Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 07:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6632cc628518a78f275422ffd286c250N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
6632cc628518a78f275422ffd286c250N.exe
-
Size
80KB
-
MD5
6632cc628518a78f275422ffd286c250
-
SHA1
14ffc461c763d7ee10a67431c270a19e75ea92d6
-
SHA256
6cad545e9478a4748b3894c64db71063385e8520633f47884cf4df01a0980aae
-
SHA512
99456111092fe6a5fc70340c8c790ff0ac85ce7f5dafeaa6b323338641538a7f56ff40fdc06d88d8653e09a764da65e3b0c2187f4227734944e94a7a110a4e80
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73t6MlYqn+jMp9tQL:ymb3NkkiQ3mdBjFo73tvn+Yp9tQL
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/3008-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4472-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/760-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1828-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3412-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4904-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1668-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3220-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3220-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1040-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/748-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3864-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/468-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4300-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1076-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4108-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2800-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3484-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5104-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3644-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2092-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4472 flffxxf.exe 1828 bntbnn.exe 760 vvjdd.exe 3412 7jpvj.exe 4904 tbbtnn.exe 1668 hhnntn.exe 3220 pjjpj.exe 1040 lrxlxfr.exe 2016 nnnttb.exe 3664 jvvjv.exe 3476 5xxxlll.exe 2728 frrrrxx.exe 2144 ntbhbb.exe 4632 bhnnbb.exe 5068 jvdvp.exe 748 7xrxrff.exe 3864 bbttnn.exe 468 htnbbn.exe 4300 jjdvp.exe 1076 xllfrxf.exe 932 bbthhb.exe 4108 jddpd.exe 2800 jjpjv.exe 3484 lxlfxxx.exe 5104 hhnhtn.exe 3644 dpvdv.exe 2184 pdjjv.exe 4020 xxllrll.exe 2092 lffxxrl.exe 1008 ttbtnn.exe 2104 nbhbnn.exe 4368 dvvjj.exe 892 lxrfxrl.exe 740 rlrffrf.exe 2544 nhbthh.exe 3900 thnhbb.exe 2200 ddvpp.exe 3412 dvdvv.exe 4836 frrllrl.exe 1152 flrlfrl.exe 3408 thnnhn.exe 1592 nnnhbb.exe 1876 djdvd.exe 1636 jjpjd.exe 1356 xffxrlx.exe 2032 fxfxrrl.exe 2620 3bnnht.exe 3476 ttnhtt.exe 5000 jpvpj.exe 4160 dvvpj.exe 2288 xlrxxfx.exe 3940 rxlfxxx.exe 1884 hbhhbb.exe 3124 nhhbnn.exe 2716 pjpjj.exe 4236 jddjv.exe 2480 xflxlfr.exe 4252 hbnbnh.exe 4620 jvjdv.exe 2128 ppdvv.exe 4552 flllflf.exe 2684 lxxrrll.exe 116 tnnttt.exe 3484 jdjdv.exe -
resource yara_rule behavioral2/memory/3008-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/760-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1828-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3412-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1668-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3220-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3220-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3220-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1040-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3864-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/468-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4300-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1076-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4108-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2800-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3484-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5104-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3644-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2092-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-202-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9djjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrrrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lfrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbntnt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 4472 3008 6632cc628518a78f275422ffd286c250N.exe 83 PID 3008 wrote to memory of 4472 3008 6632cc628518a78f275422ffd286c250N.exe 83 PID 3008 wrote to memory of 4472 3008 6632cc628518a78f275422ffd286c250N.exe 83 PID 4472 wrote to memory of 1828 4472 flffxxf.exe 84 PID 4472 wrote to memory of 1828 4472 flffxxf.exe 84 PID 4472 wrote to memory of 1828 4472 flffxxf.exe 84 PID 1828 wrote to memory of 760 1828 bntbnn.exe 85 PID 1828 wrote to memory of 760 1828 bntbnn.exe 85 PID 1828 wrote to memory of 760 1828 bntbnn.exe 85 PID 760 wrote to memory of 3412 760 vvjdd.exe 86 PID 760 wrote to memory of 3412 760 vvjdd.exe 86 PID 760 wrote to memory of 3412 760 vvjdd.exe 86 PID 3412 wrote to memory of 4904 3412 7jpvj.exe 87 PID 3412 wrote to memory of 4904 3412 7jpvj.exe 87 PID 3412 wrote to memory of 4904 3412 7jpvj.exe 87 PID 4904 wrote to memory of 1668 4904 tbbtnn.exe 89 PID 4904 wrote to memory of 1668 4904 tbbtnn.exe 89 PID 4904 wrote to memory of 1668 4904 tbbtnn.exe 89 PID 1668 wrote to memory of 3220 1668 hhnntn.exe 90 PID 1668 wrote to memory of 3220 1668 hhnntn.exe 90 PID 1668 wrote to memory of 3220 1668 hhnntn.exe 90 PID 3220 wrote to memory of 1040 3220 pjjpj.exe 91 PID 3220 wrote to memory of 1040 3220 pjjpj.exe 91 PID 3220 wrote to memory of 1040 3220 pjjpj.exe 91 PID 1040 wrote to memory of 2016 1040 lrxlxfr.exe 92 PID 1040 wrote to memory of 2016 1040 lrxlxfr.exe 92 PID 1040 wrote to memory of 2016 1040 lrxlxfr.exe 92 PID 2016 wrote to memory of 3664 2016 nnnttb.exe 93 PID 2016 wrote to memory of 3664 2016 nnnttb.exe 93 PID 2016 wrote to memory of 3664 2016 nnnttb.exe 93 PID 3664 wrote to memory of 3476 3664 jvvjv.exe 94 PID 3664 wrote to memory of 3476 3664 jvvjv.exe 94 PID 3664 wrote to memory of 3476 3664 jvvjv.exe 94 PID 3476 wrote to memory of 2728 3476 5xxxlll.exe 96 PID 3476 wrote to memory of 2728 3476 5xxxlll.exe 96 PID 3476 wrote to memory of 2728 3476 5xxxlll.exe 96 PID 2728 wrote to memory of 2144 2728 frrrrxx.exe 97 PID 2728 wrote to memory of 2144 2728 frrrrxx.exe 97 PID 2728 wrote to memory of 2144 2728 frrrrxx.exe 97 PID 2144 wrote to memory of 4632 2144 ntbhbb.exe 98 PID 2144 wrote to memory of 4632 2144 ntbhbb.exe 98 PID 2144 wrote to memory of 4632 2144 ntbhbb.exe 98 PID 4632 wrote to memory of 5068 4632 bhnnbb.exe 99 PID 4632 wrote to memory of 5068 4632 bhnnbb.exe 99 PID 4632 wrote to memory of 5068 4632 bhnnbb.exe 99 PID 5068 wrote to memory of 748 5068 jvdvp.exe 100 PID 5068 wrote to memory of 748 5068 jvdvp.exe 100 PID 5068 wrote to memory of 748 5068 jvdvp.exe 100 PID 748 wrote to memory of 3864 748 7xrxrff.exe 102 PID 748 wrote to memory of 3864 748 7xrxrff.exe 102 PID 748 wrote to memory of 3864 748 7xrxrff.exe 102 PID 3864 wrote to memory of 468 3864 bbttnn.exe 103 PID 3864 wrote to memory of 468 3864 bbttnn.exe 103 PID 3864 wrote to memory of 468 3864 bbttnn.exe 103 PID 468 wrote to memory of 4300 468 htnbbn.exe 104 PID 468 wrote to memory of 4300 468 htnbbn.exe 104 PID 468 wrote to memory of 4300 468 htnbbn.exe 104 PID 4300 wrote to memory of 1076 4300 jjdvp.exe 105 PID 4300 wrote to memory of 1076 4300 jjdvp.exe 105 PID 4300 wrote to memory of 1076 4300 jjdvp.exe 105 PID 1076 wrote to memory of 932 1076 xllfrxf.exe 106 PID 1076 wrote to memory of 932 1076 xllfrxf.exe 106 PID 1076 wrote to memory of 932 1076 xllfrxf.exe 106 PID 932 wrote to memory of 4108 932 bbthhb.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\6632cc628518a78f275422ffd286c250N.exe"C:\Users\Admin\AppData\Local\Temp\6632cc628518a78f275422ffd286c250N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\flffxxf.exec:\flffxxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\bntbnn.exec:\bntbnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
\??\c:\vvjdd.exec:\vvjdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
\??\c:\7jpvj.exec:\7jpvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
\??\c:\tbbtnn.exec:\tbbtnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\hhnntn.exec:\hhnntn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\pjjpj.exec:\pjjpj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
\??\c:\lrxlxfr.exec:\lrxlxfr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\nnnttb.exec:\nnnttb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\jvvjv.exec:\jvvjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\5xxxlll.exec:\5xxxlll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\frrrrxx.exec:\frrrrxx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\ntbhbb.exec:\ntbhbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\bhnnbb.exec:\bhnnbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
\??\c:\jvdvp.exec:\jvdvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\7xrxrff.exec:\7xrxrff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\bbttnn.exec:\bbttnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
\??\c:\htnbbn.exec:\htnbbn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
\??\c:\jjdvp.exec:\jjdvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\xllfrxf.exec:\xllfrxf.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\bbthhb.exec:\bbthhb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
\??\c:\jddpd.exec:\jddpd.exe23⤵
- Executes dropped EXE
PID:4108 -
\??\c:\jjpjv.exec:\jjpjv.exe24⤵
- Executes dropped EXE
PID:2800 -
\??\c:\lxlfxxx.exec:\lxlfxxx.exe25⤵
- Executes dropped EXE
PID:3484 -
\??\c:\hhnhtn.exec:\hhnhtn.exe26⤵
- Executes dropped EXE
PID:5104 -
\??\c:\dpvdv.exec:\dpvdv.exe27⤵
- Executes dropped EXE
PID:3644 -
\??\c:\pdjjv.exec:\pdjjv.exe28⤵
- Executes dropped EXE
PID:2184 -
\??\c:\xxllrll.exec:\xxllrll.exe29⤵
- Executes dropped EXE
PID:4020 -
\??\c:\lffxxrl.exec:\lffxxrl.exe30⤵
- Executes dropped EXE
PID:2092 -
\??\c:\ttbtnn.exec:\ttbtnn.exe31⤵
- Executes dropped EXE
PID:1008 -
\??\c:\nbhbnn.exec:\nbhbnn.exe32⤵
- Executes dropped EXE
PID:2104 -
\??\c:\dvvjj.exec:\dvvjj.exe33⤵
- Executes dropped EXE
PID:4368 -
\??\c:\lxrfxrl.exec:\lxrfxrl.exe34⤵
- Executes dropped EXE
PID:892 -
\??\c:\rlrffrf.exec:\rlrffrf.exe35⤵
- Executes dropped EXE
PID:740 -
\??\c:\nhbthh.exec:\nhbthh.exe36⤵
- Executes dropped EXE
PID:2544 -
\??\c:\thnhbb.exec:\thnhbb.exe37⤵
- Executes dropped EXE
PID:3900 -
\??\c:\ddvpp.exec:\ddvpp.exe38⤵
- Executes dropped EXE
PID:2200 -
\??\c:\dvdvv.exec:\dvdvv.exe39⤵
- Executes dropped EXE
PID:3412 -
\??\c:\frrllrl.exec:\frrllrl.exe40⤵
- Executes dropped EXE
PID:4836 -
\??\c:\flrlfrl.exec:\flrlfrl.exe41⤵
- Executes dropped EXE
PID:1152 -
\??\c:\thnnhn.exec:\thnnhn.exe42⤵
- Executes dropped EXE
PID:3408 -
\??\c:\nnnhbb.exec:\nnnhbb.exe43⤵
- Executes dropped EXE
PID:1592 -
\??\c:\djdvd.exec:\djdvd.exe44⤵
- Executes dropped EXE
PID:1876 -
\??\c:\jjpjd.exec:\jjpjd.exe45⤵
- Executes dropped EXE
PID:1636 -
\??\c:\xffxrlx.exec:\xffxrlx.exe46⤵
- Executes dropped EXE
PID:1356 -
\??\c:\fxfxrrl.exec:\fxfxrrl.exe47⤵
- Executes dropped EXE
PID:2032 -
\??\c:\3bnnht.exec:\3bnnht.exe48⤵
- Executes dropped EXE
PID:2620 -
\??\c:\ttnhtt.exec:\ttnhtt.exe49⤵
- Executes dropped EXE
PID:3476 -
\??\c:\jpvpj.exec:\jpvpj.exe50⤵
- Executes dropped EXE
PID:5000 -
\??\c:\dvvpj.exec:\dvvpj.exe51⤵
- Executes dropped EXE
PID:4160 -
\??\c:\xlrxxfx.exec:\xlrxxfx.exe52⤵
- Executes dropped EXE
PID:2288 -
\??\c:\rxlfxxx.exec:\rxlfxxx.exe53⤵
- Executes dropped EXE
PID:3940 -
\??\c:\hbhhbb.exec:\hbhhbb.exe54⤵
- Executes dropped EXE
PID:1884 -
\??\c:\nhhbnn.exec:\nhhbnn.exe55⤵
- Executes dropped EXE
PID:3124 -
\??\c:\pjpjj.exec:\pjpjj.exe56⤵
- Executes dropped EXE
PID:2716 -
\??\c:\jddjv.exec:\jddjv.exe57⤵
- Executes dropped EXE
PID:4236 -
\??\c:\xflxlfr.exec:\xflxlfr.exe58⤵
- Executes dropped EXE
PID:2480 -
\??\c:\hbnbnh.exec:\hbnbnh.exe59⤵
- Executes dropped EXE
PID:4252 -
\??\c:\jvjdv.exec:\jvjdv.exe60⤵
- Executes dropped EXE
PID:4620 -
\??\c:\ppdvv.exec:\ppdvv.exe61⤵
- Executes dropped EXE
PID:2128 -
\??\c:\flllflf.exec:\flllflf.exe62⤵
- Executes dropped EXE
PID:4552 -
\??\c:\lxxrrll.exec:\lxxrrll.exe63⤵
- Executes dropped EXE
PID:2684 -
\??\c:\tnnttt.exec:\tnnttt.exe64⤵
- Executes dropped EXE
PID:116 -
\??\c:\jdjdv.exec:\jdjdv.exe65⤵
- Executes dropped EXE
PID:3484 -
\??\c:\vjdpv.exec:\vjdpv.exe66⤵PID:4356
-
\??\c:\lrrlxrf.exec:\lrrlxrf.exe67⤵PID:1424
-
\??\c:\ffffffx.exec:\ffffffx.exe68⤵PID:2580
-
\??\c:\hnnbtb.exec:\hnnbtb.exe69⤵PID:2184
-
\??\c:\7dvpv.exec:\7dvpv.exe70⤵PID:4020
-
\??\c:\7jjdp.exec:\7jjdp.exe71⤵PID:3384
-
\??\c:\lffrrlx.exec:\lffrrlx.exe72⤵PID:3572
-
\??\c:\ffrlfxl.exec:\ffrlfxl.exe73⤵PID:3532
-
\??\c:\btnhbt.exec:\btnhbt.exe74⤵PID:4568
-
\??\c:\bhnhhb.exec:\bhnhhb.exe75⤵PID:5016
-
\??\c:\dvjvd.exec:\dvjvd.exe76⤵PID:4364
-
\??\c:\vpjvj.exec:\vpjvj.exe77⤵PID:3756
-
\??\c:\rrrlxrl.exec:\rrrlxrl.exe78⤵PID:2664
-
\??\c:\fffrrfr.exec:\fffrrfr.exe79⤵PID:4724
-
\??\c:\nbtnbt.exec:\nbtnbt.exe80⤵PID:2832
-
\??\c:\nhhbnh.exec:\nhhbnh.exe81⤵PID:2076
-
\??\c:\vdpvd.exec:\vdpvd.exe82⤵PID:1144
-
\??\c:\ppjpd.exec:\ppjpd.exe83⤵PID:3728
-
\??\c:\xlrfrlf.exec:\xlrfrlf.exe84⤵PID:1912
-
\??\c:\nbthtn.exec:\nbthtn.exe85⤵PID:2360
-
\??\c:\hnhtht.exec:\hnhtht.exe86⤵PID:1876
-
\??\c:\hnthtn.exec:\hnthtn.exe87⤵PID:3160
-
\??\c:\jvpvd.exec:\jvpvd.exe88⤵PID:4560
-
\??\c:\vjjdj.exec:\vjjdj.exe89⤵PID:2748
-
\??\c:\7lfrfrl.exec:\7lfrfrl.exe90⤵
- System Location Discovery: System Language Discovery
PID:2368 -
\??\c:\rxlrxfl.exec:\rxlrxfl.exe91⤵PID:4268
-
\??\c:\rflxxlx.exec:\rflxxlx.exe92⤵PID:2940
-
\??\c:\thnnbt.exec:\thnnbt.exe93⤵PID:3688
-
\??\c:\1nnntn.exec:\1nnntn.exe94⤵PID:3684
-
\??\c:\jvjjv.exec:\jvjjv.exe95⤵PID:3608
-
\??\c:\9ddvv.exec:\9ddvv.exe96⤵PID:4432
-
\??\c:\xlrflrf.exec:\xlrflrf.exe97⤵
- System Location Discovery: System Language Discovery
PID:4556 -
\??\c:\9lfxrlr.exec:\9lfxrlr.exe98⤵PID:2840
-
\??\c:\7nbnht.exec:\7nbnht.exe99⤵PID:4236
-
\??\c:\vpvpd.exec:\vpvpd.exe100⤵PID:4436
-
\??\c:\jvvpv.exec:\jvvpv.exe101⤵PID:928
-
\??\c:\flrfrlx.exec:\flrfrlx.exe102⤵PID:4624
-
\??\c:\rflxrlx.exec:\rflxrlx.exe103⤵PID:2128
-
\??\c:\nnnbnn.exec:\nnnbnn.exe104⤵PID:4148
-
\??\c:\httnbn.exec:\httnbn.exe105⤵PID:5032
-
\??\c:\jjjdj.exec:\jjjdj.exe106⤵PID:1384
-
\??\c:\5pdvd.exec:\5pdvd.exe107⤵PID:4564
-
\??\c:\lxrlrll.exec:\lxrlrll.exe108⤵PID:4852
-
\??\c:\3hthbb.exec:\3hthbb.exe109⤵PID:2692
-
\??\c:\bnhtht.exec:\bnhtht.exe110⤵PID:3228
-
\??\c:\pvpdp.exec:\pvpdp.exe111⤵PID:3780
-
\??\c:\jppvj.exec:\jppvj.exe112⤵PID:2092
-
\??\c:\xlrffxx.exec:\xlrffxx.exe113⤵PID:4688
-
\??\c:\hhhthb.exec:\hhhthb.exe114⤵PID:4184
-
\??\c:\9hhbht.exec:\9hhbht.exe115⤵PID:2280
-
\??\c:\vpjdp.exec:\vpjdp.exe116⤵PID:652
-
\??\c:\vvjjj.exec:\vvjjj.exe117⤵PID:4000
-
\??\c:\rfrlfxx.exec:\rfrlfxx.exe118⤵PID:4812
-
\??\c:\rllfxxx.exec:\rllfxxx.exe119⤵PID:3756
-
\??\c:\thnhtn.exec:\thnhtn.exe120⤵PID:2664
-
\??\c:\dpjdp.exec:\dpjdp.exe121⤵PID:4724
-
\??\c:\5pvpd.exec:\5pvpd.exe122⤵PID:1596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-