Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/09/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe
Resource
win7-20240729-en
General
-
Target
5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe
-
Size
230KB
-
MD5
d36ab0bd58ada2d5fb9f6560c8d8bf30
-
SHA1
4a5bba862c57082a57dbc212d5ea77bc8052e2c3
-
SHA256
5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed
-
SHA512
7bfa5722700e4d1b02c93d19efdf9b5e7aaa8ca26c89e177fa2bf6dcfe66c5446e584087bd83ae7b5349c7af8d047b702a34dd4a8a5c7fff734529825cbb6d9b
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1f7:n3C9BRo7MlrWKo+lxKk1f7
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral2/memory/2388-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-13-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2128-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1628-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1304-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2296-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3236-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2748-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1040-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3392-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4300-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/996-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3592-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3184-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2440-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1760-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1560-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2300 rrrfxxl.exe 2128 bthhhh.exe 1560 jdpjp.exe 624 dpvpj.exe 4592 fxxfxrl.exe 1004 tthhtt.exe 1628 tthtbt.exe 1304 jdjvv.exe 1760 jpdvp.exe 1336 lrlxrlf.exe 1576 7hnhbb.exe 2440 btttbb.exe 3184 vpjdd.exe 3592 vvpjd.exe 3340 rxffxxr.exe 996 hnnnht.exe 4300 nbnhhh.exe 3392 vpjdd.exe 4616 vpvpp.exe 840 7ffxxxr.exe 3100 xxxxlxx.exe 1040 ttnttt.exe 2748 1ttbbb.exe 3236 pppjj.exe 920 xrrlffx.exe 2296 9ffxrxr.exe 2100 bbttnn.exe 4500 tnnhbb.exe 2720 jdpjd.exe 2688 xrxlflf.exe 2328 ffrrrrr.exe 4208 thhhbh.exe 4496 bnthbb.exe 400 pjvpp.exe 4960 frlfrrl.exe 3104 rflfxrl.exe 4460 ntbnnh.exe 852 pjppj.exe 4480 rxxxrxr.exe 4012 rllffxx.exe 2920 hbhhht.exe 508 dvddv.exe 3036 ffrrrrr.exe 3028 nntnnn.exe 3328 ppdvp.exe 1348 7ddpj.exe 3744 1lfflxf.exe 4424 tntthn.exe 2924 nnnnnn.exe 3872 pjvpj.exe 2376 xfrlffx.exe 624 lrrrlll.exe 1212 9hhbbb.exe 5004 tntnht.exe 4192 vpppp.exe 4968 rrfffrf.exe 4288 nnhhbb.exe 4520 btbtnb.exe 3344 7jppj.exe 4832 lrfxxrr.exe 3592 9bbbbh.exe 3340 nhnhnn.exe 3576 pjpjp.exe 2820 jvvvp.exe -
resource yara_rule behavioral2/memory/2388-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2128-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1628-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1304-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2296-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3236-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2748-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1040-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3392-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4300-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/996-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3184-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1576-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1760-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1560-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2300-12-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttttnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rxrlff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rrrlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2300 2388 5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe 83 PID 2388 wrote to memory of 2300 2388 5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe 83 PID 2388 wrote to memory of 2300 2388 5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe 83 PID 2300 wrote to memory of 2128 2300 rrrfxxl.exe 84 PID 2300 wrote to memory of 2128 2300 rrrfxxl.exe 84 PID 2300 wrote to memory of 2128 2300 rrrfxxl.exe 84 PID 2128 wrote to memory of 1560 2128 bthhhh.exe 85 PID 2128 wrote to memory of 1560 2128 bthhhh.exe 85 PID 2128 wrote to memory of 1560 2128 bthhhh.exe 85 PID 1560 wrote to memory of 624 1560 jdpjp.exe 86 PID 1560 wrote to memory of 624 1560 jdpjp.exe 86 PID 1560 wrote to memory of 624 1560 jdpjp.exe 86 PID 624 wrote to memory of 4592 624 dpvpj.exe 87 PID 624 wrote to memory of 4592 624 dpvpj.exe 87 PID 624 wrote to memory of 4592 624 dpvpj.exe 87 PID 4592 wrote to memory of 1004 4592 fxxfxrl.exe 88 PID 4592 wrote to memory of 1004 4592 fxxfxrl.exe 88 PID 4592 wrote to memory of 1004 4592 fxxfxrl.exe 88 PID 1004 wrote to memory of 1628 1004 tthhtt.exe 89 PID 1004 wrote to memory of 1628 1004 tthhtt.exe 89 PID 1004 wrote to memory of 1628 1004 tthhtt.exe 89 PID 1628 wrote to memory of 1304 1628 tthtbt.exe 90 PID 1628 wrote to memory of 1304 1628 tthtbt.exe 90 PID 1628 wrote to memory of 1304 1628 tthtbt.exe 90 PID 1304 wrote to memory of 1760 1304 jdjvv.exe 92 PID 1304 wrote to memory of 1760 1304 jdjvv.exe 92 PID 1304 wrote to memory of 1760 1304 jdjvv.exe 92 PID 1760 wrote to memory of 1336 1760 jpdvp.exe 93 PID 1760 wrote to memory of 1336 1760 jpdvp.exe 93 PID 1760 wrote to memory of 1336 1760 jpdvp.exe 93 PID 1336 wrote to memory of 1576 1336 lrlxrlf.exe 94 PID 1336 wrote to memory of 1576 1336 lrlxrlf.exe 94 PID 1336 wrote to memory of 1576 1336 lrlxrlf.exe 94 PID 1576 wrote to memory of 2440 1576 7hnhbb.exe 95 PID 1576 wrote to memory of 2440 1576 7hnhbb.exe 95 PID 1576 wrote to memory of 2440 1576 7hnhbb.exe 95 PID 2440 wrote to memory of 3184 2440 btttbb.exe 96 PID 2440 wrote to memory of 3184 2440 btttbb.exe 96 PID 2440 wrote to memory of 3184 2440 btttbb.exe 96 PID 3184 wrote to memory of 3592 3184 vpjdd.exe 97 PID 3184 wrote to memory of 3592 3184 vpjdd.exe 97 PID 3184 wrote to memory of 3592 3184 vpjdd.exe 97 PID 3592 wrote to memory of 3340 3592 vvpjd.exe 98 PID 3592 wrote to memory of 3340 3592 vvpjd.exe 98 PID 3592 wrote to memory of 3340 3592 vvpjd.exe 98 PID 3340 wrote to memory of 996 3340 rxffxxr.exe 99 PID 3340 wrote to memory of 996 3340 rxffxxr.exe 99 PID 3340 wrote to memory of 996 3340 rxffxxr.exe 99 PID 996 wrote to memory of 4300 996 hnnnht.exe 100 PID 996 wrote to memory of 4300 996 hnnnht.exe 100 PID 996 wrote to memory of 4300 996 hnnnht.exe 100 PID 4300 wrote to memory of 3392 4300 nbnhhh.exe 101 PID 4300 wrote to memory of 3392 4300 nbnhhh.exe 101 PID 4300 wrote to memory of 3392 4300 nbnhhh.exe 101 PID 3392 wrote to memory of 4616 3392 vpjdd.exe 102 PID 3392 wrote to memory of 4616 3392 vpjdd.exe 102 PID 3392 wrote to memory of 4616 3392 vpjdd.exe 102 PID 4616 wrote to memory of 840 4616 vpvpp.exe 103 PID 4616 wrote to memory of 840 4616 vpvpp.exe 103 PID 4616 wrote to memory of 840 4616 vpvpp.exe 103 PID 840 wrote to memory of 3100 840 7ffxxxr.exe 104 PID 840 wrote to memory of 3100 840 7ffxxxr.exe 104 PID 840 wrote to memory of 3100 840 7ffxxxr.exe 104 PID 3100 wrote to memory of 1040 3100 xxxxlxx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe"C:\Users\Admin\AppData\Local\Temp\5f21ac1f06ad83af166db002e2c7a8cd0bd3473f996599ee20c081f8a781a1ed.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\rrrfxxl.exec:\rrrfxxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\bthhhh.exec:\bthhhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\jdpjp.exec:\jdpjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\dpvpj.exec:\dpvpj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
\??\c:\fxxfxrl.exec:\fxxfxrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\tthhtt.exec:\tthhtt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\tthtbt.exec:\tthtbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
\??\c:\jdjvv.exec:\jdjvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
\??\c:\jpdvp.exec:\jpdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
\??\c:\lrlxrlf.exec:\lrlxrlf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\7hnhbb.exec:\7hnhbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\btttbb.exec:\btttbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\vpjdd.exec:\vpjdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
\??\c:\vvpjd.exec:\vvpjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
\??\c:\rxffxxr.exec:\rxffxxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
\??\c:\hnnnht.exec:\hnnnht.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\nbnhhh.exec:\nbnhhh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\vpjdd.exec:\vpjdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
\??\c:\vpvpp.exec:\vpvpp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
\??\c:\7ffxxxr.exec:\7ffxxxr.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
\??\c:\xxxxlxx.exec:\xxxxlxx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
\??\c:\ttnttt.exec:\ttnttt.exe23⤵
- Executes dropped EXE
PID:1040 -
\??\c:\1ttbbb.exec:\1ttbbb.exe24⤵
- Executes dropped EXE
PID:2748 -
\??\c:\pppjj.exec:\pppjj.exe25⤵
- Executes dropped EXE
PID:3236 -
\??\c:\xrrlffx.exec:\xrrlffx.exe26⤵
- Executes dropped EXE
PID:920 -
\??\c:\9ffxrxr.exec:\9ffxrxr.exe27⤵
- Executes dropped EXE
PID:2296 -
\??\c:\bbttnn.exec:\bbttnn.exe28⤵
- Executes dropped EXE
PID:2100 -
\??\c:\tnnhbb.exec:\tnnhbb.exe29⤵
- Executes dropped EXE
PID:4500 -
\??\c:\jdpjd.exec:\jdpjd.exe30⤵
- Executes dropped EXE
PID:2720 -
\??\c:\xrxlflf.exec:\xrxlflf.exe31⤵
- Executes dropped EXE
PID:2688 -
\??\c:\ffrrrrr.exec:\ffrrrrr.exe32⤵
- Executes dropped EXE
PID:2328 -
\??\c:\thhhbh.exec:\thhhbh.exe33⤵
- Executes dropped EXE
PID:4208 -
\??\c:\bnthbb.exec:\bnthbb.exe34⤵
- Executes dropped EXE
PID:4496 -
\??\c:\pjvpp.exec:\pjvpp.exe35⤵
- Executes dropped EXE
PID:400 -
\??\c:\frlfrrl.exec:\frlfrrl.exe36⤵
- Executes dropped EXE
PID:4960 -
\??\c:\rflfxrl.exec:\rflfxrl.exe37⤵
- Executes dropped EXE
PID:3104 -
\??\c:\ntbnnh.exec:\ntbnnh.exe38⤵
- Executes dropped EXE
PID:4460 -
\??\c:\pjppj.exec:\pjppj.exe39⤵
- Executes dropped EXE
PID:852 -
\??\c:\rxxxrxr.exec:\rxxxrxr.exe40⤵
- Executes dropped EXE
PID:4480 -
\??\c:\rllffxx.exec:\rllffxx.exe41⤵
- Executes dropped EXE
PID:4012 -
\??\c:\hbhhht.exec:\hbhhht.exe42⤵
- Executes dropped EXE
PID:2920 -
\??\c:\dvddv.exec:\dvddv.exe43⤵
- Executes dropped EXE
PID:508 -
\??\c:\ffrrrrr.exec:\ffrrrrr.exe44⤵
- Executes dropped EXE
PID:3036 -
\??\c:\nntnnn.exec:\nntnnn.exe45⤵
- Executes dropped EXE
PID:3028 -
\??\c:\ppdvp.exec:\ppdvp.exe46⤵
- Executes dropped EXE
PID:3328 -
\??\c:\7ddpj.exec:\7ddpj.exe47⤵
- Executes dropped EXE
PID:1348 -
\??\c:\1lfflxf.exec:\1lfflxf.exe48⤵
- Executes dropped EXE
PID:3744 -
\??\c:\tntthn.exec:\tntthn.exe49⤵
- Executes dropped EXE
PID:4424 -
\??\c:\nnnnnn.exec:\nnnnnn.exe50⤵
- Executes dropped EXE
PID:2924 -
\??\c:\pjvpj.exec:\pjvpj.exe51⤵
- Executes dropped EXE
PID:3872 -
\??\c:\xfrlffx.exec:\xfrlffx.exe52⤵
- Executes dropped EXE
PID:2376 -
\??\c:\lrrrlll.exec:\lrrrlll.exe53⤵
- Executes dropped EXE
PID:624 -
\??\c:\9hhbbb.exec:\9hhbbb.exe54⤵
- Executes dropped EXE
PID:1212 -
\??\c:\tntnht.exec:\tntnht.exe55⤵
- Executes dropped EXE
PID:5004 -
\??\c:\vpppp.exec:\vpppp.exe56⤵
- Executes dropped EXE
PID:4192 -
\??\c:\rrfffrf.exec:\rrfffrf.exe57⤵
- Executes dropped EXE
PID:4968 -
\??\c:\nnhhbb.exec:\nnhhbb.exe58⤵
- Executes dropped EXE
PID:4288 -
\??\c:\btbtnb.exec:\btbtnb.exe59⤵
- Executes dropped EXE
PID:4520 -
\??\c:\7jppj.exec:\7jppj.exe60⤵
- Executes dropped EXE
PID:3344 -
\??\c:\lrfxxrr.exec:\lrfxxrr.exe61⤵
- Executes dropped EXE
PID:4832 -
\??\c:\9bbbbh.exec:\9bbbbh.exe62⤵
- Executes dropped EXE
PID:3592 -
\??\c:\nhnhnn.exec:\nhnhnn.exe63⤵
- Executes dropped EXE
PID:3340 -
\??\c:\pjpjp.exec:\pjpjp.exe64⤵
- Executes dropped EXE
PID:3576 -
\??\c:\jvvvp.exec:\jvvvp.exe65⤵
- Executes dropped EXE
PID:2820 -
\??\c:\5fffxxx.exec:\5fffxxx.exe66⤵PID:3168
-
\??\c:\hbbbtb.exec:\hbbbtb.exe67⤵PID:4784
-
\??\c:\vpvpp.exec:\vpvpp.exe68⤵PID:5108
-
\??\c:\lfrllfx.exec:\lfrllfx.exe69⤵PID:2392
-
\??\c:\flxrrrf.exec:\flxrrrf.exe70⤵PID:1188
-
\??\c:\tnbbnn.exec:\tnbbnn.exe71⤵PID:3684
-
\??\c:\vpdvv.exec:\vpdvv.exe72⤵PID:4768
-
\??\c:\dpjjv.exec:\dpjjv.exe73⤵PID:2644
-
\??\c:\rrlfxrr.exec:\rrlfxrr.exe74⤵PID:3228
-
\??\c:\nnbhnn.exec:\nnbhnn.exe75⤵PID:3220
-
\??\c:\tnbntn.exec:\tnbntn.exe76⤵PID:664
-
\??\c:\jjjdv.exec:\jjjdv.exe77⤵PID:2884
-
\??\c:\lfrlxxl.exec:\lfrlxxl.exe78⤵PID:3056
-
\??\c:\tntnbt.exec:\tntnbt.exe79⤵PID:3892
-
\??\c:\nnnhnn.exec:\nnnhnn.exe80⤵PID:2060
-
\??\c:\pvvpj.exec:\pvvpj.exe81⤵PID:4472
-
\??\c:\lfxfxlf.exec:\lfxfxlf.exe82⤵PID:3104
-
\??\c:\xlrrllf.exec:\xlrrllf.exe83⤵PID:4248
-
\??\c:\nhnnnn.exec:\nhnnnn.exe84⤵
- System Location Discovery: System Language Discovery
PID:852 -
\??\c:\nbnhbb.exec:\nbnhbb.exe85⤵PID:3512
-
\??\c:\jdvpd.exec:\jdvpd.exe86⤵PID:3820
-
\??\c:\vjvpj.exec:\vjvpj.exe87⤵PID:4736
-
\??\c:\llflrxx.exec:\llflrxx.exe88⤵PID:1612
-
\??\c:\thnnhh.exec:\thnnhh.exe89⤵PID:2668
-
\??\c:\tnnnhh.exec:\tnnnhh.exe90⤵PID:3264
-
\??\c:\9ppjd.exec:\9ppjd.exe91⤵PID:808
-
\??\c:\vvdvj.exec:\vvdvj.exe92⤵PID:4024
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe93⤵PID:2528
-
\??\c:\xrrrrrr.exec:\xrrrrrr.exe94⤵PID:3268
-
\??\c:\3bbtbb.exec:\3bbtbb.exe95⤵PID:3028
-
\??\c:\pjppd.exec:\pjppd.exe96⤵PID:540
-
\??\c:\dvddv.exec:\dvddv.exe97⤵PID:1348
-
\??\c:\1flfllf.exec:\1flfllf.exe98⤵PID:2120
-
\??\c:\7rllffx.exec:\7rllffx.exe99⤵PID:4424
-
\??\c:\bnnnhh.exec:\bnnnhh.exe100⤵PID:2300
-
\??\c:\hbtnbt.exec:\hbtnbt.exe101⤵PID:220
-
\??\c:\dpppd.exec:\dpppd.exe102⤵PID:1660
-
\??\c:\dvpjd.exec:\dvpjd.exe103⤵PID:4592
-
\??\c:\llfxrrl.exec:\llfxrrl.exe104⤵PID:2156
-
\??\c:\hbtnnt.exec:\hbtnnt.exe105⤵PID:4908
-
\??\c:\htbthb.exec:\htbthb.exe106⤵PID:4508
-
\??\c:\7jjdv.exec:\7jjdv.exe107⤵PID:4524
-
\??\c:\pjvpj.exec:\pjvpj.exe108⤵PID:1960
-
\??\c:\3xlllll.exec:\3xlllll.exe109⤵PID:1128
-
\??\c:\tbbbtt.exec:\tbbbtt.exe110⤵PID:3184
-
\??\c:\nhnnnb.exec:\nhnnnb.exe111⤵PID:1104
-
\??\c:\7jpjv.exec:\7jpjv.exe112⤵PID:620
-
\??\c:\5xfxrrr.exec:\5xfxrrr.exe113⤵PID:996
-
\??\c:\lxfxrlf.exec:\lxfxrlf.exe114⤵PID:4252
-
\??\c:\hbhhhh.exec:\hbhhhh.exe115⤵PID:4300
-
\??\c:\dpdvj.exec:\dpdvj.exe116⤵PID:428
-
\??\c:\jpdjd.exec:\jpdjd.exe117⤵PID:4880
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe118⤵PID:3604
-
\??\c:\hhhhbt.exec:\hhhhbt.exe119⤵PID:688
-
\??\c:\ddppj.exec:\ddppj.exe120⤵PID:3100
-
\??\c:\djddp.exec:\djddp.exe121⤵PID:1040
-
\??\c:\fxrrrrr.exec:\fxrrrrr.exe122⤵PID:1832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-