Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe
Resource
win7-20240704-en
General
-
Target
4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe
-
Size
230KB
-
MD5
e2840e57e191c900d87dbd0bf2c74fe0
-
SHA1
c2be22b68bb4191392583a4d5f6a7c2e00df96b4
-
SHA256
4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56
-
SHA512
b32e44ed44632ac96fc8fabccf9fd168c419ff2a51213450b9b2af4605aa95653b9f09ccf23f9c185cb7fbc4bfd40e557d4819697f79fc570491fdceb83be398
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1fp:n3C9BRo7MlrWKo+lxKk1fp
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
resource yara_rule behavioral1/memory/2520-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1572-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2844-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3044-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/568-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2888-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2352-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1556 tthhnt.exe 1572 frlrlrf.exe 2264 82028.exe 2320 44422.exe 2500 604046.exe 2204 jvjdp.exe 2468 86622.exe 2844 7vpdj.exe 2764 1rflrrx.exe 2688 8606662.exe 2696 86006.exe 568 5thtnt.exe 3044 htbntb.exe 2888 rlxlrfl.exe 616 88420.exe 1960 lfxlxfr.exe 1712 xxlrllx.exe 2356 9djvp.exe 1580 xlxfxff.exe 2352 ffrrflr.exe 2392 5rrxrrx.exe 780 2600662.exe 2540 xrfrxxx.exe 948 vvjdj.exe 1860 o826288.exe 2216 w82484.exe 2544 7lfrfrr.exe 1876 6028064.exe 2528 8040080.exe 2472 48606.exe 2244 8640008.exe 576 c226640.exe 2264 40286.exe 596 fxflxfr.exe 2500 2644224.exe 2804 s8280.exe 2204 a6480.exe 2908 4600286.exe 1988 64886.exe 2700 646244.exe 2676 bthhnn.exe 2944 7jdvd.exe 2940 dpvvv.exe 2840 dpdjd.exe 3032 486244.exe 2708 pdppd.exe 1108 080662.exe 1208 w04682.exe 1676 6402828.exe 648 600682.exe 536 jvjpd.exe 2144 e08804.exe 2584 c206888.exe 276 4862064.exe 688 rlrflfl.exe 1800 nhtbnh.exe 2628 o080628.exe 1984 42846.exe 1544 202462.exe 1904 nbbbhb.exe 1812 lfrxxxx.exe 2556 7jpjv.exe 2448 4262240.exe 1908 hbhhtt.exe -
resource yara_rule behavioral1/memory/2520-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1572-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/568-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2888-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2352-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26880.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbtth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 424062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o684446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxfffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7thntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 220224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1556 2520 4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe 30 PID 2520 wrote to memory of 1556 2520 4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe 30 PID 2520 wrote to memory of 1556 2520 4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe 30 PID 2520 wrote to memory of 1556 2520 4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe 30 PID 1556 wrote to memory of 1572 1556 tthhnt.exe 31 PID 1556 wrote to memory of 1572 1556 tthhnt.exe 31 PID 1556 wrote to memory of 1572 1556 tthhnt.exe 31 PID 1556 wrote to memory of 1572 1556 tthhnt.exe 31 PID 1572 wrote to memory of 2264 1572 frlrlrf.exe 32 PID 1572 wrote to memory of 2264 1572 frlrlrf.exe 32 PID 1572 wrote to memory of 2264 1572 frlrlrf.exe 32 PID 1572 wrote to memory of 2264 1572 frlrlrf.exe 32 PID 2264 wrote to memory of 2320 2264 82028.exe 33 PID 2264 wrote to memory of 2320 2264 82028.exe 33 PID 2264 wrote to memory of 2320 2264 82028.exe 33 PID 2264 wrote to memory of 2320 2264 82028.exe 33 PID 2320 wrote to memory of 2500 2320 44422.exe 34 PID 2320 wrote to memory of 2500 2320 44422.exe 34 PID 2320 wrote to memory of 2500 2320 44422.exe 34 PID 2320 wrote to memory of 2500 2320 44422.exe 34 PID 2500 wrote to memory of 2204 2500 604046.exe 35 PID 2500 wrote to memory of 2204 2500 604046.exe 35 PID 2500 wrote to memory of 2204 2500 604046.exe 35 PID 2500 wrote to memory of 2204 2500 604046.exe 35 PID 2204 wrote to memory of 2468 2204 jvjdp.exe 36 PID 2204 wrote to memory of 2468 2204 jvjdp.exe 36 PID 2204 wrote to memory of 2468 2204 jvjdp.exe 36 PID 2204 wrote to memory of 2468 2204 jvjdp.exe 36 PID 2468 wrote to memory of 2844 2468 86622.exe 37 PID 2468 wrote to memory of 2844 2468 86622.exe 37 PID 2468 wrote to memory of 2844 2468 86622.exe 37 PID 2468 wrote to memory of 2844 2468 86622.exe 37 PID 2844 wrote to memory of 2764 2844 7vpdj.exe 38 PID 2844 wrote to memory of 2764 2844 7vpdj.exe 38 PID 2844 wrote to memory of 2764 2844 7vpdj.exe 38 PID 2844 wrote to memory of 2764 2844 7vpdj.exe 38 PID 2764 wrote to memory of 2688 2764 1rflrrx.exe 39 PID 2764 wrote to memory of 2688 2764 1rflrrx.exe 39 PID 2764 wrote to memory of 2688 2764 1rflrrx.exe 39 PID 2764 wrote to memory of 2688 2764 1rflrrx.exe 39 PID 2688 wrote to memory of 2696 2688 8606662.exe 40 PID 2688 wrote to memory of 2696 2688 8606662.exe 40 PID 2688 wrote to memory of 2696 2688 8606662.exe 40 PID 2688 wrote to memory of 2696 2688 8606662.exe 40 PID 2696 wrote to memory of 568 2696 86006.exe 41 PID 2696 wrote to memory of 568 2696 86006.exe 41 PID 2696 wrote to memory of 568 2696 86006.exe 41 PID 2696 wrote to memory of 568 2696 86006.exe 41 PID 568 wrote to memory of 3044 568 5thtnt.exe 42 PID 568 wrote to memory of 3044 568 5thtnt.exe 42 PID 568 wrote to memory of 3044 568 5thtnt.exe 42 PID 568 wrote to memory of 3044 568 5thtnt.exe 42 PID 3044 wrote to memory of 2888 3044 htbntb.exe 44 PID 3044 wrote to memory of 2888 3044 htbntb.exe 44 PID 3044 wrote to memory of 2888 3044 htbntb.exe 44 PID 3044 wrote to memory of 2888 3044 htbntb.exe 44 PID 2888 wrote to memory of 616 2888 rlxlrfl.exe 45 PID 2888 wrote to memory of 616 2888 rlxlrfl.exe 45 PID 2888 wrote to memory of 616 2888 rlxlrfl.exe 45 PID 2888 wrote to memory of 616 2888 rlxlrfl.exe 45 PID 616 wrote to memory of 1960 616 88420.exe 46 PID 616 wrote to memory of 1960 616 88420.exe 46 PID 616 wrote to memory of 1960 616 88420.exe 46 PID 616 wrote to memory of 1960 616 88420.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe"C:\Users\Admin\AppData\Local\Temp\4dfbfe769a796c5f5959b06cb43ccc8d2dc721e8ea7afffc7b79c23b1188bb56N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\tthhnt.exec:\tthhnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\frlrlrf.exec:\frlrlrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\82028.exec:\82028.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\44422.exec:\44422.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\604046.exec:\604046.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\jvjdp.exec:\jvjdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\86622.exec:\86622.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\7vpdj.exec:\7vpdj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
\??\c:\1rflrrx.exec:\1rflrrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\8606662.exec:\8606662.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\86006.exec:\86006.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\5thtnt.exec:\5thtnt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
\??\c:\htbntb.exec:\htbntb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\rlxlrfl.exec:\rlxlrfl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\88420.exec:\88420.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:616 -
\??\c:\lfxlxfr.exec:\lfxlxfr.exe17⤵
- Executes dropped EXE
PID:1960 -
\??\c:\xxlrllx.exec:\xxlrllx.exe18⤵
- Executes dropped EXE
PID:1712 -
\??\c:\9djvp.exec:\9djvp.exe19⤵
- Executes dropped EXE
PID:2356 -
\??\c:\xlxfxff.exec:\xlxfxff.exe20⤵
- Executes dropped EXE
PID:1580 -
\??\c:\ffrrflr.exec:\ffrrflr.exe21⤵
- Executes dropped EXE
PID:2352 -
\??\c:\5rrxrrx.exec:\5rrxrrx.exe22⤵
- Executes dropped EXE
PID:2392 -
\??\c:\2600662.exec:\2600662.exe23⤵
- Executes dropped EXE
PID:780 -
\??\c:\xrfrxxx.exec:\xrfrxxx.exe24⤵
- Executes dropped EXE
PID:2540 -
\??\c:\vvjdj.exec:\vvjdj.exe25⤵
- Executes dropped EXE
PID:948 -
\??\c:\o826288.exec:\o826288.exe26⤵
- Executes dropped EXE
PID:1860 -
\??\c:\w82484.exec:\w82484.exe27⤵
- Executes dropped EXE
PID:2216 -
\??\c:\7lfrfrr.exec:\7lfrfrr.exe28⤵
- Executes dropped EXE
PID:2544 -
\??\c:\6028064.exec:\6028064.exe29⤵
- Executes dropped EXE
PID:1876 -
\??\c:\8040080.exec:\8040080.exe30⤵
- Executes dropped EXE
PID:2528 -
\??\c:\48606.exec:\48606.exe31⤵
- Executes dropped EXE
PID:2472 -
\??\c:\8640008.exec:\8640008.exe32⤵
- Executes dropped EXE
PID:2244 -
\??\c:\c226640.exec:\c226640.exe33⤵
- Executes dropped EXE
PID:576 -
\??\c:\40286.exec:\40286.exe34⤵
- Executes dropped EXE
PID:2264 -
\??\c:\fxflxfr.exec:\fxflxfr.exe35⤵
- Executes dropped EXE
PID:596 -
\??\c:\2644224.exec:\2644224.exe36⤵
- Executes dropped EXE
PID:2500 -
\??\c:\s8280.exec:\s8280.exe37⤵
- Executes dropped EXE
PID:2804 -
\??\c:\a6480.exec:\a6480.exe38⤵
- Executes dropped EXE
PID:2204 -
\??\c:\4600286.exec:\4600286.exe39⤵
- Executes dropped EXE
PID:2908 -
\??\c:\64886.exec:\64886.exe40⤵
- Executes dropped EXE
PID:1988 -
\??\c:\646244.exec:\646244.exe41⤵
- Executes dropped EXE
PID:2700 -
\??\c:\bthhnn.exec:\bthhnn.exe42⤵
- Executes dropped EXE
PID:2676 -
\??\c:\7jdvd.exec:\7jdvd.exe43⤵
- Executes dropped EXE
PID:2944 -
\??\c:\dpvvv.exec:\dpvvv.exe44⤵
- Executes dropped EXE
PID:2940 -
\??\c:\dpdjd.exec:\dpdjd.exe45⤵
- Executes dropped EXE
PID:2840 -
\??\c:\486244.exec:\486244.exe46⤵
- Executes dropped EXE
PID:3032 -
\??\c:\pdppd.exec:\pdppd.exe47⤵
- Executes dropped EXE
PID:2708 -
\??\c:\080662.exec:\080662.exe48⤵
- Executes dropped EXE
PID:1108 -
\??\c:\w04682.exec:\w04682.exe49⤵
- Executes dropped EXE
PID:1208 -
\??\c:\6402828.exec:\6402828.exe50⤵
- Executes dropped EXE
PID:1676 -
\??\c:\600682.exec:\600682.exe51⤵
- Executes dropped EXE
PID:648 -
\??\c:\jvjpd.exec:\jvjpd.exe52⤵
- Executes dropped EXE
PID:536 -
\??\c:\e08804.exec:\e08804.exe53⤵
- Executes dropped EXE
PID:2144 -
\??\c:\c206888.exec:\c206888.exe54⤵
- Executes dropped EXE
PID:2584 -
\??\c:\4862064.exec:\4862064.exe55⤵
- Executes dropped EXE
PID:276 -
\??\c:\rlrflfl.exec:\rlrflfl.exe56⤵
- Executes dropped EXE
PID:688 -
\??\c:\nhtbnh.exec:\nhtbnh.exe57⤵
- Executes dropped EXE
PID:1800 -
\??\c:\o080628.exec:\o080628.exe58⤵
- Executes dropped EXE
PID:2628 -
\??\c:\42846.exec:\42846.exe59⤵
- Executes dropped EXE
PID:1984 -
\??\c:\202462.exec:\202462.exe60⤵
- Executes dropped EXE
PID:1544 -
\??\c:\nbbbhb.exec:\nbbbhb.exe61⤵
- Executes dropped EXE
PID:1904 -
\??\c:\lfrxxxx.exec:\lfrxxxx.exe62⤵
- Executes dropped EXE
PID:1812 -
\??\c:\7jpjv.exec:\7jpjv.exe63⤵
- Executes dropped EXE
PID:2556 -
\??\c:\4262240.exec:\4262240.exe64⤵
- Executes dropped EXE
PID:2448 -
\??\c:\hbhhtt.exec:\hbhhtt.exe65⤵
- Executes dropped EXE
PID:1908 -
\??\c:\42484.exec:\42484.exe66⤵PID:864
-
\??\c:\6400048.exec:\6400048.exe67⤵PID:1672
-
\??\c:\888622.exec:\888622.exe68⤵PID:1504
-
\??\c:\5jvvv.exec:\5jvvv.exe69⤵PID:2140
-
\??\c:\llrfxrl.exec:\llrfxrl.exe70⤵PID:1700
-
\??\c:\nnbhbh.exec:\nnbhbh.exe71⤵PID:2272
-
\??\c:\5rxxffl.exec:\5rxxffl.exe72⤵PID:1164
-
\??\c:\ttbhnn.exec:\ttbhnn.exe73⤵PID:2780
-
\??\c:\jdvdp.exec:\jdvdp.exe74⤵PID:2792
-
\??\c:\xxlrfrl.exec:\xxlrfrl.exe75⤵PID:2756
-
\??\c:\rrfxxff.exec:\rrfxxff.exe76⤵PID:2468
-
\??\c:\dvjpd.exec:\dvjpd.exe77⤵PID:2968
-
\??\c:\a2242.exec:\a2242.exe78⤵PID:2900
-
\??\c:\26488.exec:\26488.exe79⤵PID:2640
-
\??\c:\048468.exec:\048468.exe80⤵PID:2788
-
\??\c:\fflffrl.exec:\fflffrl.exe81⤵PID:2256
-
\??\c:\hbntnn.exec:\hbntnn.exe82⤵PID:1476
-
\??\c:\48886.exec:\48886.exe83⤵PID:2848
-
\??\c:\hbtbbb.exec:\hbtbbb.exe84⤵PID:3012
-
\??\c:\lffflfr.exec:\lffflfr.exe85⤵PID:1792
-
\??\c:\7jvpp.exec:\7jvpp.exe86⤵PID:2716
-
\??\c:\w48468.exec:\w48468.exe87⤵PID:2876
-
\??\c:\m8066.exec:\m8066.exe88⤵PID:1980
-
\??\c:\pjdvj.exec:\pjdvj.exe89⤵PID:2400
-
\??\c:\3lxxxxx.exec:\3lxxxxx.exe90⤵PID:572
-
\??\c:\dvjjj.exec:\dvjjj.exe91⤵PID:2084
-
\??\c:\7lfllxf.exec:\7lfllxf.exe92⤵PID:1832
-
\??\c:\6084662.exec:\6084662.exe93⤵PID:1568
-
\??\c:\c026824.exec:\c026824.exe94⤵PID:1100
-
\??\c:\nhbhtb.exec:\nhbhtb.exe95⤵PID:2684
-
\??\c:\pjppd.exec:\pjppd.exe96⤵PID:112
-
\??\c:\60240.exec:\60240.exe97⤵PID:2540
-
\??\c:\e06664.exec:\e06664.exe98⤵PID:1836
-
\??\c:\lxfflll.exec:\lxfflll.exe99⤵PID:1660
-
\??\c:\btbhhb.exec:\btbhhb.exe100⤵PID:872
-
\??\c:\7fffxfl.exec:\7fffxfl.exe101⤵PID:2588
-
\??\c:\ffrfxff.exec:\ffrfxff.exe102⤵PID:2440
-
\??\c:\5xlxflr.exec:\5xlxflr.exe103⤵PID:1436
-
\??\c:\60802.exec:\60802.exe104⤵PID:2732
-
\??\c:\202066.exec:\202066.exe105⤵PID:1524
-
\??\c:\tnhhtt.exec:\tnhhtt.exe106⤵PID:2472
-
\??\c:\4628440.exec:\4628440.exe107⤵PID:2348
-
\??\c:\60804.exec:\60804.exe108⤵PID:2532
-
\??\c:\88846.exec:\88846.exe109⤵PID:2260
-
\??\c:\vpdpd.exec:\vpdpd.exe110⤵PID:2828
-
\??\c:\e86222.exec:\e86222.exe111⤵PID:2320
-
\??\c:\04226.exec:\04226.exe112⤵PID:2776
-
\??\c:\ntttbn.exec:\ntttbn.exe113⤵PID:2340
-
\??\c:\thnhhh.exec:\thnhhh.exe114⤵PID:2672
-
\??\c:\64008.exec:\64008.exe115⤵PID:2948
-
\??\c:\9jdvv.exec:\9jdvv.exe116⤵PID:2644
-
\??\c:\ppvdp.exec:\ppvdp.exe117⤵PID:1888
-
\??\c:\tbhtht.exec:\tbhtht.exe118⤵PID:2896
-
\??\c:\pdvdj.exec:\pdvdj.exe119⤵PID:1140
-
\??\c:\0428440.exec:\0428440.exe120⤵PID:1992
-
\??\c:\bhhtbb.exec:\bhhtbb.exe121⤵
- System Location Discovery: System Language Discovery
PID:2884 -
\??\c:\642282.exec:\642282.exe122⤵PID:3004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-