Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
0a5bc6bddf843584d6e6e4de9989dc60N.exe
Resource
win7-20240903-en
General
-
Target
0a5bc6bddf843584d6e6e4de9989dc60N.exe
-
Size
91KB
-
MD5
0a5bc6bddf843584d6e6e4de9989dc60
-
SHA1
d13cc260b8cc1866d0b770c09a20c99fd69f90e1
-
SHA256
eea37b14c3caef620151916fb2431fb18142076c2ac9a731454551b68e9f7c56
-
SHA512
745d5b759a5c92731cc13ab8e4babe8cce14f8dc8109f3e3a0d68bb0a4797ea1eaa78dee122afa3596a87afdff7f86ec466e9c830016069303bac57496ae1a5e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2iJvRirE0DmmdL2jqWkB3:ymb3NkkiQ3mdBjF+3TU2iBRioSumWS1h
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/3120-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3120-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/644-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2944-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4200-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/724-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1248-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4980-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2304-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3680-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4756-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2708-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2688-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3584-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3312-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3816-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3296-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2572-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2588-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/212-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 644 jjdvp.exe 2944 pppvj.exe 4200 xrffffl.exe 724 frlfxfx.exe 3028 htbtbt.exe 896 pdjjv.exe 1248 rrfrrrl.exe 2304 lrxxlrf.exe 4980 nbbnnh.exe 5112 1nbthh.exe 3680 vjpjd.exe 4060 xrxrflr.exe 4224 httnnn.exe 3972 bttnhh.exe 4756 dvpvd.exe 2708 flxlfxx.exe 2688 nbbbtt.exe 4172 jpdvp.exe 5072 jdvvp.exe 3584 frrlrrx.exe 3312 7xfxfxf.exe 4376 bththh.exe 3816 djjdv.exe 3296 jdpjd.exe 2572 xrrlfxx.exe 2588 pdddd.exe 4484 xrxxxxx.exe 2564 bthbtn.exe 1728 hntthh.exe 212 pddvd.exe 2784 pddvj.exe 1376 flllffx.exe 4116 nbbbbb.exe 3516 bnhbbt.exe 2916 7jjdv.exe 4276 pjvdd.exe 4804 lflfrrl.exe 3208 rffxrrl.exe 4808 htbtnh.exe 928 nhbthh.exe 2268 3jjjd.exe 3616 jjvpd.exe 3632 7rrrffx.exe 3028 llxfffx.exe 896 bntttt.exe 1556 ttbthh.exe 4984 hhnbtt.exe 2304 dvvpj.exe 4980 jddvp.exe 2112 1llfrxr.exe 2072 xxfxxxx.exe 3940 nbtnnn.exe 5060 thhtnt.exe 1984 jppjj.exe 3792 dvjdd.exe 3260 xxrrlll.exe 4668 rrllfxf.exe 2504 hnbtnh.exe 4420 5nnnhh.exe 3132 jdjjd.exe 4136 dvvpd.exe 2292 xffxrlf.exe 4524 fxfxffx.exe 3444 tnttbb.exe -
resource yara_rule behavioral2/memory/3120-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3120-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/644-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4200-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/724-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3028-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4980-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5112-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3680-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4756-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2708-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2688-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3584-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3312-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3816-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3296-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2572-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2588-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-200-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tbtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxxllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrlrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 644 3120 0a5bc6bddf843584d6e6e4de9989dc60N.exe 83 PID 3120 wrote to memory of 644 3120 0a5bc6bddf843584d6e6e4de9989dc60N.exe 83 PID 3120 wrote to memory of 644 3120 0a5bc6bddf843584d6e6e4de9989dc60N.exe 83 PID 644 wrote to memory of 2944 644 jjdvp.exe 84 PID 644 wrote to memory of 2944 644 jjdvp.exe 84 PID 644 wrote to memory of 2944 644 jjdvp.exe 84 PID 2944 wrote to memory of 4200 2944 pppvj.exe 85 PID 2944 wrote to memory of 4200 2944 pppvj.exe 85 PID 2944 wrote to memory of 4200 2944 pppvj.exe 85 PID 4200 wrote to memory of 724 4200 xrffffl.exe 86 PID 4200 wrote to memory of 724 4200 xrffffl.exe 86 PID 4200 wrote to memory of 724 4200 xrffffl.exe 86 PID 724 wrote to memory of 3028 724 frlfxfx.exe 87 PID 724 wrote to memory of 3028 724 frlfxfx.exe 87 PID 724 wrote to memory of 3028 724 frlfxfx.exe 87 PID 3028 wrote to memory of 896 3028 htbtbt.exe 88 PID 3028 wrote to memory of 896 3028 htbtbt.exe 88 PID 3028 wrote to memory of 896 3028 htbtbt.exe 88 PID 896 wrote to memory of 1248 896 pdjjv.exe 89 PID 896 wrote to memory of 1248 896 pdjjv.exe 89 PID 896 wrote to memory of 1248 896 pdjjv.exe 89 PID 1248 wrote to memory of 2304 1248 rrfrrrl.exe 90 PID 1248 wrote to memory of 2304 1248 rrfrrrl.exe 90 PID 1248 wrote to memory of 2304 1248 rrfrrrl.exe 90 PID 2304 wrote to memory of 4980 2304 lrxxlrf.exe 91 PID 2304 wrote to memory of 4980 2304 lrxxlrf.exe 91 PID 2304 wrote to memory of 4980 2304 lrxxlrf.exe 91 PID 4980 wrote to memory of 5112 4980 nbbnnh.exe 92 PID 4980 wrote to memory of 5112 4980 nbbnnh.exe 92 PID 4980 wrote to memory of 5112 4980 nbbnnh.exe 92 PID 5112 wrote to memory of 3680 5112 1nbthh.exe 93 PID 5112 wrote to memory of 3680 5112 1nbthh.exe 93 PID 5112 wrote to memory of 3680 5112 1nbthh.exe 93 PID 3680 wrote to memory of 4060 3680 vjpjd.exe 94 PID 3680 wrote to memory of 4060 3680 vjpjd.exe 94 PID 3680 wrote to memory of 4060 3680 vjpjd.exe 94 PID 4060 wrote to memory of 4224 4060 xrxrflr.exe 96 PID 4060 wrote to memory of 4224 4060 xrxrflr.exe 96 PID 4060 wrote to memory of 4224 4060 xrxrflr.exe 96 PID 4224 wrote to memory of 3972 4224 httnnn.exe 97 PID 4224 wrote to memory of 3972 4224 httnnn.exe 97 PID 4224 wrote to memory of 3972 4224 httnnn.exe 97 PID 3972 wrote to memory of 4756 3972 bttnhh.exe 98 PID 3972 wrote to memory of 4756 3972 bttnhh.exe 98 PID 3972 wrote to memory of 4756 3972 bttnhh.exe 98 PID 4756 wrote to memory of 2708 4756 dvpvd.exe 99 PID 4756 wrote to memory of 2708 4756 dvpvd.exe 99 PID 4756 wrote to memory of 2708 4756 dvpvd.exe 99 PID 2708 wrote to memory of 2688 2708 flxlfxx.exe 100 PID 2708 wrote to memory of 2688 2708 flxlfxx.exe 100 PID 2708 wrote to memory of 2688 2708 flxlfxx.exe 100 PID 2688 wrote to memory of 4172 2688 nbbbtt.exe 102 PID 2688 wrote to memory of 4172 2688 nbbbtt.exe 102 PID 2688 wrote to memory of 4172 2688 nbbbtt.exe 102 PID 4172 wrote to memory of 5072 4172 jpdvp.exe 103 PID 4172 wrote to memory of 5072 4172 jpdvp.exe 103 PID 4172 wrote to memory of 5072 4172 jpdvp.exe 103 PID 5072 wrote to memory of 3584 5072 jdvvp.exe 104 PID 5072 wrote to memory of 3584 5072 jdvvp.exe 104 PID 5072 wrote to memory of 3584 5072 jdvvp.exe 104 PID 3584 wrote to memory of 3312 3584 frrlrrx.exe 105 PID 3584 wrote to memory of 3312 3584 frrlrrx.exe 105 PID 3584 wrote to memory of 3312 3584 frrlrrx.exe 105 PID 3312 wrote to memory of 4376 3312 7xfxfxf.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5bc6bddf843584d6e6e4de9989dc60N.exe"C:\Users\Admin\AppData\Local\Temp\0a5bc6bddf843584d6e6e4de9989dc60N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
\??\c:\jjdvp.exec:\jjdvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
\??\c:\pppvj.exec:\pppvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\xrffffl.exec:\xrffffl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
\??\c:\frlfxfx.exec:\frlfxfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
\??\c:\htbtbt.exec:\htbtbt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\pdjjv.exec:\pdjjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
\??\c:\rrfrrrl.exec:\rrfrrrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\lrxxlrf.exec:\lrxxlrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\nbbnnh.exec:\nbbnnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\1nbthh.exec:\1nbthh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
\??\c:\vjpjd.exec:\vjpjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
\??\c:\xrxrflr.exec:\xrxrflr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\httnnn.exec:\httnnn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
\??\c:\bttnhh.exec:\bttnhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\dvpvd.exec:\dvpvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
\??\c:\flxlfxx.exec:\flxlfxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\nbbbtt.exec:\nbbbtt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\jpdvp.exec:\jpdvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\jdvvp.exec:\jdvvp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
\??\c:\frrlrrx.exec:\frrlrrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3584 -
\??\c:\7xfxfxf.exec:\7xfxfxf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\bththh.exec:\bththh.exe23⤵
- Executes dropped EXE
PID:4376 -
\??\c:\djjdv.exec:\djjdv.exe24⤵
- Executes dropped EXE
PID:3816 -
\??\c:\jdpjd.exec:\jdpjd.exe25⤵
- Executes dropped EXE
PID:3296 -
\??\c:\xrrlfxx.exec:\xrrlfxx.exe26⤵
- Executes dropped EXE
PID:2572 -
\??\c:\pdddd.exec:\pdddd.exe27⤵
- Executes dropped EXE
PID:2588 -
\??\c:\xrxxxxx.exec:\xrxxxxx.exe28⤵
- Executes dropped EXE
PID:4484 -
\??\c:\bthbtn.exec:\bthbtn.exe29⤵
- Executes dropped EXE
PID:2564 -
\??\c:\hntthh.exec:\hntthh.exe30⤵
- Executes dropped EXE
PID:1728 -
\??\c:\pddvd.exec:\pddvd.exe31⤵
- Executes dropped EXE
PID:212 -
\??\c:\pddvj.exec:\pddvj.exe32⤵
- Executes dropped EXE
PID:2784 -
\??\c:\flllffx.exec:\flllffx.exe33⤵
- Executes dropped EXE
PID:1376 -
\??\c:\nbbbbb.exec:\nbbbbb.exe34⤵
- Executes dropped EXE
PID:4116 -
\??\c:\bnhbbt.exec:\bnhbbt.exe35⤵
- Executes dropped EXE
PID:3516 -
\??\c:\7jjdv.exec:\7jjdv.exe36⤵
- Executes dropped EXE
PID:2916 -
\??\c:\pjvdd.exec:\pjvdd.exe37⤵
- Executes dropped EXE
PID:4276 -
\??\c:\lflfrrl.exec:\lflfrrl.exe38⤵
- Executes dropped EXE
PID:4804 -
\??\c:\rffxrrl.exec:\rffxrrl.exe39⤵
- Executes dropped EXE
PID:3208 -
\??\c:\htbtnh.exec:\htbtnh.exe40⤵
- Executes dropped EXE
PID:4808 -
\??\c:\nhbthh.exec:\nhbthh.exe41⤵
- Executes dropped EXE
PID:928 -
\??\c:\3jjjd.exec:\3jjjd.exe42⤵
- Executes dropped EXE
PID:2268 -
\??\c:\jjvpd.exec:\jjvpd.exe43⤵
- Executes dropped EXE
PID:3616 -
\??\c:\7rrrffx.exec:\7rrrffx.exe44⤵
- Executes dropped EXE
PID:3632 -
\??\c:\llxfffx.exec:\llxfffx.exe45⤵
- Executes dropped EXE
PID:3028 -
\??\c:\bntttt.exec:\bntttt.exe46⤵
- Executes dropped EXE
PID:896 -
\??\c:\ttbthh.exec:\ttbthh.exe47⤵
- Executes dropped EXE
PID:1556 -
\??\c:\hhnbtt.exec:\hhnbtt.exe48⤵
- Executes dropped EXE
PID:4984 -
\??\c:\dvvpj.exec:\dvvpj.exe49⤵
- Executes dropped EXE
PID:2304 -
\??\c:\jddvp.exec:\jddvp.exe50⤵
- Executes dropped EXE
PID:4980 -
\??\c:\1llfrxr.exec:\1llfrxr.exe51⤵
- Executes dropped EXE
PID:2112 -
\??\c:\xxfxxxx.exec:\xxfxxxx.exe52⤵
- Executes dropped EXE
PID:2072 -
\??\c:\nbtnnn.exec:\nbtnnn.exe53⤵
- Executes dropped EXE
PID:3940 -
\??\c:\thhtnt.exec:\thhtnt.exe54⤵
- Executes dropped EXE
PID:5060 -
\??\c:\jppjj.exec:\jppjj.exe55⤵
- Executes dropped EXE
PID:1984 -
\??\c:\dvjdd.exec:\dvjdd.exe56⤵
- Executes dropped EXE
PID:3792 -
\??\c:\xxrrlll.exec:\xxrrlll.exe57⤵
- Executes dropped EXE
PID:3260 -
\??\c:\rrllfxf.exec:\rrllfxf.exe58⤵
- Executes dropped EXE
PID:4668 -
\??\c:\hnbtnh.exec:\hnbtnh.exe59⤵
- Executes dropped EXE
PID:2504 -
\??\c:\5nnnhh.exec:\5nnnhh.exe60⤵
- Executes dropped EXE
PID:4420 -
\??\c:\jdjjd.exec:\jdjjd.exe61⤵
- Executes dropped EXE
PID:3132 -
\??\c:\dvvpd.exec:\dvvpd.exe62⤵
- Executes dropped EXE
PID:4136 -
\??\c:\xffxrlf.exec:\xffxrlf.exe63⤵
- Executes dropped EXE
PID:2292 -
\??\c:\fxfxffx.exec:\fxfxffx.exe64⤵
- Executes dropped EXE
PID:4524 -
\??\c:\tnttbb.exec:\tnttbb.exe65⤵
- Executes dropped EXE
PID:3444 -
\??\c:\nhhttn.exec:\nhhttn.exe66⤵PID:1300
-
\??\c:\5jjjv.exec:\5jjjv.exe67⤵PID:432
-
\??\c:\ppppp.exec:\ppppp.exe68⤵PID:4212
-
\??\c:\rffrlfr.exec:\rffrlfr.exe69⤵PID:5088
-
\??\c:\bbbnbt.exec:\bbbnbt.exe70⤵PID:2428
-
\??\c:\hhbbnn.exec:\hhbbnn.exe71⤵PID:2760
-
\??\c:\dvdjv.exec:\dvdjv.exe72⤵PID:3372
-
\??\c:\lllxrlx.exec:\lllxrlx.exe73⤵PID:2368
-
\??\c:\hbnbtt.exec:\hbnbtt.exe74⤵PID:2684
-
\??\c:\bnhbbt.exec:\bnhbbt.exe75⤵PID:2588
-
\??\c:\vpvvj.exec:\vpvvj.exe76⤵PID:1564
-
\??\c:\vpjjj.exec:\vpjjj.exe77⤵PID:1968
-
\??\c:\lfffrrr.exec:\lfffrrr.exe78⤵
- System Location Discovery: System Language Discovery
PID:3472 -
\??\c:\bttttn.exec:\bttttn.exe79⤵PID:3548
-
\??\c:\nhhbbb.exec:\nhhbbb.exe80⤵PID:3300
-
\??\c:\vjjdd.exec:\vjjdd.exe81⤵PID:3720
-
\??\c:\vjdvp.exec:\vjdvp.exe82⤵PID:1376
-
\??\c:\xrrlrxx.exec:\xrrlrxx.exe83⤵PID:4080
-
\??\c:\rllxrrf.exec:\rllxrrf.exe84⤵PID:4284
-
\??\c:\tbhnhh.exec:\tbhnhh.exe85⤵PID:3116
-
\??\c:\jdjjj.exec:\jdjjj.exe86⤵PID:1220
-
\??\c:\dpvpv.exec:\dpvpv.exe87⤵PID:4416
-
\??\c:\ffrrrxx.exec:\ffrrrxx.exe88⤵PID:4768
-
\??\c:\rllfxxx.exec:\rllfxxx.exe89⤵PID:3612
-
\??\c:\hbbbtt.exec:\hbbbtt.exe90⤵PID:2256
-
\??\c:\tbbbhh.exec:\tbbbhh.exe91⤵PID:392
-
\??\c:\9nttnn.exec:\9nttnn.exe92⤵PID:4020
-
\??\c:\jpjdp.exec:\jpjdp.exe93⤵PID:1152
-
\??\c:\xfrlllf.exec:\xfrlllf.exe94⤵PID:1248
-
\??\c:\fffxrrl.exec:\fffxrrl.exe95⤵PID:4404
-
\??\c:\tnbbbt.exec:\tnbbbt.exe96⤵PID:3228
-
\??\c:\nnnnhh.exec:\nnnnhh.exe97⤵PID:2080
-
\??\c:\jdppp.exec:\jdppp.exe98⤵PID:4972
-
\??\c:\3dddp.exec:\3dddp.exe99⤵PID:3280
-
\??\c:\pvvpj.exec:\pvvpj.exe100⤵PID:5112
-
\??\c:\lfllxxr.exec:\lfllxxr.exe101⤵PID:4048
-
\??\c:\3lxrxxr.exec:\3lxrxxr.exe102⤵PID:1832
-
\??\c:\tntnbn.exec:\tntnbn.exe103⤵PID:3416
-
\??\c:\nbttnt.exec:\nbttnt.exe104⤵PID:2928
-
\??\c:\djpjv.exec:\djpjv.exe105⤵PID:868
-
\??\c:\pdjdp.exec:\pdjdp.exe106⤵PID:468
-
\??\c:\lrxrrrl.exec:\lrxrrrl.exe107⤵PID:3224
-
\??\c:\lrrlfff.exec:\lrrlfff.exe108⤵PID:2688
-
\??\c:\nnnhtn.exec:\nnnhtn.exe109⤵PID:4948
-
\??\c:\tnbbbh.exec:\tnbbbh.exe110⤵PID:4136
-
\??\c:\vpdjd.exec:\vpdjd.exe111⤵PID:2968
-
\??\c:\jjdvj.exec:\jjdvj.exe112⤵PID:4524
-
\??\c:\flfrxrx.exec:\flfrxrx.exe113⤵PID:3672
-
\??\c:\frlfxlf.exec:\frlfxlf.exe114⤵PID:3912
-
\??\c:\hhhhtt.exec:\hhhhtt.exe115⤵PID:4512
-
\??\c:\5vdvp.exec:\5vdvp.exe116⤵PID:3888
-
\??\c:\dvdvd.exec:\dvdvd.exe117⤵PID:4940
-
\??\c:\xxlfrrl.exec:\xxlfrrl.exe118⤵PID:2356
-
\??\c:\frrrfrl.exec:\frrrfrl.exe119⤵PID:2760
-
\??\c:\lxlrlrl.exec:\lxlrlrl.exe120⤵PID:2540
-
\??\c:\nbbnnn.exec:\nbbnnn.exe121⤵PID:2444
-
\??\c:\bbtnbb.exec:\bbtnbb.exe122⤵PID:4840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-