Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 18:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe
-
Size
70KB
-
MD5
3f61e232e98fef2ecd373a417e4ced9e
-
SHA1
a3889a600f362cea47e91a7f3c23b6e908f111a3
-
SHA256
30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9
-
SHA512
4842336a4424b5083c853e64cb1bb9c2ae2579c842da200db34ae1251aead0849c9af60c702781d7df35f0dcecb84c30d501a41fe85021824642cd5adb101b56
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60LbB:ymb3NkkiQ3mdBjFIIp9LV
Malware Config
Signatures
-
Detect Blackmoon payload 32 IoCs
resource yara_rule behavioral1/memory/2840-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1040-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1928-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/328-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1728-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/964-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/872-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2260-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2112-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1936-320-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-342-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-415-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/648-481-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1068-511-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2076-526-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1840-569-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-749-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-764-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1180-935-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2608 rfllrxf.exe 2548 1lflfxl.exe 2644 hhbhtb.exe 2552 bthntt.exe 2596 7jvdd.exe 2284 pdjpj.exe 2448 dvdvj.exe 2812 ddvdv.exe 1040 pjvvd.exe 1928 vjvdp.exe 328 thbhnn.exe 2344 fxxflfr.exe 2176 1rflxfr.exe 1728 7hhthb.exe 1224 hbtbbh.exe 2908 5hbntb.exe 1944 7frxflr.exe 2168 pvvjj.exe 604 tnhbnt.exe 1416 nbnhhn.exe 1796 1ppvd.exe 2384 1xllxxf.exe 2960 htbntt.exe 2996 pjppp.exe 1472 ffrrflr.exe 964 1jdjp.exe 872 xrflflr.exe 2920 xrxlrxl.exe 2260 xrxflll.exe 2940 jjpjj.exe 2112 httbhb.exe 1936 bnbnnn.exe 2840 vpdjj.exe 2016 bthntb.exe 2564 7xrrrxf.exe 2672 flxxffr.exe 2580 rrrxxxx.exe 2472 hthhhh.exe 2596 bnbbhn.exe 2480 pvjdp.exe 2196 nhbhhn.exe 1552 dvjpd.exe 1620 3dppv.exe 640 3htbht.exe 1748 tnnhtb.exe 2368 btnttt.exe 1464 fxrxxxf.exe 2404 9tnnbb.exe 2508 xlxrxrf.exe 2488 btbbhh.exe 2908 hbttbt.exe 2600 llxfllr.exe 536 jdppv.exe 484 vvjjv.exe 648 rlrlxxl.exe 1048 3xlfllr.exe 2324 nbnhhn.exe 836 lxfxrff.exe 1068 1bhhht.exe 1280 hbnbnt.exe 2076 bntttt.exe 1864 3htbhh.exe 872 pjppp.exe 2256 htbhnt.exe -
resource yara_rule behavioral1/memory/2840-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1040-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1928-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/328-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/964-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/872-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-303-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1936-320-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-342-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1552-385-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-415-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-443-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-458-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/648-481-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/836-503-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1068-511-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2076-526-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1840-569-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-591-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-749-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-764-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-877-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1180-935-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-1359-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-1466-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-1657-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-1715-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1528-1939-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-2234-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1472-2490-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2376-2561-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-2888-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2144-2917-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-2988-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1664-3216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/716-3344-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2608 2840 30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe 28 PID 2840 wrote to memory of 2608 2840 30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe 28 PID 2840 wrote to memory of 2608 2840 30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe 28 PID 2840 wrote to memory of 2608 2840 30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe 28 PID 2608 wrote to memory of 2548 2608 rfllrxf.exe 29 PID 2608 wrote to memory of 2548 2608 rfllrxf.exe 29 PID 2608 wrote to memory of 2548 2608 rfllrxf.exe 29 PID 2608 wrote to memory of 2548 2608 rfllrxf.exe 29 PID 2548 wrote to memory of 2644 2548 1lflfxl.exe 30 PID 2548 wrote to memory of 2644 2548 1lflfxl.exe 30 PID 2548 wrote to memory of 2644 2548 1lflfxl.exe 30 PID 2548 wrote to memory of 2644 2548 1lflfxl.exe 30 PID 2644 wrote to memory of 2552 2644 hhbhtb.exe 31 PID 2644 wrote to memory of 2552 2644 hhbhtb.exe 31 PID 2644 wrote to memory of 2552 2644 hhbhtb.exe 31 PID 2644 wrote to memory of 2552 2644 hhbhtb.exe 31 PID 2552 wrote to memory of 2596 2552 bthntt.exe 32 PID 2552 wrote to memory of 2596 2552 bthntt.exe 32 PID 2552 wrote to memory of 2596 2552 bthntt.exe 32 PID 2552 wrote to memory of 2596 2552 bthntt.exe 32 PID 2596 wrote to memory of 2284 2596 7jvdd.exe 33 PID 2596 wrote to memory of 2284 2596 7jvdd.exe 33 PID 2596 wrote to memory of 2284 2596 7jvdd.exe 33 PID 2596 wrote to memory of 2284 2596 7jvdd.exe 33 PID 2284 wrote to memory of 2448 2284 pdjpj.exe 34 PID 2284 wrote to memory of 2448 2284 pdjpj.exe 34 PID 2284 wrote to memory of 2448 2284 pdjpj.exe 34 PID 2284 wrote to memory of 2448 2284 pdjpj.exe 34 PID 2448 wrote to memory of 2812 2448 dvdvj.exe 35 PID 2448 wrote to memory of 2812 2448 dvdvj.exe 35 PID 2448 wrote to memory of 2812 2448 dvdvj.exe 35 PID 2448 wrote to memory of 2812 2448 dvdvj.exe 35 PID 2812 wrote to memory of 1040 2812 ddvdv.exe 36 PID 2812 wrote to memory of 1040 2812 ddvdv.exe 36 PID 2812 wrote to memory of 1040 2812 ddvdv.exe 36 PID 2812 wrote to memory of 1040 2812 ddvdv.exe 36 PID 1040 wrote to memory of 1928 1040 pjvvd.exe 37 PID 1040 wrote to memory of 1928 1040 pjvvd.exe 37 PID 1040 wrote to memory of 1928 1040 pjvvd.exe 37 PID 1040 wrote to memory of 1928 1040 pjvvd.exe 37 PID 1928 wrote to memory of 328 1928 vjvdp.exe 38 PID 1928 wrote to memory of 328 1928 vjvdp.exe 38 PID 1928 wrote to memory of 328 1928 vjvdp.exe 38 PID 1928 wrote to memory of 328 1928 vjvdp.exe 38 PID 328 wrote to memory of 2344 328 thbhnn.exe 39 PID 328 wrote to memory of 2344 328 thbhnn.exe 39 PID 328 wrote to memory of 2344 328 thbhnn.exe 39 PID 328 wrote to memory of 2344 328 thbhnn.exe 39 PID 2344 wrote to memory of 2176 2344 fxxflfr.exe 40 PID 2344 wrote to memory of 2176 2344 fxxflfr.exe 40 PID 2344 wrote to memory of 2176 2344 fxxflfr.exe 40 PID 2344 wrote to memory of 2176 2344 fxxflfr.exe 40 PID 2176 wrote to memory of 1728 2176 1rflxfr.exe 41 PID 2176 wrote to memory of 1728 2176 1rflxfr.exe 41 PID 2176 wrote to memory of 1728 2176 1rflxfr.exe 41 PID 2176 wrote to memory of 1728 2176 1rflxfr.exe 41 PID 1728 wrote to memory of 1224 1728 7hhthb.exe 42 PID 1728 wrote to memory of 1224 1728 7hhthb.exe 42 PID 1728 wrote to memory of 1224 1728 7hhthb.exe 42 PID 1728 wrote to memory of 1224 1728 7hhthb.exe 42 PID 1224 wrote to memory of 2908 1224 hbtbbh.exe 43 PID 1224 wrote to memory of 2908 1224 hbtbbh.exe 43 PID 1224 wrote to memory of 2908 1224 hbtbbh.exe 43 PID 1224 wrote to memory of 2908 1224 hbtbbh.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe"C:\Users\Admin\AppData\Local\Temp\30b29aeee76428a87d880ca97a330f626d35b9640fab9c0b5e291311d7604fc9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\rfllrxf.exec:\rfllrxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\1lflfxl.exec:\1lflfxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\hhbhtb.exec:\hhbhtb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2644 -
\??\c:\bthntt.exec:\bthntt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\7jvdd.exec:\7jvdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\pdjpj.exec:\pdjpj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
\??\c:\dvdvj.exec:\dvdvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\ddvdv.exec:\ddvdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\pjvvd.exec:\pjvvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\vjvdp.exec:\vjvdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
\??\c:\thbhnn.exec:\thbhnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:328 -
\??\c:\fxxflfr.exec:\fxxflfr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\1rflxfr.exec:\1rflxfr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\7hhthb.exec:\7hhthb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
\??\c:\hbtbbh.exec:\hbtbbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
\??\c:\5hbntb.exec:\5hbntb.exe17⤵
- Executes dropped EXE
PID:2908 -
\??\c:\7frxflr.exec:\7frxflr.exe18⤵
- Executes dropped EXE
PID:1944 -
\??\c:\pvvjj.exec:\pvvjj.exe19⤵
- Executes dropped EXE
PID:2168 -
\??\c:\tnhbnt.exec:\tnhbnt.exe20⤵
- Executes dropped EXE
PID:604 -
\??\c:\nbnhhn.exec:\nbnhhn.exe21⤵
- Executes dropped EXE
PID:1416 -
\??\c:\1ppvd.exec:\1ppvd.exe22⤵
- Executes dropped EXE
PID:1796 -
\??\c:\1xllxxf.exec:\1xllxxf.exe23⤵
- Executes dropped EXE
PID:2384 -
\??\c:\htbntt.exec:\htbntt.exe24⤵
- Executes dropped EXE
PID:2960 -
\??\c:\pjppp.exec:\pjppp.exe25⤵
- Executes dropped EXE
PID:2996 -
\??\c:\ffrrflr.exec:\ffrrflr.exe26⤵
- Executes dropped EXE
PID:1472 -
\??\c:\1jdjp.exec:\1jdjp.exe27⤵
- Executes dropped EXE
PID:964 -
\??\c:\xrflflr.exec:\xrflflr.exe28⤵
- Executes dropped EXE
PID:872 -
\??\c:\xrxlrxl.exec:\xrxlrxl.exe29⤵
- Executes dropped EXE
PID:2920 -
\??\c:\xrxflll.exec:\xrxflll.exe30⤵
- Executes dropped EXE
PID:2260 -
\??\c:\jjpjj.exec:\jjpjj.exe31⤵
- Executes dropped EXE
PID:2940 -
\??\c:\httbhb.exec:\httbhb.exe32⤵
- Executes dropped EXE
PID:2112 -
\??\c:\bnbnnn.exec:\bnbnnn.exe33⤵
- Executes dropped EXE
PID:1936 -
\??\c:\vpdjj.exec:\vpdjj.exe34⤵
- Executes dropped EXE
PID:2840 -
\??\c:\bthntb.exec:\bthntb.exe35⤵
- Executes dropped EXE
PID:2016 -
\??\c:\7xrrrxf.exec:\7xrrrxf.exe36⤵
- Executes dropped EXE
PID:2564 -
\??\c:\flxxffr.exec:\flxxffr.exe37⤵
- Executes dropped EXE
PID:2672 -
\??\c:\rrrxxxx.exec:\rrrxxxx.exe38⤵
- Executes dropped EXE
PID:2580 -
\??\c:\hthhhh.exec:\hthhhh.exe39⤵
- Executes dropped EXE
PID:2472 -
\??\c:\bnbbhn.exec:\bnbbhn.exe40⤵
- Executes dropped EXE
PID:2596 -
\??\c:\pvjdp.exec:\pvjdp.exe41⤵
- Executes dropped EXE
PID:2480 -
\??\c:\nhbhhn.exec:\nhbhhn.exe42⤵
- Executes dropped EXE
PID:2196 -
\??\c:\dvjpd.exec:\dvjpd.exe43⤵
- Executes dropped EXE
PID:1552 -
\??\c:\3dppv.exec:\3dppv.exe44⤵
- Executes dropped EXE
PID:1620 -
\??\c:\3htbht.exec:\3htbht.exe45⤵
- Executes dropped EXE
PID:640 -
\??\c:\tnnhtb.exec:\tnnhtb.exe46⤵
- Executes dropped EXE
PID:1748 -
\??\c:\btnttt.exec:\btnttt.exe47⤵
- Executes dropped EXE
PID:2368 -
\??\c:\fxrxxxf.exec:\fxrxxxf.exe48⤵
- Executes dropped EXE
PID:1464 -
\??\c:\9tnnbb.exec:\9tnnbb.exe49⤵
- Executes dropped EXE
PID:2404 -
\??\c:\xlxrxrf.exec:\xlxrxrf.exe50⤵
- Executes dropped EXE
PID:2508 -
\??\c:\btbbhh.exec:\btbbhh.exe51⤵
- Executes dropped EXE
PID:2488 -
\??\c:\hbttbt.exec:\hbttbt.exe52⤵
- Executes dropped EXE
PID:2908 -
\??\c:\llxfllr.exec:\llxfllr.exe53⤵
- Executes dropped EXE
PID:2600 -
\??\c:\jdppv.exec:\jdppv.exe54⤵
- Executes dropped EXE
PID:536 -
\??\c:\vvjjv.exec:\vvjjv.exe55⤵
- Executes dropped EXE
PID:484 -
\??\c:\rlrlxxl.exec:\rlrlxxl.exe56⤵
- Executes dropped EXE
PID:648 -
\??\c:\3xlfllr.exec:\3xlfllr.exe57⤵
- Executes dropped EXE
PID:1048 -
\??\c:\nbnhhn.exec:\nbnhhn.exe58⤵
- Executes dropped EXE
PID:2324 -
\??\c:\lxfxrff.exec:\lxfxrff.exe59⤵
- Executes dropped EXE
PID:836 -
\??\c:\1bhhht.exec:\1bhhht.exe60⤵
- Executes dropped EXE
PID:1068 -
\??\c:\hbnbnt.exec:\hbnbnt.exe61⤵
- Executes dropped EXE
PID:1280 -
\??\c:\bntttt.exec:\bntttt.exe62⤵
- Executes dropped EXE
PID:2076 -
\??\c:\3htbhh.exec:\3htbhh.exe63⤵
- Executes dropped EXE
PID:1864 -
\??\c:\pjppp.exec:\pjppp.exe64⤵
- Executes dropped EXE
PID:872 -
\??\c:\htbhnt.exec:\htbhnt.exe65⤵
- Executes dropped EXE
PID:2256 -
\??\c:\lxxxffl.exec:\lxxxffl.exe66⤵PID:2288
-
\??\c:\1lffrrf.exec:\1lffrrf.exe67⤵PID:2504
-
\??\c:\thttbh.exec:\thttbh.exe68⤵PID:1840
-
\??\c:\hbtbnn.exec:\hbtbnn.exe69⤵PID:1908
-
\??\c:\dvjpd.exec:\dvjpd.exe70⤵PID:1536
-
\??\c:\nbnntt.exec:\nbnntt.exe71⤵PID:1508
-
\??\c:\pjvdv.exec:\pjvdv.exe72⤵PID:2572
-
\??\c:\hbnttt.exec:\hbnttt.exe73⤵PID:2656
-
\??\c:\3ffxxlx.exec:\3ffxxlx.exe74⤵PID:2648
-
\??\c:\bnbbhb.exec:\bnbbhb.exe75⤵PID:2428
-
\??\c:\hbbhhn.exec:\hbbhhn.exe76⤵PID:2576
-
\??\c:\htntnn.exec:\htntnn.exe77⤵PID:2212
-
\??\c:\jdpvj.exec:\jdpvj.exe78⤵PID:2300
-
\??\c:\pjddj.exec:\pjddj.exe79⤵PID:1768
-
\??\c:\vdjjv.exec:\vdjjv.exe80⤵PID:1800
-
\??\c:\3pddd.exec:\3pddd.exe81⤵PID:2392
-
\??\c:\htnntt.exec:\htnntt.exe82⤵PID:2308
-
\??\c:\1vpvj.exec:\1vpvj.exe83⤵PID:1660
-
\??\c:\pjvjd.exec:\pjvjd.exe84⤵PID:1056
-
\??\c:\jdppj.exec:\jdppj.exe85⤵PID:2040
-
\??\c:\1djdd.exec:\1djdd.exe86⤵PID:2176
-
\??\c:\vpdvj.exec:\vpdvj.exe87⤵PID:2516
-
\??\c:\vjvpv.exec:\vjvpv.exe88⤵PID:2664
-
\??\c:\llxflxl.exec:\llxflxl.exe89⤵PID:2604
-
\??\c:\rlfrrrl.exec:\rlfrrrl.exe90⤵PID:1856
-
\??\c:\9rlrxxl.exec:\9rlrxxl.exe91⤵PID:2168
-
\??\c:\flrlrff.exec:\flrlrff.exe92⤵PID:600
-
\??\c:\nhntnn.exec:\nhntnn.exe93⤵PID:604
-
\??\c:\rxxxlff.exec:\rxxxlff.exe94⤵PID:580
-
\??\c:\rlllrxf.exec:\rlllrxf.exe95⤵PID:1796
-
\??\c:\lxxxlfx.exec:\lxxxlfx.exe96⤵PID:1100
-
\??\c:\lfrxxfl.exec:\lfrxxfl.exe97⤵PID:3012
-
\??\c:\pjdpp.exec:\pjdpp.exe98⤵PID:1804
-
\??\c:\vjdjd.exec:\vjdjd.exe99⤵PID:1712
-
\??\c:\tnbbnt.exec:\tnbbnt.exe100⤵PID:948
-
\??\c:\tnbbnn.exec:\tnbbnn.exe101⤵PID:672
-
\??\c:\xlrrrrr.exec:\xlrrrrr.exe102⤵PID:1248
-
\??\c:\frfrffl.exec:\frfrffl.exe103⤵PID:1896
-
\??\c:\3vpdp.exec:\3vpdp.exe104⤵PID:2260
-
\??\c:\9vvvd.exec:\9vvvd.exe105⤵PID:908
-
\??\c:\5htntb.exec:\5htntb.exe106⤵PID:1272
-
\??\c:\dpvvv.exec:\dpvvv.exe107⤵PID:1036
-
\??\c:\nnbthh.exec:\nnbthh.exe108⤵PID:2848
-
\??\c:\7vpjv.exec:\7vpjv.exe109⤵PID:2568
-
\??\c:\7vjpv.exec:\7vjpv.exe110⤵PID:2016
-
\??\c:\frxffll.exec:\frxffll.exe111⤵PID:2632
-
\??\c:\rfflrxr.exec:\rfflrxr.exe112⤵PID:1952
-
\??\c:\vpdjv.exec:\vpdjv.exe113⤵PID:2440
-
\??\c:\jdpvp.exec:\jdpvp.exe114⤵PID:2420
-
\??\c:\3lxxffl.exec:\3lxxffl.exe115⤵PID:2412
-
\??\c:\lrfxxlf.exec:\lrfxxlf.exe116⤵PID:1988
-
\??\c:\7pdjp.exec:\7pdjp.exe117⤵PID:2480
-
\??\c:\pjvdp.exec:\pjvdp.exe118⤵PID:2696
-
\??\c:\9djjj.exec:\9djjj.exe119⤵PID:1180
-
\??\c:\htbhtb.exec:\htbhtb.exe120⤵PID:1456
-
\??\c:\thbhhn.exec:\thbhhn.exe121⤵PID:1572
-
\??\c:\7btthn.exec:\7btthn.exe122⤵PID:1884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-