Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 07:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7d6a1781b35442a4b3a20eb81386f820N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
7d6a1781b35442a4b3a20eb81386f820N.exe
-
Size
296KB
-
MD5
7d6a1781b35442a4b3a20eb81386f820
-
SHA1
5de5ea6381b363b4482749d350f75dc8ec95cce9
-
SHA256
946cdbd1ab14c31846031c5158d852825ac07decf251edd9dfedee894dc34a21
-
SHA512
3c237936b7fd7bb6f8b1f073c7c564076ecaf830be30440132e405953f0bdd43e5b0aa063e2b24927f5fe79bdcf5dd19aa5d36c244b84b19540b8872825762a4
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvh:n3C9uDVOXLmHBKWyn+Pgvh
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
resource yara_rule behavioral2/memory/1804-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4732-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3732-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/748-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1184-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2012-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1216-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3928-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2760-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1672-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/336-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2324-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3212-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3036-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1564-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1052-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3516-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2416-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4388-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3132-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/644-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1928-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4732 jjddp.exe 5080 fxlllll.exe 3732 vdvpp.exe 4620 xxffxrr.exe 748 5tbnnn.exe 1184 vpppp.exe 2012 nhtntn.exe 1796 ppvvv.exe 1436 nbhbtn.exe 1216 7xfxrxx.exe 3036 xrrllll.exe 3928 bthttt.exe 2324 vvjvj.exe 2760 xrllfxr.exe 4792 fxxrlfr.exe 1672 tbbttn.exe 336 dpdvp.exe 4872 nhhhbt.exe 3212 1xrlfxr.exe 1656 rfxlfxr.exe 1564 bhhbtt.exe 1052 ddpjd.exe 3516 rrxrlll.exe 1580 bhnnnh.exe 4048 7bnhbb.exe 4388 xxflffx.exe 2416 3lrlffx.exe 4484 bntnhh.exe 3132 pdvpj.exe 644 5lrlffx.exe 1928 bnbtnn.exe 4348 7flxrrx.exe 4948 9ffxrrl.exe 4016 3bbttt.exe 4312 ppddd.exe 3556 rxfxllx.exe 3992 nnnbtn.exe 2264 jjvpv.exe 748 jjvpj.exe 2064 xllfrrl.exe 4612 flxrxxx.exe 2128 dvdvv.exe 4144 rlrllll.exe 2500 hhbnhh.exe 4060 jdpjd.exe 1436 1xxrrll.exe 4744 vpjdv.exe 1388 rrfffxx.exe 1100 nhbttt.exe 3260 ddjdv.exe 2004 jpjdv.exe 676 lxfxrrl.exe 3264 ttttnh.exe 1500 bntttt.exe 844 vddvv.exe 1808 lflrllx.exe 3884 nhbttn.exe 2236 btthbt.exe 1012 lffxfxx.exe 4416 lrlffff.exe 1876 nbhbtn.exe 3216 9vvpj.exe 4452 1lrlrrr.exe 2372 thnntn.exe -
resource yara_rule behavioral2/memory/1804-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4732-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3732-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2012-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2012-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1436-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3928-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2760-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1672-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2324-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3212-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3036-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1564-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1052-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3516-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2416-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4388-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3132-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/644-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1928-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrffrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3pdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxxxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrlxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlfrxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfflrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxrlfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrlllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflffxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrllrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 4732 1804 7d6a1781b35442a4b3a20eb81386f820N.exe 84 PID 1804 wrote to memory of 4732 1804 7d6a1781b35442a4b3a20eb81386f820N.exe 84 PID 1804 wrote to memory of 4732 1804 7d6a1781b35442a4b3a20eb81386f820N.exe 84 PID 4732 wrote to memory of 5080 4732 jjddp.exe 85 PID 4732 wrote to memory of 5080 4732 jjddp.exe 85 PID 4732 wrote to memory of 5080 4732 jjddp.exe 85 PID 5080 wrote to memory of 3732 5080 fxlllll.exe 86 PID 5080 wrote to memory of 3732 5080 fxlllll.exe 86 PID 5080 wrote to memory of 3732 5080 fxlllll.exe 86 PID 3732 wrote to memory of 4620 3732 vdvpp.exe 87 PID 3732 wrote to memory of 4620 3732 vdvpp.exe 87 PID 3732 wrote to memory of 4620 3732 vdvpp.exe 87 PID 4620 wrote to memory of 748 4620 xxffxrr.exe 89 PID 4620 wrote to memory of 748 4620 xxffxrr.exe 89 PID 4620 wrote to memory of 748 4620 xxffxrr.exe 89 PID 748 wrote to memory of 1184 748 5tbnnn.exe 90 PID 748 wrote to memory of 1184 748 5tbnnn.exe 90 PID 748 wrote to memory of 1184 748 5tbnnn.exe 90 PID 1184 wrote to memory of 2012 1184 vpppp.exe 91 PID 1184 wrote to memory of 2012 1184 vpppp.exe 91 PID 1184 wrote to memory of 2012 1184 vpppp.exe 91 PID 2012 wrote to memory of 1796 2012 nhtntn.exe 92 PID 2012 wrote to memory of 1796 2012 nhtntn.exe 92 PID 2012 wrote to memory of 1796 2012 nhtntn.exe 92 PID 1796 wrote to memory of 1436 1796 ppvvv.exe 94 PID 1796 wrote to memory of 1436 1796 ppvvv.exe 94 PID 1796 wrote to memory of 1436 1796 ppvvv.exe 94 PID 1436 wrote to memory of 1216 1436 nbhbtn.exe 95 PID 1436 wrote to memory of 1216 1436 nbhbtn.exe 95 PID 1436 wrote to memory of 1216 1436 nbhbtn.exe 95 PID 1216 wrote to memory of 3036 1216 7xfxrxx.exe 96 PID 1216 wrote to memory of 3036 1216 7xfxrxx.exe 96 PID 1216 wrote to memory of 3036 1216 7xfxrxx.exe 96 PID 3036 wrote to memory of 3928 3036 xrrllll.exe 97 PID 3036 wrote to memory of 3928 3036 xrrllll.exe 97 PID 3036 wrote to memory of 3928 3036 xrrllll.exe 97 PID 3928 wrote to memory of 2324 3928 bthttt.exe 98 PID 3928 wrote to memory of 2324 3928 bthttt.exe 98 PID 3928 wrote to memory of 2324 3928 bthttt.exe 98 PID 2324 wrote to memory of 2760 2324 vvjvj.exe 99 PID 2324 wrote to memory of 2760 2324 vvjvj.exe 99 PID 2324 wrote to memory of 2760 2324 vvjvj.exe 99 PID 2760 wrote to memory of 4792 2760 xrllfxr.exe 100 PID 2760 wrote to memory of 4792 2760 xrllfxr.exe 100 PID 2760 wrote to memory of 4792 2760 xrllfxr.exe 100 PID 4792 wrote to memory of 1672 4792 fxxrlfr.exe 101 PID 4792 wrote to memory of 1672 4792 fxxrlfr.exe 101 PID 4792 wrote to memory of 1672 4792 fxxrlfr.exe 101 PID 1672 wrote to memory of 336 1672 tbbttn.exe 102 PID 1672 wrote to memory of 336 1672 tbbttn.exe 102 PID 1672 wrote to memory of 336 1672 tbbttn.exe 102 PID 336 wrote to memory of 4872 336 dpdvp.exe 104 PID 336 wrote to memory of 4872 336 dpdvp.exe 104 PID 336 wrote to memory of 4872 336 dpdvp.exe 104 PID 4872 wrote to memory of 3212 4872 nhhhbt.exe 105 PID 4872 wrote to memory of 3212 4872 nhhhbt.exe 105 PID 4872 wrote to memory of 3212 4872 nhhhbt.exe 105 PID 3212 wrote to memory of 1656 3212 1xrlfxr.exe 106 PID 3212 wrote to memory of 1656 3212 1xrlfxr.exe 106 PID 3212 wrote to memory of 1656 3212 1xrlfxr.exe 106 PID 1656 wrote to memory of 1564 1656 rfxlfxr.exe 107 PID 1656 wrote to memory of 1564 1656 rfxlfxr.exe 107 PID 1656 wrote to memory of 1564 1656 rfxlfxr.exe 107 PID 1564 wrote to memory of 1052 1564 bhhbtt.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d6a1781b35442a4b3a20eb81386f820N.exe"C:\Users\Admin\AppData\Local\Temp\7d6a1781b35442a4b3a20eb81386f820N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\jjddp.exec:\jjddp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\fxlllll.exec:\fxlllll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\vdvpp.exec:\vdvpp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\xxffxrr.exec:\xxffxrr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\5tbnnn.exec:\5tbnnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\vpppp.exec:\vpppp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1184 -
\??\c:\nhtntn.exec:\nhtntn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\ppvvv.exec:\ppvvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\nbhbtn.exec:\nbhbtn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\7xfxrxx.exec:\7xfxrxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\xrrllll.exec:\xrrllll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\bthttt.exec:\bthttt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
\??\c:\vvjvj.exec:\vvjvj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\xrllfxr.exec:\xrllfxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\fxxrlfr.exec:\fxxrlfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\tbbttn.exec:\tbbttn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\dpdvp.exec:\dpdvp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
\??\c:\nhhhbt.exec:\nhhhbt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\1xrlfxr.exec:\1xrlfxr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
\??\c:\rfxlfxr.exec:\rfxlfxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\bhhbtt.exec:\bhhbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\ddpjd.exec:\ddpjd.exe23⤵
- Executes dropped EXE
PID:1052 -
\??\c:\rrxrlll.exec:\rrxrlll.exe24⤵
- Executes dropped EXE
PID:3516 -
\??\c:\bhnnnh.exec:\bhnnnh.exe25⤵
- Executes dropped EXE
PID:1580 -
\??\c:\7bnhbb.exec:\7bnhbb.exe26⤵
- Executes dropped EXE
PID:4048 -
\??\c:\xxflffx.exec:\xxflffx.exe27⤵
- Executes dropped EXE
PID:4388 -
\??\c:\3lrlffx.exec:\3lrlffx.exe28⤵
- Executes dropped EXE
PID:2416 -
\??\c:\bntnhh.exec:\bntnhh.exe29⤵
- Executes dropped EXE
PID:4484 -
\??\c:\pdvpj.exec:\pdvpj.exe30⤵
- Executes dropped EXE
PID:3132 -
\??\c:\5lrlffx.exec:\5lrlffx.exe31⤵
- Executes dropped EXE
PID:644 -
\??\c:\bnbtnn.exec:\bnbtnn.exe32⤵
- Executes dropped EXE
PID:1928 -
\??\c:\7flxrrx.exec:\7flxrrx.exe33⤵
- Executes dropped EXE
PID:4348 -
\??\c:\9ffxrrl.exec:\9ffxrrl.exe34⤵
- Executes dropped EXE
PID:4948 -
\??\c:\3bbttt.exec:\3bbttt.exe35⤵
- Executes dropped EXE
PID:4016 -
\??\c:\ppddd.exec:\ppddd.exe36⤵
- Executes dropped EXE
PID:4312 -
\??\c:\rxfxllx.exec:\rxfxllx.exe37⤵
- Executes dropped EXE
PID:3556 -
\??\c:\nnnbtn.exec:\nnnbtn.exe38⤵
- Executes dropped EXE
PID:3992 -
\??\c:\jjvpv.exec:\jjvpv.exe39⤵
- Executes dropped EXE
PID:2264 -
\??\c:\jjvpj.exec:\jjvpj.exe40⤵
- Executes dropped EXE
PID:748 -
\??\c:\xllfrrl.exec:\xllfrrl.exe41⤵
- Executes dropped EXE
PID:2064 -
\??\c:\flxrxxx.exec:\flxrxxx.exe42⤵
- Executes dropped EXE
PID:4612 -
\??\c:\dvdvv.exec:\dvdvv.exe43⤵
- Executes dropped EXE
PID:2128 -
\??\c:\rlrllll.exec:\rlrllll.exe44⤵
- Executes dropped EXE
PID:4144 -
\??\c:\hhbnhh.exec:\hhbnhh.exe45⤵
- Executes dropped EXE
PID:2500 -
\??\c:\jdpjd.exec:\jdpjd.exe46⤵
- Executes dropped EXE
PID:4060 -
\??\c:\1xxrrll.exec:\1xxrrll.exe47⤵
- Executes dropped EXE
PID:1436 -
\??\c:\vpjdv.exec:\vpjdv.exe48⤵
- Executes dropped EXE
PID:4744 -
\??\c:\rrfffxx.exec:\rrfffxx.exe49⤵
- Executes dropped EXE
PID:1388 -
\??\c:\nhbttt.exec:\nhbttt.exe50⤵
- Executes dropped EXE
PID:1100 -
\??\c:\ddjdv.exec:\ddjdv.exe51⤵
- Executes dropped EXE
PID:3260 -
\??\c:\jpjdv.exec:\jpjdv.exe52⤵
- Executes dropped EXE
PID:2004 -
\??\c:\lxfxrrl.exec:\lxfxrrl.exe53⤵
- Executes dropped EXE
PID:676 -
\??\c:\ttttnh.exec:\ttttnh.exe54⤵
- Executes dropped EXE
PID:3264 -
\??\c:\bntttt.exec:\bntttt.exe55⤵
- Executes dropped EXE
PID:1500 -
\??\c:\vddvv.exec:\vddvv.exe56⤵
- Executes dropped EXE
PID:844 -
\??\c:\lflrllx.exec:\lflrllx.exe57⤵
- Executes dropped EXE
PID:1808 -
\??\c:\nhbttn.exec:\nhbttn.exe58⤵
- Executes dropped EXE
PID:3884 -
\??\c:\btthbt.exec:\btthbt.exe59⤵
- Executes dropped EXE
PID:2236 -
\??\c:\lffxfxx.exec:\lffxfxx.exe60⤵
- Executes dropped EXE
PID:1012 -
\??\c:\lrlffff.exec:\lrlffff.exe61⤵
- Executes dropped EXE
PID:4416 -
\??\c:\nbhbtn.exec:\nbhbtn.exe62⤵
- Executes dropped EXE
PID:1876 -
\??\c:\9vvpj.exec:\9vvpj.exe63⤵
- Executes dropped EXE
PID:3216 -
\??\c:\1lrlrrr.exec:\1lrlrrr.exe64⤵
- Executes dropped EXE
PID:4452 -
\??\c:\thnntn.exec:\thnntn.exe65⤵
- Executes dropped EXE
PID:2372 -
\??\c:\djpdv.exec:\djpdv.exe66⤵PID:2052
-
\??\c:\xlxlfxr.exec:\xlxlfxr.exe67⤵PID:3936
-
\??\c:\5hbbbt.exec:\5hbbbt.exe68⤵PID:5004
-
\??\c:\htbtbt.exec:\htbtbt.exe69⤵PID:3432
-
\??\c:\pdpdp.exec:\pdpdp.exe70⤵PID:4484
-
\??\c:\lxxrlff.exec:\lxxrlff.exe71⤵PID:4084
-
\??\c:\vdjjj.exec:\vdjjj.exe72⤵PID:2196
-
\??\c:\ffrrxxx.exec:\ffrrxxx.exe73⤵PID:864
-
\??\c:\nthbtn.exec:\nthbtn.exe74⤵PID:4832
-
\??\c:\1djdd.exec:\1djdd.exe75⤵PID:4004
-
\??\c:\7vjvp.exec:\7vjvp.exe76⤵PID:3332
-
\??\c:\9llfrrl.exec:\9llfrrl.exe77⤵PID:4016
-
\??\c:\fxxrffl.exec:\fxxrffl.exe78⤵PID:1304
-
\??\c:\hbtnnh.exec:\hbtnnh.exe79⤵PID:4620
-
\??\c:\ddvpj.exec:\ddvpj.exe80⤵PID:1276
-
\??\c:\jpvpj.exec:\jpvpj.exe81⤵PID:448
-
\??\c:\rlfrxxr.exec:\rlfrxxr.exe82⤵
- System Location Discovery: System Language Discovery
PID:1268 -
\??\c:\bhnbbh.exec:\bhnbbh.exe83⤵PID:2308
-
\??\c:\nbbtnt.exec:\nbbtnt.exe84⤵PID:4408
-
\??\c:\jpvjd.exec:\jpvjd.exe85⤵PID:4992
-
\??\c:\llrfxxl.exec:\llrfxxl.exe86⤵PID:1460
-
\??\c:\lrxlfxr.exec:\lrxlfxr.exe87⤵PID:3692
-
\??\c:\bnbtnn.exec:\bnbtnn.exe88⤵PID:1532
-
\??\c:\rllrllf.exec:\rllrllf.exe89⤵PID:4060
-
\??\c:\3nnnnn.exec:\3nnnnn.exe90⤵PID:4924
-
\??\c:\9bbthh.exec:\9bbthh.exe91⤵PID:2088
-
\??\c:\5vdvj.exec:\5vdvj.exe92⤵PID:3724
-
\??\c:\7ddpj.exec:\7ddpj.exe93⤵PID:4596
-
\??\c:\rlfxlff.exec:\rlfxlff.exe94⤵PID:4904
-
\??\c:\httnnn.exec:\httnnn.exe95⤵PID:3324
-
\??\c:\9ppdv.exec:\9ppdv.exe96⤵PID:2152
-
\??\c:\pvjdv.exec:\pvjdv.exe97⤵PID:1300
-
\??\c:\ffxrlll.exec:\ffxrlll.exe98⤵
- System Location Discovery: System Language Discovery
PID:3264 -
\??\c:\thnhbh.exec:\thnhbh.exe99⤵PID:1492
-
\??\c:\hnnnbh.exec:\hnnnbh.exe100⤵PID:1820
-
\??\c:\dpvpv.exec:\dpvpv.exe101⤵PID:2656
-
\??\c:\7ffxllf.exec:\7ffxllf.exe102⤵PID:4840
-
\??\c:\rrfxrll.exec:\rrfxrll.exe103⤵PID:4656
-
\??\c:\nhntnt.exec:\nhntnt.exe104⤵PID:2132
-
\??\c:\btthbt.exec:\btthbt.exe105⤵PID:4452
-
\??\c:\9jvvp.exec:\9jvvp.exe106⤵PID:1580
-
\??\c:\dvvpv.exec:\dvvpv.exe107⤵PID:4288
-
\??\c:\ffrflfl.exec:\ffrflfl.exe108⤵PID:4608
-
\??\c:\nbtbtt.exec:\nbtbtt.exe109⤵PID:3132
-
\??\c:\bbbtnn.exec:\bbbtnn.exe110⤵PID:4012
-
\??\c:\pdvvj.exec:\pdvvj.exe111⤵PID:984
-
\??\c:\fxllxff.exec:\fxllxff.exe112⤵PID:2196
-
\??\c:\bnhnhb.exec:\bnhnhb.exe113⤵PID:864
-
\??\c:\ddvpv.exec:\ddvpv.exe114⤵PID:3060
-
\??\c:\rffxrrx.exec:\rffxrrx.exe115⤵PID:4004
-
\??\c:\tttnnh.exec:\tttnnh.exe116⤵PID:4968
-
\??\c:\vvjdj.exec:\vvjdj.exe117⤵PID:212
-
\??\c:\rfxxxxx.exec:\rfxxxxx.exe118⤵PID:4788
-
\??\c:\frfrllf.exec:\frfrllf.exe119⤵PID:4620
-
\??\c:\nhnbhh.exec:\nhnbhh.exe120⤵PID:2644
-
\??\c:\vddpv.exec:\vddpv.exe121⤵PID:1960
-
\??\c:\dpdpp.exec:\dpdpp.exe122⤵PID:1528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-