Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 14:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe
Resource
win7-20240903-en
7 signatures
120 seconds
General
-
Target
548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe
-
Size
456KB
-
MD5
049dca0ed3a4b4949db1e85fa7adec28
-
SHA1
cbb55b09bb6eb46cb0adb72b0df290b33a0b4d4a
-
SHA256
548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507
-
SHA512
689f0bbc6b9700fe12b6a517a3ffbe5f9aef628db7c6b07bba976287b4e74ecf54cd0a29b4b0af66e6a2393995c6702547e97d28c9000e62ecd0be6ceb085489
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbeR8:q7Tc2NYHUrAwfMp3CDR8
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 38 IoCs
resource yara_rule behavioral1/memory/1600-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2632-16-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2792-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2776-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2300-45-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2536-61-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2984-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2988-80-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2968-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2380-100-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2404-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1440-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2816-127-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/272-139-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2220-176-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2248-192-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1012-200-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1836-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2716-285-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2728-294-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2528-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2660-322-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2532-330-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2320-343-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2320-344-0x0000000000320000-0x000000000034A000-memory.dmp family_blackmoon behavioral1/memory/2856-395-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2508-404-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2940-405-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2940-432-0x0000000001C60000-0x0000000001C8A000-memory.dmp family_blackmoon behavioral1/memory/2624-439-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2476-452-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1876-490-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1532-504-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1532-503-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2456-511-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2088-615-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/1756-882-0x00000000003C0000-0x00000000003EA000-memory.dmp family_blackmoon behavioral1/memory/1740-907-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2632 thtbbt.exe 2792 jjpvj.exe 2776 7thhht.exe 2300 5pdpj.exe 2696 xrllxxf.exe 2536 hbntbb.exe 2984 pdjpp.exe 2988 5nhhnh.exe 2968 pjpjv.exe 2380 lfllfff.exe 2404 thttbb.exe 1440 xlrrxrx.exe 2816 bnthtt.exe 684 pdpvd.exe 272 nhtttt.exe 2412 hthnnn.exe 592 3frrrxx.exe 644 7hbbhh.exe 2220 djpjj.exe 2248 rrlllxl.exe 1012 hthbhb.exe 1836 dvddj.exe 1004 7nhtbb.exe 1524 9pppp.exe 944 xrrflff.exe 2800 9bhbtt.exe 1680 1xlrxfr.exe 2124 rflfrrr.exe 2604 5pdjp.exe 1028 lfrxffr.exe 2716 bbbbhb.exe 2728 7djjj.exe 2884 xlxxxlr.exe 2528 tthbbb.exe 2544 jdpjd.exe 2660 5dpjv.exe 2532 1frrrxx.exe 2644 tntbhb.exe 2320 vjjjp.exe 1748 frxxfxx.exe 3004 bbnttn.exe 2408 dpvjd.exe 2376 3fxrxrf.exe 880 xlrxfrr.exe 2332 nthhnn.exe 1228 dpdjj.exe 2856 7rllllf.exe 2508 7xllxxf.exe 2940 btbbbt.exe 272 dpdvv.exe 1036 9xlfxxx.exe 600 nbntbt.exe 2624 vpdvj.exe 2208 1pvvv.exe 2476 llxrrrl.exe 2108 9htnnn.exe 1040 dvvdj.exe 1144 lxlxflx.exe 2080 tnbbhh.exe 616 9vvpj.exe 1876 pdpvd.exe 1712 frfxffl.exe 1532 tnbhtt.exe 2456 dpvjj.exe -
resource yara_rule behavioral1/memory/1600-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2632-16-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2792-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2776-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2300-45-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2536-61-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2984-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2988-80-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2968-81-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2968-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2380-100-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2404-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1440-118-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2816-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2816-127-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/272-139-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2220-176-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2248-192-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1012-200-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1836-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2716-285-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2728-294-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2528-308-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-315-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2532-323-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2660-322-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2532-330-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2320-343-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2320-344-0x0000000000320000-0x000000000034A000-memory.dmp upx behavioral1/memory/2856-395-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2508-404-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2940-405-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2624-439-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2476-452-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2108-453-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1876-490-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1532-504-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/1532-503-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2456-511-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2776-562-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1684-650-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/272-683-0x00000000003B0000-0x00000000003DA000-memory.dmp upx behavioral1/memory/2836-690-0x00000000003C0000-0x00000000003EA000-memory.dmp upx behavioral1/memory/1236-764-0x0000000000220000-0x000000000024A000-memory.dmp upx behavioral1/memory/2712-811-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1740-907-0x0000000000220000-0x000000000024A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfrrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1xrxrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lflxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrxfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thttbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrffllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3thnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9thhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2632 1600 548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe 30 PID 1600 wrote to memory of 2632 1600 548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe 30 PID 1600 wrote to memory of 2632 1600 548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe 30 PID 1600 wrote to memory of 2632 1600 548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe 30 PID 2632 wrote to memory of 2792 2632 thtbbt.exe 31 PID 2632 wrote to memory of 2792 2632 thtbbt.exe 31 PID 2632 wrote to memory of 2792 2632 thtbbt.exe 31 PID 2632 wrote to memory of 2792 2632 thtbbt.exe 31 PID 2792 wrote to memory of 2776 2792 jjpvj.exe 32 PID 2792 wrote to memory of 2776 2792 jjpvj.exe 32 PID 2792 wrote to memory of 2776 2792 jjpvj.exe 32 PID 2792 wrote to memory of 2776 2792 jjpvj.exe 32 PID 2776 wrote to memory of 2300 2776 7thhht.exe 33 PID 2776 wrote to memory of 2300 2776 7thhht.exe 33 PID 2776 wrote to memory of 2300 2776 7thhht.exe 33 PID 2776 wrote to memory of 2300 2776 7thhht.exe 33 PID 2300 wrote to memory of 2696 2300 5pdpj.exe 34 PID 2300 wrote to memory of 2696 2300 5pdpj.exe 34 PID 2300 wrote to memory of 2696 2300 5pdpj.exe 34 PID 2300 wrote to memory of 2696 2300 5pdpj.exe 34 PID 2696 wrote to memory of 2536 2696 xrllxxf.exe 35 PID 2696 wrote to memory of 2536 2696 xrllxxf.exe 35 PID 2696 wrote to memory of 2536 2696 xrllxxf.exe 35 PID 2696 wrote to memory of 2536 2696 xrllxxf.exe 35 PID 2536 wrote to memory of 2984 2536 hbntbb.exe 36 PID 2536 wrote to memory of 2984 2536 hbntbb.exe 36 PID 2536 wrote to memory of 2984 2536 hbntbb.exe 36 PID 2536 wrote to memory of 2984 2536 hbntbb.exe 36 PID 2984 wrote to memory of 2988 2984 pdjpp.exe 37 PID 2984 wrote to memory of 2988 2984 pdjpp.exe 37 PID 2984 wrote to memory of 2988 2984 pdjpp.exe 37 PID 2984 wrote to memory of 2988 2984 pdjpp.exe 37 PID 2988 wrote to memory of 2968 2988 5nhhnh.exe 38 PID 2988 wrote to memory of 2968 2988 5nhhnh.exe 38 PID 2988 wrote to memory of 2968 2988 5nhhnh.exe 38 PID 2988 wrote to memory of 2968 2988 5nhhnh.exe 38 PID 2968 wrote to memory of 2380 2968 pjpjv.exe 39 PID 2968 wrote to memory of 2380 2968 pjpjv.exe 39 PID 2968 wrote to memory of 2380 2968 pjpjv.exe 39 PID 2968 wrote to memory of 2380 2968 pjpjv.exe 39 PID 2380 wrote to memory of 2404 2380 lfllfff.exe 40 PID 2380 wrote to memory of 2404 2380 lfllfff.exe 40 PID 2380 wrote to memory of 2404 2380 lfllfff.exe 40 PID 2380 wrote to memory of 2404 2380 lfllfff.exe 40 PID 2404 wrote to memory of 1440 2404 thttbb.exe 41 PID 2404 wrote to memory of 1440 2404 thttbb.exe 41 PID 2404 wrote to memory of 1440 2404 thttbb.exe 41 PID 2404 wrote to memory of 1440 2404 thttbb.exe 41 PID 1440 wrote to memory of 2816 1440 xlrrxrx.exe 42 PID 1440 wrote to memory of 2816 1440 xlrrxrx.exe 42 PID 1440 wrote to memory of 2816 1440 xlrrxrx.exe 42 PID 1440 wrote to memory of 2816 1440 xlrrxrx.exe 42 PID 2816 wrote to memory of 684 2816 bnthtt.exe 43 PID 2816 wrote to memory of 684 2816 bnthtt.exe 43 PID 2816 wrote to memory of 684 2816 bnthtt.exe 43 PID 2816 wrote to memory of 684 2816 bnthtt.exe 43 PID 684 wrote to memory of 272 684 pdpvd.exe 44 PID 684 wrote to memory of 272 684 pdpvd.exe 44 PID 684 wrote to memory of 272 684 pdpvd.exe 44 PID 684 wrote to memory of 272 684 pdpvd.exe 44 PID 272 wrote to memory of 2412 272 nhtttt.exe 45 PID 272 wrote to memory of 2412 272 nhtttt.exe 45 PID 272 wrote to memory of 2412 272 nhtttt.exe 45 PID 272 wrote to memory of 2412 272 nhtttt.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe"C:\Users\Admin\AppData\Local\Temp\548e6d58c5d96675888dacca801b0f742d31cdcbe79e439fd545e9a14db13507.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\thtbbt.exec:\thtbbt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\jjpvj.exec:\jjpvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\7thhht.exec:\7thhht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\5pdpj.exec:\5pdpj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\xrllxxf.exec:\xrllxxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\hbntbb.exec:\hbntbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\pdjpp.exec:\pdjpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\5nhhnh.exec:\5nhhnh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\pjpjv.exec:\pjpjv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\lfllfff.exec:\lfllfff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\thttbb.exec:\thttbb.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\xlrrxrx.exec:\xlrrxrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
\??\c:\bnthtt.exec:\bnthtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\pdpvd.exec:\pdpvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\nhtttt.exec:\nhtttt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:272 -
\??\c:\hthnnn.exec:\hthnnn.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
\??\c:\3frrrxx.exec:\3frrrxx.exe18⤵
- Executes dropped EXE
PID:592 -
\??\c:\7hbbhh.exec:\7hbbhh.exe19⤵
- Executes dropped EXE
PID:644 -
\??\c:\djpjj.exec:\djpjj.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220 -
\??\c:\rrlllxl.exec:\rrlllxl.exe21⤵
- Executes dropped EXE
PID:2248 -
\??\c:\hthbhb.exec:\hthbhb.exe22⤵
- Executes dropped EXE
PID:1012 -
\??\c:\dvddj.exec:\dvddj.exe23⤵
- Executes dropped EXE
PID:1836 -
\??\c:\7nhtbb.exec:\7nhtbb.exe24⤵
- Executes dropped EXE
PID:1004 -
\??\c:\9pppp.exec:\9pppp.exe25⤵
- Executes dropped EXE
PID:1524 -
\??\c:\xrrflff.exec:\xrrflff.exe26⤵
- Executes dropped EXE
PID:944 -
\??\c:\9bhbtt.exec:\9bhbtt.exe27⤵
- Executes dropped EXE
PID:2800 -
\??\c:\1xlrxfr.exec:\1xlrxfr.exe28⤵
- Executes dropped EXE
PID:1680 -
\??\c:\rflfrrr.exec:\rflfrrr.exe29⤵
- Executes dropped EXE
PID:2124 -
\??\c:\5pdjp.exec:\5pdjp.exe30⤵
- Executes dropped EXE
PID:2604 -
\??\c:\lfrxffr.exec:\lfrxffr.exe31⤵
- Executes dropped EXE
PID:1028 -
\??\c:\bbbbhb.exec:\bbbbhb.exe32⤵
- Executes dropped EXE
PID:2716 -
\??\c:\7djjj.exec:\7djjj.exe33⤵
- Executes dropped EXE
PID:2728 -
\??\c:\xlxxxlr.exec:\xlxxxlr.exe34⤵
- Executes dropped EXE
PID:2884 -
\??\c:\tthbbb.exec:\tthbbb.exe35⤵
- Executes dropped EXE
PID:2528 -
\??\c:\jdpjd.exec:\jdpjd.exe36⤵
- Executes dropped EXE
PID:2544 -
\??\c:\5dpjv.exec:\5dpjv.exe37⤵
- Executes dropped EXE
PID:2660 -
\??\c:\1frrrxx.exec:\1frrrxx.exe38⤵
- Executes dropped EXE
PID:2532 -
\??\c:\tntbhb.exec:\tntbhb.exe39⤵
- Executes dropped EXE
PID:2644 -
\??\c:\vjjjp.exec:\vjjjp.exe40⤵
- Executes dropped EXE
PID:2320 -
\??\c:\frxxfxx.exec:\frxxfxx.exe41⤵
- Executes dropped EXE
PID:1748 -
\??\c:\bbnttn.exec:\bbnttn.exe42⤵
- Executes dropped EXE
PID:3004 -
\??\c:\dpvjd.exec:\dpvjd.exe43⤵
- Executes dropped EXE
PID:2408 -
\??\c:\3fxrxrf.exec:\3fxrxrf.exe44⤵
- Executes dropped EXE
PID:2376 -
\??\c:\xlrxfrr.exec:\xlrxfrr.exe45⤵
- Executes dropped EXE
PID:880 -
\??\c:\nthhnn.exec:\nthhnn.exe46⤵
- Executes dropped EXE
PID:2332 -
\??\c:\dpdjj.exec:\dpdjj.exe47⤵
- Executes dropped EXE
PID:1228 -
\??\c:\7rllllf.exec:\7rllllf.exe48⤵
- Executes dropped EXE
PID:2856 -
\??\c:\7xllxxf.exec:\7xllxxf.exe49⤵
- Executes dropped EXE
PID:2508 -
\??\c:\btbbbt.exec:\btbbbt.exe50⤵
- Executes dropped EXE
PID:2940 -
\??\c:\dpdvv.exec:\dpdvv.exe51⤵
- Executes dropped EXE
PID:272 -
\??\c:\9xlfxxx.exec:\9xlfxxx.exe52⤵
- Executes dropped EXE
PID:1036 -
\??\c:\nbntbt.exec:\nbntbt.exe53⤵
- Executes dropped EXE
PID:600 -
\??\c:\vpdvj.exec:\vpdvj.exe54⤵
- Executes dropped EXE
PID:2624 -
\??\c:\1pvvv.exec:\1pvvv.exe55⤵
- Executes dropped EXE
PID:2208 -
\??\c:\llxrrrl.exec:\llxrrrl.exe56⤵
- Executes dropped EXE
PID:2476 -
\??\c:\9htnnn.exec:\9htnnn.exe57⤵
- Executes dropped EXE
PID:2108 -
\??\c:\dvvdj.exec:\dvvdj.exe58⤵
- Executes dropped EXE
PID:1040 -
\??\c:\lxlxflx.exec:\lxlxflx.exe59⤵
- Executes dropped EXE
PID:1144 -
\??\c:\tnbbhh.exec:\tnbbhh.exe60⤵
- Executes dropped EXE
PID:2080 -
\??\c:\9vvpj.exec:\9vvpj.exe61⤵
- Executes dropped EXE
PID:616 -
\??\c:\pdpvd.exec:\pdpvd.exe62⤵
- Executes dropped EXE
PID:1876 -
\??\c:\frfxffl.exec:\frfxffl.exe63⤵
- Executes dropped EXE
PID:1712 -
\??\c:\tnbhtt.exec:\tnbhtt.exe64⤵
- Executes dropped EXE
PID:1532 -
\??\c:\dpvjj.exec:\dpvjj.exe65⤵
- Executes dropped EXE
PID:2456 -
\??\c:\llrlrrx.exec:\llrlrrx.exe66⤵PID:1956
-
\??\c:\bthbbb.exec:\bthbbb.exe67⤵PID:276
-
\??\c:\dvjvj.exec:\dvjvj.exe68⤵PID:1852
-
\??\c:\pjpjj.exec:\pjpjj.exe69⤵PID:2628
-
\??\c:\lfxxfxf.exec:\lfxxfxf.exe70⤵PID:1628
-
\??\c:\9nhbbb.exec:\9nhbbb.exe71⤵PID:1444
-
\??\c:\pjpdd.exec:\pjpdd.exe72⤵PID:2676
-
\??\c:\5pdvv.exec:\5pdvv.exe73⤵PID:2680
-
\??\c:\5flrrrx.exec:\5flrrrx.exe74⤵PID:2776
-
\??\c:\hbnhbb.exec:\hbnhbb.exe75⤵PID:2780
-
\??\c:\3hhnnn.exec:\3hhnnn.exe76⤵PID:2544
-
\??\c:\jdjvv.exec:\jdjvv.exe77⤵PID:2572
-
\??\c:\5lxrrll.exec:\5lxrrll.exe78⤵PID:2088
-
\??\c:\bthbhh.exec:\bthbhh.exe79⤵PID:3048
-
\??\c:\5bnnhh.exec:\5bnnhh.exe80⤵PID:2320
-
\??\c:\dpvpv.exec:\dpvpv.exe81⤵PID:2336
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe82⤵PID:2968
-
\??\c:\1xflrlr.exec:\1xflrlr.exe83⤵PID:2408
-
\??\c:\hbntht.exec:\hbntht.exe84⤵PID:2404
-
\??\c:\dpddj.exec:\dpddj.exe85⤵PID:2824
-
\??\c:\dpddj.exec:\dpddj.exe86⤵PID:1664
-
\??\c:\1lxrffl.exec:\1lxrffl.exe87⤵PID:2844
-
\??\c:\7flrrrx.exec:\7flrrrx.exe88⤵PID:1684
-
\??\c:\nhbbnn.exec:\nhbbnn.exe89⤵PID:2756
-
\??\c:\dvjjj.exec:\dvjjj.exe90⤵PID:2836
-
\??\c:\rrffrrx.exec:\rrffrrx.exe91⤵PID:1816
-
\??\c:\xlllrrx.exec:\xlllrrx.exe92⤵PID:272
-
\??\c:\1bnthh.exec:\1bnthh.exe93⤵PID:1108
-
\??\c:\7jppd.exec:\7jppd.exe94⤵PID:1484
-
\??\c:\1rrrffr.exec:\1rrrffr.exe95⤵PID:2892
-
\??\c:\hbnhnt.exec:\hbnhnt.exe96⤵PID:1860
-
\??\c:\vjddj.exec:\vjddj.exe97⤵PID:1608
-
\??\c:\3vjvv.exec:\3vjvv.exe98⤵PID:2172
-
\??\c:\fxllrrr.exec:\fxllrrr.exe99⤵PID:2032
-
\??\c:\nbhbbb.exec:\nbhbbb.exe100⤵PID:1776
-
\??\c:\3vdjp.exec:\3vdjp.exe101⤵PID:916
-
\??\c:\ppdjp.exec:\ppdjp.exe102⤵PID:968
-
\??\c:\7lflffl.exec:\7lflffl.exe103⤵PID:1744
-
\??\c:\7nhbhh.exec:\7nhbhh.exe104⤵PID:1236
-
\??\c:\jjvdp.exec:\jjvdp.exe105⤵PID:2448
-
\??\c:\vpdvv.exec:\vpdvv.exe106⤵PID:1704
-
\??\c:\lfxlrrx.exec:\lfxlrrx.exe107⤵PID:2124
-
\??\c:\tbnhnh.exec:\tbnhnh.exe108⤵PID:2604
-
\??\c:\dpvpp.exec:\dpvpp.exe109⤵PID:1584
-
\??\c:\pjvdp.exec:\pjvdp.exe110⤵PID:1564
-
\??\c:\xfflflx.exec:\xfflflx.exe111⤵PID:2720
-
\??\c:\btntbb.exec:\btntbb.exe112⤵PID:2712
-
\??\c:\jdjdp.exec:\jdjdp.exe113⤵PID:2652
-
\??\c:\pdvjp.exec:\pdvjp.exe114⤵PID:2840
-
\??\c:\1xffxlr.exec:\1xffxlr.exe115⤵PID:2640
-
\??\c:\nhbtbt.exec:\nhbtbt.exe116⤵PID:2696
-
\??\c:\jdjjj.exec:\jdjjj.exe117⤵PID:2596
-
\??\c:\rfxxfff.exec:\rfxxfff.exe118⤵PID:2536
-
\??\c:\frrfrlf.exec:\frrfrlf.exe119⤵PID:1756
-
\??\c:\tntntt.exec:\tntntt.exe120⤵PID:2992
-
\??\c:\pjdvp.exec:\pjdvp.exe121⤵
- System Location Discovery: System Language Discovery
PID:340 -
\??\c:\rlxxflr.exec:\rlxxflr.exe122⤵PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-