Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
034066f20478d1197197b2a4c7aec4f6.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
034066f20478d1197197b2a4c7aec4f6.exe
-
Size
72KB
-
MD5
034066f20478d1197197b2a4c7aec4f6
-
SHA1
a40ad6f94a826abfbcdf9875f433c4445fd4048d
-
SHA256
939a5a8bc56b670011fec1e5b9f1eedac1b48e3f09b0af725695c371d8bbbb90
-
SHA512
a3c9f392aea6bd0bf77f81727d958b917a3b41a6ecaa4bed37d81d7c84e79b95ea5e960853104e41a96ac986f0f4bce5f5c97ec0d1946a16aeea6391c4b85a6a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qjHXAIOJ:ymb3NkkiQ3mdBjFIj+qjHXBOJ
Malware Config
Signatures
-
Detect Blackmoon payload 32 IoCs
resource yara_rule behavioral1/memory/2320-2-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2280-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2536-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2944-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/956-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2008-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1696-310-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-361-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-377-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-348-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2184-332-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/940-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1408-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/632-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1948-430-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1664-444-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-485-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-510-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-627-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1848-726-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2280 bthhbb.exe 2148 1xrfrfr.exe 2832 dpvvd.exe 2548 hthnbn.exe 2600 pdddd.exe 2536 7bhntb.exe 2580 3xrfrxf.exe 2664 vpvjv.exe 2480 rlflrrx.exe 2944 hbbhnt.exe 1600 xxxllll.exe 1820 jjvjd.exe 1976 fxllrrf.exe 956 nbntbh.exe 1736 rlxlxfr.exe 2268 vppdp.exe 632 lfrxfxl.exe 1408 dppvd.exe 2008 3xlllrr.exe 1636 thbbhb.exe 2376 9xrxlrf.exe 964 hhhbth.exe 2780 vpvpv.exe 1860 xrllxrf.exe 2936 vpvdj.exe 2020 jdvpj.exe 1192 7xxfrxr.exe 2028 dppjv.exe 1552 llflflr.exe 940 hbthht.exe 1696 lfxrlrl.exe 1068 hhtbtb.exe 2184 7rlfflf.exe 2332 hbhhtt.exe 2552 jjdjd.exe 2832 hbnbnn.exe 2532 pvjvd.exe 2756 9ttnhn.exe 2732 djvpd.exe 2572 tnbhnt.exe 2568 vppvj.exe 2436 ttntnt.exe 3056 xxllrll.exe 1052 nththb.exe 1612 ddvdj.exe 2444 frxfrxx.exe 1948 9jjpj.exe 1664 flrrxxf.exe 1572 pjpjd.exe 2208 9hbhht.exe 1436 pjvjp.exe 2268 1bbhnt.exe 2492 pjvjv.exe 2284 nthnhh.exe 580 7jdpv.exe 2236 lllxlfr.exe 2348 vvjjd.exe 1760 dppjp.exe 984 3xflrxr.exe 1868 vpjjp.exe 1316 xxrfrlf.exe 712 jdpvd.exe 2960 xrlfrrl.exe 2876 jdvdv.exe -
resource yara_rule behavioral1/memory/2320-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2280-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2536-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1820-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/956-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2268-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2008-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1696-310-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-361-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-377-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-348-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2184-332-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/940-304-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2376-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1408-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1408-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/632-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-392-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1052-407-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-422-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1948-430-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1664-444-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-453-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2268-468-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-476-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-484-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-485-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-500-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-508-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-510-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1760-517-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1316-539-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/712-547-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-604-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-619-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-627-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-635-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-650-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1096-665-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-680-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-695-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-710-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1848-725-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1848-726-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1040-827-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-769-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2280 2320 034066f20478d1197197b2a4c7aec4f6.exe 28 PID 2320 wrote to memory of 2280 2320 034066f20478d1197197b2a4c7aec4f6.exe 28 PID 2320 wrote to memory of 2280 2320 034066f20478d1197197b2a4c7aec4f6.exe 28 PID 2320 wrote to memory of 2280 2320 034066f20478d1197197b2a4c7aec4f6.exe 28 PID 2280 wrote to memory of 2148 2280 bthhbb.exe 29 PID 2280 wrote to memory of 2148 2280 bthhbb.exe 29 PID 2280 wrote to memory of 2148 2280 bthhbb.exe 29 PID 2280 wrote to memory of 2148 2280 bthhbb.exe 29 PID 2148 wrote to memory of 2832 2148 1xrfrfr.exe 30 PID 2148 wrote to memory of 2832 2148 1xrfrfr.exe 30 PID 2148 wrote to memory of 2832 2148 1xrfrfr.exe 30 PID 2148 wrote to memory of 2832 2148 1xrfrfr.exe 30 PID 2832 wrote to memory of 2548 2832 dpvvd.exe 31 PID 2832 wrote to memory of 2548 2832 dpvvd.exe 31 PID 2832 wrote to memory of 2548 2832 dpvvd.exe 31 PID 2832 wrote to memory of 2548 2832 dpvvd.exe 31 PID 2548 wrote to memory of 2600 2548 hthnbn.exe 32 PID 2548 wrote to memory of 2600 2548 hthnbn.exe 32 PID 2548 wrote to memory of 2600 2548 hthnbn.exe 32 PID 2548 wrote to memory of 2600 2548 hthnbn.exe 32 PID 2600 wrote to memory of 2536 2600 pdddd.exe 33 PID 2600 wrote to memory of 2536 2600 pdddd.exe 33 PID 2600 wrote to memory of 2536 2600 pdddd.exe 33 PID 2600 wrote to memory of 2536 2600 pdddd.exe 33 PID 2536 wrote to memory of 2580 2536 7bhntb.exe 34 PID 2536 wrote to memory of 2580 2536 7bhntb.exe 34 PID 2536 wrote to memory of 2580 2536 7bhntb.exe 34 PID 2536 wrote to memory of 2580 2536 7bhntb.exe 34 PID 2580 wrote to memory of 2664 2580 3xrfrxf.exe 35 PID 2580 wrote to memory of 2664 2580 3xrfrxf.exe 35 PID 2580 wrote to memory of 2664 2580 3xrfrxf.exe 35 PID 2580 wrote to memory of 2664 2580 3xrfrxf.exe 35 PID 2664 wrote to memory of 2480 2664 vpvjv.exe 36 PID 2664 wrote to memory of 2480 2664 vpvjv.exe 36 PID 2664 wrote to memory of 2480 2664 vpvjv.exe 36 PID 2664 wrote to memory of 2480 2664 vpvjv.exe 36 PID 2480 wrote to memory of 2944 2480 rlflrrx.exe 37 PID 2480 wrote to memory of 2944 2480 rlflrrx.exe 37 PID 2480 wrote to memory of 2944 2480 rlflrrx.exe 37 PID 2480 wrote to memory of 2944 2480 rlflrrx.exe 37 PID 2944 wrote to memory of 1600 2944 hbbhnt.exe 38 PID 2944 wrote to memory of 1600 2944 hbbhnt.exe 38 PID 2944 wrote to memory of 1600 2944 hbbhnt.exe 38 PID 2944 wrote to memory of 1600 2944 hbbhnt.exe 38 PID 1600 wrote to memory of 1820 1600 xxxllll.exe 39 PID 1600 wrote to memory of 1820 1600 xxxllll.exe 39 PID 1600 wrote to memory of 1820 1600 xxxllll.exe 39 PID 1600 wrote to memory of 1820 1600 xxxllll.exe 39 PID 1820 wrote to memory of 1976 1820 jjvjd.exe 40 PID 1820 wrote to memory of 1976 1820 jjvjd.exe 40 PID 1820 wrote to memory of 1976 1820 jjvjd.exe 40 PID 1820 wrote to memory of 1976 1820 jjvjd.exe 40 PID 1976 wrote to memory of 956 1976 fxllrrf.exe 41 PID 1976 wrote to memory of 956 1976 fxllrrf.exe 41 PID 1976 wrote to memory of 956 1976 fxllrrf.exe 41 PID 1976 wrote to memory of 956 1976 fxllrrf.exe 41 PID 956 wrote to memory of 1736 956 nbntbh.exe 42 PID 956 wrote to memory of 1736 956 nbntbh.exe 42 PID 956 wrote to memory of 1736 956 nbntbh.exe 42 PID 956 wrote to memory of 1736 956 nbntbh.exe 42 PID 1736 wrote to memory of 2268 1736 rlxlxfr.exe 43 PID 1736 wrote to memory of 2268 1736 rlxlxfr.exe 43 PID 1736 wrote to memory of 2268 1736 rlxlxfr.exe 43 PID 1736 wrote to memory of 2268 1736 rlxlxfr.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\034066f20478d1197197b2a4c7aec4f6.exe"C:\Users\Admin\AppData\Local\Temp\034066f20478d1197197b2a4c7aec4f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\bthhbb.exec:\bthhbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
\??\c:\1xrfrfr.exec:\1xrfrfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\dpvvd.exec:\dpvvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\hthnbn.exec:\hthnbn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\pdddd.exec:\pdddd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\7bhntb.exec:\7bhntb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\3xrfrxf.exec:\3xrfrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\vpvjv.exec:\vpvjv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\rlflrrx.exec:\rlflrrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\hbbhnt.exec:\hbbhnt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\xxxllll.exec:\xxxllll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\jjvjd.exec:\jjvjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
\??\c:\fxllrrf.exec:\fxllrrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\nbntbh.exec:\nbntbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
\??\c:\rlxlxfr.exec:\rlxlxfr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\vppdp.exec:\vppdp.exe17⤵
- Executes dropped EXE
PID:2268 -
\??\c:\lfrxfxl.exec:\lfrxfxl.exe18⤵
- Executes dropped EXE
PID:632 -
\??\c:\dppvd.exec:\dppvd.exe19⤵
- Executes dropped EXE
PID:1408 -
\??\c:\3xlllrr.exec:\3xlllrr.exe20⤵
- Executes dropped EXE
PID:2008
-
-
-
-
-
-
-
-
-
\??\c:\1fxrxff.exec:\1fxrxff.exe13⤵PID:1920
-
\??\c:\tnbnnh.exec:\tnbnnh.exe14⤵PID:1948
-
\??\c:\jdvdp.exec:\jdvdp.exe15⤵PID:956
-
\??\c:\rxfxfll.exec:\rxfxfll.exe16⤵PID:1624
-
\??\c:\9tthtt.exec:\9tthtt.exe17⤵PID:1304
-
\??\c:\5jvpj.exec:\5jvpj.exe18⤵PID:2996
-
\??\c:\rflxlrx.exec:\rflxlrx.exe19⤵PID:1812
-
\??\c:\vpjpv.exec:\vpjpv.exe20⤵PID:2252
-
\??\c:\7xxrxfl.exec:\7xxrxfl.exe21⤵PID:944
-
\??\c:\htbbbb.exec:\htbbbb.exe22⤵PID:1112
-
-
-
-
\??\c:\5djpp.exec:\5djpp.exe20⤵PID:1576
-
\??\c:\rlxfllr.exec:\rlxfllr.exe21⤵PID:944
-
\??\c:\rrxxxrr.exec:\rrxxxrr.exe22⤵PID:2492
-
\??\c:\vpdjv.exec:\vpdjv.exe23⤵PID:2768
-
\??\c:\hbhnnb.exec:\hbhnnb.exe24⤵PID:1380
-
\??\c:\djpvv.exec:\djpvv.exe25⤵PID:1288
-
\??\c:\ppjdj.exec:\ppjdj.exe26⤵PID:776
-
\??\c:\7rxxffl.exec:\7rxxffl.exe27⤵PID:108
-
\??\c:\fxrfxfr.exec:\fxrfxfr.exe28⤵PID:1776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\hbntnn.exec:\hbntnn.exe16⤵PID:1764
-
-
-
-
-
-
-
-
-
-
-
\??\c:\7lllrlr.exec:\7lllrlr.exe7⤵PID:2584
-
\??\c:\lflrffl.exec:\lflrffl.exe8⤵PID:2576
-
-
-
-
-
-
-
-
\??\c:\vpvpv.exec:\vpvpv.exe1⤵
- Executes dropped EXE
PID:2780 -
\??\c:\xrllxrf.exec:\xrllxrf.exe2⤵
- Executes dropped EXE
PID:1860
-
-
\??\c:\hbhhtt.exec:\hbhhtt.exe1⤵
- Executes dropped EXE
PID:2332 -
\??\c:\jjdjd.exec:\jjdjd.exe2⤵
- Executes dropped EXE
PID:2552 -
\??\c:\hbnntn.exec:\hbnntn.exe3⤵PID:2584
-
-
-
\??\c:\hbnbnn.exec:\hbnbnn.exe1⤵
- Executes dropped EXE
PID:2832 -
\??\c:\pvjvd.exec:\pvjvd.exe2⤵
- Executes dropped EXE
PID:2532
-
-
\??\c:\djvpd.exec:\djvpd.exe1⤵
- Executes dropped EXE
PID:2732 -
\??\c:\tnbhnt.exec:\tnbhnt.exe2⤵
- Executes dropped EXE
PID:2572
-
-
\??\c:\vppvj.exec:\vppvj.exe1⤵
- Executes dropped EXE
PID:2568 -
\??\c:\ttntnt.exec:\ttntnt.exe2⤵
- Executes dropped EXE
PID:2436 -
\??\c:\xxllrll.exec:\xxllrll.exe3⤵
- Executes dropped EXE
PID:3056 -
\??\c:\nththb.exec:\nththb.exe4⤵
- Executes dropped EXE
PID:1052 -
\??\c:\ddvdj.exec:\ddvdj.exe5⤵
- Executes dropped EXE
PID:1612 -
\??\c:\frxfrxx.exec:\frxfrxx.exe6⤵
- Executes dropped EXE
PID:2444 -
\??\c:\9jjpj.exec:\9jjpj.exe7⤵
- Executes dropped EXE
PID:1948 -
\??\c:\flrrxxf.exec:\flrrxxf.exe8⤵
- Executes dropped EXE
PID:1664 -
\??\c:\pjpjd.exec:\pjpjd.exe9⤵
- Executes dropped EXE
PID:1572 -
\??\c:\9hbhht.exec:\9hbhht.exe10⤵
- Executes dropped EXE
PID:2208 -
\??\c:\pjvjp.exec:\pjvjp.exe11⤵
- Executes dropped EXE
PID:1436 -
\??\c:\1bbhnt.exec:\1bbhnt.exe12⤵
- Executes dropped EXE
PID:2268 -
\??\c:\pjvjv.exec:\pjvjv.exe13⤵
- Executes dropped EXE
PID:2492 -
\??\c:\nthnhh.exec:\nthnhh.exe14⤵
- Executes dropped EXE
PID:2284 -
\??\c:\7jdpv.exec:\7jdpv.exe15⤵
- Executes dropped EXE
PID:580 -
\??\c:\lllxlfr.exec:\lllxlfr.exe16⤵
- Executes dropped EXE
PID:2236 -
\??\c:\vvjjd.exec:\vvjjd.exe17⤵
- Executes dropped EXE
PID:2348 -
\??\c:\dppjp.exec:\dppjp.exe18⤵
- Executes dropped EXE
PID:1760 -
\??\c:\3xflrxr.exec:\3xflrxr.exe19⤵
- Executes dropped EXE
PID:984 -
\??\c:\vpjjp.exec:\vpjjp.exe20⤵
- Executes dropped EXE
PID:1868 -
\??\c:\xxrfrlf.exec:\xxrfrlf.exe21⤵
- Executes dropped EXE
PID:1316 -
\??\c:\jdpvd.exec:\jdpvd.exe22⤵
- Executes dropped EXE
PID:712 -
\??\c:\xrlfrrl.exec:\xrlfrrl.exe23⤵
- Executes dropped EXE
PID:2960 -
\??\c:\jdvdv.exec:\jdvdv.exe24⤵
- Executes dropped EXE
PID:2876 -
\??\c:\nbbbnh.exec:\nbbbnh.exe25⤵PID:2932
-
\??\c:\ddvdp.exec:\ddvdp.exe26⤵PID:2028
-
\??\c:\tbbnbn.exec:\tbbnbn.exe27⤵PID:2328
-
\??\c:\dpddd.exec:\dpddd.exe28⤵PID:1700
-
\??\c:\rfrrxxl.exec:\rfrrxxl.exe29⤵PID:2864
-
\??\c:\thhhtb.exec:\thhhtb.exe30⤵PID:1648
-
\??\c:\xlfrrxf.exec:\xlfrrxf.exe31⤵PID:2356
-
\??\c:\nnntnt.exec:\nnntnt.exe32⤵PID:2168
-
\??\c:\1flrxxl.exec:\1flrxxl.exe33⤵PID:2748
-
\??\c:\lrxrxrx.exec:\lrxrxrx.exe34⤵PID:2668
-
\??\c:\bthnnn.exec:\bthnnn.exe35⤵PID:2772
-
\??\c:\rlfxlfr.exec:\rlfxlfr.exe36⤵PID:2520
-
\??\c:\7pvjv.exec:\7pvjv.exe37⤵PID:2696
-
\??\c:\3fflxlr.exec:\3fflxlr.exe38⤵PID:1096
-
\??\c:\hhbtbt.exec:\hhbtbt.exe39⤵PID:2676
-
\??\c:\lflxrxl.exec:\lflxrxl.exe40⤵PID:2664
-
\??\c:\btbbhn.exec:\btbbhn.exe41⤵PID:3044
-
\??\c:\rfxrlfl.exec:\rfxrlfl.exe42⤵PID:2836
-
\??\c:\nhhbnn.exec:\nhhbnn.exe43⤵PID:1968
-
\??\c:\ddjdd.exec:\ddjdd.exe44⤵PID:1692
-
\??\c:\xxrxffl.exec:\xxrxffl.exe45⤵PID:1820
-
\??\c:\tnnnht.exec:\tnnnht.exe46⤵PID:1848
-
\??\c:\9xrrrxx.exec:\9xrrrxx.exe47⤵PID:2368
-
-
-
-
-
\??\c:\dpdjv.exec:\dpdjv.exe44⤵PID:1568
-
\??\c:\htbttn.exec:\htbttn.exe45⤵PID:2288
-
-
-
-
-
-
-
-
-
\??\c:\jdjvp.exec:\jdjvp.exe38⤵PID:2276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\1vjjv.exec:\1vjjv.exe23⤵PID:616
-
-
-
-
\??\c:\1xrfrxf.exec:\1xrfrxf.exe21⤵PID:3024
-
-
-
\??\c:\xlxfflx.exec:\xlxfflx.exe20⤵PID:1040
-
-
-
-
\??\c:\xrllllf.exec:\xrllllf.exe18⤵PID:1872
-
\??\c:\jdjjp.exec:\jdjjp.exe19⤵PID:984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\9ttnhn.exec:\9ttnhn.exe1⤵
- Executes dropped EXE
PID:2756
-
\??\c:\7rlfflf.exec:\7rlfflf.exe1⤵
- Executes dropped EXE
PID:2184
-
\??\c:\hhtbtb.exec:\hhtbtb.exe1⤵
- Executes dropped EXE
PID:1068
-
\??\c:\lfxrlrl.exec:\lfxrlrl.exe1⤵
- Executes dropped EXE
PID:1696
-
\??\c:\hbthht.exec:\hbthht.exe1⤵
- Executes dropped EXE
PID:940
-
\??\c:\llflflr.exec:\llflflr.exe1⤵
- Executes dropped EXE
PID:1552
-
\??\c:\dppjv.exec:\dppjv.exe1⤵
- Executes dropped EXE
PID:2028
-
\??\c:\7xxfrxr.exec:\7xxfrxr.exe1⤵
- Executes dropped EXE
PID:1192
-
\??\c:\jdvpj.exec:\jdvpj.exe1⤵
- Executes dropped EXE
PID:2020
-
\??\c:\vpvdj.exec:\vpvdj.exe1⤵
- Executes dropped EXE
PID:2936
-
\??\c:\hhhbth.exec:\hhhbth.exe1⤵
- Executes dropped EXE
PID:964
-
\??\c:\9xrxlrf.exec:\9xrxlrf.exe1⤵
- Executes dropped EXE
PID:2376
-
\??\c:\thbbhb.exec:\thbbhb.exe1⤵
- Executes dropped EXE
PID:1636
-
\??\c:\1thbnn.exec:\1thbnn.exe1⤵PID:1396
-
\??\c:\vvvjp.exec:\vvvjp.exe2⤵PID:1332
-
-
\??\c:\pvdvd.exec:\pvdvd.exe1⤵PID:1312
-
\??\c:\5xlfllr.exec:\5xlfllr.exe1⤵PID:676
-
\??\c:\nnthbh.exec:\nnthbh.exe2⤵PID:2372
-
-
\??\c:\vppvv.exec:\vppvv.exe1⤵PID:804
-
\??\c:\hntthh.exec:\hntthh.exe1⤵PID:3068
-
\??\c:\1pvdp.exec:\1pvdp.exe1⤵PID:560
-
\??\c:\fffrfrf.exec:\fffrfrf.exe2⤵PID:1340
-
-
\??\c:\7rxlxfl.exec:\7rxlxfl.exe1⤵PID:2040
-
\??\c:\nbntbb.exec:\nbntbb.exe2⤵PID:2924
-
\??\c:\vjddp.exec:\vjddp.exe3⤵PID:112
-
\??\c:\nhnnbh.exec:\nhnnbh.exe4⤵PID:1068
-
\??\c:\xxfrxlf.exec:\xxfrxlf.exe5⤵PID:2888
-
-
-
-
-
\??\c:\nhtthn.exec:\nhtthn.exe1⤵PID:2112
-
\??\c:\jvvdv.exec:\jvvdv.exe2⤵PID:1660
-
\??\c:\bbthbn.exec:\bbthbn.exe3⤵PID:2612
-
\??\c:\rllfrxl.exec:\rllfrxl.exe4⤵PID:2484
-
-
-
-
\??\c:\bhbhhn.exec:\bhbhhn.exe1⤵PID:2604
-
\??\c:\jdppv.exec:\jdppv.exe2⤵PID:2596
-
-
\??\c:\rlfllll.exec:\rlfllll.exe1⤵PID:2440
-
\??\c:\bbbhbb.exec:\bbbhbb.exe2⤵PID:2696
-
\??\c:\lfxffrf.exec:\lfxffrf.exe3⤵PID:2416
-
\??\c:\xrflfxf.exec:\xrflfxf.exe4⤵PID:2452
-
-
-
-
\??\c:\pdpvj.exec:\pdpvj.exe1⤵PID:2508
-
\??\c:\xlfflrf.exec:\xlfflrf.exe1⤵PID:2452
-
\??\c:\bnbnhh.exec:\bnbnhh.exe2⤵PID:2516
-
-
\??\c:\vpdjp.exec:\vpdjp.exe2⤵PID:2848
-
\??\c:\httttt.exec:\httttt.exe3⤵PID:2984
-
-
-
\??\c:\xrxxlrx.exec:\xrxxlrx.exe1⤵PID:2552
-
\??\c:\lllrfxl.exec:\lllrfxl.exe1⤵PID:2496
-
\??\c:\xrfrfrx.exec:\xrfrfrx.exe1⤵PID:2592
-
\??\c:\9fxxffr.exec:\9fxxffr.exe1⤵PID:3044
-
\??\c:\bhhtbt.exec:\bhhtbt.exe2⤵PID:2256
-
\??\c:\pdjvd.exec:\pdjvd.exe3⤵PID:1600
-
-
-
\??\c:\ppjpv.exec:\ppjpv.exe1⤵PID:3036
-
\??\c:\jddpv.exec:\jddpv.exe1⤵PID:3008
-
\??\c:\hthhtn.exec:\hthhtn.exe1⤵PID:3004
-
\??\c:\htbnbb.exec:\htbnbb.exe1⤵PID:2104
-
\??\c:\rfrxflr.exec:\rfrxflr.exe1⤵PID:2348
-
\??\c:\pjjpj.exec:\pjjpj.exe1⤵PID:2056
-
\??\c:\hbnthh.exec:\hbnthh.exe1⤵PID:2100
-
\??\c:\lfxfxfl.exec:\lfxfxfl.exe1⤵PID:1380
-
\??\c:\ththnn.exec:\ththnn.exe2⤵PID:1992
-
\??\c:\rxfxxll.exec:\rxfxxll.exe3⤵PID:308
-
\??\c:\ttthtb.exec:\ttthtb.exe4⤵PID:988
-
\??\c:\vjjdp.exec:\vjjdp.exe5⤵PID:1868
-
-
-
-
-
\??\c:\djjdj.exec:\djjdj.exe1⤵PID:2232
-
\??\c:\xrlffll.exec:\xrlffll.exe1⤵PID:300
-
\??\c:\5tthtb.exec:\5tthtb.exe2⤵PID:1552
-
\??\c:\vvjdj.exec:\vvjdj.exe3⤵PID:2924
-
-
-
\??\c:\rlxrlxl.exec:\rlxrlxl.exe1⤵PID:1660
-
\??\c:\vpdjv.exec:\vpdjv.exe1⤵PID:2560
-
\??\c:\tnhtht.exec:\tnhtht.exe2⤵PID:2600
-
-
\??\c:\vpjpd.exec:\vpjpd.exe1⤵PID:2572
-
\??\c:\nnhnbh.exec:\nnhnbh.exe2⤵PID:2696
-
-
\??\c:\nbnhnn.exec:\nbnhnn.exe1⤵PID:1944
-
\??\c:\frxrffl.exec:\frxrffl.exe2⤵PID:1968
-
-
\??\c:\7hhbnh.exec:\7hhbnh.exe1⤵PID:1940
-
\??\c:\3rlllxr.exec:\3rlllxr.exe2⤵PID:1864
-
-
\??\c:\lxfxfff.exec:\lxfxfff.exe1⤵PID:2920
-
\??\c:\3vpjv.exec:\3vpjv.exe2⤵PID:2816
-
\??\c:\tnhntt.exec:\tnhntt.exe3⤵PID:1812
-
-
-
\??\c:\vvjjd.exec:\vvjjd.exe1⤵PID:956
-
\??\c:\htbbhb.exec:\htbbhb.exe1⤵PID:712
-
\??\c:\pvjdj.exec:\pvjdj.exe1⤵PID:1960
-
\??\c:\bnnbhn.exec:\bnnbhn.exe2⤵PID:2004
-
-
\??\c:\9hhnht.exec:\9hhnht.exe1⤵PID:2040
-
\??\c:\rlxxlff.exec:\rlxxlff.exe2⤵PID:2204
-
\??\c:\ffxflrf.exec:\ffxflrf.exe3⤵PID:544
-
\??\c:\flfxflx.exec:\flfxflx.exe4⤵PID:2196
-
\??\c:\7vpvp.exec:\7vpvp.exe5⤵PID:2160
-
\??\c:\pdpvv.exec:\pdpvv.exe6⤵PID:2740
-
\??\c:\ddvvd.exec:\ddvvd.exe7⤵PID:2604
-
\??\c:\hhhbtb.exec:\hhhbtb.exe8⤵PID:2668
-
\??\c:\1nhhtb.exec:\1nhhtb.exe9⤵PID:2560
-
\??\c:\tbtbnt.exec:\tbtbnt.exe10⤵PID:2756
-
\??\c:\xxfxlrf.exec:\xxfxlrf.exe11⤵PID:2584
-
\??\c:\ntntbb.exec:\ntntbb.exe12⤵PID:320
-
\??\c:\tthtnn.exec:\tthtnn.exe13⤵PID:2732
-
\??\c:\5bnnbh.exec:\5bnnbh.exe14⤵PID:2276
-
\??\c:\bbthbh.exec:\bbthbh.exe15⤵PID:2024
-
\??\c:\nnbhbh.exec:\nnbhbh.exe16⤵PID:2516
-
\??\c:\hhbtnt.exec:\hhbtnt.exe17⤵PID:2836
-
\??\c:\hbbhnn.exec:\hbbhnn.exe18⤵PID:3056
-
\??\c:\jjdvd.exec:\jjdvd.exe19⤵PID:2256
-
\??\c:\dpvjj.exec:\dpvjj.exe20⤵PID:1976
-
\??\c:\5pvpd.exec:\5pvpd.exe21⤵PID:2236
-
\??\c:\ddjdd.exec:\ddjdd.exe22⤵PID:2392
-
\??\c:\tnhntt.exec:\tnhntt.exe23⤵PID:1736
-
\??\c:\lllxxll.exec:\lllxxll.exe24⤵PID:1948
-
\??\c:\lfxlrxl.exec:\lfxlrxl.exe25⤵PID:1312
-
\??\c:\xrfflrf.exec:\xrfflrf.exe26⤵PID:1632
-
\??\c:\vdpvv.exec:\vdpvv.exe27⤵PID:2224
-
\??\c:\9vddv.exec:\9vddv.exe28⤵PID:2252
-
\??\c:\7ddvd.exec:\7ddvd.exe29⤵PID:1088
-
\??\c:\rrlrrxf.exec:\rrlrrxf.exe30⤵PID:944
-
\??\c:\vppdp.exec:\vppdp.exe31⤵PID:2744
-
\??\c:\vppdd.exec:\vppdd.exe32⤵PID:2232
-
\??\c:\9nbntb.exec:\9nbntb.exe33⤵PID:2348
-
\??\c:\9rflllr.exec:\9rflllr.exe34⤵PID:2164
-
\??\c:\ddvdj.exec:\ddvdj.exe35⤵PID:2588
-
\??\c:\5nnbtt.exec:\5nnbtt.exe36⤵PID:884
-
\??\c:\7rllflx.exec:\7rllflx.exe37⤵PID:988
-
\??\c:\pppjv.exec:\pppjv.exe38⤵PID:1040
-
\??\c:\thbhtb.exec:\thbhtb.exe39⤵PID:3024
-
\??\c:\lxxxxxf.exec:\lxxxxxf.exe40⤵PID:1752
-
\??\c:\dvjpd.exec:\dvjpd.exe41⤵PID:2892
-
\??\c:\bnbttn.exec:\bnbttn.exe42⤵PID:2880
-
\??\c:\lrrrrff.exec:\lrrrrff.exe43⤵PID:3008
-
\??\c:\lflfxrx.exec:\lflfxrx.exe44⤵PID:2592
-
\??\c:\5dddp.exec:\5dddp.exe45⤵PID:2180
-
\??\c:\7ttnnt.exec:\7ttnnt.exe46⤵PID:2160
-
\??\c:\9dvvv.exec:\9dvvv.exe47⤵PID:3064
-
\??\c:\xlfflfl.exec:\xlfflfl.exe48⤵PID:2352
-
\??\c:\dvjvp.exec:\dvjvp.exe49⤵PID:2552
-
\??\c:\nhbnbn.exec:\nhbnbn.exe50⤵PID:2520
-
\??\c:\nnhnbh.exec:\nnhnbh.exe51⤵PID:2600
-
\??\c:\nhbbtt.exec:\nhbbtt.exe52⤵PID:2652
-
\??\c:\flrfxlf.exec:\flrfxlf.exe53⤵PID:2656
-
\??\c:\vpdpd.exec:\vpdpd.exe54⤵PID:2828
-
\??\c:\jdjjv.exec:\jdjjv.exe55⤵PID:2620
-
\??\c:\thttnn.exec:\thttnn.exe56⤵PID:2568
-
\??\c:\rflrxff.exec:\rflrxff.exe57⤵PID:1064
-
\??\c:\jdjvv.exec:\jdjvv.exe58⤵PID:1620
-
\??\c:\tnhnhb.exec:\tnhnhb.exe59⤵PID:1616
-
\??\c:\xlrxrrx.exec:\xlrxrrx.exe60⤵PID:1600
-
\??\c:\rxxxfll.exec:\rxxxfll.exe61⤵PID:1568
-
\??\c:\jvvpp.exec:\jvvpp.exe62⤵PID:1848
-
\??\c:\hbhhhb.exec:\hbhhhb.exe63⤵PID:812
-
\??\c:\5flrxff.exec:\5flrxff.exe64⤵PID:1276
-
\??\c:\5vjdd.exec:\5vjdd.exe65⤵PID:1736
-
\??\c:\pvddp.exec:\pvddp.exe66⤵PID:1304
-
\??\c:\tnnttb.exec:\tnnttb.exe67⤵PID:2920
-
\??\c:\fxlxfrf.exec:\fxlxfrf.exe68⤵PID:2008
-
\??\c:\3jvvd.exec:\3jvvd.exe69⤵PID:2056
-
\??\c:\bnnntt.exec:\bnnntt.exe70⤵PID:3040
-
\??\c:\rlxlrlx.exec:\rlxlrlx.exe71⤵PID:1112
-
\??\c:\jjjpj.exec:\jjjpj.exe72⤵PID:944
-
\??\c:\7ddpp.exec:\7ddpp.exe73⤵PID:2284
-
\??\c:\hbnbbt.exec:\hbnbbt.exe74⤵PID:1792
-
\??\c:\rlrxflr.exec:\rlrxflr.exe75⤵PID:792
-
\??\c:\pdpvd.exec:\pdpvd.exe76⤵PID:1316
-
\??\c:\ttnnnn.exec:\ttnnnn.exe77⤵PID:448
-
\??\c:\lxlllfl.exec:\lxlllfl.exe78⤵PID:2020
-
\??\c:\ddpvj.exec:\ddpvj.exe79⤵PID:2104
-
\??\c:\btbbhn.exec:\btbbhn.exe80⤵PID:2708
-
\??\c:\frxfffl.exec:\frxfffl.exe81⤵PID:2928
-
\??\c:\1vvjd.exec:\1vvjd.exe82⤵PID:2932
-
\??\c:\5vjdp.exec:\5vjdp.exe83⤵PID:940
-
\??\c:\1ffxlrr.exec:\1ffxlrr.exe84⤵PID:1716
-
\??\c:\7fxxxfr.exec:\7fxxxfr.exe85⤵PID:2628
-
\??\c:\vpvdd.exec:\vpvdd.exe86⤵PID:1804
-
\??\c:\vpvdj.exec:\vpvdj.exe87⤵PID:2248
-
\??\c:\bbhnbh.exec:\bbhnbh.exe88⤵PID:2160
-
\??\c:\llrlxlx.exec:\llrlxlx.exe89⤵PID:2484
-
\??\c:\ppjvj.exec:\ppjvj.exe90⤵PID:3064
-
\??\c:\nhbbnt.exec:\nhbbnt.exe91⤵PID:2556
-
\??\c:\xlfrfll.exec:\xlfrfll.exe92⤵PID:2632
-
\??\c:\ppdvd.exec:\ppdvd.exe93⤵PID:2756
-
\??\c:\ddvjp.exec:\ddvjp.exe94⤵PID:1036
-
\??\c:\5tnthh.exec:\5tnthh.exe95⤵PID:320
-
\??\c:\ththnn.exec:\ththnn.exe96⤵PID:2656
-
\??\c:\tnbnnn.exec:\tnbnnn.exe97⤵PID:2436
-
\??\c:\hbtttt.exec:\hbtttt.exe98⤵PID:2024
-
\??\c:\btbhtb.exec:\btbhtb.exe99⤵PID:3036
-
\??\c:\nhthnt.exec:\nhthnt.exe100⤵PID:1064
-
\??\c:\fxfrxxr.exec:\fxfrxxr.exe101⤵PID:2444
-
\??\c:\tbnnht.exec:\tbnnht.exe102⤵PID:952
-
\??\c:\xxfrfxl.exec:\xxfrfxl.exe103⤵PID:1920
-
\??\c:\ddvjd.exec:\ddvjd.exe104⤵PID:2144
-
\??\c:\7ffrxxf.exec:\7ffrxxf.exe105⤵PID:1500
-
\??\c:\xrlflrx.exec:\xrlflrx.exe106⤵PID:2704
-
\??\c:\5rlxxxl.exec:\5rlxxxl.exe107⤵PID:1948
-
\??\c:\pjdpd.exec:\pjdpd.exe108⤵PID:2364
-
\??\c:\dppvj.exec:\dppvj.exe109⤵PID:2240
-
\??\c:\ppjpj.exec:\ppjpj.exe110⤵PID:2072
-
\??\c:\vpddp.exec:\vpddp.exe111⤵PID:280
-
\??\c:\vppdj.exec:\vppdj.exe112⤵PID:2868
-
\??\c:\pjjvd.exec:\pjjvd.exe113⤵PID:300
-
\??\c:\9xxlllf.exec:\9xxlllf.exe114⤵PID:2716
-
\??\c:\bhhbnn.exec:\bhhbnn.exe115⤵PID:1492
-
\??\c:\7ffrlxl.exec:\7ffrlxl.exe116⤵PID:1380
-
\??\c:\xrfxflx.exec:\xrfxflx.exe117⤵PID:3016
-
\??\c:\lllxlfr.exec:\lllxlfr.exe118⤵PID:2872
-
\??\c:\ddpdd.exec:\ddpdd.exe119⤵PID:448
-
\??\c:\3llflrf.exec:\3llflrf.exe120⤵PID:2216
-
\??\c:\ffxxllx.exec:\ffxxllx.exe121⤵PID:1040
-
\??\c:\xfffllr.exec:\xfffllr.exe122⤵PID:1256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-