Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe
Resource
win7-20240903-en
General
-
Target
1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe
-
Size
79KB
-
MD5
43d05b7faf0a556ceb711b75ddd85050
-
SHA1
fbff5aa86a21c6063168b109b227f6a820b5b6e5
-
SHA256
1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dc
-
SHA512
54c988dbad351a619387940c01e3581b419afd41e53421053a9fa2de1a400908154392a0e1557e63fe44139a597db18eca343938a965a86c33b81c3a307e0cb9
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIpWCz+FR4RzWqC5rINFE4yeN:ymb3NkkiQ3mdBjFIsIpZ+R4RzWqCu4Q
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/1664-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1824-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1092-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3648-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/232-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1176-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1116-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/652-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1264-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4308-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3608-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1508-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2972-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4212-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3140-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1712-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/820-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4848-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2872-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1824 s0482.exe 1092 xrlfrrl.exe 232 k44426.exe 3648 1ppdp.exe 1176 284448.exe 1116 5jpvv.exe 652 8004226.exe 2564 fxfxrfx.exe 4004 2222660.exe 1680 dpjjj.exe 1264 4800444.exe 1656 nbbbtt.exe 4576 46408.exe 4308 i248866.exe 3608 dvpjj.exe 3800 424026.exe 1508 46488.exe 2972 fxlfxxf.exe 2860 flrxxxl.exe 4212 m2044.exe 3140 468862.exe 1712 4404260.exe 4628 4022666.exe 2300 86826.exe 5100 ddjvv.exe 4236 28446.exe 820 a8448.exe 4656 vpdvd.exe 3548 a4042.exe 4848 086404.exe 2872 fllfrrl.exe 2088 28604.exe 2016 xrrlxxr.exe 4156 lfrffxl.exe 4492 4660226.exe 1396 4626048.exe 2840 vpvpj.exe 4660 88220.exe 4556 5rxxxff.exe 1092 9hnhbh.exe 1524 9xfrffx.exe 1068 1xllffl.exe 448 44688.exe 1116 nnhhbb.exe 876 hbbbbb.exe 3732 5lrlfll.exe 2564 9htttt.exe 1872 thhhnn.exe 1316 2204886.exe 4508 68666.exe 3080 hthhnn.exe 2020 0464484.exe 4972 a0044.exe 4576 2660482.exe 2816 0022266.exe 5008 flffxrl.exe 3604 nbbhbt.exe 3800 vppvp.exe 752 rrrfrlx.exe 4844 2868642.exe 948 3fxflxf.exe 2992 488488.exe 4684 lxrrfxl.exe 1532 rxfxxxr.exe -
resource yara_rule behavioral2/memory/1664-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1664-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1824-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1092-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3648-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/232-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1176-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1116-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/652-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/652-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/652-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1264-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4308-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3608-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1508-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2972-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4212-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1712-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/820-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4848-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-209-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0026444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6660448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4022666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrrfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u688222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nttnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 664680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xfxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flffxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i660448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i844860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1824 1664 1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe 87 PID 1664 wrote to memory of 1824 1664 1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe 87 PID 1664 wrote to memory of 1824 1664 1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe 87 PID 1824 wrote to memory of 1092 1824 s0482.exe 88 PID 1824 wrote to memory of 1092 1824 s0482.exe 88 PID 1824 wrote to memory of 1092 1824 s0482.exe 88 PID 1092 wrote to memory of 232 1092 xrlfrrl.exe 89 PID 1092 wrote to memory of 232 1092 xrlfrrl.exe 89 PID 1092 wrote to memory of 232 1092 xrlfrrl.exe 89 PID 232 wrote to memory of 3648 232 k44426.exe 90 PID 232 wrote to memory of 3648 232 k44426.exe 90 PID 232 wrote to memory of 3648 232 k44426.exe 90 PID 3648 wrote to memory of 1176 3648 1ppdp.exe 91 PID 3648 wrote to memory of 1176 3648 1ppdp.exe 91 PID 3648 wrote to memory of 1176 3648 1ppdp.exe 91 PID 1176 wrote to memory of 1116 1176 284448.exe 92 PID 1176 wrote to memory of 1116 1176 284448.exe 92 PID 1176 wrote to memory of 1116 1176 284448.exe 92 PID 1116 wrote to memory of 652 1116 5jpvv.exe 93 PID 1116 wrote to memory of 652 1116 5jpvv.exe 93 PID 1116 wrote to memory of 652 1116 5jpvv.exe 93 PID 652 wrote to memory of 2564 652 8004226.exe 94 PID 652 wrote to memory of 2564 652 8004226.exe 94 PID 652 wrote to memory of 2564 652 8004226.exe 94 PID 2564 wrote to memory of 4004 2564 fxfxrfx.exe 95 PID 2564 wrote to memory of 4004 2564 fxfxrfx.exe 95 PID 2564 wrote to memory of 4004 2564 fxfxrfx.exe 95 PID 4004 wrote to memory of 1680 4004 2222660.exe 96 PID 4004 wrote to memory of 1680 4004 2222660.exe 96 PID 4004 wrote to memory of 1680 4004 2222660.exe 96 PID 1680 wrote to memory of 1264 1680 dpjjj.exe 97 PID 1680 wrote to memory of 1264 1680 dpjjj.exe 97 PID 1680 wrote to memory of 1264 1680 dpjjj.exe 97 PID 1264 wrote to memory of 1656 1264 4800444.exe 98 PID 1264 wrote to memory of 1656 1264 4800444.exe 98 PID 1264 wrote to memory of 1656 1264 4800444.exe 98 PID 1656 wrote to memory of 4576 1656 nbbbtt.exe 99 PID 1656 wrote to memory of 4576 1656 nbbbtt.exe 99 PID 1656 wrote to memory of 4576 1656 nbbbtt.exe 99 PID 4576 wrote to memory of 4308 4576 46408.exe 100 PID 4576 wrote to memory of 4308 4576 46408.exe 100 PID 4576 wrote to memory of 4308 4576 46408.exe 100 PID 4308 wrote to memory of 3608 4308 i248866.exe 101 PID 4308 wrote to memory of 3608 4308 i248866.exe 101 PID 4308 wrote to memory of 3608 4308 i248866.exe 101 PID 3608 wrote to memory of 3800 3608 dvpjj.exe 102 PID 3608 wrote to memory of 3800 3608 dvpjj.exe 102 PID 3608 wrote to memory of 3800 3608 dvpjj.exe 102 PID 3800 wrote to memory of 1508 3800 424026.exe 103 PID 3800 wrote to memory of 1508 3800 424026.exe 103 PID 3800 wrote to memory of 1508 3800 424026.exe 103 PID 1508 wrote to memory of 2972 1508 46488.exe 104 PID 1508 wrote to memory of 2972 1508 46488.exe 104 PID 1508 wrote to memory of 2972 1508 46488.exe 104 PID 2972 wrote to memory of 2860 2972 fxlfxxf.exe 105 PID 2972 wrote to memory of 2860 2972 fxlfxxf.exe 105 PID 2972 wrote to memory of 2860 2972 fxlfxxf.exe 105 PID 2860 wrote to memory of 4212 2860 flrxxxl.exe 106 PID 2860 wrote to memory of 4212 2860 flrxxxl.exe 106 PID 2860 wrote to memory of 4212 2860 flrxxxl.exe 106 PID 4212 wrote to memory of 3140 4212 m2044.exe 107 PID 4212 wrote to memory of 3140 4212 m2044.exe 107 PID 4212 wrote to memory of 3140 4212 m2044.exe 107 PID 3140 wrote to memory of 1712 3140 468862.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe"C:\Users\Admin\AppData\Local\Temp\1a88103e31823ab19067765c78426d4bf54caf64a45296244cf590239492d6dcN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
\??\c:\s0482.exec:\s0482.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\xrlfrrl.exec:\xrlfrrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
\??\c:\k44426.exec:\k44426.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
\??\c:\1ppdp.exec:\1ppdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
\??\c:\284448.exec:\284448.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
\??\c:\5jpvv.exec:\5jpvv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
\??\c:\8004226.exec:\8004226.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
\??\c:\fxfxrfx.exec:\fxfxrfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\2222660.exec:\2222660.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\dpjjj.exec:\dpjjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\4800444.exec:\4800444.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\nbbbtt.exec:\nbbbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\46408.exec:\46408.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
\??\c:\i248866.exec:\i248866.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
\??\c:\dvpjj.exec:\dvpjj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
\??\c:\424026.exec:\424026.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
\??\c:\46488.exec:\46488.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\fxlfxxf.exec:\fxlfxxf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\flrxxxl.exec:\flrxxxl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\m2044.exec:\m2044.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
\??\c:\468862.exec:\468862.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
\??\c:\4404260.exec:\4404260.exe23⤵
- Executes dropped EXE
PID:1712 -
\??\c:\4022666.exec:\4022666.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4628 -
\??\c:\86826.exec:\86826.exe25⤵
- Executes dropped EXE
PID:2300 -
\??\c:\ddjvv.exec:\ddjvv.exe26⤵
- Executes dropped EXE
PID:5100 -
\??\c:\28446.exec:\28446.exe27⤵
- Executes dropped EXE
PID:4236 -
\??\c:\a8448.exec:\a8448.exe28⤵
- Executes dropped EXE
PID:820 -
\??\c:\vpdvd.exec:\vpdvd.exe29⤵
- Executes dropped EXE
PID:4656 -
\??\c:\a4042.exec:\a4042.exe30⤵
- Executes dropped EXE
PID:3548 -
\??\c:\086404.exec:\086404.exe31⤵
- Executes dropped EXE
PID:4848 -
\??\c:\fllfrrl.exec:\fllfrrl.exe32⤵
- Executes dropped EXE
PID:2872 -
\??\c:\28604.exec:\28604.exe33⤵
- Executes dropped EXE
PID:2088 -
\??\c:\xrrlxxr.exec:\xrrlxxr.exe34⤵
- Executes dropped EXE
PID:2016 -
\??\c:\lfrffxl.exec:\lfrffxl.exe35⤵
- Executes dropped EXE
PID:4156 -
\??\c:\4660226.exec:\4660226.exe36⤵
- Executes dropped EXE
PID:4492 -
\??\c:\4626048.exec:\4626048.exe37⤵
- Executes dropped EXE
PID:1396 -
\??\c:\vpvpj.exec:\vpvpj.exe38⤵
- Executes dropped EXE
PID:2840 -
\??\c:\88220.exec:\88220.exe39⤵
- Executes dropped EXE
PID:4660 -
\??\c:\5rxxxff.exec:\5rxxxff.exe40⤵
- Executes dropped EXE
PID:4556 -
\??\c:\9hnhbh.exec:\9hnhbh.exe41⤵
- Executes dropped EXE
PID:1092 -
\??\c:\9xfrffx.exec:\9xfrffx.exe42⤵
- Executes dropped EXE
PID:1524 -
\??\c:\1xllffl.exec:\1xllffl.exe43⤵
- Executes dropped EXE
PID:1068 -
\??\c:\44688.exec:\44688.exe44⤵
- Executes dropped EXE
PID:448 -
\??\c:\nnhhbb.exec:\nnhhbb.exe45⤵
- Executes dropped EXE
PID:1116 -
\??\c:\hbbbbb.exec:\hbbbbb.exe46⤵
- Executes dropped EXE
PID:876 -
\??\c:\5lrlfll.exec:\5lrlfll.exe47⤵
- Executes dropped EXE
PID:3732 -
\??\c:\9htttt.exec:\9htttt.exe48⤵
- Executes dropped EXE
PID:2564 -
\??\c:\thhhnn.exec:\thhhnn.exe49⤵
- Executes dropped EXE
PID:1872 -
\??\c:\2204886.exec:\2204886.exe50⤵
- Executes dropped EXE
PID:1316 -
\??\c:\68666.exec:\68666.exe51⤵
- Executes dropped EXE
PID:4508 -
\??\c:\hthhnn.exec:\hthhnn.exe52⤵
- Executes dropped EXE
PID:3080 -
\??\c:\0464484.exec:\0464484.exe53⤵
- Executes dropped EXE
PID:2020 -
\??\c:\a0044.exec:\a0044.exe54⤵
- Executes dropped EXE
PID:4972 -
\??\c:\2660482.exec:\2660482.exe55⤵
- Executes dropped EXE
PID:4576 -
\??\c:\0022266.exec:\0022266.exe56⤵
- Executes dropped EXE
PID:2816 -
\??\c:\flffxrl.exec:\flffxrl.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008 -
\??\c:\nbbhbt.exec:\nbbhbt.exe58⤵
- Executes dropped EXE
PID:3604 -
\??\c:\vppvp.exec:\vppvp.exe59⤵
- Executes dropped EXE
PID:3800 -
\??\c:\rrrfrlx.exec:\rrrfrlx.exe60⤵
- Executes dropped EXE
PID:752 -
\??\c:\2868642.exec:\2868642.exe61⤵
- Executes dropped EXE
PID:4844 -
\??\c:\3fxflxf.exec:\3fxflxf.exe62⤵
- Executes dropped EXE
PID:948 -
\??\c:\488488.exec:\488488.exe63⤵
- Executes dropped EXE
PID:2992 -
\??\c:\lxrrfxl.exec:\lxrrfxl.exe64⤵
- Executes dropped EXE
PID:4684 -
\??\c:\rxfxxxr.exec:\rxfxxxr.exe65⤵
- Executes dropped EXE
PID:1532 -
\??\c:\i660448.exec:\i660448.exe66⤵
- System Location Discovery: System Language Discovery
PID:3412 -
\??\c:\m8826.exec:\m8826.exe67⤵PID:4740
-
\??\c:\824046.exec:\824046.exe68⤵PID:3084
-
\??\c:\tntttb.exec:\tntttb.exe69⤵PID:3776
-
\??\c:\bnttth.exec:\bnttth.exe70⤵PID:1192
-
\??\c:\62266.exec:\62266.exe71⤵PID:5100
-
\??\c:\04660.exec:\04660.exe72⤵PID:2824
-
\??\c:\4608428.exec:\4608428.exe73⤵PID:4868
-
\??\c:\9nnhnn.exec:\9nnhnn.exe74⤵PID:3252
-
\??\c:\2068226.exec:\2068226.exe75⤵PID:3724
-
\??\c:\4026666.exec:\4026666.exe76⤵PID:3188
-
\??\c:\22606.exec:\22606.exe77⤵PID:1480
-
\??\c:\5fxrfxr.exec:\5fxrfxr.exe78⤵PID:1576
-
\??\c:\xrxrlrr.exec:\xrxrlrr.exe79⤵PID:696
-
\??\c:\84482.exec:\84482.exe80⤵
- System Location Discovery: System Language Discovery
PID:1380 -
\??\c:\1rxrlfx.exec:\1rxrlfx.exe81⤵PID:4560
-
\??\c:\flxllfx.exec:\flxllfx.exe82⤵PID:3692
-
\??\c:\9btnhh.exec:\9btnhh.exe83⤵PID:2028
-
\??\c:\1xrrlff.exec:\1xrrlff.exe84⤵PID:1500
-
\??\c:\xxlfrfr.exec:\xxlfrfr.exe85⤵PID:2336
-
\??\c:\9ttnnh.exec:\9ttnnh.exe86⤵PID:2964
-
\??\c:\40062.exec:\40062.exe87⤵PID:1496
-
\??\c:\224422.exec:\224422.exe88⤵PID:3644
-
\??\c:\fxrxllf.exec:\fxrxllf.exe89⤵PID:1804
-
\??\c:\a0000.exec:\a0000.exe90⤵PID:3512
-
\??\c:\rxffxrr.exec:\rxffxrr.exe91⤵PID:3592
-
\??\c:\bbhbnn.exec:\bbhbnn.exe92⤵PID:3504
-
\??\c:\nhhbnn.exec:\nhhbnn.exe93⤵PID:4052
-
\??\c:\frrxrlr.exec:\frrxrlr.exe94⤵PID:3840
-
\??\c:\lfxflll.exec:\lfxflll.exe95⤵PID:892
-
\??\c:\vpvpj.exec:\vpvpj.exe96⤵PID:4004
-
\??\c:\9rlfrlf.exec:\9rlfrlf.exe97⤵PID:1880
-
\??\c:\208260.exec:\208260.exe98⤵PID:3956
-
\??\c:\e68204.exec:\e68204.exe99⤵PID:4020
-
\??\c:\thhbnn.exec:\thhbnn.exe100⤵PID:3352
-
\??\c:\i260884.exec:\i260884.exe101⤵PID:4616
-
\??\c:\20204.exec:\20204.exe102⤵PID:4576
-
\??\c:\040420.exec:\040420.exe103⤵PID:2476
-
\??\c:\i448260.exec:\i448260.exe104⤵PID:4528
-
\??\c:\rxxrllx.exec:\rxxrllx.exe105⤵PID:4600
-
\??\c:\ppdvp.exec:\ppdvp.exe106⤵PID:4840
-
\??\c:\42808.exec:\42808.exe107⤵PID:2712
-
\??\c:\httthh.exec:\httthh.exe108⤵PID:1008
-
\??\c:\tnnhtb.exec:\tnnhtb.exe109⤵PID:1760
-
\??\c:\rllfffx.exec:\rllfffx.exe110⤵PID:3180
-
\??\c:\u626048.exec:\u626048.exe111⤵PID:2420
-
\??\c:\lxrrlfx.exec:\lxrrlfx.exe112⤵PID:332
-
\??\c:\5rfrfff.exec:\5rfrfff.exe113⤵PID:3928
-
\??\c:\3tttnh.exec:\3tttnh.exe114⤵PID:1588
-
\??\c:\btnbbt.exec:\btnbbt.exe115⤵PID:3084
-
\??\c:\hbbbtt.exec:\hbbbtt.exe116⤵PID:3428
-
\??\c:\btntnt.exec:\btntnt.exe117⤵PID:3536
-
\??\c:\k88266.exec:\k88266.exe118⤵PID:2824
-
\??\c:\pjjjv.exec:\pjjjv.exe119⤵PID:4656
-
\??\c:\684860.exec:\684860.exe120⤵PID:4124
-
\??\c:\lfxxrrl.exec:\lfxxrrl.exe121⤵PID:2780
-
\??\c:\tntttt.exec:\tntttt.exe122⤵PID:2724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-