Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 08:59
Behavioral task
behavioral1
Sample
7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe
Resource
win7-20241023-en
windows7-x64
7 signatures
120 seconds
General
-
Target
7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe
-
Size
333KB
-
MD5
f8ec27d08ba79928584ea5f3bca91286
-
SHA1
7c9f13ab5bf1d2cdf6c3c81f6829ca6c0949c1f8
-
SHA256
7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5
-
SHA512
875072787947e90a0b4db3f0579df6c2cec7e73cd55975fe038c769f1c51b01376f2c866649e45e003b155a0166a0e2e742010f4a6b128688134e1fb7dbbf1f4
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwfsDX2UznsaFVNJCMKAben:R4wFHoSHYHUrAwfMp3CDn
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/1208-5-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2352-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2628-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1632-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1320-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2044-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1128-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/868-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1556-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4796-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4688-64-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3280-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2556-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3808-84-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4180-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2056-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1692-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4248-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5080-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/116-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2868-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1736-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2196-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1724-144-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1848-149-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3604-155-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4520-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5116-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2652-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5096-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-179-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2708-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4600-191-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4952-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3372-199-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3064-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1364-210-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2376-217-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4468-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3540-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4692-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1164-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4764-246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1912-251-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1728-258-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1808-261-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4564-275-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1672-282-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3344-287-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-302-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3868-307-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2688-312-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4052-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3744-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/212-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2864-374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/440-429-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3812-444-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2416-453-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2908-506-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3536-539-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3464-874-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1624-1374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2628 6624440.exe 2352 vvvpp.exe 1632 6024424.exe 1320 m8804.exe 4400 80080.exe 2044 i048608.exe 1128 80048.exe 868 420820.exe 1144 tthbnn.exe 1556 jdvjv.exe 4796 4882620.exe 4688 22082.exe 3280 ffxffrr.exe 2556 bttbnn.exe 3680 xllrrrl.exe 3808 2664286.exe 4180 xlfffxx.exe 2056 rfrfrff.exe 4248 6664422.exe 1692 0866420.exe 5080 xfflrlr.exe 116 jppvd.exe 3472 5jjvd.exe 4572 xrlrlxl.exe 2868 pvpdp.exe 2196 lxxlxlf.exe 1736 4408042.exe 4164 7ntnhh.exe 1724 0466002.exe 1848 288202.exe 3604 886666.exe 440 088488.exe 4520 fxlfrrx.exe 4408 e82604.exe 64 rfffxxr.exe 2560 9pppp.exe 5116 bttnhh.exe 2652 88824.exe 5096 bnnnhh.exe 5040 hhc024.exe 1252 082262.exe 2708 c662626.exe 180 646644.exe 2108 862204.exe 4600 q24204.exe 4952 g2008.exe 4448 5thtnh.exe 3372 rlxrxrr.exe 2476 jjvjp.exe 3064 jpjpp.exe 2168 w68248.exe 1364 e60826.exe 1160 82222.exe 4424 jdvjv.exe 2376 tntthh.exe 3600 640088.exe 4400 hthbtt.exe 4468 400048.exe 2492 0460222.exe 3540 5vvpj.exe 2040 q62600.exe 4692 3vjvv.exe 2316 djjdp.exe 2580 8888028.exe -
resource yara_rule behavioral2/memory/1208-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000c000000023b0b-3.dat upx behavioral2/memory/1208-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b5f-8.dat upx behavioral2/memory/2352-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2628-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b60-12.dat upx behavioral2/memory/1632-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b61-20.dat upx behavioral2/files/0x000a000000023b62-23.dat upx behavioral2/memory/1320-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b63-28.dat upx behavioral2/files/0x000a000000023b64-32.dat upx behavioral2/memory/2044-33-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b65-37.dat upx behavioral2/memory/1128-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b66-42.dat upx behavioral2/memory/868-45-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b67-47.dat upx behavioral2/files/0x000a000000023b68-51.dat upx behavioral2/memory/1556-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b69-57.dat upx behavioral2/memory/4688-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4796-58-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6a-62.dat upx behavioral2/memory/4688-64-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3280-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0032000000023b5c-68.dat upx behavioral2/memory/2556-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6c-73.dat upx behavioral2/memory/3680-75-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6d-79.dat upx behavioral2/memory/3808-84-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b6e-82.dat upx behavioral2/files/0x000a000000023b6f-89.dat upx behavioral2/memory/4180-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2056-90-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b70-94.dat upx behavioral2/files/0x000a000000023b71-99.dat upx behavioral2/memory/1692-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4248-97-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b72-103.dat upx behavioral2/files/0x000a000000023b73-108.dat upx behavioral2/memory/5080-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b74-112.dat upx behavioral2/memory/116-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b75-117.dat upx behavioral2/files/0x000a000000023b76-121.dat upx behavioral2/memory/2868-126-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b77-125.dat upx behavioral2/files/0x000a000000023b78-131.dat upx behavioral2/memory/1736-138-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b79-136.dat upx behavioral2/files/0x000a000000023b7a-141.dat upx behavioral2/memory/2196-132-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7b-145.dat upx behavioral2/memory/1724-144-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7c-150.dat upx behavioral2/memory/1848-149-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000a000000023b7d-154.dat upx behavioral2/memory/3604-155-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4520-161-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/5116-170-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2652-173-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 008608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2628 1208 7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe 83 PID 1208 wrote to memory of 2628 1208 7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe 83 PID 1208 wrote to memory of 2628 1208 7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe 83 PID 2628 wrote to memory of 2352 2628 6624440.exe 84 PID 2628 wrote to memory of 2352 2628 6624440.exe 84 PID 2628 wrote to memory of 2352 2628 6624440.exe 84 PID 2352 wrote to memory of 1632 2352 vvvpp.exe 85 PID 2352 wrote to memory of 1632 2352 vvvpp.exe 85 PID 2352 wrote to memory of 1632 2352 vvvpp.exe 85 PID 1632 wrote to memory of 1320 1632 6024424.exe 86 PID 1632 wrote to memory of 1320 1632 6024424.exe 86 PID 1632 wrote to memory of 1320 1632 6024424.exe 86 PID 1320 wrote to memory of 4400 1320 m8804.exe 87 PID 1320 wrote to memory of 4400 1320 m8804.exe 87 PID 1320 wrote to memory of 4400 1320 m8804.exe 87 PID 4400 wrote to memory of 2044 4400 80080.exe 88 PID 4400 wrote to memory of 2044 4400 80080.exe 88 PID 4400 wrote to memory of 2044 4400 80080.exe 88 PID 2044 wrote to memory of 1128 2044 i048608.exe 89 PID 2044 wrote to memory of 1128 2044 i048608.exe 89 PID 2044 wrote to memory of 1128 2044 i048608.exe 89 PID 1128 wrote to memory of 868 1128 80048.exe 90 PID 1128 wrote to memory of 868 1128 80048.exe 90 PID 1128 wrote to memory of 868 1128 80048.exe 90 PID 868 wrote to memory of 1144 868 420820.exe 91 PID 868 wrote to memory of 1144 868 420820.exe 91 PID 868 wrote to memory of 1144 868 420820.exe 91 PID 1144 wrote to memory of 1556 1144 tthbnn.exe 92 PID 1144 wrote to memory of 1556 1144 tthbnn.exe 92 PID 1144 wrote to memory of 1556 1144 tthbnn.exe 92 PID 1556 wrote to memory of 4796 1556 jdvjv.exe 93 PID 1556 wrote to memory of 4796 1556 jdvjv.exe 93 PID 1556 wrote to memory of 4796 1556 jdvjv.exe 93 PID 4796 wrote to memory of 4688 4796 4882620.exe 94 PID 4796 wrote to memory of 4688 4796 4882620.exe 94 PID 4796 wrote to memory of 4688 4796 4882620.exe 94 PID 4688 wrote to memory of 3280 4688 22082.exe 95 PID 4688 wrote to memory of 3280 4688 22082.exe 95 PID 4688 wrote to memory of 3280 4688 22082.exe 95 PID 3280 wrote to memory of 2556 3280 ffxffrr.exe 96 PID 3280 wrote to memory of 2556 3280 ffxffrr.exe 96 PID 3280 wrote to memory of 2556 3280 ffxffrr.exe 96 PID 2556 wrote to memory of 3680 2556 bttbnn.exe 97 PID 2556 wrote to memory of 3680 2556 bttbnn.exe 97 PID 2556 wrote to memory of 3680 2556 bttbnn.exe 97 PID 3680 wrote to memory of 3808 3680 xllrrrl.exe 98 PID 3680 wrote to memory of 3808 3680 xllrrrl.exe 98 PID 3680 wrote to memory of 3808 3680 xllrrrl.exe 98 PID 3808 wrote to memory of 4180 3808 2664286.exe 99 PID 3808 wrote to memory of 4180 3808 2664286.exe 99 PID 3808 wrote to memory of 4180 3808 2664286.exe 99 PID 4180 wrote to memory of 2056 4180 xlfffxx.exe 100 PID 4180 wrote to memory of 2056 4180 xlfffxx.exe 100 PID 4180 wrote to memory of 2056 4180 xlfffxx.exe 100 PID 2056 wrote to memory of 4248 2056 rfrfrff.exe 101 PID 2056 wrote to memory of 4248 2056 rfrfrff.exe 101 PID 2056 wrote to memory of 4248 2056 rfrfrff.exe 101 PID 4248 wrote to memory of 1692 4248 6664422.exe 102 PID 4248 wrote to memory of 1692 4248 6664422.exe 102 PID 4248 wrote to memory of 1692 4248 6664422.exe 102 PID 1692 wrote to memory of 5080 1692 0866420.exe 103 PID 1692 wrote to memory of 5080 1692 0866420.exe 103 PID 1692 wrote to memory of 5080 1692 0866420.exe 103 PID 5080 wrote to memory of 116 5080 xfflrlr.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe"C:\Users\Admin\AppData\Local\Temp\7f7c9265cc78fae4cfa8f34f5f2ced346b067a6481a6947f6e51dd77ea1ebda5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\6624440.exec:\6624440.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\vvvpp.exec:\vvvpp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\6024424.exec:\6024424.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\m8804.exec:\m8804.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
\??\c:\80080.exec:\80080.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
\??\c:\i048608.exec:\i048608.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\80048.exec:\80048.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\420820.exec:\420820.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
\??\c:\tthbnn.exec:\tthbnn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\jdvjv.exec:\jdvjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\4882620.exec:\4882620.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\22082.exec:\22082.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\ffxffrr.exec:\ffxffrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\bttbnn.exec:\bttbnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\xllrrrl.exec:\xllrrrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\2664286.exec:\2664286.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
\??\c:\xlfffxx.exec:\xlfffxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
\??\c:\rfrfrff.exec:\rfrfrff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\6664422.exec:\6664422.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\0866420.exec:\0866420.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\xfflrlr.exec:\xfflrlr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\jppvd.exec:\jppvd.exe23⤵
- Executes dropped EXE
PID:116 -
\??\c:\5jjvd.exec:\5jjvd.exe24⤵
- Executes dropped EXE
PID:3472 -
\??\c:\xrlrlxl.exec:\xrlrlxl.exe25⤵
- Executes dropped EXE
PID:4572 -
\??\c:\pvpdp.exec:\pvpdp.exe26⤵
- Executes dropped EXE
PID:2868 -
\??\c:\lxxlxlf.exec:\lxxlxlf.exe27⤵
- Executes dropped EXE
PID:2196 -
\??\c:\4408042.exec:\4408042.exe28⤵
- Executes dropped EXE
PID:1736 -
\??\c:\7ntnhh.exec:\7ntnhh.exe29⤵
- Executes dropped EXE
PID:4164 -
\??\c:\0466002.exec:\0466002.exe30⤵
- Executes dropped EXE
PID:1724 -
\??\c:\288202.exec:\288202.exe31⤵
- Executes dropped EXE
PID:1848 -
\??\c:\886666.exec:\886666.exe32⤵
- Executes dropped EXE
PID:3604 -
\??\c:\088488.exec:\088488.exe33⤵
- Executes dropped EXE
PID:440 -
\??\c:\fxlfrrx.exec:\fxlfrrx.exe34⤵
- Executes dropped EXE
PID:4520 -
\??\c:\e82604.exec:\e82604.exe35⤵
- Executes dropped EXE
PID:4408 -
\??\c:\rfffxxr.exec:\rfffxxr.exe36⤵
- Executes dropped EXE
PID:64 -
\??\c:\9pppp.exec:\9pppp.exe37⤵
- Executes dropped EXE
PID:2560 -
\??\c:\bttnhh.exec:\bttnhh.exe38⤵
- Executes dropped EXE
PID:5116 -
\??\c:\88824.exec:\88824.exe39⤵
- Executes dropped EXE
PID:2652 -
\??\c:\bnnnhh.exec:\bnnnhh.exe40⤵
- Executes dropped EXE
PID:5096 -
\??\c:\hhc024.exec:\hhc024.exe41⤵
- Executes dropped EXE
PID:5040 -
\??\c:\082262.exec:\082262.exe42⤵
- Executes dropped EXE
PID:1252 -
\??\c:\c662626.exec:\c662626.exe43⤵
- Executes dropped EXE
PID:2708 -
\??\c:\646644.exec:\646644.exe44⤵
- Executes dropped EXE
PID:180 -
\??\c:\862204.exec:\862204.exe45⤵
- Executes dropped EXE
PID:2108 -
\??\c:\q24204.exec:\q24204.exe46⤵
- Executes dropped EXE
PID:4600 -
\??\c:\g2008.exec:\g2008.exe47⤵
- Executes dropped EXE
PID:4952 -
\??\c:\5thtnh.exec:\5thtnh.exe48⤵
- Executes dropped EXE
PID:4448 -
\??\c:\rlxrxrr.exec:\rlxrxrr.exe49⤵
- Executes dropped EXE
PID:3372 -
\??\c:\jjvjp.exec:\jjvjp.exe50⤵
- Executes dropped EXE
PID:2476 -
\??\c:\jpjpp.exec:\jpjpp.exe51⤵
- Executes dropped EXE
PID:3064 -
\??\c:\w68248.exec:\w68248.exe52⤵
- Executes dropped EXE
PID:2168 -
\??\c:\e60826.exec:\e60826.exe53⤵
- Executes dropped EXE
PID:1364 -
\??\c:\82222.exec:\82222.exe54⤵
- Executes dropped EXE
PID:1160 -
\??\c:\jdvjv.exec:\jdvjv.exe55⤵
- Executes dropped EXE
PID:4424 -
\??\c:\tntthh.exec:\tntthh.exe56⤵
- Executes dropped EXE
PID:2376 -
\??\c:\640088.exec:\640088.exe57⤵
- Executes dropped EXE
PID:3600 -
\??\c:\hthbtt.exec:\hthbtt.exe58⤵
- Executes dropped EXE
PID:4400 -
\??\c:\400048.exec:\400048.exe59⤵
- Executes dropped EXE
PID:4468 -
\??\c:\0460222.exec:\0460222.exe60⤵
- Executes dropped EXE
PID:2492 -
\??\c:\5vvpj.exec:\5vvpj.exe61⤵
- Executes dropped EXE
PID:3540 -
\??\c:\q62600.exec:\q62600.exe62⤵
- Executes dropped EXE
PID:2040 -
\??\c:\3vjvv.exec:\3vjvv.exe63⤵
- Executes dropped EXE
PID:4692 -
\??\c:\djjdp.exec:\djjdp.exe64⤵
- Executes dropped EXE
PID:2316 -
\??\c:\8888028.exec:\8888028.exe65⤵
- Executes dropped EXE
PID:2580 -
\??\c:\s0262.exec:\s0262.exe66⤵PID:1164
-
\??\c:\tntnbb.exec:\tntnbb.exe67⤵PID:4648
-
\??\c:\9nhbbb.exec:\9nhbbb.exe68⤵PID:4764
-
\??\c:\8844882.exec:\8844882.exe69⤵PID:4700
-
\??\c:\tnnbtn.exec:\tnnbtn.exe70⤵PID:1912
-
\??\c:\9htntt.exec:\9htntt.exe71⤵PID:1552
-
\??\c:\6400444.exec:\6400444.exe72⤵PID:3772
-
\??\c:\6282604.exec:\6282604.exe73⤵PID:1728
-
\??\c:\lxrlfxl.exec:\lxrlfxl.exe74⤵PID:1808
-
\??\c:\bttnbt.exec:\bttnbt.exe75⤵PID:4180
-
\??\c:\tbhbnb.exec:\tbhbnb.exe76⤵PID:2056
-
\??\c:\rlfrlxr.exec:\rlfrlxr.exe77⤵PID:3400
-
\??\c:\vvvpp.exec:\vvvpp.exe78⤵PID:4784
-
\??\c:\7tbtnn.exec:\7tbtnn.exe79⤵PID:1732
-
\??\c:\dppjd.exec:\dppjd.exe80⤵PID:4564
-
\??\c:\dvvpj.exec:\dvvpj.exe81⤵PID:1956
-
\??\c:\486404.exec:\486404.exe82⤵PID:4912
-
\??\c:\httnbt.exec:\httnbt.exe83⤵PID:1672
-
\??\c:\jvpjv.exec:\jvpjv.exe84⤵PID:4012
-
\??\c:\pvvvp.exec:\pvvvp.exe85⤵PID:3344
-
\??\c:\dvjdj.exec:\dvjdj.exe86⤵PID:2292
-
\??\c:\626048.exec:\626048.exe87⤵PID:4088
-
\??\c:\086426.exec:\086426.exe88⤵PID:4972
-
\??\c:\fxrfxxl.exec:\fxrfxxl.exe89⤵PID:1828
-
\??\c:\04662.exec:\04662.exe90⤵PID:1028
-
\??\c:\btttnn.exec:\btttnn.exe91⤵PID:4456
-
\??\c:\7dvpj.exec:\7dvpj.exe92⤵PID:532
-
\??\c:\tbnnhh.exec:\tbnnhh.exe93⤵
- System Location Discovery: System Language Discovery
PID:3604 -
\??\c:\82600.exec:\82600.exe94⤵PID:3868
-
\??\c:\408866.exec:\408866.exe95⤵PID:4616
-
\??\c:\28488.exec:\28488.exe96⤵PID:2688
-
\??\c:\nnnhtt.exec:\nnnhtt.exe97⤵PID:3756
-
\??\c:\lrllfff.exec:\lrllfff.exe98⤵PID:1464
-
\??\c:\o444888.exec:\o444888.exe99⤵PID:2148
-
\??\c:\04482.exec:\04482.exe100⤵PID:3812
-
\??\c:\q46082.exec:\q46082.exe101⤵PID:2740
-
\??\c:\tbhnbb.exec:\tbhnbb.exe102⤵PID:4052
-
\??\c:\nhtttt.exec:\nhtttt.exe103⤵PID:2300
-
\??\c:\g8404.exec:\g8404.exe104⤵PID:4892
-
\??\c:\8060000.exec:\8060000.exe105⤵PID:5112
-
\??\c:\bntnht.exec:\bntnht.exe106⤵PID:636
-
\??\c:\w62066.exec:\w62066.exe107⤵PID:3732
-
\??\c:\662862.exec:\662862.exe108⤵PID:3924
-
\??\c:\dvdvp.exec:\dvdvp.exe109⤵PID:3760
-
\??\c:\8840482.exec:\8840482.exe110⤵PID:3432
-
\??\c:\ppvdv.exec:\ppvdv.exe111⤵PID:2628
-
\??\c:\840426.exec:\840426.exe112⤵PID:2476
-
\??\c:\vpvpj.exec:\vpvpj.exe113⤵PID:3020
-
\??\c:\8026482.exec:\8026482.exe114⤵PID:1180
-
\??\c:\2444482.exec:\2444482.exe115⤵PID:3744
-
\??\c:\dpjdj.exec:\dpjdj.exe116⤵PID:1960
-
\??\c:\k00426.exec:\k00426.exe117⤵PID:2376
-
\??\c:\426044.exec:\426044.exe118⤵PID:4400
-
\??\c:\k06488.exec:\k06488.exe119⤵PID:212
-
\??\c:\frlffxr.exec:\frlffxr.exe120⤵PID:1704
-
\??\c:\a0282.exec:\a0282.exe121⤵PID:1972
-
\??\c:\1ffrrll.exec:\1ffrrll.exe122⤵PID:684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-