Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe
Resource
win7-20240903-en
General
-
Target
6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe
-
Size
418KB
-
MD5
4ad438824d278a6a85ac68d0079d10d0
-
SHA1
a0dc803bc7b73cb775304be6a11fd1417aa9fd05
-
SHA256
6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808fa
-
SHA512
b12be3338ed39e705b4ae4a07d3faade087e0c4d5e58da004a6ff0b04bffe965478325d8f8582c93f6dbad0075468a367668f3b06fa5f4cb71cd64f2e0a7e173
-
SSDEEP
12288:n3C9ytvngQj4DtvnV9wLn9UTfC8eieJNBNIsYPT:SgdnJUdnV9z
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/4924-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/220-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2136-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4440-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2064-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4924-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1132-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1508-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4860-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1652-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3108-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4392-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1272-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/392-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2296-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/856-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3400-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2932-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 220 bhhnhn.exe 2064 xrxlfxl.exe 4440 jjjdp.exe 2136 028246.exe 3832 pjjdd.exe 1132 i442000.exe 4172 3rrrrrr.exe 1140 26660.exe 4748 6844806.exe 1584 1tnhbh.exe 4452 0804882.exe 4228 7jdvp.exe 1508 6482468.exe 4860 hntnbb.exe 1652 fflfllx.exe 3108 9pjdv.exe 4392 c848826.exe 2128 bbbhhh.exe 2100 k42600.exe 2728 24682.exe 4352 006066.exe 2612 lflfxxx.exe 1272 xfflxxf.exe 532 vddvp.exe 4120 tntttt.exe 392 440004.exe 2296 q80882.exe 856 thbtnn.exe 3400 bttnnn.exe 1524 208626.exe 2932 dpvpj.exe 4320 s2422.exe 4560 44208.exe 2408 464204.exe 2844 a6042.exe 3644 666426.exe 4440 e04620.exe 1512 84864.exe 1352 466460.exe 1724 jvpdp.exe 5036 1dvjv.exe 3768 pddpd.exe 3080 o020088.exe 3916 thhhth.exe 3084 9dvjd.exe 5100 5vvvj.exe 3964 68264.exe 2500 660484.exe 4048 66264.exe 4812 3lfxfxr.exe 2952 2064264.exe 1508 48820.exe 1760 662688.exe 1684 hnnbnb.exe 1972 666808.exe 228 o888664.exe 4392 lrrfrlx.exe 4240 pjjdj.exe 3480 pdjjp.exe 2356 xlfrfxl.exe 2884 bnnbtn.exe 4256 dvdvj.exe 2972 q66022.exe 64 btnbnh.exe -
resource yara_rule behavioral2/memory/4924-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/220-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2136-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4440-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2064-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1132-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1508-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4860-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1652-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3108-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4392-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1272-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/392-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2296-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/856-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3400-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-207-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6886420.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ththnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 440088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e84866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 640600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4020044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5tthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g2608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s8048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rrfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4282888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1flxrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8644482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c804884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2848266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xrfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 866080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 220 4924 6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe 89 PID 4924 wrote to memory of 220 4924 6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe 89 PID 4924 wrote to memory of 220 4924 6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe 89 PID 220 wrote to memory of 2064 220 bhhnhn.exe 90 PID 220 wrote to memory of 2064 220 bhhnhn.exe 90 PID 220 wrote to memory of 2064 220 bhhnhn.exe 90 PID 2064 wrote to memory of 4440 2064 xrxlfxl.exe 91 PID 2064 wrote to memory of 4440 2064 xrxlfxl.exe 91 PID 2064 wrote to memory of 4440 2064 xrxlfxl.exe 91 PID 4440 wrote to memory of 2136 4440 jjjdp.exe 92 PID 4440 wrote to memory of 2136 4440 jjjdp.exe 92 PID 4440 wrote to memory of 2136 4440 jjjdp.exe 92 PID 2136 wrote to memory of 3832 2136 028246.exe 93 PID 2136 wrote to memory of 3832 2136 028246.exe 93 PID 2136 wrote to memory of 3832 2136 028246.exe 93 PID 3832 wrote to memory of 1132 3832 pjjdd.exe 94 PID 3832 wrote to memory of 1132 3832 pjjdd.exe 94 PID 3832 wrote to memory of 1132 3832 pjjdd.exe 94 PID 1132 wrote to memory of 4172 1132 i442000.exe 95 PID 1132 wrote to memory of 4172 1132 i442000.exe 95 PID 1132 wrote to memory of 4172 1132 i442000.exe 95 PID 4172 wrote to memory of 1140 4172 3rrrrrr.exe 96 PID 4172 wrote to memory of 1140 4172 3rrrrrr.exe 96 PID 4172 wrote to memory of 1140 4172 3rrrrrr.exe 96 PID 1140 wrote to memory of 4748 1140 26660.exe 97 PID 1140 wrote to memory of 4748 1140 26660.exe 97 PID 1140 wrote to memory of 4748 1140 26660.exe 97 PID 4748 wrote to memory of 1584 4748 6844806.exe 98 PID 4748 wrote to memory of 1584 4748 6844806.exe 98 PID 4748 wrote to memory of 1584 4748 6844806.exe 98 PID 1584 wrote to memory of 4452 1584 1tnhbh.exe 99 PID 1584 wrote to memory of 4452 1584 1tnhbh.exe 99 PID 1584 wrote to memory of 4452 1584 1tnhbh.exe 99 PID 4452 wrote to memory of 4228 4452 0804882.exe 100 PID 4452 wrote to memory of 4228 4452 0804882.exe 100 PID 4452 wrote to memory of 4228 4452 0804882.exe 100 PID 4228 wrote to memory of 1508 4228 7jdvp.exe 101 PID 4228 wrote to memory of 1508 4228 7jdvp.exe 101 PID 4228 wrote to memory of 1508 4228 7jdvp.exe 101 PID 1508 wrote to memory of 4860 1508 6482468.exe 102 PID 1508 wrote to memory of 4860 1508 6482468.exe 102 PID 1508 wrote to memory of 4860 1508 6482468.exe 102 PID 4860 wrote to memory of 1652 4860 hntnbb.exe 103 PID 4860 wrote to memory of 1652 4860 hntnbb.exe 103 PID 4860 wrote to memory of 1652 4860 hntnbb.exe 103 PID 1652 wrote to memory of 3108 1652 fflfllx.exe 104 PID 1652 wrote to memory of 3108 1652 fflfllx.exe 104 PID 1652 wrote to memory of 3108 1652 fflfllx.exe 104 PID 3108 wrote to memory of 4392 3108 9pjdv.exe 105 PID 3108 wrote to memory of 4392 3108 9pjdv.exe 105 PID 3108 wrote to memory of 4392 3108 9pjdv.exe 105 PID 4392 wrote to memory of 2128 4392 c848826.exe 106 PID 4392 wrote to memory of 2128 4392 c848826.exe 106 PID 4392 wrote to memory of 2128 4392 c848826.exe 106 PID 2128 wrote to memory of 2100 2128 bbbhhh.exe 107 PID 2128 wrote to memory of 2100 2128 bbbhhh.exe 107 PID 2128 wrote to memory of 2100 2128 bbbhhh.exe 107 PID 2100 wrote to memory of 2728 2100 k42600.exe 108 PID 2100 wrote to memory of 2728 2100 k42600.exe 108 PID 2100 wrote to memory of 2728 2100 k42600.exe 108 PID 2728 wrote to memory of 4352 2728 24682.exe 109 PID 2728 wrote to memory of 4352 2728 24682.exe 109 PID 2728 wrote to memory of 4352 2728 24682.exe 109 PID 4352 wrote to memory of 2612 4352 006066.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe"C:\Users\Admin\AppData\Local\Temp\6281c3bd3847542a6dd73c29a6d73d16748848e1c9c60d99e38634b86ae808faN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\bhhnhn.exec:\bhhnhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\xrxlfxl.exec:\xrxlfxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\jjjdp.exec:\jjjdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\028246.exec:\028246.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\pjjdd.exec:\pjjdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\i442000.exec:\i442000.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\3rrrrrr.exec:\3rrrrrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\26660.exec:\26660.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
\??\c:\6844806.exec:\6844806.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\1tnhbh.exec:\1tnhbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\0804882.exec:\0804882.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
\??\c:\7jdvp.exec:\7jdvp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\6482468.exec:\6482468.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\hntnbb.exec:\hntnbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\fflfllx.exec:\fflfllx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\9pjdv.exec:\9pjdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
\??\c:\c848826.exec:\c848826.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\bbbhhh.exec:\bbbhhh.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\k42600.exec:\k42600.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\24682.exec:\24682.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\006066.exec:\006066.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\lflfxxx.exec:\lflfxxx.exe23⤵
- Executes dropped EXE
PID:2612 -
\??\c:\xfflxxf.exec:\xfflxxf.exe24⤵
- Executes dropped EXE
PID:1272 -
\??\c:\vddvp.exec:\vddvp.exe25⤵
- Executes dropped EXE
PID:532 -
\??\c:\tntttt.exec:\tntttt.exe26⤵
- Executes dropped EXE
PID:4120 -
\??\c:\440004.exec:\440004.exe27⤵
- Executes dropped EXE
PID:392 -
\??\c:\q80882.exec:\q80882.exe28⤵
- Executes dropped EXE
PID:2296 -
\??\c:\thbtnn.exec:\thbtnn.exe29⤵
- Executes dropped EXE
PID:856 -
\??\c:\bttnnn.exec:\bttnnn.exe30⤵
- Executes dropped EXE
PID:3400 -
\??\c:\208626.exec:\208626.exe31⤵
- Executes dropped EXE
PID:1524 -
\??\c:\dpvpj.exec:\dpvpj.exe32⤵
- Executes dropped EXE
PID:2932 -
\??\c:\s2422.exec:\s2422.exe33⤵
- Executes dropped EXE
PID:4320 -
\??\c:\44208.exec:\44208.exe34⤵
- Executes dropped EXE
PID:4560 -
\??\c:\464204.exec:\464204.exe35⤵
- Executes dropped EXE
PID:2408 -
\??\c:\a6042.exec:\a6042.exe36⤵
- Executes dropped EXE
PID:2844 -
\??\c:\666426.exec:\666426.exe37⤵
- Executes dropped EXE
PID:3644 -
\??\c:\e04620.exec:\e04620.exe38⤵
- Executes dropped EXE
PID:4440 -
\??\c:\84864.exec:\84864.exe39⤵
- Executes dropped EXE
PID:1512 -
\??\c:\466460.exec:\466460.exe40⤵
- Executes dropped EXE
PID:1352 -
\??\c:\jvpdp.exec:\jvpdp.exe41⤵
- Executes dropped EXE
PID:1724 -
\??\c:\1dvjv.exec:\1dvjv.exe42⤵
- Executes dropped EXE
PID:5036 -
\??\c:\pddpd.exec:\pddpd.exe43⤵
- Executes dropped EXE
PID:3768 -
\??\c:\o020088.exec:\o020088.exe44⤵
- Executes dropped EXE
PID:3080 -
\??\c:\thhhth.exec:\thhhth.exe45⤵
- Executes dropped EXE
PID:3916 -
\??\c:\9dvjd.exec:\9dvjd.exe46⤵
- Executes dropped EXE
PID:3084 -
\??\c:\5vvvj.exec:\5vvvj.exe47⤵
- Executes dropped EXE
PID:5100 -
\??\c:\68264.exec:\68264.exe48⤵
- Executes dropped EXE
PID:3964 -
\??\c:\660484.exec:\660484.exe49⤵
- Executes dropped EXE
PID:2500 -
\??\c:\66264.exec:\66264.exe50⤵
- Executes dropped EXE
PID:4048 -
\??\c:\3lfxfxr.exec:\3lfxfxr.exe51⤵
- Executes dropped EXE
PID:4812 -
\??\c:\2064264.exec:\2064264.exe52⤵
- Executes dropped EXE
PID:2952 -
\??\c:\48820.exec:\48820.exe53⤵
- Executes dropped EXE
PID:1508 -
\??\c:\662688.exec:\662688.exe54⤵
- Executes dropped EXE
PID:1760 -
\??\c:\hnnbnb.exec:\hnnbnb.exe55⤵
- Executes dropped EXE
PID:1684 -
\??\c:\666808.exec:\666808.exe56⤵
- Executes dropped EXE
PID:1972 -
\??\c:\o888664.exec:\o888664.exe57⤵
- Executes dropped EXE
PID:228 -
\??\c:\lrrfrlx.exec:\lrrfrlx.exe58⤵
- Executes dropped EXE
PID:4392 -
\??\c:\pjjdj.exec:\pjjdj.exe59⤵
- Executes dropped EXE
PID:4240 -
\??\c:\pdjjp.exec:\pdjjp.exe60⤵
- Executes dropped EXE
PID:3480 -
\??\c:\xlfrfxl.exec:\xlfrfxl.exe61⤵
- Executes dropped EXE
PID:2356 -
\??\c:\bnnbtn.exec:\bnnbtn.exe62⤵
- Executes dropped EXE
PID:2884 -
\??\c:\dvdvj.exec:\dvdvj.exe63⤵
- Executes dropped EXE
PID:4256 -
\??\c:\q66022.exec:\q66022.exe64⤵
- Executes dropped EXE
PID:2972 -
\??\c:\btnbnh.exec:\btnbnh.exe65⤵
- Executes dropped EXE
PID:64 -
\??\c:\26220.exec:\26220.exe66⤵PID:948
-
\??\c:\jvvpd.exec:\jvvpd.exe67⤵PID:2496
-
\??\c:\62224.exec:\62224.exe68⤵PID:928
-
\??\c:\68808.exec:\68808.exe69⤵PID:3756
-
\??\c:\1nhthb.exec:\1nhthb.exe70⤵PID:3980
-
\??\c:\7ffflrf.exec:\7ffflrf.exe71⤵PID:1304
-
\??\c:\frrxllf.exec:\frrxllf.exe72⤵PID:1356
-
\??\c:\o620044.exec:\o620044.exe73⤵PID:1656
-
\??\c:\7btnth.exec:\7btnth.exe74⤵PID:1524
-
\??\c:\1lfrrrf.exec:\1lfrrrf.exe75⤵PID:1504
-
\??\c:\268642.exec:\268642.exe76⤵PID:4332
-
\??\c:\5fxlfxr.exec:\5fxlfxr.exe77⤵PID:640
-
\??\c:\k06442.exec:\k06442.exe78⤵PID:4372
-
\??\c:\26482.exec:\26482.exe79⤵PID:1828
-
\??\c:\tnnbnh.exec:\tnnbnh.exe80⤵PID:2180
-
\??\c:\tbbnbb.exec:\tbbnbb.exe81⤵PID:1192
-
\??\c:\2484226.exec:\2484226.exe82⤵PID:4440
-
\??\c:\vpjdp.exec:\vpjdp.exe83⤵
- System Location Discovery: System Language Discovery
PID:1012 -
\??\c:\vddvp.exec:\vddvp.exe84⤵PID:3832
-
\??\c:\644804.exec:\644804.exe85⤵PID:5036
-
\??\c:\rrxflfx.exec:\rrxflfx.exe86⤵PID:4840
-
\??\c:\9xxrfxr.exec:\9xxrfxr.exe87⤵PID:4568
-
\??\c:\48400.exec:\48400.exe88⤵PID:3160
-
\??\c:\04042.exec:\04042.exe89⤵PID:4496
-
\??\c:\bhthbt.exec:\bhthbt.exe90⤵PID:5100
-
\??\c:\g8242.exec:\g8242.exe91⤵PID:3440
-
\??\c:\jpjvd.exec:\jpjvd.exe92⤵PID:4048
-
\??\c:\jdddp.exec:\jdddp.exe93⤵PID:1892
-
\??\c:\2408820.exec:\2408820.exe94⤵PID:2952
-
\??\c:\08404.exec:\08404.exe95⤵PID:1440
-
\??\c:\5jpdp.exec:\5jpdp.exe96⤵PID:1760
-
\??\c:\pddjv.exec:\pddjv.exe97⤵PID:4360
-
\??\c:\xrlfrlf.exec:\xrlfrlf.exe98⤵PID:1972
-
\??\c:\g0082.exec:\g0082.exe99⤵PID:228
-
\??\c:\08664.exec:\08664.exe100⤵PID:692
-
\??\c:\222806.exec:\222806.exe101⤵PID:4240
-
\??\c:\k22082.exec:\k22082.exe102⤵PID:2868
-
\??\c:\dvpdv.exec:\dvpdv.exe103⤵PID:2356
-
\??\c:\0820420.exec:\0820420.exe104⤵PID:2872
-
\??\c:\608882.exec:\608882.exe105⤵PID:880
-
\??\c:\jjvpp.exec:\jjvpp.exe106⤵PID:2320
-
\??\c:\082648.exec:\082648.exe107⤵PID:696
-
\??\c:\2460488.exec:\2460488.exe108⤵PID:3404
-
\??\c:\i860820.exec:\i860820.exe109⤵PID:1144
-
\??\c:\jdvjd.exec:\jdvjd.exe110⤵PID:3976
-
\??\c:\flrrlll.exec:\flrrlll.exe111⤵PID:3940
-
\??\c:\m8882.exec:\m8882.exe112⤵PID:4180
-
\??\c:\006408.exec:\006408.exe113⤵PID:2004
-
\??\c:\3jjvp.exec:\3jjvp.exe114⤵PID:5044
-
\??\c:\8248822.exec:\8248822.exe115⤵PID:3624
-
\??\c:\440422.exec:\440422.exe116⤵PID:1428
-
\??\c:\o404820.exec:\o404820.exe117⤵PID:4336
-
\??\c:\vppjd.exec:\vppjd.exe118⤵PID:220
-
\??\c:\vdjdv.exec:\vdjdv.exe119⤵PID:2420
-
\??\c:\3lllffx.exec:\3lllffx.exe120⤵PID:5068
-
\??\c:\lrxlfxr.exec:\lrxlfxr.exe121⤵PID:4368
-
\??\c:\2008648.exec:\2008648.exe122⤵PID:2164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-