Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d50dc2c01aac6349e0cccf40a18760f2.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
d50dc2c01aac6349e0cccf40a18760f2.exe
-
Size
266KB
-
MD5
d50dc2c01aac6349e0cccf40a18760f2
-
SHA1
84664fd5abd994631b27967a5972c6af9a818b93
-
SHA256
31abd0bea69bb7fe3a58f5c04150f3c21f2701a0315453d52204d4dc572206e4
-
SHA512
0531ff6cde44e6a5351c651b391f3b69c57fe6d4acdc046f830350afab50c015ca63733bf8a30fc451b387a06004a10224bb2c29481e247e030ea7f09f901644
-
SSDEEP
3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmPzTkV2y/QTa9RBZydZbf83pnzgmmIMr:n3C9BRIG0asYFm71mPfkVB8dKwaWb
Malware Config
Signatures
-
Detect Blackmoon payload 45 IoCs
resource yara_rule behavioral2/memory/1752-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3348-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1492-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/684-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4500-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1928-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4252-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4208-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4124-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4216-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1096-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1368-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4552-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/968-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2428-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/544-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2844-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3448-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/660-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2580-234-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2160-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/808-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2768-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/900-256-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3800-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-297-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2264-311-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2116-324-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2188-334-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3056-339-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4336-357-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4312-376-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2428-381-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1372-394-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2640-403-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-415-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-420-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3916-442-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 5032 xlrlffx.exe 1492 44002.exe 3348 htbttt.exe 548 664640.exe 684 rxrrxxf.exe 4500 480686.exe 1928 20822.exe 1804 s6888.exe 4252 dpppj.exe 2144 tbhhbh.exe 4208 9pvpj.exe 4124 222268.exe 1096 8686228.exe 2948 602666.exe 4216 4444002.exe 2652 nnttbt.exe 4944 pvvpj.exe 2252 844860.exe 3628 vppjd.exe 1368 6822608.exe 4660 jdvvp.exe 4552 ttbtbb.exe 968 8644848.exe 2428 nbhhnn.exe 544 hnnntn.exe 2844 nbbbtt.exe 3448 2004888.exe 216 fxffxxr.exe 3744 nhbbbn.exe 2676 3rxflrx.exe 660 dvjjp.exe 2392 xrxrxrl.exe 4848 jdjdv.exe 2580 084804.exe 2160 a2262.exe 808 60260.exe 2768 btnhnn.exe 900 q00488.exe 4900 820264.exe 3800 xllffll.exe 2908 xrlrllf.exe 4616 e62000.exe 1804 hbhbhh.exe 4088 46808.exe 3760 62248.exe 3660 600488.exe 2928 rlxrrrx.exe 2104 0666004.exe 4104 24044.exe 2264 rlxlfxl.exe 1360 hbbtnn.exe 3156 0448260.exe 2116 fllfxxr.exe 5048 bhbthh.exe 2188 bhhbbb.exe 3056 m0226.exe 3720 6404844.exe 4880 a8824.exe 3252 lflfrfx.exe 4336 lrxrrrl.exe 3044 1rrfxxr.exe 3404 dppjd.exe 5004 228200.exe 4312 frlfffl.exe -
resource yara_rule behavioral2/memory/1752-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1752-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3348-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1492-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/684-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4500-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4500-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1928-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4252-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4208-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4208-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4124-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4216-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1096-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1368-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4552-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/968-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/968-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2428-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/544-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2844-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3448-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/660-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2580-234-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2160-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/808-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/900-256-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3800-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3760-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3660-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-297-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2104-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-311-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2116-324-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2188-334-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3056-337-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3056-339-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3252-351-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4336-357-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3404-365-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-370-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4312-376-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2428-381-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1372-394-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3512-398-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2640-403-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-408-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-415-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-420-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3916-440-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3916-442-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 5032 1752 d50dc2c01aac6349e0cccf40a18760f2.exe 86 PID 1752 wrote to memory of 5032 1752 d50dc2c01aac6349e0cccf40a18760f2.exe 86 PID 1752 wrote to memory of 5032 1752 d50dc2c01aac6349e0cccf40a18760f2.exe 86 PID 5032 wrote to memory of 1492 5032 xlrlffx.exe 87 PID 5032 wrote to memory of 1492 5032 xlrlffx.exe 87 PID 5032 wrote to memory of 1492 5032 xlrlffx.exe 87 PID 1492 wrote to memory of 3348 1492 44002.exe 88 PID 1492 wrote to memory of 3348 1492 44002.exe 88 PID 1492 wrote to memory of 3348 1492 44002.exe 88 PID 3348 wrote to memory of 548 3348 htbttt.exe 89 PID 3348 wrote to memory of 548 3348 htbttt.exe 89 PID 3348 wrote to memory of 548 3348 htbttt.exe 89 PID 548 wrote to memory of 684 548 664640.exe 90 PID 548 wrote to memory of 684 548 664640.exe 90 PID 548 wrote to memory of 684 548 664640.exe 90 PID 684 wrote to memory of 4500 684 rxrrxxf.exe 91 PID 684 wrote to memory of 4500 684 rxrrxxf.exe 91 PID 684 wrote to memory of 4500 684 rxrrxxf.exe 91 PID 4500 wrote to memory of 1928 4500 480686.exe 92 PID 4500 wrote to memory of 1928 4500 480686.exe 92 PID 4500 wrote to memory of 1928 4500 480686.exe 92 PID 1928 wrote to memory of 1804 1928 20822.exe 93 PID 1928 wrote to memory of 1804 1928 20822.exe 93 PID 1928 wrote to memory of 1804 1928 20822.exe 93 PID 1804 wrote to memory of 4252 1804 s6888.exe 94 PID 1804 wrote to memory of 4252 1804 s6888.exe 94 PID 1804 wrote to memory of 4252 1804 s6888.exe 94 PID 4252 wrote to memory of 2144 4252 dpppj.exe 95 PID 4252 wrote to memory of 2144 4252 dpppj.exe 95 PID 4252 wrote to memory of 2144 4252 dpppj.exe 95 PID 2144 wrote to memory of 4208 2144 tbhhbh.exe 96 PID 2144 wrote to memory of 4208 2144 tbhhbh.exe 96 PID 2144 wrote to memory of 4208 2144 tbhhbh.exe 96 PID 4208 wrote to memory of 4124 4208 9pvpj.exe 98 PID 4208 wrote to memory of 4124 4208 9pvpj.exe 98 PID 4208 wrote to memory of 4124 4208 9pvpj.exe 98 PID 4124 wrote to memory of 1096 4124 222268.exe 99 PID 4124 wrote to memory of 1096 4124 222268.exe 99 PID 4124 wrote to memory of 1096 4124 222268.exe 99 PID 1096 wrote to memory of 2948 1096 8686228.exe 101 PID 1096 wrote to memory of 2948 1096 8686228.exe 101 PID 1096 wrote to memory of 2948 1096 8686228.exe 101 PID 2948 wrote to memory of 4216 2948 602666.exe 102 PID 2948 wrote to memory of 4216 2948 602666.exe 102 PID 2948 wrote to memory of 4216 2948 602666.exe 102 PID 4216 wrote to memory of 2652 4216 4444002.exe 103 PID 4216 wrote to memory of 2652 4216 4444002.exe 103 PID 4216 wrote to memory of 2652 4216 4444002.exe 103 PID 2652 wrote to memory of 4944 2652 nnttbt.exe 104 PID 2652 wrote to memory of 4944 2652 nnttbt.exe 104 PID 2652 wrote to memory of 4944 2652 nnttbt.exe 104 PID 4944 wrote to memory of 2252 4944 pvvpj.exe 105 PID 4944 wrote to memory of 2252 4944 pvvpj.exe 105 PID 4944 wrote to memory of 2252 4944 pvvpj.exe 105 PID 2252 wrote to memory of 3628 2252 844860.exe 106 PID 2252 wrote to memory of 3628 2252 844860.exe 106 PID 2252 wrote to memory of 3628 2252 844860.exe 106 PID 3628 wrote to memory of 1368 3628 vppjd.exe 108 PID 3628 wrote to memory of 1368 3628 vppjd.exe 108 PID 3628 wrote to memory of 1368 3628 vppjd.exe 108 PID 1368 wrote to memory of 4660 1368 6822608.exe 109 PID 1368 wrote to memory of 4660 1368 6822608.exe 109 PID 1368 wrote to memory of 4660 1368 6822608.exe 109 PID 4660 wrote to memory of 4552 4660 jdvvp.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\d50dc2c01aac6349e0cccf40a18760f2.exe"C:\Users\Admin\AppData\Local\Temp\d50dc2c01aac6349e0cccf40a18760f2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
\??\c:\xlrlffx.exec:\xlrlffx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\44002.exec:\44002.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1492 -
\??\c:\htbttt.exec:\htbttt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\664640.exec:\664640.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\rxrrxxf.exec:\rxrrxxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:684 -
\??\c:\480686.exec:\480686.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\20822.exec:\20822.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\s6888.exec:\s6888.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\dpppj.exec:\dpppj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\tbhhbh.exec:\tbhhbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\9pvpj.exec:\9pvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
\??\c:\222268.exec:\222268.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
\??\c:\8686228.exec:\8686228.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\602666.exec:\602666.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\4444002.exec:\4444002.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
\??\c:\nnttbt.exec:\nnttbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\pvvpj.exec:\pvvpj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\844860.exec:\844860.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\vppjd.exec:\vppjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\6822608.exec:\6822608.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
\??\c:\jdvvp.exec:\jdvvp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\ttbtbb.exec:\ttbtbb.exe23⤵
- Executes dropped EXE
PID:4552 -
\??\c:\8644848.exec:\8644848.exe24⤵
- Executes dropped EXE
PID:968 -
\??\c:\nbhhnn.exec:\nbhhnn.exe25⤵
- Executes dropped EXE
PID:2428 -
\??\c:\hnnntn.exec:\hnnntn.exe26⤵
- Executes dropped EXE
PID:544 -
\??\c:\nbbbtt.exec:\nbbbtt.exe27⤵
- Executes dropped EXE
PID:2844 -
\??\c:\2004888.exec:\2004888.exe28⤵
- Executes dropped EXE
PID:3448 -
\??\c:\fxffxxr.exec:\fxffxxr.exe29⤵
- Executes dropped EXE
PID:216 -
\??\c:\nhbbbn.exec:\nhbbbn.exe30⤵
- Executes dropped EXE
PID:3744 -
\??\c:\3rxflrx.exec:\3rxflrx.exe31⤵
- Executes dropped EXE
PID:2676 -
\??\c:\dvjjp.exec:\dvjjp.exe32⤵
- Executes dropped EXE
PID:660 -
\??\c:\xrxrxrl.exec:\xrxrxrl.exe33⤵
- Executes dropped EXE
PID:2392 -
\??\c:\7hhhhh.exec:\7hhhhh.exe34⤵PID:4384
-
\??\c:\jdjdv.exec:\jdjdv.exe35⤵
- Executes dropped EXE
PID:4848 -
\??\c:\084804.exec:\084804.exe36⤵
- Executes dropped EXE
PID:2580 -
\??\c:\a2262.exec:\a2262.exe37⤵
- Executes dropped EXE
PID:2160 -
\??\c:\60260.exec:\60260.exe38⤵
- Executes dropped EXE
PID:808 -
\??\c:\btnhnn.exec:\btnhnn.exe39⤵
- Executes dropped EXE
PID:2768 -
\??\c:\q00488.exec:\q00488.exe40⤵
- Executes dropped EXE
PID:900 -
\??\c:\820264.exec:\820264.exe41⤵
- Executes dropped EXE
PID:4900 -
\??\c:\xllffll.exec:\xllffll.exe42⤵
- Executes dropped EXE
PID:3800 -
\??\c:\xrlrllf.exec:\xrlrllf.exe43⤵
- Executes dropped EXE
PID:2908 -
\??\c:\e62000.exec:\e62000.exe44⤵
- Executes dropped EXE
PID:4616 -
\??\c:\hbhbhh.exec:\hbhbhh.exe45⤵
- Executes dropped EXE
PID:1804 -
\??\c:\46808.exec:\46808.exe46⤵
- Executes dropped EXE
PID:4088 -
\??\c:\62248.exec:\62248.exe47⤵
- Executes dropped EXE
PID:3760 -
\??\c:\600488.exec:\600488.exe48⤵
- Executes dropped EXE
PID:3660 -
\??\c:\rlxrrrx.exec:\rlxrrrx.exe49⤵
- Executes dropped EXE
PID:2928 -
\??\c:\0666004.exec:\0666004.exe50⤵
- Executes dropped EXE
PID:2104 -
\??\c:\24044.exec:\24044.exe51⤵
- Executes dropped EXE
PID:4104 -
\??\c:\rlxlfxl.exec:\rlxlfxl.exe52⤵
- Executes dropped EXE
PID:2264 -
\??\c:\hbbtnn.exec:\hbbtnn.exe53⤵
- Executes dropped EXE
PID:1360 -
\??\c:\0448260.exec:\0448260.exe54⤵
- Executes dropped EXE
PID:3156 -
\??\c:\fllfxxr.exec:\fllfxxr.exe55⤵
- Executes dropped EXE
PID:2116 -
\??\c:\bhbthh.exec:\bhbthh.exe56⤵
- Executes dropped EXE
PID:5048 -
\??\c:\bhhbbb.exec:\bhhbbb.exe57⤵
- Executes dropped EXE
PID:2188 -
\??\c:\m0226.exec:\m0226.exe58⤵
- Executes dropped EXE
PID:3056 -
\??\c:\6404844.exec:\6404844.exe59⤵
- Executes dropped EXE
PID:3720 -
\??\c:\a8824.exec:\a8824.exe60⤵
- Executes dropped EXE
PID:4880 -
\??\c:\lflfrfx.exec:\lflfrfx.exe61⤵
- Executes dropped EXE
PID:3252 -
\??\c:\lrxrrrl.exec:\lrxrrrl.exe62⤵
- Executes dropped EXE
PID:4336 -
\??\c:\1rrfxxr.exec:\1rrfxxr.exe63⤵
- Executes dropped EXE
PID:3044 -
\??\c:\dppjd.exec:\dppjd.exe64⤵
- Executes dropped EXE
PID:3404 -
\??\c:\228200.exec:\228200.exe65⤵
- Executes dropped EXE
PID:5004 -
\??\c:\frlfffl.exec:\frlfffl.exe66⤵
- Executes dropped EXE
PID:4312 -
\??\c:\c022222.exec:\c022222.exe67⤵PID:2428
-
\??\c:\dppvd.exec:\dppvd.exe68⤵PID:1612
-
\??\c:\462284.exec:\462284.exe69⤵PID:3288
-
\??\c:\2604882.exec:\2604882.exe70⤵PID:1372
-
\??\c:\7nhhhb.exec:\7nhhhb.exe71⤵PID:3512
-
\??\c:\5rxlffx.exec:\5rxlffx.exe72⤵PID:2640
-
\??\c:\68466.exec:\68466.exe73⤵PID:3436
-
\??\c:\vppjj.exec:\vppjj.exe74⤵PID:2676
-
\??\c:\60004.exec:\60004.exe75⤵PID:4864
-
\??\c:\06260.exec:\06260.exe76⤵PID:3028
-
\??\c:\4800404.exec:\4800404.exe77⤵PID:4384
-
\??\c:\284224.exec:\284224.exe78⤵PID:1480
-
\??\c:\62482.exec:\62482.exe79⤵PID:3924
-
\??\c:\1nhtnn.exec:\1nhtnn.exe80⤵PID:3916
-
\??\c:\rlxffrx.exec:\rlxffrx.exe81⤵PID:5104
-
\??\c:\846064.exec:\846064.exe82⤵PID:5020
-
\??\c:\hhbttn.exec:\hhbttn.exe83⤵PID:4060
-
\??\c:\604266.exec:\604266.exe84⤵PID:2444
-
\??\c:\26822.exec:\26822.exe85⤵PID:4172
-
\??\c:\0804484.exec:\0804484.exe86⤵PID:3912
-
\??\c:\dpdvj.exec:\dpdvj.exe87⤵PID:2732
-
\??\c:\pvddv.exec:\pvddv.exe88⤵PID:1276
-
\??\c:\xxfxxrx.exec:\xxfxxrx.exe89⤵PID:4496
-
\??\c:\q06666.exec:\q06666.exe90⤵PID:1688
-
\??\c:\7fxlffx.exec:\7fxlffx.exe91⤵PID:4184
-
\??\c:\s8826.exec:\s8826.exe92⤵PID:2560
-
\??\c:\thnhbb.exec:\thnhbb.exe93⤵PID:2272
-
\??\c:\640048.exec:\640048.exe94⤵PID:2264
-
\??\c:\tttnhn.exec:\tttnhn.exe95⤵PID:3524
-
\??\c:\66664.exec:\66664.exe96⤵PID:2164
-
\??\c:\w68446.exec:\w68446.exe97⤵PID:3668
-
\??\c:\666604.exec:\666604.exe98⤵PID:5068
-
\??\c:\9ttnbb.exec:\9ttnbb.exe99⤵PID:1472
-
\??\c:\vdjdv.exec:\vdjdv.exe100⤵PID:2712
-
\??\c:\jdvpv.exec:\jdvpv.exe101⤵PID:3268
-
\??\c:\5llfxfx.exec:\5llfxfx.exe102⤵PID:3352
-
\??\c:\rlrrxrx.exec:\rlrrxrx.exe103⤵PID:2540
-
\??\c:\rrlfffx.exec:\rrlfffx.exe104⤵PID:2420
-
\??\c:\jjjvj.exec:\jjjvj.exe105⤵PID:544
-
\??\c:\ppdvp.exec:\ppdvp.exe106⤵PID:3876
-
\??\c:\240446.exec:\240446.exe107⤵PID:1496
-
\??\c:\02226.exec:\02226.exe108⤵PID:376
-
\??\c:\flrfxlf.exec:\flrfxlf.exe109⤵PID:3512
-
\??\c:\xxxffxf.exec:\xxxffxf.exe110⤵PID:4064
-
\??\c:\hnnbnb.exec:\hnnbnb.exe111⤵PID:4640
-
\??\c:\ffrrrxx.exec:\ffrrrxx.exe112⤵PID:232
-
\??\c:\4846666.exec:\4846666.exe113⤵PID:2312
-
\??\c:\228844.exec:\228844.exe114⤵PID:3028
-
\??\c:\6848226.exec:\6848226.exe115⤵PID:2580
-
\??\c:\26824.exec:\26824.exe116⤵PID:4464
-
\??\c:\thnhbt.exec:\thnhbt.exe117⤵PID:548
-
\??\c:\4622666.exec:\4622666.exe118⤵PID:3916
-
\??\c:\i402288.exec:\i402288.exe119⤵PID:5052
-
\??\c:\dppjd.exec:\dppjd.exe120⤵PID:1088
-
\??\c:\04268.exec:\04268.exe121⤵PID:4500
-
\??\c:\822260.exec:\822260.exe122⤵PID:2908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-