Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 23:10 UTC
Static task
static1
Behavioral task
behavioral1
Sample
7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe
Resource
win7-20240903-en
General
-
Target
7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe
-
Size
82KB
-
MD5
0321db85b2e98db7f8c799fc1da15fce
-
SHA1
4df5c51ead9f140bbf826a83a07d09686b136110
-
SHA256
7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac
-
SHA512
e3ff7a9356f87faf78aa6910d7230829036a212ab9189c6cfb6119443425fd41ba52a5d39326140f845716731b89be4f3d824fe808c9c22ed4b3c894abde49bc
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QP:ymb3NkkiQ3mdBjFIIp9L9QrrA8Y
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2904-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4780-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3696-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4720-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5084-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4472-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/320-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/320-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3520-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1196-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4444-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1376-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1680-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2276-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2280-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4240-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2868-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1564-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4316-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1720-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2904 ppvpp.exe 1796 xxxxxfx.exe 3696 fxffllx.exe 4720 rfrlfrl.exe 5084 9tnhhh.exe 2028 tbbtbt.exe 1336 rlrrrfl.exe 4472 3rxxrxr.exe 320 jvddd.exe 2908 3fxrxxx.exe 3520 7jpvv.exe 840 1xrlffx.exe 1196 ntbbtt.exe 4444 dvdvp.exe 1376 vdddd.exe 1680 xrllfxx.exe 2276 btthbn.exe 2280 jddjp.exe 4240 1lffxrr.exe 4828 bbbhhn.exe 2868 9pvpj.exe 1948 vvppj.exe 3808 xxfxrlf.exe 1564 hhhhtt.exe 1568 nbnnhn.exe 1428 dvpjv.exe 4488 dddvp.exe 2816 llrrflf.exe 4316 tbnbbb.exe 1720 jpjpd.exe 1976 lxxrrxl.exe 2384 fxxxlrr.exe 2984 ddvdj.exe 3296 jvdjd.exe 4196 lxfxlxx.exe 2700 bthhtt.exe 4676 vvjjp.exe 996 1vdpp.exe 740 9rxrlll.exe 952 tbhtbn.exe 4688 tbtbtb.exe 1404 ppppp.exe 4972 ddvjp.exe 880 rxxrllf.exe 5024 xrrrrrr.exe 3444 3hbbbb.exe 4820 hntttt.exe 2908 vvjjv.exe 1960 jpddd.exe 4956 rfflfll.exe 3316 9rrrllf.exe 3260 tbnnnb.exe 896 htnhtt.exe 2856 dpppd.exe 3208 jjjdd.exe 2840 rrfxrff.exe 4516 9nnnhn.exe 2276 hbtttt.exe 2652 djjjv.exe 976 pvppd.exe 2852 lflfffl.exe 3732 frrrlff.exe 2044 hhnnnn.exe 2444 vppvd.exe -
resource yara_rule behavioral2/memory/4780-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2904-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4780-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3696-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4720-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5084-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/320-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/320-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/320-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2908-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2908-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3520-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1196-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4444-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1376-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1680-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2276-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2280-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4240-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2868-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1564-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4316-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1720-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lllxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thhtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7vdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2904 4780 7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe 83 PID 4780 wrote to memory of 2904 4780 7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe 83 PID 4780 wrote to memory of 2904 4780 7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe 83 PID 2904 wrote to memory of 1796 2904 ppvpp.exe 84 PID 2904 wrote to memory of 1796 2904 ppvpp.exe 84 PID 2904 wrote to memory of 1796 2904 ppvpp.exe 84 PID 1796 wrote to memory of 3696 1796 xxxxxfx.exe 85 PID 1796 wrote to memory of 3696 1796 xxxxxfx.exe 85 PID 1796 wrote to memory of 3696 1796 xxxxxfx.exe 85 PID 3696 wrote to memory of 4720 3696 fxffllx.exe 86 PID 3696 wrote to memory of 4720 3696 fxffllx.exe 86 PID 3696 wrote to memory of 4720 3696 fxffllx.exe 86 PID 4720 wrote to memory of 5084 4720 rfrlfrl.exe 87 PID 4720 wrote to memory of 5084 4720 rfrlfrl.exe 87 PID 4720 wrote to memory of 5084 4720 rfrlfrl.exe 87 PID 5084 wrote to memory of 2028 5084 9tnhhh.exe 89 PID 5084 wrote to memory of 2028 5084 9tnhhh.exe 89 PID 5084 wrote to memory of 2028 5084 9tnhhh.exe 89 PID 2028 wrote to memory of 1336 2028 tbbtbt.exe 90 PID 2028 wrote to memory of 1336 2028 tbbtbt.exe 90 PID 2028 wrote to memory of 1336 2028 tbbtbt.exe 90 PID 1336 wrote to memory of 4472 1336 rlrrrfl.exe 91 PID 1336 wrote to memory of 4472 1336 rlrrrfl.exe 91 PID 1336 wrote to memory of 4472 1336 rlrrrfl.exe 91 PID 4472 wrote to memory of 320 4472 3rxxrxr.exe 92 PID 4472 wrote to memory of 320 4472 3rxxrxr.exe 92 PID 4472 wrote to memory of 320 4472 3rxxrxr.exe 92 PID 320 wrote to memory of 2908 320 jvddd.exe 93 PID 320 wrote to memory of 2908 320 jvddd.exe 93 PID 320 wrote to memory of 2908 320 jvddd.exe 93 PID 2908 wrote to memory of 3520 2908 3fxrxxx.exe 94 PID 2908 wrote to memory of 3520 2908 3fxrxxx.exe 94 PID 2908 wrote to memory of 3520 2908 3fxrxxx.exe 94 PID 3520 wrote to memory of 840 3520 7jpvv.exe 96 PID 3520 wrote to memory of 840 3520 7jpvv.exe 96 PID 3520 wrote to memory of 840 3520 7jpvv.exe 96 PID 840 wrote to memory of 1196 840 1xrlffx.exe 97 PID 840 wrote to memory of 1196 840 1xrlffx.exe 97 PID 840 wrote to memory of 1196 840 1xrlffx.exe 97 PID 1196 wrote to memory of 4444 1196 ntbbtt.exe 98 PID 1196 wrote to memory of 4444 1196 ntbbtt.exe 98 PID 1196 wrote to memory of 4444 1196 ntbbtt.exe 98 PID 4444 wrote to memory of 1376 4444 dvdvp.exe 99 PID 4444 wrote to memory of 1376 4444 dvdvp.exe 99 PID 4444 wrote to memory of 1376 4444 dvdvp.exe 99 PID 1376 wrote to memory of 1680 1376 vdddd.exe 100 PID 1376 wrote to memory of 1680 1376 vdddd.exe 100 PID 1376 wrote to memory of 1680 1376 vdddd.exe 100 PID 1680 wrote to memory of 2276 1680 xrllfxx.exe 101 PID 1680 wrote to memory of 2276 1680 xrllfxx.exe 101 PID 1680 wrote to memory of 2276 1680 xrllfxx.exe 101 PID 2276 wrote to memory of 2280 2276 btthbn.exe 103 PID 2276 wrote to memory of 2280 2276 btthbn.exe 103 PID 2276 wrote to memory of 2280 2276 btthbn.exe 103 PID 2280 wrote to memory of 4240 2280 jddjp.exe 104 PID 2280 wrote to memory of 4240 2280 jddjp.exe 104 PID 2280 wrote to memory of 4240 2280 jddjp.exe 104 PID 4240 wrote to memory of 4828 4240 1lffxrr.exe 105 PID 4240 wrote to memory of 4828 4240 1lffxrr.exe 105 PID 4240 wrote to memory of 4828 4240 1lffxrr.exe 105 PID 4828 wrote to memory of 2868 4828 bbbhhn.exe 106 PID 4828 wrote to memory of 2868 4828 bbbhhn.exe 106 PID 4828 wrote to memory of 2868 4828 bbbhhn.exe 106 PID 2868 wrote to memory of 1948 2868 9pvpj.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe"C:\Users\Admin\AppData\Local\Temp\7007ac6de02096b69a75fa2255f0e0f00d3b70c9d0c4122da2a3f81737cc9bac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
\??\c:\ppvpp.exec:\ppvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\xxxxxfx.exec:\xxxxxfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\fxffllx.exec:\fxffllx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
\??\c:\rfrlfrl.exec:\rfrlfrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
\??\c:\9tnhhh.exec:\9tnhhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\tbbtbt.exec:\tbbtbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\rlrrrfl.exec:\rlrrrfl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\3rxxrxr.exec:\3rxxrxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
\??\c:\jvddd.exec:\jvddd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
\??\c:\3fxrxxx.exec:\3fxrxxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\7jpvv.exec:\7jpvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\1xrlffx.exec:\1xrlffx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\ntbbtt.exec:\ntbbtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
\??\c:\dvdvp.exec:\dvdvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
\??\c:\vdddd.exec:\vdddd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
\??\c:\xrllfxx.exec:\xrllfxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\btthbn.exec:\btthbn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\jddjp.exec:\jddjp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\1lffxrr.exec:\1lffxrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\bbbhhn.exec:\bbbhhn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\9pvpj.exec:\9pvpj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\vvppj.exec:\vvppj.exe23⤵
- Executes dropped EXE
PID:1948 -
\??\c:\xxfxrlf.exec:\xxfxrlf.exe24⤵
- Executes dropped EXE
PID:3808 -
\??\c:\hhhhtt.exec:\hhhhtt.exe25⤵
- Executes dropped EXE
PID:1564 -
\??\c:\nbnnhn.exec:\nbnnhn.exe26⤵
- Executes dropped EXE
PID:1568 -
\??\c:\dvpjv.exec:\dvpjv.exe27⤵
- Executes dropped EXE
PID:1428 -
\??\c:\dddvp.exec:\dddvp.exe28⤵
- Executes dropped EXE
PID:4488 -
\??\c:\llrrflf.exec:\llrrflf.exe29⤵
- Executes dropped EXE
PID:2816 -
\??\c:\tbnbbb.exec:\tbnbbb.exe30⤵
- Executes dropped EXE
PID:4316 -
\??\c:\jpjpd.exec:\jpjpd.exe31⤵
- Executes dropped EXE
PID:1720 -
\??\c:\lxxrrxl.exec:\lxxrrxl.exe32⤵
- Executes dropped EXE
PID:1976 -
\??\c:\fxxxlrr.exec:\fxxxlrr.exe33⤵
- Executes dropped EXE
PID:2384 -
\??\c:\hbbhhh.exec:\hbbhhh.exe34⤵PID:4844
-
\??\c:\ddvdj.exec:\ddvdj.exe35⤵
- Executes dropped EXE
PID:2984 -
\??\c:\jvdjd.exec:\jvdjd.exe36⤵
- Executes dropped EXE
PID:3296 -
\??\c:\lxfxlxx.exec:\lxfxlxx.exe37⤵
- Executes dropped EXE
PID:4196 -
\??\c:\bthhtt.exec:\bthhtt.exe38⤵
- Executes dropped EXE
PID:2700 -
\??\c:\vvjjp.exec:\vvjjp.exe39⤵
- Executes dropped EXE
PID:4676 -
\??\c:\1vdpp.exec:\1vdpp.exe40⤵
- Executes dropped EXE
PID:996 -
\??\c:\9rxrlll.exec:\9rxrlll.exe41⤵
- Executes dropped EXE
PID:740 -
\??\c:\tbhtbn.exec:\tbhtbn.exe42⤵
- Executes dropped EXE
PID:952 -
\??\c:\tbtbtb.exec:\tbtbtb.exe43⤵
- Executes dropped EXE
PID:4688 -
\??\c:\ppppp.exec:\ppppp.exe44⤵
- Executes dropped EXE
PID:1404 -
\??\c:\ddvjp.exec:\ddvjp.exe45⤵
- Executes dropped EXE
PID:4972 -
\??\c:\rxxrllf.exec:\rxxrllf.exe46⤵
- Executes dropped EXE
PID:880 -
\??\c:\xrrrrrr.exec:\xrrrrrr.exe47⤵
- Executes dropped EXE
PID:5024 -
\??\c:\3hbbbb.exec:\3hbbbb.exe48⤵
- Executes dropped EXE
PID:3444 -
\??\c:\hntttt.exec:\hntttt.exe49⤵
- Executes dropped EXE
PID:4820 -
\??\c:\vvjjv.exec:\vvjjv.exe50⤵
- Executes dropped EXE
PID:2908 -
\??\c:\jpddd.exec:\jpddd.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960 -
\??\c:\rfflfll.exec:\rfflfll.exe52⤵
- Executes dropped EXE
PID:4956 -
\??\c:\9rrrllf.exec:\9rrrllf.exe53⤵
- Executes dropped EXE
PID:3316 -
\??\c:\tbnnnb.exec:\tbnnnb.exe54⤵
- Executes dropped EXE
PID:3260 -
\??\c:\htnhtt.exec:\htnhtt.exe55⤵
- Executes dropped EXE
PID:896 -
\??\c:\dpppd.exec:\dpppd.exe56⤵
- Executes dropped EXE
PID:2856 -
\??\c:\jjjdd.exec:\jjjdd.exe57⤵
- Executes dropped EXE
PID:3208 -
\??\c:\rrfxrff.exec:\rrfxrff.exe58⤵
- Executes dropped EXE
PID:2840 -
\??\c:\9nnnhn.exec:\9nnnhn.exe59⤵
- Executes dropped EXE
PID:4516 -
\??\c:\hbtttt.exec:\hbtttt.exe60⤵
- Executes dropped EXE
PID:2276 -
\??\c:\djjjv.exec:\djjjv.exe61⤵
- Executes dropped EXE
PID:2652 -
\??\c:\pvppd.exec:\pvppd.exe62⤵
- Executes dropped EXE
PID:976 -
\??\c:\lflfffl.exec:\lflfffl.exe63⤵
- Executes dropped EXE
PID:2852 -
\??\c:\frrrlff.exec:\frrrlff.exe64⤵
- Executes dropped EXE
PID:3732 -
\??\c:\hhnnnn.exec:\hhnnnn.exe65⤵
- Executes dropped EXE
PID:2044 -
\??\c:\vppvd.exec:\vppvd.exe66⤵
- Executes dropped EXE
PID:2444 -
\??\c:\jpppp.exec:\jpppp.exe67⤵PID:3624
-
\??\c:\jddvp.exec:\jddvp.exe68⤵PID:5104
-
\??\c:\xllfxxr.exec:\xllfxxr.exe69⤵PID:448
-
\??\c:\tttnhh.exec:\tttnhh.exe70⤵PID:8
-
\??\c:\nhhhtt.exec:\nhhhtt.exe71⤵PID:1400
-
\??\c:\vvjdj.exec:\vvjdj.exe72⤵PID:4272
-
\??\c:\jvpjj.exec:\jvpjj.exe73⤵PID:4556
-
\??\c:\xfllffr.exec:\xfllffr.exe74⤵PID:1968
-
\??\c:\xfxxrlx.exec:\xfxxrlx.exe75⤵PID:2332
-
\??\c:\btnnbb.exec:\btnnbb.exe76⤵PID:3176
-
\??\c:\ntttnn.exec:\ntttnn.exe77⤵PID:2736
-
\??\c:\dvpjj.exec:\dvpjj.exe78⤵PID:4008
-
\??\c:\dpjdj.exec:\dpjdj.exe79⤵PID:1560
-
\??\c:\5llflrr.exec:\5llflrr.exe80⤵PID:4256
-
\??\c:\bbthhn.exec:\bbthhn.exe81⤵PID:3104
-
\??\c:\tnbbhh.exec:\tnbbhh.exe82⤵PID:1760
-
\??\c:\djdjv.exec:\djdjv.exe83⤵PID:3804
-
\??\c:\lfllfff.exec:\lfllfff.exe84⤵PID:4720
-
\??\c:\rlxrrxx.exec:\rlxrrxx.exe85⤵PID:4348
-
\??\c:\hhhhhh.exec:\hhhhhh.exe86⤵PID:2676
-
\??\c:\ppvjd.exec:\ppvjd.exe87⤵PID:2516
-
\??\c:\vdppp.exec:\vdppp.exe88⤵PID:920
-
\??\c:\fxrrxxx.exec:\fxrrxxx.exe89⤵PID:3140
-
\??\c:\bbbbbb.exec:\bbbbbb.exe90⤵PID:3332
-
\??\c:\nhhhbt.exec:\nhhhbt.exe91⤵PID:1192
-
\??\c:\vpppj.exec:\vpppj.exe92⤵PID:5024
-
\??\c:\pdddj.exec:\pdddj.exe93⤵PID:4776
-
\??\c:\fllllrr.exec:\fllllrr.exe94⤵PID:4840
-
\??\c:\bttnhh.exec:\bttnhh.exe95⤵PID:3512
-
\??\c:\hhnnhh.exec:\hhnnhh.exe96⤵PID:2340
-
\??\c:\vdjjd.exec:\vdjjd.exe97⤵PID:3372
-
\??\c:\fxffxxl.exec:\fxffxxl.exe98⤵PID:832
-
\??\c:\vpppp.exec:\vpppp.exe99⤵PID:3260
-
\??\c:\vjjvp.exec:\vjjvp.exe100⤵PID:896
-
\??\c:\ffxxxff.exec:\ffxxxff.exe101⤵PID:1204
-
\??\c:\tntnth.exec:\tntnth.exe102⤵PID:3208
-
\??\c:\bttntt.exec:\bttntt.exe103⤵PID:3092
-
\??\c:\dpjjj.exec:\dpjjj.exe104⤵PID:1064
-
\??\c:\5fxlfxx.exec:\5fxlfxx.exe105⤵PID:4176
-
\??\c:\tntnnn.exec:\tntnnn.exe106⤵PID:2392
-
\??\c:\dpddv.exec:\dpddv.exe107⤵PID:3308
-
\??\c:\jppjd.exec:\jppjd.exe108⤵PID:3544
-
\??\c:\5rffxxx.exec:\5rffxxx.exe109⤵PID:4852
-
\??\c:\ntttbb.exec:\ntttbb.exe110⤵PID:3796
-
\??\c:\nhtnth.exec:\nhtnth.exe111⤵PID:4508
-
\??\c:\jdvjd.exec:\jdvjd.exe112⤵PID:1568
-
\??\c:\3rfxllf.exec:\3rfxllf.exe113⤵PID:624
-
\??\c:\xxxxrxf.exec:\xxxxrxf.exe114⤵PID:392
-
\??\c:\nnntnn.exec:\nnntnn.exe115⤵PID:1584
-
\??\c:\tbbtbb.exec:\tbbtbb.exe116⤵PID:5108
-
\??\c:\jpjpp.exec:\jpjpp.exe117⤵PID:4760
-
\??\c:\vvjjp.exec:\vvjjp.exe118⤵PID:3160
-
\??\c:\llrlffr.exec:\llrlffr.exe119⤵PID:540
-
\??\c:\3hhhbb.exec:\3hhhbb.exe120⤵PID:1976
-
\??\c:\htbtnh.exec:\htbtnh.exe121⤵PID:4324
-
\??\c:\3dvpj.exec:\3dvpj.exe122⤵PID:4844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-