Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe
Resource
win7-20240903-en
General
-
Target
db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe
-
Size
67KB
-
MD5
dc1da99ec8ddc07b09536060c824760c
-
SHA1
c279ac114ae52732f48f24ceaa04e385c4487c9b
-
SHA256
db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc
-
SHA512
21a9935477f132441a6438a471dc359266149539dff893512b76b024d1977cc6410eeec69a96765f2ca67294f73e952d213f2fd523ae8d1b78483507539c6427
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxe7:ymb3NkkiQ3mdBjF0y7kbU7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/1096-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3796-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/244-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2816-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1292-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2000-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4984-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2080-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4888-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4424-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3336-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/684-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1664-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4288-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3624-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2680-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4072-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1732-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/872-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4268-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1096 1rllffr.exe 2968 5xxlrxl.exe 2816 9tnttn.exe 244 jdppp.exe 1292 dvddv.exe 2000 7jppp.exe 4984 dpdjp.exe 2080 flfxlxl.exe 4888 thnttb.exe 4424 ddvvv.exe 3336 nhnhbb.exe 684 jpdjj.exe 1664 xxffxff.exe 4288 5tbhnt.exe 3624 1lxlxxl.exe 2108 rfxrlfr.exe 860 btthhb.exe 2944 pvpvd.exe 2932 lrfllxf.exe 1736 lrllffl.exe 2680 hnnnbh.exe 1928 hnnntb.exe 3096 1dvpp.exe 3560 xxxlfxr.exe 4072 ntbbbb.exe 232 vdvpp.exe 2928 dpppp.exe 1732 jdddv.exe 872 jvjdp.exe 4268 xrflffr.exe 4468 nbttnn.exe 1384 jdvdd.exe 1272 ffxrllr.exe 2136 bhhbbb.exe 4892 vjppv.exe 4028 xfxxrrf.exe 508 3hnntt.exe 4932 rxfxlrf.exe 3136 hhbbtt.exe 3628 3hnhhn.exe 5052 ffrrrrr.exe 3648 thhbbt.exe 4496 htttth.exe 1448 dvpdv.exe 2700 1xxxllf.exe 5060 vvdvv.exe 1084 7xlfxxf.exe 5012 hnnnbh.exe 2724 jpvdd.exe 4344 fllrfrr.exe 4980 lrxffxr.exe 2816 9nthbh.exe 4052 pjvdd.exe 3120 llxllrr.exe 184 bnnnhn.exe 5004 dpppp.exe 4080 rlxlrlf.exe 4984 pjpjj.exe 5048 jpddv.exe 5040 rfflrff.exe 3704 ttbhhh.exe 540 jvpjp.exe 3344 pdjdv.exe 5020 rxrxllr.exe -
resource yara_rule behavioral2/memory/3796-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1096-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/244-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2816-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1292-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1292-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1292-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1292-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2000-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4984-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2080-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4888-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2080-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2080-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2080-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4424-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3336-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/684-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1664-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4288-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3624-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2680-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4072-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1732-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/872-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4268-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbtnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 1096 3796 db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe 83 PID 3796 wrote to memory of 1096 3796 db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe 83 PID 3796 wrote to memory of 1096 3796 db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe 83 PID 1096 wrote to memory of 2968 1096 1rllffr.exe 84 PID 1096 wrote to memory of 2968 1096 1rllffr.exe 84 PID 1096 wrote to memory of 2968 1096 1rllffr.exe 84 PID 2968 wrote to memory of 2816 2968 5xxlrxl.exe 85 PID 2968 wrote to memory of 2816 2968 5xxlrxl.exe 85 PID 2968 wrote to memory of 2816 2968 5xxlrxl.exe 85 PID 2816 wrote to memory of 244 2816 9tnttn.exe 86 PID 2816 wrote to memory of 244 2816 9tnttn.exe 86 PID 2816 wrote to memory of 244 2816 9tnttn.exe 86 PID 244 wrote to memory of 1292 244 jdppp.exe 87 PID 244 wrote to memory of 1292 244 jdppp.exe 87 PID 244 wrote to memory of 1292 244 jdppp.exe 87 PID 1292 wrote to memory of 2000 1292 dvddv.exe 88 PID 1292 wrote to memory of 2000 1292 dvddv.exe 88 PID 1292 wrote to memory of 2000 1292 dvddv.exe 88 PID 2000 wrote to memory of 4984 2000 7jppp.exe 89 PID 2000 wrote to memory of 4984 2000 7jppp.exe 89 PID 2000 wrote to memory of 4984 2000 7jppp.exe 89 PID 4984 wrote to memory of 2080 4984 dpdjp.exe 90 PID 4984 wrote to memory of 2080 4984 dpdjp.exe 90 PID 4984 wrote to memory of 2080 4984 dpdjp.exe 90 PID 2080 wrote to memory of 4888 2080 flfxlxl.exe 91 PID 2080 wrote to memory of 4888 2080 flfxlxl.exe 91 PID 2080 wrote to memory of 4888 2080 flfxlxl.exe 91 PID 4888 wrote to memory of 4424 4888 thnttb.exe 92 PID 4888 wrote to memory of 4424 4888 thnttb.exe 92 PID 4888 wrote to memory of 4424 4888 thnttb.exe 92 PID 4424 wrote to memory of 3336 4424 ddvvv.exe 93 PID 4424 wrote to memory of 3336 4424 ddvvv.exe 93 PID 4424 wrote to memory of 3336 4424 ddvvv.exe 93 PID 3336 wrote to memory of 684 3336 nhnhbb.exe 94 PID 3336 wrote to memory of 684 3336 nhnhbb.exe 94 PID 3336 wrote to memory of 684 3336 nhnhbb.exe 94 PID 684 wrote to memory of 1664 684 jpdjj.exe 95 PID 684 wrote to memory of 1664 684 jpdjj.exe 95 PID 684 wrote to memory of 1664 684 jpdjj.exe 95 PID 1664 wrote to memory of 4288 1664 xxffxff.exe 96 PID 1664 wrote to memory of 4288 1664 xxffxff.exe 96 PID 1664 wrote to memory of 4288 1664 xxffxff.exe 96 PID 4288 wrote to memory of 3624 4288 5tbhnt.exe 97 PID 4288 wrote to memory of 3624 4288 5tbhnt.exe 97 PID 4288 wrote to memory of 3624 4288 5tbhnt.exe 97 PID 3624 wrote to memory of 2108 3624 1lxlxxl.exe 98 PID 3624 wrote to memory of 2108 3624 1lxlxxl.exe 98 PID 3624 wrote to memory of 2108 3624 1lxlxxl.exe 98 PID 2108 wrote to memory of 860 2108 rfxrlfr.exe 99 PID 2108 wrote to memory of 860 2108 rfxrlfr.exe 99 PID 2108 wrote to memory of 860 2108 rfxrlfr.exe 99 PID 860 wrote to memory of 2944 860 btthhb.exe 100 PID 860 wrote to memory of 2944 860 btthhb.exe 100 PID 860 wrote to memory of 2944 860 btthhb.exe 100 PID 2944 wrote to memory of 2932 2944 pvpvd.exe 101 PID 2944 wrote to memory of 2932 2944 pvpvd.exe 101 PID 2944 wrote to memory of 2932 2944 pvpvd.exe 101 PID 2932 wrote to memory of 1736 2932 lrfllxf.exe 102 PID 2932 wrote to memory of 1736 2932 lrfllxf.exe 102 PID 2932 wrote to memory of 1736 2932 lrfllxf.exe 102 PID 1736 wrote to memory of 2680 1736 lrllffl.exe 103 PID 1736 wrote to memory of 2680 1736 lrllffl.exe 103 PID 1736 wrote to memory of 2680 1736 lrllffl.exe 103 PID 2680 wrote to memory of 1928 2680 hnnnbh.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe"C:\Users\Admin\AppData\Local\Temp\db6a16c461a445cf3bdb6f049ba820f7165d05accf48fb51381f615393abeafc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\1rllffr.exec:\1rllffr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\5xxlrxl.exec:\5xxlrxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\9tnttn.exec:\9tnttn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\jdppp.exec:\jdppp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:244 -
\??\c:\dvddv.exec:\dvddv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\7jppp.exec:\7jppp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\dpdjp.exec:\dpdjp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\flfxlxl.exec:\flfxlxl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\thnttb.exec:\thnttb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\ddvvv.exec:\ddvvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
\??\c:\nhnhbb.exec:\nhnhbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
\??\c:\jpdjj.exec:\jpdjj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\xxffxff.exec:\xxffxff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\5tbhnt.exec:\5tbhnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
\??\c:\1lxlxxl.exec:\1lxlxxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
\??\c:\rfxrlfr.exec:\rfxrlfr.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\btthhb.exec:\btthhb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\pvpvd.exec:\pvpvd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\lrfllxf.exec:\lrfllxf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
\??\c:\lrllffl.exec:\lrllffl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\hnnnbh.exec:\hnnnbh.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\hnnntb.exec:\hnnntb.exe23⤵
- Executes dropped EXE
PID:1928 -
\??\c:\1dvpp.exec:\1dvpp.exe24⤵
- Executes dropped EXE
PID:3096 -
\??\c:\xxxlfxr.exec:\xxxlfxr.exe25⤵
- Executes dropped EXE
PID:3560 -
\??\c:\ntbbbb.exec:\ntbbbb.exe26⤵
- Executes dropped EXE
PID:4072 -
\??\c:\vdvpp.exec:\vdvpp.exe27⤵
- Executes dropped EXE
PID:232 -
\??\c:\dpppp.exec:\dpppp.exe28⤵
- Executes dropped EXE
PID:2928 -
\??\c:\jdddv.exec:\jdddv.exe29⤵
- Executes dropped EXE
PID:1732 -
\??\c:\jvjdp.exec:\jvjdp.exe30⤵
- Executes dropped EXE
PID:872 -
\??\c:\xrflffr.exec:\xrflffr.exe31⤵
- Executes dropped EXE
PID:4268 -
\??\c:\nbttnn.exec:\nbttnn.exe32⤵
- Executes dropped EXE
PID:4468 -
\??\c:\jdvdd.exec:\jdvdd.exe33⤵
- Executes dropped EXE
PID:1384 -
\??\c:\ffxrllr.exec:\ffxrllr.exe34⤵
- Executes dropped EXE
PID:1272 -
\??\c:\bhhbbb.exec:\bhhbbb.exe35⤵
- Executes dropped EXE
PID:2136 -
\??\c:\vjppv.exec:\vjppv.exe36⤵
- Executes dropped EXE
PID:4892 -
\??\c:\xfxxrrf.exec:\xfxxrrf.exe37⤵
- Executes dropped EXE
PID:4028 -
\??\c:\3hnntt.exec:\3hnntt.exe38⤵
- Executes dropped EXE
PID:508 -
\??\c:\rxfxlrf.exec:\rxfxlrf.exe39⤵
- Executes dropped EXE
PID:4932 -
\??\c:\hhbbtt.exec:\hhbbtt.exe40⤵
- Executes dropped EXE
PID:3136 -
\??\c:\3hnhhn.exec:\3hnhhn.exe41⤵
- Executes dropped EXE
PID:3628 -
\??\c:\ffrrrrr.exec:\ffrrrrr.exe42⤵
- Executes dropped EXE
PID:5052 -
\??\c:\thhbbt.exec:\thhbbt.exe43⤵
- Executes dropped EXE
PID:3648 -
\??\c:\htttth.exec:\htttth.exe44⤵
- Executes dropped EXE
PID:4496 -
\??\c:\dvpdv.exec:\dvpdv.exe45⤵
- Executes dropped EXE
PID:1448 -
\??\c:\1xxxllf.exec:\1xxxllf.exe46⤵
- Executes dropped EXE
PID:2700 -
\??\c:\vvdvv.exec:\vvdvv.exe47⤵
- Executes dropped EXE
PID:5060 -
\??\c:\7xlfxxf.exec:\7xlfxxf.exe48⤵
- Executes dropped EXE
PID:1084 -
\??\c:\hnnnbh.exec:\hnnnbh.exe49⤵
- Executes dropped EXE
PID:5012 -
\??\c:\jpvdd.exec:\jpvdd.exe50⤵
- Executes dropped EXE
PID:2724 -
\??\c:\fllrfrr.exec:\fllrfrr.exe51⤵
- Executes dropped EXE
PID:4344 -
\??\c:\lrxffxr.exec:\lrxffxr.exe52⤵
- Executes dropped EXE
PID:4980 -
\??\c:\9nthbh.exec:\9nthbh.exe53⤵
- Executes dropped EXE
PID:2816 -
\??\c:\pjvdd.exec:\pjvdd.exe54⤵
- Executes dropped EXE
PID:4052 -
\??\c:\llxllrr.exec:\llxllrr.exe55⤵
- Executes dropped EXE
PID:3120 -
\??\c:\bnnnhn.exec:\bnnnhn.exe56⤵
- Executes dropped EXE
PID:184 -
\??\c:\dpppp.exec:\dpppp.exe57⤵
- Executes dropped EXE
PID:5004 -
\??\c:\rlxlrlf.exec:\rlxlrlf.exe58⤵
- Executes dropped EXE
PID:4080 -
\??\c:\pjpjj.exec:\pjpjj.exe59⤵
- Executes dropped EXE
PID:4984 -
\??\c:\jpddv.exec:\jpddv.exe60⤵
- Executes dropped EXE
PID:5048 -
\??\c:\rfflrff.exec:\rfflrff.exe61⤵
- Executes dropped EXE
PID:5040 -
\??\c:\ttbhhh.exec:\ttbhhh.exe62⤵
- Executes dropped EXE
PID:3704 -
\??\c:\jvpjp.exec:\jvpjp.exe63⤵
- Executes dropped EXE
PID:540 -
\??\c:\pdjdv.exec:\pdjdv.exe64⤵
- Executes dropped EXE
PID:3344 -
\??\c:\rxrxllr.exec:\rxrxllr.exe65⤵
- Executes dropped EXE
PID:5020 -
\??\c:\xflfllr.exec:\xflfllr.exe66⤵PID:4920
-
\??\c:\bhhhbb.exec:\bhhhbb.exe67⤵PID:3756
-
\??\c:\vdpjv.exec:\vdpjv.exe68⤵PID:3968
-
\??\c:\jpppp.exec:\jpppp.exe69⤵PID:3584
-
\??\c:\flrlflf.exec:\flrlflf.exe70⤵PID:2008
-
\??\c:\tbnbtn.exec:\tbnbtn.exe71⤵PID:3624
-
\??\c:\ntnbbh.exec:\ntnbbh.exe72⤵PID:2264
-
\??\c:\vjvvv.exec:\vjvvv.exe73⤵PID:3676
-
\??\c:\lrrrrrf.exec:\lrrrrrf.exe74⤵PID:5116
-
\??\c:\rrxxxfl.exec:\rrxxxfl.exe75⤵PID:4604
-
\??\c:\hnnnhn.exec:\hnnnhn.exe76⤵PID:2932
-
\??\c:\htbbbb.exec:\htbbbb.exe77⤵PID:2688
-
\??\c:\vvppj.exec:\vvppj.exe78⤵PID:2220
-
\??\c:\dvpjj.exec:\dvpjj.exe79⤵PID:4460
-
\??\c:\xrlfrlf.exec:\xrlfrlf.exe80⤵PID:3500
-
\??\c:\bhbbhn.exec:\bhbbhn.exe81⤵PID:3580
-
\??\c:\hbtbbb.exec:\hbtbbb.exe82⤵PID:4076
-
\??\c:\9ddvv.exec:\9ddvv.exe83⤵PID:4072
-
\??\c:\xfrrxrx.exec:\xfrrxrx.exe84⤵PID:2720
-
\??\c:\fxlrxfx.exec:\fxlrxfx.exe85⤵PID:4528
-
\??\c:\bbnbhb.exec:\bbnbhb.exe86⤵PID:904
-
\??\c:\3bhhbb.exec:\3bhhbb.exe87⤵PID:4488
-
\??\c:\jddjp.exec:\jddjp.exe88⤵PID:872
-
\??\c:\lxllrxx.exec:\lxllrxx.exe89⤵PID:3104
-
\??\c:\1rrrlrl.exec:\1rrrlrl.exe90⤵PID:3716
-
\??\c:\ttnnnt.exec:\ttnnnt.exe91⤵PID:4468
-
\??\c:\1fffffx.exec:\1fffffx.exe92⤵PID:3272
-
\??\c:\fflfxff.exec:\fflfxff.exe93⤵PID:3224
-
\??\c:\3bhhbh.exec:\3bhhbh.exe94⤵PID:2136
-
\??\c:\3hnnhn.exec:\3hnnhn.exe95⤵PID:4892
-
\??\c:\vjjdd.exec:\vjjdd.exe96⤵PID:2312
-
\??\c:\lrlfllx.exec:\lrlfllx.exe97⤵PID:508
-
\??\c:\bnbnnn.exec:\bnbnnn.exe98⤵PID:4932
-
\??\c:\jdpjj.exec:\jdpjj.exe99⤵PID:3136
-
\??\c:\pvvvv.exec:\pvvvv.exe100⤵PID:3308
-
\??\c:\xrfxrrl.exec:\xrfxrrl.exe101⤵PID:3848
-
\??\c:\rlffxxf.exec:\rlffxxf.exe102⤵PID:32
-
\??\c:\7ttbhh.exec:\7ttbhh.exe103⤵PID:2764
-
\??\c:\jjdvj.exec:\jjdvj.exe104⤵PID:4360
-
\??\c:\jjjdv.exec:\jjjdv.exe105⤵PID:1108
-
\??\c:\xfrlflf.exec:\xfrlflf.exe106⤵PID:1008
-
\??\c:\tbbhht.exec:\tbbhht.exe107⤵PID:3796
-
\??\c:\tbnnnb.exec:\tbnnnb.exe108⤵PID:4864
-
\??\c:\dvddd.exec:\dvddd.exe109⤵PID:4960
-
\??\c:\djjvv.exec:\djjvv.exe110⤵PID:4716
-
\??\c:\lxfrrxf.exec:\lxfrrxf.exe111⤵PID:4980
-
\??\c:\bhtnnt.exec:\bhtnnt.exe112⤵PID:2816
-
\??\c:\tbtthn.exec:\tbtthn.exe113⤵PID:320
-
\??\c:\jpppj.exec:\jpppj.exe114⤵PID:3120
-
\??\c:\rxffxlr.exec:\rxffxlr.exe115⤵PID:184
-
\??\c:\frxxrxx.exec:\frxxrxx.exe116⤵PID:2248
-
\??\c:\ttthht.exec:\ttthht.exe117⤵PID:4080
-
\??\c:\pdjvj.exec:\pdjvj.exe118⤵PID:2080
-
\??\c:\pdddv.exec:\pdddv.exe119⤵PID:2236
-
\??\c:\5lrlllr.exec:\5lrlllr.exe120⤵PID:2152
-
\??\c:\hhbbht.exec:\hhbbht.exe121⤵PID:2564
-
\??\c:\nbthnt.exec:\nbthnt.exe122⤵PID:448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-