Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
155d8d055891320990d7d1e3d772e920.exe
Resource
win7-20240704-en
General
-
Target
155d8d055891320990d7d1e3d772e920.exe
-
Size
129KB
-
MD5
155d8d055891320990d7d1e3d772e920
-
SHA1
da7224f626a680a87208a267f2cfbe92aa9fd820
-
SHA256
ea6511db93188d09deef5f347e0b62bec1fe7186c342563ae09d1e5e8d38fd7a
-
SHA512
025c3636d821c8ac2125d490f3248ee918e9639585658e84c03aa5e82c8a1e97c8ae781c7547057c5c60a764cebbadff8dae6610ded44c72b465718d4b7b5966
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73oYUCD7R2F2UVbyy0NgmfF9y:ymb3NkkiQ3mdBjFo73HUoMsAbrxmtE
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2820-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/380-70-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/380-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1136-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1804-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2152-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1648-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1276-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/768-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1388-209-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2396-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/400-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2952 5bntnt.exe 2348 222862.exe 2724 5bnhbt.exe 2584 pdpvp.exe 3032 484266.exe 380 3pjjp.exe 1136 vpjpd.exe 1804 3rlfrxx.exe 2148 ppppj.exe 2152 nhttbh.exe 2936 s4624.exe 1248 hhhttt.exe 1648 826862.exe 2916 9llrxfr.exe 3064 w64640.exe 1276 3pdjj.exe 1768 9xxlfxl.exe 2988 ttntbh.exe 868 jpvvv.exe 2448 rlxlfrx.exe 1388 26808.exe 768 06682.exe 1340 vvjjd.exe 1708 608062.exe 2204 llxffxl.exe 2396 0488020.exe 400 8224624.exe 692 ppjpd.exe 1324 82842.exe 1480 9pdjv.exe 2712 rlxxflx.exe 2864 1hbnht.exe 2844 4440824.exe 1600 08028.exe 2760 llxlxrr.exe 2620 26444.exe 2828 llxrllx.exe 2300 6204800.exe 596 bbhnhn.exe 292 ddvdj.exe 580 826640.exe 1464 8208480.exe 2212 264644.exe 2216 hhthbh.exe 2504 nnbthn.exe 1312 fllrfxf.exe 1248 jpdjd.exe 2888 4802062.exe 1864 4064288.exe 372 dpvvd.exe 2924 jvjjp.exe 1672 480028.exe 1736 60840.exe 2260 jddvv.exe 1288 hhnhnn.exe 2320 ddjpd.exe 2792 0402880.exe 2424 ppjvp.exe 768 8262068.exe 1640 bntbhn.exe 1532 m8482.exe 748 8206240.exe 2476 220082.exe 2040 268688.exe -
resource yara_rule behavioral1/memory/2820-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/380-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1804-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2152-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1276-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/768-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1388-209-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2396-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/400-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-281-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrlffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 480022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86224.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826862.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i862402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w80408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0084280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8264280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1htbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2952 2820 155d8d055891320990d7d1e3d772e920.exe 30 PID 2820 wrote to memory of 2952 2820 155d8d055891320990d7d1e3d772e920.exe 30 PID 2820 wrote to memory of 2952 2820 155d8d055891320990d7d1e3d772e920.exe 30 PID 2820 wrote to memory of 2952 2820 155d8d055891320990d7d1e3d772e920.exe 30 PID 2952 wrote to memory of 2348 2952 5bntnt.exe 31 PID 2952 wrote to memory of 2348 2952 5bntnt.exe 31 PID 2952 wrote to memory of 2348 2952 5bntnt.exe 31 PID 2952 wrote to memory of 2348 2952 5bntnt.exe 31 PID 2348 wrote to memory of 2724 2348 222862.exe 32 PID 2348 wrote to memory of 2724 2348 222862.exe 32 PID 2348 wrote to memory of 2724 2348 222862.exe 32 PID 2348 wrote to memory of 2724 2348 222862.exe 32 PID 2724 wrote to memory of 2584 2724 5bnhbt.exe 33 PID 2724 wrote to memory of 2584 2724 5bnhbt.exe 33 PID 2724 wrote to memory of 2584 2724 5bnhbt.exe 33 PID 2724 wrote to memory of 2584 2724 5bnhbt.exe 33 PID 2584 wrote to memory of 3032 2584 pdpvp.exe 34 PID 2584 wrote to memory of 3032 2584 pdpvp.exe 34 PID 2584 wrote to memory of 3032 2584 pdpvp.exe 34 PID 2584 wrote to memory of 3032 2584 pdpvp.exe 34 PID 3032 wrote to memory of 380 3032 484266.exe 35 PID 3032 wrote to memory of 380 3032 484266.exe 35 PID 3032 wrote to memory of 380 3032 484266.exe 35 PID 3032 wrote to memory of 380 3032 484266.exe 35 PID 380 wrote to memory of 1136 380 3pjjp.exe 36 PID 380 wrote to memory of 1136 380 3pjjp.exe 36 PID 380 wrote to memory of 1136 380 3pjjp.exe 36 PID 380 wrote to memory of 1136 380 3pjjp.exe 36 PID 1136 wrote to memory of 1804 1136 vpjpd.exe 37 PID 1136 wrote to memory of 1804 1136 vpjpd.exe 37 PID 1136 wrote to memory of 1804 1136 vpjpd.exe 37 PID 1136 wrote to memory of 1804 1136 vpjpd.exe 37 PID 1804 wrote to memory of 2148 1804 3rlfrxx.exe 38 PID 1804 wrote to memory of 2148 1804 3rlfrxx.exe 38 PID 1804 wrote to memory of 2148 1804 3rlfrxx.exe 38 PID 1804 wrote to memory of 2148 1804 3rlfrxx.exe 38 PID 2148 wrote to memory of 2152 2148 ppppj.exe 39 PID 2148 wrote to memory of 2152 2148 ppppj.exe 39 PID 2148 wrote to memory of 2152 2148 ppppj.exe 39 PID 2148 wrote to memory of 2152 2148 ppppj.exe 39 PID 2152 wrote to memory of 2936 2152 nhttbh.exe 40 PID 2152 wrote to memory of 2936 2152 nhttbh.exe 40 PID 2152 wrote to memory of 2936 2152 nhttbh.exe 40 PID 2152 wrote to memory of 2936 2152 nhttbh.exe 40 PID 2936 wrote to memory of 1248 2936 s4624.exe 41 PID 2936 wrote to memory of 1248 2936 s4624.exe 41 PID 2936 wrote to memory of 1248 2936 s4624.exe 41 PID 2936 wrote to memory of 1248 2936 s4624.exe 41 PID 1248 wrote to memory of 1648 1248 hhhttt.exe 42 PID 1248 wrote to memory of 1648 1248 hhhttt.exe 42 PID 1248 wrote to memory of 1648 1248 hhhttt.exe 42 PID 1248 wrote to memory of 1648 1248 hhhttt.exe 42 PID 1648 wrote to memory of 2916 1648 826862.exe 43 PID 1648 wrote to memory of 2916 1648 826862.exe 43 PID 1648 wrote to memory of 2916 1648 826862.exe 43 PID 1648 wrote to memory of 2916 1648 826862.exe 43 PID 2916 wrote to memory of 3064 2916 9llrxfr.exe 44 PID 2916 wrote to memory of 3064 2916 9llrxfr.exe 44 PID 2916 wrote to memory of 3064 2916 9llrxfr.exe 44 PID 2916 wrote to memory of 3064 2916 9llrxfr.exe 44 PID 3064 wrote to memory of 1276 3064 w64640.exe 45 PID 3064 wrote to memory of 1276 3064 w64640.exe 45 PID 3064 wrote to memory of 1276 3064 w64640.exe 45 PID 3064 wrote to memory of 1276 3064 w64640.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\155d8d055891320990d7d1e3d772e920.exe"C:\Users\Admin\AppData\Local\Temp\155d8d055891320990d7d1e3d772e920.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\5bntnt.exec:\5bntnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\222862.exec:\222862.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\5bnhbt.exec:\5bnhbt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\pdpvp.exec:\pdpvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\484266.exec:\484266.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\3pjjp.exec:\3pjjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
\??\c:\vpjpd.exec:\vpjpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\3rlfrxx.exec:\3rlfrxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\ppppj.exec:\ppppj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\nhttbh.exec:\nhttbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\s4624.exec:\s4624.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\hhhttt.exec:\hhhttt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\826862.exec:\826862.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\9llrxfr.exec:\9llrxfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\w64640.exec:\w64640.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\3pdjj.exec:\3pdjj.exe17⤵
- Executes dropped EXE
PID:1276 -
\??\c:\9xxlfxl.exec:\9xxlfxl.exe18⤵
- Executes dropped EXE
PID:1768 -
\??\c:\ttntbh.exec:\ttntbh.exe19⤵
- Executes dropped EXE
PID:2988 -
\??\c:\jpvvv.exec:\jpvvv.exe20⤵
- Executes dropped EXE
PID:868 -
\??\c:\rlxlfrx.exec:\rlxlfrx.exe21⤵
- Executes dropped EXE
PID:2448 -
\??\c:\26808.exec:\26808.exe22⤵
- Executes dropped EXE
PID:1388 -
\??\c:\06682.exec:\06682.exe23⤵
- Executes dropped EXE
PID:768 -
\??\c:\vvjjd.exec:\vvjjd.exe24⤵
- Executes dropped EXE
PID:1340 -
\??\c:\608062.exec:\608062.exe25⤵
- Executes dropped EXE
PID:1708 -
\??\c:\llxffxl.exec:\llxffxl.exe26⤵
- Executes dropped EXE
PID:2204 -
\??\c:\0488020.exec:\0488020.exe27⤵
- Executes dropped EXE
PID:2396 -
\??\c:\8224624.exec:\8224624.exe28⤵
- Executes dropped EXE
PID:400 -
\??\c:\ppjpd.exec:\ppjpd.exe29⤵
- Executes dropped EXE
PID:692 -
\??\c:\82842.exec:\82842.exe30⤵
- Executes dropped EXE
PID:1324 -
\??\c:\9pdjv.exec:\9pdjv.exe31⤵
- Executes dropped EXE
PID:1480 -
\??\c:\rlxxflx.exec:\rlxxflx.exe32⤵
- Executes dropped EXE
PID:2712 -
\??\c:\1hbnht.exec:\1hbnht.exe33⤵
- Executes dropped EXE
PID:2864 -
\??\c:\4440824.exec:\4440824.exe34⤵
- Executes dropped EXE
PID:2844 -
\??\c:\08028.exec:\08028.exe35⤵
- Executes dropped EXE
PID:1600 -
\??\c:\llxlxrr.exec:\llxlxrr.exe36⤵
- Executes dropped EXE
PID:2760 -
\??\c:\26444.exec:\26444.exe37⤵
- Executes dropped EXE
PID:2620 -
\??\c:\llxrllx.exec:\llxrllx.exe38⤵
- Executes dropped EXE
PID:2828 -
\??\c:\6204800.exec:\6204800.exe39⤵
- Executes dropped EXE
PID:2300 -
\??\c:\bbhnhn.exec:\bbhnhn.exe40⤵
- Executes dropped EXE
PID:596 -
\??\c:\ddvdj.exec:\ddvdj.exe41⤵
- Executes dropped EXE
PID:292 -
\??\c:\826640.exec:\826640.exe42⤵
- Executes dropped EXE
PID:580 -
\??\c:\8208480.exec:\8208480.exe43⤵
- Executes dropped EXE
PID:1464 -
\??\c:\264644.exec:\264644.exe44⤵
- Executes dropped EXE
PID:2212 -
\??\c:\hhthbh.exec:\hhthbh.exe45⤵
- Executes dropped EXE
PID:2216 -
\??\c:\nnbthn.exec:\nnbthn.exe46⤵
- Executes dropped EXE
PID:2504 -
\??\c:\fllrfxf.exec:\fllrfxf.exe47⤵
- Executes dropped EXE
PID:1312 -
\??\c:\jpdjd.exec:\jpdjd.exe48⤵
- Executes dropped EXE
PID:1248 -
\??\c:\4802062.exec:\4802062.exe49⤵
- Executes dropped EXE
PID:2888 -
\??\c:\4064288.exec:\4064288.exe50⤵
- Executes dropped EXE
PID:1864 -
\??\c:\dpvvd.exec:\dpvvd.exe51⤵
- Executes dropped EXE
PID:372 -
\??\c:\jvjjp.exec:\jvjjp.exe52⤵
- Executes dropped EXE
PID:2924 -
\??\c:\480028.exec:\480028.exe53⤵
- Executes dropped EXE
PID:1672 -
\??\c:\60840.exec:\60840.exe54⤵
- Executes dropped EXE
PID:1736 -
\??\c:\jddvv.exec:\jddvv.exe55⤵
- Executes dropped EXE
PID:2260 -
\??\c:\hhnhnn.exec:\hhnhnn.exe56⤵
- Executes dropped EXE
PID:1288 -
\??\c:\ddjpd.exec:\ddjpd.exe57⤵
- Executes dropped EXE
PID:2320 -
\??\c:\0402880.exec:\0402880.exe58⤵
- Executes dropped EXE
PID:2792 -
\??\c:\ppjvp.exec:\ppjvp.exe59⤵
- Executes dropped EXE
PID:2424 -
\??\c:\8262068.exec:\8262068.exe60⤵
- Executes dropped EXE
PID:768 -
\??\c:\bntbhn.exec:\bntbhn.exe61⤵
- Executes dropped EXE
PID:1640 -
\??\c:\m8482.exec:\m8482.exe62⤵
- Executes dropped EXE
PID:1532 -
\??\c:\8206240.exec:\8206240.exe63⤵
- Executes dropped EXE
PID:748 -
\??\c:\220082.exec:\220082.exe64⤵
- Executes dropped EXE
PID:2476 -
\??\c:\268688.exec:\268688.exe65⤵
- Executes dropped EXE
PID:2040 -
\??\c:\4246246.exec:\4246246.exe66⤵PID:2528
-
\??\c:\pjdpj.exec:\pjdpj.exe67⤵PID:2332
-
\??\c:\048428.exec:\048428.exe68⤵PID:2304
-
\??\c:\042806.exec:\042806.exe69⤵PID:352
-
\??\c:\llfflrl.exec:\llfflrl.exe70⤵PID:2964
-
\??\c:\vvppj.exec:\vvppj.exe71⤵PID:2596
-
\??\c:\ttbtbb.exec:\ttbtbb.exe72⤵PID:2780
-
\??\c:\882468.exec:\882468.exe73⤵PID:2860
-
\??\c:\g6880.exec:\g6880.exe74⤵PID:2776
-
\??\c:\bbhhth.exec:\bbhhth.exe75⤵PID:1720
-
\??\c:\066620.exec:\066620.exe76⤵PID:2660
-
\??\c:\rlrrxfr.exec:\rlrrxfr.exe77⤵PID:2620
-
\??\c:\xxrfllf.exec:\xxrfllf.exe78⤵PID:528
-
\??\c:\6046468.exec:\6046468.exe79⤵PID:2604
-
\??\c:\4644826.exec:\4644826.exe80⤵PID:1652
-
\??\c:\thhbtb.exec:\thhbtb.exe81⤵PID:688
-
\??\c:\w44028.exec:\w44028.exe82⤵PID:2092
-
\??\c:\jjvdp.exec:\jjvdp.exe83⤵PID:2556
-
\??\c:\7nbnht.exec:\7nbnht.exe84⤵PID:2892
-
\??\c:\268424.exec:\268424.exe85⤵PID:2384
-
\??\c:\ffxflrr.exec:\ffxflrr.exe86⤵PID:2900
-
\??\c:\486422.exec:\486422.exe87⤵PID:1244
-
\??\c:\ttbtbt.exec:\ttbtbt.exe88⤵PID:2896
-
\??\c:\0428002.exec:\0428002.exe89⤵PID:3048
-
\??\c:\48228.exec:\48228.exe90⤵PID:1460
-
\??\c:\6466228.exec:\6466228.exe91⤵PID:1228
-
\??\c:\420066.exec:\420066.exe92⤵PID:1280
-
\??\c:\jdjpv.exec:\jdjpv.exe93⤵PID:2120
-
\??\c:\rlrlrrf.exec:\rlrlrrf.exe94⤵PID:1476
-
\??\c:\tbtbnh.exec:\tbtbnh.exe95⤵PID:1108
-
\??\c:\2680880.exec:\2680880.exe96⤵PID:868
-
\??\c:\4282400.exec:\4282400.exe97⤵PID:2060
-
\??\c:\rlrxlrf.exec:\rlrxlrf.exe98⤵PID:1696
-
\??\c:\thnnbb.exec:\thnnbb.exe99⤵PID:2424
-
\??\c:\6680062.exec:\6680062.exe100⤵PID:1528
-
\??\c:\9nhthn.exec:\9nhthn.exe101⤵PID:1552
-
\??\c:\tthntb.exec:\tthntb.exe102⤵PID:612
-
\??\c:\6488044.exec:\6488044.exe103⤵PID:2360
-
\??\c:\6088008.exec:\6088008.exe104⤵PID:328
-
\??\c:\82628.exec:\82628.exe105⤵PID:1996
-
\??\c:\ddvdp.exec:\ddvdp.exe106⤵PID:752
-
\??\c:\pdpvp.exec:\pdpvp.exe107⤵PID:2116
-
\??\c:\xrfxflx.exec:\xrfxflx.exe108⤵PID:2772
-
\??\c:\nhnnnt.exec:\nhnnnt.exe109⤵PID:2176
-
\??\c:\rrlrxlx.exec:\rrlrxlx.exe110⤵PID:2716
-
\??\c:\lfrrrll.exec:\lfrrrll.exe111⤵PID:2596
-
\??\c:\c486846.exec:\c486846.exe112⤵PID:2784
-
\??\c:\m0022.exec:\m0022.exe113⤵PID:2832
-
\??\c:\pddvp.exec:\pddvp.exe114⤵PID:2220
-
\??\c:\8644044.exec:\8644044.exe115⤵PID:2760
-
\??\c:\hhbhbh.exec:\hhbhbh.exe116⤵PID:2708
-
\??\c:\64624.exec:\64624.exe117⤵PID:2144
-
\??\c:\vpvvp.exec:\vpvvp.exe118⤵PID:872
-
\??\c:\20882.exec:\20882.exe119⤵PID:572
-
\??\c:\u202008.exec:\u202008.exe120⤵PID:292
-
\??\c:\624080.exec:\624080.exe121⤵PID:1516
-
\??\c:\226800.exec:\226800.exe122⤵PID:2104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-