Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 18:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe
Resource
win7-20240220-en
6 signatures
150 seconds
General
-
Target
92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe
-
Size
350KB
-
MD5
7cf115cee35424771c4a305348d71ed3
-
SHA1
00aa1aeb6e22b26841cc16e55347bbf7a6c04cab
-
SHA256
92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e
-
SHA512
9b44c4470fdc044ee0a70e0fe731550b6752c5df2cbb3a6d47cf9eeadc4c0d2aebf414f3d1c51c3ae3843bf0d1b7ac0bad8f96536f6434e3ec0ce17c60c8a1f2
-
SSDEEP
6144:4cm7ImGddXvJuzyy/SfVFKpU/sien7NuOpo0HmtDKe0wKyKqiOfm8RCfDK4TrH+:+7TcBuGy/Sa+/sie0OpncKe/KFBOfmzW
Malware Config
Signatures
-
Detect Blackmoon payload 41 IoCs
resource yara_rule behavioral1/memory/1736-23-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2856-7-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1668-15-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2808-37-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2404-71-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2564-67-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2772-54-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2532-33-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2888-90-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1736-113-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/1944-116-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/400-125-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/400-134-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/1576-143-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1680-136-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2600-161-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1416-178-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/2892-181-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/688-190-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/344-225-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2352-249-0x00000000005C0000-0x00000000005ED000-memory.dmp family_blackmoon behavioral1/memory/400-227-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/1572-204-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/1720-213-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/340-261-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2236-271-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2236-280-0x00000000001B0000-0x00000000001DD000-memory.dmp family_blackmoon behavioral1/memory/2828-290-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2652-337-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/2436-366-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2596-407-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2596-413-0x00000000002A0000-0x00000000002CD000-memory.dmp family_blackmoon behavioral1/memory/1884-420-0x00000000003C0000-0x00000000003ED000-memory.dmp family_blackmoon behavioral1/memory/2620-427-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/1584-434-0x0000000000430000-0x000000000045D000-memory.dmp family_blackmoon behavioral1/memory/1972-448-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/1588-469-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/1584-476-0x0000000000430000-0x000000000045D000-memory.dmp family_blackmoon behavioral1/memory/2852-480-0x0000000000220000-0x000000000024D000-memory.dmp family_blackmoon behavioral1/memory/592-486-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon behavioral1/memory/2356-512-0x0000000000400000-0x000000000042D000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 30 IoCs
resource yara_rule behavioral1/memory/2856-0-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1736-23-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2856-7-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1668-15-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2808-37-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2404-71-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2564-67-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2772-54-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2532-33-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2404-76-0x0000000000220000-0x000000000024D000-memory.dmp UPX behavioral1/memory/2888-90-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1736-113-0x0000000000220000-0x000000000024D000-memory.dmp UPX behavioral1/memory/1944-116-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/400-125-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1576-143-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1680-136-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2600-161-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2892-181-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/688-190-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/344-225-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1572-204-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1720-213-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/340-261-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2236-271-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2828-290-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2436-366-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2596-407-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2852-480-0x0000000000220000-0x000000000024D000-memory.dmp UPX behavioral1/memory/592-486-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/2356-512-0x0000000000400000-0x000000000042D000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 1668 btnbnh.exe 1736 rlfrrxf.exe 2532 bbnbhh.exe 2808 jdvjd.exe 2792 bbnbhn.exe 2772 3pdjv.exe 2564 9rlxlrf.exe 2404 btttbb.exe 2916 jdpvd.exe 2888 btttbt.exe 1472 5vjdj.exe 2632 rlllfxf.exe 1944 5rrffll.exe 400 bthhhh.exe 1680 xlxxxfl.exe 1576 ttntnt.exe 1504 vjppv.exe 2600 hhttnn.exe 1416 htnbnn.exe 2892 1vjdd.exe 688 pjddj.exe 1572 rlflrrx.exe 1720 htthbh.exe 1896 lxlffrr.exe 344 tntthb.exe 3064 pjvjv.exe 2352 pjpvd.exe 2060 fxffffl.exe 340 jjdjp.exe 2236 fxrrrxf.exe 2172 3jdjp.exe 2828 hbhhhh.exe 1424 rrrrllr.exe 2020 1lfrxll.exe 3060 tnbhhn.exe 2252 7nbnnh.exe 2484 5vpjp.exe 2652 jvjjj.exe 2656 rlrrxfl.exe 2956 nbbhtn.exe 2220 rlfrfxf.exe 2508 jpvvj.exe 2436 nnhntb.exe 2716 nbbtbh.exe 2880 3xllrxf.exe 2876 thbbbt.exe 2872 xxrrxfl.exe 2576 3lfxrrx.exe 2596 5pdvv.exe 1884 1tthnh.exe 2620 lfrrxxx.exe 1584 xxlxfff.exe 2280 hbnntb.exe 1972 1hnbtt.exe 640 frxfxxl.exe 2144 rflflfx.exe 1588 ttntbt.exe 2076 hbnhnt.exe 2852 7vppd.exe 592 thtnnh.exe 2812 9xrrrfx.exe 3036 9ttttn.exe 3032 bhbhnn.exe 2356 vpvvd.exe -
resource yara_rule behavioral1/memory/2856-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1736-23-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2856-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1668-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2808-37-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2404-71-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2564-67-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2772-54-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2532-33-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2888-90-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1736-113-0x0000000000220000-0x000000000024D000-memory.dmp upx behavioral1/memory/1944-116-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/400-125-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1576-143-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1680-136-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2600-161-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2892-181-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/688-190-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/344-225-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1572-204-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1720-213-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/340-261-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2236-271-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2828-290-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2484-329-0x0000000000220000-0x000000000024D000-memory.dmp upx behavioral1/memory/2436-366-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2596-407-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2852-480-0x0000000000220000-0x000000000024D000-memory.dmp upx behavioral1/memory/592-486-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2356-512-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1668 2856 92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe 28 PID 2856 wrote to memory of 1668 2856 92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe 28 PID 2856 wrote to memory of 1668 2856 92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe 28 PID 2856 wrote to memory of 1668 2856 92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe 28 PID 1668 wrote to memory of 1736 1668 btnbnh.exe 29 PID 1668 wrote to memory of 1736 1668 btnbnh.exe 29 PID 1668 wrote to memory of 1736 1668 btnbnh.exe 29 PID 1668 wrote to memory of 1736 1668 btnbnh.exe 29 PID 1736 wrote to memory of 2532 1736 rlfrrxf.exe 30 PID 1736 wrote to memory of 2532 1736 rlfrrxf.exe 30 PID 1736 wrote to memory of 2532 1736 rlfrrxf.exe 30 PID 1736 wrote to memory of 2532 1736 rlfrrxf.exe 30 PID 2532 wrote to memory of 2808 2532 bbnbhh.exe 31 PID 2532 wrote to memory of 2808 2532 bbnbhh.exe 31 PID 2532 wrote to memory of 2808 2532 bbnbhh.exe 31 PID 2532 wrote to memory of 2808 2532 bbnbhh.exe 31 PID 2808 wrote to memory of 2792 2808 jdvjd.exe 32 PID 2808 wrote to memory of 2792 2808 jdvjd.exe 32 PID 2808 wrote to memory of 2792 2808 jdvjd.exe 32 PID 2808 wrote to memory of 2792 2808 jdvjd.exe 32 PID 2792 wrote to memory of 2772 2792 bbnbhn.exe 33 PID 2792 wrote to memory of 2772 2792 bbnbhn.exe 33 PID 2792 wrote to memory of 2772 2792 bbnbhn.exe 33 PID 2792 wrote to memory of 2772 2792 bbnbhn.exe 33 PID 2772 wrote to memory of 2564 2772 3pdjv.exe 34 PID 2772 wrote to memory of 2564 2772 3pdjv.exe 34 PID 2772 wrote to memory of 2564 2772 3pdjv.exe 34 PID 2772 wrote to memory of 2564 2772 3pdjv.exe 34 PID 2564 wrote to memory of 2404 2564 9rlxlrf.exe 35 PID 2564 wrote to memory of 2404 2564 9rlxlrf.exe 35 PID 2564 wrote to memory of 2404 2564 9rlxlrf.exe 35 PID 2564 wrote to memory of 2404 2564 9rlxlrf.exe 35 PID 2404 wrote to memory of 2916 2404 btttbb.exe 36 PID 2404 wrote to memory of 2916 2404 btttbb.exe 36 PID 2404 wrote to memory of 2916 2404 btttbb.exe 36 PID 2404 wrote to memory of 2916 2404 btttbb.exe 36 PID 2916 wrote to memory of 2888 2916 jdpvd.exe 37 PID 2916 wrote to memory of 2888 2916 jdpvd.exe 37 PID 2916 wrote to memory of 2888 2916 jdpvd.exe 37 PID 2916 wrote to memory of 2888 2916 jdpvd.exe 37 PID 2888 wrote to memory of 1472 2888 btttbt.exe 38 PID 2888 wrote to memory of 1472 2888 btttbt.exe 38 PID 2888 wrote to memory of 1472 2888 btttbt.exe 38 PID 2888 wrote to memory of 1472 2888 btttbt.exe 38 PID 1472 wrote to memory of 2632 1472 5vjdj.exe 39 PID 1472 wrote to memory of 2632 1472 5vjdj.exe 39 PID 1472 wrote to memory of 2632 1472 5vjdj.exe 39 PID 1472 wrote to memory of 2632 1472 5vjdj.exe 39 PID 2632 wrote to memory of 1944 2632 rlllfxf.exe 40 PID 2632 wrote to memory of 1944 2632 rlllfxf.exe 40 PID 2632 wrote to memory of 1944 2632 rlllfxf.exe 40 PID 2632 wrote to memory of 1944 2632 rlllfxf.exe 40 PID 1944 wrote to memory of 400 1944 5rrffll.exe 41 PID 1944 wrote to memory of 400 1944 5rrffll.exe 41 PID 1944 wrote to memory of 400 1944 5rrffll.exe 41 PID 1944 wrote to memory of 400 1944 5rrffll.exe 41 PID 400 wrote to memory of 1680 400 bthhhh.exe 42 PID 400 wrote to memory of 1680 400 bthhhh.exe 42 PID 400 wrote to memory of 1680 400 bthhhh.exe 42 PID 400 wrote to memory of 1680 400 bthhhh.exe 42 PID 1680 wrote to memory of 1576 1680 xlxxxfl.exe 43 PID 1680 wrote to memory of 1576 1680 xlxxxfl.exe 43 PID 1680 wrote to memory of 1576 1680 xlxxxfl.exe 43 PID 1680 wrote to memory of 1576 1680 xlxxxfl.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe"C:\Users\Admin\AppData\Local\Temp\92ca41a12352867f9946da4c98d992ec3775ad74ce32a2adebbc83b08fb2b09e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\btnbnh.exec:\btnbnh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\rlfrrxf.exec:\rlfrrxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\bbnbhh.exec:\bbnbhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\jdvjd.exec:\jdvjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\bbnbhn.exec:\bbnbhn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\3pdjv.exec:\3pdjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\9rlxlrf.exec:\9rlxlrf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\btttbb.exec:\btttbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\jdpvd.exec:\jdpvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\btttbt.exec:\btttbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\5vjdj.exec:\5vjdj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\rlllfxf.exec:\rlllfxf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\5rrffll.exec:\5rrffll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
\??\c:\bthhhh.exec:\bthhhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\xlxxxfl.exec:\xlxxxfl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\ttntnt.exec:\ttntnt.exe17⤵
- Executes dropped EXE
PID:1576 -
\??\c:\vjppv.exec:\vjppv.exe18⤵
- Executes dropped EXE
PID:1504 -
\??\c:\hhttnn.exec:\hhttnn.exe19⤵
- Executes dropped EXE
PID:2600 -
\??\c:\htnbnn.exec:\htnbnn.exe20⤵
- Executes dropped EXE
PID:1416 -
\??\c:\1vjdd.exec:\1vjdd.exe21⤵
- Executes dropped EXE
PID:2892 -
\??\c:\pjddj.exec:\pjddj.exe22⤵
- Executes dropped EXE
PID:688 -
\??\c:\rlflrrx.exec:\rlflrrx.exe23⤵
- Executes dropped EXE
PID:1572 -
\??\c:\htthbh.exec:\htthbh.exe24⤵
- Executes dropped EXE
PID:1720 -
\??\c:\lxlffrr.exec:\lxlffrr.exe25⤵
- Executes dropped EXE
PID:1896 -
\??\c:\tntthb.exec:\tntthb.exe26⤵
- Executes dropped EXE
PID:344 -
\??\c:\pjvjv.exec:\pjvjv.exe27⤵
- Executes dropped EXE
PID:3064 -
\??\c:\pjpvd.exec:\pjpvd.exe28⤵
- Executes dropped EXE
PID:2352 -
\??\c:\fxffffl.exec:\fxffffl.exe29⤵
- Executes dropped EXE
PID:2060 -
\??\c:\jjdjp.exec:\jjdjp.exe30⤵
- Executes dropped EXE
PID:340 -
\??\c:\fxrrrxf.exec:\fxrrrxf.exe31⤵
- Executes dropped EXE
PID:2236 -
\??\c:\3jdjp.exec:\3jdjp.exe32⤵
- Executes dropped EXE
PID:2172 -
\??\c:\hbhhhh.exec:\hbhhhh.exe33⤵
- Executes dropped EXE
PID:2828 -
\??\c:\rrrrllr.exec:\rrrrllr.exe34⤵
- Executes dropped EXE
PID:1424 -
\??\c:\1lfrxll.exec:\1lfrxll.exe35⤵
- Executes dropped EXE
PID:2020 -
\??\c:\tnbhhn.exec:\tnbhhn.exe36⤵
- Executes dropped EXE
PID:3060 -
\??\c:\7nbnnh.exec:\7nbnnh.exe37⤵
- Executes dropped EXE
PID:2252 -
\??\c:\5vpjp.exec:\5vpjp.exe38⤵
- Executes dropped EXE
PID:2484 -
\??\c:\jvjjj.exec:\jvjjj.exe39⤵
- Executes dropped EXE
PID:2652 -
\??\c:\rlrrxfl.exec:\rlrrxfl.exe40⤵
- Executes dropped EXE
PID:2656 -
\??\c:\nbbhtn.exec:\nbbhtn.exe41⤵
- Executes dropped EXE
PID:2956 -
\??\c:\rlfrfxf.exec:\rlfrfxf.exe42⤵
- Executes dropped EXE
PID:2220 -
\??\c:\jpvvj.exec:\jpvvj.exe43⤵
- Executes dropped EXE
PID:2508 -
\??\c:\nnhntb.exec:\nnhntb.exe44⤵
- Executes dropped EXE
PID:2436 -
\??\c:\nbbtbh.exec:\nbbtbh.exe45⤵
- Executes dropped EXE
PID:2716 -
\??\c:\3xllrxf.exec:\3xllrxf.exe46⤵
- Executes dropped EXE
PID:2880 -
\??\c:\thbbbt.exec:\thbbbt.exe47⤵
- Executes dropped EXE
PID:2876 -
\??\c:\xxrrxfl.exec:\xxrrxfl.exe48⤵
- Executes dropped EXE
PID:2872 -
\??\c:\3lfxrrx.exec:\3lfxrrx.exe49⤵
- Executes dropped EXE
PID:2576 -
\??\c:\5pdvv.exec:\5pdvv.exe50⤵
- Executes dropped EXE
PID:2596 -
\??\c:\1tthnh.exec:\1tthnh.exe51⤵
- Executes dropped EXE
PID:1884 -
\??\c:\lfrrxxx.exec:\lfrrxxx.exe52⤵
- Executes dropped EXE
PID:2620 -
\??\c:\xxlxfff.exec:\xxlxfff.exe53⤵
- Executes dropped EXE
PID:1584 -
\??\c:\hbnntb.exec:\hbnntb.exe54⤵
- Executes dropped EXE
PID:2280 -
\??\c:\1hnbtt.exec:\1hnbtt.exe55⤵
- Executes dropped EXE
PID:1972 -
\??\c:\frxfxxl.exec:\frxfxxl.exe56⤵
- Executes dropped EXE
PID:640 -
\??\c:\rflflfx.exec:\rflflfx.exe57⤵
- Executes dropped EXE
PID:2144 -
\??\c:\ttntbt.exec:\ttntbt.exe58⤵
- Executes dropped EXE
PID:1588 -
\??\c:\hbnhnt.exec:\hbnhnt.exe59⤵
- Executes dropped EXE
PID:2076 -
\??\c:\7vppd.exec:\7vppd.exe60⤵
- Executes dropped EXE
PID:2852 -
\??\c:\thtnnh.exec:\thtnnh.exe61⤵
- Executes dropped EXE
PID:592 -
\??\c:\9xrrrfx.exec:\9xrrrfx.exe62⤵
- Executes dropped EXE
PID:2812 -
\??\c:\9ttttn.exec:\9ttttn.exe63⤵
- Executes dropped EXE
PID:3036 -
\??\c:\bhbhnn.exec:\bhbhnn.exe64⤵
- Executes dropped EXE
PID:3032 -
\??\c:\vpvvd.exec:\vpvvd.exe65⤵
- Executes dropped EXE
PID:2356 -
\??\c:\tnbbhn.exec:\tnbbhn.exe66⤵PID:916
-
\??\c:\thhbhb.exec:\thhbhb.exe67⤵PID:2964
-
\??\c:\jdjdj.exec:\jdjdj.exe68⤵PID:1292
-
\??\c:\flrllff.exec:\flrllff.exe69⤵PID:1216
-
\??\c:\htthth.exec:\htthth.exe70⤵PID:560
-
\??\c:\pdjpp.exec:\pdjpp.exe71⤵PID:876
-
\??\c:\3frflrr.exec:\3frflrr.exe72⤵PID:340
-
\??\c:\bbnnhb.exec:\bbnnhb.exe73⤵PID:1656
-
\??\c:\vjppv.exec:\vjppv.exe74⤵PID:1184
-
\??\c:\pdpjv.exec:\pdpjv.exe75⤵PID:1180
-
\??\c:\7rflxfl.exec:\7rflxfl.exe76⤵PID:2824
-
\??\c:\bnnhnb.exec:\bnnhnb.exe77⤵PID:1560
-
\??\c:\bbntbh.exec:\bbntbh.exe78⤵PID:2904
-
\??\c:\llrlrrx.exec:\llrlrrx.exe79⤵PID:2500
-
\??\c:\1bnnhn.exec:\1bnnhn.exe80⤵PID:2224
-
\??\c:\vjpjj.exec:\vjpjj.exe81⤵PID:2644
-
\??\c:\rllrxxl.exec:\rllrxxl.exe82⤵PID:2532
-
\??\c:\flxrrll.exec:\flxrrll.exe83⤵PID:2808
-
\??\c:\tnhhtb.exec:\tnhhtb.exe84⤵PID:2688
-
\??\c:\jvdvd.exec:\jvdvd.exe85⤵PID:2708
-
\??\c:\lrflffr.exec:\lrflffr.exe86⤵PID:2588
-
\??\c:\htbbhh.exec:\htbbhh.exe87⤵PID:2456
-
\??\c:\9vjjp.exec:\9vjjp.exe88⤵PID:2344
-
\??\c:\1rxrllf.exec:\1rxrllf.exe89⤵PID:2444
-
\??\c:\tthhth.exec:\tthhth.exe90⤵PID:108
-
\??\c:\7nbbbt.exec:\7nbbbt.exe91⤵PID:2696
-
\??\c:\jvpdj.exec:\jvpdj.exe92⤵PID:2604
-
\??\c:\rlxllrf.exec:\rlxllrf.exe93⤵PID:2612
-
\??\c:\7bntbb.exec:\7bntbb.exe94⤵PID:1020
-
\??\c:\3fxllff.exec:\3fxllff.exe95⤵PID:112
-
\??\c:\hthntt.exec:\hthntt.exe96⤵PID:2148
-
\??\c:\3rlffxx.exec:\3rlffxx.exe97⤵PID:816
-
\??\c:\bnhnbh.exec:\bnhnbh.exe98⤵PID:1972
-
\??\c:\fxffrlr.exec:\fxffrlr.exe99⤵PID:1440
-
\??\c:\dvppd.exec:\dvppd.exe100⤵PID:1612
-
\??\c:\bthhth.exec:\bthhth.exe101⤵PID:2868
-
\??\c:\xxlflrx.exec:\xxlflrx.exe102⤵PID:1272
-
\??\c:\7htnnh.exec:\7htnnh.exe103⤵PID:2044
-
\??\c:\vpvvd.exec:\vpvvd.exe104⤵PID:2320
-
\??\c:\lxfxfxl.exec:\lxfxfxl.exe105⤵PID:2852
-
\??\c:\ttbhnt.exec:\ttbhnt.exe106⤵PID:2892
-
\??\c:\dvjdp.exec:\dvjdp.exe107⤵PID:1400
-
\??\c:\xxxrflf.exec:\xxxrflf.exe108⤵PID:784
-
\??\c:\vdjjj.exec:\vdjjj.exe109⤵PID:1920
-
\??\c:\7lrllrf.exec:\7lrllrf.exe110⤵PID:628
-
\??\c:\5bbttn.exec:\5bbttn.exe111⤵PID:1464
-
\??\c:\jjppj.exec:\jjppj.exe112⤵PID:1784
-
\??\c:\thbbhh.exec:\thbbhh.exe113⤵PID:1956
-
\??\c:\vvddd.exec:\vvddd.exe114⤵PID:352
-
\??\c:\rfxllxx.exec:\rfxllxx.exe115⤵PID:3008
-
\??\c:\7bntht.exec:\7bntht.exe116⤵PID:2264
-
\??\c:\3pjjj.exec:\3pjjj.exe117⤵PID:3044
-
\??\c:\ffrrllr.exec:\ffrrllr.exe118⤵PID:1616
-
\??\c:\tbhhtn.exec:\tbhhtn.exe119⤵PID:2172
-
\??\c:\dvjjv.exec:\dvjjv.exe120⤵PID:2936
-
\??\c:\1rrlllr.exec:\1rrlllr.exe121⤵PID:540
-
\??\c:\thhhtn.exec:\thhhtn.exe122⤵PID:1280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-