Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
Resource
win7-20241010-en
General
-
Target
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
-
Size
298KB
-
MD5
c48150ae1df943cec9e198000905216a
-
SHA1
5291d5b56a928717af19a756cdacde64cd9c0fdd
-
SHA256
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb
-
SHA512
565c590c3a124b9016ee1fb2d0f3686146c0d1511f90c8825f1f3d83d5291b42b11a4f40e1d70444f5bd179688cf6b31b96557a5a4146ac48ff73cd5db1be379
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvU:n3C9uDVOXLmHBKWyn+PgvU
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 29 IoCs
resource yara_rule behavioral2/memory/3276-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2712-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/996-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2704-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1372-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1508-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4896-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1748-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3968-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3572-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1704-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3664-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3204-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1996-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3844-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2568-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4380-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3128-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/540-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1980-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2172-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1896 tbbthb.exe 2712 rlfrrlr.exe 996 btnhbt.exe 2704 1nnbhn.exe 1372 pdjdd.exe 5028 rxrlxxl.exe 5056 bbnhtn.exe 1508 ppvjd.exe 4896 7pvjd.exe 1748 hhtnbb.exe 3968 htnbtn.exe 3572 jddvj.exe 3568 7bbtht.exe 1704 jjdpv.exe 4704 xrfxllf.exe 3664 hthbhh.exe 4848 1jpjp.exe 2568 xxxxllx.exe 4616 hbhnnn.exe 3204 btbntn.exe 3844 3djdp.exe 1996 frlfrrr.exe 4460 hhttnt.exe 4380 dpvpj.exe 3128 5xxlffx.exe 1648 pdjjd.exe 1832 xlxxffr.exe 540 jjddd.exe 1980 rfxrlll.exe 3656 nntntt.exe 2172 9ffrflf.exe 1540 hbbnhh.exe 2612 vdjdd.exe 4444 xxlfrrr.exe 920 nhhhbb.exe 1824 vdvpd.exe 4516 nntnnn.exe 4584 pppjv.exe 4916 xrrlflx.exe 3884 nbhbhb.exe 1204 dpvpj.exe 2712 5xxxrxx.exe 1240 jdjjj.exe 4024 3vddv.exe 2900 5frlfxr.exe 4544 xfrrllf.exe 3016 bhhtnn.exe 3940 thbthh.exe 2920 jvdpp.exe 4604 7xxrrrx.exe 744 ffxrllx.exe 1924 tnnnnn.exe 4692 jpdvp.exe 4532 lxlfrrr.exe 1960 lflfxfx.exe 3360 7thbhh.exe 2368 nbtthn.exe 3272 vdjdd.exe 3568 rfxxrrf.exe 4016 1xrrlrl.exe 4352 tnhhbn.exe 1480 ddjjj.exe 3820 ppddd.exe 3912 fflfxxr.exe -
resource yara_rule behavioral2/memory/3276-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1896-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2712-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/996-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/996-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/996-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2704-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1372-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1508-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1748-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3968-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3572-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1704-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3664-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3204-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1996-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3844-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2568-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4380-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3128-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/540-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2172-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rlfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrxlrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfrfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfrfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfrxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 1896 3276 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 83 PID 3276 wrote to memory of 1896 3276 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 83 PID 3276 wrote to memory of 1896 3276 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 83 PID 1896 wrote to memory of 2712 1896 tbbthb.exe 84 PID 1896 wrote to memory of 2712 1896 tbbthb.exe 84 PID 1896 wrote to memory of 2712 1896 tbbthb.exe 84 PID 2712 wrote to memory of 996 2712 rlfrrlr.exe 85 PID 2712 wrote to memory of 996 2712 rlfrrlr.exe 85 PID 2712 wrote to memory of 996 2712 rlfrrlr.exe 85 PID 996 wrote to memory of 2704 996 btnhbt.exe 86 PID 996 wrote to memory of 2704 996 btnhbt.exe 86 PID 996 wrote to memory of 2704 996 btnhbt.exe 86 PID 2704 wrote to memory of 1372 2704 1nnbhn.exe 87 PID 2704 wrote to memory of 1372 2704 1nnbhn.exe 87 PID 2704 wrote to memory of 1372 2704 1nnbhn.exe 87 PID 1372 wrote to memory of 5028 1372 pdjdd.exe 88 PID 1372 wrote to memory of 5028 1372 pdjdd.exe 88 PID 1372 wrote to memory of 5028 1372 pdjdd.exe 88 PID 5028 wrote to memory of 5056 5028 rxrlxxl.exe 89 PID 5028 wrote to memory of 5056 5028 rxrlxxl.exe 89 PID 5028 wrote to memory of 5056 5028 rxrlxxl.exe 89 PID 5056 wrote to memory of 1508 5056 bbnhtn.exe 90 PID 5056 wrote to memory of 1508 5056 bbnhtn.exe 90 PID 5056 wrote to memory of 1508 5056 bbnhtn.exe 90 PID 1508 wrote to memory of 4896 1508 ppvjd.exe 91 PID 1508 wrote to memory of 4896 1508 ppvjd.exe 91 PID 1508 wrote to memory of 4896 1508 ppvjd.exe 91 PID 4896 wrote to memory of 1748 4896 7pvjd.exe 92 PID 4896 wrote to memory of 1748 4896 7pvjd.exe 92 PID 4896 wrote to memory of 1748 4896 7pvjd.exe 92 PID 1748 wrote to memory of 3968 1748 hhtnbb.exe 93 PID 1748 wrote to memory of 3968 1748 hhtnbb.exe 93 PID 1748 wrote to memory of 3968 1748 hhtnbb.exe 93 PID 3968 wrote to memory of 3572 3968 htnbtn.exe 94 PID 3968 wrote to memory of 3572 3968 htnbtn.exe 94 PID 3968 wrote to memory of 3572 3968 htnbtn.exe 94 PID 3572 wrote to memory of 3568 3572 jddvj.exe 95 PID 3572 wrote to memory of 3568 3572 jddvj.exe 95 PID 3572 wrote to memory of 3568 3572 jddvj.exe 95 PID 3568 wrote to memory of 1704 3568 7bbtht.exe 96 PID 3568 wrote to memory of 1704 3568 7bbtht.exe 96 PID 3568 wrote to memory of 1704 3568 7bbtht.exe 96 PID 1704 wrote to memory of 4704 1704 jjdpv.exe 97 PID 1704 wrote to memory of 4704 1704 jjdpv.exe 97 PID 1704 wrote to memory of 4704 1704 jjdpv.exe 97 PID 4704 wrote to memory of 3664 4704 xrfxllf.exe 98 PID 4704 wrote to memory of 3664 4704 xrfxllf.exe 98 PID 4704 wrote to memory of 3664 4704 xrfxllf.exe 98 PID 3664 wrote to memory of 4848 3664 hthbhh.exe 99 PID 3664 wrote to memory of 4848 3664 hthbhh.exe 99 PID 3664 wrote to memory of 4848 3664 hthbhh.exe 99 PID 4848 wrote to memory of 2568 4848 1jpjp.exe 100 PID 4848 wrote to memory of 2568 4848 1jpjp.exe 100 PID 4848 wrote to memory of 2568 4848 1jpjp.exe 100 PID 2568 wrote to memory of 4616 2568 xxxxllx.exe 101 PID 2568 wrote to memory of 4616 2568 xxxxllx.exe 101 PID 2568 wrote to memory of 4616 2568 xxxxllx.exe 101 PID 4616 wrote to memory of 3204 4616 hbhnnn.exe 102 PID 4616 wrote to memory of 3204 4616 hbhnnn.exe 102 PID 4616 wrote to memory of 3204 4616 hbhnnn.exe 102 PID 3204 wrote to memory of 3844 3204 btbntn.exe 103 PID 3204 wrote to memory of 3844 3204 btbntn.exe 103 PID 3204 wrote to memory of 3844 3204 btbntn.exe 103 PID 3844 wrote to memory of 1996 3844 3djdp.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
\??\c:\tbbthb.exec:\tbbthb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\rlfrrlr.exec:\rlfrrlr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\btnhbt.exec:\btnhbt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\1nnbhn.exec:\1nnbhn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\pdjdd.exec:\pdjdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\rxrlxxl.exec:\rxrlxxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\bbnhtn.exec:\bbnhtn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
\??\c:\ppvjd.exec:\ppvjd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\7pvjd.exec:\7pvjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\hhtnbb.exec:\hhtnbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\htnbtn.exec:\htnbtn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
\??\c:\jddvj.exec:\jddvj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\7bbtht.exec:\7bbtht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\jjdpv.exec:\jjdpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
\??\c:\xrfxllf.exec:\xrfxllf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\hthbhh.exec:\hthbhh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\1jpjp.exec:\1jpjp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
\??\c:\xxxxllx.exec:\xxxxllx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\hbhnnn.exec:\hbhnnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\btbntn.exec:\btbntn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
\??\c:\3djdp.exec:\3djdp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
\??\c:\frlfrrr.exec:\frlfrrr.exe23⤵
- Executes dropped EXE
PID:1996 -
\??\c:\hhttnt.exec:\hhttnt.exe24⤵
- Executes dropped EXE
PID:4460 -
\??\c:\dpvpj.exec:\dpvpj.exe25⤵
- Executes dropped EXE
PID:4380 -
\??\c:\5xxlffx.exec:\5xxlffx.exe26⤵
- Executes dropped EXE
PID:3128 -
\??\c:\pdjjd.exec:\pdjjd.exe27⤵
- Executes dropped EXE
PID:1648 -
\??\c:\xlxxffr.exec:\xlxxffr.exe28⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jjddd.exec:\jjddd.exe29⤵
- Executes dropped EXE
PID:540 -
\??\c:\rfxrlll.exec:\rfxrlll.exe30⤵
- Executes dropped EXE
PID:1980 -
\??\c:\nntntt.exec:\nntntt.exe31⤵
- Executes dropped EXE
PID:3656 -
\??\c:\9ffrflf.exec:\9ffrflf.exe32⤵
- Executes dropped EXE
PID:2172 -
\??\c:\hbbnhh.exec:\hbbnhh.exe33⤵
- Executes dropped EXE
PID:1540 -
\??\c:\vdjdd.exec:\vdjdd.exe34⤵
- Executes dropped EXE
PID:2612 -
\??\c:\xxlfrrr.exec:\xxlfrrr.exe35⤵
- Executes dropped EXE
PID:4444 -
\??\c:\nhhhbb.exec:\nhhhbb.exe36⤵
- Executes dropped EXE
PID:920 -
\??\c:\vdvpd.exec:\vdvpd.exe37⤵
- Executes dropped EXE
PID:1824 -
\??\c:\nntnnn.exec:\nntnnn.exe38⤵
- Executes dropped EXE
PID:4516 -
\??\c:\pppjv.exec:\pppjv.exe39⤵
- Executes dropped EXE
PID:4584 -
\??\c:\xrrlflx.exec:\xrrlflx.exe40⤵
- Executes dropped EXE
PID:4916 -
\??\c:\nbhbhb.exec:\nbhbhb.exe41⤵
- Executes dropped EXE
PID:3884 -
\??\c:\dpvpj.exec:\dpvpj.exe42⤵
- Executes dropped EXE
PID:1204 -
\??\c:\5xxxrxx.exec:\5xxxrxx.exe43⤵
- Executes dropped EXE
PID:2712 -
\??\c:\jdjjj.exec:\jdjjj.exe44⤵
- Executes dropped EXE
PID:1240 -
\??\c:\3vddv.exec:\3vddv.exe45⤵
- Executes dropped EXE
PID:4024 -
\??\c:\5frlfxr.exec:\5frlfxr.exe46⤵
- Executes dropped EXE
PID:2900 -
\??\c:\xfrrllf.exec:\xfrrllf.exe47⤵
- Executes dropped EXE
PID:4544 -
\??\c:\bhhtnn.exec:\bhhtnn.exe48⤵
- Executes dropped EXE
PID:3016 -
\??\c:\thbthh.exec:\thbthh.exe49⤵
- Executes dropped EXE
PID:3940 -
\??\c:\jvdpp.exec:\jvdpp.exe50⤵
- Executes dropped EXE
PID:2920 -
\??\c:\7xxrrrx.exec:\7xxrrrx.exe51⤵
- Executes dropped EXE
PID:4604 -
\??\c:\ffxrllx.exec:\ffxrllx.exe52⤵
- Executes dropped EXE
PID:744 -
\??\c:\tnnnnn.exec:\tnnnnn.exe53⤵
- Executes dropped EXE
PID:1924 -
\??\c:\jpdvp.exec:\jpdvp.exe54⤵
- Executes dropped EXE
PID:4692 -
\??\c:\lxlfrrr.exec:\lxlfrrr.exe55⤵
- Executes dropped EXE
PID:4532 -
\??\c:\lflfxfx.exec:\lflfxfx.exe56⤵
- Executes dropped EXE
PID:1960 -
\??\c:\7thbhh.exec:\7thbhh.exe57⤵
- Executes dropped EXE
PID:3360 -
\??\c:\nbtthn.exec:\nbtthn.exe58⤵
- Executes dropped EXE
PID:2368 -
\??\c:\vdjdd.exec:\vdjdd.exe59⤵
- Executes dropped EXE
PID:3272 -
\??\c:\rfxxrrf.exec:\rfxxrrf.exe60⤵
- Executes dropped EXE
PID:3568 -
\??\c:\1xrrlrl.exec:\1xrrlrl.exe61⤵
- Executes dropped EXE
PID:4016 -
\??\c:\tnhhbn.exec:\tnhhbn.exe62⤵
- Executes dropped EXE
PID:4352 -
\??\c:\ddjjj.exec:\ddjjj.exe63⤵
- Executes dropped EXE
PID:1480 -
\??\c:\ppddd.exec:\ppddd.exe64⤵
- Executes dropped EXE
PID:3820 -
\??\c:\fflfxxr.exec:\fflfxxr.exe65⤵
- Executes dropped EXE
PID:3912 -
\??\c:\9ttttb.exec:\9ttttb.exe66⤵PID:3596
-
\??\c:\tnnhbb.exec:\tnnhbb.exe67⤵PID:4044
-
\??\c:\vppjv.exec:\vppjv.exe68⤵PID:4156
-
\??\c:\xxxxxfx.exec:\xxxxxfx.exe69⤵PID:2936
-
\??\c:\5flflll.exec:\5flflll.exe70⤵PID:1760
-
\??\c:\nbhbhh.exec:\nbhbhh.exe71⤵PID:4752
-
\??\c:\tnnnhh.exec:\tnnnhh.exe72⤵PID:4460
-
\??\c:\1pvpd.exec:\1pvpd.exe73⤵PID:4068
-
\??\c:\fxxrlll.exec:\fxxrlll.exe74⤵PID:3756
-
\??\c:\lfffrrl.exec:\lfffrrl.exe75⤵PID:5036
-
\??\c:\bttnnn.exec:\bttnnn.exe76⤵PID:1648
-
\??\c:\jvvpp.exec:\jvvpp.exe77⤵PID:1492
-
\??\c:\lffxllf.exec:\lffxllf.exe78⤵PID:1848
-
\??\c:\xfrrlll.exec:\xfrrlll.exe79⤵PID:3064
-
\??\c:\1bhhhh.exec:\1bhhhh.exe80⤵PID:1500
-
\??\c:\5ntnbh.exec:\5ntnbh.exe81⤵PID:3408
-
\??\c:\vdjdv.exec:\vdjdv.exe82⤵PID:4880
-
\??\c:\jpvpj.exec:\jpvpj.exe83⤵PID:208
-
\??\c:\lxfxlrl.exec:\lxfxlrl.exe84⤵PID:844
-
\??\c:\lfrxxff.exec:\lfrxxff.exe85⤵PID:2284
-
\??\c:\tnbbtt.exec:\tnbbtt.exe86⤵PID:5048
-
\??\c:\jvppd.exec:\jvppd.exe87⤵PID:1568
-
\??\c:\5rrlfxx.exec:\5rrlfxx.exe88⤵PID:4300
-
\??\c:\bbhbtt.exec:\bbhbtt.exe89⤵PID:316
-
\??\c:\3bhbbt.exec:\3bhbbt.exe90⤵PID:4736
-
\??\c:\vjppj.exec:\vjppj.exe91⤵PID:4400
-
\??\c:\frrrllr.exec:\frrrllr.exe92⤵PID:2000
-
\??\c:\9hhhtt.exec:\9hhhtt.exe93⤵PID:632
-
\??\c:\nhhhbb.exec:\nhhhbb.exe94⤵PID:1076
-
\??\c:\jdpvp.exec:\jdpvp.exe95⤵PID:996
-
\??\c:\dpvvp.exec:\dpvvp.exe96⤵PID:1008
-
\??\c:\5llfrrl.exec:\5llfrrl.exe97⤵PID:1372
-
\??\c:\thtnnn.exec:\thtnnn.exe98⤵PID:4336
-
\??\c:\hhnttt.exec:\hhnttt.exe99⤵PID:4744
-
\??\c:\jjvpv.exec:\jjvpv.exe100⤵PID:5004
-
\??\c:\rlrfrxr.exec:\rlrfrxr.exe101⤵PID:1676
-
\??\c:\lflfxxr.exec:\lflfxxr.exe102⤵PID:1064
-
\??\c:\httntn.exec:\httntn.exe103⤵PID:2312
-
\??\c:\jjvvd.exec:\jjvvd.exe104⤵PID:4464
-
\??\c:\ppvpd.exec:\ppvpd.exe105⤵PID:2980
-
\??\c:\flxrffx.exec:\flxrffx.exe106⤵PID:4964
-
\??\c:\hthhbb.exec:\hthhbb.exe107⤵PID:3968
-
\??\c:\3bhbbt.exec:\3bhbbt.exe108⤵PID:720
-
\??\c:\jdjdv.exec:\jdjdv.exe109⤵PID:2044
-
\??\c:\1rfxfll.exec:\1rfxfll.exe110⤵PID:4452
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe111⤵PID:4860
-
\??\c:\nhnbtt.exec:\nhnbtt.exe112⤵PID:2480
-
\??\c:\dppvp.exec:\dppvp.exe113⤵PID:3664
-
\??\c:\ppddp.exec:\ppddp.exe114⤵PID:3032
-
\??\c:\rlrlrrf.exec:\rlrlrrf.exe115⤵PID:4552
-
\??\c:\9flfffl.exec:\9flfffl.exe116⤵PID:4616
-
\??\c:\hbhhhh.exec:\hbhhhh.exe117⤵PID:448
-
\??\c:\nhtttt.exec:\nhtttt.exe118⤵PID:4892
-
\??\c:\vppjd.exec:\vppjd.exe119⤵PID:2484
-
\??\c:\rxxrffx.exec:\rxxrffx.exe120⤵PID:4676
-
\??\c:\9bbbtb.exec:\9bbbtb.exe121⤵PID:1760
-
\??\c:\tnbnnn.exec:\tnbnnn.exe122⤵PID:1576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-