-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2068-213-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2004-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/932-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4916-192-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3576-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3188-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/8-171-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3492-165-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4928-159-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5004-153-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1268-147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4800-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1872-130-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4780-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4736-117-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1512-107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1324-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3932-95-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4044-84-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3388-72-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3924-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2660-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4160-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2280-48-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4180-41-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3976-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3608-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1876-16-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2040-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4696-367-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2068-382-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4212-398-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3856-405-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3396-419-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3936-423-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4316-436-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2072-455-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4500-516-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2812-532-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3360-551-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5040-570-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1772-589-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4556-666-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1268-752-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2020-1382-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4648-1497-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 572 0482666.exe 1128 684226.exe 1876 466044.exe 3608 9tnhhh.exe 3976 3vvvv.exe 3512 4686600.exe 4180 jjdvp.exe 2280 hbhbhh.exe 4160 600422.exe 2660 26608.exe 3924 00648.exe 3388 frrlxxr.exe 2844 888822.exe 4044 6044848.exe 3808 u020600.exe 3932 3jjdd.exe 1324 o420606.exe 1512 vdjjv.exe 1028 42606.exe 4736 lxxrrlf.exe 4780 6020480.exe 1872 rlxlrrr.exe 4800 xfrllff.exe 1972 htbttt.exe 1268 dppjd.exe 5004 ffrfrrl.exe 4928 8248440.exe 3492 dvvpj.exe 8 60604.exe 3188 m8604.exe 3576 bnthbt.exe 4300 e40482.exe 4916 48882.exe 932 k84866.exe 2004 lffxxrr.exe 2932 0882666.exe 3688 44048.exe 1828 26448.exe 2068 bttnhb.exe 3028 btbbtb.exe 3968 8626628.exe 1356 w22048.exe 3332 84004.exe 2268 lrrlffr.exe 4368 0488262.exe 3708 620882.exe 2176 44648.exe 1880 888480.exe 1740 644866.exe 4872 pvdvv.exe 4448 406048.exe 500 w00044.exe 3608 42484.exe 3892 48606.exe 1760 680488.exe 1436 frrlflf.exe 1664 3jjvp.exe 3484 08480.exe 3972 lxxxrrf.exe 1228 2426044.exe 2892 4804488.exe 1496 rllfxxr.exe 4556 2448282.exe 1980 668266.exe -
resource yara_rule behavioral2/memory/3052-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/572-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1128-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3512-36-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2844-78-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3272-308-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1624-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1108-327-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4556-295-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1496-291-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2892-287-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1760-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3892-264-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/500-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1740-247-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1880-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2268-230-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3028-217-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2068-213-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2004-199-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/932-196-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4916-192-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3576-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3188-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/8-171-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3492-165-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-159-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5004-153-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1268-147-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1872-130-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4780-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4736-117-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1512-107-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1324-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3932-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4044-84-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3388-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3924-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2660-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4160-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2280-48-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4180-41-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3976-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3608-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1876-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2040-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4696-367-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2068-382-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4212-398-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4960-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3856-405-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3396-419-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3936-423-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4316-436-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2072-455-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4500-516-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2812-532-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-551-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5040-570-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1772-589-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4556-662-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4556-666-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/808-709-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrlfxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6666082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4222640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e84266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q06482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrlrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 572 3052 e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe 83 PID 3052 wrote to memory of 572 3052 e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe 83 PID 3052 wrote to memory of 572 3052 e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe 83 PID 572 wrote to memory of 1128 572 0482666.exe 84 PID 572 wrote to memory of 1128 572 0482666.exe 84 PID 572 wrote to memory of 1128 572 0482666.exe 84 PID 1128 wrote to memory of 1876 1128 684226.exe 85 PID 1128 wrote to memory of 1876 1128 684226.exe 85 PID 1128 wrote to memory of 1876 1128 684226.exe 85 PID 1876 wrote to memory of 3608 1876 466044.exe 86 PID 1876 wrote to memory of 3608 1876 466044.exe 86 PID 1876 wrote to memory of 3608 1876 466044.exe 86 PID 3608 wrote to memory of 3976 3608 9tnhhh.exe 87 PID 3608 wrote to memory of 3976 3608 9tnhhh.exe 87 PID 3608 wrote to memory of 3976 3608 9tnhhh.exe 87 PID 3976 wrote to memory of 3512 3976 3vvvv.exe 88 PID 3976 wrote to memory of 3512 3976 3vvvv.exe 88 PID 3976 wrote to memory of 3512 3976 3vvvv.exe 88 PID 3512 wrote to memory of 4180 3512 4686600.exe 89 PID 3512 wrote to memory of 4180 3512 4686600.exe 89 PID 3512 wrote to memory of 4180 3512 4686600.exe 89 PID 4180 wrote to memory of 2280 4180 jjdvp.exe 90 PID 4180 wrote to memory of 2280 4180 jjdvp.exe 90 PID 4180 wrote to memory of 2280 4180 jjdvp.exe 90 PID 2280 wrote to memory of 4160 2280 hbhbhh.exe 91 PID 2280 wrote to memory of 4160 2280 hbhbhh.exe 91 PID 2280 wrote to memory of 4160 2280 hbhbhh.exe 91 PID 4160 wrote to memory of 2660 4160 600422.exe 92 PID 4160 wrote to memory of 2660 4160 600422.exe 92 PID 4160 wrote to memory of 2660 4160 600422.exe 92 PID 2660 wrote to memory of 3924 2660 26608.exe 93 PID 2660 wrote to memory of 3924 2660 26608.exe 93 PID 2660 wrote to memory of 3924 2660 26608.exe 93 PID 3924 wrote to memory of 3388 3924 00648.exe 94 PID 3924 wrote to memory of 3388 3924 00648.exe 94 PID 3924 wrote to memory of 3388 3924 00648.exe 94 PID 3388 wrote to memory of 2844 3388 frrlxxr.exe 95 PID 3388 wrote to memory of 2844 3388 frrlxxr.exe 95 PID 3388 wrote to memory of 2844 3388 frrlxxr.exe 95 PID 2844 wrote to memory of 4044 2844 888822.exe 96 PID 2844 wrote to memory of 4044 2844 888822.exe 96 PID 2844 wrote to memory of 4044 2844 888822.exe 96 PID 4044 wrote to memory of 3808 4044 6044848.exe 97 PID 4044 wrote to memory of 3808 4044 6044848.exe 97 PID 4044 wrote to memory of 3808 4044 6044848.exe 97 PID 3808 wrote to memory of 3932 3808 u020600.exe 98 PID 3808 wrote to memory of 3932 3808 u020600.exe 98 PID 3808 wrote to memory of 3932 3808 u020600.exe 98 PID 3932 wrote to memory of 1324 3932 3jjdd.exe 99 PID 3932 wrote to memory of 1324 3932 3jjdd.exe 99 PID 3932 wrote to memory of 1324 3932 3jjdd.exe 99 PID 1324 wrote to memory of 1512 1324 o420606.exe 100 PID 1324 wrote to memory of 1512 1324 o420606.exe 100 PID 1324 wrote to memory of 1512 1324 o420606.exe 100 PID 1512 wrote to memory of 1028 1512 vdjjv.exe 101 PID 1512 wrote to memory of 1028 1512 vdjjv.exe 101 PID 1512 wrote to memory of 1028 1512 vdjjv.exe 101 PID 1028 wrote to memory of 4736 1028 42606.exe 102 PID 1028 wrote to memory of 4736 1028 42606.exe 102 PID 1028 wrote to memory of 4736 1028 42606.exe 102 PID 4736 wrote to memory of 4780 4736 lxxrrlf.exe 103 PID 4736 wrote to memory of 4780 4736 lxxrrlf.exe 103 PID 4736 wrote to memory of 4780 4736 lxxrrlf.exe 103 PID 4780 wrote to memory of 1872 4780 6020480.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe"C:\Users\Admin\AppData\Local\Temp\e8308558432c25fa37aeafcf90e573bfc358f6ba62a1f8204e064e5780ef31c1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\0482666.exec:\0482666.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\684226.exec:\684226.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\466044.exec:\466044.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\9tnhhh.exec:\9tnhhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
\??\c:\3vvvv.exec:\3vvvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\4686600.exec:\4686600.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\jjdvp.exec:\jjdvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\hbhbhh.exec:\hbhbhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\600422.exec:\600422.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\26608.exec:\26608.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\00648.exec:\00648.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
\??\c:\frrlxxr.exec:\frrlxxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
\??\c:\888822.exec:\888822.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\6044848.exec:\6044848.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\u020600.exec:\u020600.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\3jjdd.exec:\3jjdd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\o420606.exec:\o420606.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
\??\c:\vdjjv.exec:\vdjjv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
\??\c:\42606.exec:\42606.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\lxxrrlf.exec:\lxxrrlf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\6020480.exec:\6020480.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
\??\c:\rlxlrrr.exec:\rlxlrrr.exe23⤵
- Executes dropped EXE
PID:1872 -
\??\c:\xfrllff.exec:\xfrllff.exe24⤵
- Executes dropped EXE
PID:4800 -
\??\c:\htbttt.exec:\htbttt.exe25⤵
- Executes dropped EXE
PID:1972 -
\??\c:\dppjd.exec:\dppjd.exe26⤵
- Executes dropped EXE
PID:1268 -
\??\c:\ffrfrrl.exec:\ffrfrrl.exe27⤵
- Executes dropped EXE
PID:5004 -
\??\c:\8248440.exec:\8248440.exe28⤵
- Executes dropped EXE
PID:4928 -
\??\c:\dvvpj.exec:\dvvpj.exe29⤵
- Executes dropped EXE
PID:3492 -
\??\c:\60604.exec:\60604.exe30⤵
- Executes dropped EXE
PID:8 -
\??\c:\m8604.exec:\m8604.exe31⤵
- Executes dropped EXE
PID:3188 -
\??\c:\bnthbt.exec:\bnthbt.exe32⤵
- Executes dropped EXE
PID:3576 -
\??\c:\e40482.exec:\e40482.exe33⤵
- Executes dropped EXE
PID:4300 -
\??\c:\48882.exec:\48882.exe34⤵
- Executes dropped EXE
PID:4916 -
\??\c:\k84866.exec:\k84866.exe35⤵
- Executes dropped EXE
PID:932 -
\??\c:\lffxxrr.exec:\lffxxrr.exe36⤵
- Executes dropped EXE
PID:2004 -
\??\c:\0882666.exec:\0882666.exe37⤵
- Executes dropped EXE
PID:2932 -
\??\c:\44048.exec:\44048.exe38⤵
- Executes dropped EXE
PID:3688 -
\??\c:\26448.exec:\26448.exe39⤵
- Executes dropped EXE
PID:1828 -
\??\c:\bttnhb.exec:\bttnhb.exe40⤵
- Executes dropped EXE
PID:2068 -
\??\c:\btbbtb.exec:\btbbtb.exe41⤵
- Executes dropped EXE
PID:3028 -
\??\c:\8626628.exec:\8626628.exe42⤵
- Executes dropped EXE
PID:3968 -
\??\c:\w22048.exec:\w22048.exe43⤵
- Executes dropped EXE
PID:1356 -
\??\c:\84004.exec:\84004.exe44⤵
- Executes dropped EXE
PID:3332 -
\??\c:\lrrlffr.exec:\lrrlffr.exe45⤵
- Executes dropped EXE
PID:2268 -
\??\c:\0488262.exec:\0488262.exe46⤵
- Executes dropped EXE
PID:4368 -
\??\c:\620882.exec:\620882.exe47⤵
- Executes dropped EXE
PID:3708 -
\??\c:\44648.exec:\44648.exe48⤵
- Executes dropped EXE
PID:2176 -
\??\c:\888480.exec:\888480.exe49⤵
- Executes dropped EXE
PID:1880 -
\??\c:\644866.exec:\644866.exe50⤵
- Executes dropped EXE
PID:1740 -
\??\c:\pvdvv.exec:\pvdvv.exe51⤵
- Executes dropped EXE
PID:4872 -
\??\c:\406048.exec:\406048.exe52⤵
- Executes dropped EXE
PID:4448 -
\??\c:\w00044.exec:\w00044.exe53⤵
- Executes dropped EXE
PID:500 -
\??\c:\42484.exec:\42484.exe54⤵
- Executes dropped EXE
PID:3608 -
\??\c:\48606.exec:\48606.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3892 -
\??\c:\680488.exec:\680488.exe56⤵
- Executes dropped EXE
PID:1760 -
\??\c:\frrlflf.exec:\frrlflf.exe57⤵
- Executes dropped EXE
PID:1436 -
\??\c:\3jjvp.exec:\3jjvp.exe58⤵
- Executes dropped EXE
PID:1664 -
\??\c:\08480.exec:\08480.exe59⤵
- Executes dropped EXE
PID:3484 -
\??\c:\lxxxrrf.exec:\lxxxrrf.exe60⤵
- Executes dropped EXE
PID:3972 -
\??\c:\2426044.exec:\2426044.exe61⤵
- Executes dropped EXE
PID:1228 -
\??\c:\4804488.exec:\4804488.exe62⤵
- Executes dropped EXE
PID:2892 -
\??\c:\rllfxxr.exec:\rllfxxr.exe63⤵
- Executes dropped EXE
PID:1496 -
\??\c:\2448282.exec:\2448282.exe64⤵
- Executes dropped EXE
PID:4556 -
\??\c:\668266.exec:\668266.exe65⤵
- Executes dropped EXE
PID:1980 -
\??\c:\0404888.exec:\0404888.exe66⤵PID:3696
-
\??\c:\2060826.exec:\2060826.exe67⤵PID:3952
-
\??\c:\ddppj.exec:\ddppj.exe68⤵PID:3272
-
\??\c:\1pjdd.exec:\1pjdd.exe69⤵PID:796
-
\??\c:\hnbhhn.exec:\hnbhhn.exe70⤵PID:1028
-
\??\c:\7llfxxx.exec:\7llfxxx.exe71⤵PID:3200
-
\??\c:\7rrlffx.exec:\7rrlffx.exe72⤵PID:1316
-
\??\c:\frfrlrf.exec:\frfrlrf.exe73⤵PID:3592
-
\??\c:\nntnhb.exec:\nntnhb.exe74⤵PID:1108
-
\??\c:\fxlflfl.exec:\fxlflfl.exe75⤵PID:1624
-
\??\c:\280042.exec:\280042.exe76⤵PID:4476
-
\??\c:\lxfxxxr.exec:\lxfxxxr.exe77⤵PID:3504
-
\??\c:\thntnh.exec:\thntnh.exe78⤵PID:3980
-
\??\c:\200482.exec:\200482.exe79⤵PID:4112
-
\??\c:\280040.exec:\280040.exe80⤵PID:1652
-
\??\c:\24020.exec:\24020.exe81⤵PID:452
-
\??\c:\7pjvj.exec:\7pjvj.exe82⤵PID:2040
-
\??\c:\84626.exec:\84626.exe83⤵PID:2172
-
\??\c:\84604.exec:\84604.exe84⤵PID:4132
-
\??\c:\4480862.exec:\4480862.exe85⤵PID:2576
-
\??\c:\thbthb.exec:\thbthb.exe86⤵PID:4696
-
\??\c:\m8082.exec:\m8082.exe87⤵PID:3044
-
\??\c:\bbbntb.exec:\bbbntb.exe88⤵PID:2028
-
\??\c:\9nhtnh.exec:\9nhtnh.exe89⤵PID:3688
-
\??\c:\a0648.exec:\a0648.exe90⤵PID:2068
-
\??\c:\bhbnht.exec:\bhbnht.exe91⤵PID:4860
-
\??\c:\g6860.exec:\g6860.exe92⤵PID:904
-
\??\c:\rxrflxl.exec:\rxrflxl.exe93⤵PID:5008
-
\??\c:\e00482.exec:\e00482.exe94⤵PID:4428
-
\??\c:\006864.exec:\006864.exe95⤵PID:4212
-
\??\c:\8828046.exec:\8828046.exe96⤵PID:1584
-
\??\c:\lllxrlf.exec:\lllxrlf.exe97⤵PID:3856
-
\??\c:\rlrfxxr.exec:\rlrfxxr.exe98⤵PID:4960
-
\??\c:\862846.exec:\862846.exe99⤵PID:1128
-
\??\c:\7nnbtn.exec:\7nnbtn.exe100⤵PID:4932
-
\??\c:\20604.exec:\20604.exe101⤵PID:3396
-
\??\c:\8620644.exec:\8620644.exe102⤵PID:3936
-
\??\c:\2820420.exec:\2820420.exe103⤵PID:772
-
\??\c:\lllffrr.exec:\lllffrr.exe104⤵PID:3432
-
\??\c:\k44208.exec:\k44208.exe105⤵PID:5088
-
\??\c:\hbthth.exec:\hbthth.exe106⤵PID:4316
-
\??\c:\s6420.exec:\s6420.exe107⤵PID:5000
-
\??\c:\1vjvj.exec:\1vjvj.exe108⤵PID:3924
-
\??\c:\bhhnbt.exec:\bhhnbt.exe109⤵PID:4740
-
\??\c:\44464.exec:\44464.exe110⤵PID:3944
-
\??\c:\vjjvv.exec:\vjjvv.exe111⤵PID:2892
-
\??\c:\pdvjv.exec:\pdvjv.exe112⤵PID:2072
-
\??\c:\3pvpd.exec:\3pvpd.exe113⤵PID:1700
-
\??\c:\46868.exec:\46868.exe114⤵PID:4296
-
\??\c:\66008.exec:\66008.exe115⤵PID:1980
-
\??\c:\0624664.exec:\0624664.exe116⤵PID:1032
-
\??\c:\thhtbt.exec:\thhtbt.exe117⤵PID:3860
-
\??\c:\dppdj.exec:\dppdj.exe118⤵PID:3952
-
\??\c:\24264.exec:\24264.exe119⤵PID:3220
-
\??\c:\g2080.exec:\g2080.exe120⤵PID:5036
-
\??\c:\o402086.exec:\o402086.exe121⤵PID:2020
-
\??\c:\448620.exec:\448620.exe122⤵PID:3088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-