Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 23:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe
Resource
win7-20240319-en
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe
-
Size
103KB
-
MD5
5c0cf48b202a45c512f07905ca72745d
-
SHA1
3c749115cd421e4d556114e0b7310f009e204de6
-
SHA256
7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8
-
SHA512
87f58ba0c834baeba3cb9402d6bfaf3d64489e4004f77dffeddb64168c2cbb47e6edbaedf0e68f95344df5f567448cc5eb27e443e83015a67059a969bebb86ea
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoTNKDeS98hPUdHV7RNzfnLnN3o2:ymb3NkkiQ3mdBjFo5KDe88g1fRcu
Malware Config
Signatures
-
Detect Blackmoon payload 33 IoCs
resource yara_rule behavioral1/memory/2348-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1096-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1128-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/980-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1256-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-293-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1056-312-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-322-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1728-337-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-391-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-427-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1588-491-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-500-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1140-508-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-635-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-636-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-645-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 61 IoCs
resource yara_rule behavioral1/memory/2348-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2368-13-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2232-23-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2516-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2528-41-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2528-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2760-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2756-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2756-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2752-85-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2544-95-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2732-105-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1096-114-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1784-143-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2688-163-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1736-172-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1704-199-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1704-201-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2300-210-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2300-212-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1128-222-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/560-231-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3052-241-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/980-251-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/980-253-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1256-263-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1644-273-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2896-293-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1056-312-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3028-322-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1728-336-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1728-337-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2216-352-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2748-367-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2448-391-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2424-411-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2640-426-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2640-427-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2248-442-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/592-457-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/876-465-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2512-473-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1476-481-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1588-489-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1588-491-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1736-498-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1736-500-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1140-508-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1140-507-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2940-516-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2992-553-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1092-568-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1624-583-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1136-612-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2128-620-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1456-635-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1456-636-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1956-645-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2232-659-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2540-688-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 2368 2mfb7i.exe 2232 fs72sj2.exe 2516 69795.exe 2528 o6gd6k.exe 2580 cgs9h.exe 2760 q9mo3vc.exe 2756 cun7m5.exe 2752 sd01dw.exe 2544 bkkk5m5.exe 2732 6w5e0.exe 1096 dmg5cq.exe 632 69im8.exe 1900 67wr9s.exe 1784 91wd47a.exe 304 54s11a3.exe 2688 o9175.exe 1736 i4qq7q.exe 1140 250t5.exe 2940 7wghs7.exe 1704 3sqm0g.exe 2300 misn2u.exe 1128 6s5pto6.exe 560 1j7e732.exe 3052 jd6nj.exe 980 b9bp9.exe 1256 egf1k5.exe 1644 q2mw5o.exe 2044 pv93f33.exe 2896 e8e93k.exe 2128 u7511i.exe 1056 mwgu38r.exe 3028 31i6i36.exe 1460 3wnqv7s.exe 1728 1g125so.exe 2184 07ai7.exe 2216 3x56p.exe 2672 2xcr7.exe 2748 0n75s8.exe 2556 ogi3ax0.exe 2764 lb6f0.exe 2448 ni95u.exe 2560 pait33.exe 2436 3d559g9.exe 2424 935s97k.exe 1708 6191115.exe 2640 dw8sd3.exe 1564 69ca3.exe 2248 86j7m2.exe 848 6wxik7.exe 592 j11799.exe 876 eu41t.exe 2512 v359qj.exe 1476 taxp8w5.exe 1588 s53535q.exe 1736 452i1.exe 1140 x3gs0.exe 2940 b8ggus.exe 2316 ggs77.exe 2264 ht0m8j8.exe 1948 ot8420g.exe 1128 p84cq.exe 2992 r9uro4.exe 328 sau7k5.exe 1092 27opvd.exe -
resource yara_rule behavioral1/memory/2348-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1096-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1128-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/560-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/980-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/980-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1256-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-273-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-293-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1056-312-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-322-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-336-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-337-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-352-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-367-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-391-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-411-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-426-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-427-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2248-442-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-457-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-465-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-473-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1476-481-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1588-489-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1588-491-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-498-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-500-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1140-508-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1140-507-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-516-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-553-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1092-568-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-583-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-612-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-620-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-635-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-636-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-645-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-659-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-688-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2368 2348 7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe 28 PID 2348 wrote to memory of 2368 2348 7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe 28 PID 2348 wrote to memory of 2368 2348 7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe 28 PID 2348 wrote to memory of 2368 2348 7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe 28 PID 2368 wrote to memory of 2232 2368 2mfb7i.exe 29 PID 2368 wrote to memory of 2232 2368 2mfb7i.exe 29 PID 2368 wrote to memory of 2232 2368 2mfb7i.exe 29 PID 2368 wrote to memory of 2232 2368 2mfb7i.exe 29 PID 2232 wrote to memory of 2516 2232 fs72sj2.exe 30 PID 2232 wrote to memory of 2516 2232 fs72sj2.exe 30 PID 2232 wrote to memory of 2516 2232 fs72sj2.exe 30 PID 2232 wrote to memory of 2516 2232 fs72sj2.exe 30 PID 2516 wrote to memory of 2528 2516 69795.exe 31 PID 2516 wrote to memory of 2528 2516 69795.exe 31 PID 2516 wrote to memory of 2528 2516 69795.exe 31 PID 2516 wrote to memory of 2528 2516 69795.exe 31 PID 2528 wrote to memory of 2580 2528 o6gd6k.exe 32 PID 2528 wrote to memory of 2580 2528 o6gd6k.exe 32 PID 2528 wrote to memory of 2580 2528 o6gd6k.exe 32 PID 2528 wrote to memory of 2580 2528 o6gd6k.exe 32 PID 2580 wrote to memory of 2760 2580 cgs9h.exe 33 PID 2580 wrote to memory of 2760 2580 cgs9h.exe 33 PID 2580 wrote to memory of 2760 2580 cgs9h.exe 33 PID 2580 wrote to memory of 2760 2580 cgs9h.exe 33 PID 2760 wrote to memory of 2756 2760 q9mo3vc.exe 34 PID 2760 wrote to memory of 2756 2760 q9mo3vc.exe 34 PID 2760 wrote to memory of 2756 2760 q9mo3vc.exe 34 PID 2760 wrote to memory of 2756 2760 q9mo3vc.exe 34 PID 2756 wrote to memory of 2752 2756 cun7m5.exe 35 PID 2756 wrote to memory of 2752 2756 cun7m5.exe 35 PID 2756 wrote to memory of 2752 2756 cun7m5.exe 35 PID 2756 wrote to memory of 2752 2756 cun7m5.exe 35 PID 2752 wrote to memory of 2544 2752 sd01dw.exe 36 PID 2752 wrote to memory of 2544 2752 sd01dw.exe 36 PID 2752 wrote to memory of 2544 2752 sd01dw.exe 36 PID 2752 wrote to memory of 2544 2752 sd01dw.exe 36 PID 2544 wrote to memory of 2732 2544 bkkk5m5.exe 37 PID 2544 wrote to memory of 2732 2544 bkkk5m5.exe 37 PID 2544 wrote to memory of 2732 2544 bkkk5m5.exe 37 PID 2544 wrote to memory of 2732 2544 bkkk5m5.exe 37 PID 2732 wrote to memory of 1096 2732 6w5e0.exe 38 PID 2732 wrote to memory of 1096 2732 6w5e0.exe 38 PID 2732 wrote to memory of 1096 2732 6w5e0.exe 38 PID 2732 wrote to memory of 1096 2732 6w5e0.exe 38 PID 1096 wrote to memory of 632 1096 dmg5cq.exe 39 PID 1096 wrote to memory of 632 1096 dmg5cq.exe 39 PID 1096 wrote to memory of 632 1096 dmg5cq.exe 39 PID 1096 wrote to memory of 632 1096 dmg5cq.exe 39 PID 632 wrote to memory of 1900 632 69im8.exe 40 PID 632 wrote to memory of 1900 632 69im8.exe 40 PID 632 wrote to memory of 1900 632 69im8.exe 40 PID 632 wrote to memory of 1900 632 69im8.exe 40 PID 1900 wrote to memory of 1784 1900 67wr9s.exe 41 PID 1900 wrote to memory of 1784 1900 67wr9s.exe 41 PID 1900 wrote to memory of 1784 1900 67wr9s.exe 41 PID 1900 wrote to memory of 1784 1900 67wr9s.exe 41 PID 1784 wrote to memory of 304 1784 91wd47a.exe 42 PID 1784 wrote to memory of 304 1784 91wd47a.exe 42 PID 1784 wrote to memory of 304 1784 91wd47a.exe 42 PID 1784 wrote to memory of 304 1784 91wd47a.exe 42 PID 304 wrote to memory of 2688 304 54s11a3.exe 43 PID 304 wrote to memory of 2688 304 54s11a3.exe 43 PID 304 wrote to memory of 2688 304 54s11a3.exe 43 PID 304 wrote to memory of 2688 304 54s11a3.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe"C:\Users\Admin\AppData\Local\Temp\7306dfaf84673f2db9fccdab2ee6b7baf118f208f8ee134a93f0bc215448b1c8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\2mfb7i.exec:\2mfb7i.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\fs72sj2.exec:\fs72sj2.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\69795.exec:\69795.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\o6gd6k.exec:\o6gd6k.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\cgs9h.exec:\cgs9h.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\q9mo3vc.exec:\q9mo3vc.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\cun7m5.exec:\cun7m5.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\sd01dw.exec:\sd01dw.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\bkkk5m5.exec:\bkkk5m5.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\6w5e0.exec:\6w5e0.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\dmg5cq.exec:\dmg5cq.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\69im8.exec:\69im8.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\67wr9s.exec:\67wr9s.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
\??\c:\91wd47a.exec:\91wd47a.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
\??\c:\54s11a3.exec:\54s11a3.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:304 -
\??\c:\o9175.exec:\o9175.exe17⤵
- Executes dropped EXE
PID:2688 -
\??\c:\i4qq7q.exec:\i4qq7q.exe18⤵
- Executes dropped EXE
PID:1736 -
\??\c:\250t5.exec:\250t5.exe19⤵
- Executes dropped EXE
PID:1140 -
\??\c:\7wghs7.exec:\7wghs7.exe20⤵
- Executes dropped EXE
PID:2940 -
\??\c:\3sqm0g.exec:\3sqm0g.exe21⤵
- Executes dropped EXE
PID:1704 -
\??\c:\misn2u.exec:\misn2u.exe22⤵
- Executes dropped EXE
PID:2300 -
\??\c:\6s5pto6.exec:\6s5pto6.exe23⤵
- Executes dropped EXE
PID:1128 -
\??\c:\1j7e732.exec:\1j7e732.exe24⤵
- Executes dropped EXE
PID:560 -
\??\c:\jd6nj.exec:\jd6nj.exe25⤵
- Executes dropped EXE
PID:3052 -
\??\c:\b9bp9.exec:\b9bp9.exe26⤵
- Executes dropped EXE
PID:980 -
\??\c:\egf1k5.exec:\egf1k5.exe27⤵
- Executes dropped EXE
PID:1256 -
\??\c:\q2mw5o.exec:\q2mw5o.exe28⤵
- Executes dropped EXE
PID:1644 -
\??\c:\pv93f33.exec:\pv93f33.exe29⤵
- Executes dropped EXE
PID:2044 -
\??\c:\e8e93k.exec:\e8e93k.exe30⤵
- Executes dropped EXE
PID:2896 -
\??\c:\u7511i.exec:\u7511i.exe31⤵
- Executes dropped EXE
PID:2128 -
\??\c:\mwgu38r.exec:\mwgu38r.exe32⤵
- Executes dropped EXE
PID:1056 -
\??\c:\31i6i36.exec:\31i6i36.exe33⤵
- Executes dropped EXE
PID:3028 -
\??\c:\3wnqv7s.exec:\3wnqv7s.exe34⤵
- Executes dropped EXE
PID:1460 -
\??\c:\1g125so.exec:\1g125so.exe35⤵
- Executes dropped EXE
PID:1728 -
\??\c:\07ai7.exec:\07ai7.exe36⤵
- Executes dropped EXE
PID:2184 -
\??\c:\3x56p.exec:\3x56p.exe37⤵
- Executes dropped EXE
PID:2216 -
\??\c:\2xcr7.exec:\2xcr7.exe38⤵
- Executes dropped EXE
PID:2672 -
\??\c:\0n75s8.exec:\0n75s8.exe39⤵
- Executes dropped EXE
PID:2748 -
\??\c:\ogi3ax0.exec:\ogi3ax0.exe40⤵
- Executes dropped EXE
PID:2556 -
\??\c:\lb6f0.exec:\lb6f0.exe41⤵
- Executes dropped EXE
PID:2764 -
\??\c:\ni95u.exec:\ni95u.exe42⤵
- Executes dropped EXE
PID:2448 -
\??\c:\pait33.exec:\pait33.exe43⤵
- Executes dropped EXE
PID:2560 -
\??\c:\3d559g9.exec:\3d559g9.exe44⤵
- Executes dropped EXE
PID:2436 -
\??\c:\935s97k.exec:\935s97k.exe45⤵
- Executes dropped EXE
PID:2424 -
\??\c:\6191115.exec:\6191115.exe46⤵
- Executes dropped EXE
PID:1708 -
\??\c:\dw8sd3.exec:\dw8sd3.exe47⤵
- Executes dropped EXE
PID:2640 -
\??\c:\69ca3.exec:\69ca3.exe48⤵
- Executes dropped EXE
PID:1564 -
\??\c:\86j7m2.exec:\86j7m2.exe49⤵
- Executes dropped EXE
PID:2248 -
\??\c:\6wxik7.exec:\6wxik7.exe50⤵
- Executes dropped EXE
PID:848 -
\??\c:\j11799.exec:\j11799.exe51⤵
- Executes dropped EXE
PID:592 -
\??\c:\eu41t.exec:\eu41t.exe52⤵
- Executes dropped EXE
PID:876 -
\??\c:\v359qj.exec:\v359qj.exe53⤵
- Executes dropped EXE
PID:2512 -
\??\c:\taxp8w5.exec:\taxp8w5.exe54⤵
- Executes dropped EXE
PID:1476 -
\??\c:\s53535q.exec:\s53535q.exe55⤵
- Executes dropped EXE
PID:1588 -
\??\c:\452i1.exec:\452i1.exe56⤵
- Executes dropped EXE
PID:1736 -
\??\c:\x3gs0.exec:\x3gs0.exe57⤵
- Executes dropped EXE
PID:1140 -
\??\c:\b8ggus.exec:\b8ggus.exe58⤵
- Executes dropped EXE
PID:2940 -
\??\c:\ggs77.exec:\ggs77.exe59⤵
- Executes dropped EXE
PID:2316 -
\??\c:\ht0m8j8.exec:\ht0m8j8.exe60⤵
- Executes dropped EXE
PID:2264 -
\??\c:\ot8420g.exec:\ot8420g.exe61⤵
- Executes dropped EXE
PID:1948 -
\??\c:\p84cq.exec:\p84cq.exe62⤵
- Executes dropped EXE
PID:1128 -
\??\c:\r9uro4.exec:\r9uro4.exe63⤵
- Executes dropped EXE
PID:2992 -
\??\c:\sau7k5.exec:\sau7k5.exe64⤵
- Executes dropped EXE
PID:328 -
\??\c:\27opvd.exec:\27opvd.exe65⤵
- Executes dropped EXE
PID:1092 -
\??\c:\si2q4m8.exec:\si2q4m8.exe66⤵PID:1368
-
\??\c:\2655759.exec:\2655759.exe67⤵PID:1624
-
\??\c:\7x3s38g.exec:\7x3s38g.exe68⤵PID:752
-
\??\c:\s8eqkc.exec:\s8eqkc.exe69⤵PID:2024
-
\??\c:\kkh5wkb.exec:\kkh5wkb.exe70⤵PID:1720
-
\??\c:\j3553q.exec:\j3553q.exe71⤵PID:1136
-
\??\c:\x7p6fh.exec:\x7p6fh.exe72⤵PID:2128
-
\??\c:\e6cr6n.exec:\e6cr6n.exe73⤵PID:852
-
\??\c:\3v53787.exec:\3v53787.exe74⤵PID:1456
-
\??\c:\7kne7.exec:\7kne7.exe75⤵PID:1956
-
\??\c:\f7w55s.exec:\f7w55s.exe76⤵PID:2236
-
\??\c:\9124f2.exec:\9124f2.exe77⤵PID:2232
-
\??\c:\8r90e.exec:\8r90e.exe78⤵PID:2568
-
\??\c:\bor513.exec:\bor513.exe79⤵PID:2772
-
\??\c:\ds533q.exec:\ds533q.exe80⤵PID:1220
-
\??\c:\vkd9kc.exec:\vkd9kc.exe81⤵PID:2540
-
\??\c:\a7971.exec:\a7971.exe82⤵PID:2596
-
\??\c:\f2v76.exec:\f2v76.exe83⤵PID:2420
-
\??\c:\7gh77.exec:\7gh77.exe84⤵PID:2588
-
\??\c:\q0gg10g.exec:\q0gg10g.exe85⤵PID:1908
-
\??\c:\837c5.exec:\837c5.exe86⤵PID:2932
-
\??\c:\1c6bm.exec:\1c6bm.exe87⤵PID:2220
-
\??\c:\9lf25.exec:\9lf25.exe88⤵PID:1708
-
\??\c:\69530h.exec:\69530h.exe89⤵PID:320
-
\??\c:\5q7u10.exec:\5q7u10.exe90⤵PID:1080
-
\??\c:\i549lh.exec:\i549lh.exe91⤵PID:632
-
\??\c:\jiu81.exec:\jiu81.exe92⤵PID:584
-
\??\c:\19ep2r.exec:\19ep2r.exe93⤵PID:588
-
\??\c:\m374u.exec:\m374u.exe94⤵PID:2648
-
\??\c:\wgsgea.exec:\wgsgea.exe95⤵PID:2512
-
\??\c:\x21vm.exec:\x21vm.exe96⤵PID:1284
-
\??\c:\03qvk.exec:\03qvk.exe97⤵PID:868
-
\??\c:\m6rw5.exec:\m6rw5.exe98⤵PID:2652
-
\??\c:\m514j4.exec:\m514j4.exe99⤵PID:2836
-
\??\c:\j52c0.exec:\j52c0.exe100⤵PID:2872
-
\??\c:\m8qmmh3.exec:\m8qmmh3.exe101⤵PID:640
-
\??\c:\38dd2.exec:\38dd2.exe102⤵PID:2324
-
\??\c:\d130ga.exec:\d130ga.exe103⤵PID:3032
-
\??\c:\4j379n5.exec:\4j379n5.exe104⤵PID:1764
-
\??\c:\43suu.exec:\43suu.exe105⤵PID:1500
-
\??\c:\3bf150h.exec:\3bf150h.exe106⤵PID:1828
-
\??\c:\pq9333.exec:\pq9333.exe107⤵PID:756
-
\??\c:\951398.exec:\951398.exe108⤵PID:1432
-
\??\c:\vr5tg.exec:\vr5tg.exe109⤵PID:2192
-
\??\c:\4ttd8.exec:\4ttd8.exe110⤵PID:2004
-
\??\c:\13bl3.exec:\13bl3.exe111⤵PID:2276
-
\??\c:\7c7597e.exec:\7c7597e.exe112⤵PID:2112
-
\??\c:\i0ssfq.exec:\i0ssfq.exe113⤵PID:2984
-
\??\c:\299qx.exec:\299qx.exe114⤵PID:1600
-
\??\c:\fah3ip.exec:\fah3ip.exe115⤵PID:1676
-
\??\c:\3cb4xr.exec:\3cb4xr.exe116⤵PID:1456
-
\??\c:\9r935.exec:\9r935.exe117⤵PID:2644
-
\??\c:\08rc2.exec:\08rc2.exe118⤵PID:2240
-
\??\c:\58b8mb3.exec:\58b8mb3.exe119⤵PID:2656
-
\??\c:\3f4jg.exec:\3f4jg.exe120⤵PID:2676
-
\??\c:\qc7904m.exec:\qc7904m.exe121⤵PID:2572
-
\??\c:\o7iigsg.exec:\o7iigsg.exe122⤵PID:2680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-