Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 04:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
16661edacddb4bfb6aa5bd10301c5580N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
16661edacddb4bfb6aa5bd10301c5580N.exe
-
Size
64KB
-
MD5
16661edacddb4bfb6aa5bd10301c5580
-
SHA1
6f72cf2f5c1d9ad7ddbce3cdd55392c9e0429d30
-
SHA256
3f04d082c1b822186b37e1340d22184c6099c8e3976ae482b17b1a162403b347
-
SHA512
5272114d42411e8cdb3558d2ec0d1bb7675d8ccc6632d5962d4f0a9707e4a4d152f997a85608606251a20d40c7a306598256987f47ea9bbd216e8f3e4bbe3090
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxiX:ymb3NkkiQ3mdBjF0y7kbA
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral1/memory/3032-8-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3032-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2632-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3052-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2444-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2520-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1876-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1460-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1032-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1764-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2040-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/448-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/340-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/848-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3056 46262.exe 2632 422862.exe 3052 pjdjp.exe 2444 3ththn.exe 2476 jvpjp.exe 2924 08226.exe 616 24666.exe 2520 q42888.exe 2784 82466.exe 1876 jvvvv.exe 876 5bbnbt.exe 1460 262868.exe 1636 420060.exe 2408 xrlrxxl.exe 1032 82406.exe 1764 202840.exe 2300 20264.exe 2068 84606.exe 2040 824084.exe 448 06644.exe 2928 20666.exe 952 9dpvd.exe 688 3httbh.exe 340 9pvdd.exe 848 bttbtb.exe 2128 tntbnh.exe 1740 fxlxxrf.exe 1736 jjdvd.exe 2232 u266462.exe 2564 9fffrlx.exe 2572 nhbnbn.exe 2580 fxlfrrr.exe 1584 26480.exe 2704 1rfllll.exe 2212 c460662.exe 2444 5pjjd.exe 2924 lfxllxr.exe 1720 3vjpd.exe 3004 824662.exe 2972 e06284.exe 2796 htnnbb.exe 2876 bttbtn.exe 1824 rfxxlrx.exe 1972 m6806.exe 752 rfxffxf.exe 1924 w08406.exe 2712 7flfffl.exe 780 g0468.exe 1048 i866880.exe 560 dvpvp.exe 1684 pjddj.exe 1524 hbthtb.exe 676 9vvvv.exe 496 dvpdd.exe 1088 dpddv.exe 2144 s8488.exe 2896 0422884.exe 2388 264440.exe 2952 86224.exe 2260 fxlfxfr.exe 3012 nnhnbn.exe 1488 9hhbbn.exe 2384 0422888.exe 696 s4466.exe -
resource yara_rule behavioral1/memory/3032-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3052-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1876-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1460-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1764-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/448-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/340-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-276-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k42886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8626262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 480808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrflff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ppvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrxfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llrrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2680620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2264282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2004624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m6806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3056 3032 16661edacddb4bfb6aa5bd10301c5580N.exe 30 PID 3032 wrote to memory of 3056 3032 16661edacddb4bfb6aa5bd10301c5580N.exe 30 PID 3032 wrote to memory of 3056 3032 16661edacddb4bfb6aa5bd10301c5580N.exe 30 PID 3032 wrote to memory of 3056 3032 16661edacddb4bfb6aa5bd10301c5580N.exe 30 PID 3056 wrote to memory of 2632 3056 46262.exe 31 PID 3056 wrote to memory of 2632 3056 46262.exe 31 PID 3056 wrote to memory of 2632 3056 46262.exe 31 PID 3056 wrote to memory of 2632 3056 46262.exe 31 PID 2632 wrote to memory of 3052 2632 422862.exe 32 PID 2632 wrote to memory of 3052 2632 422862.exe 32 PID 2632 wrote to memory of 3052 2632 422862.exe 32 PID 2632 wrote to memory of 3052 2632 422862.exe 32 PID 3052 wrote to memory of 2444 3052 pjdjp.exe 33 PID 3052 wrote to memory of 2444 3052 pjdjp.exe 33 PID 3052 wrote to memory of 2444 3052 pjdjp.exe 33 PID 3052 wrote to memory of 2444 3052 pjdjp.exe 33 PID 2444 wrote to memory of 2476 2444 3ththn.exe 34 PID 2444 wrote to memory of 2476 2444 3ththn.exe 34 PID 2444 wrote to memory of 2476 2444 3ththn.exe 34 PID 2444 wrote to memory of 2476 2444 3ththn.exe 34 PID 2476 wrote to memory of 2924 2476 jvpjp.exe 35 PID 2476 wrote to memory of 2924 2476 jvpjp.exe 35 PID 2476 wrote to memory of 2924 2476 jvpjp.exe 35 PID 2476 wrote to memory of 2924 2476 jvpjp.exe 35 PID 2924 wrote to memory of 616 2924 08226.exe 36 PID 2924 wrote to memory of 616 2924 08226.exe 36 PID 2924 wrote to memory of 616 2924 08226.exe 36 PID 2924 wrote to memory of 616 2924 08226.exe 36 PID 616 wrote to memory of 2520 616 24666.exe 37 PID 616 wrote to memory of 2520 616 24666.exe 37 PID 616 wrote to memory of 2520 616 24666.exe 37 PID 616 wrote to memory of 2520 616 24666.exe 37 PID 2520 wrote to memory of 2784 2520 q42888.exe 38 PID 2520 wrote to memory of 2784 2520 q42888.exe 38 PID 2520 wrote to memory of 2784 2520 q42888.exe 38 PID 2520 wrote to memory of 2784 2520 q42888.exe 38 PID 2784 wrote to memory of 1876 2784 82466.exe 39 PID 2784 wrote to memory of 1876 2784 82466.exe 39 PID 2784 wrote to memory of 1876 2784 82466.exe 39 PID 2784 wrote to memory of 1876 2784 82466.exe 39 PID 1876 wrote to memory of 876 1876 jvvvv.exe 40 PID 1876 wrote to memory of 876 1876 jvvvv.exe 40 PID 1876 wrote to memory of 876 1876 jvvvv.exe 40 PID 1876 wrote to memory of 876 1876 jvvvv.exe 40 PID 876 wrote to memory of 1460 876 5bbnbt.exe 41 PID 876 wrote to memory of 1460 876 5bbnbt.exe 41 PID 876 wrote to memory of 1460 876 5bbnbt.exe 41 PID 876 wrote to memory of 1460 876 5bbnbt.exe 41 PID 1460 wrote to memory of 1636 1460 262868.exe 42 PID 1460 wrote to memory of 1636 1460 262868.exe 42 PID 1460 wrote to memory of 1636 1460 262868.exe 42 PID 1460 wrote to memory of 1636 1460 262868.exe 42 PID 1636 wrote to memory of 2408 1636 420060.exe 43 PID 1636 wrote to memory of 2408 1636 420060.exe 43 PID 1636 wrote to memory of 2408 1636 420060.exe 43 PID 1636 wrote to memory of 2408 1636 420060.exe 43 PID 2408 wrote to memory of 1032 2408 xrlrxxl.exe 44 PID 2408 wrote to memory of 1032 2408 xrlrxxl.exe 44 PID 2408 wrote to memory of 1032 2408 xrlrxxl.exe 44 PID 2408 wrote to memory of 1032 2408 xrlrxxl.exe 44 PID 1032 wrote to memory of 1764 1032 82406.exe 45 PID 1032 wrote to memory of 1764 1032 82406.exe 45 PID 1032 wrote to memory of 1764 1032 82406.exe 45 PID 1032 wrote to memory of 1764 1032 82406.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\16661edacddb4bfb6aa5bd10301c5580N.exe"C:\Users\Admin\AppData\Local\Temp\16661edacddb4bfb6aa5bd10301c5580N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\46262.exec:\46262.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\422862.exec:\422862.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\pjdjp.exec:\pjdjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\3ththn.exec:\3ththn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\jvpjp.exec:\jvpjp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\08226.exec:\08226.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\24666.exec:\24666.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
\??\c:\q42888.exec:\q42888.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\82466.exec:\82466.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\jvvvv.exec:\jvvvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\5bbnbt.exec:\5bbnbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\262868.exec:\262868.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\420060.exec:\420060.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\xrlrxxl.exec:\xrlrxxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\82406.exec:\82406.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\202840.exec:\202840.exe17⤵
- Executes dropped EXE
PID:1764 -
\??\c:\20264.exec:\20264.exe18⤵
- Executes dropped EXE
PID:2300 -
\??\c:\84606.exec:\84606.exe19⤵
- Executes dropped EXE
PID:2068 -
\??\c:\824084.exec:\824084.exe20⤵
- Executes dropped EXE
PID:2040 -
\??\c:\06644.exec:\06644.exe21⤵
- Executes dropped EXE
PID:448 -
\??\c:\20666.exec:\20666.exe22⤵
- Executes dropped EXE
PID:2928 -
\??\c:\9dpvd.exec:\9dpvd.exe23⤵
- Executes dropped EXE
PID:952 -
\??\c:\3httbh.exec:\3httbh.exe24⤵
- Executes dropped EXE
PID:688 -
\??\c:\9pvdd.exec:\9pvdd.exe25⤵
- Executes dropped EXE
PID:340 -
\??\c:\bttbtb.exec:\bttbtb.exe26⤵
- Executes dropped EXE
PID:848 -
\??\c:\tntbnh.exec:\tntbnh.exe27⤵
- Executes dropped EXE
PID:2128 -
\??\c:\fxlxxrf.exec:\fxlxxrf.exe28⤵
- Executes dropped EXE
PID:1740 -
\??\c:\jjdvd.exec:\jjdvd.exe29⤵
- Executes dropped EXE
PID:1736 -
\??\c:\u266462.exec:\u266462.exe30⤵
- Executes dropped EXE
PID:2232 -
\??\c:\9fffrlx.exec:\9fffrlx.exe31⤵
- Executes dropped EXE
PID:2564 -
\??\c:\nhbnbn.exec:\nhbnbn.exe32⤵
- Executes dropped EXE
PID:2572 -
\??\c:\fxlfrrr.exec:\fxlfrrr.exe33⤵
- Executes dropped EXE
PID:2580 -
\??\c:\26480.exec:\26480.exe34⤵
- Executes dropped EXE
PID:1584 -
\??\c:\1rfllll.exec:\1rfllll.exe35⤵
- Executes dropped EXE
PID:2704 -
\??\c:\c460662.exec:\c460662.exe36⤵
- Executes dropped EXE
PID:2212 -
\??\c:\5pjjd.exec:\5pjjd.exe37⤵
- Executes dropped EXE
PID:2444 -
\??\c:\lfxllxr.exec:\lfxllxr.exe38⤵
- Executes dropped EXE
PID:2924 -
\??\c:\3vjpd.exec:\3vjpd.exe39⤵
- Executes dropped EXE
PID:1720 -
\??\c:\824662.exec:\824662.exe40⤵
- Executes dropped EXE
PID:3004 -
\??\c:\e06284.exec:\e06284.exe41⤵
- Executes dropped EXE
PID:2972 -
\??\c:\htnnbb.exec:\htnnbb.exe42⤵
- Executes dropped EXE
PID:2796 -
\??\c:\bttbtn.exec:\bttbtn.exe43⤵
- Executes dropped EXE
PID:2876 -
\??\c:\rfxxlrx.exec:\rfxxlrx.exe44⤵
- Executes dropped EXE
PID:1824 -
\??\c:\m6806.exec:\m6806.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972 -
\??\c:\rfxffxf.exec:\rfxffxf.exe46⤵
- Executes dropped EXE
PID:752 -
\??\c:\w08406.exec:\w08406.exe47⤵
- Executes dropped EXE
PID:1924 -
\??\c:\7flfffl.exec:\7flfffl.exe48⤵
- Executes dropped EXE
PID:2712 -
\??\c:\g0468.exec:\g0468.exe49⤵
- Executes dropped EXE
PID:780 -
\??\c:\i866880.exec:\i866880.exe50⤵
- Executes dropped EXE
PID:1048 -
\??\c:\dvpvp.exec:\dvpvp.exe51⤵
- Executes dropped EXE
PID:560 -
\??\c:\pjddj.exec:\pjddj.exe52⤵
- Executes dropped EXE
PID:1684 -
\??\c:\hbthtb.exec:\hbthtb.exe53⤵
- Executes dropped EXE
PID:1524 -
\??\c:\9vvvv.exec:\9vvvv.exe54⤵
- Executes dropped EXE
PID:676 -
\??\c:\dvpdd.exec:\dvpdd.exe55⤵
- Executes dropped EXE
PID:496 -
\??\c:\dpddv.exec:\dpddv.exe56⤵
- Executes dropped EXE
PID:1088 -
\??\c:\s8488.exec:\s8488.exe57⤵
- Executes dropped EXE
PID:2144 -
\??\c:\0422884.exec:\0422884.exe58⤵
- Executes dropped EXE
PID:2896 -
\??\c:\264440.exec:\264440.exe59⤵
- Executes dropped EXE
PID:2388 -
\??\c:\86224.exec:\86224.exe60⤵
- Executes dropped EXE
PID:2952 -
\??\c:\fxlfxfr.exec:\fxlfxfr.exe61⤵
- Executes dropped EXE
PID:2260 -
\??\c:\nnhnbn.exec:\nnhnbn.exe62⤵
- Executes dropped EXE
PID:3012 -
\??\c:\9hhbbn.exec:\9hhbbn.exe63⤵
- Executes dropped EXE
PID:1488 -
\??\c:\0422888.exec:\0422888.exe64⤵
- Executes dropped EXE
PID:2384 -
\??\c:\s4466.exec:\s4466.exe65⤵
- Executes dropped EXE
PID:696 -
\??\c:\frxrrll.exec:\frxrrll.exe66⤵PID:2016
-
\??\c:\6640286.exec:\6640286.exe67⤵PID:1616
-
\??\c:\i204806.exec:\i204806.exe68⤵PID:1680
-
\??\c:\008606.exec:\008606.exe69⤵PID:2528
-
\??\c:\8622880.exec:\8622880.exe70⤵PID:2548
-
\??\c:\lfflxxl.exec:\lfflxxl.exe71⤵PID:2536
-
\??\c:\6860624.exec:\6860624.exe72⤵PID:2680
-
\??\c:\224246.exec:\224246.exe73⤵PID:1588
-
\??\c:\7thhtb.exec:\7thhtb.exe74⤵PID:2584
-
\??\c:\pjddj.exec:\pjddj.exe75⤵PID:2648
-
\??\c:\lrfffll.exec:\lrfffll.exe76⤵PID:2484
-
\??\c:\868228.exec:\868228.exe77⤵PID:2440
-
\??\c:\48660.exec:\48660.exe78⤵PID:2720
-
\??\c:\42006.exec:\42006.exe79⤵PID:2608
-
\??\c:\5llflfl.exec:\5llflfl.exe80⤵PID:1484
-
\??\c:\3hbthn.exec:\3hbthn.exe81⤵PID:2728
-
\??\c:\840062.exec:\840062.exe82⤵PID:1852
-
\??\c:\5pjpp.exec:\5pjpp.exe83⤵PID:2784
-
\??\c:\bhhnnn.exec:\bhhnnn.exe84⤵PID:984
-
\??\c:\264484.exec:\264484.exe85⤵PID:2228
-
\??\c:\6042840.exec:\6042840.exe86⤵PID:1796
-
\??\c:\e44460.exec:\e44460.exe87⤵PID:1640
-
\??\c:\88240.exec:\88240.exe88⤵PID:1296
-
\??\c:\jddjv.exec:\jddjv.exe89⤵PID:1052
-
\??\c:\nthnhh.exec:\nthnhh.exe90⤵PID:1032
-
\??\c:\nbbtbb.exec:\nbbtbb.exe91⤵PID:836
-
\??\c:\6464624.exec:\6464624.exe92⤵PID:2244
-
\??\c:\08046.exec:\08046.exe93⤵PID:1064
-
\??\c:\484680.exec:\484680.exe94⤵PID:3064
-
\??\c:\pjvdp.exec:\pjvdp.exe95⤵PID:2040
-
\??\c:\k28462.exec:\k28462.exe96⤵PID:408
-
\??\c:\5lxflfr.exec:\5lxflfr.exe97⤵PID:832
-
\??\c:\664022.exec:\664022.exe98⤵PID:2652
-
\??\c:\60064.exec:\60064.exe99⤵PID:484
-
\??\c:\86068.exec:\86068.exe100⤵PID:2392
-
\??\c:\hbhhnt.exec:\hbhhnt.exe101⤵PID:1232
-
\??\c:\c688040.exec:\c688040.exe102⤵PID:3016
-
\??\c:\48844.exec:\48844.exe103⤵PID:2500
-
\??\c:\hhbhtn.exec:\hhbhtn.exe104⤵PID:1744
-
\??\c:\jddpd.exec:\jddpd.exe105⤵PID:892
-
\??\c:\7dvdd.exec:\7dvdd.exe106⤵PID:1736
-
\??\c:\82468.exec:\82468.exe107⤵PID:2232
-
\??\c:\3htttb.exec:\3htttb.exe108⤵PID:2640
-
\??\c:\rlrlxrf.exec:\rlrlxrf.exe109⤵PID:2620
-
\??\c:\206284.exec:\206284.exe110⤵PID:2568
-
\??\c:\fxlrffr.exec:\fxlrffr.exe111⤵PID:2456
-
\??\c:\pdpvd.exec:\pdpvd.exe112⤵PID:3000
-
\??\c:\hbhbtt.exec:\hbhbtt.exe113⤵PID:2704
-
\??\c:\1hhhhb.exec:\1hhhhb.exe114⤵PID:2424
-
\??\c:\3vddp.exec:\3vddp.exe115⤵PID:2920
-
\??\c:\fllflll.exec:\fllflll.exe116⤵PID:540
-
\??\c:\a2442.exec:\a2442.exe117⤵PID:1688
-
\??\c:\m2420.exec:\m2420.exe118⤵PID:1324
-
\??\c:\7hbhnb.exec:\7hbhnb.exe119⤵PID:2800
-
\??\c:\jjjpd.exec:\jjjpd.exe120⤵PID:2796
-
\??\c:\lflxxfr.exec:\lflxxfr.exe121⤵PID:2792
-
\??\c:\dppvd.exec:\dppvd.exe122⤵PID:2224
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-