Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 08:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
052f1eea85c007c3f129a809eb0dcab0N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
052f1eea85c007c3f129a809eb0dcab0N.exe
-
Size
60KB
-
MD5
052f1eea85c007c3f129a809eb0dcab0
-
SHA1
265564970d8779b66e1c8ee0c3e5ac1065c16823
-
SHA256
271abccc17419155d43b8111b7125dedc0b45d03f12fb8acc2a35511df9682a6
-
SHA512
cf84aa1ee3b46089cf9b7406e76115a666f74d40117e0ec915279d9f5273d62f991401a3f627686283c86b08d6104b8b1c4bb264b07f37224103014562e6fa84
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsP34i43:ymb3NkkiQ3mdBjFIsP/43
Malware Config
Signatures
-
Detect Blackmoon payload 29 IoCs
resource yara_rule behavioral2/memory/4244-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4244-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4156-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4156-28-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1188-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1920-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4844-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1620-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4440-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2132-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1340-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3676-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5072-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3048-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4312-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4280-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1048-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3860-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3784-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4496-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2556-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4076-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2708-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1036-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4440 rrxxllr.exe 1620 fxllrrf.exe 4156 7tbnnn.exe 4844 thhhhh.exe 1920 pddvv.exe 1188 dvvpj.exe 3456 xrfxrrl.exe 5008 hhhbhh.exe 2132 3tbnbb.exe 376 vpjjp.exe 2196 fflfffl.exe 1340 fxxrrxr.exe 4160 hhbttt.exe 3676 3pvpp.exe 5072 ffxxrxr.exe 3048 bhbbbh.exe 4560 ttnhnn.exe 4312 ddjdj.exe 4280 7rrlxxx.exe 1048 rlxrxrx.exe 3860 nnnnnn.exe 464 tnbbhh.exe 3784 ppjjj.exe 4496 llxxfxf.exe 2556 1bnnnn.exe 60 1vvpj.exe 4076 1ddvj.exe 3064 frxrlfx.exe 2708 bhtnhn.exe 1036 hnthnb.exe 4972 pvdvv.exe 4728 xrrlfff.exe 1472 5flxfff.exe 5076 9nnnnn.exe 3100 jjvvv.exe 1256 dvvpd.exe 2564 xxlfffl.exe 728 ffllxfl.exe 4300 ttttnn.exe 4008 tbbtnn.exe 3716 vjjpd.exe 2520 vdpjd.exe 2624 5frrrrf.exe 4896 rxrlfff.exe 900 7ttttt.exe 2292 htbhbh.exe 4844 5jppv.exe 2972 xrxxrrl.exe 1932 lxrrrrl.exe 4480 1bbbtn.exe 372 9pjdv.exe 412 7djpp.exe 3736 llfrrxx.exe 5012 5lxrxxf.exe 3176 tbbbbh.exe 2720 jppjd.exe 2824 pjjdv.exe 3744 jjpjp.exe 1060 llllxff.exe 4916 bthhnn.exe 2968 1bthbn.exe 860 vpvvp.exe 4764 vvppj.exe 3440 7rxrllr.exe -
resource yara_rule behavioral2/memory/4244-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4244-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4156-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1188-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1920-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4844-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4440-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2132-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1340-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3676-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5072-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4312-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4280-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1048-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3860-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/464-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3784-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2556-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4076-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2708-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1036-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxxxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tbnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bnnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rrrlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htbhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxflfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4440 4244 052f1eea85c007c3f129a809eb0dcab0N.exe 84 PID 4244 wrote to memory of 4440 4244 052f1eea85c007c3f129a809eb0dcab0N.exe 84 PID 4244 wrote to memory of 4440 4244 052f1eea85c007c3f129a809eb0dcab0N.exe 84 PID 4440 wrote to memory of 1620 4440 rrxxllr.exe 85 PID 4440 wrote to memory of 1620 4440 rrxxllr.exe 85 PID 4440 wrote to memory of 1620 4440 rrxxllr.exe 85 PID 1620 wrote to memory of 4156 1620 fxllrrf.exe 86 PID 1620 wrote to memory of 4156 1620 fxllrrf.exe 86 PID 1620 wrote to memory of 4156 1620 fxllrrf.exe 86 PID 4156 wrote to memory of 4844 4156 7tbnnn.exe 87 PID 4156 wrote to memory of 4844 4156 7tbnnn.exe 87 PID 4156 wrote to memory of 4844 4156 7tbnnn.exe 87 PID 4844 wrote to memory of 1920 4844 thhhhh.exe 88 PID 4844 wrote to memory of 1920 4844 thhhhh.exe 88 PID 4844 wrote to memory of 1920 4844 thhhhh.exe 88 PID 1920 wrote to memory of 1188 1920 pddvv.exe 89 PID 1920 wrote to memory of 1188 1920 pddvv.exe 89 PID 1920 wrote to memory of 1188 1920 pddvv.exe 89 PID 1188 wrote to memory of 3456 1188 dvvpj.exe 90 PID 1188 wrote to memory of 3456 1188 dvvpj.exe 90 PID 1188 wrote to memory of 3456 1188 dvvpj.exe 90 PID 3456 wrote to memory of 5008 3456 xrfxrrl.exe 91 PID 3456 wrote to memory of 5008 3456 xrfxrrl.exe 91 PID 3456 wrote to memory of 5008 3456 xrfxrrl.exe 91 PID 5008 wrote to memory of 2132 5008 hhhbhh.exe 92 PID 5008 wrote to memory of 2132 5008 hhhbhh.exe 92 PID 5008 wrote to memory of 2132 5008 hhhbhh.exe 92 PID 2132 wrote to memory of 376 2132 3tbnbb.exe 93 PID 2132 wrote to memory of 376 2132 3tbnbb.exe 93 PID 2132 wrote to memory of 376 2132 3tbnbb.exe 93 PID 376 wrote to memory of 2196 376 vpjjp.exe 94 PID 376 wrote to memory of 2196 376 vpjjp.exe 94 PID 376 wrote to memory of 2196 376 vpjjp.exe 94 PID 2196 wrote to memory of 1340 2196 fflfffl.exe 95 PID 2196 wrote to memory of 1340 2196 fflfffl.exe 95 PID 2196 wrote to memory of 1340 2196 fflfffl.exe 95 PID 1340 wrote to memory of 4160 1340 fxxrrxr.exe 96 PID 1340 wrote to memory of 4160 1340 fxxrrxr.exe 96 PID 1340 wrote to memory of 4160 1340 fxxrrxr.exe 96 PID 4160 wrote to memory of 3676 4160 hhbttt.exe 97 PID 4160 wrote to memory of 3676 4160 hhbttt.exe 97 PID 4160 wrote to memory of 3676 4160 hhbttt.exe 97 PID 3676 wrote to memory of 5072 3676 3pvpp.exe 98 PID 3676 wrote to memory of 5072 3676 3pvpp.exe 98 PID 3676 wrote to memory of 5072 3676 3pvpp.exe 98 PID 5072 wrote to memory of 3048 5072 ffxxrxr.exe 99 PID 5072 wrote to memory of 3048 5072 ffxxrxr.exe 99 PID 5072 wrote to memory of 3048 5072 ffxxrxr.exe 99 PID 3048 wrote to memory of 4560 3048 bhbbbh.exe 100 PID 3048 wrote to memory of 4560 3048 bhbbbh.exe 100 PID 3048 wrote to memory of 4560 3048 bhbbbh.exe 100 PID 4560 wrote to memory of 4312 4560 ttnhnn.exe 102 PID 4560 wrote to memory of 4312 4560 ttnhnn.exe 102 PID 4560 wrote to memory of 4312 4560 ttnhnn.exe 102 PID 4312 wrote to memory of 4280 4312 ddjdj.exe 103 PID 4312 wrote to memory of 4280 4312 ddjdj.exe 103 PID 4312 wrote to memory of 4280 4312 ddjdj.exe 103 PID 4280 wrote to memory of 1048 4280 7rrlxxx.exe 104 PID 4280 wrote to memory of 1048 4280 7rrlxxx.exe 104 PID 4280 wrote to memory of 1048 4280 7rrlxxx.exe 104 PID 1048 wrote to memory of 3860 1048 rlxrxrx.exe 105 PID 1048 wrote to memory of 3860 1048 rlxrxrx.exe 105 PID 1048 wrote to memory of 3860 1048 rlxrxrx.exe 105 PID 3860 wrote to memory of 464 3860 nnnnnn.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\052f1eea85c007c3f129a809eb0dcab0N.exe"C:\Users\Admin\AppData\Local\Temp\052f1eea85c007c3f129a809eb0dcab0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
\??\c:\rrxxllr.exec:\rrxxllr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\fxllrrf.exec:\fxllrrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\7tbnnn.exec:\7tbnnn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
\??\c:\thhhhh.exec:\thhhhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
\??\c:\pddvv.exec:\pddvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\dvvpj.exec:\dvvpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\xrfxrrl.exec:\xrfxrrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
\??\c:\hhhbhh.exec:\hhhbhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
\??\c:\3tbnbb.exec:\3tbnbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\vpjjp.exec:\vpjjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\fflfffl.exec:\fflfffl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\fxxrrxr.exec:\fxxrrxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
\??\c:\hhbttt.exec:\hhbttt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\3pvpp.exec:\3pvpp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\ffxxrxr.exec:\ffxxrxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\bhbbbh.exec:\bhbbbh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\ttnhnn.exec:\ttnhnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
\??\c:\ddjdj.exec:\ddjdj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
\??\c:\7rrlxxx.exec:\7rrlxxx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
\??\c:\rlxrxrx.exec:\rlxrxrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\nnnnnn.exec:\nnnnnn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
\??\c:\tnbbhh.exec:\tnbbhh.exe23⤵
- Executes dropped EXE
PID:464 -
\??\c:\ppjjj.exec:\ppjjj.exe24⤵
- Executes dropped EXE
PID:3784 -
\??\c:\llxxfxf.exec:\llxxfxf.exe25⤵
- Executes dropped EXE
PID:4496 -
\??\c:\1bnnnn.exec:\1bnnnn.exe26⤵
- Executes dropped EXE
PID:2556 -
\??\c:\1vvpj.exec:\1vvpj.exe27⤵
- Executes dropped EXE
PID:60 -
\??\c:\1ddvj.exec:\1ddvj.exe28⤵
- Executes dropped EXE
PID:4076 -
\??\c:\frxrlfx.exec:\frxrlfx.exe29⤵
- Executes dropped EXE
PID:3064 -
\??\c:\bhtnhn.exec:\bhtnhn.exe30⤵
- Executes dropped EXE
PID:2708 -
\??\c:\hnthnb.exec:\hnthnb.exe31⤵
- Executes dropped EXE
PID:1036 -
\??\c:\pvdvv.exec:\pvdvv.exe32⤵
- Executes dropped EXE
PID:4972 -
\??\c:\xrrlfff.exec:\xrrlfff.exe33⤵
- Executes dropped EXE
PID:4728 -
\??\c:\5flxfff.exec:\5flxfff.exe34⤵
- Executes dropped EXE
PID:1472 -
\??\c:\9nnnnn.exec:\9nnnnn.exe35⤵
- Executes dropped EXE
PID:5076 -
\??\c:\jjvvv.exec:\jjvvv.exe36⤵
- Executes dropped EXE
PID:3100 -
\??\c:\dvvpd.exec:\dvvpd.exe37⤵
- Executes dropped EXE
PID:1256 -
\??\c:\xxlfffl.exec:\xxlfffl.exe38⤵
- Executes dropped EXE
PID:2564 -
\??\c:\ffllxfl.exec:\ffllxfl.exe39⤵
- Executes dropped EXE
PID:728 -
\??\c:\ttttnn.exec:\ttttnn.exe40⤵
- Executes dropped EXE
PID:4300 -
\??\c:\tbbtnn.exec:\tbbtnn.exe41⤵
- Executes dropped EXE
PID:4008 -
\??\c:\vjjpd.exec:\vjjpd.exe42⤵
- Executes dropped EXE
PID:3716 -
\??\c:\vdpjd.exec:\vdpjd.exe43⤵
- Executes dropped EXE
PID:2520 -
\??\c:\5frrrrf.exec:\5frrrrf.exe44⤵
- Executes dropped EXE
PID:2624 -
\??\c:\rxrlfff.exec:\rxrlfff.exe45⤵
- Executes dropped EXE
PID:4896 -
\??\c:\7ttttt.exec:\7ttttt.exe46⤵
- Executes dropped EXE
PID:900 -
\??\c:\htbhbh.exec:\htbhbh.exe47⤵
- Executes dropped EXE
PID:2292 -
\??\c:\5jppv.exec:\5jppv.exe48⤵
- Executes dropped EXE
PID:4844 -
\??\c:\xrxxrrl.exec:\xrxxrrl.exe49⤵
- Executes dropped EXE
PID:2972 -
\??\c:\lxrrrrl.exec:\lxrrrrl.exe50⤵
- Executes dropped EXE
PID:1932 -
\??\c:\1bbbtn.exec:\1bbbtn.exe51⤵
- Executes dropped EXE
PID:4480 -
\??\c:\9pjdv.exec:\9pjdv.exe52⤵
- Executes dropped EXE
PID:372 -
\??\c:\7djpp.exec:\7djpp.exe53⤵
- Executes dropped EXE
PID:412 -
\??\c:\llfrrxx.exec:\llfrrxx.exe54⤵
- Executes dropped EXE
PID:3736 -
\??\c:\5lxrxxf.exec:\5lxrxxf.exe55⤵
- Executes dropped EXE
PID:5012 -
\??\c:\tbbbbh.exec:\tbbbbh.exe56⤵
- Executes dropped EXE
PID:3176 -
\??\c:\jppjd.exec:\jppjd.exe57⤵
- Executes dropped EXE
PID:2720 -
\??\c:\pjjdv.exec:\pjjdv.exe58⤵
- Executes dropped EXE
PID:2824 -
\??\c:\jjpjp.exec:\jjpjp.exe59⤵
- Executes dropped EXE
PID:3744 -
\??\c:\llllxff.exec:\llllxff.exe60⤵
- Executes dropped EXE
PID:1060 -
\??\c:\bthhnn.exec:\bthhnn.exe61⤵
- Executes dropped EXE
PID:4916 -
\??\c:\1bthbn.exec:\1bthbn.exe62⤵
- Executes dropped EXE
PID:2968 -
\??\c:\vpvvp.exec:\vpvvp.exe63⤵
- Executes dropped EXE
PID:860 -
\??\c:\vvppj.exec:\vvppj.exe64⤵
- Executes dropped EXE
PID:4764 -
\??\c:\7rxrllr.exec:\7rxrllr.exe65⤵
- Executes dropped EXE
PID:3440 -
\??\c:\lrrllxr.exec:\lrrllxr.exe66⤵PID:1936
-
\??\c:\hhnnnt.exec:\hhnnnt.exe67⤵PID:4492
-
\??\c:\tbnnnn.exec:\tbnnnn.exe68⤵PID:5108
-
\??\c:\3djjd.exec:\3djjd.exe69⤵PID:2156
-
\??\c:\jddjd.exec:\jddjd.exe70⤵
- System Location Discovery: System Language Discovery
PID:2940 -
\??\c:\5lrlffx.exec:\5lrlffx.exe71⤵PID:2344
-
\??\c:\xfffxff.exec:\xfffxff.exe72⤵PID:2764
-
\??\c:\btbhbn.exec:\btbhbn.exe73⤵PID:2556
-
\??\c:\hhbbbb.exec:\hhbbbb.exe74⤵PID:2272
-
\??\c:\djjjp.exec:\djjjp.exe75⤵PID:2768
-
\??\c:\vvvvp.exec:\vvvvp.exe76⤵PID:2456
-
\??\c:\rlrrxxf.exec:\rlrrxxf.exe77⤵PID:908
-
\??\c:\fflfxfx.exec:\fflfxfx.exe78⤵PID:4988
-
\??\c:\5tnbbn.exec:\5tnbbn.exe79⤵PID:1984
-
\??\c:\btbhhh.exec:\btbhhh.exe80⤵PID:2008
-
\??\c:\hnttnn.exec:\hnttnn.exe81⤵PID:4340
-
\??\c:\vpppj.exec:\vpppj.exe82⤵PID:904
-
\??\c:\7jppv.exec:\7jppv.exe83⤵PID:3600
-
\??\c:\lxxxfff.exec:\lxxxfff.exe84⤵PID:2364
-
\??\c:\xlrrrrr.exec:\xlrrrrr.exe85⤵PID:3260
-
\??\c:\5hnnnh.exec:\5hnnnh.exe86⤵PID:4960
-
\??\c:\ntttnn.exec:\ntttnn.exe87⤵PID:3668
-
\??\c:\jjdvv.exec:\jjdvv.exe88⤵PID:4040
-
\??\c:\jdvjv.exec:\jdvjv.exe89⤵PID:1452
-
\??\c:\3rxxlll.exec:\3rxxlll.exe90⤵PID:3164
-
\??\c:\rlllfff.exec:\rlllfff.exe91⤵PID:3636
-
\??\c:\bthbbh.exec:\bthbbh.exe92⤵
- System Location Discovery: System Language Discovery
PID:4864 -
\??\c:\thnbtt.exec:\thnbtt.exe93⤵PID:1620
-
\??\c:\lxxxrrr.exec:\lxxxrrr.exe94⤵PID:4892
-
\??\c:\nbnhtb.exec:\nbnhtb.exe95⤵PID:1108
-
\??\c:\bhtbbb.exec:\bhtbbb.exe96⤵PID:3384
-
\??\c:\5jpjd.exec:\5jpjd.exe97⤵PID:1836
-
\??\c:\5pdvv.exec:\5pdvv.exe98⤵
- System Location Discovery: System Language Discovery
PID:3800 -
\??\c:\lrxxrrl.exec:\lrxxrrl.exe99⤵PID:5016
-
\??\c:\7rlfxlr.exec:\7rlfxlr.exe100⤵PID:4968
-
\??\c:\tnntnt.exec:\tnntnt.exe101⤵PID:2336
-
\??\c:\tttthh.exec:\tttthh.exe102⤵PID:3540
-
\??\c:\djvvv.exec:\djvvv.exe103⤵PID:5068
-
\??\c:\5frrlff.exec:\5frrlff.exe104⤵PID:3116
-
\??\c:\rrxrrrl.exec:\rrxrrrl.exe105⤵PID:4272
-
\??\c:\hbntbh.exec:\hbntbh.exe106⤵PID:2312
-
\??\c:\1bnhnn.exec:\1bnhnn.exe107⤵PID:512
-
\??\c:\dvvvp.exec:\dvvvp.exe108⤵PID:1436
-
\??\c:\dvvpj.exec:\dvvpj.exe109⤵PID:1568
-
\??\c:\rrxrlll.exec:\rrxrlll.exe110⤵PID:864
-
\??\c:\nthbbb.exec:\nthbbb.exe111⤵PID:4460
-
\??\c:\djpjj.exec:\djpjj.exe112⤵PID:4828
-
\??\c:\7jjvd.exec:\7jjvd.exe113⤵PID:3440
-
\??\c:\rlllxxx.exec:\rlllxxx.exe114⤵PID:4144
-
\??\c:\xrrlffx.exec:\xrrlffx.exe115⤵PID:464
-
\??\c:\bbthtt.exec:\bbthtt.exe116⤵PID:528
-
\??\c:\ttbtnt.exec:\ttbtnt.exe117⤵PID:1484
-
\??\c:\ddjjd.exec:\ddjjd.exe118⤵PID:2392
-
\??\c:\rfrrlll.exec:\rfrrlll.exe119⤵PID:2796
-
\??\c:\xrxfxxx.exec:\xrxfxxx.exe120⤵PID:2096
-
\??\c:\hbbttt.exec:\hbbttt.exe121⤵PID:2668
-
\??\c:\jddpp.exec:\jddpp.exe122⤵PID:1088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-