Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 19:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
General
-
Target
123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe
-
Size
456KB
-
MD5
5459785143b98aaac015c207defd9d76
-
SHA1
95a70b869265c0ee83bae62c099dc22a3adca73d
-
SHA256
123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda
-
SHA512
ea818a07bec196b1c4e652714827674c5356b1dbffc8a74ecb618368192e1c41eba64d4ebe8ecdc48ac06f0c5e30626af136159381152fd047473b6ab4da8dfb
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeRN:q7Tc2NYHUrAwfMp3CDRN
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 41 IoCs
resource yara_rule behavioral1/memory/2916-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2204-16-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2704-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2592-46-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2564-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2800-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2592-49-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/2696-65-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2568-76-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1736-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2616-88-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2616-95-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2512-104-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2260-114-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1924-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2872-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2228-150-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/288-158-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1012-195-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1920-186-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2224-214-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1944-230-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2092-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1184-255-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1588-303-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2192-362-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/236-363-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/236-370-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2904-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2904-384-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2904-406-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2416-487-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1444-509-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1184-530-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2564-589-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/796-635-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1460-666-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2108-678-0x00000000002B0000-0x00000000002DA000-memory.dmp family_blackmoon behavioral1/memory/2204-825-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2736-870-0x0000000001C50000-0x0000000001C7A000-memory.dmp family_blackmoon behavioral1/memory/236-917-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2204 u606880.exe 2704 2062828.exe 2800 fflrxll.exe 2564 fxxlxrf.exe 2592 k82800.exe 2696 nbtttn.exe 2568 i444624.exe 1736 g0442.exe 2616 m8002.exe 2512 86446.exe 2260 bntbnt.exe 2892 64868.exe 1924 hbbntb.exe 2872 26840.exe 2228 2662880.exe 288 nhbhbh.exe 552 lffrlxr.exe 2068 820644.exe 1920 rxlrflr.exe 1012 5nbbhn.exe 2076 e64400.exe 1804 lfxxlrr.exe 2224 c480628.exe 1944 ddpdp.exe 2092 k26840.exe 2956 w04422.exe 1184 dvdjv.exe 660 hhtbht.exe 1264 26468.exe 3036 m2064.exe 1608 rllxxlr.exe 1588 rflllfr.exe 2764 tnhhbb.exe 2772 0464628.exe 2812 4284262.exe 2736 bthnhh.exe 2824 u646880.exe 2732 q08288.exe 2588 648800.exe 2840 02000.exe 2192 c866228.exe 236 0200606.exe 2136 4864008.exe 2904 2228644.exe 2884 6848040.exe 1460 246626.exe 1992 80666.exe 2108 rrrrrrr.exe 2816 ffrrxxr.exe 912 ntnhbh.exe 2004 20402.exe 2276 fxxxrfr.exe 2084 u040402.exe 1700 q08464.exe 2372 bbbbhh.exe 1800 7btbtb.exe 2008 60402.exe 3052 86884.exe 1380 m0408.exe 2416 fxlxffr.exe 2224 8240228.exe 768 e08684.exe 1444 tnbhnn.exe 2460 nbbbhb.exe -
resource yara_rule behavioral1/memory/2916-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2204-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2704-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2592-46-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2800-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2696-56-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2696-65-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1736-77-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2568-76-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1736-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2616-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2512-104-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2260-114-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1924-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2872-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2228-150-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/288-158-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2068-168-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1920-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1012-195-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1920-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2224-214-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1944-222-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1944-230-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2092-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1184-251-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1588-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2192-362-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/236-363-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/236-370-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2904-383-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1460-391-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2276-430-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2416-487-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2940-517-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1184-530-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1688-568-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-589-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2552-602-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/796-635-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1460-666-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2000-681-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2000-708-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1536-746-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1444-772-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2204-825-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2564-850-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m4242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 206666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s8006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xfxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e04462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4884004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0066426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 604628.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4622840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1jvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2204 2916 123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe 30 PID 2916 wrote to memory of 2204 2916 123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe 30 PID 2916 wrote to memory of 2204 2916 123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe 30 PID 2916 wrote to memory of 2204 2916 123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe 30 PID 2204 wrote to memory of 2704 2204 u606880.exe 31 PID 2204 wrote to memory of 2704 2204 u606880.exe 31 PID 2204 wrote to memory of 2704 2204 u606880.exe 31 PID 2204 wrote to memory of 2704 2204 u606880.exe 31 PID 2704 wrote to memory of 2800 2704 2062828.exe 32 PID 2704 wrote to memory of 2800 2704 2062828.exe 32 PID 2704 wrote to memory of 2800 2704 2062828.exe 32 PID 2704 wrote to memory of 2800 2704 2062828.exe 32 PID 2800 wrote to memory of 2564 2800 fflrxll.exe 33 PID 2800 wrote to memory of 2564 2800 fflrxll.exe 33 PID 2800 wrote to memory of 2564 2800 fflrxll.exe 33 PID 2800 wrote to memory of 2564 2800 fflrxll.exe 33 PID 2564 wrote to memory of 2592 2564 fxxlxrf.exe 34 PID 2564 wrote to memory of 2592 2564 fxxlxrf.exe 34 PID 2564 wrote to memory of 2592 2564 fxxlxrf.exe 34 PID 2564 wrote to memory of 2592 2564 fxxlxrf.exe 34 PID 2592 wrote to memory of 2696 2592 k82800.exe 35 PID 2592 wrote to memory of 2696 2592 k82800.exe 35 PID 2592 wrote to memory of 2696 2592 k82800.exe 35 PID 2592 wrote to memory of 2696 2592 k82800.exe 35 PID 2696 wrote to memory of 2568 2696 nbtttn.exe 36 PID 2696 wrote to memory of 2568 2696 nbtttn.exe 36 PID 2696 wrote to memory of 2568 2696 nbtttn.exe 36 PID 2696 wrote to memory of 2568 2696 nbtttn.exe 36 PID 2568 wrote to memory of 1736 2568 i444624.exe 37 PID 2568 wrote to memory of 1736 2568 i444624.exe 37 PID 2568 wrote to memory of 1736 2568 i444624.exe 37 PID 2568 wrote to memory of 1736 2568 i444624.exe 37 PID 1736 wrote to memory of 2616 1736 g0442.exe 38 PID 1736 wrote to memory of 2616 1736 g0442.exe 38 PID 1736 wrote to memory of 2616 1736 g0442.exe 38 PID 1736 wrote to memory of 2616 1736 g0442.exe 38 PID 2616 wrote to memory of 2512 2616 m8002.exe 39 PID 2616 wrote to memory of 2512 2616 m8002.exe 39 PID 2616 wrote to memory of 2512 2616 m8002.exe 39 PID 2616 wrote to memory of 2512 2616 m8002.exe 39 PID 2512 wrote to memory of 2260 2512 86446.exe 40 PID 2512 wrote to memory of 2260 2512 86446.exe 40 PID 2512 wrote to memory of 2260 2512 86446.exe 40 PID 2512 wrote to memory of 2260 2512 86446.exe 40 PID 2260 wrote to memory of 2892 2260 bntbnt.exe 41 PID 2260 wrote to memory of 2892 2260 bntbnt.exe 41 PID 2260 wrote to memory of 2892 2260 bntbnt.exe 41 PID 2260 wrote to memory of 2892 2260 bntbnt.exe 41 PID 2892 wrote to memory of 1924 2892 64868.exe 42 PID 2892 wrote to memory of 1924 2892 64868.exe 42 PID 2892 wrote to memory of 1924 2892 64868.exe 42 PID 2892 wrote to memory of 1924 2892 64868.exe 42 PID 1924 wrote to memory of 2872 1924 hbbntb.exe 43 PID 1924 wrote to memory of 2872 1924 hbbntb.exe 43 PID 1924 wrote to memory of 2872 1924 hbbntb.exe 43 PID 1924 wrote to memory of 2872 1924 hbbntb.exe 43 PID 2872 wrote to memory of 2228 2872 26840.exe 44 PID 2872 wrote to memory of 2228 2872 26840.exe 44 PID 2872 wrote to memory of 2228 2872 26840.exe 44 PID 2872 wrote to memory of 2228 2872 26840.exe 44 PID 2228 wrote to memory of 288 2228 2662880.exe 45 PID 2228 wrote to memory of 288 2228 2662880.exe 45 PID 2228 wrote to memory of 288 2228 2662880.exe 45 PID 2228 wrote to memory of 288 2228 2662880.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe"C:\Users\Admin\AppData\Local\Temp\123ba5e09e2ad8ad912eadba747f89d1f3c7a17de385d6c8e3d9d2a433f67fda.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\u606880.exec:\u606880.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\2062828.exec:\2062828.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\fflrxll.exec:\fflrxll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\fxxlxrf.exec:\fxxlxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\k82800.exec:\k82800.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\nbtttn.exec:\nbtttn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\i444624.exec:\i444624.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\g0442.exec:\g0442.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\m8002.exec:\m8002.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\86446.exec:\86446.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\bntbnt.exec:\bntbnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\64868.exec:\64868.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\hbbntb.exec:\hbbntb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\26840.exec:\26840.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\2662880.exec:\2662880.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\nhbhbh.exec:\nhbhbh.exe17⤵
- Executes dropped EXE
PID:288 -
\??\c:\lffrlxr.exec:\lffrlxr.exe18⤵
- Executes dropped EXE
PID:552 -
\??\c:\820644.exec:\820644.exe19⤵
- Executes dropped EXE
PID:2068 -
\??\c:\rxlrflr.exec:\rxlrflr.exe20⤵
- Executes dropped EXE
PID:1920 -
\??\c:\5nbbhn.exec:\5nbbhn.exe21⤵
- Executes dropped EXE
PID:1012 -
\??\c:\e64400.exec:\e64400.exe22⤵
- Executes dropped EXE
PID:2076 -
\??\c:\lfxxlrr.exec:\lfxxlrr.exe23⤵
- Executes dropped EXE
PID:1804 -
\??\c:\c480628.exec:\c480628.exe24⤵
- Executes dropped EXE
PID:2224 -
\??\c:\ddpdp.exec:\ddpdp.exe25⤵
- Executes dropped EXE
PID:1944 -
\??\c:\k26840.exec:\k26840.exe26⤵
- Executes dropped EXE
PID:2092 -
\??\c:\w04422.exec:\w04422.exe27⤵
- Executes dropped EXE
PID:2956 -
\??\c:\dvdjv.exec:\dvdjv.exe28⤵
- Executes dropped EXE
PID:1184 -
\??\c:\hhtbht.exec:\hhtbht.exe29⤵
- Executes dropped EXE
PID:660 -
\??\c:\26468.exec:\26468.exe30⤵
- Executes dropped EXE
PID:1264 -
\??\c:\m2064.exec:\m2064.exe31⤵
- Executes dropped EXE
PID:3036 -
\??\c:\rllxxlr.exec:\rllxxlr.exe32⤵
- Executes dropped EXE
PID:1608 -
\??\c:\rflllfr.exec:\rflllfr.exe33⤵
- Executes dropped EXE
PID:1588 -
\??\c:\tnhhbb.exec:\tnhhbb.exe34⤵
- Executes dropped EXE
PID:2764 -
\??\c:\0464628.exec:\0464628.exe35⤵
- Executes dropped EXE
PID:2772 -
\??\c:\4284262.exec:\4284262.exe36⤵
- Executes dropped EXE
PID:2812 -
\??\c:\bthnhh.exec:\bthnhh.exe37⤵
- Executes dropped EXE
PID:2736 -
\??\c:\u646880.exec:\u646880.exe38⤵
- Executes dropped EXE
PID:2824 -
\??\c:\q08288.exec:\q08288.exe39⤵
- Executes dropped EXE
PID:2732 -
\??\c:\648800.exec:\648800.exe40⤵
- Executes dropped EXE
PID:2588 -
\??\c:\02000.exec:\02000.exe41⤵
- Executes dropped EXE
PID:2840 -
\??\c:\c866228.exec:\c866228.exe42⤵
- Executes dropped EXE
PID:2192 -
\??\c:\0200606.exec:\0200606.exe43⤵
- Executes dropped EXE
PID:236 -
\??\c:\4864008.exec:\4864008.exe44⤵
- Executes dropped EXE
PID:2136 -
\??\c:\2228644.exec:\2228644.exe45⤵
- Executes dropped EXE
PID:2904 -
\??\c:\6848040.exec:\6848040.exe46⤵
- Executes dropped EXE
PID:2884 -
\??\c:\246626.exec:\246626.exe47⤵
- Executes dropped EXE
PID:1460 -
\??\c:\80666.exec:\80666.exe48⤵
- Executes dropped EXE
PID:1992 -
\??\c:\rrrrrrr.exec:\rrrrrrr.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108 -
\??\c:\ffrrxxr.exec:\ffrrxxr.exe50⤵
- Executes dropped EXE
PID:2816 -
\??\c:\ntnhbh.exec:\ntnhbh.exe51⤵
- Executes dropped EXE
PID:912 -
\??\c:\20402.exec:\20402.exe52⤵
- Executes dropped EXE
PID:2004 -
\??\c:\fxxxrfr.exec:\fxxxrfr.exe53⤵
- Executes dropped EXE
PID:2276 -
\??\c:\u040402.exec:\u040402.exe54⤵
- Executes dropped EXE
PID:2084 -
\??\c:\q08464.exec:\q08464.exe55⤵
- Executes dropped EXE
PID:1700 -
\??\c:\bbbbhh.exec:\bbbbhh.exe56⤵
- Executes dropped EXE
PID:2372 -
\??\c:\7btbtb.exec:\7btbtb.exe57⤵
- Executes dropped EXE
PID:1800 -
\??\c:\60402.exec:\60402.exe58⤵
- Executes dropped EXE
PID:2008 -
\??\c:\86884.exec:\86884.exe59⤵
- Executes dropped EXE
PID:3052 -
\??\c:\m0408.exec:\m0408.exe60⤵
- Executes dropped EXE
PID:1380 -
\??\c:\fxlxffr.exec:\fxlxffr.exe61⤵
- Executes dropped EXE
PID:2416 -
\??\c:\8240228.exec:\8240228.exe62⤵
- Executes dropped EXE
PID:2224 -
\??\c:\e08684.exec:\e08684.exe63⤵
- Executes dropped EXE
PID:768 -
\??\c:\tnbhnn.exec:\tnbhnn.exe64⤵
- Executes dropped EXE
PID:1444 -
\??\c:\nbbbhb.exec:\nbbbhb.exe65⤵
- Executes dropped EXE
PID:2460 -
\??\c:\646284.exec:\646284.exe66⤵PID:2940
-
\??\c:\m0884.exec:\m0884.exe67⤵PID:1184
-
\??\c:\048088.exec:\048088.exe68⤵PID:1676
-
\??\c:\0804084.exec:\0804084.exe69⤵PID:2296
-
\??\c:\3rlxlrx.exec:\3rlxlrx.exe70⤵PID:2852
-
\??\c:\rfrrlfl.exec:\rfrrlfl.exe71⤵PID:1580
-
\??\c:\60842.exec:\60842.exe72⤵PID:2204
-
\??\c:\nbtttt.exec:\nbtttt.exe73⤵PID:2148
-
\??\c:\08604.exec:\08604.exe74⤵PID:1688
-
\??\c:\9hbbnb.exec:\9hbbnb.exe75⤵PID:2688
-
\??\c:\bnnnbb.exec:\bnnnbb.exe76⤵PID:2564
-
\??\c:\3lrrlrr.exec:\3lrrlrr.exe77⤵PID:2812
-
\??\c:\ppdpp.exec:\ppdpp.exe78⤵PID:2604
-
\??\c:\826622.exec:\826622.exe79⤵PID:2552
-
\??\c:\6404440.exec:\6404440.exe80⤵PID:2836
-
\??\c:\pjvvd.exec:\pjvvd.exe81⤵PID:2200
-
\??\c:\20662.exec:\20662.exe82⤵PID:1044
-
\??\c:\bnnnhb.exec:\bnnnhb.exe83⤵PID:796
-
\??\c:\rlxxllr.exec:\rlxxllr.exe84⤵PID:1884
-
\??\c:\q40006.exec:\q40006.exe85⤵PID:2044
-
\??\c:\e84400.exec:\e84400.exe86⤵PID:2868
-
\??\c:\0420840.exec:\0420840.exe87⤵PID:2300
-
\??\c:\w46666.exec:\w46666.exe88⤵PID:1460
-
\??\c:\9dpjv.exec:\9dpjv.exe89⤵PID:700
-
\??\c:\04284.exec:\04284.exe90⤵PID:2108
-
\??\c:\bthhtt.exec:\bthhtt.exe91⤵
- System Location Discovery: System Language Discovery
PID:2000 -
\??\c:\k26688.exec:\k26688.exe92⤵PID:880
-
\??\c:\3ddpj.exec:\3ddpj.exe93⤵PID:1364
-
\??\c:\5djjp.exec:\5djjp.exe94⤵PID:1896
-
\??\c:\i644040.exec:\i644040.exe95⤵PID:3064
-
\??\c:\vpdjv.exec:\vpdjv.exe96⤵PID:1920
-
\??\c:\lxllxrf.exec:\lxllxrf.exe97⤵PID:1144
-
\??\c:\jdppd.exec:\jdppd.exe98⤵PID:408
-
\??\c:\dpdvj.exec:\dpdvj.exe99⤵PID:1472
-
\??\c:\ppdpd.exec:\ppdpd.exe100⤵PID:1964
-
\??\c:\24600.exec:\24600.exe101⤵PID:1536
-
\??\c:\04406.exec:\04406.exe102⤵PID:1636
-
\??\c:\dvpjd.exec:\dvpjd.exe103⤵PID:1944
-
\??\c:\rlxlrfr.exec:\rlxlrfr.exe104⤵PID:780
-
\??\c:\8248884.exec:\8248884.exe105⤵PID:1444
-
\??\c:\1dppv.exec:\1dppv.exe106⤵PID:1292
-
\??\c:\88620.exec:\88620.exe107⤵PID:2124
-
\??\c:\5xlxlrl.exec:\5xlxlrl.exe108⤵PID:2972
-
\??\c:\8688446.exec:\8688446.exe109⤵PID:3024
-
\??\c:\lfrxflx.exec:\lfrxflx.exe110⤵PID:1912
-
\??\c:\tnthnn.exec:\tnthnn.exe111⤵PID:3028
-
\??\c:\2028068.exec:\2028068.exe112⤵PID:1580
-
\??\c:\c088406.exec:\c088406.exe113⤵PID:2204
-
\??\c:\jdjph.exec:\jdjph.exe114⤵PID:2668
-
\??\c:\80288.exec:\80288.exe115⤵PID:1688
-
\??\c:\08280.exec:\08280.exe116⤵PID:2896
-
\??\c:\ntbttt.exec:\ntbttt.exe117⤵PID:2564
-
\??\c:\vdjdv.exec:\vdjdv.exe118⤵PID:2812
-
\??\c:\9rrllll.exec:\9rrllll.exe119⤵PID:2736
-
\??\c:\9tnnnn.exec:\9tnnnn.exe120⤵PID:2620
-
\??\c:\rlrlrlr.exec:\rlrlrlr.exe121⤵PID:2836
-
\??\c:\080000.exec:\080000.exe122⤵PID:2140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-