Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 06:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a599ee1085ee575689428222304fc280N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
a599ee1085ee575689428222304fc280N.exe
-
Size
230KB
-
MD5
a599ee1085ee575689428222304fc280
-
SHA1
a01d4a057661c1181dfdc120456069151ef20770
-
SHA256
a1c38a68b5bccf29121f4f585c719ffc70d0e1d111a0b0e15184df1a8523c209
-
SHA512
aebed0e624de3ff226cf3cfc196ee7a6e03ee9c5806e9537b469ee71ba4ceb3b774ef726b64ace6cb042585398c416fae69fbdf1d80f04d325b639ebd681a859
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1fu:n3C9BRo7MlrWKo+lxKk1fu
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/3312-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2460-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4812-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4448-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4808-48-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4856-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3832-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/512-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1528-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/828-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1424-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2456-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3244-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2464-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2672-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/64-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3752-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4764-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1888-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4812-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2992-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1688-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2460 9nbtnb.exe 4812 1jpjd.exe 4836 3bnnhh.exe 1780 222666.exe 4448 htbthh.exe 4808 84042.exe 3832 u626444.exe 4856 2682622.exe 512 q44822.exe 1528 dppjd.exe 1448 1pvpj.exe 3928 bhhbtb.exe 828 684040.exe 1424 006044.exe 2464 88808.exe 2456 2608266.exe 3244 llfxxxr.exe 3092 8460604.exe 2672 rlrxxrl.exe 3192 422200.exe 3752 rxxxrrl.exe 64 nbhbtb.exe 4764 rlrxfrl.exe 3332 2688226.exe 4644 802266.exe 1888 0260488.exe 4560 rfrfxff.exe 4812 846600.exe 1688 fxxrfff.exe 2992 pppjp.exe 2552 rxrxffl.exe 624 xlfxrrl.exe 4180 pvdjj.exe 2120 06402.exe 2352 8026000.exe 4192 g2226.exe 4860 268288.exe 5012 o860006.exe 3428 88046.exe 948 fxfffxx.exe 3928 vdvpv.exe 5064 24660.exe 4640 06260.exe 3372 frxxrfx.exe 2020 262822.exe 3304 vpjdv.exe 4796 e04000.exe 1012 680488.exe 4420 608884.exe 1464 xrffxxr.exe 3716 02848.exe 2672 tnhhhb.exe 4272 88822.exe 4872 i624882.exe 4172 3xxxxff.exe 4088 s2440.exe 660 dvdpj.exe 4516 802200.exe 4528 466048.exe 3536 llrrrrl.exe 4564 thnhbb.exe 4560 rflfrrl.exe 4836 htbbnn.exe 3188 lfffrrr.exe -
resource yara_rule behavioral2/memory/3312-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2460-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4448-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4856-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/512-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1528-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/828-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1424-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2456-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3244-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2464-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/64-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3752-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4764-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1888-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4812-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2992-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-191-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4448268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 488266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 062226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfxxrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w46000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2460 3312 a599ee1085ee575689428222304fc280N.exe 90 PID 3312 wrote to memory of 2460 3312 a599ee1085ee575689428222304fc280N.exe 90 PID 3312 wrote to memory of 2460 3312 a599ee1085ee575689428222304fc280N.exe 90 PID 2460 wrote to memory of 4812 2460 9nbtnb.exe 91 PID 2460 wrote to memory of 4812 2460 9nbtnb.exe 91 PID 2460 wrote to memory of 4812 2460 9nbtnb.exe 91 PID 4812 wrote to memory of 4836 4812 1jpjd.exe 92 PID 4812 wrote to memory of 4836 4812 1jpjd.exe 92 PID 4812 wrote to memory of 4836 4812 1jpjd.exe 92 PID 4836 wrote to memory of 1780 4836 3bnnhh.exe 93 PID 4836 wrote to memory of 1780 4836 3bnnhh.exe 93 PID 4836 wrote to memory of 1780 4836 3bnnhh.exe 93 PID 1780 wrote to memory of 4448 1780 222666.exe 94 PID 1780 wrote to memory of 4448 1780 222666.exe 94 PID 1780 wrote to memory of 4448 1780 222666.exe 94 PID 4448 wrote to memory of 4808 4448 htbthh.exe 96 PID 4448 wrote to memory of 4808 4448 htbthh.exe 96 PID 4448 wrote to memory of 4808 4448 htbthh.exe 96 PID 4808 wrote to memory of 3832 4808 84042.exe 97 PID 4808 wrote to memory of 3832 4808 84042.exe 97 PID 4808 wrote to memory of 3832 4808 84042.exe 97 PID 3832 wrote to memory of 4856 3832 u626444.exe 98 PID 3832 wrote to memory of 4856 3832 u626444.exe 98 PID 3832 wrote to memory of 4856 3832 u626444.exe 98 PID 4856 wrote to memory of 512 4856 2682622.exe 99 PID 4856 wrote to memory of 512 4856 2682622.exe 99 PID 4856 wrote to memory of 512 4856 2682622.exe 99 PID 512 wrote to memory of 1528 512 q44822.exe 101 PID 512 wrote to memory of 1528 512 q44822.exe 101 PID 512 wrote to memory of 1528 512 q44822.exe 101 PID 1528 wrote to memory of 1448 1528 dppjd.exe 102 PID 1528 wrote to memory of 1448 1528 dppjd.exe 102 PID 1528 wrote to memory of 1448 1528 dppjd.exe 102 PID 1448 wrote to memory of 3928 1448 1pvpj.exe 133 PID 1448 wrote to memory of 3928 1448 1pvpj.exe 133 PID 1448 wrote to memory of 3928 1448 1pvpj.exe 133 PID 3928 wrote to memory of 828 3928 bhhbtb.exe 104 PID 3928 wrote to memory of 828 3928 bhhbtb.exe 104 PID 3928 wrote to memory of 828 3928 bhhbtb.exe 104 PID 828 wrote to memory of 1424 828 684040.exe 105 PID 828 wrote to memory of 1424 828 684040.exe 105 PID 828 wrote to memory of 1424 828 684040.exe 105 PID 1424 wrote to memory of 2464 1424 006044.exe 106 PID 1424 wrote to memory of 2464 1424 006044.exe 106 PID 1424 wrote to memory of 2464 1424 006044.exe 106 PID 2464 wrote to memory of 2456 2464 88808.exe 108 PID 2464 wrote to memory of 2456 2464 88808.exe 108 PID 2464 wrote to memory of 2456 2464 88808.exe 108 PID 2456 wrote to memory of 3244 2456 2608266.exe 109 PID 2456 wrote to memory of 3244 2456 2608266.exe 109 PID 2456 wrote to memory of 3244 2456 2608266.exe 109 PID 3244 wrote to memory of 3092 3244 llfxxxr.exe 110 PID 3244 wrote to memory of 3092 3244 llfxxxr.exe 110 PID 3244 wrote to memory of 3092 3244 llfxxxr.exe 110 PID 3092 wrote to memory of 2672 3092 8460604.exe 144 PID 3092 wrote to memory of 2672 3092 8460604.exe 144 PID 3092 wrote to memory of 2672 3092 8460604.exe 144 PID 2672 wrote to memory of 3192 2672 rlrxxrl.exe 112 PID 2672 wrote to memory of 3192 2672 rlrxxrl.exe 112 PID 2672 wrote to memory of 3192 2672 rlrxxrl.exe 112 PID 3192 wrote to memory of 3752 3192 422200.exe 113 PID 3192 wrote to memory of 3752 3192 422200.exe 113 PID 3192 wrote to memory of 3752 3192 422200.exe 113 PID 3752 wrote to memory of 64 3752 rxxxrrl.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\a599ee1085ee575689428222304fc280N.exe"C:\Users\Admin\AppData\Local\Temp\a599ee1085ee575689428222304fc280N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
\??\c:\9nbtnb.exec:\9nbtnb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\1jpjd.exec:\1jpjd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\3bnnhh.exec:\3bnnhh.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\222666.exec:\222666.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\htbthh.exec:\htbthh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\84042.exec:\84042.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
\??\c:\u626444.exec:\u626444.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\2682622.exec:\2682622.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
\??\c:\q44822.exec:\q44822.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
\??\c:\dppjd.exec:\dppjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
\??\c:\1pvpj.exec:\1pvpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\bhhbtb.exec:\bhhbtb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
\??\c:\684040.exec:\684040.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:828 -
\??\c:\006044.exec:\006044.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
\??\c:\88808.exec:\88808.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\2608266.exec:\2608266.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\llfxxxr.exec:\llfxxxr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
\??\c:\8460604.exec:\8460604.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
\??\c:\rlrxxrl.exec:\rlrxxrl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\422200.exec:\422200.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
\??\c:\rxxxrrl.exec:\rxxxrrl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
\??\c:\nbhbtb.exec:\nbhbtb.exe23⤵
- Executes dropped EXE
PID:64 -
\??\c:\rlrxfrl.exec:\rlrxfrl.exe24⤵
- Executes dropped EXE
PID:4764 -
\??\c:\2688226.exec:\2688226.exe25⤵
- Executes dropped EXE
PID:3332 -
\??\c:\802266.exec:\802266.exe26⤵
- Executes dropped EXE
PID:4644 -
\??\c:\0260488.exec:\0260488.exe27⤵
- Executes dropped EXE
PID:1888 -
\??\c:\rfrfxff.exec:\rfrfxff.exe28⤵
- Executes dropped EXE
PID:4560 -
\??\c:\846600.exec:\846600.exe29⤵
- Executes dropped EXE
PID:4812 -
\??\c:\fxxrfff.exec:\fxxrfff.exe30⤵
- Executes dropped EXE
PID:1688 -
\??\c:\pppjp.exec:\pppjp.exe31⤵
- Executes dropped EXE
PID:2992 -
\??\c:\rxrxffl.exec:\rxrxffl.exe32⤵
- Executes dropped EXE
PID:2552 -
\??\c:\xlfxrrl.exec:\xlfxrrl.exe33⤵
- Executes dropped EXE
PID:624 -
\??\c:\pvdjj.exec:\pvdjj.exe34⤵
- Executes dropped EXE
PID:4180 -
\??\c:\06402.exec:\06402.exe35⤵
- Executes dropped EXE
PID:2120 -
\??\c:\8026000.exec:\8026000.exe36⤵
- Executes dropped EXE
PID:2352 -
\??\c:\g2226.exec:\g2226.exe37⤵
- Executes dropped EXE
PID:4192 -
\??\c:\268288.exec:\268288.exe38⤵
- Executes dropped EXE
PID:4860 -
\??\c:\o860006.exec:\o860006.exe39⤵
- Executes dropped EXE
PID:5012 -
\??\c:\88046.exec:\88046.exe40⤵
- Executes dropped EXE
PID:3428 -
\??\c:\fxfffxx.exec:\fxfffxx.exe41⤵
- Executes dropped EXE
PID:948 -
\??\c:\vdvpv.exec:\vdvpv.exe42⤵
- Executes dropped EXE
PID:3928 -
\??\c:\24660.exec:\24660.exe43⤵
- Executes dropped EXE
PID:5064 -
\??\c:\06260.exec:\06260.exe44⤵
- Executes dropped EXE
PID:4640 -
\??\c:\frxxrfx.exec:\frxxrfx.exe45⤵
- Executes dropped EXE
PID:3372 -
\??\c:\262822.exec:\262822.exe46⤵
- Executes dropped EXE
PID:2020 -
\??\c:\vpjdv.exec:\vpjdv.exe47⤵
- Executes dropped EXE
PID:3304 -
\??\c:\e04000.exec:\e04000.exe48⤵
- Executes dropped EXE
PID:4796 -
\??\c:\680488.exec:\680488.exe49⤵
- Executes dropped EXE
PID:1012 -
\??\c:\608884.exec:\608884.exe50⤵
- Executes dropped EXE
PID:4420 -
\??\c:\xrffxxr.exec:\xrffxxr.exe51⤵
- Executes dropped EXE
PID:1464 -
\??\c:\02848.exec:\02848.exe52⤵
- Executes dropped EXE
PID:3716 -
\??\c:\tnhhhb.exec:\tnhhhb.exe53⤵
- Executes dropped EXE
PID:2672 -
\??\c:\88822.exec:\88822.exe54⤵
- Executes dropped EXE
PID:4272 -
\??\c:\i624882.exec:\i624882.exe55⤵
- Executes dropped EXE
PID:4872 -
\??\c:\3xxxxff.exec:\3xxxxff.exe56⤵
- Executes dropped EXE
PID:4172 -
\??\c:\s2440.exec:\s2440.exe57⤵
- Executes dropped EXE
PID:4088 -
\??\c:\dvdpj.exec:\dvdpj.exe58⤵
- Executes dropped EXE
PID:660 -
\??\c:\802200.exec:\802200.exe59⤵
- Executes dropped EXE
PID:4516 -
\??\c:\466048.exec:\466048.exe60⤵
- Executes dropped EXE
PID:4528 -
\??\c:\llrrrrl.exec:\llrrrrl.exe61⤵
- Executes dropped EXE
PID:3536 -
\??\c:\thnhbb.exec:\thnhbb.exe62⤵
- Executes dropped EXE
PID:4564 -
\??\c:\rflfrrl.exec:\rflfrrl.exe63⤵
- Executes dropped EXE
PID:4560 -
\??\c:\htbbnn.exec:\htbbnn.exe64⤵
- Executes dropped EXE
PID:4836 -
\??\c:\lfffrrr.exec:\lfffrrr.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3188 -
\??\c:\88646.exec:\88646.exe66⤵PID:2584
-
\??\c:\hbnhhh.exec:\hbnhhh.exe67⤵PID:4568
-
\??\c:\82668.exec:\82668.exe68⤵PID:4444
-
\??\c:\dvppd.exec:\dvppd.exe69⤵PID:2488
-
\??\c:\s6226.exec:\s6226.exe70⤵PID:4224
-
\??\c:\7nhbnh.exec:\7nhbnh.exe71⤵PID:4680
-
\??\c:\c066662.exec:\c066662.exe72⤵PID:2224
-
\??\c:\6044448.exec:\6044448.exe73⤵PID:4044
-
\??\c:\nnnnhh.exec:\nnnnhh.exe74⤵PID:3352
-
\??\c:\rlrfxxr.exec:\rlrfxxr.exe75⤵PID:5012
-
\??\c:\002226.exec:\002226.exe76⤵PID:2208
-
\??\c:\28648.exec:\28648.exe77⤵PID:1116
-
\??\c:\9pjjv.exec:\9pjjv.exe78⤵PID:828
-
\??\c:\468866.exec:\468866.exe79⤵PID:4024
-
\??\c:\rlfrlrl.exec:\rlfrlrl.exe80⤵PID:1020
-
\??\c:\0400422.exec:\0400422.exe81⤵PID:4832
-
\??\c:\xrrlxxx.exec:\xrrlxxx.exe82⤵PID:232
-
\??\c:\844488.exec:\844488.exe83⤵PID:2292
-
\??\c:\jdjjj.exec:\jdjjj.exe84⤵PID:3916
-
\??\c:\vppjp.exec:\vppjp.exe85⤵PID:900
-
\??\c:\e06482.exec:\e06482.exe86⤵PID:4900
-
\??\c:\6060804.exec:\6060804.exe87⤵PID:2216
-
\??\c:\6004882.exec:\6004882.exe88⤵PID:3744
-
\??\c:\nhttbb.exec:\nhttbb.exe89⤵PID:5000
-
\??\c:\flrlxxr.exec:\flrlxxr.exe90⤵PID:4236
-
\??\c:\4404448.exec:\4404448.exe91⤵PID:428
-
\??\c:\062266.exec:\062266.exe92⤵PID:1220
-
\??\c:\e80080.exec:\e80080.exe93⤵PID:4532
-
\??\c:\jpvvp.exec:\jpvvp.exe94⤵PID:972
-
\??\c:\02844.exec:\02844.exe95⤵PID:4984
-
\??\c:\vpddd.exec:\vpddd.exe96⤵PID:2332
-
\??\c:\888866.exec:\888866.exe97⤵PID:2412
-
\??\c:\e46482.exec:\e46482.exe98⤵PID:1592
-
\??\c:\40664.exec:\40664.exe99⤵PID:632
-
\??\c:\xxfxrrl.exec:\xxfxrrl.exe100⤵PID:2744
-
\??\c:\lrllxxr.exec:\lrllxxr.exe101⤵PID:3672
-
\??\c:\48006.exec:\48006.exe102⤵PID:648
-
\??\c:\thnhbb.exec:\thnhbb.exe103⤵PID:3268
-
\??\c:\bbbbbb.exec:\bbbbbb.exe104⤵PID:1584
-
\??\c:\frfxxxx.exec:\frfxxxx.exe105⤵PID:4072
-
\??\c:\jdpjv.exec:\jdpjv.exe106⤵PID:868
-
\??\c:\pjdpv.exec:\pjdpv.exe107⤵PID:3180
-
\??\c:\6408266.exec:\6408266.exe108⤵PID:5116
-
\??\c:\04040.exec:\04040.exe109⤵PID:1528
-
\??\c:\g2486.exec:\g2486.exe110⤵PID:4276
-
\??\c:\068266.exec:\068266.exe111⤵PID:3712
-
\??\c:\dpvdv.exec:\dpvdv.exe112⤵PID:1032
-
\??\c:\ddddv.exec:\ddddv.exe113⤵PID:4952
-
\??\c:\842600.exec:\842600.exe114⤵PID:4744
-
\??\c:\0424826.exec:\0424826.exe115⤵PID:2784
-
\??\c:\4804044.exec:\4804044.exe116⤵PID:4780
-
\??\c:\c464844.exec:\c464844.exe117⤵PID:4832
-
\??\c:\88040.exec:\88040.exe118⤵PID:232
-
\??\c:\u060826.exec:\u060826.exe119⤵PID:2292
-
\??\c:\864848.exec:\864848.exe120⤵PID:3916
-
\??\c:\btnbbb.exec:\btnbbb.exe121⤵PID:1396
-
\??\c:\pjdvp.exec:\pjdvp.exe122⤵PID:2748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-