Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
Resource
win7-20241010-en
General
-
Target
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
-
Size
298KB
-
MD5
c48150ae1df943cec9e198000905216a
-
SHA1
5291d5b56a928717af19a756cdacde64cd9c0fdd
-
SHA256
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb
-
SHA512
565c590c3a124b9016ee1fb2d0f3686146c0d1511f90c8825f1f3d83d5291b42b11a4f40e1d70444f5bd179688cf6b31b96557a5a4146ac48ff73cd5db1be379
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvU:n3C9uDVOXLmHBKWyn+PgvU
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/3532-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1804-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1692-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4624-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3668-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3708-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4904-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3792-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/388-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3928-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3080-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3632-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1232-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1740-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2056-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4244-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4552-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1804 k88826.exe 1692 thnnhh.exe 4524 dpjdj.exe 4688 vvddj.exe 3468 20048.exe 2312 228888.exe 4624 pjddv.exe 3668 lxrrxrr.exe 2268 5hhbtt.exe 3720 lrfxrrl.exe 3708 rffllxf.exe 4904 26428.exe 3792 frfxxxx.exe 716 7nbbtn.exe 3004 6848260.exe 388 ttnnhn.exe 3928 bnnthh.exe 3080 ppvvp.exe 3632 20606.exe 1232 flxrffx.exe 1740 rxffxxr.exe 2732 bnnhbt.exe 4844 bntbht.exe 2920 ppjdv.exe 2056 7dpjd.exe 1816 rflffxr.exe 4244 i644464.exe 5096 80404.exe 4552 9ppjv.exe 532 6800000.exe 4912 240044.exe 4884 llrfxrl.exe 1776 7jjdd.exe 3612 btbtth.exe 1532 2688440.exe 3048 8400660.exe 2824 hbbbtt.exe 2696 dpvjv.exe 4016 1tbttt.exe 4332 1hbtnn.exe 2372 68022.exe 3968 046488.exe 2748 888226.exe 4604 nttnhb.exe 4212 g6848.exe 2540 408424.exe 4420 tnnhtt.exe 2724 hbnhhh.exe 3016 lxfxllf.exe 4476 28448.exe 2280 26260.exe 3336 c222044.exe 2268 5lfxxxx.exe 2080 jvvpj.exe 3592 444482.exe 596 vppdv.exe 1284 642666.exe 2308 2666260.exe 3792 u004882.exe 3300 hbnhnn.exe 788 rllllff.exe 2972 1vvvv.exe 4928 48040.exe 5032 0864806.exe -
resource yara_rule behavioral2/memory/3532-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3532-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1804-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1692-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2312-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3668-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3668-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3708-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/388-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3928-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3080-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3632-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1232-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1740-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2056-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4244-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4552-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-181-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrrfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6600262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffrrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e28248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 828208.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g4082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lflfxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxxrllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4660448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ppdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rrfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 802484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9tbbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 1804 3532 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 85 PID 3532 wrote to memory of 1804 3532 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 85 PID 3532 wrote to memory of 1804 3532 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 85 PID 1804 wrote to memory of 1692 1804 k88826.exe 86 PID 1804 wrote to memory of 1692 1804 k88826.exe 86 PID 1804 wrote to memory of 1692 1804 k88826.exe 86 PID 1692 wrote to memory of 4524 1692 thnnhh.exe 87 PID 1692 wrote to memory of 4524 1692 thnnhh.exe 87 PID 1692 wrote to memory of 4524 1692 thnnhh.exe 87 PID 4524 wrote to memory of 4688 4524 dpjdj.exe 88 PID 4524 wrote to memory of 4688 4524 dpjdj.exe 88 PID 4524 wrote to memory of 4688 4524 dpjdj.exe 88 PID 4688 wrote to memory of 3468 4688 vvddj.exe 89 PID 4688 wrote to memory of 3468 4688 vvddj.exe 89 PID 4688 wrote to memory of 3468 4688 vvddj.exe 89 PID 3468 wrote to memory of 2312 3468 20048.exe 90 PID 3468 wrote to memory of 2312 3468 20048.exe 90 PID 3468 wrote to memory of 2312 3468 20048.exe 90 PID 2312 wrote to memory of 4624 2312 228888.exe 91 PID 2312 wrote to memory of 4624 2312 228888.exe 91 PID 2312 wrote to memory of 4624 2312 228888.exe 91 PID 4624 wrote to memory of 3668 4624 pjddv.exe 92 PID 4624 wrote to memory of 3668 4624 pjddv.exe 92 PID 4624 wrote to memory of 3668 4624 pjddv.exe 92 PID 3668 wrote to memory of 2268 3668 lxrrxrr.exe 93 PID 3668 wrote to memory of 2268 3668 lxrrxrr.exe 93 PID 3668 wrote to memory of 2268 3668 lxrrxrr.exe 93 PID 2268 wrote to memory of 3720 2268 5hhbtt.exe 94 PID 2268 wrote to memory of 3720 2268 5hhbtt.exe 94 PID 2268 wrote to memory of 3720 2268 5hhbtt.exe 94 PID 3720 wrote to memory of 3708 3720 lrfxrrl.exe 95 PID 3720 wrote to memory of 3708 3720 lrfxrrl.exe 95 PID 3720 wrote to memory of 3708 3720 lrfxrrl.exe 95 PID 3708 wrote to memory of 4904 3708 rffllxf.exe 96 PID 3708 wrote to memory of 4904 3708 rffllxf.exe 96 PID 3708 wrote to memory of 4904 3708 rffllxf.exe 96 PID 4904 wrote to memory of 3792 4904 26428.exe 97 PID 4904 wrote to memory of 3792 4904 26428.exe 97 PID 4904 wrote to memory of 3792 4904 26428.exe 97 PID 3792 wrote to memory of 716 3792 frfxxxx.exe 98 PID 3792 wrote to memory of 716 3792 frfxxxx.exe 98 PID 3792 wrote to memory of 716 3792 frfxxxx.exe 98 PID 716 wrote to memory of 3004 716 7nbbtn.exe 99 PID 716 wrote to memory of 3004 716 7nbbtn.exe 99 PID 716 wrote to memory of 3004 716 7nbbtn.exe 99 PID 3004 wrote to memory of 388 3004 6848260.exe 100 PID 3004 wrote to memory of 388 3004 6848260.exe 100 PID 3004 wrote to memory of 388 3004 6848260.exe 100 PID 388 wrote to memory of 3928 388 ttnnhn.exe 101 PID 388 wrote to memory of 3928 388 ttnnhn.exe 101 PID 388 wrote to memory of 3928 388 ttnnhn.exe 101 PID 3928 wrote to memory of 3080 3928 bnnthh.exe 102 PID 3928 wrote to memory of 3080 3928 bnnthh.exe 102 PID 3928 wrote to memory of 3080 3928 bnnthh.exe 102 PID 3080 wrote to memory of 3632 3080 ppvvp.exe 103 PID 3080 wrote to memory of 3632 3080 ppvvp.exe 103 PID 3080 wrote to memory of 3632 3080 ppvvp.exe 103 PID 3632 wrote to memory of 1232 3632 20606.exe 104 PID 3632 wrote to memory of 1232 3632 20606.exe 104 PID 3632 wrote to memory of 1232 3632 20606.exe 104 PID 1232 wrote to memory of 1740 1232 flxrffx.exe 105 PID 1232 wrote to memory of 1740 1232 flxrffx.exe 105 PID 1232 wrote to memory of 1740 1232 flxrffx.exe 105 PID 1740 wrote to memory of 2732 1740 rxffxxr.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\k88826.exec:\k88826.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\thnnhh.exec:\thnnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\dpjdj.exec:\dpjdj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\vvddj.exec:\vvddj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\20048.exec:\20048.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
\??\c:\228888.exec:\228888.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
\??\c:\pjddv.exec:\pjddv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
\??\c:\lxrrxrr.exec:\lxrrxrr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
\??\c:\5hhbtt.exec:\5hhbtt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\lrfxrrl.exec:\lrfxrrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\rffllxf.exec:\rffllxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\26428.exec:\26428.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\frfxxxx.exec:\frfxxxx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
\??\c:\7nbbtn.exec:\7nbbtn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:716 -
\??\c:\6848260.exec:\6848260.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\ttnnhn.exec:\ttnnhn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:388 -
\??\c:\bnnthh.exec:\bnnthh.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
\??\c:\ppvvp.exec:\ppvvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\20606.exec:\20606.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
\??\c:\flxrffx.exec:\flxrffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\rxffxxr.exec:\rxffxxr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\bnnhbt.exec:\bnnhbt.exe23⤵
- Executes dropped EXE
PID:2732 -
\??\c:\bntbht.exec:\bntbht.exe24⤵
- Executes dropped EXE
PID:4844 -
\??\c:\ppjdv.exec:\ppjdv.exe25⤵
- Executes dropped EXE
PID:2920 -
\??\c:\7dpjd.exec:\7dpjd.exe26⤵
- Executes dropped EXE
PID:2056 -
\??\c:\rflffxr.exec:\rflffxr.exe27⤵
- Executes dropped EXE
PID:1816 -
\??\c:\i644464.exec:\i644464.exe28⤵
- Executes dropped EXE
PID:4244 -
\??\c:\80404.exec:\80404.exe29⤵
- Executes dropped EXE
PID:5096 -
\??\c:\9ppjv.exec:\9ppjv.exe30⤵
- Executes dropped EXE
PID:4552 -
\??\c:\6800000.exec:\6800000.exe31⤵
- Executes dropped EXE
PID:532 -
\??\c:\240044.exec:\240044.exe32⤵
- Executes dropped EXE
PID:4912 -
\??\c:\llrfxrl.exec:\llrfxrl.exe33⤵
- Executes dropped EXE
PID:4884 -
\??\c:\7jjdd.exec:\7jjdd.exe34⤵
- Executes dropped EXE
PID:1776 -
\??\c:\btbtth.exec:\btbtth.exe35⤵
- Executes dropped EXE
PID:3612 -
\??\c:\2688440.exec:\2688440.exe36⤵
- Executes dropped EXE
PID:1532 -
\??\c:\8400660.exec:\8400660.exe37⤵
- Executes dropped EXE
PID:3048 -
\??\c:\hbbbtt.exec:\hbbbtt.exe38⤵
- Executes dropped EXE
PID:2824 -
\??\c:\dpvjv.exec:\dpvjv.exe39⤵
- Executes dropped EXE
PID:2696 -
\??\c:\1tbttt.exec:\1tbttt.exe40⤵
- Executes dropped EXE
PID:4016 -
\??\c:\1hbtnn.exec:\1hbtnn.exe41⤵
- Executes dropped EXE
PID:4332 -
\??\c:\68022.exec:\68022.exe42⤵
- Executes dropped EXE
PID:2372 -
\??\c:\046488.exec:\046488.exe43⤵
- Executes dropped EXE
PID:3968 -
\??\c:\888226.exec:\888226.exe44⤵
- Executes dropped EXE
PID:2748 -
\??\c:\nttnhb.exec:\nttnhb.exe45⤵
- Executes dropped EXE
PID:4604 -
\??\c:\g6848.exec:\g6848.exe46⤵
- Executes dropped EXE
PID:4212 -
\??\c:\408424.exec:\408424.exe47⤵
- Executes dropped EXE
PID:2540 -
\??\c:\tnnhtt.exec:\tnnhtt.exe48⤵
- Executes dropped EXE
PID:4420 -
\??\c:\hbnhhh.exec:\hbnhhh.exe49⤵
- Executes dropped EXE
PID:2724 -
\??\c:\lxfxllf.exec:\lxfxllf.exe50⤵
- Executes dropped EXE
PID:3016 -
\??\c:\28448.exec:\28448.exe51⤵
- Executes dropped EXE
PID:4476 -
\??\c:\26260.exec:\26260.exe52⤵
- Executes dropped EXE
PID:2280 -
\??\c:\c222044.exec:\c222044.exe53⤵
- Executes dropped EXE
PID:3336 -
\??\c:\5lfxxxx.exec:\5lfxxxx.exe54⤵
- Executes dropped EXE
PID:2268 -
\??\c:\jvvpj.exec:\jvvpj.exe55⤵
- Executes dropped EXE
PID:2080 -
\??\c:\444482.exec:\444482.exe56⤵
- Executes dropped EXE
PID:3592 -
\??\c:\vppdv.exec:\vppdv.exe57⤵
- Executes dropped EXE
PID:596 -
\??\c:\642666.exec:\642666.exe58⤵
- Executes dropped EXE
PID:1284 -
\??\c:\2666260.exec:\2666260.exe59⤵
- Executes dropped EXE
PID:2308 -
\??\c:\u004882.exec:\u004882.exe60⤵
- Executes dropped EXE
PID:3792 -
\??\c:\hbnhnn.exec:\hbnhnn.exe61⤵
- Executes dropped EXE
PID:3300 -
\??\c:\rllllff.exec:\rllllff.exe62⤵
- Executes dropped EXE
PID:788 -
\??\c:\1vvvv.exec:\1vvvv.exe63⤵
- Executes dropped EXE
PID:2972 -
\??\c:\48040.exec:\48040.exe64⤵
- Executes dropped EXE
PID:4928 -
\??\c:\0864806.exec:\0864806.exe65⤵
- Executes dropped EXE
PID:5032 -
\??\c:\48826.exec:\48826.exe66⤵PID:4012
-
\??\c:\frlllfx.exec:\frlllfx.exe67⤵PID:5036
-
\??\c:\2404482.exec:\2404482.exe68⤵PID:3096
-
\??\c:\044860.exec:\044860.exe69⤵PID:1264
-
\??\c:\28004.exec:\28004.exe70⤵PID:3640
-
\??\c:\2604226.exec:\2604226.exe71⤵PID:2364
-
\??\c:\6840604.exec:\6840604.exe72⤵PID:4980
-
\??\c:\268822.exec:\268822.exe73⤵PID:1036
-
\??\c:\6060824.exec:\6060824.exe74⤵PID:5092
-
\??\c:\6060448.exec:\6060448.exe75⤵PID:3932
-
\??\c:\48606.exec:\48606.exe76⤵PID:1220
-
\??\c:\8844260.exec:\8844260.exe77⤵PID:4592
-
\??\c:\fxffrrl.exec:\fxffrrl.exe78⤵PID:4892
-
\??\c:\ddjjp.exec:\ddjjp.exe79⤵PID:5080
-
\??\c:\w82262.exec:\w82262.exe80⤵PID:4472
-
\??\c:\e06048.exec:\e06048.exe81⤵PID:532
-
\??\c:\8022666.exec:\8022666.exe82⤵PID:3304
-
\??\c:\pjpvd.exec:\pjpvd.exe83⤵PID:1528
-
\??\c:\228260.exec:\228260.exe84⤵PID:1884
-
\??\c:\a4066.exec:\a4066.exe85⤵PID:2720
-
\??\c:\jdpjp.exec:\jdpjp.exe86⤵PID:4856
-
\??\c:\e84426.exec:\e84426.exe87⤵PID:4820
-
\??\c:\42222.exec:\42222.exe88⤵PID:1360
-
\??\c:\1ppjd.exec:\1ppjd.exe89⤵PID:3268
-
\??\c:\tbhthb.exec:\tbhthb.exe90⤵PID:2532
-
\??\c:\802644.exec:\802644.exe91⤵PID:1964
-
\??\c:\vppdv.exec:\vppdv.exe92⤵PID:3532
-
\??\c:\1dvpd.exec:\1dvpd.exe93⤵PID:4932
-
\??\c:\26442.exec:\26442.exe94⤵PID:5108
-
\??\c:\4468260.exec:\4468260.exe95⤵PID:4672
-
\??\c:\nbhbhh.exec:\nbhbhh.exe96⤵PID:4680
-
\??\c:\8400888.exec:\8400888.exe97⤵PID:4688
-
\??\c:\hbnhbb.exec:\hbnhbb.exe98⤵PID:1068
-
\??\c:\86244.exec:\86244.exe99⤵PID:3468
-
\??\c:\rfxrllx.exec:\rfxrllx.exe100⤵PID:3288
-
\??\c:\466622.exec:\466622.exe101⤵
- System Location Discovery: System Language Discovery
PID:2924 -
\??\c:\jpvpj.exec:\jpvpj.exe102⤵PID:4476
-
\??\c:\488248.exec:\488248.exe103⤵PID:3360
-
\??\c:\880422.exec:\880422.exe104⤵PID:544
-
\??\c:\hhnnbb.exec:\hhnnbb.exe105⤵PID:1608
-
\??\c:\9jjvp.exec:\9jjvp.exe106⤵PID:2636
-
\??\c:\0684882.exec:\0684882.exe107⤵PID:3684
-
\??\c:\nnbtnh.exec:\nnbtnh.exe108⤵PID:2224
-
\??\c:\vdjdv.exec:\vdjdv.exe109⤵PID:2632
-
\??\c:\82826.exec:\82826.exe110⤵PID:2904
-
\??\c:\bnttbb.exec:\bnttbb.exe111⤵PID:4452
-
\??\c:\dvvvd.exec:\dvvvd.exe112⤵PID:716
-
\??\c:\64660.exec:\64660.exe113⤵PID:2436
-
\??\c:\dvdvv.exec:\dvdvv.exe114⤵PID:1424
-
\??\c:\bththh.exec:\bththh.exe115⤵PID:4564
-
\??\c:\tnnhth.exec:\tnnhth.exe116⤵PID:388
-
\??\c:\0282000.exec:\0282000.exe117⤵PID:4812
-
\??\c:\48044.exec:\48044.exe118⤵PID:3536
-
\??\c:\006082.exec:\006082.exe119⤵PID:4976
-
\??\c:\7rlfxxr.exec:\7rlfxxr.exe120⤵PID:3012
-
\??\c:\4462260.exec:\4462260.exe121⤵PID:2556
-
\??\c:\6644448.exec:\6644448.exe122⤵PID:4324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-