Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
034066f20478d1197197b2a4c7aec4f6.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
034066f20478d1197197b2a4c7aec4f6.exe
-
Size
72KB
-
MD5
034066f20478d1197197b2a4c7aec4f6
-
SHA1
a40ad6f94a826abfbcdf9875f433c4445fd4048d
-
SHA256
939a5a8bc56b670011fec1e5b9f1eedac1b48e3f09b0af725695c371d8bbbb90
-
SHA512
a3c9f392aea6bd0bf77f81727d958b917a3b41a6ecaa4bed37d81d7c84e79b95ea5e960853104e41a96ac986f0f4bce5f5c97ec0d1946a16aeea6391c4b85a6a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qjHXAIOJ:ymb3NkkiQ3mdBjFIj+qjHXBOJ
Malware Config
Signatures
-
Detect Blackmoon payload 47 IoCs
resource yara_rule behavioral2/memory/4000-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2308-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4412-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5088-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4228-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4360-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3192-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2768-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4176-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/8-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2292-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/816-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/692-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/332-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2344-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4448-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4200-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/868-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3244-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4708-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2468-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1924-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2988-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4284-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3292-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5076-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1352-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1324-271-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2608-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2956-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-289-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1864-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4020-311-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4036-328-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-335-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-339-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2508-345-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-352-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4932-357-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2004-375-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4728-402-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/224-409-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2660-429-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4516-437-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2308 lrxxlxr.exe 4412 jjjdp.exe 2728 rflrrrf.exe 5088 nhtnhh.exe 4228 rrrfrxl.exe 4176 tbbhth.exe 4360 jvdvd.exe 2768 3xxrllf.exe 408 dvpjd.exe 4464 1jjvj.exe 3192 btnhhh.exe 8 7xxrllr.exe 2292 7tthbb.exe 4708 vpjvp.exe 4428 lxflffx.exe 3244 5tnhbb.exe 868 jjpdp.exe 2360 llrfxrl.exe 4200 hbbthb.exe 4348 vjjpp.exe 816 xlllflf.exe 332 tnnbtn.exe 692 hbbtnn.exe 2344 1vjvj.exe 4448 xrrlfff.exe 2468 vjdpd.exe 1924 ddjdp.exe 2988 tnnhnt.exe 3124 dvddv.exe 4788 rflfllf.exe 4284 hhttth.exe 3292 fxlfxxx.exe 5076 hntnbb.exe 4504 xxxfffl.exe 2764 ttbbnt.exe 1352 ddpdv.exe 2464 5fllxlf.exe 5088 vjdjd.exe 3868 bthtnh.exe 4120 3pddd.exe 1324 1lrllrx.exe 2608 lllfxrl.exe 2956 pjdpj.exe 3032 3xfrlrr.exe 4464 dvpjd.exe 940 9bhhbb.exe 1864 1ttnhb.exe 2680 djdvp.exe 4020 5llxxxf.exe 4064 9vjjd.exe 4844 lffxrxx.exe 216 5nhhbb.exe 4036 ffllxxr.exe 2172 ntbtnn.exe 4912 pdvpj.exe 4032 lfxrlfx.exe 2508 bhbbtt.exe 2144 lrxlfxr.exe 4932 bbhbtt.exe 2504 lrxrfff.exe 2344 bntttn.exe 2524 jvdvp.exe 2004 3tbtnh.exe 1096 jvvjd.exe -
resource yara_rule behavioral2/memory/4000-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2308-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4412-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5088-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4228-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3192-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2768-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/8-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2292-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/816-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/692-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/332-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2344-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4448-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4200-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/868-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3244-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2468-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1924-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2988-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3292-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5076-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1352-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3868-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1324-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1324-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2608-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2956-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-289-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1864-297-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1864-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4020-311-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4036-328-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-335-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-339-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-345-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-352-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4932-357-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2004-375-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1096-378-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4728-402-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/224-409-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2660-429-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-437-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2308 4000 034066f20478d1197197b2a4c7aec4f6.exe 88 PID 4000 wrote to memory of 2308 4000 034066f20478d1197197b2a4c7aec4f6.exe 88 PID 4000 wrote to memory of 2308 4000 034066f20478d1197197b2a4c7aec4f6.exe 88 PID 2308 wrote to memory of 4412 2308 lrxxlxr.exe 89 PID 2308 wrote to memory of 4412 2308 lrxxlxr.exe 89 PID 2308 wrote to memory of 4412 2308 lrxxlxr.exe 89 PID 4412 wrote to memory of 2728 4412 jjjdp.exe 90 PID 4412 wrote to memory of 2728 4412 jjjdp.exe 90 PID 4412 wrote to memory of 2728 4412 jjjdp.exe 90 PID 2728 wrote to memory of 5088 2728 rflrrrf.exe 91 PID 2728 wrote to memory of 5088 2728 rflrrrf.exe 91 PID 2728 wrote to memory of 5088 2728 rflrrrf.exe 91 PID 5088 wrote to memory of 4228 5088 nhtnhh.exe 92 PID 5088 wrote to memory of 4228 5088 nhtnhh.exe 92 PID 5088 wrote to memory of 4228 5088 nhtnhh.exe 92 PID 4228 wrote to memory of 4176 4228 rrrfrxl.exe 93 PID 4228 wrote to memory of 4176 4228 rrrfrxl.exe 93 PID 4228 wrote to memory of 4176 4228 rrrfrxl.exe 93 PID 4176 wrote to memory of 4360 4176 tbbhth.exe 94 PID 4176 wrote to memory of 4360 4176 tbbhth.exe 94 PID 4176 wrote to memory of 4360 4176 tbbhth.exe 94 PID 4360 wrote to memory of 2768 4360 jvdvd.exe 95 PID 4360 wrote to memory of 2768 4360 jvdvd.exe 95 PID 4360 wrote to memory of 2768 4360 jvdvd.exe 95 PID 2768 wrote to memory of 408 2768 3xxrllf.exe 99 PID 2768 wrote to memory of 408 2768 3xxrllf.exe 99 PID 2768 wrote to memory of 408 2768 3xxrllf.exe 99 PID 408 wrote to memory of 4464 408 dvpjd.exe 97 PID 408 wrote to memory of 4464 408 dvpjd.exe 97 PID 408 wrote to memory of 4464 408 dvpjd.exe 97 PID 4464 wrote to memory of 3192 4464 1jjvj.exe 96 PID 4464 wrote to memory of 3192 4464 1jjvj.exe 96 PID 4464 wrote to memory of 3192 4464 1jjvj.exe 96 PID 3192 wrote to memory of 8 3192 btnhhh.exe 98 PID 3192 wrote to memory of 8 3192 btnhhh.exe 98 PID 3192 wrote to memory of 8 3192 btnhhh.exe 98 PID 8 wrote to memory of 2292 8 7xxrllr.exe 100 PID 8 wrote to memory of 2292 8 7xxrllr.exe 100 PID 8 wrote to memory of 2292 8 7xxrllr.exe 100 PID 2292 wrote to memory of 4708 2292 7tthbb.exe 101 PID 2292 wrote to memory of 4708 2292 7tthbb.exe 101 PID 2292 wrote to memory of 4708 2292 7tthbb.exe 101 PID 4708 wrote to memory of 4428 4708 vpjvp.exe 102 PID 4708 wrote to memory of 4428 4708 vpjvp.exe 102 PID 4708 wrote to memory of 4428 4708 vpjvp.exe 102 PID 4428 wrote to memory of 3244 4428 lxflffx.exe 103 PID 4428 wrote to memory of 3244 4428 lxflffx.exe 103 PID 4428 wrote to memory of 3244 4428 lxflffx.exe 103 PID 3244 wrote to memory of 868 3244 5tnhbb.exe 113 PID 3244 wrote to memory of 868 3244 5tnhbb.exe 113 PID 3244 wrote to memory of 868 3244 5tnhbb.exe 113 PID 868 wrote to memory of 2360 868 jjpdp.exe 112 PID 868 wrote to memory of 2360 868 jjpdp.exe 112 PID 868 wrote to memory of 2360 868 jjpdp.exe 112 PID 2360 wrote to memory of 4200 2360 llrfxrl.exe 111 PID 2360 wrote to memory of 4200 2360 llrfxrl.exe 111 PID 2360 wrote to memory of 4200 2360 llrfxrl.exe 111 PID 4200 wrote to memory of 4348 4200 hbbthb.exe 110 PID 4200 wrote to memory of 4348 4200 hbbthb.exe 110 PID 4200 wrote to memory of 4348 4200 hbbthb.exe 110 PID 4348 wrote to memory of 816 4348 vjjpp.exe 109 PID 4348 wrote to memory of 816 4348 vjjpp.exe 109 PID 4348 wrote to memory of 816 4348 vjjpp.exe 109 PID 816 wrote to memory of 332 816 xlllflf.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\034066f20478d1197197b2a4c7aec4f6.exe"C:\Users\Admin\AppData\Local\Temp\034066f20478d1197197b2a4c7aec4f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\lrxxlxr.exec:\lrxxlxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\jjjdp.exec:\jjjdp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
\??\c:\rflrrrf.exec:\rflrrrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\nhtnhh.exec:\nhtnhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
\??\c:\rrrfrxl.exec:\rrrfrxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\tbbhth.exec:\tbbhth.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\jvdvd.exec:\jvdvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
\??\c:\3xxrllf.exec:\3xxrllf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\dvpjd.exec:\dvpjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408
-
-
-
-
-
-
-
-
-
-
\??\c:\btnhhh.exec:\btnhhh.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
\??\c:\7xxrllr.exec:\7xxrllr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
\??\c:\7tthbb.exec:\7tthbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\vpjvp.exec:\vpjvp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
\??\c:\lxflffx.exec:\lxflffx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
\??\c:\5tnhbb.exec:\5tnhbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
\??\c:\jjpdp.exec:\jjpdp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868
-
-
-
-
-
-
-
\??\c:\1jjvj.exec:\1jjvj.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464
-
\??\c:\tnnbtn.exec:\tnnbtn.exe1⤵
- Executes dropped EXE
PID:332 -
\??\c:\hbbtnn.exec:\hbbtnn.exe2⤵
- Executes dropped EXE
PID:692 -
\??\c:\1vjvj.exec:\1vjvj.exe3⤵
- Executes dropped EXE
PID:2344 -
\??\c:\xrrlfff.exec:\xrrlfff.exe4⤵
- Executes dropped EXE
PID:4448 -
\??\c:\vjdpd.exec:\vjdpd.exe5⤵
- Executes dropped EXE
PID:2468 -
\??\c:\ddjdp.exec:\ddjdp.exe6⤵
- Executes dropped EXE
PID:1924 -
\??\c:\tnnhnt.exec:\tnnhnt.exe7⤵
- Executes dropped EXE
PID:2988 -
\??\c:\dvddv.exec:\dvddv.exe8⤵
- Executes dropped EXE
PID:3124 -
\??\c:\rflfllf.exec:\rflfllf.exe9⤵
- Executes dropped EXE
PID:4788 -
\??\c:\hhttth.exec:\hhttth.exe10⤵
- Executes dropped EXE
PID:4284 -
\??\c:\fxlfxxx.exec:\fxlfxxx.exe11⤵
- Executes dropped EXE
PID:3292 -
\??\c:\hntnbb.exec:\hntnbb.exe12⤵
- Executes dropped EXE
PID:5076 -
\??\c:\xxxfffl.exec:\xxxfffl.exe13⤵
- Executes dropped EXE
PID:4504 -
\??\c:\ttbbnt.exec:\ttbbnt.exe14⤵
- Executes dropped EXE
PID:2764 -
\??\c:\ddpdv.exec:\ddpdv.exe15⤵
- Executes dropped EXE
PID:1352 -
\??\c:\5fllxlf.exec:\5fllxlf.exe16⤵
- Executes dropped EXE
PID:2464 -
\??\c:\vjdjd.exec:\vjdjd.exe17⤵
- Executes dropped EXE
PID:5088 -
\??\c:\bthtnh.exec:\bthtnh.exe18⤵
- Executes dropped EXE
PID:3868 -
\??\c:\3pddd.exec:\3pddd.exe19⤵
- Executes dropped EXE
PID:4120 -
\??\c:\1lrllrx.exec:\1lrllrx.exe20⤵
- Executes dropped EXE
PID:1324 -
\??\c:\lllfxrl.exec:\lllfxrl.exe21⤵
- Executes dropped EXE
PID:2608 -
\??\c:\pjdpj.exec:\pjdpj.exe22⤵
- Executes dropped EXE
PID:2956 -
\??\c:\3xfrlrr.exec:\3xfrlrr.exe23⤵
- Executes dropped EXE
PID:3032 -
\??\c:\dvpjd.exec:\dvpjd.exe24⤵
- Executes dropped EXE
PID:4464 -
\??\c:\9bhhbb.exec:\9bhhbb.exe25⤵
- Executes dropped EXE
PID:940 -
\??\c:\1ttnhb.exec:\1ttnhb.exe26⤵
- Executes dropped EXE
PID:1864 -
\??\c:\djdvp.exec:\djdvp.exe27⤵
- Executes dropped EXE
PID:2680 -
\??\c:\5llxxxf.exec:\5llxxxf.exe28⤵
- Executes dropped EXE
PID:4020 -
\??\c:\9vjjd.exec:\9vjjd.exe29⤵
- Executes dropped EXE
PID:4064 -
\??\c:\lffxrxx.exec:\lffxrxx.exe30⤵
- Executes dropped EXE
PID:4844 -
\??\c:\5nhhbb.exec:\5nhhbb.exe31⤵
- Executes dropped EXE
PID:216 -
\??\c:\ffllxxr.exec:\ffllxxr.exe32⤵
- Executes dropped EXE
PID:4036 -
\??\c:\ntbtnn.exec:\ntbtnn.exe33⤵
- Executes dropped EXE
PID:2172 -
\??\c:\pdvpj.exec:\pdvpj.exe34⤵
- Executes dropped EXE
PID:4912 -
\??\c:\lfxrlfx.exec:\lfxrlfx.exe35⤵
- Executes dropped EXE
PID:4032 -
\??\c:\bhbbtt.exec:\bhbbtt.exe36⤵
- Executes dropped EXE
PID:2508 -
\??\c:\lrxlfxr.exec:\lrxlfxr.exe37⤵
- Executes dropped EXE
PID:2144 -
\??\c:\bbhbtt.exec:\bbhbtt.exe38⤵
- Executes dropped EXE
PID:4932 -
\??\c:\lrxrfff.exec:\lrxrfff.exe39⤵
- Executes dropped EXE
PID:2504 -
\??\c:\bntttn.exec:\bntttn.exe40⤵
- Executes dropped EXE
PID:2344 -
\??\c:\jvdvp.exec:\jvdvp.exe41⤵
- Executes dropped EXE
PID:2524 -
\??\c:\3tbtnh.exec:\3tbtnh.exe42⤵
- Executes dropped EXE
PID:2004 -
\??\c:\jvvjd.exec:\jvvjd.exe43⤵
- Executes dropped EXE
PID:1096 -
\??\c:\xllfrrl.exec:\xllfrrl.exe44⤵PID:1724
-
\??\c:\ntttbn.exec:\ntttbn.exe45⤵PID:2008
-
\??\c:\3llxrrl.exec:\3llxrrl.exe46⤵PID:3124
-
\??\c:\5bbhbb.exec:\5bbhbb.exe47⤵PID:556
-
\??\c:\vvvpd.exec:\vvvpd.exe48⤵PID:4728
-
\??\c:\bhthtb.exec:\bhthtb.exe49⤵PID:4340
-
\??\c:\jjjdv.exec:\jjjdv.exe50⤵PID:224
-
\??\c:\hntnbb.exec:\hntnbb.exe51⤵PID:4324
-
\??\c:\pjvjv.exec:\pjvjv.exe52⤵PID:2896
-
\??\c:\3fxrxxf.exec:\3fxrxxf.exe53⤵PID:3804
-
\??\c:\jvpjj.exec:\jvpjj.exe54⤵PID:2660
-
\??\c:\rllfllx.exec:\rllfllx.exe55⤵PID:2980
-
\??\c:\tthtbt.exec:\tthtbt.exe56⤵PID:4516
-
\??\c:\xllffxl.exec:\xllffxl.exe57⤵PID:2204
-
\??\c:\thtbht.exec:\thtbht.exe58⤵PID:4860
-
\??\c:\jvjdp.exec:\jvjdp.exe59⤵PID:840
-
\??\c:\rlxrxxr.exec:\rlxrxxr.exe60⤵PID:2956
-
\??\c:\tbhhbb.exec:\tbhhbb.exe61⤵PID:4972
-
\??\c:\vppjv.exec:\vppjv.exe62⤵PID:1548
-
\??\c:\fffxrrl.exec:\fffxrrl.exe63⤵PID:940
-
\??\c:\vvdpv.exec:\vvdpv.exe64⤵PID:3004
-
\??\c:\hbtbnb.exec:\hbtbnb.exe65⤵PID:4708
-
\??\c:\jdvvd.exec:\jdvvd.exe66⤵PID:516
-
\??\c:\rfffxxr.exec:\rfffxxr.exe67⤵PID:2720
-
\??\c:\hhtthn.exec:\hhtthn.exe68⤵PID:4844
-
\??\c:\llffxff.exec:\llffxff.exe69⤵PID:452
-
\??\c:\9hhhtt.exec:\9hhhtt.exe70⤵PID:4416
-
\??\c:\9pppd.exec:\9pppd.exe71⤵PID:3180
-
\??\c:\hntnbb.exec:\hntnbb.exe72⤵PID:1868
-
\??\c:\5jppd.exec:\5jppd.exe73⤵PID:3132
-
\??\c:\rxxlxrf.exec:\rxxlxrf.exe74⤵PID:3908
-
\??\c:\tbhhbb.exec:\tbhhbb.exe75⤵PID:4928
-
\??\c:\rlrlfxx.exec:\rlrlfxx.exe76⤵PID:5068
-
\??\c:\nhbttt.exec:\nhbttt.exe77⤵PID:1912
-
\??\c:\jjppj.exec:\jjppj.exe78⤵PID:2096
-
\??\c:\5lfxrrl.exec:\5lfxrrl.exe79⤵PID:4316
-
\??\c:\dddvp.exec:\dddvp.exe80⤵PID:1900
-
\??\c:\llxlrrl.exec:\llxlrrl.exe81⤵PID:4524
-
\??\c:\btnhbn.exec:\btnhbn.exe82⤵PID:2952
-
\??\c:\7bhhtn.exec:\7bhhtn.exe83⤵PID:3632
-
\??\c:\fxlxxff.exec:\fxlxxff.exe84⤵PID:4788
-
\??\c:\bbhbnn.exec:\bbhbnn.exe85⤵PID:4292
-
\??\c:\jjpjj.exec:\jjpjj.exe86⤵PID:4352
-
\??\c:\tnhhbn.exec:\tnhhbn.exe87⤵PID:4392
-
\??\c:\pdpdp.exec:\pdpdp.exe88⤵PID:5076
-
\??\c:\fllxlrl.exec:\fllxlrl.exe89⤵PID:116
-
\??\c:\thnhbb.exec:\thnhbb.exe90⤵PID:3864
-
\??\c:\9rlfxxx.exec:\9rlfxxx.exe91⤵PID:3804
-
\??\c:\tnhbnh.exec:\tnhbnh.exe92⤵PID:5072
-
\??\c:\pjjvj.exec:\pjjvj.exe93⤵PID:2992
-
\??\c:\5nbbnn.exec:\5nbbnn.exe94⤵PID:1324
-
\??\c:\jjvpj.exec:\jjvpj.exe95⤵PID:2904
-
\??\c:\lflxrxx.exec:\lflxrxx.exe96⤵PID:1696
-
\??\c:\5djdd.exec:\5djdd.exe97⤵PID:3356
-
\??\c:\pvdpd.exec:\pvdpd.exe98⤵PID:536
-
\??\c:\fxrfrrf.exec:\fxrfrrf.exe99⤵PID:1044
-
\??\c:\pdjpj.exec:\pdjpj.exe100⤵PID:4600
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe101⤵PID:956
-
\??\c:\ntnbnn.exec:\ntnbnn.exe102⤵PID:3392
-
\??\c:\vdjvd.exec:\vdjvd.exe103⤵PID:4240
-
\??\c:\lrfxxxx.exec:\lrfxxxx.exe104⤵PID:4596
-
\??\c:\djpjd.exec:\djpjd.exe105⤵PID:1168
-
\??\c:\rfxlrlr.exec:\rfxlrlr.exe106⤵PID:3100
-
\??\c:\btnhbb.exec:\btnhbb.exe107⤵PID:2884
-
\??\c:\lxfxfxr.exec:\lxfxfxr.exe108⤵PID:2996
-
\??\c:\3ttbnt.exec:\3ttbnt.exe109⤵PID:2508
-
\??\c:\pjjpp.exec:\pjjpp.exe110⤵PID:3996
-
\??\c:\rxrrffr.exec:\rxrrffr.exe111⤵PID:3204
-
\??\c:\9ddvd.exec:\9ddvd.exe112⤵PID:4772
-
\??\c:\lrlfllf.exec:\lrlfllf.exe113⤵PID:4880
-
\??\c:\3pvdv.exec:\3pvdv.exe114⤵PID:3920
-
\??\c:\7lfrlxl.exec:\7lfrlxl.exe115⤵PID:4420
-
\??\c:\hnnhtt.exec:\hnnhtt.exe116⤵PID:2952
-
\??\c:\frrlxxr.exec:\frrlxxr.exe117⤵PID:3124
-
\??\c:\bnnhhb.exec:\bnnhhb.exe118⤵PID:3232
-
\??\c:\9flxrfx.exec:\9flxrfx.exe119⤵PID:3436
-
\??\c:\1bbthh.exec:\1bbthh.exe120⤵PID:4392
-
\??\c:\pvvvp.exec:\pvvvp.exe121⤵PID:1352
-
\??\c:\fxxxllr.exec:\fxxxllr.exe122⤵PID:3424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-