Analysis
-
max time kernel
109s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 06:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
120 seconds
General
-
Target
2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe
-
Size
454KB
-
MD5
9905cdebb12c9d809cb654f2ab7e31c0
-
SHA1
2483a8b413242cc138d2a23f7d3a1a2359727167
-
SHA256
2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2d
-
SHA512
0eac586dffb1287c7e0e99cc488076d58b18cf1f0a7018819ee91c3069aa4c5855b4757321948faae80f1148ea945d8c9d54acc020ccf7c1d4ecb87b69cb41f2
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeA:q7Tc2NYHUrAwfMp3CDA
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 42 IoCs
resource yara_rule behavioral1/memory/2992-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2848-17-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1372-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2716-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2968-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1648-65-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/796-68-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2376-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2676-103-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3056-114-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/3056-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2888-139-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2296-156-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1268-174-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2196-183-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2476-194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2056-197-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1940-207-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1664-240-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1820-300-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1584-313-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2860-338-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2764-345-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2548-358-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1488-371-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2400-384-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2184-405-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2896-417-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2076-437-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1512-444-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2660-558-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2316-768-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1048-799-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2596-930-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2300-993-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/628-1000-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2132-1008-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/2132-1007-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2808-1130-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/1348-1317-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/1944-1322-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1812-1354-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2848 48624.exe 1372 646626.exe 2716 jjjpd.exe 2968 1rrfxlf.exe 2756 20600.exe 1648 24000.exe 796 pjvvv.exe 1688 frfxrrx.exe 836 3vpdv.exe 2376 9hhbtn.exe 2676 djpjj.exe 3056 2640280.exe 2092 rfrfxfl.exe 2936 6482440.exe 2888 264462.exe 2296 648482.exe 1724 68488.exe 1268 lflfxxl.exe 2196 xlffrrf.exe 2476 dpjvp.exe 2056 vvvjp.exe 1940 lxlxrrx.exe 2292 420080.exe 1796 20222.exe 1664 lfrflxx.exe 908 vjpvd.exe 1892 tttbnt.exe 2520 5dpdp.exe 1700 rfflrlx.exe 1864 rlxfflx.exe 2840 4868406.exe 1820 nbtthn.exe 2808 lrrrxrf.exe 1584 xrllrrf.exe 2236 xxlxrxl.exe 1372 hnbhnt.exe 2140 84624.exe 2860 202226.exe 2764 7tbbbb.exe 2176 3rxxxfl.exe 2548 08888.exe 480 lxlfrlr.exe 1488 26006.exe 2384 vvjjp.exe 2400 3ddjj.exe 1832 62666.exe 2388 24048.exe 2184 264440.exe 3064 hbtthh.exe 2896 0840002.exe 2868 pjvdj.exe 3048 80082.exe 2076 u040006.exe 1596 0466222.exe 1512 5xffrrr.exe 1456 86840.exe 808 2460600.exe 2272 68044.exe 2504 6804666.exe 2148 w68282.exe 2316 nhbbbt.exe 1472 pvjvv.exe 300 jjvvd.exe 1532 68608.exe -
resource yara_rule behavioral1/memory/2992-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2848-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2716-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1372-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2716-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2968-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1648-65-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/796-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2376-91-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2376-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2676-103-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3056-114-0x00000000003A0000-0x00000000003CA000-memory.dmp upx behavioral1/memory/3056-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2888-139-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2296-156-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1268-174-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2196-183-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2476-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2056-197-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1664-240-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1820-300-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1584-313-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2860-338-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2764-345-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2548-358-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1488-371-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2400-384-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2184-405-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2896-417-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2076-437-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1512-444-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/908-526-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1720-545-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-558-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2000-682-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2932-707-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2316-768-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1048-799-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2772-824-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/2660-838-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2596-930-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2132-1007-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1604-1347-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1812-1354-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 428222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 422608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfflll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 260682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2006884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w86622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 482288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ppjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2848 2992 2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe 30 PID 2992 wrote to memory of 2848 2992 2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe 30 PID 2992 wrote to memory of 2848 2992 2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe 30 PID 2992 wrote to memory of 2848 2992 2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe 30 PID 2848 wrote to memory of 1372 2848 48624.exe 31 PID 2848 wrote to memory of 1372 2848 48624.exe 31 PID 2848 wrote to memory of 1372 2848 48624.exe 31 PID 2848 wrote to memory of 1372 2848 48624.exe 31 PID 1372 wrote to memory of 2716 1372 646626.exe 32 PID 1372 wrote to memory of 2716 1372 646626.exe 32 PID 1372 wrote to memory of 2716 1372 646626.exe 32 PID 1372 wrote to memory of 2716 1372 646626.exe 32 PID 2716 wrote to memory of 2968 2716 jjjpd.exe 33 PID 2716 wrote to memory of 2968 2716 jjjpd.exe 33 PID 2716 wrote to memory of 2968 2716 jjjpd.exe 33 PID 2716 wrote to memory of 2968 2716 jjjpd.exe 33 PID 2968 wrote to memory of 2756 2968 1rrfxlf.exe 34 PID 2968 wrote to memory of 2756 2968 1rrfxlf.exe 34 PID 2968 wrote to memory of 2756 2968 1rrfxlf.exe 34 PID 2968 wrote to memory of 2756 2968 1rrfxlf.exe 34 PID 2756 wrote to memory of 1648 2756 20600.exe 35 PID 2756 wrote to memory of 1648 2756 20600.exe 35 PID 2756 wrote to memory of 1648 2756 20600.exe 35 PID 2756 wrote to memory of 1648 2756 20600.exe 35 PID 1648 wrote to memory of 796 1648 24000.exe 36 PID 1648 wrote to memory of 796 1648 24000.exe 36 PID 1648 wrote to memory of 796 1648 24000.exe 36 PID 1648 wrote to memory of 796 1648 24000.exe 36 PID 796 wrote to memory of 1688 796 pjvvv.exe 37 PID 796 wrote to memory of 1688 796 pjvvv.exe 37 PID 796 wrote to memory of 1688 796 pjvvv.exe 37 PID 796 wrote to memory of 1688 796 pjvvv.exe 37 PID 1688 wrote to memory of 836 1688 frfxrrx.exe 38 PID 1688 wrote to memory of 836 1688 frfxrrx.exe 38 PID 1688 wrote to memory of 836 1688 frfxrrx.exe 38 PID 1688 wrote to memory of 836 1688 frfxrrx.exe 38 PID 836 wrote to memory of 2376 836 3vpdv.exe 39 PID 836 wrote to memory of 2376 836 3vpdv.exe 39 PID 836 wrote to memory of 2376 836 3vpdv.exe 39 PID 836 wrote to memory of 2376 836 3vpdv.exe 39 PID 2376 wrote to memory of 2676 2376 9hhbtn.exe 40 PID 2376 wrote to memory of 2676 2376 9hhbtn.exe 40 PID 2376 wrote to memory of 2676 2376 9hhbtn.exe 40 PID 2376 wrote to memory of 2676 2376 9hhbtn.exe 40 PID 2676 wrote to memory of 3056 2676 djpjj.exe 41 PID 2676 wrote to memory of 3056 2676 djpjj.exe 41 PID 2676 wrote to memory of 3056 2676 djpjj.exe 41 PID 2676 wrote to memory of 3056 2676 djpjj.exe 41 PID 3056 wrote to memory of 2092 3056 2640280.exe 42 PID 3056 wrote to memory of 2092 3056 2640280.exe 42 PID 3056 wrote to memory of 2092 3056 2640280.exe 42 PID 3056 wrote to memory of 2092 3056 2640280.exe 42 PID 2092 wrote to memory of 2936 2092 rfrfxfl.exe 43 PID 2092 wrote to memory of 2936 2092 rfrfxfl.exe 43 PID 2092 wrote to memory of 2936 2092 rfrfxfl.exe 43 PID 2092 wrote to memory of 2936 2092 rfrfxfl.exe 43 PID 2936 wrote to memory of 2888 2936 6482440.exe 44 PID 2936 wrote to memory of 2888 2936 6482440.exe 44 PID 2936 wrote to memory of 2888 2936 6482440.exe 44 PID 2936 wrote to memory of 2888 2936 6482440.exe 44 PID 2888 wrote to memory of 2296 2888 264462.exe 45 PID 2888 wrote to memory of 2296 2888 264462.exe 45 PID 2888 wrote to memory of 2296 2888 264462.exe 45 PID 2888 wrote to memory of 2296 2888 264462.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe"C:\Users\Admin\AppData\Local\Temp\2c90fe875454c4e3a3e0460491e7f690dfa6eabcf9f1ea9b5a565c54d6193f2dN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\48624.exec:\48624.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\646626.exec:\646626.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\jjjpd.exec:\jjjpd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\1rrfxlf.exec:\1rrfxlf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\20600.exec:\20600.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\24000.exec:\24000.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\pjvvv.exec:\pjvvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
\??\c:\frfxrrx.exec:\frfxrrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\3vpdv.exec:\3vpdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
\??\c:\9hhbtn.exec:\9hhbtn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\djpjj.exec:\djpjj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\2640280.exec:\2640280.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\rfrfxfl.exec:\rfrfxfl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\6482440.exec:\6482440.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\264462.exec:\264462.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\648482.exec:\648482.exe17⤵
- Executes dropped EXE
PID:2296 -
\??\c:\68488.exec:\68488.exe18⤵
- Executes dropped EXE
PID:1724 -
\??\c:\lflfxxl.exec:\lflfxxl.exe19⤵
- Executes dropped EXE
PID:1268 -
\??\c:\xlffrrf.exec:\xlffrrf.exe20⤵
- Executes dropped EXE
PID:2196 -
\??\c:\dpjvp.exec:\dpjvp.exe21⤵
- Executes dropped EXE
PID:2476 -
\??\c:\vvvjp.exec:\vvvjp.exe22⤵
- Executes dropped EXE
PID:2056 -
\??\c:\lxlxrrx.exec:\lxlxrrx.exe23⤵
- Executes dropped EXE
PID:1940 -
\??\c:\420080.exec:\420080.exe24⤵
- Executes dropped EXE
PID:2292 -
\??\c:\20222.exec:\20222.exe25⤵
- Executes dropped EXE
PID:1796 -
\??\c:\lfrflxx.exec:\lfrflxx.exe26⤵
- Executes dropped EXE
PID:1664 -
\??\c:\vjpvd.exec:\vjpvd.exe27⤵
- Executes dropped EXE
PID:908 -
\??\c:\tttbnt.exec:\tttbnt.exe28⤵
- Executes dropped EXE
PID:1892 -
\??\c:\5dpdp.exec:\5dpdp.exe29⤵
- Executes dropped EXE
PID:2520 -
\??\c:\rfflrlx.exec:\rfflrlx.exe30⤵
- Executes dropped EXE
PID:1700 -
\??\c:\rlxfflx.exec:\rlxfflx.exe31⤵
- Executes dropped EXE
PID:1864 -
\??\c:\4868406.exec:\4868406.exe32⤵
- Executes dropped EXE
PID:2840 -
\??\c:\nbtthn.exec:\nbtthn.exe33⤵
- Executes dropped EXE
PID:1820 -
\??\c:\lrrrxrf.exec:\lrrrxrf.exe34⤵
- Executes dropped EXE
PID:2808 -
\??\c:\xrllrrf.exec:\xrllrrf.exe35⤵
- Executes dropped EXE
PID:1584 -
\??\c:\xxlxrxl.exec:\xxlxrxl.exe36⤵
- Executes dropped EXE
PID:2236 -
\??\c:\hnbhnt.exec:\hnbhnt.exe37⤵
- Executes dropped EXE
PID:1372 -
\??\c:\84624.exec:\84624.exe38⤵
- Executes dropped EXE
PID:2140 -
\??\c:\202226.exec:\202226.exe39⤵
- Executes dropped EXE
PID:2860 -
\??\c:\7tbbbb.exec:\7tbbbb.exe40⤵
- Executes dropped EXE
PID:2764 -
\??\c:\3rxxxfl.exec:\3rxxxfl.exe41⤵
- Executes dropped EXE
PID:2176 -
\??\c:\08888.exec:\08888.exe42⤵
- Executes dropped EXE
PID:2548 -
\??\c:\lxlfrlr.exec:\lxlfrlr.exe43⤵
- Executes dropped EXE
PID:480 -
\??\c:\26006.exec:\26006.exe44⤵
- Executes dropped EXE
PID:1488 -
\??\c:\vvjjp.exec:\vvjjp.exe45⤵
- Executes dropped EXE
PID:2384 -
\??\c:\3ddjj.exec:\3ddjj.exe46⤵
- Executes dropped EXE
PID:2400 -
\??\c:\62666.exec:\62666.exe47⤵
- Executes dropped EXE
PID:1832 -
\??\c:\24048.exec:\24048.exe48⤵
- Executes dropped EXE
PID:2388 -
\??\c:\264440.exec:\264440.exe49⤵
- Executes dropped EXE
PID:2184 -
\??\c:\hbtthh.exec:\hbtthh.exe50⤵
- Executes dropped EXE
PID:3064 -
\??\c:\0840002.exec:\0840002.exe51⤵
- Executes dropped EXE
PID:2896 -
\??\c:\pjvdj.exec:\pjvdj.exe52⤵
- Executes dropped EXE
PID:2868 -
\??\c:\80082.exec:\80082.exe53⤵
- Executes dropped EXE
PID:3048 -
\??\c:\u040006.exec:\u040006.exe54⤵
- Executes dropped EXE
PID:2076 -
\??\c:\0466222.exec:\0466222.exe55⤵
- Executes dropped EXE
PID:1596 -
\??\c:\5xffrrr.exec:\5xffrrr.exe56⤵
- Executes dropped EXE
PID:1512 -
\??\c:\86840.exec:\86840.exe57⤵
- Executes dropped EXE
PID:1456 -
\??\c:\2460600.exec:\2460600.exe58⤵
- Executes dropped EXE
PID:808 -
\??\c:\68044.exec:\68044.exe59⤵
- Executes dropped EXE
PID:2272 -
\??\c:\6804666.exec:\6804666.exe60⤵
- Executes dropped EXE
PID:2504 -
\??\c:\w68282.exec:\w68282.exe61⤵
- Executes dropped EXE
PID:2148 -
\??\c:\nhbbbt.exec:\nhbbbt.exe62⤵
- Executes dropped EXE
PID:2316 -
\??\c:\pvjvv.exec:\pvjvv.exe63⤵
- Executes dropped EXE
PID:1472 -
\??\c:\jjvvd.exec:\jjvvd.exe64⤵
- Executes dropped EXE
PID:300 -
\??\c:\68608.exec:\68608.exe65⤵
- Executes dropped EXE
PID:1532 -
\??\c:\thnhnh.exec:\thnhnh.exe66⤵PID:1796
-
\??\c:\80228.exec:\80228.exe67⤵PID:568
-
\??\c:\028226.exec:\028226.exe68⤵PID:1672
-
\??\c:\pdppp.exec:\pdppp.exe69⤵PID:908
-
\??\c:\46260.exec:\46260.exe70⤵PID:2512
-
\??\c:\xrxxxxx.exec:\xrxxxxx.exe71⤵PID:2516
-
\??\c:\64284.exec:\64284.exe72⤵PID:1720
-
\??\c:\424440.exec:\424440.exe73⤵PID:2380
-
\??\c:\442806.exec:\442806.exe74⤵PID:2660
-
\??\c:\dpvjd.exec:\dpvjd.exe75⤵PID:2840
-
\??\c:\9pvjd.exec:\9pvjd.exe76⤵PID:2588
-
\??\c:\8688206.exec:\8688206.exe77⤵PID:2848
-
\??\c:\6882888.exec:\6882888.exe78⤵PID:2728
-
\??\c:\02884.exec:\02884.exe79⤵PID:2572
-
\??\c:\fxllrrl.exec:\fxllrrl.exe80⤵PID:2464
-
\??\c:\ppjdd.exec:\ppjdd.exe81⤵PID:2696
-
\??\c:\46604.exec:\46604.exe82⤵
- System Location Discovery: System Language Discovery
PID:2968 -
\??\c:\tnbtnb.exec:\tnbtnb.exe83⤵PID:2200
-
\??\c:\2008002.exec:\2008002.exe84⤵PID:2556
-
\??\c:\3frrrll.exec:\3frrrll.exe85⤵PID:2176
-
\??\c:\c644602.exec:\c644602.exe86⤵PID:2548
-
\??\c:\nbhnhb.exec:\nbhnhb.exe87⤵PID:3036
-
\??\c:\i426604.exec:\i426604.exe88⤵PID:1652
-
\??\c:\420000.exec:\420000.exe89⤵PID:2084
-
\??\c:\jvjjj.exec:\jvjjj.exe90⤵PID:1668
-
\??\c:\3vpdd.exec:\3vpdd.exe91⤵PID:2676
-
\??\c:\u662884.exec:\u662884.exe92⤵PID:2916
-
\??\c:\7xxlfxf.exec:\7xxlfxf.exe93⤵PID:2172
-
\??\c:\bttbhn.exec:\bttbhn.exe94⤵PID:2000
-
\??\c:\6028062.exec:\6028062.exe95⤵PID:2544
-
\??\c:\g8044.exec:\g8044.exe96⤵PID:2092
-
\??\c:\20888.exec:\20888.exe97⤵PID:2888
-
\??\c:\m8000.exec:\m8000.exe98⤵PID:2932
-
\??\c:\rfllllf.exec:\rfllllf.exe99⤵PID:628
-
\??\c:\jvjjp.exec:\jvjjp.exe100⤵PID:2180
-
\??\c:\5ntnnn.exec:\5ntnnn.exe101⤵PID:2268
-
\??\c:\frflffl.exec:\frflffl.exe102⤵PID:2252
-
\??\c:\20222.exec:\20222.exe103⤵PID:2608
-
\??\c:\084066.exec:\084066.exe104⤵PID:2244
-
\??\c:\086060.exec:\086060.exe105⤵PID:2240
-
\??\c:\pdjvv.exec:\pdjvv.exe106⤵PID:2148
-
\??\c:\3jppp.exec:\3jppp.exe107⤵PID:2316
-
\??\c:\4244628.exec:\4244628.exe108⤵PID:1100
-
\??\c:\g8628.exec:\g8628.exe109⤵PID:300
-
\??\c:\5bhhhh.exec:\5bhhhh.exe110⤵PID:1676
-
\??\c:\pdppp.exec:\pdppp.exe111⤵PID:1796
-
\??\c:\jdvjp.exec:\jdvjp.exe112⤵PID:1048
-
\??\c:\4828008.exec:\4828008.exe113⤵PID:2772
-
\??\c:\08000.exec:\08000.exe114⤵PID:908
-
\??\c:\m2000.exec:\m2000.exe115⤵PID:1204
-
\??\c:\nhbhtb.exec:\nhbhtb.exe116⤵PID:2776
-
\??\c:\rlxxflr.exec:\rlxxflr.exe117⤵PID:1952
-
\??\c:\0848484.exec:\0848484.exe118⤵PID:2644
-
\??\c:\6840262.exec:\6840262.exe119⤵PID:2660
-
\??\c:\0880224.exec:\0880224.exe120⤵PID:2700
-
\??\c:\0462880.exec:\0462880.exe121⤵PID:2604
-
\??\c:\nthhhh.exec:\nthhhh.exe122⤵PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-