Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 18:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ea449a2b035626109c6710e991fe7cd0N.exe
Resource
win7-20240704-en
6 signatures
120 seconds
General
-
Target
ea449a2b035626109c6710e991fe7cd0N.exe
-
Size
63KB
-
MD5
ea449a2b035626109c6710e991fe7cd0
-
SHA1
e5daf26c325a8bc62a46e03b454c33f4750d6834
-
SHA256
4dfbf94d18fbb4faac21ae7e79124145c47dbd9089dba6bd629ba4ee5fbc2b9d
-
SHA512
c0714a5e2fa87bfaee1dff5b8ee9485b0fd558c1072010a0d8f73166745db6e96ef1477e6ce462c3d21a5b9452caff41109ab0dcee2c073b99d0a5e454f61dd5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbsN:ymb3NkkiQ3mdBjF0y7kbE
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/2280-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1388-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1948-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/928-43-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/928-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/968-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1892-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1224-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1280-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2220 frxrrrr.exe 1700 xlfxfrx.exe 928 vppjp.exe 2296 2468664.exe 2960 0660046.exe 2468 jvvjd.exe 2868 4288266.exe 1948 pdddd.exe 2720 5ddvv.exe 2256 80668.exe 1476 6484040.exe 2884 868882.exe 2748 7thttb.exe 616 o846266.exe 1740 2468440.exe 1388 htbbbt.exe 2344 thhhnh.exe 1744 9nhtbb.exe 1832 k68244.exe 776 rfxlffr.exe 1952 u640824.exe 680 7rflrlf.exe 968 648460.exe 1400 lfrxffl.exe 1892 jdjjp.exe 1280 fxlxlfr.exe 1224 fxllrbn.exe 896 nhbbnt.exe 2280 pvvpp.exe 2484 60808.exe 1556 flxxxrx.exe 784 5fxffff.exe 1628 o206228.exe 2296 rlxfrxl.exe 2768 0084220.exe 2668 2602484.exe 2672 hnbnbt.exe 2648 rfrrxxf.exe 2500 pjvvv.exe 2936 260082.exe 580 608880.exe 2904 086800.exe 2896 dpdvv.exe 2036 m2068.exe 2888 086468.exe 2028 thhbhh.exe 2404 lfffffr.exe 924 60224.exe 1960 s4668.exe 528 q60088.exe 2400 xrflxfl.exe 264 8244668.exe 1796 c802884.exe 1580 3flxxll.exe 688 nhntnt.exe 1100 1bnnhh.exe 1072 fxrfllx.exe 1724 ppvjp.exe 2540 826862.exe 2208 3rlxxff.exe 1440 084240.exe 1660 20626.exe 2580 lfllxfl.exe 2108 268062.exe -
resource yara_rule behavioral1/memory/2280-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1388-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1948-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/928-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/968-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1892-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1280-263-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s2246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2202624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o680280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6600662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 008462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 682288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxffrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e40244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 486488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u422002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w24826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rllxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1rlxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6028006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2220 2280 ea449a2b035626109c6710e991fe7cd0N.exe 30 PID 2280 wrote to memory of 2220 2280 ea449a2b035626109c6710e991fe7cd0N.exe 30 PID 2280 wrote to memory of 2220 2280 ea449a2b035626109c6710e991fe7cd0N.exe 30 PID 2280 wrote to memory of 2220 2280 ea449a2b035626109c6710e991fe7cd0N.exe 30 PID 2220 wrote to memory of 1700 2220 frxrrrr.exe 31 PID 2220 wrote to memory of 1700 2220 frxrrrr.exe 31 PID 2220 wrote to memory of 1700 2220 frxrrrr.exe 31 PID 2220 wrote to memory of 1700 2220 frxrrrr.exe 31 PID 1700 wrote to memory of 928 1700 xlfxfrx.exe 32 PID 1700 wrote to memory of 928 1700 xlfxfrx.exe 32 PID 1700 wrote to memory of 928 1700 xlfxfrx.exe 32 PID 1700 wrote to memory of 928 1700 xlfxfrx.exe 32 PID 928 wrote to memory of 2296 928 vppjp.exe 33 PID 928 wrote to memory of 2296 928 vppjp.exe 33 PID 928 wrote to memory of 2296 928 vppjp.exe 33 PID 928 wrote to memory of 2296 928 vppjp.exe 33 PID 2296 wrote to memory of 2960 2296 2468664.exe 34 PID 2296 wrote to memory of 2960 2296 2468664.exe 34 PID 2296 wrote to memory of 2960 2296 2468664.exe 34 PID 2296 wrote to memory of 2960 2296 2468664.exe 34 PID 2960 wrote to memory of 2468 2960 0660046.exe 35 PID 2960 wrote to memory of 2468 2960 0660046.exe 35 PID 2960 wrote to memory of 2468 2960 0660046.exe 35 PID 2960 wrote to memory of 2468 2960 0660046.exe 35 PID 2468 wrote to memory of 2868 2468 jvvjd.exe 36 PID 2468 wrote to memory of 2868 2468 jvvjd.exe 36 PID 2468 wrote to memory of 2868 2468 jvvjd.exe 36 PID 2468 wrote to memory of 2868 2468 jvvjd.exe 36 PID 2868 wrote to memory of 1948 2868 4288266.exe 37 PID 2868 wrote to memory of 1948 2868 4288266.exe 37 PID 2868 wrote to memory of 1948 2868 4288266.exe 37 PID 2868 wrote to memory of 1948 2868 4288266.exe 37 PID 1948 wrote to memory of 2720 1948 pdddd.exe 38 PID 1948 wrote to memory of 2720 1948 pdddd.exe 38 PID 1948 wrote to memory of 2720 1948 pdddd.exe 38 PID 1948 wrote to memory of 2720 1948 pdddd.exe 38 PID 2720 wrote to memory of 2256 2720 5ddvv.exe 39 PID 2720 wrote to memory of 2256 2720 5ddvv.exe 39 PID 2720 wrote to memory of 2256 2720 5ddvv.exe 39 PID 2720 wrote to memory of 2256 2720 5ddvv.exe 39 PID 2256 wrote to memory of 1476 2256 80668.exe 40 PID 2256 wrote to memory of 1476 2256 80668.exe 40 PID 2256 wrote to memory of 1476 2256 80668.exe 40 PID 2256 wrote to memory of 1476 2256 80668.exe 40 PID 1476 wrote to memory of 2884 1476 6484040.exe 41 PID 1476 wrote to memory of 2884 1476 6484040.exe 41 PID 1476 wrote to memory of 2884 1476 6484040.exe 41 PID 1476 wrote to memory of 2884 1476 6484040.exe 41 PID 2884 wrote to memory of 2748 2884 868882.exe 42 PID 2884 wrote to memory of 2748 2884 868882.exe 42 PID 2884 wrote to memory of 2748 2884 868882.exe 42 PID 2884 wrote to memory of 2748 2884 868882.exe 42 PID 2748 wrote to memory of 616 2748 7thttb.exe 43 PID 2748 wrote to memory of 616 2748 7thttb.exe 43 PID 2748 wrote to memory of 616 2748 7thttb.exe 43 PID 2748 wrote to memory of 616 2748 7thttb.exe 43 PID 616 wrote to memory of 1740 616 o846266.exe 44 PID 616 wrote to memory of 1740 616 o846266.exe 44 PID 616 wrote to memory of 1740 616 o846266.exe 44 PID 616 wrote to memory of 1740 616 o846266.exe 44 PID 1740 wrote to memory of 1388 1740 2468440.exe 45 PID 1740 wrote to memory of 1388 1740 2468440.exe 45 PID 1740 wrote to memory of 1388 1740 2468440.exe 45 PID 1740 wrote to memory of 1388 1740 2468440.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea449a2b035626109c6710e991fe7cd0N.exe"C:\Users\Admin\AppData\Local\Temp\ea449a2b035626109c6710e991fe7cd0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\frxrrrr.exec:\frxrrrr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\xlfxfrx.exec:\xlfxfrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
\??\c:\vppjp.exec:\vppjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
\??\c:\2468664.exec:\2468664.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
\??\c:\0660046.exec:\0660046.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\jvvjd.exec:\jvvjd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\4288266.exec:\4288266.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\pdddd.exec:\pdddd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
\??\c:\5ddvv.exec:\5ddvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\80668.exec:\80668.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\6484040.exec:\6484040.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\868882.exec:\868882.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\7thttb.exec:\7thttb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\o846266.exec:\o846266.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
\??\c:\2468440.exec:\2468440.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\htbbbt.exec:\htbbbt.exe17⤵
- Executes dropped EXE
PID:1388 -
\??\c:\thhhnh.exec:\thhhnh.exe18⤵
- Executes dropped EXE
PID:2344 -
\??\c:\9nhtbb.exec:\9nhtbb.exe19⤵
- Executes dropped EXE
PID:1744 -
\??\c:\k68244.exec:\k68244.exe20⤵
- Executes dropped EXE
PID:1832 -
\??\c:\rfxlffr.exec:\rfxlffr.exe21⤵
- Executes dropped EXE
PID:776 -
\??\c:\u640824.exec:\u640824.exe22⤵
- Executes dropped EXE
PID:1952 -
\??\c:\7rflrlf.exec:\7rflrlf.exe23⤵
- Executes dropped EXE
PID:680 -
\??\c:\648460.exec:\648460.exe24⤵
- Executes dropped EXE
PID:968 -
\??\c:\lfrxffl.exec:\lfrxffl.exe25⤵
- Executes dropped EXE
PID:1400 -
\??\c:\jdjjp.exec:\jdjjp.exe26⤵
- Executes dropped EXE
PID:1892 -
\??\c:\fxlxlfr.exec:\fxlxlfr.exe27⤵
- Executes dropped EXE
PID:1280 -
\??\c:\fxllrbn.exec:\fxllrbn.exe28⤵
- Executes dropped EXE
PID:1224 -
\??\c:\nhbbnt.exec:\nhbbnt.exe29⤵
- Executes dropped EXE
PID:896 -
\??\c:\pvvpp.exec:\pvvpp.exe30⤵
- Executes dropped EXE
PID:2280 -
\??\c:\60808.exec:\60808.exe31⤵
- Executes dropped EXE
PID:2484 -
\??\c:\flxxxrx.exec:\flxxxrx.exe32⤵
- Executes dropped EXE
PID:1556 -
\??\c:\5fxffff.exec:\5fxffff.exe33⤵
- Executes dropped EXE
PID:784 -
\??\c:\o206228.exec:\o206228.exe34⤵
- Executes dropped EXE
PID:1628 -
\??\c:\rlxfrxl.exec:\rlxfrxl.exe35⤵
- Executes dropped EXE
PID:2296 -
\??\c:\0084220.exec:\0084220.exe36⤵
- Executes dropped EXE
PID:2768 -
\??\c:\2602484.exec:\2602484.exe37⤵
- Executes dropped EXE
PID:2668 -
\??\c:\hnbnbt.exec:\hnbnbt.exe38⤵
- Executes dropped EXE
PID:2672 -
\??\c:\rfrrxxf.exec:\rfrrxxf.exe39⤵
- Executes dropped EXE
PID:2648 -
\??\c:\pjvvv.exec:\pjvvv.exe40⤵
- Executes dropped EXE
PID:2500 -
\??\c:\260082.exec:\260082.exe41⤵
- Executes dropped EXE
PID:2936 -
\??\c:\608880.exec:\608880.exe42⤵
- Executes dropped EXE
PID:580 -
\??\c:\086800.exec:\086800.exe43⤵
- Executes dropped EXE
PID:2904 -
\??\c:\dpdvv.exec:\dpdvv.exe44⤵
- Executes dropped EXE
PID:2896 -
\??\c:\m2068.exec:\m2068.exe45⤵
- Executes dropped EXE
PID:2036 -
\??\c:\086468.exec:\086468.exe46⤵
- Executes dropped EXE
PID:2888 -
\??\c:\thhbhh.exec:\thhbhh.exe47⤵
- Executes dropped EXE
PID:2028 -
\??\c:\lfffffr.exec:\lfffffr.exe48⤵
- Executes dropped EXE
PID:2404 -
\??\c:\60224.exec:\60224.exe49⤵
- Executes dropped EXE
PID:924 -
\??\c:\s4668.exec:\s4668.exe50⤵
- Executes dropped EXE
PID:1960 -
\??\c:\q60088.exec:\q60088.exe51⤵
- Executes dropped EXE
PID:528 -
\??\c:\xrflxfl.exec:\xrflxfl.exe52⤵
- Executes dropped EXE
PID:2400 -
\??\c:\8244668.exec:\8244668.exe53⤵
- Executes dropped EXE
PID:264 -
\??\c:\c802884.exec:\c802884.exe54⤵
- Executes dropped EXE
PID:1796 -
\??\c:\3flxxll.exec:\3flxxll.exe55⤵
- Executes dropped EXE
PID:1580 -
\??\c:\nhntnt.exec:\nhntnt.exe56⤵
- Executes dropped EXE
PID:688 -
\??\c:\1bnnhh.exec:\1bnnhh.exe57⤵
- Executes dropped EXE
PID:1100 -
\??\c:\fxrfllx.exec:\fxrfllx.exe58⤵
- Executes dropped EXE
PID:1072 -
\??\c:\ppvjp.exec:\ppvjp.exe59⤵
- Executes dropped EXE
PID:1724 -
\??\c:\826862.exec:\826862.exe60⤵
- Executes dropped EXE
PID:2540 -
\??\c:\3rlxxff.exec:\3rlxxff.exe61⤵
- Executes dropped EXE
PID:2208 -
\??\c:\084240.exec:\084240.exe62⤵
- Executes dropped EXE
PID:1440 -
\??\c:\20626.exec:\20626.exe63⤵
- Executes dropped EXE
PID:1660 -
\??\c:\lfllxfl.exec:\lfllxfl.exe64⤵
- Executes dropped EXE
PID:2580 -
\??\c:\268062.exec:\268062.exe65⤵
- Executes dropped EXE
PID:2108 -
\??\c:\42240.exec:\42240.exe66⤵PID:1876
-
\??\c:\lfxlxfr.exec:\lfxlxfr.exe67⤵PID:2512
-
\??\c:\u668446.exec:\u668446.exe68⤵PID:1968
-
\??\c:\80240.exec:\80240.exe69⤵PID:2532
-
\??\c:\vppvv.exec:\vppvv.exe70⤵PID:2492
-
\??\c:\u682884.exec:\u682884.exe71⤵PID:2756
-
\??\c:\486488.exec:\486488.exe72⤵
- System Location Discovery: System Language Discovery
PID:2308 -
\??\c:\nhbbtb.exec:\nhbbtb.exe73⤵PID:2956
-
\??\c:\086222.exec:\086222.exe74⤵PID:2960
-
\??\c:\xrlxxrx.exec:\xrlxxrx.exe75⤵PID:2944
-
\??\c:\jppdp.exec:\jppdp.exe76⤵PID:1948
-
\??\c:\ttbtbh.exec:\ttbtbh.exe77⤵PID:2772
-
\??\c:\a0802.exec:\a0802.exe78⤵PID:2688
-
\??\c:\48228.exec:\48228.exe79⤵PID:2500
-
\??\c:\080088.exec:\080088.exe80⤵PID:2504
-
\??\c:\1vjjj.exec:\1vjjj.exe81⤵PID:1140
-
\??\c:\hbhhbb.exec:\hbhhbb.exe82⤵PID:2984
-
\??\c:\2028606.exec:\2028606.exe83⤵PID:2704
-
\??\c:\q84424.exec:\q84424.exe84⤵PID:2692
-
\??\c:\6606464.exec:\6606464.exe85⤵PID:568
-
\??\c:\00462.exec:\00462.exe86⤵PID:1272
-
\??\c:\hnnbbt.exec:\hnnbbt.exe87⤵PID:2880
-
\??\c:\jdpvd.exec:\jdpvd.exe88⤵PID:324
-
\??\c:\3rflxfr.exec:\3rflxfr.exe89⤵PID:1980
-
\??\c:\rrlxrrf.exec:\rrlxrrf.exe90⤵PID:2324
-
\??\c:\rrfrxlr.exec:\rrfrxlr.exe91⤵PID:856
-
\??\c:\204422.exec:\204422.exe92⤵PID:3056
-
\??\c:\fxxrflf.exec:\fxxrflf.exe93⤵PID:2092
-
\??\c:\4200662.exec:\4200662.exe94⤵PID:1832
-
\??\c:\q64682.exec:\q64682.exe95⤵PID:448
-
\??\c:\3bttbh.exec:\3bttbh.exe96⤵PID:780
-
\??\c:\042406.exec:\042406.exe97⤵PID:1068
-
\??\c:\208628.exec:\208628.exe98⤵PID:964
-
\??\c:\q68440.exec:\q68440.exe99⤵PID:2312
-
\??\c:\486444.exec:\486444.exe100⤵PID:1828
-
\??\c:\8606440.exec:\8606440.exe101⤵PID:1668
-
\??\c:\042028.exec:\042028.exe102⤵PID:1880
-
\??\c:\u080224.exec:\u080224.exe103⤵PID:3064
-
\??\c:\u422002.exec:\u422002.exe104⤵
- System Location Discovery: System Language Discovery
PID:1432 -
\??\c:\6606806.exec:\6606806.exe105⤵PID:2480
-
\??\c:\1hnnhh.exec:\1hnnhh.exe106⤵PID:2132
-
\??\c:\m4624.exec:\m4624.exe107⤵PID:2516
-
\??\c:\fxlxflx.exec:\fxlxflx.exe108⤵PID:804
-
\??\c:\264282.exec:\264282.exe109⤵PID:2252
-
\??\c:\jdjjd.exec:\jdjjd.exe110⤵PID:1536
-
\??\c:\082406.exec:\082406.exe111⤵PID:1628
-
\??\c:\vjjjd.exec:\vjjjd.exe112⤵PID:2776
-
\??\c:\860026.exec:\860026.exe113⤵PID:2768
-
\??\c:\xlrrrrr.exec:\xlrrrrr.exe114⤵PID:2868
-
\??\c:\88624.exec:\88624.exe115⤵PID:1608
-
\??\c:\vjvvv.exec:\vjvvv.exe116⤵PID:2264
-
\??\c:\1vdpv.exec:\1vdpv.exe117⤵PID:2272
-
\??\c:\a4280.exec:\a4280.exe118⤵PID:2364
-
\??\c:\vpdpd.exec:\vpdpd.exe119⤵PID:788
-
\??\c:\60444.exec:\60444.exe120⤵PID:3032
-
\??\c:\o646484.exec:\o646484.exe121⤵PID:2708
-
\??\c:\3rrlxxl.exec:\3rrlxxl.exe122⤵PID:2700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-