Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 18:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ebc40cd78bf15a7862f1db4c29cd7580N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
ebc40cd78bf15a7862f1db4c29cd7580N.exe
-
Size
73KB
-
MD5
ebc40cd78bf15a7862f1db4c29cd7580
-
SHA1
07273016d621b7035c7e6d053dc0591df73b06b3
-
SHA256
ec07e19890290a8c09077fdafb7e1c8b158bb7aa17f1659a8014bd2ecf787e4f
-
SHA512
35f622a9eddc02a94a62a3650ef85f557c0a487e2d3cc0d4d6768db95361dbd4768dadeed949ec37b8bce1cd8ec506dffdc883c23812b6c2166ec6956fd98cb2
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDWiekja1br3GGBxfot3ey:ymb3NkkiQ3mdBjFWXkj7afoV
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/4636-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4584-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/368-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2060-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2008-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/968-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/608-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2800-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3240-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4404-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/536-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1512-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1184-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 5020 vvvpj.exe 232 lxfrrfx.exe 4584 rrxxflr.exe 1284 nhttnn.exe 368 dppjd.exe 4484 pjjdp.exe 2060 rffxfrx.exe 552 hhnnnt.exe 4836 pjdvj.exe 1820 xffrrrl.exe 2192 5ttttt.exe 2008 vdjjv.exe 968 pvvjv.exe 5068 1xffxff.exe 4716 7nbhnn.exe 1764 jjddj.exe 608 rfxxllf.exe 2220 1rllfff.exe 2800 nhtttt.exe 2756 hhbthn.exe 1684 dvjdd.exe 1028 rllfxrl.exe 3240 rfllxxx.exe 4404 tnbhnt.exe 3880 ppdvv.exe 536 djjjv.exe 1512 xlrflfl.exe 1068 thbtnn.exe 4532 5dvvj.exe 1184 rxfxrrl.exe 4792 bbtnhh.exe 4832 3ppjd.exe 4028 lflfffl.exe 4220 ntbbtt.exe 4708 ddpvd.exe 4368 vjppd.exe 5076 rlfxlfl.exe 264 xlfxrll.exe 736 3btnhh.exe 4340 1hbttt.exe 4968 jvdvp.exe 4800 djjdj.exe 2784 5xlfflr.exe 4880 lxffxff.exe 4536 bbhbtt.exe 316 htthnh.exe 4084 djjjj.exe 4464 5dvpd.exe 5016 lxlfrrl.exe 2096 rlxxrff.exe 1808 nbnhbb.exe 1820 nhhbtb.exe 1544 vvppj.exe 868 dvpjj.exe 1608 xrrlfff.exe 1812 xxffllr.exe 2900 hbbtnh.exe 2588 tbhhhh.exe 4716 5pvjj.exe 1768 pdpjd.exe 4448 fxfrrrx.exe 1108 llrllxx.exe 2220 nnnnhh.exe 1380 tnbbth.exe -
resource yara_rule behavioral2/memory/4636-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5020-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4584-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/368-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2060-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2008-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/968-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/608-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2800-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3240-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4404-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/536-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1512-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-211-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 5020 4636 ebc40cd78bf15a7862f1db4c29cd7580N.exe 84 PID 4636 wrote to memory of 5020 4636 ebc40cd78bf15a7862f1db4c29cd7580N.exe 84 PID 4636 wrote to memory of 5020 4636 ebc40cd78bf15a7862f1db4c29cd7580N.exe 84 PID 5020 wrote to memory of 232 5020 vvvpj.exe 85 PID 5020 wrote to memory of 232 5020 vvvpj.exe 85 PID 5020 wrote to memory of 232 5020 vvvpj.exe 85 PID 232 wrote to memory of 4584 232 lxfrrfx.exe 86 PID 232 wrote to memory of 4584 232 lxfrrfx.exe 86 PID 232 wrote to memory of 4584 232 lxfrrfx.exe 86 PID 4584 wrote to memory of 1284 4584 rrxxflr.exe 87 PID 4584 wrote to memory of 1284 4584 rrxxflr.exe 87 PID 4584 wrote to memory of 1284 4584 rrxxflr.exe 87 PID 1284 wrote to memory of 368 1284 nhttnn.exe 88 PID 1284 wrote to memory of 368 1284 nhttnn.exe 88 PID 1284 wrote to memory of 368 1284 nhttnn.exe 88 PID 368 wrote to memory of 4484 368 dppjd.exe 89 PID 368 wrote to memory of 4484 368 dppjd.exe 89 PID 368 wrote to memory of 4484 368 dppjd.exe 89 PID 4484 wrote to memory of 2060 4484 pjjdp.exe 90 PID 4484 wrote to memory of 2060 4484 pjjdp.exe 90 PID 4484 wrote to memory of 2060 4484 pjjdp.exe 90 PID 2060 wrote to memory of 552 2060 rffxfrx.exe 91 PID 2060 wrote to memory of 552 2060 rffxfrx.exe 91 PID 2060 wrote to memory of 552 2060 rffxfrx.exe 91 PID 552 wrote to memory of 4836 552 hhnnnt.exe 92 PID 552 wrote to memory of 4836 552 hhnnnt.exe 92 PID 552 wrote to memory of 4836 552 hhnnnt.exe 92 PID 4836 wrote to memory of 1820 4836 pjdvj.exe 93 PID 4836 wrote to memory of 1820 4836 pjdvj.exe 93 PID 4836 wrote to memory of 1820 4836 pjdvj.exe 93 PID 1820 wrote to memory of 2192 1820 xffrrrl.exe 94 PID 1820 wrote to memory of 2192 1820 xffrrrl.exe 94 PID 1820 wrote to memory of 2192 1820 xffrrrl.exe 94 PID 2192 wrote to memory of 2008 2192 5ttttt.exe 95 PID 2192 wrote to memory of 2008 2192 5ttttt.exe 95 PID 2192 wrote to memory of 2008 2192 5ttttt.exe 95 PID 2008 wrote to memory of 968 2008 vdjjv.exe 96 PID 2008 wrote to memory of 968 2008 vdjjv.exe 96 PID 2008 wrote to memory of 968 2008 vdjjv.exe 96 PID 968 wrote to memory of 5068 968 pvvjv.exe 97 PID 968 wrote to memory of 5068 968 pvvjv.exe 97 PID 968 wrote to memory of 5068 968 pvvjv.exe 97 PID 5068 wrote to memory of 4716 5068 1xffxff.exe 99 PID 5068 wrote to memory of 4716 5068 1xffxff.exe 99 PID 5068 wrote to memory of 4716 5068 1xffxff.exe 99 PID 4716 wrote to memory of 1764 4716 7nbhnn.exe 100 PID 4716 wrote to memory of 1764 4716 7nbhnn.exe 100 PID 4716 wrote to memory of 1764 4716 7nbhnn.exe 100 PID 1764 wrote to memory of 608 1764 jjddj.exe 101 PID 1764 wrote to memory of 608 1764 jjddj.exe 101 PID 1764 wrote to memory of 608 1764 jjddj.exe 101 PID 608 wrote to memory of 2220 608 rfxxllf.exe 102 PID 608 wrote to memory of 2220 608 rfxxllf.exe 102 PID 608 wrote to memory of 2220 608 rfxxllf.exe 102 PID 2220 wrote to memory of 2800 2220 1rllfff.exe 103 PID 2220 wrote to memory of 2800 2220 1rllfff.exe 103 PID 2220 wrote to memory of 2800 2220 1rllfff.exe 103 PID 2800 wrote to memory of 2756 2800 nhtttt.exe 104 PID 2800 wrote to memory of 2756 2800 nhtttt.exe 104 PID 2800 wrote to memory of 2756 2800 nhtttt.exe 104 PID 2756 wrote to memory of 1684 2756 hhbthn.exe 105 PID 2756 wrote to memory of 1684 2756 hhbthn.exe 105 PID 2756 wrote to memory of 1684 2756 hhbthn.exe 105 PID 1684 wrote to memory of 1028 1684 dvjdd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc40cd78bf15a7862f1db4c29cd7580N.exe"C:\Users\Admin\AppData\Local\Temp\ebc40cd78bf15a7862f1db4c29cd7580N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\vvvpj.exec:\vvvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\lxfrrfx.exec:\lxfrrfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
\??\c:\rrxxflr.exec:\rrxxflr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
\??\c:\nhttnn.exec:\nhttnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\dppjd.exec:\dppjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
\??\c:\pjjdp.exec:\pjjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
\??\c:\rffxfrx.exec:\rffxfrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\hhnnnt.exec:\hhnnnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\pjdvj.exec:\pjdvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\xffrrrl.exec:\xffrrrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\5ttttt.exec:\5ttttt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\vdjjv.exec:\vdjjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\pvvjv.exec:\pvvjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\1xffxff.exec:\1xffxff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
\??\c:\7nbhnn.exec:\7nbhnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\jjddj.exec:\jjddj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
\??\c:\rfxxllf.exec:\rfxxllf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
\??\c:\1rllfff.exec:\1rllfff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\nhtttt.exec:\nhtttt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\hhbthn.exec:\hhbthn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\dvjdd.exec:\dvjdd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\rllfxrl.exec:\rllfxrl.exe23⤵
- Executes dropped EXE
PID:1028 -
\??\c:\rfllxxx.exec:\rfllxxx.exe24⤵
- Executes dropped EXE
PID:3240 -
\??\c:\tnbhnt.exec:\tnbhnt.exe25⤵
- Executes dropped EXE
PID:4404 -
\??\c:\ppdvv.exec:\ppdvv.exe26⤵
- Executes dropped EXE
PID:3880 -
\??\c:\djjjv.exec:\djjjv.exe27⤵
- Executes dropped EXE
PID:536 -
\??\c:\xlrflfl.exec:\xlrflfl.exe28⤵
- Executes dropped EXE
PID:1512 -
\??\c:\thbtnn.exec:\thbtnn.exe29⤵
- Executes dropped EXE
PID:1068 -
\??\c:\5dvvj.exec:\5dvvj.exe30⤵
- Executes dropped EXE
PID:4532 -
\??\c:\rxfxrrl.exec:\rxfxrrl.exe31⤵
- Executes dropped EXE
PID:1184 -
\??\c:\bbtnhh.exec:\bbtnhh.exe32⤵
- Executes dropped EXE
PID:4792 -
\??\c:\3ppjd.exec:\3ppjd.exe33⤵
- Executes dropped EXE
PID:4832 -
\??\c:\lflfffl.exec:\lflfffl.exe34⤵
- Executes dropped EXE
PID:4028 -
\??\c:\ntbbtt.exec:\ntbbtt.exe35⤵
- Executes dropped EXE
PID:4220 -
\??\c:\ddpvd.exec:\ddpvd.exe36⤵
- Executes dropped EXE
PID:4708 -
\??\c:\vjppd.exec:\vjppd.exe37⤵
- Executes dropped EXE
PID:4368 -
\??\c:\rlfxlfl.exec:\rlfxlfl.exe38⤵
- Executes dropped EXE
PID:5076 -
\??\c:\xlfxrll.exec:\xlfxrll.exe39⤵
- Executes dropped EXE
PID:264 -
\??\c:\3btnhh.exec:\3btnhh.exe40⤵
- Executes dropped EXE
PID:736 -
\??\c:\1hbttt.exec:\1hbttt.exe41⤵
- Executes dropped EXE
PID:4340 -
\??\c:\jvdvp.exec:\jvdvp.exe42⤵
- Executes dropped EXE
PID:4968 -
\??\c:\djjdj.exec:\djjdj.exe43⤵
- Executes dropped EXE
PID:4800 -
\??\c:\5xlfflr.exec:\5xlfflr.exe44⤵
- Executes dropped EXE
PID:2784 -
\??\c:\lxffxff.exec:\lxffxff.exe45⤵
- Executes dropped EXE
PID:4880 -
\??\c:\bbhbtt.exec:\bbhbtt.exe46⤵
- Executes dropped EXE
PID:4536 -
\??\c:\htthnh.exec:\htthnh.exe47⤵
- Executes dropped EXE
PID:316 -
\??\c:\djjjj.exec:\djjjj.exe48⤵
- Executes dropped EXE
PID:4084 -
\??\c:\5dvpd.exec:\5dvpd.exe49⤵
- Executes dropped EXE
PID:4464 -
\??\c:\lxlfrrl.exec:\lxlfrrl.exe50⤵
- Executes dropped EXE
PID:5016 -
\??\c:\rlxxrff.exec:\rlxxrff.exe51⤵
- Executes dropped EXE
PID:2096 -
\??\c:\nbnhbb.exec:\nbnhbb.exe52⤵
- Executes dropped EXE
PID:1808 -
\??\c:\nhhbtb.exec:\nhhbtb.exe53⤵
- Executes dropped EXE
PID:1820 -
\??\c:\vvppj.exec:\vvppj.exe54⤵
- Executes dropped EXE
PID:1544 -
\??\c:\dvpjj.exec:\dvpjj.exe55⤵
- Executes dropped EXE
PID:868 -
\??\c:\xrrlfff.exec:\xrrlfff.exe56⤵
- Executes dropped EXE
PID:1608 -
\??\c:\xxffllr.exec:\xxffllr.exe57⤵
- Executes dropped EXE
PID:1812 -
\??\c:\hbbtnh.exec:\hbbtnh.exe58⤵
- Executes dropped EXE
PID:2900 -
\??\c:\tbhhhh.exec:\tbhhhh.exe59⤵
- Executes dropped EXE
PID:2588 -
\??\c:\5pvjj.exec:\5pvjj.exe60⤵
- Executes dropped EXE
PID:4716 -
\??\c:\pdpjd.exec:\pdpjd.exe61⤵
- Executes dropped EXE
PID:1768 -
\??\c:\fxfrrrx.exec:\fxfrrrx.exe62⤵
- Executes dropped EXE
PID:4448 -
\??\c:\llrllxx.exec:\llrllxx.exe63⤵
- Executes dropped EXE
PID:1108 -
\??\c:\nnnnhh.exec:\nnnnhh.exe64⤵
- Executes dropped EXE
PID:2220 -
\??\c:\tnbbth.exec:\tnbbth.exe65⤵
- Executes dropped EXE
PID:1380 -
\??\c:\ddpjd.exec:\ddpjd.exe66⤵PID:3464
-
\??\c:\lfllfff.exec:\lfllfff.exe67⤵PID:1256
-
\??\c:\7xrfrrx.exec:\7xrfrrx.exe68⤵PID:1684
-
\??\c:\btbbhh.exec:\btbbhh.exe69⤵PID:4912
-
\??\c:\bnnnhh.exec:\bnnnhh.exe70⤵PID:1156
-
\??\c:\9dvpj.exec:\9dvpj.exe71⤵PID:4404
-
\??\c:\vpjdd.exec:\vpjdd.exe72⤵PID:1004
-
\??\c:\lrrrllf.exec:\lrrrllf.exe73⤵PID:3908
-
\??\c:\xlllfff.exec:\xlllfff.exe74⤵PID:4492
-
\??\c:\hbtnhh.exec:\hbtnhh.exe75⤵PID:3204
-
\??\c:\nhnhhh.exec:\nhnhhh.exe76⤵PID:1088
-
\??\c:\dpddj.exec:\dpddj.exe77⤵PID:4816
-
\??\c:\pdvpv.exec:\pdvpv.exe78⤵PID:2168
-
\??\c:\ffllrrx.exec:\ffllrrx.exe79⤵PID:4388
-
\??\c:\tnbntn.exec:\tnbntn.exe80⤵PID:3008
-
\??\c:\bhnthb.exec:\bhnthb.exe81⤵PID:4792
-
\??\c:\dppvv.exec:\dppvv.exe82⤵PID:540
-
\??\c:\vpjdv.exec:\vpjdv.exe83⤵PID:4516
-
\??\c:\9xfxllx.exec:\9xfxllx.exe84⤵PID:1788
-
\??\c:\xrxfxrl.exec:\xrxfxrl.exe85⤵PID:4752
-
\??\c:\bnttnn.exec:\bnttnn.exe86⤵PID:1352
-
\??\c:\djjvp.exec:\djjvp.exe87⤵PID:1868
-
\??\c:\dvdvv.exec:\dvdvv.exe88⤵PID:5080
-
\??\c:\xxrlrrx.exec:\xxrlrrx.exe89⤵PID:4324
-
\??\c:\rfrlfrr.exec:\rfrlfrr.exe90⤵PID:1188
-
\??\c:\thtttt.exec:\thtttt.exe91⤵PID:884
-
\??\c:\tttnnn.exec:\tttnnn.exe92⤵PID:1072
-
\??\c:\7jjdv.exec:\7jjdv.exe93⤵PID:4700
-
\??\c:\fflflll.exec:\fflflll.exe94⤵PID:368
-
\??\c:\5lrlfff.exec:\5lrlfff.exe95⤵PID:3136
-
\??\c:\rlxlxrf.exec:\rlxlxrf.exe96⤵PID:216
-
\??\c:\htttnn.exec:\htttnn.exe97⤵PID:2888
-
\??\c:\jvdvp.exec:\jvdvp.exe98⤵PID:4864
-
\??\c:\dvjjv.exec:\dvjjv.exe99⤵PID:4544
-
\??\c:\lffllfl.exec:\lffllfl.exe100⤵PID:3252
-
\??\c:\xlflrxl.exec:\xlflrxl.exe101⤵PID:4936
-
\??\c:\tntnnh.exec:\tntnnh.exe102⤵PID:2272
-
\??\c:\jvvpj.exec:\jvvpj.exe103⤵PID:1064
-
\??\c:\3ddvp.exec:\3ddvp.exe104⤵PID:3844
-
\??\c:\rlllxxx.exec:\rlllxxx.exe105⤵PID:4696
-
\??\c:\xxfffff.exec:\xxfffff.exe106⤵PID:4428
-
\??\c:\7tthtb.exec:\7tthtb.exe107⤵PID:4728
-
\??\c:\7ppjd.exec:\7ppjd.exe108⤵PID:8
-
\??\c:\3vvjd.exec:\3vvjd.exe109⤵PID:1936
-
\??\c:\rlfrrlr.exec:\rlfrrlr.exe110⤵PID:3224
-
\??\c:\3hhbtt.exec:\3hhbtt.exe111⤵PID:2536
-
\??\c:\1tbtnn.exec:\1tbtnn.exe112⤵PID:4148
-
\??\c:\vpdjd.exec:\vpdjd.exe113⤵PID:1480
-
\??\c:\pvdvp.exec:\pvdvp.exe114⤵PID:3380
-
\??\c:\rllfxxr.exec:\rllfxxr.exe115⤵PID:2756
-
\??\c:\llllllf.exec:\llllllf.exe116⤵PID:2764
-
\??\c:\3hhhbh.exec:\3hhhbh.exe117⤵PID:2036
-
\??\c:\nnbbnn.exec:\nnbbnn.exe118⤵PID:2024
-
\??\c:\ddvpv.exec:\ddvpv.exe119⤵PID:3604
-
\??\c:\ppvpp.exec:\ppvpp.exe120⤵
- System Location Discovery: System Language Discovery
PID:1192 -
\??\c:\vdddp.exec:\vdddp.exe121⤵PID:1972
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe122⤵PID:372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-