Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 02:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
089d461b37fd8382b3214b7c6bc011b0N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
089d461b37fd8382b3214b7c6bc011b0N.exe
-
Size
64KB
-
MD5
089d461b37fd8382b3214b7c6bc011b0
-
SHA1
1809bc045b06c5149530576ffd8843d20a87b17d
-
SHA256
b040e91da0a0d0001c459cf5d112ccb4d0aa1d43764de2bcedca92cc69e6a7e8
-
SHA512
31c8cde993ab775efc03d007e2b71dcea1abbfd249741c99e6dc39912c54ac9d49923c9ef49b76d8f2d346c87d776b6005fc33aa0a25d132e96af2c79fbd0034
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxe:ymb3NkkiQ3mdBjF0y7kbI
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/4628-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4828-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4404-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4404-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5036-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1468-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/436-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/64-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3716-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2204-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1044-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4980-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1720-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1776-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3448-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3264-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1792-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2844-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4952 rfffxxx.exe 4828 bhtbtn.exe 4404 1djdd.exe 5036 vdjvj.exe 436 hbbttt.exe 1468 jdpdv.exe 64 fxlxlrl.exe 3716 tnhbtt.exe 3628 tttnbt.exe 2204 djjjj.exe 2888 1xffxxx.exe 1044 bnbbhh.exe 4324 hbhhhb.exe 4620 pjjdv.exe 2808 ppvjd.exe 4980 lxfxrfx.exe 5016 xffxrlf.exe 732 tnhhbb.exe 1720 pjjdv.exe 1776 3ddvj.exe 3448 rrxxxxf.exe 1648 7hhhbb.exe 3264 dvpjv.exe 552 lflllfl.exe 208 rlxxrfr.exe 3960 9hbnbt.exe 1792 jdpjj.exe 4556 fxffffl.exe 2844 ffffxrl.exe 2148 ppvvd.exe 4300 vvvvp.exe 1100 lrlrxxf.exe 4804 rxxlxlr.exe 2748 btbbhn.exe 1388 dvvvj.exe 2932 jvvvp.exe 4588 jdjdd.exe 4280 xfxxxlx.exe 1572 ttbtnn.exe 3864 5nbtnh.exe 2260 nhhnnh.exe 64 jvpjd.exe 952 vpjdd.exe 1664 lfxrfxx.exe 4332 rxffrrl.exe 2288 1nbhtn.exe 1380 tntbnb.exe 3616 vdpvp.exe 1708 lrxfxxx.exe 4296 fflffxx.exe 4736 hbbttt.exe 2536 hhhbtt.exe 2024 5jjvp.exe 212 1jjjv.exe 3916 1ddpd.exe 4464 lxxrrrr.exe 1464 lxxxrxr.exe 4072 hbbbbb.exe 1724 dvdvv.exe 4960 9pjdj.exe 3076 djjjd.exe 3264 7fflxxx.exe 552 lxrlrlf.exe 3104 hhbthb.exe -
resource yara_rule behavioral2/memory/4628-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4828-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4404-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4404-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5036-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1468-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/64-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3716-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3716-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2204-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2204-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2204-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2204-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1044-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4980-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1720-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1776-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3448-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3264-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1792-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4556-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2844-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5btnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrlfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrlfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rllxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4952 4628 089d461b37fd8382b3214b7c6bc011b0N.exe 85 PID 4628 wrote to memory of 4952 4628 089d461b37fd8382b3214b7c6bc011b0N.exe 85 PID 4628 wrote to memory of 4952 4628 089d461b37fd8382b3214b7c6bc011b0N.exe 85 PID 4952 wrote to memory of 4828 4952 rfffxxx.exe 86 PID 4952 wrote to memory of 4828 4952 rfffxxx.exe 86 PID 4952 wrote to memory of 4828 4952 rfffxxx.exe 86 PID 4828 wrote to memory of 4404 4828 bhtbtn.exe 87 PID 4828 wrote to memory of 4404 4828 bhtbtn.exe 87 PID 4828 wrote to memory of 4404 4828 bhtbtn.exe 87 PID 4404 wrote to memory of 5036 4404 1djdd.exe 88 PID 4404 wrote to memory of 5036 4404 1djdd.exe 88 PID 4404 wrote to memory of 5036 4404 1djdd.exe 88 PID 5036 wrote to memory of 436 5036 vdjvj.exe 89 PID 5036 wrote to memory of 436 5036 vdjvj.exe 89 PID 5036 wrote to memory of 436 5036 vdjvj.exe 89 PID 436 wrote to memory of 1468 436 hbbttt.exe 90 PID 436 wrote to memory of 1468 436 hbbttt.exe 90 PID 436 wrote to memory of 1468 436 hbbttt.exe 90 PID 1468 wrote to memory of 64 1468 jdpdv.exe 91 PID 1468 wrote to memory of 64 1468 jdpdv.exe 91 PID 1468 wrote to memory of 64 1468 jdpdv.exe 91 PID 64 wrote to memory of 3716 64 fxlxlrl.exe 92 PID 64 wrote to memory of 3716 64 fxlxlrl.exe 92 PID 64 wrote to memory of 3716 64 fxlxlrl.exe 92 PID 3716 wrote to memory of 3628 3716 tnhbtt.exe 93 PID 3716 wrote to memory of 3628 3716 tnhbtt.exe 93 PID 3716 wrote to memory of 3628 3716 tnhbtt.exe 93 PID 3628 wrote to memory of 2204 3628 tttnbt.exe 94 PID 3628 wrote to memory of 2204 3628 tttnbt.exe 94 PID 3628 wrote to memory of 2204 3628 tttnbt.exe 94 PID 2204 wrote to memory of 2888 2204 djjjj.exe 95 PID 2204 wrote to memory of 2888 2204 djjjj.exe 95 PID 2204 wrote to memory of 2888 2204 djjjj.exe 95 PID 2888 wrote to memory of 1044 2888 1xffxxx.exe 96 PID 2888 wrote to memory of 1044 2888 1xffxxx.exe 96 PID 2888 wrote to memory of 1044 2888 1xffxxx.exe 96 PID 1044 wrote to memory of 4324 1044 bnbbhh.exe 97 PID 1044 wrote to memory of 4324 1044 bnbbhh.exe 97 PID 1044 wrote to memory of 4324 1044 bnbbhh.exe 97 PID 4324 wrote to memory of 4620 4324 hbhhhb.exe 98 PID 4324 wrote to memory of 4620 4324 hbhhhb.exe 98 PID 4324 wrote to memory of 4620 4324 hbhhhb.exe 98 PID 4620 wrote to memory of 2808 4620 pjjdv.exe 99 PID 4620 wrote to memory of 2808 4620 pjjdv.exe 99 PID 4620 wrote to memory of 2808 4620 pjjdv.exe 99 PID 2808 wrote to memory of 4980 2808 ppvjd.exe 100 PID 2808 wrote to memory of 4980 2808 ppvjd.exe 100 PID 2808 wrote to memory of 4980 2808 ppvjd.exe 100 PID 4980 wrote to memory of 5016 4980 lxfxrfx.exe 101 PID 4980 wrote to memory of 5016 4980 lxfxrfx.exe 101 PID 4980 wrote to memory of 5016 4980 lxfxrfx.exe 101 PID 5016 wrote to memory of 732 5016 xffxrlf.exe 102 PID 5016 wrote to memory of 732 5016 xffxrlf.exe 102 PID 5016 wrote to memory of 732 5016 xffxrlf.exe 102 PID 732 wrote to memory of 1720 732 tnhhbb.exe 103 PID 732 wrote to memory of 1720 732 tnhhbb.exe 103 PID 732 wrote to memory of 1720 732 tnhhbb.exe 103 PID 1720 wrote to memory of 1776 1720 pjjdv.exe 104 PID 1720 wrote to memory of 1776 1720 pjjdv.exe 104 PID 1720 wrote to memory of 1776 1720 pjjdv.exe 104 PID 1776 wrote to memory of 3448 1776 3ddvj.exe 106 PID 1776 wrote to memory of 3448 1776 3ddvj.exe 106 PID 1776 wrote to memory of 3448 1776 3ddvj.exe 106 PID 3448 wrote to memory of 1648 3448 rrxxxxf.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\089d461b37fd8382b3214b7c6bc011b0N.exe"C:\Users\Admin\AppData\Local\Temp\089d461b37fd8382b3214b7c6bc011b0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\rfffxxx.exec:\rfffxxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\bhtbtn.exec:\bhtbtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\1djdd.exec:\1djdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\vdjvj.exec:\vdjvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5036 -
\??\c:\hbbttt.exec:\hbbttt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
\??\c:\jdpdv.exec:\jdpdv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
\??\c:\fxlxlrl.exec:\fxlxlrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\tnhbtt.exec:\tnhbtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
\??\c:\tttnbt.exec:\tttnbt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\djjjj.exec:\djjjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\1xffxxx.exec:\1xffxxx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\bnbbhh.exec:\bnbbhh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\hbhhhb.exec:\hbhhhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\pjjdv.exec:\pjjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\ppvjd.exec:\ppvjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\lxfxrfx.exec:\lxfxrfx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\xffxrlf.exec:\xffxrlf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\tnhhbb.exec:\tnhhbb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
\??\c:\pjjdv.exec:\pjjdv.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\3ddvj.exec:\3ddvj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\rrxxxxf.exec:\rrxxxxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
\??\c:\7hhhbb.exec:\7hhhbb.exe23⤵
- Executes dropped EXE
PID:1648 -
\??\c:\dvpjv.exec:\dvpjv.exe24⤵
- Executes dropped EXE
PID:3264 -
\??\c:\lflllfl.exec:\lflllfl.exe25⤵
- Executes dropped EXE
PID:552 -
\??\c:\rlxxrfr.exec:\rlxxrfr.exe26⤵
- Executes dropped EXE
PID:208 -
\??\c:\9hbnbt.exec:\9hbnbt.exe27⤵
- Executes dropped EXE
PID:3960 -
\??\c:\jdpjj.exec:\jdpjj.exe28⤵
- Executes dropped EXE
PID:1792 -
\??\c:\fxffffl.exec:\fxffffl.exe29⤵
- Executes dropped EXE
PID:4556 -
\??\c:\ffffxrl.exec:\ffffxrl.exe30⤵
- Executes dropped EXE
PID:2844 -
\??\c:\ppvvd.exec:\ppvvd.exe31⤵
- Executes dropped EXE
PID:2148 -
\??\c:\vvvvp.exec:\vvvvp.exe32⤵
- Executes dropped EXE
PID:4300 -
\??\c:\lrlrxxf.exec:\lrlrxxf.exe33⤵
- Executes dropped EXE
PID:1100 -
\??\c:\rxxlxlr.exec:\rxxlxlr.exe34⤵
- Executes dropped EXE
PID:4804 -
\??\c:\btbbhn.exec:\btbbhn.exe35⤵
- Executes dropped EXE
PID:2748 -
\??\c:\dvvvj.exec:\dvvvj.exe36⤵
- Executes dropped EXE
PID:1388 -
\??\c:\jvvvp.exec:\jvvvp.exe37⤵
- Executes dropped EXE
PID:2932 -
\??\c:\jdjdd.exec:\jdjdd.exe38⤵
- Executes dropped EXE
PID:4588 -
\??\c:\xfxxxlx.exec:\xfxxxlx.exe39⤵
- Executes dropped EXE
PID:4280 -
\??\c:\ttbtnn.exec:\ttbtnn.exe40⤵
- Executes dropped EXE
PID:1572 -
\??\c:\5nbtnh.exec:\5nbtnh.exe41⤵
- Executes dropped EXE
PID:3864 -
\??\c:\nhhnnh.exec:\nhhnnh.exe42⤵
- Executes dropped EXE
PID:2260 -
\??\c:\jvpjd.exec:\jvpjd.exe43⤵
- Executes dropped EXE
PID:64 -
\??\c:\vpjdd.exec:\vpjdd.exe44⤵
- Executes dropped EXE
PID:952 -
\??\c:\lfxrfxx.exec:\lfxrfxx.exe45⤵
- Executes dropped EXE
PID:1664 -
\??\c:\rxffrrl.exec:\rxffrrl.exe46⤵
- Executes dropped EXE
PID:4332 -
\??\c:\1nbhtn.exec:\1nbhtn.exe47⤵
- Executes dropped EXE
PID:2288 -
\??\c:\tntbnb.exec:\tntbnb.exe48⤵
- Executes dropped EXE
PID:1380 -
\??\c:\vdpvp.exec:\vdpvp.exe49⤵
- Executes dropped EXE
PID:3616 -
\??\c:\lrxfxxx.exec:\lrxfxxx.exe50⤵
- Executes dropped EXE
PID:1708 -
\??\c:\fflffxx.exec:\fflffxx.exe51⤵
- Executes dropped EXE
PID:4296 -
\??\c:\hbbttt.exec:\hbbttt.exe52⤵
- Executes dropped EXE
PID:4736 -
\??\c:\hhhbtt.exec:\hhhbtt.exe53⤵
- Executes dropped EXE
PID:2536 -
\??\c:\5jjvp.exec:\5jjvp.exe54⤵
- Executes dropped EXE
PID:2024 -
\??\c:\1jjjv.exec:\1jjjv.exe55⤵
- Executes dropped EXE
PID:212 -
\??\c:\1ddpd.exec:\1ddpd.exe56⤵
- Executes dropped EXE
PID:3916 -
\??\c:\lxxrrrr.exec:\lxxrrrr.exe57⤵
- Executes dropped EXE
PID:4464 -
\??\c:\lxxxrxr.exec:\lxxxrxr.exe58⤵
- Executes dropped EXE
PID:1464 -
\??\c:\hbbbbb.exec:\hbbbbb.exe59⤵
- Executes dropped EXE
PID:4072 -
\??\c:\dvdvv.exec:\dvdvv.exe60⤵
- Executes dropped EXE
PID:1724 -
\??\c:\9pjdj.exec:\9pjdj.exe61⤵
- Executes dropped EXE
PID:4960 -
\??\c:\djjjd.exec:\djjjd.exe62⤵
- Executes dropped EXE
PID:3076 -
\??\c:\7fflxxx.exec:\7fflxxx.exe63⤵
- Executes dropped EXE
PID:3264 -
\??\c:\lxrlrlf.exec:\lxrlrlf.exe64⤵
- Executes dropped EXE
PID:552 -
\??\c:\hhbthb.exec:\hhbthb.exe65⤵
- Executes dropped EXE
PID:3104 -
\??\c:\vjvdp.exec:\vjvdp.exe66⤵PID:3528
-
\??\c:\pjjvj.exec:\pjjvj.exe67⤵PID:3960
-
\??\c:\jpjjd.exec:\jpjjd.exe68⤵PID:1792
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe69⤵PID:4136
-
\??\c:\hnhhhb.exec:\hnhhhb.exe70⤵PID:3108
-
\??\c:\pvdvj.exec:\pvdvj.exe71⤵PID:1816
-
\??\c:\dddpj.exec:\dddpj.exe72⤵PID:1088
-
\??\c:\9llxxrx.exec:\9llxxrx.exe73⤵PID:2336
-
\??\c:\frflllf.exec:\frflllf.exe74⤵PID:4632
-
\??\c:\bnnntt.exec:\bnnntt.exe75⤵PID:4300
-
\??\c:\nbnbnh.exec:\nbnbnh.exe76⤵PID:2444
-
\??\c:\djppj.exec:\djppj.exe77⤵PID:1020
-
\??\c:\dpddd.exec:\dpddd.exe78⤵PID:4996
-
\??\c:\fxlfllr.exec:\fxlfllr.exe79⤵PID:4336
-
\??\c:\xfrlfxx.exec:\xfrlfxx.exe80⤵PID:840
-
\??\c:\ffxrrfx.exec:\ffxrrfx.exe81⤵PID:3516
-
\??\c:\hhhnhn.exec:\hhhnhn.exe82⤵PID:4588
-
\??\c:\nthtnh.exec:\nthtnh.exe83⤵PID:5048
-
\??\c:\vjdpp.exec:\vjdpp.exe84⤵PID:808
-
\??\c:\fxrlffx.exec:\fxrlffx.exe85⤵PID:3260
-
\??\c:\fllfxxf.exec:\fllfxxf.exe86⤵PID:3904
-
\??\c:\xrrrllf.exec:\xrrrllf.exe87⤵PID:4260
-
\??\c:\tnbttt.exec:\tnbttt.exe88⤵PID:3316
-
\??\c:\jjvpj.exec:\jjvpj.exe89⤵PID:1472
-
\??\c:\vdjdv.exec:\vdjdv.exe90⤵PID:2816
-
\??\c:\xxffrrl.exec:\xxffrrl.exe91⤵PID:4472
-
\??\c:\nhnnhb.exec:\nhnnhb.exe92⤵PID:3276
-
\??\c:\vdvpj.exec:\vdvpj.exe93⤵PID:4728
-
\??\c:\pjpjj.exec:\pjpjj.exe94⤵PID:2908
-
\??\c:\fxxrlll.exec:\fxxrlll.exe95⤵PID:1948
-
\??\c:\rfffxxr.exec:\rfffxxr.exe96⤵PID:4068
-
\??\c:\thhhbb.exec:\thhhbb.exe97⤵PID:4420
-
\??\c:\thntnn.exec:\thntnn.exe98⤵PID:5088
-
\??\c:\dppjj.exec:\dppjj.exe99⤵PID:2024
-
\??\c:\dpvvp.exec:\dpvvp.exe100⤵PID:220
-
\??\c:\rxflrrx.exec:\rxflrrx.exe101⤵PID:1516
-
\??\c:\rxxrlll.exec:\rxxrlll.exe102⤵PID:3772
-
\??\c:\5tnnbb.exec:\5tnnbb.exe103⤵PID:3128
-
\??\c:\bbbbnb.exec:\bbbbnb.exe104⤵PID:2020
-
\??\c:\ddjjp.exec:\ddjjp.exe105⤵PID:3448
-
\??\c:\9jpjd.exec:\9jpjd.exe106⤵PID:1200
-
\??\c:\fxfxllf.exec:\fxfxllf.exe107⤵PID:3076
-
\??\c:\btnhhn.exec:\btnhhn.exe108⤵PID:3264
-
\??\c:\3btthh.exec:\3btthh.exe109⤵PID:552
-
\??\c:\jdvpj.exec:\jdvpj.exe110⤵PID:4344
-
\??\c:\dvvvp.exec:\dvvvp.exe111⤵PID:5008
-
\??\c:\rxfxxxx.exec:\rxfxxxx.exe112⤵PID:3960
-
\??\c:\flrrllf.exec:\flrrllf.exe113⤵PID:1792
-
\??\c:\nthhhh.exec:\nthhhh.exe114⤵PID:1484
-
\??\c:\hnnnnn.exec:\hnnnnn.exe115⤵PID:2372
-
\??\c:\3dpdj.exec:\3dpdj.exe116⤵PID:2660
-
\??\c:\dvddv.exec:\dvddv.exe117⤵PID:1816
-
\??\c:\xlrlflf.exec:\xlrlflf.exe118⤵PID:4460
-
\??\c:\ntbtnn.exec:\ntbtnn.exe119⤵PID:1960
-
\??\c:\ntbbtt.exec:\ntbbtt.exe120⤵PID:4632
-
\??\c:\dvpvj.exec:\dvpvj.exe121⤵PID:4300
-
\??\c:\vvdvp.exec:\vvdvp.exe122⤵PID:4804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-