Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 07:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe
-
Size
453KB
-
MD5
46415c86eca42713aea3dd7af18ac01c
-
SHA1
aebd7129f3467ce63fcf77596e52cc866f67e47c
-
SHA256
8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb
-
SHA512
790c779140fa5055564c3435b667114315b0383ffd3034d1b0d46bec462caca6a2747d7c608007b22d1dc81705c096fb85ef8673ce265275df3774422b0a22d1
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbep:q7Tc2NYHUrAwfMp3CDp
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 38 IoCs
resource yara_rule behavioral1/memory/1684-9-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2432-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2992-31-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1052-28-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2120-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2752-55-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2384-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2616-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2772-94-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2612-103-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2956-107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2612-105-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/692-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2008-144-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2032-142-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1720-161-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2280-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2316-195-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1616-205-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2696-222-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2188-233-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2392-241-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3068-284-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1520-304-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1644-331-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2616-365-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1808-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1728-461-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1936-488-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2392-529-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2360-530-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1988-717-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1528-724-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1160-828-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/860-841-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1160-853-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2964-874-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2600-899-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2432 xrxxrxl.exe 1052 jdvdj.exe 2992 ffxfrrl.exe 2120 hbhhth.exe 2752 rflxlrx.exe 2616 nhttbb.exe 2384 5dppj.exe 1028 9xxrfrx.exe 2772 hnbtbh.exe 2612 3xrlxfr.exe 2956 nhbhtt.exe 592 5vjjp.exe 692 frllxxf.exe 2032 tthhnt.exe 2008 vvvdp.exe 1700 5fffrxf.exe 1720 ddpjv.exe 2280 dvjvj.exe 1796 3thhtb.exe 2316 vjjvp.exe 1616 rrxrfff.exe 2796 nbnthn.exe 2696 ffrrxfl.exe 2188 3frfxfx.exe 2392 vpddj.exe 1536 xxflrrf.exe 1752 vpjpv.exe 768 5fxfrxl.exe 2100 vpppd.exe 3068 lxxxxlx.exe 816 nhttnn.exe 1520 vvpvp.exe 1596 3bthtb.exe 2180 pvppp.exe 2324 frfflrf.exe 1644 hhbhtb.exe 2636 bnhbhh.exe 2740 djdjv.exe 2376 1lrlrff.exe 2644 hbthnn.exe 2616 dvvdp.exe 2540 3xxlxll.exe 2492 bthnnt.exe 2512 thttbb.exe 2536 dvjpv.exe 2944 9xxxllr.exe 1524 nbhbtt.exe 112 tbbnbb.exe 1040 dddjd.exe 572 rrlrrxf.exe 2456 7flllrf.exe 1844 nhhnnt.exe 2552 jdvpv.exe 1736 jpppv.exe 1716 xxlrxfl.exe 1808 llflxlr.exe 1728 bbnhhh.exe 2252 pjdjv.exe 1308 xxxlrxr.exe 1936 3nnbhn.exe 2708 thbnbn.exe 2704 ddjpp.exe 2328 9lrlxlf.exe 2884 lllrxxr.exe -
resource yara_rule behavioral1/memory/1684-9-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2432-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2992-31-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1052-28-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2120-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2752-55-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2384-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2616-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2772-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2772-94-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2956-107-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2612-105-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/692-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2008-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2032-142-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1720-161-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2280-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2316-195-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1616-205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2696-222-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2188-233-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2392-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/768-264-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/3068-284-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1520-304-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1596-326-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1644-331-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2644-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2616-365-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2536-384-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1808-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1728-461-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1936-488-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2392-529-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2360-530-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2100-557-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1520-584-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-667-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/596-705-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1988-717-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2272-725-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1528-724-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2192-777-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2476-796-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1540-803-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/860-841-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2964-867-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlxrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frllrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7hnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fflrffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2432 1684 8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe 28 PID 1684 wrote to memory of 2432 1684 8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe 28 PID 1684 wrote to memory of 2432 1684 8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe 28 PID 1684 wrote to memory of 2432 1684 8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe 28 PID 2432 wrote to memory of 1052 2432 xrxxrxl.exe 29 PID 2432 wrote to memory of 1052 2432 xrxxrxl.exe 29 PID 2432 wrote to memory of 1052 2432 xrxxrxl.exe 29 PID 2432 wrote to memory of 1052 2432 xrxxrxl.exe 29 PID 1052 wrote to memory of 2992 1052 jdvdj.exe 30 PID 1052 wrote to memory of 2992 1052 jdvdj.exe 30 PID 1052 wrote to memory of 2992 1052 jdvdj.exe 30 PID 1052 wrote to memory of 2992 1052 jdvdj.exe 30 PID 2992 wrote to memory of 2120 2992 ffxfrrl.exe 31 PID 2992 wrote to memory of 2120 2992 ffxfrrl.exe 31 PID 2992 wrote to memory of 2120 2992 ffxfrrl.exe 31 PID 2992 wrote to memory of 2120 2992 ffxfrrl.exe 31 PID 2120 wrote to memory of 2752 2120 hbhhth.exe 32 PID 2120 wrote to memory of 2752 2120 hbhhth.exe 32 PID 2120 wrote to memory of 2752 2120 hbhhth.exe 32 PID 2120 wrote to memory of 2752 2120 hbhhth.exe 32 PID 2752 wrote to memory of 2616 2752 rflxlrx.exe 33 PID 2752 wrote to memory of 2616 2752 rflxlrx.exe 33 PID 2752 wrote to memory of 2616 2752 rflxlrx.exe 33 PID 2752 wrote to memory of 2616 2752 rflxlrx.exe 33 PID 2616 wrote to memory of 2384 2616 nhttbb.exe 34 PID 2616 wrote to memory of 2384 2616 nhttbb.exe 34 PID 2616 wrote to memory of 2384 2616 nhttbb.exe 34 PID 2616 wrote to memory of 2384 2616 nhttbb.exe 34 PID 2384 wrote to memory of 1028 2384 5dppj.exe 35 PID 2384 wrote to memory of 1028 2384 5dppj.exe 35 PID 2384 wrote to memory of 1028 2384 5dppj.exe 35 PID 2384 wrote to memory of 1028 2384 5dppj.exe 35 PID 1028 wrote to memory of 2772 1028 9xxrfrx.exe 36 PID 1028 wrote to memory of 2772 1028 9xxrfrx.exe 36 PID 1028 wrote to memory of 2772 1028 9xxrfrx.exe 36 PID 1028 wrote to memory of 2772 1028 9xxrfrx.exe 36 PID 2772 wrote to memory of 2612 2772 hnbtbh.exe 37 PID 2772 wrote to memory of 2612 2772 hnbtbh.exe 37 PID 2772 wrote to memory of 2612 2772 hnbtbh.exe 37 PID 2772 wrote to memory of 2612 2772 hnbtbh.exe 37 PID 2612 wrote to memory of 2956 2612 3xrlxfr.exe 38 PID 2612 wrote to memory of 2956 2612 3xrlxfr.exe 38 PID 2612 wrote to memory of 2956 2612 3xrlxfr.exe 38 PID 2612 wrote to memory of 2956 2612 3xrlxfr.exe 38 PID 2956 wrote to memory of 592 2956 nhbhtt.exe 39 PID 2956 wrote to memory of 592 2956 nhbhtt.exe 39 PID 2956 wrote to memory of 592 2956 nhbhtt.exe 39 PID 2956 wrote to memory of 592 2956 nhbhtt.exe 39 PID 592 wrote to memory of 692 592 5vjjp.exe 40 PID 592 wrote to memory of 692 592 5vjjp.exe 40 PID 592 wrote to memory of 692 592 5vjjp.exe 40 PID 592 wrote to memory of 692 592 5vjjp.exe 40 PID 692 wrote to memory of 2032 692 frllxxf.exe 41 PID 692 wrote to memory of 2032 692 frllxxf.exe 41 PID 692 wrote to memory of 2032 692 frllxxf.exe 41 PID 692 wrote to memory of 2032 692 frllxxf.exe 41 PID 2032 wrote to memory of 2008 2032 tthhnt.exe 42 PID 2032 wrote to memory of 2008 2032 tthhnt.exe 42 PID 2032 wrote to memory of 2008 2032 tthhnt.exe 42 PID 2032 wrote to memory of 2008 2032 tthhnt.exe 42 PID 2008 wrote to memory of 1700 2008 vvvdp.exe 43 PID 2008 wrote to memory of 1700 2008 vvvdp.exe 43 PID 2008 wrote to memory of 1700 2008 vvvdp.exe 43 PID 2008 wrote to memory of 1700 2008 vvvdp.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe"C:\Users\Admin\AppData\Local\Temp\8eb5824e39b9cfea66be9c53577ef503c902b539134e139c5f2115afcae01acb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\xrxxrxl.exec:\xrxxrxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\jdvdj.exec:\jdvdj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\ffxfrrl.exec:\ffxfrrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\hbhhth.exec:\hbhhth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
\??\c:\rflxlrx.exec:\rflxlrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\nhttbb.exec:\nhttbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\5dppj.exec:\5dppj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\9xxrfrx.exec:\9xxrfrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\hnbtbh.exec:\hnbtbh.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\3xrlxfr.exec:\3xrlxfr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\nhbhtt.exec:\nhbhtt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\5vjjp.exec:\5vjjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\frllxxf.exec:\frllxxf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\tthhnt.exec:\tthhnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\vvvdp.exec:\vvvdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\5fffrxf.exec:\5fffrxf.exe17⤵
- Executes dropped EXE
PID:1700 -
\??\c:\ddpjv.exec:\ddpjv.exe18⤵
- Executes dropped EXE
PID:1720 -
\??\c:\dvjvj.exec:\dvjvj.exe19⤵
- Executes dropped EXE
PID:2280 -
\??\c:\3thhtb.exec:\3thhtb.exe20⤵
- Executes dropped EXE
PID:1796 -
\??\c:\vjjvp.exec:\vjjvp.exe21⤵
- Executes dropped EXE
PID:2316 -
\??\c:\rrxrfff.exec:\rrxrfff.exe22⤵
- Executes dropped EXE
PID:1616 -
\??\c:\nbnthn.exec:\nbnthn.exe23⤵
- Executes dropped EXE
PID:2796 -
\??\c:\ffrrxfl.exec:\ffrrxfl.exe24⤵
- Executes dropped EXE
PID:2696 -
\??\c:\3frfxfx.exec:\3frfxfx.exe25⤵
- Executes dropped EXE
PID:2188 -
\??\c:\vpddj.exec:\vpddj.exe26⤵
- Executes dropped EXE
PID:2392 -
\??\c:\xxflrrf.exec:\xxflrrf.exe27⤵
- Executes dropped EXE
PID:1536 -
\??\c:\vpjpv.exec:\vpjpv.exe28⤵
- Executes dropped EXE
PID:1752 -
\??\c:\5fxfrxl.exec:\5fxfrxl.exe29⤵
- Executes dropped EXE
PID:768 -
\??\c:\vpppd.exec:\vpppd.exe30⤵
- Executes dropped EXE
PID:2100 -
\??\c:\lxxxxlx.exec:\lxxxxlx.exe31⤵
- Executes dropped EXE
PID:3068 -
\??\c:\nhttnn.exec:\nhttnn.exe32⤵
- Executes dropped EXE
PID:816 -
\??\c:\vvpvp.exec:\vvpvp.exe33⤵
- Executes dropped EXE
PID:1520 -
\??\c:\3bthtb.exec:\3bthtb.exe34⤵
- Executes dropped EXE
PID:1596 -
\??\c:\pvppp.exec:\pvppp.exe35⤵
- Executes dropped EXE
PID:2180 -
\??\c:\frfflrf.exec:\frfflrf.exe36⤵
- Executes dropped EXE
PID:2324 -
\??\c:\hhbhtb.exec:\hhbhtb.exe37⤵
- Executes dropped EXE
PID:1644 -
\??\c:\bnhbhh.exec:\bnhbhh.exe38⤵
- Executes dropped EXE
PID:2636 -
\??\c:\djdjv.exec:\djdjv.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740 -
\??\c:\1lrlrff.exec:\1lrlrff.exe40⤵
- Executes dropped EXE
PID:2376 -
\??\c:\hbthnn.exec:\hbthnn.exe41⤵
- Executes dropped EXE
PID:2644 -
\??\c:\dvvdp.exec:\dvvdp.exe42⤵
- Executes dropped EXE
PID:2616 -
\??\c:\3xxlxll.exec:\3xxlxll.exe43⤵
- Executes dropped EXE
PID:2540 -
\??\c:\bthnnt.exec:\bthnnt.exe44⤵
- Executes dropped EXE
PID:2492 -
\??\c:\thttbb.exec:\thttbb.exe45⤵
- Executes dropped EXE
PID:2512 -
\??\c:\dvjpv.exec:\dvjpv.exe46⤵
- Executes dropped EXE
PID:2536 -
\??\c:\9xxxllr.exec:\9xxxllr.exe47⤵
- Executes dropped EXE
PID:2944 -
\??\c:\nbhbtt.exec:\nbhbtt.exe48⤵
- Executes dropped EXE
PID:1524 -
\??\c:\tbbnbb.exec:\tbbnbb.exe49⤵
- Executes dropped EXE
PID:112 -
\??\c:\dddjd.exec:\dddjd.exe50⤵
- Executes dropped EXE
PID:1040 -
\??\c:\rrlrrxf.exec:\rrlrrxf.exe51⤵
- Executes dropped EXE
PID:572 -
\??\c:\7flllrf.exec:\7flllrf.exe52⤵
- Executes dropped EXE
PID:2456 -
\??\c:\nhhnnt.exec:\nhhnnt.exe53⤵
- Executes dropped EXE
PID:1844 -
\??\c:\jdvpv.exec:\jdvpv.exe54⤵
- Executes dropped EXE
PID:2552 -
\??\c:\jpppv.exec:\jpppv.exe55⤵
- Executes dropped EXE
PID:1736 -
\??\c:\xxlrxfl.exec:\xxlrxfl.exe56⤵
- Executes dropped EXE
PID:1716 -
\??\c:\llflxlr.exec:\llflxlr.exe57⤵
- Executes dropped EXE
PID:1808 -
\??\c:\bbnhhh.exec:\bbnhhh.exe58⤵
- Executes dropped EXE
PID:1728 -
\??\c:\pjdjv.exec:\pjdjv.exe59⤵
- Executes dropped EXE
PID:2252 -
\??\c:\xxxlrxr.exec:\xxxlrxr.exe60⤵
- Executes dropped EXE
PID:1308 -
\??\c:\3nnbhn.exec:\3nnbhn.exe61⤵
- Executes dropped EXE
PID:1936 -
\??\c:\thbnbn.exec:\thbnbn.exe62⤵
- Executes dropped EXE
PID:2708 -
\??\c:\ddjpp.exec:\ddjpp.exe63⤵
- Executes dropped EXE
PID:2704 -
\??\c:\9lrlxlf.exec:\9lrlxlf.exe64⤵
- Executes dropped EXE
PID:2328 -
\??\c:\lllrxxr.exec:\lllrxxr.exe65⤵
- Executes dropped EXE
PID:2884 -
\??\c:\ntnnbb.exec:\ntnnbb.exe66⤵PID:2588
-
\??\c:\jjdpv.exec:\jjdpv.exe67⤵PID:2392
-
\??\c:\3xrflrr.exec:\3xrflrr.exe68⤵PID:2360
-
\??\c:\xxxxlrf.exec:\xxxxlrf.exe69⤵PID:1160
-
\??\c:\nbnnth.exec:\nbnnth.exe70⤵PID:1768
-
\??\c:\jpppd.exec:\jpppd.exe71⤵PID:768
-
\??\c:\ppjjp.exec:\ppjjp.exe72⤵PID:2100
-
\??\c:\3xfrlrf.exec:\3xfrlrf.exe73⤵PID:704
-
\??\c:\hbhntb.exec:\hbhntb.exe74⤵PID:1504
-
\??\c:\dvjdv.exec:\dvjdv.exe75⤵PID:1568
-
\??\c:\jdvjp.exec:\jdvjp.exe76⤵PID:1520
-
\??\c:\fxlffxx.exec:\fxlffxx.exe77⤵PID:2912
-
\??\c:\nhbntb.exec:\nhbntb.exe78⤵PID:2968
-
\??\c:\3dvpd.exec:\3dvpd.exe79⤵PID:2856
-
\??\c:\vdjpd.exec:\vdjpd.exe80⤵PID:2684
-
\??\c:\rlfflrx.exec:\rlfflrx.exe81⤵PID:2596
-
\??\c:\tbnthh.exec:\tbnthh.exe82⤵PID:2136
-
\??\c:\nbtthb.exec:\nbtthb.exe83⤵PID:2752
-
\??\c:\dpjjp.exec:\dpjjp.exe84⤵PID:2376
-
\??\c:\xlflffx.exec:\xlflffx.exe85⤵PID:2808
-
\??\c:\lfrfrxx.exec:\lfrfrxx.exe86⤵PID:2548
-
\??\c:\hbhnbt.exec:\hbhnbt.exe87⤵PID:2516
-
\??\c:\3dpvv.exec:\3dpvv.exe88⤵PID:2492
-
\??\c:\vpjjp.exec:\vpjjp.exe89⤵PID:2948
-
\??\c:\fxlfllx.exec:\fxlfllx.exe90⤵PID:1652
-
\??\c:\1bnbhn.exec:\1bnbhn.exe91⤵PID:2240
-
\??\c:\thtbhb.exec:\thtbhb.exe92⤵PID:596
-
\??\c:\pjddv.exec:\pjddv.exe93⤵PID:112
-
\??\c:\rfrxxfx.exec:\rfrxxfx.exe94⤵PID:1492
-
\??\c:\rlxfllr.exec:\rlxfllr.exe95⤵PID:1848
-
\??\c:\tttbhn.exec:\tttbhn.exe96⤵PID:1988
-
\??\c:\dpjjp.exec:\dpjjp.exe97⤵PID:1528
-
\??\c:\5xffllr.exec:\5xffllr.exe98⤵PID:2272
-
\??\c:\3lfrxxx.exec:\3lfrxxx.exe99⤵PID:2040
-
\??\c:\5bbtbn.exec:\5bbtbn.exe100⤵PID:1244
-
\??\c:\7jddj.exec:\7jddj.exe101⤵PID:1728
-
\??\c:\jdvdp.exec:\jdvdp.exe102⤵PID:1216
-
\??\c:\xxrfxfx.exec:\xxrfxfx.exe103⤵PID:1968
-
\??\c:\fxrxlll.exec:\fxrxlll.exe104⤵PID:1964
-
\??\c:\1nhttb.exec:\1nhttb.exe105⤵PID:2720
-
\??\c:\7jvvv.exec:\7jvvv.exe106⤵PID:2192
-
\??\c:\frffflr.exec:\frffflr.exe107⤵PID:2696
-
\??\c:\xrlllxl.exec:\xrlllxl.exe108⤵PID:2888
-
\??\c:\3bnntt.exec:\3bnntt.exe109⤵PID:2476
-
\??\c:\5vjdj.exec:\5vjdj.exe110⤵PID:1540
-
\??\c:\lfllxxx.exec:\lfllxxx.exe111⤵PID:1156
-
\??\c:\rlflxfl.exec:\rlflxfl.exe112⤵PID:1280
-
\??\c:\5nhnnn.exec:\5nhnnn.exe113⤵PID:1160
-
\??\c:\vjppv.exec:\vjppv.exe114⤵PID:2200
-
\??\c:\5dppd.exec:\5dppd.exe115⤵PID:2864
-
\??\c:\xrrxllf.exec:\xrrxllf.exe116⤵PID:860
-
\??\c:\nnbnbb.exec:\nnbnbb.exe117⤵PID:816
-
\??\c:\thbbhh.exec:\thbbhh.exe118⤵PID:1384
-
\??\c:\djpjp.exec:\djpjp.exe119⤵PID:1604
-
\??\c:\djdjp.exec:\djdjp.exe120⤵
- System Location Discovery: System Language Discovery
PID:2964 -
\??\c:\xrrrxxx.exec:\xrrrxxx.exe121⤵PID:2064
-
\??\c:\tnbbbh.exec:\tnbbbh.exe122⤵PID:2976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-