Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 06:23
Behavioral task
behavioral1
Sample
c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe
Resource
win7-20240708-en
General
-
Target
c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe
-
Size
347KB
-
MD5
6c3f3d01c703a5c6d1398770e539fc76
-
SHA1
d925f70adf8bdac2d5eb88346f18cbd00b9d68a4
-
SHA256
c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751
-
SHA512
ac19d832f5dcdc2f17da5bfc842c29fca8684d4c7822620859a85ca4ea2614a047f223af8dfdacab6f2188387dbfd8b4b8608169c4ecfbeca530e71d6c94b1bf
-
SSDEEP
6144:Lcm4FmowdHoSEYW5fNZWB5hFfci3Add4kGYA41:R4wFHoS3WXZshJX2VGd41
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 42 IoCs
resource yara_rule behavioral1/memory/2200-8-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2156-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2760-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2628-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2920-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2528-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2552-60-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2548-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/560-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2124-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2556-93-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2188-100-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2188-101-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2700-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/796-118-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/796-117-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2728-126-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/544-135-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1624-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2016-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/544-159-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2120-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2140-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/656-197-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1124-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/888-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1656-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2272-290-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2032-291-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2032-292-0x0000000076CD0000-0x0000000076DEF000-memory.dmp family_blackmoon behavioral1/memory/2532-327-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1644-350-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1456-367-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2740-390-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2488-446-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2744-468-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/656-481-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1724-505-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1736-517-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1596-567-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1080-584-0x00000000003A0000-0x00000000003C7000-memory.dmp family_blackmoon behavioral1/memory/2352-729-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2156 hnhbtn.exe 2760 thbhnt.exe 2628 00408.exe 2920 8484446.exe 2528 dpjdp.exe 2552 46406.exe 2556 64006.exe 2548 flxxfrr.exe 560 nnbttt.exe 2124 64224.exe 2188 hbbbbh.exe 2700 tbhbbn.exe 796 4200284.exe 2728 rlrxrxl.exe 544 thttbb.exe 1624 1flrxxf.exe 2860 ntthnt.exe 2016 1vjvj.exe 2020 7jvdj.exe 760 q40820.exe 2120 vpdjp.exe 2140 pvvdj.exe 656 0468402.exe 1744 pvdvj.exe 2236 7pvdv.exe 1124 xrlxffx.exe 2856 4008444.exe 1772 820244.exe 888 a6002.exe 1716 pvdpv.exe 1352 pjdpd.exe 1656 66228.exe 1988 26220.exe 1148 dpdpd.exe 1752 0466882.exe 2272 pjvvj.exe 2032 0840662.exe 1080 608400.exe 2660 xxxrlrf.exe 2812 ttttnn.exe 2752 vjpvv.exe 2924 lfrlfxf.exe 2532 jjvdj.exe 2668 66426.exe 2560 4402024.exe 2780 0448886.exe 1644 886046.exe 3004 42446.exe 1456 tnttbt.exe 2208 2026228.exe 2136 tnbhnt.exe 1992 o028028.exe 2740 4862460.exe 1468 64068.exe 2704 7vvjv.exe 2720 22648.exe 1592 08400.exe 1944 q80400.exe 2832 26802.exe 1996 rlflxxl.exe 1956 a8284.exe 1776 4662884.exe 2488 u806246.exe 2116 22880.exe -
resource yara_rule behavioral1/memory/2200-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000a000000012255-7.dat upx behavioral1/memory/2156-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2200-8-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2156-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000015cb6-18.dat upx behavioral1/memory/2760-25-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2628-26-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000015cda-24.dat upx behavioral1/files/0x0007000000015cf4-34.dat upx behavioral1/memory/2628-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2920-44-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000015d18-43.dat upx behavioral1/files/0x000a000000015d21-52.dat upx behavioral1/memory/2528-51-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000015d29-59.dat upx behavioral1/memory/2552-60-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0007000000017420-67.dat upx behavioral1/memory/2556-68-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0007000000017429-75.dat upx behavioral1/memory/2548-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017447-84.dat upx behavioral1/memory/560-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2124-91-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017467-92.dat upx behavioral1/memory/2188-100-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000017520-102.dat upx behavioral1/memory/2700-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x002b000000015c7b-110.dat upx behavioral1/files/0x0009000000018617-119.dat upx behavioral1/memory/796-117-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018634-127.dat upx behavioral1/files/0x0005000000018636-134.dat upx behavioral1/memory/1624-142-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018741-143.dat upx behavioral1/files/0x000600000001907c-150.dat upx behavioral1/memory/2016-157-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000019080-158.dat upx behavioral1/files/0x000500000001919c-166.dat upx behavioral1/files/0x00050000000191ad-173.dat upx behavioral1/memory/2120-180-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191cf-181.dat upx behavioral1/memory/2140-188-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191d1-189.dat upx behavioral1/memory/656-197-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00050000000191df-196.dat upx behavioral1/files/0x00050000000191f8-204.dat upx behavioral1/memory/2236-211-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x0005000000019214-213.dat upx behavioral1/memory/1124-220-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019219-221.dat upx behavioral1/files/0x000500000001921d-228.dat upx behavioral1/files/0x0005000000019232-235.dat upx behavioral1/files/0x0005000000019329-245.dat upx behavioral1/memory/888-243-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000019345-252.dat upx behavioral1/files/0x0005000000019369-259.dat upx behavioral1/memory/1656-267-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2272-290-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2032-291-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2032-292-0x0000000076CD0000-0x0000000076DEF000-memory.dmp upx behavioral1/memory/2532-327-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1644-350-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1456-367-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrfrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m2280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u806246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4822840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1thhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 426248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o420446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8688400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 644088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2156 2200 c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe 30 PID 2200 wrote to memory of 2156 2200 c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe 30 PID 2200 wrote to memory of 2156 2200 c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe 30 PID 2200 wrote to memory of 2156 2200 c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe 30 PID 2156 wrote to memory of 2760 2156 hnhbtn.exe 31 PID 2156 wrote to memory of 2760 2156 hnhbtn.exe 31 PID 2156 wrote to memory of 2760 2156 hnhbtn.exe 31 PID 2156 wrote to memory of 2760 2156 hnhbtn.exe 31 PID 2760 wrote to memory of 2628 2760 thbhnt.exe 32 PID 2760 wrote to memory of 2628 2760 thbhnt.exe 32 PID 2760 wrote to memory of 2628 2760 thbhnt.exe 32 PID 2760 wrote to memory of 2628 2760 thbhnt.exe 32 PID 2628 wrote to memory of 2920 2628 00408.exe 33 PID 2628 wrote to memory of 2920 2628 00408.exe 33 PID 2628 wrote to memory of 2920 2628 00408.exe 33 PID 2628 wrote to memory of 2920 2628 00408.exe 33 PID 2920 wrote to memory of 2528 2920 8484446.exe 34 PID 2920 wrote to memory of 2528 2920 8484446.exe 34 PID 2920 wrote to memory of 2528 2920 8484446.exe 34 PID 2920 wrote to memory of 2528 2920 8484446.exe 34 PID 2528 wrote to memory of 2552 2528 dpjdp.exe 35 PID 2528 wrote to memory of 2552 2528 dpjdp.exe 35 PID 2528 wrote to memory of 2552 2528 dpjdp.exe 35 PID 2528 wrote to memory of 2552 2528 dpjdp.exe 35 PID 2552 wrote to memory of 2556 2552 46406.exe 36 PID 2552 wrote to memory of 2556 2552 46406.exe 36 PID 2552 wrote to memory of 2556 2552 46406.exe 36 PID 2552 wrote to memory of 2556 2552 46406.exe 36 PID 2556 wrote to memory of 2548 2556 64006.exe 37 PID 2556 wrote to memory of 2548 2556 64006.exe 37 PID 2556 wrote to memory of 2548 2556 64006.exe 37 PID 2556 wrote to memory of 2548 2556 64006.exe 37 PID 2548 wrote to memory of 560 2548 flxxfrr.exe 38 PID 2548 wrote to memory of 560 2548 flxxfrr.exe 38 PID 2548 wrote to memory of 560 2548 flxxfrr.exe 38 PID 2548 wrote to memory of 560 2548 flxxfrr.exe 38 PID 560 wrote to memory of 2124 560 nnbttt.exe 39 PID 560 wrote to memory of 2124 560 nnbttt.exe 39 PID 560 wrote to memory of 2124 560 nnbttt.exe 39 PID 560 wrote to memory of 2124 560 nnbttt.exe 39 PID 2124 wrote to memory of 2188 2124 64224.exe 40 PID 2124 wrote to memory of 2188 2124 64224.exe 40 PID 2124 wrote to memory of 2188 2124 64224.exe 40 PID 2124 wrote to memory of 2188 2124 64224.exe 40 PID 2188 wrote to memory of 2700 2188 hbbbbh.exe 41 PID 2188 wrote to memory of 2700 2188 hbbbbh.exe 41 PID 2188 wrote to memory of 2700 2188 hbbbbh.exe 41 PID 2188 wrote to memory of 2700 2188 hbbbbh.exe 41 PID 2700 wrote to memory of 796 2700 tbhbbn.exe 42 PID 2700 wrote to memory of 796 2700 tbhbbn.exe 42 PID 2700 wrote to memory of 796 2700 tbhbbn.exe 42 PID 2700 wrote to memory of 796 2700 tbhbbn.exe 42 PID 796 wrote to memory of 2728 796 4200284.exe 43 PID 796 wrote to memory of 2728 796 4200284.exe 43 PID 796 wrote to memory of 2728 796 4200284.exe 43 PID 796 wrote to memory of 2728 796 4200284.exe 43 PID 2728 wrote to memory of 544 2728 rlrxrxl.exe 44 PID 2728 wrote to memory of 544 2728 rlrxrxl.exe 44 PID 2728 wrote to memory of 544 2728 rlrxrxl.exe 44 PID 2728 wrote to memory of 544 2728 rlrxrxl.exe 44 PID 544 wrote to memory of 1624 544 thttbb.exe 45 PID 544 wrote to memory of 1624 544 thttbb.exe 45 PID 544 wrote to memory of 1624 544 thttbb.exe 45 PID 544 wrote to memory of 1624 544 thttbb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe"C:\Users\Admin\AppData\Local\Temp\c7b8ed5ceaf18191492886b8a24bc449f6abe23e826b43cd67c03d253d74f751.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\hnhbtn.exec:\hnhbtn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\thbhnt.exec:\thbhnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\00408.exec:\00408.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\8484446.exec:\8484446.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
\??\c:\dpjdp.exec:\dpjdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\46406.exec:\46406.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\64006.exec:\64006.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\flxxfrr.exec:\flxxfrr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\nnbttt.exec:\nnbttt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:560 -
\??\c:\64224.exec:\64224.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\hbbbbh.exec:\hbbbbh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\tbhbbn.exec:\tbhbbn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\4200284.exec:\4200284.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
\??\c:\rlrxrxl.exec:\rlrxrxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\thttbb.exec:\thttbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\1flrxxf.exec:\1flrxxf.exe17⤵
- Executes dropped EXE
PID:1624 -
\??\c:\ntthnt.exec:\ntthnt.exe18⤵
- Executes dropped EXE
PID:2860 -
\??\c:\1vjvj.exec:\1vjvj.exe19⤵
- Executes dropped EXE
PID:2016 -
\??\c:\7jvdj.exec:\7jvdj.exe20⤵
- Executes dropped EXE
PID:2020 -
\??\c:\q40820.exec:\q40820.exe21⤵
- Executes dropped EXE
PID:760 -
\??\c:\vpdjp.exec:\vpdjp.exe22⤵
- Executes dropped EXE
PID:2120 -
\??\c:\pvvdj.exec:\pvvdj.exe23⤵
- Executes dropped EXE
PID:2140 -
\??\c:\0468402.exec:\0468402.exe24⤵
- Executes dropped EXE
PID:656 -
\??\c:\pvdvj.exec:\pvdvj.exe25⤵
- Executes dropped EXE
PID:1744 -
\??\c:\7pvdv.exec:\7pvdv.exe26⤵
- Executes dropped EXE
PID:2236 -
\??\c:\xrlxffx.exec:\xrlxffx.exe27⤵
- Executes dropped EXE
PID:1124 -
\??\c:\4008444.exec:\4008444.exe28⤵
- Executes dropped EXE
PID:2856 -
\??\c:\820244.exec:\820244.exe29⤵
- Executes dropped EXE
PID:1772 -
\??\c:\a6002.exec:\a6002.exe30⤵
- Executes dropped EXE
PID:888 -
\??\c:\pvdpv.exec:\pvdpv.exe31⤵
- Executes dropped EXE
PID:1716 -
\??\c:\pjdpd.exec:\pjdpd.exe32⤵
- Executes dropped EXE
PID:1352 -
\??\c:\66228.exec:\66228.exe33⤵
- Executes dropped EXE
PID:1656 -
\??\c:\26220.exec:\26220.exe34⤵
- Executes dropped EXE
PID:1988 -
\??\c:\dpdpd.exec:\dpdpd.exe35⤵
- Executes dropped EXE
PID:1148 -
\??\c:\0466882.exec:\0466882.exe36⤵
- Executes dropped EXE
PID:1752 -
\??\c:\pjvvj.exec:\pjvvj.exe37⤵
- Executes dropped EXE
PID:2272 -
\??\c:\0840662.exec:\0840662.exe38⤵
- Executes dropped EXE
PID:2032 -
\??\c:\m0484.exec:\m0484.exe39⤵PID:1568
-
\??\c:\608400.exec:\608400.exe40⤵
- Executes dropped EXE
PID:1080 -
\??\c:\xxxrlrf.exec:\xxxrlrf.exe41⤵
- Executes dropped EXE
PID:2660 -
\??\c:\ttttnn.exec:\ttttnn.exe42⤵
- Executes dropped EXE
PID:2812 -
\??\c:\vjpvv.exec:\vjpvv.exe43⤵
- Executes dropped EXE
PID:2752 -
\??\c:\lfrlfxf.exec:\lfrlfxf.exe44⤵
- Executes dropped EXE
PID:2924 -
\??\c:\jjvdj.exec:\jjvdj.exe45⤵
- Executes dropped EXE
PID:2532 -
\??\c:\66426.exec:\66426.exe46⤵
- Executes dropped EXE
PID:2668 -
\??\c:\4402024.exec:\4402024.exe47⤵
- Executes dropped EXE
PID:2560 -
\??\c:\0448886.exec:\0448886.exe48⤵
- Executes dropped EXE
PID:2780 -
\??\c:\886046.exec:\886046.exe49⤵
- Executes dropped EXE
PID:1644 -
\??\c:\42446.exec:\42446.exe50⤵
- Executes dropped EXE
PID:3004 -
\??\c:\tnttbt.exec:\tnttbt.exe51⤵
- Executes dropped EXE
PID:1456 -
\??\c:\2026228.exec:\2026228.exe52⤵
- Executes dropped EXE
PID:2208 -
\??\c:\tnbhnt.exec:\tnbhnt.exe53⤵
- Executes dropped EXE
PID:2136 -
\??\c:\o028028.exec:\o028028.exe54⤵
- Executes dropped EXE
PID:1992 -
\??\c:\4862460.exec:\4862460.exe55⤵
- Executes dropped EXE
PID:2740 -
\??\c:\64068.exec:\64068.exe56⤵
- Executes dropped EXE
PID:1468 -
\??\c:\7vvjv.exec:\7vvjv.exe57⤵
- Executes dropped EXE
PID:2704 -
\??\c:\22648.exec:\22648.exe58⤵
- Executes dropped EXE
PID:2720 -
\??\c:\08400.exec:\08400.exe59⤵
- Executes dropped EXE
PID:1592 -
\??\c:\q80400.exec:\q80400.exe60⤵
- Executes dropped EXE
PID:1944 -
\??\c:\26802.exec:\26802.exe61⤵
- Executes dropped EXE
PID:2832 -
\??\c:\rlflxxl.exec:\rlflxxl.exe62⤵
- Executes dropped EXE
PID:1996 -
\??\c:\a8284.exec:\a8284.exe63⤵
- Executes dropped EXE
PID:1956 -
\??\c:\4662884.exec:\4662884.exe64⤵
- Executes dropped EXE
PID:1776 -
\??\c:\u806246.exec:\u806246.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488 -
\??\c:\22880.exec:\22880.exe66⤵
- Executes dropped EXE
PID:2116 -
\??\c:\ffrrlfx.exec:\ffrrlfx.exe67⤵PID:760
-
\??\c:\1pdvp.exec:\1pdvp.exe68⤵PID:2176
-
\??\c:\84080.exec:\84080.exe69⤵PID:2744
-
\??\c:\080400.exec:\080400.exe70⤵PID:1600
-
\??\c:\4822402.exec:\4822402.exe71⤵PID:656
-
\??\c:\482862.exec:\482862.exe72⤵PID:2948
-
\??\c:\u220042.exec:\u220042.exe73⤵PID:1524
-
\??\c:\hhthtt.exec:\hhthtt.exe74⤵PID:1740
-
\??\c:\ttntnb.exec:\ttntnb.exe75⤵PID:1724
-
\??\c:\646248.exec:\646248.exe76⤵PID:1616
-
\??\c:\i646402.exec:\i646402.exe77⤵PID:1736
-
\??\c:\xrfflrx.exec:\xrfflrx.exe78⤵PID:1708
-
\??\c:\fxrxlfx.exec:\fxrxlfx.exe79⤵PID:2368
-
\??\c:\e64084.exec:\e64084.exe80⤵PID:1232
-
\??\c:\046682.exec:\046682.exe81⤵PID:2452
-
\??\c:\024482.exec:\024482.exe82⤵PID:1656
-
\??\c:\7nbthh.exec:\7nbthh.exe83⤵PID:1056
-
\??\c:\82600.exec:\82600.exe84⤵PID:876
-
\??\c:\vpdjv.exec:\vpdjv.exe85⤵PID:1036
-
\??\c:\jppdp.exec:\jppdp.exe86⤵PID:1596
-
\??\c:\3hbtbn.exec:\3hbtbn.exe87⤵PID:2612
-
\??\c:\i426268.exec:\i426268.exe88⤵PID:2764
-
\??\c:\828000.exec:\828000.exe89⤵PID:1080
-
\??\c:\080006.exec:\080006.exe90⤵PID:2648
-
\??\c:\llxfrlr.exec:\llxfrlr.exe91⤵PID:2768
-
\??\c:\lfxxffl.exec:\lfxxffl.exe92⤵PID:1628
-
\??\c:\bhhhhb.exec:\bhhhhb.exe93⤵PID:2628
-
\??\c:\dddvv.exec:\dddvv.exe94⤵PID:1220
-
\??\c:\7jddp.exec:\7jddp.exe95⤵PID:2516
-
\??\c:\64284.exec:\64284.exe96⤵PID:2560
-
\??\c:\c880846.exec:\c880846.exe97⤵PID:3040
-
\??\c:\tnbhtn.exec:\tnbhtn.exe98⤵PID:1644
-
\??\c:\004080.exec:\004080.exe99⤵PID:940
-
\??\c:\60462.exec:\60462.exe100⤵PID:2224
-
\??\c:\7ttthn.exec:\7ttthn.exe101⤵PID:1052
-
\??\c:\tnbhbh.exec:\tnbhbh.exe102⤵PID:2220
-
\??\c:\dvdpv.exec:\dvdpv.exe103⤵PID:1992
-
\??\c:\06200.exec:\06200.exe104⤵PID:1528
-
\??\c:\046202.exec:\046202.exe105⤵PID:108
-
\??\c:\u480806.exec:\u480806.exe106⤵PID:2492
-
\??\c:\48282.exec:\48282.exe107⤵PID:2336
-
\??\c:\600244.exec:\600244.exe108⤵PID:2872
-
\??\c:\rrflxlx.exec:\rrflxlx.exe109⤵PID:544
-
\??\c:\6424028.exec:\6424028.exe110⤵PID:1880
-
\??\c:\8046280.exec:\8046280.exe111⤵PID:1792
-
\??\c:\6028022.exec:\6028022.exe112⤵PID:1292
-
\??\c:\xxxrfrf.exec:\xxxrfrf.exe113⤵PID:1956
-
\??\c:\tnhtbh.exec:\tnhtbh.exe114⤵PID:688
-
\??\c:\w64066.exec:\w64066.exe115⤵PID:2392
-
\??\c:\tnbbnt.exec:\tnbbnt.exe116⤵PID:2352
-
\??\c:\82680.exec:\82680.exe117⤵PID:760
-
\??\c:\e00028.exec:\e00028.exe118⤵PID:2380
-
\??\c:\ttnbth.exec:\ttnbth.exe119⤵PID:1768
-
\??\c:\88248.exec:\88248.exe120⤵PID:2252
-
\??\c:\btbhhn.exec:\btbhhn.exe121⤵PID:2076
-
\??\c:\7ppdp.exec:\7ppdp.exe122⤵PID:1744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-