Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/12/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe
Resource
win7-20241010-en
General
-
Target
fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe
-
Size
453KB
-
MD5
0d5dbd3128661d1fdd52bd54caae0230
-
SHA1
53aa308495331373035b48c45f3a353eebca1fca
-
SHA256
fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3
-
SHA512
d462d3fbb01d86e0da944600f6ec636755021bea9d31946fc3f83829c7f0eeb6c640965d87539f0bf213e2f1168c1afb260587b5559de091a8f5043bba49e70c
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwfsDX2UznsaFVNJCMKAbec:q7Tc2NYHUrAwfMp3CDc
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 39 IoCs
resource yara_rule behavioral1/memory/2564-11-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1832-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2600-29-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2600-27-0x0000000000230000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/1800-40-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3060-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2176-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2912-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2648-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2816-88-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1616-108-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1352-125-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2720-144-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2560-152-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3004-177-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2856-186-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1708-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2304-287-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1568-315-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2352-328-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2124-344-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2408-410-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2412-418-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1152-425-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1548-432-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2640-439-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1196-452-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2960-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1956-459-0x0000000000220000-0x000000000024A000-memory.dmp family_blackmoon behavioral1/memory/2544-518-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1728-551-0x00000000001B0000-0x00000000001DA000-memory.dmp family_blackmoon behavioral1/memory/1936-589-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2348-597-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2352-610-0x00000000003A0000-0x00000000003CA000-memory.dmp family_blackmoon behavioral1/memory/2672-665-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1992-709-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/1888-794-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/3068-854-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral1/memory/2976-886-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2564 tpltv.exe 2600 thxhpjx.exe 1800 jxtdr.exe 3060 pfdlhl.exe 2176 nprvp.exe 2912 hfdnh.exe 2220 jvdpd.exe 2816 nntxdj.exe 2648 lftlt.exe 2772 xhhpnb.exe 1616 trjtj.exe 1352 pdhpldl.exe 1548 dxxhxx.exe 2720 ltjtx.exe 2560 fnrxp.exe 2540 xxthbd.exe 1376 tbbxblb.exe 3004 jttxbj.exe 2856 rpjth.exe 1028 lhfdl.exe 3036 hxljdht.exe 1708 hdtjtdh.exe 2184 tvrnh.exe 1836 pfbpxdt.exe 960 dlpfpbb.exe 1772 vjftt.exe 2428 tjdxn.exe 680 fhvnd.exe 264 fjbtdnd.exe 1852 jvhxdtl.exe 2304 ljtvtl.exe 2712 dvbrnld.exe 2128 tthdff.exe 2044 rljtpx.exe 1568 pxpfj.exe 2564 tddnb.exe 2352 bfrbf.exe 1320 rntfj.exe 2124 bbxvjh.exe 2784 pjblbp.exe 2924 vhprdh.exe 2900 jdxtd.exe 2804 bbppdr.exe 2220 tltnj.exe 2944 ttttvfb.exe 2724 rvdhbht.exe 2988 rdpxv.exe 2772 ndhntb.exe 2408 bdfbrxx.exe 2412 txblj.exe 1152 bxrhbdj.exe 1548 pvjnv.exe 2640 tnlljl.exe 1264 hlljv.exe 1196 xthdl.exe 1956 txblxf.exe 2960 ldtlnr.exe 2324 vpndr.exe 2284 vrdrl.exe 3040 vrftrrh.exe 1696 vrjvvd.exe 2180 ndfxjr.exe 1708 tjpfhff.exe 3008 tjlnbp.exe -
resource yara_rule behavioral1/memory/2564-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1832-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2600-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1800-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2600-29-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1800-40-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3060-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2176-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2220-72-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2912-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2648-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2816-88-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1616-108-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1352-125-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2720-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2560-152-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3004-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2856-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1708-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1836-222-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2304-287-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1568-315-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2352-328-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2124-337-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2124-344-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2804-365-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2408-410-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2412-418-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1152-425-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2640-439-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1196-452-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2960-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2284-473-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2544-518-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1936-589-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2348-590-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2348-597-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2196-643-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2672-658-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2672-665-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1992-709-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1888-794-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/308-834-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3068-847-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3068-854-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1684-861-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2976-886-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2452-893-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1780-981-0x0000000000400000-0x000000000042A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntpxt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xddnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfrlxxd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlrtjrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfjpdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnxrflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrbbjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjbhfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtrtltl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdhpldl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrnjttx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvpph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlvxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxfdbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppbpxhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tflxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tllbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnrxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhdhxfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tljjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnldj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhtbnjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrxpdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txhbbdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pphxfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pllnrtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbddx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvxpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbftjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxptl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trrvhvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvlvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfvxpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvjnpbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxhnjxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnvfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlrln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtbrtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdrnvnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhxjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjfhffp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndpjptv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrpjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drftnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrdxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpfnrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljrtvhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxntvdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjptvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djldxdn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2564 1832 fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe 65 PID 1832 wrote to memory of 2564 1832 fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe 65 PID 1832 wrote to memory of 2564 1832 fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe 65 PID 1832 wrote to memory of 2564 1832 fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe 65 PID 2564 wrote to memory of 2600 2564 tpltv.exe 31 PID 2564 wrote to memory of 2600 2564 tpltv.exe 31 PID 2564 wrote to memory of 2600 2564 tpltv.exe 31 PID 2564 wrote to memory of 2600 2564 tpltv.exe 31 PID 2600 wrote to memory of 1800 2600 thxhpjx.exe 32 PID 2600 wrote to memory of 1800 2600 thxhpjx.exe 32 PID 2600 wrote to memory of 1800 2600 thxhpjx.exe 32 PID 2600 wrote to memory of 1800 2600 thxhpjx.exe 32 PID 1800 wrote to memory of 3060 1800 jxtdr.exe 33 PID 1800 wrote to memory of 3060 1800 jxtdr.exe 33 PID 1800 wrote to memory of 3060 1800 jxtdr.exe 33 PID 1800 wrote to memory of 3060 1800 jxtdr.exe 33 PID 3060 wrote to memory of 2176 3060 pfdlhl.exe 34 PID 3060 wrote to memory of 2176 3060 pfdlhl.exe 34 PID 3060 wrote to memory of 2176 3060 pfdlhl.exe 34 PID 3060 wrote to memory of 2176 3060 pfdlhl.exe 34 PID 2176 wrote to memory of 2912 2176 nprvp.exe 35 PID 2176 wrote to memory of 2912 2176 nprvp.exe 35 PID 2176 wrote to memory of 2912 2176 nprvp.exe 35 PID 2176 wrote to memory of 2912 2176 nprvp.exe 35 PID 2912 wrote to memory of 2220 2912 hfdnh.exe 36 PID 2912 wrote to memory of 2220 2912 hfdnh.exe 36 PID 2912 wrote to memory of 2220 2912 hfdnh.exe 36 PID 2912 wrote to memory of 2220 2912 hfdnh.exe 36 PID 2220 wrote to memory of 2816 2220 jvdpd.exe 37 PID 2220 wrote to memory of 2816 2220 jvdpd.exe 37 PID 2220 wrote to memory of 2816 2220 jvdpd.exe 37 PID 2220 wrote to memory of 2816 2220 jvdpd.exe 37 PID 2816 wrote to memory of 2648 2816 nntxdj.exe 38 PID 2816 wrote to memory of 2648 2816 nntxdj.exe 38 PID 2816 wrote to memory of 2648 2816 nntxdj.exe 38 PID 2816 wrote to memory of 2648 2816 nntxdj.exe 38 PID 2648 wrote to memory of 2772 2648 lftlt.exe 39 PID 2648 wrote to memory of 2772 2648 lftlt.exe 39 PID 2648 wrote to memory of 2772 2648 lftlt.exe 39 PID 2648 wrote to memory of 2772 2648 lftlt.exe 39 PID 2772 wrote to memory of 1616 2772 xhhpnb.exe 40 PID 2772 wrote to memory of 1616 2772 xhhpnb.exe 40 PID 2772 wrote to memory of 1616 2772 xhhpnb.exe 40 PID 2772 wrote to memory of 1616 2772 xhhpnb.exe 40 PID 1616 wrote to memory of 1352 1616 trjtj.exe 41 PID 1616 wrote to memory of 1352 1616 trjtj.exe 41 PID 1616 wrote to memory of 1352 1616 trjtj.exe 41 PID 1616 wrote to memory of 1352 1616 trjtj.exe 41 PID 1352 wrote to memory of 1548 1352 pdhpldl.exe 42 PID 1352 wrote to memory of 1548 1352 pdhpldl.exe 42 PID 1352 wrote to memory of 1548 1352 pdhpldl.exe 42 PID 1352 wrote to memory of 1548 1352 pdhpldl.exe 42 PID 1548 wrote to memory of 2720 1548 dxxhxx.exe 43 PID 1548 wrote to memory of 2720 1548 dxxhxx.exe 43 PID 1548 wrote to memory of 2720 1548 dxxhxx.exe 43 PID 1548 wrote to memory of 2720 1548 dxxhxx.exe 43 PID 2720 wrote to memory of 2560 2720 ltjtx.exe 44 PID 2720 wrote to memory of 2560 2720 ltjtx.exe 44 PID 2720 wrote to memory of 2560 2720 ltjtx.exe 44 PID 2720 wrote to memory of 2560 2720 ltjtx.exe 44 PID 2560 wrote to memory of 2540 2560 fnrxp.exe 45 PID 2560 wrote to memory of 2540 2560 fnrxp.exe 45 PID 2560 wrote to memory of 2540 2560 fnrxp.exe 45 PID 2560 wrote to memory of 2540 2560 fnrxp.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe"C:\Users\Admin\AppData\Local\Temp\fafff662170a64a67d7b5f66f8341bd9bcf4337625bc125188e9b9ee6d82efe3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\tpltv.exec:\tpltv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\thxhpjx.exec:\thxhpjx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\jxtdr.exec:\jxtdr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
\??\c:\pfdlhl.exec:\pfdlhl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\nprvp.exec:\nprvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\hfdnh.exec:\hfdnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\jvdpd.exec:\jvdpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\nntxdj.exec:\nntxdj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\lftlt.exec:\lftlt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
\??\c:\xhhpnb.exec:\xhhpnb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\trjtj.exec:\trjtj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\pdhpldl.exec:\pdhpldl.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\dxxhxx.exec:\dxxhxx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\ltjtx.exec:\ltjtx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\fnrxp.exec:\fnrxp.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\xxthbd.exec:\xxthbd.exe17⤵
- Executes dropped EXE
PID:2540 -
\??\c:\tbbxblb.exec:\tbbxblb.exe18⤵
- Executes dropped EXE
PID:1376 -
\??\c:\jttxbj.exec:\jttxbj.exe19⤵
- Executes dropped EXE
PID:3004 -
\??\c:\rpjth.exec:\rpjth.exe20⤵
- Executes dropped EXE
PID:2856 -
\??\c:\lhfdl.exec:\lhfdl.exe21⤵
- Executes dropped EXE
PID:1028 -
\??\c:\hxljdht.exec:\hxljdht.exe22⤵
- Executes dropped EXE
PID:3036 -
\??\c:\hdtjtdh.exec:\hdtjtdh.exe23⤵
- Executes dropped EXE
PID:1708 -
\??\c:\tvrnh.exec:\tvrnh.exe24⤵
- Executes dropped EXE
PID:2184 -
\??\c:\pfbpxdt.exec:\pfbpxdt.exe25⤵
- Executes dropped EXE
PID:1836 -
\??\c:\dlpfpbb.exec:\dlpfpbb.exe26⤵
- Executes dropped EXE
PID:960 -
\??\c:\vjftt.exec:\vjftt.exe27⤵
- Executes dropped EXE
PID:1772 -
\??\c:\tjdxn.exec:\tjdxn.exe28⤵
- Executes dropped EXE
PID:2428 -
\??\c:\fhvnd.exec:\fhvnd.exe29⤵
- Executes dropped EXE
PID:680 -
\??\c:\fjbtdnd.exec:\fjbtdnd.exe30⤵
- Executes dropped EXE
PID:264 -
\??\c:\jvhxdtl.exec:\jvhxdtl.exe31⤵
- Executes dropped EXE
PID:1852 -
\??\c:\ljtvtl.exec:\ljtvtl.exe32⤵
- Executes dropped EXE
PID:2304 -
\??\c:\dvbrnld.exec:\dvbrnld.exe33⤵
- Executes dropped EXE
PID:2712 -
\??\c:\tthdff.exec:\tthdff.exe34⤵
- Executes dropped EXE
PID:2128 -
\??\c:\rljtpx.exec:\rljtpx.exe35⤵
- Executes dropped EXE
PID:2044 -
\??\c:\pxpfj.exec:\pxpfj.exe36⤵
- Executes dropped EXE
PID:1568 -
\??\c:\tddnb.exec:\tddnb.exe37⤵
- Executes dropped EXE
PID:2564 -
\??\c:\bfrbf.exec:\bfrbf.exe38⤵
- Executes dropped EXE
PID:2352 -
\??\c:\rntfj.exec:\rntfj.exe39⤵
- Executes dropped EXE
PID:1320 -
\??\c:\bbxvjh.exec:\bbxvjh.exe40⤵
- Executes dropped EXE
PID:2124 -
\??\c:\pjblbp.exec:\pjblbp.exe41⤵
- Executes dropped EXE
PID:2784 -
\??\c:\vhprdh.exec:\vhprdh.exe42⤵
- Executes dropped EXE
PID:2924 -
\??\c:\jdxtd.exec:\jdxtd.exe43⤵
- Executes dropped EXE
PID:2900 -
\??\c:\bbppdr.exec:\bbppdr.exe44⤵
- Executes dropped EXE
PID:2804 -
\??\c:\tltnj.exec:\tltnj.exe45⤵
- Executes dropped EXE
PID:2220 -
\??\c:\ttttvfb.exec:\ttttvfb.exe46⤵
- Executes dropped EXE
PID:2944 -
\??\c:\rvdhbht.exec:\rvdhbht.exe47⤵
- Executes dropped EXE
PID:2724 -
\??\c:\rdpxv.exec:\rdpxv.exe48⤵
- Executes dropped EXE
PID:2988 -
\??\c:\ndhntb.exec:\ndhntb.exe49⤵
- Executes dropped EXE
PID:2772 -
\??\c:\bdfbrxx.exec:\bdfbrxx.exe50⤵
- Executes dropped EXE
PID:2408 -
\??\c:\txblj.exec:\txblj.exe51⤵
- Executes dropped EXE
PID:2412 -
\??\c:\bxrhbdj.exec:\bxrhbdj.exe52⤵
- Executes dropped EXE
PID:1152 -
\??\c:\pvjnv.exec:\pvjnv.exe53⤵
- Executes dropped EXE
PID:1548 -
\??\c:\tnlljl.exec:\tnlljl.exe54⤵
- Executes dropped EXE
PID:2640 -
\??\c:\hlljv.exec:\hlljv.exe55⤵
- Executes dropped EXE
PID:1264 -
\??\c:\xthdl.exec:\xthdl.exe56⤵
- Executes dropped EXE
PID:1196 -
\??\c:\txblxf.exec:\txblxf.exe57⤵
- Executes dropped EXE
PID:1956 -
\??\c:\ldtlnr.exec:\ldtlnr.exe58⤵
- Executes dropped EXE
PID:2960 -
\??\c:\vpndr.exec:\vpndr.exe59⤵
- Executes dropped EXE
PID:2324 -
\??\c:\vrdrl.exec:\vrdrl.exe60⤵
- Executes dropped EXE
PID:2284 -
\??\c:\vrftrrh.exec:\vrftrrh.exe61⤵
- Executes dropped EXE
PID:3040 -
\??\c:\vrjvvd.exec:\vrjvvd.exe62⤵
- Executes dropped EXE
PID:1696 -
\??\c:\ndfxjr.exec:\ndfxjr.exe63⤵
- Executes dropped EXE
PID:2180 -
\??\c:\tjpfhff.exec:\tjpfhff.exe64⤵
- Executes dropped EXE
PID:1708 -
\??\c:\tjlnbp.exec:\tjlnbp.exe65⤵
- Executes dropped EXE
PID:3008 -
\??\c:\nxdtt.exec:\nxdtt.exe66⤵PID:1584
-
\??\c:\vhbdrf.exec:\vhbdrf.exe67⤵PID:2544
-
\??\c:\bdhthb.exec:\bdhthb.exe68⤵PID:1728
-
\??\c:\pjnlftt.exec:\pjnlftt.exe69⤵PID:888
-
\??\c:\jbbpl.exec:\jbbpl.exe70⤵PID:2236
-
\??\c:\nffbfh.exec:\nffbfh.exe71⤵PID:1044
-
\??\c:\tbdhl.exec:\tbdhl.exe72⤵PID:1640
-
\??\c:\tnxrh.exec:\tnxrh.exe73⤵PID:2300
-
\??\c:\llnrhl.exec:\llnrhl.exe74⤵PID:1620
-
\??\c:\rdhnt.exec:\rdhnt.exe75⤵PID:2712
-
\??\c:\tbnlxxh.exec:\tbnlxxh.exe76⤵PID:2064
-
\??\c:\ndlppv.exec:\ndlppv.exe77⤵PID:1936
-
\??\c:\dbhldlp.exec:\dbhldlp.exe78⤵PID:2348
-
\??\c:\dbvhtlb.exec:\dbvhtlb.exe79⤵PID:2564
-
\??\c:\fdplf.exec:\fdplf.exe80⤵PID:2352
-
\??\c:\xtjln.exec:\xtjln.exe81⤵PID:2156
-
\??\c:\bhdhxfd.exec:\bhdhxfd.exe82⤵
- System Location Discovery: System Language Discovery
PID:2760 -
\??\c:\hvxpn.exec:\hvxpn.exe83⤵
- System Location Discovery: System Language Discovery
PID:2916 -
\??\c:\llvtd.exec:\llvtd.exe84⤵PID:2248
-
\??\c:\xjjjb.exec:\xjjjb.exe85⤵PID:2912
-
\??\c:\xvbdtdh.exec:\xvbdtdh.exe86⤵PID:2196
-
\??\c:\vrvhp.exec:\vrvhp.exe87⤵PID:2764
-
\??\c:\bxfjt.exec:\bxfjt.exe88⤵PID:2672
-
\??\c:\djvbh.exec:\djvbh.exe89⤵PID:1960
-
\??\c:\vjrxbj.exec:\vjrxbj.exe90⤵PID:1032
-
\??\c:\dfplntr.exec:\dfplntr.exe91⤵PID:2636
-
\??\c:\dnjjx.exec:\dnjjx.exe92⤵PID:1040
-
\??\c:\ddxrbp.exec:\ddxrbp.exe93⤵PID:924
-
\??\c:\dtnnx.exec:\dtnnx.exe94⤵PID:2032
-
\??\c:\vvjtll.exec:\vvjtll.exe95⤵PID:1992
-
\??\c:\vbjttv.exec:\vbjttv.exe96⤵PID:624
-
\??\c:\phrdln.exec:\phrdln.exe97⤵PID:2012
-
\??\c:\xfhhdx.exec:\xfhhdx.exe98⤵PID:1656
-
\??\c:\ffpxl.exec:\ffpxl.exe99⤵PID:2888
-
\??\c:\hddfxv.exec:\hddfxv.exe100⤵PID:3004
-
\??\c:\xjpjtv.exec:\xjpjtv.exe101⤵PID:1764
-
\??\c:\nptdb.exec:\nptdb.exe102⤵PID:2324
-
\??\c:\lphtrtl.exec:\lphtrtl.exe103⤵PID:1028
-
\??\c:\pnjrt.exec:\pnjrt.exe104⤵PID:1864
-
\??\c:\tttfxp.exec:\tttfxp.exe105⤵PID:3016
-
\??\c:\pbhpxjb.exec:\pbhpxjb.exe106⤵PID:2180
-
\??\c:\rdlddfx.exec:\rdlddfx.exe107⤵PID:800
-
\??\c:\brddpxd.exec:\brddpxd.exe108⤵PID:2624
-
\??\c:\hrvxr.exec:\hrvxr.exe109⤵PID:1888
-
\??\c:\dlnjvj.exec:\dlnjvj.exe110⤵PID:1688
-
\??\c:\plxtdt.exec:\plxtdt.exe111⤵PID:748
-
\??\c:\hpxtn.exec:\hpxtn.exe112⤵PID:2240
-
\??\c:\rfhlx.exec:\rfhlx.exe113⤵PID:276
-
\??\c:\nndpvrt.exec:\nndpvrt.exe114⤵PID:2388
-
\??\c:\lvxjl.exec:\lvxjl.exe115⤵PID:308
-
\??\c:\lntbvn.exec:\lntbvn.exe116⤵PID:2476
-
\??\c:\rrrvrt.exec:\rrrvrt.exe117⤵PID:3068
-
\??\c:\xlrlp.exec:\xlrlp.exe118⤵PID:1572
-
\??\c:\nxtfxpf.exec:\nxtfxpf.exe119⤵PID:1684
-
\??\c:\lxbhnv.exec:\lxbhnv.exe120⤵PID:1268
-
\??\c:\txfpb.exec:\txfpb.exe121⤵PID:2464
-
\??\c:\jdtbf.exec:\jdtbf.exe122⤵PID:2976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-