Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
472bd330bb99ac58fdf6b770c0a568d0N.exe
Resource
win7-20240708-en
General
-
Target
472bd330bb99ac58fdf6b770c0a568d0N.exe
-
Size
358KB
-
MD5
472bd330bb99ac58fdf6b770c0a568d0
-
SHA1
bf817f6e596652c42ae64cbe9b2e5632948c5864
-
SHA256
55b94a4b3482bb51e521fd10a460ed780f2d0304da4f563e376783b170e6c7f0
-
SHA512
ff4abb123da17010b86af7c8654f0b2e3038796565fd086784cd5ade8295e4e4b3108fbb57fb84ff58ca06c2822c5847d1c8ef99a3c1fd13afc5cca6f51813a3
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73tvn+Yp9FrHSwh/c/hdTWGIaxJ8TN005pWmjVwdSsyy:n3C9BRo7tvnJ9Fywhk/T7xyTpShZB
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/4400-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1116-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/968-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/780-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1696-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4544-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1808-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/800-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/800-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2180-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3352-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2056-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2036-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3372-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3000-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2216-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3784-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4448-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5084-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4472-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2756-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1116 jdvpv.exe 780 fxlfxrl.exe 968 hntnbb.exe 2848 u882626.exe 1696 880668.exe 4544 40620.exe 1808 ntnhbt.exe 4284 86688.exe 4920 vdvpj.exe 800 rlrrxxl.exe 2180 btnhhh.exe 2504 8666442.exe 4220 6448604.exe 2756 jdjdp.exe 4472 dpjdd.exe 3352 vdjdv.exe 2056 46282.exe 2036 2608446.exe 4804 m4426.exe 5084 lxxrlfx.exe 2268 vvppj.exe 4448 3bhbnt.exe 1560 pdvvp.exe 3784 1hbnbt.exe 2216 8862288.exe 4584 26420.exe 2732 60084.exe 3000 7tbthb.exe 3372 86400.exe 1932 5fxrlfr.exe 2368 hhnbnn.exe 4516 tbthtn.exe 3308 228260.exe 3896 rlrlrlr.exe 4276 204464.exe 880 046640.exe 4920 k68222.exe 2252 tnnnhh.exe 3544 w40488.exe 3924 nbthbb.exe 1692 2400000.exe 3396 o684804.exe 2092 bbtbth.exe 1248 02886.exe 2756 680600.exe 3992 084260.exe 1892 nhnhnb.exe 4056 6288226.exe 4052 486060.exe 4332 2006022.exe 3340 hntbtt.exe 4532 xxrrxxf.exe 3652 rfrlxxf.exe 4884 8040262.exe 3720 6682644.exe 1500 nbhbtn.exe 1208 ddvjp.exe 2628 6288660.exe 2188 6806000.exe 1932 6848660.exe 668 842644.exe 4516 02600.exe 3788 0262886.exe 5056 46062.exe -
resource yara_rule behavioral2/memory/4400-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/968-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/780-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1696-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4544-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1808-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/800-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/800-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2180-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3352-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2056-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2036-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3372-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3000-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2216-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3784-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4448-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5084-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2756-109-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6688880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrlrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4280864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8600044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7llxlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8064426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9xlxxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxrxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8026048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1116 4400 472bd330bb99ac58fdf6b770c0a568d0N.exe 91 PID 4400 wrote to memory of 1116 4400 472bd330bb99ac58fdf6b770c0a568d0N.exe 91 PID 4400 wrote to memory of 1116 4400 472bd330bb99ac58fdf6b770c0a568d0N.exe 91 PID 1116 wrote to memory of 780 1116 jdvpv.exe 92 PID 1116 wrote to memory of 780 1116 jdvpv.exe 92 PID 1116 wrote to memory of 780 1116 jdvpv.exe 92 PID 780 wrote to memory of 968 780 fxlfxrl.exe 93 PID 780 wrote to memory of 968 780 fxlfxrl.exe 93 PID 780 wrote to memory of 968 780 fxlfxrl.exe 93 PID 968 wrote to memory of 2848 968 hntnbb.exe 94 PID 968 wrote to memory of 2848 968 hntnbb.exe 94 PID 968 wrote to memory of 2848 968 hntnbb.exe 94 PID 2848 wrote to memory of 1696 2848 u882626.exe 96 PID 2848 wrote to memory of 1696 2848 u882626.exe 96 PID 2848 wrote to memory of 1696 2848 u882626.exe 96 PID 1696 wrote to memory of 4544 1696 880668.exe 97 PID 1696 wrote to memory of 4544 1696 880668.exe 97 PID 1696 wrote to memory of 4544 1696 880668.exe 97 PID 4544 wrote to memory of 1808 4544 40620.exe 98 PID 4544 wrote to memory of 1808 4544 40620.exe 98 PID 4544 wrote to memory of 1808 4544 40620.exe 98 PID 1808 wrote to memory of 4284 1808 ntnhbt.exe 100 PID 1808 wrote to memory of 4284 1808 ntnhbt.exe 100 PID 1808 wrote to memory of 4284 1808 ntnhbt.exe 100 PID 4284 wrote to memory of 4920 4284 86688.exe 130 PID 4284 wrote to memory of 4920 4284 86688.exe 130 PID 4284 wrote to memory of 4920 4284 86688.exe 130 PID 4920 wrote to memory of 800 4920 vdvpj.exe 102 PID 4920 wrote to memory of 800 4920 vdvpj.exe 102 PID 4920 wrote to memory of 800 4920 vdvpj.exe 102 PID 800 wrote to memory of 2180 800 rlrrxxl.exe 104 PID 800 wrote to memory of 2180 800 rlrrxxl.exe 104 PID 800 wrote to memory of 2180 800 rlrrxxl.exe 104 PID 2180 wrote to memory of 2504 2180 btnhhh.exe 105 PID 2180 wrote to memory of 2504 2180 btnhhh.exe 105 PID 2180 wrote to memory of 2504 2180 btnhhh.exe 105 PID 2504 wrote to memory of 4220 2504 8666442.exe 106 PID 2504 wrote to memory of 4220 2504 8666442.exe 106 PID 2504 wrote to memory of 4220 2504 8666442.exe 106 PID 4220 wrote to memory of 2756 4220 6448604.exe 138 PID 4220 wrote to memory of 2756 4220 6448604.exe 138 PID 4220 wrote to memory of 2756 4220 6448604.exe 138 PID 2756 wrote to memory of 4472 2756 jdjdp.exe 108 PID 2756 wrote to memory of 4472 2756 jdjdp.exe 108 PID 2756 wrote to memory of 4472 2756 jdjdp.exe 108 PID 4472 wrote to memory of 3352 4472 dpjdd.exe 109 PID 4472 wrote to memory of 3352 4472 dpjdd.exe 109 PID 4472 wrote to memory of 3352 4472 dpjdd.exe 109 PID 3352 wrote to memory of 2056 3352 vdjdv.exe 110 PID 3352 wrote to memory of 2056 3352 vdjdv.exe 110 PID 3352 wrote to memory of 2056 3352 vdjdv.exe 110 PID 2056 wrote to memory of 2036 2056 46282.exe 111 PID 2056 wrote to memory of 2036 2056 46282.exe 111 PID 2056 wrote to memory of 2036 2056 46282.exe 111 PID 2036 wrote to memory of 4804 2036 2608446.exe 112 PID 2036 wrote to memory of 4804 2036 2608446.exe 112 PID 2036 wrote to memory of 4804 2036 2608446.exe 112 PID 4804 wrote to memory of 5084 4804 m4426.exe 113 PID 4804 wrote to memory of 5084 4804 m4426.exe 113 PID 4804 wrote to memory of 5084 4804 m4426.exe 113 PID 5084 wrote to memory of 2268 5084 lxxrlfx.exe 114 PID 5084 wrote to memory of 2268 5084 lxxrlfx.exe 114 PID 5084 wrote to memory of 2268 5084 lxxrlfx.exe 114 PID 2268 wrote to memory of 4448 2268 vvppj.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\472bd330bb99ac58fdf6b770c0a568d0N.exe"C:\Users\Admin\AppData\Local\Temp\472bd330bb99ac58fdf6b770c0a568d0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
\??\c:\jdvpv.exec:\jdvpv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\fxlfxrl.exec:\fxlfxrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
\??\c:\hntnbb.exec:\hntnbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\u882626.exec:\u882626.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\880668.exec:\880668.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\40620.exec:\40620.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\ntnhbt.exec:\ntnhbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\86688.exec:\86688.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\vdvpj.exec:\vdvpj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\rlrrxxl.exec:\rlrrxxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
\??\c:\btnhhh.exec:\btnhhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\8666442.exec:\8666442.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\6448604.exec:\6448604.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
\??\c:\jdjdp.exec:\jdjdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\dpjdd.exec:\dpjdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\vdjdv.exec:\vdjdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\46282.exec:\46282.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\2608446.exec:\2608446.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
\??\c:\m4426.exec:\m4426.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\vvppj.exec:\vvppj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\3bhbnt.exec:\3bhbnt.exe23⤵
- Executes dropped EXE
PID:4448 -
\??\c:\pdvvp.exec:\pdvvp.exe24⤵
- Executes dropped EXE
PID:1560 -
\??\c:\1hbnbt.exec:\1hbnbt.exe25⤵
- Executes dropped EXE
PID:3784 -
\??\c:\8862288.exec:\8862288.exe26⤵
- Executes dropped EXE
PID:2216 -
\??\c:\26420.exec:\26420.exe27⤵
- Executes dropped EXE
PID:4584 -
\??\c:\60084.exec:\60084.exe28⤵
- Executes dropped EXE
PID:2732 -
\??\c:\7tbthb.exec:\7tbthb.exe29⤵
- Executes dropped EXE
PID:3000 -
\??\c:\86400.exec:\86400.exe30⤵
- Executes dropped EXE
PID:3372 -
\??\c:\5fxrlfr.exec:\5fxrlfr.exe31⤵
- Executes dropped EXE
PID:1932 -
\??\c:\hhnbnn.exec:\hhnbnn.exe32⤵
- Executes dropped EXE
PID:2368 -
\??\c:\tbthtn.exec:\tbthtn.exe33⤵
- Executes dropped EXE
PID:4516 -
\??\c:\228260.exec:\228260.exe34⤵
- Executes dropped EXE
PID:3308 -
\??\c:\rlrlrlr.exec:\rlrlrlr.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3896 -
\??\c:\204464.exec:\204464.exe36⤵
- Executes dropped EXE
PID:4276 -
\??\c:\046640.exec:\046640.exe37⤵
- Executes dropped EXE
PID:880 -
\??\c:\k68222.exec:\k68222.exe38⤵
- Executes dropped EXE
PID:4920 -
\??\c:\tnnnhh.exec:\tnnnhh.exe39⤵
- Executes dropped EXE
PID:2252 -
\??\c:\w40488.exec:\w40488.exe40⤵
- Executes dropped EXE
PID:3544 -
\??\c:\nbthbb.exec:\nbthbb.exe41⤵
- Executes dropped EXE
PID:3924 -
\??\c:\2400000.exec:\2400000.exe42⤵
- Executes dropped EXE
PID:1692 -
\??\c:\o684804.exec:\o684804.exe43⤵
- Executes dropped EXE
PID:3396 -
\??\c:\bbtbth.exec:\bbtbth.exe44⤵
- Executes dropped EXE
PID:2092 -
\??\c:\02886.exec:\02886.exe45⤵
- Executes dropped EXE
PID:1248 -
\??\c:\680600.exec:\680600.exe46⤵
- Executes dropped EXE
PID:2756 -
\??\c:\084260.exec:\084260.exe47⤵
- Executes dropped EXE
PID:3992 -
\??\c:\nhnhnb.exec:\nhnhnb.exe48⤵
- Executes dropped EXE
PID:1892 -
\??\c:\6288226.exec:\6288226.exe49⤵
- Executes dropped EXE
PID:4056 -
\??\c:\486060.exec:\486060.exe50⤵
- Executes dropped EXE
PID:4052 -
\??\c:\2006022.exec:\2006022.exe51⤵
- Executes dropped EXE
PID:4332 -
\??\c:\hntbtt.exec:\hntbtt.exe52⤵
- Executes dropped EXE
PID:3340 -
\??\c:\xxrrxxf.exec:\xxrrxxf.exe53⤵
- Executes dropped EXE
PID:4532 -
\??\c:\rfrlxxf.exec:\rfrlxxf.exe54⤵
- Executes dropped EXE
PID:3652 -
\??\c:\8040262.exec:\8040262.exe55⤵
- Executes dropped EXE
PID:4884 -
\??\c:\6682644.exec:\6682644.exe56⤵
- Executes dropped EXE
PID:3720 -
\??\c:\nbhbtn.exec:\nbhbtn.exe57⤵
- Executes dropped EXE
PID:1500 -
\??\c:\ddvjp.exec:\ddvjp.exe58⤵
- Executes dropped EXE
PID:1208 -
\??\c:\6288660.exec:\6288660.exe59⤵
- Executes dropped EXE
PID:2628 -
\??\c:\6806000.exec:\6806000.exe60⤵
- Executes dropped EXE
PID:2188 -
\??\c:\6848660.exec:\6848660.exe61⤵
- Executes dropped EXE
PID:1932 -
\??\c:\842644.exec:\842644.exe62⤵
- Executes dropped EXE
PID:668 -
\??\c:\02600.exec:\02600.exe63⤵
- Executes dropped EXE
PID:4516 -
\??\c:\0262886.exec:\0262886.exe64⤵
- Executes dropped EXE
PID:3788 -
\??\c:\46062.exec:\46062.exe65⤵
- Executes dropped EXE
PID:5056 -
\??\c:\fffxxxx.exec:\fffxxxx.exe66⤵PID:4076
-
\??\c:\84620.exec:\84620.exe67⤵PID:4400
-
\??\c:\6004882.exec:\6004882.exe68⤵PID:4072
-
\??\c:\3rrllfx.exec:\3rrllfx.exe69⤵PID:3544
-
\??\c:\2048222.exec:\2048222.exe70⤵PID:4376
-
\??\c:\s8082.exec:\s8082.exe71⤵PID:4160
-
\??\c:\pjppv.exec:\pjppv.exe72⤵PID:1104
-
\??\c:\xlxrlrr.exec:\xlxrlrr.exe73⤵PID:416
-
\??\c:\4244884.exec:\4244884.exe74⤵PID:3096
-
\??\c:\888442.exec:\888442.exe75⤵PID:2856
-
\??\c:\5dpjj.exec:\5dpjj.exe76⤵PID:3056
-
\??\c:\42862.exec:\42862.exe77⤵PID:3240
-
\??\c:\9xrlxxl.exec:\9xrlxxl.exe78⤵PID:3016
-
\??\c:\pddvv.exec:\pddvv.exe79⤵PID:2544
-
\??\c:\vppjj.exec:\vppjj.exe80⤵PID:3540
-
\??\c:\m6648.exec:\m6648.exe81⤵PID:4084
-
\??\c:\rffrfrf.exec:\rffrfrf.exe82⤵PID:2288
-
\??\c:\c664820.exec:\c664820.exe83⤵PID:1968
-
\??\c:\4440408.exec:\4440408.exe84⤵PID:2852
-
\??\c:\flxllxf.exec:\flxllxf.exe85⤵PID:4860
-
\??\c:\24486.exec:\24486.exe86⤵PID:888
-
\??\c:\ppvdv.exec:\ppvdv.exe87⤵PID:3652
-
\??\c:\826426.exec:\826426.exe88⤵PID:2216
-
\??\c:\lxxlfxl.exec:\lxxlfxl.exe89⤵PID:780
-
\??\c:\hbbthb.exec:\hbbthb.exe90⤵PID:3020
-
\??\c:\lxlxxrr.exec:\lxlxxrr.exe91⤵PID:3000
-
\??\c:\nbbthh.exec:\nbbthh.exe92⤵PID:1220
-
\??\c:\frxlflx.exec:\frxlflx.exe93⤵PID:4544
-
\??\c:\0020424.exec:\0020424.exe94⤵PID:668
-
\??\c:\66260.exec:\66260.exe95⤵PID:3520
-
\??\c:\40228.exec:\40228.exe96⤵PID:880
-
\??\c:\jvvjv.exec:\jvvjv.exe97⤵PID:4916
-
\??\c:\xflxlfx.exec:\xflxlfx.exe98⤵PID:2392
-
\??\c:\2882648.exec:\2882648.exe99⤵PID:5096
-
\??\c:\dvvpp.exec:\dvvpp.exe100⤵PID:5012
-
\??\c:\6860448.exec:\6860448.exe101⤵PID:3756
-
\??\c:\068200.exec:\068200.exe102⤵PID:2092
-
\??\c:\q86488.exec:\q86488.exe103⤵PID:392
-
\??\c:\2026048.exec:\2026048.exe104⤵PID:4828
-
\??\c:\llxfxlf.exec:\llxfxlf.exe105⤵PID:4976
-
\??\c:\rrlxrlf.exec:\rrlxrlf.exe106⤵PID:3188
-
\??\c:\dppvv.exec:\dppvv.exe107⤵PID:1892
-
\??\c:\hhnnhh.exec:\hhnnhh.exe108⤵PID:2232
-
\??\c:\446222.exec:\446222.exe109⤵PID:2088
-
\??\c:\1tnhhh.exec:\1tnhhh.exe110⤵PID:4084
-
\??\c:\rlrlffl.exec:\rlrlffl.exe111⤵PID:3744
-
\??\c:\8286604.exec:\8286604.exe112⤵PID:436
-
\??\c:\xrrllll.exec:\xrrllll.exe113⤵PID:4332
-
\??\c:\c464888.exec:\c464888.exe114⤵PID:1560
-
\??\c:\dvjjj.exec:\dvjjj.exe115⤵PID:3596
-
\??\c:\xflffxx.exec:\xflffxx.exe116⤵PID:1740
-
\??\c:\5pjjd.exec:\5pjjd.exe117⤵PID:1500
-
\??\c:\7nbtbb.exec:\7nbtbb.exe118⤵PID:2732
-
\??\c:\xfxlfxr.exec:\xfxlfxr.exe119⤵PID:2316
-
\??\c:\440444.exec:\440444.exe120⤵PID:1528
-
\??\c:\080048.exec:\080048.exe121⤵PID:3308
-
\??\c:\vdvpj.exec:\vdvpj.exe122⤵PID:4980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-