Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 23:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1a2d9e4c5aec7b050a505295f7bffe10N.exe
Resource
win7-20240729-en
6 signatures
120 seconds
General
-
Target
1a2d9e4c5aec7b050a505295f7bffe10N.exe
-
Size
65KB
-
MD5
1a2d9e4c5aec7b050a505295f7bffe10
-
SHA1
cbc9869b86cbcacb3056382a1cb53ccda6c783c3
-
SHA256
2e2d4fe800919a2bfe1cfb7b6853a1fb1580467b3e0d05e900a7c18ec1fac99c
-
SHA512
a98a596a5699048593eb782318343352b9f2b4279e177039cf57c3dc4eca4f68aabda329fc8284f1a02a8534104d6c238d023e5e6824cb76c2bdeff5adb1950b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDI9L27B5QL:ymb3NkkiQ3mdBjFI9c+L
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2208-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2208-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-95-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2588-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/316-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1896-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2292-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/536-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/804-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2620-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2392 9dppj.exe 2148 lfrrrfr.exe 2108 bthnnb.exe 2836 vvjpv.exe 2428 lfflrfr.exe 2732 tnbtbt.exe 2708 1jppp.exe 2580 fffrlfr.exe 2588 flflfxr.exe 1676 bhbtht.exe 2820 vjddp.exe 316 pjdpj.exe 1896 xrxlxlr.exe 1292 hbbnhn.exe 2292 ddvjv.exe 536 vvvjj.exe 2196 9lrxflf.exe 2576 fxfxlfl.exe 804 hbntbn.exe 2140 vvjpv.exe 1068 llxlrxl.exe 1088 bnnbnt.exe 904 1nhnbn.exe 1620 pvdvd.exe 1632 ffxxlrf.exe 2716 fllxxlr.exe 1988 ffxfrfr.exe 2620 nhhnbh.exe 3040 dvvjd.exe 2188 rrrfxxr.exe 2956 lrllfrl.exe 1592 bttbth.exe 2676 jjvjv.exe 2988 9vpdp.exe 2796 rrlrxfr.exe 2696 lffrxfl.exe 2936 nhbnhn.exe 2572 1tntnn.exe 2592 7vvpd.exe 2612 3jddp.exe 3060 dpjjv.exe 2096 rrfllrf.exe 756 xrlrxlx.exe 1200 thhnnt.exe 1960 hbhhtb.exe 2728 vjvvj.exe 1992 vvpvp.exe 2744 xlflxfl.exe 1668 9rfrllx.exe 576 btbthh.exe 3048 ddpvv.exe 2932 1djvj.exe 2940 9ffrxfr.exe 2996 fxllrxf.exe 1812 1lxfxfr.exe 2140 tnbthn.exe 2748 dvjjd.exe 1360 1pddj.exe 1972 xrxfflr.exe 896 tthtbh.exe 1620 1thtth.exe 636 djpdd.exe 2716 pjdjp.exe 1000 xxlfxlr.exe -
resource yara_rule behavioral1/memory/2208-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/316-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1896-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/536-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/804-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-268-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-295-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xrfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrlfrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvdjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxrlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2392 2208 1a2d9e4c5aec7b050a505295f7bffe10N.exe 31 PID 2208 wrote to memory of 2392 2208 1a2d9e4c5aec7b050a505295f7bffe10N.exe 31 PID 2208 wrote to memory of 2392 2208 1a2d9e4c5aec7b050a505295f7bffe10N.exe 31 PID 2208 wrote to memory of 2392 2208 1a2d9e4c5aec7b050a505295f7bffe10N.exe 31 PID 2392 wrote to memory of 2148 2392 9dppj.exe 32 PID 2392 wrote to memory of 2148 2392 9dppj.exe 32 PID 2392 wrote to memory of 2148 2392 9dppj.exe 32 PID 2392 wrote to memory of 2148 2392 9dppj.exe 32 PID 2148 wrote to memory of 2108 2148 lfrrrfr.exe 33 PID 2148 wrote to memory of 2108 2148 lfrrrfr.exe 33 PID 2148 wrote to memory of 2108 2148 lfrrrfr.exe 33 PID 2148 wrote to memory of 2108 2148 lfrrrfr.exe 33 PID 2108 wrote to memory of 2836 2108 bthnnb.exe 34 PID 2108 wrote to memory of 2836 2108 bthnnb.exe 34 PID 2108 wrote to memory of 2836 2108 bthnnb.exe 34 PID 2108 wrote to memory of 2836 2108 bthnnb.exe 34 PID 2836 wrote to memory of 2428 2836 vvjpv.exe 35 PID 2836 wrote to memory of 2428 2836 vvjpv.exe 35 PID 2836 wrote to memory of 2428 2836 vvjpv.exe 35 PID 2836 wrote to memory of 2428 2836 vvjpv.exe 35 PID 2428 wrote to memory of 2732 2428 lfflrfr.exe 36 PID 2428 wrote to memory of 2732 2428 lfflrfr.exe 36 PID 2428 wrote to memory of 2732 2428 lfflrfr.exe 36 PID 2428 wrote to memory of 2732 2428 lfflrfr.exe 36 PID 2732 wrote to memory of 2708 2732 tnbtbt.exe 37 PID 2732 wrote to memory of 2708 2732 tnbtbt.exe 37 PID 2732 wrote to memory of 2708 2732 tnbtbt.exe 37 PID 2732 wrote to memory of 2708 2732 tnbtbt.exe 37 PID 2708 wrote to memory of 2580 2708 1jppp.exe 38 PID 2708 wrote to memory of 2580 2708 1jppp.exe 38 PID 2708 wrote to memory of 2580 2708 1jppp.exe 38 PID 2708 wrote to memory of 2580 2708 1jppp.exe 38 PID 2580 wrote to memory of 2588 2580 fffrlfr.exe 39 PID 2580 wrote to memory of 2588 2580 fffrlfr.exe 39 PID 2580 wrote to memory of 2588 2580 fffrlfr.exe 39 PID 2580 wrote to memory of 2588 2580 fffrlfr.exe 39 PID 2588 wrote to memory of 1676 2588 flflfxr.exe 40 PID 2588 wrote to memory of 1676 2588 flflfxr.exe 40 PID 2588 wrote to memory of 1676 2588 flflfxr.exe 40 PID 2588 wrote to memory of 1676 2588 flflfxr.exe 40 PID 1676 wrote to memory of 2820 1676 bhbtht.exe 41 PID 1676 wrote to memory of 2820 1676 bhbtht.exe 41 PID 1676 wrote to memory of 2820 1676 bhbtht.exe 41 PID 1676 wrote to memory of 2820 1676 bhbtht.exe 41 PID 2820 wrote to memory of 316 2820 vjddp.exe 42 PID 2820 wrote to memory of 316 2820 vjddp.exe 42 PID 2820 wrote to memory of 316 2820 vjddp.exe 42 PID 2820 wrote to memory of 316 2820 vjddp.exe 42 PID 316 wrote to memory of 1896 316 pjdpj.exe 43 PID 316 wrote to memory of 1896 316 pjdpj.exe 43 PID 316 wrote to memory of 1896 316 pjdpj.exe 43 PID 316 wrote to memory of 1896 316 pjdpj.exe 43 PID 1896 wrote to memory of 1292 1896 xrxlxlr.exe 44 PID 1896 wrote to memory of 1292 1896 xrxlxlr.exe 44 PID 1896 wrote to memory of 1292 1896 xrxlxlr.exe 44 PID 1896 wrote to memory of 1292 1896 xrxlxlr.exe 44 PID 1292 wrote to memory of 2292 1292 hbbnhn.exe 45 PID 1292 wrote to memory of 2292 1292 hbbnhn.exe 45 PID 1292 wrote to memory of 2292 1292 hbbnhn.exe 45 PID 1292 wrote to memory of 2292 1292 hbbnhn.exe 45 PID 2292 wrote to memory of 536 2292 ddvjv.exe 46 PID 2292 wrote to memory of 536 2292 ddvjv.exe 46 PID 2292 wrote to memory of 536 2292 ddvjv.exe 46 PID 2292 wrote to memory of 536 2292 ddvjv.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a2d9e4c5aec7b050a505295f7bffe10N.exe"C:\Users\Admin\AppData\Local\Temp\1a2d9e4c5aec7b050a505295f7bffe10N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\9dppj.exec:\9dppj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\lfrrrfr.exec:\lfrrrfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\bthnnb.exec:\bthnnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\vvjpv.exec:\vvjpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\lfflrfr.exec:\lfflrfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\tnbtbt.exec:\tnbtbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\1jppp.exec:\1jppp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\fffrlfr.exec:\fffrlfr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\flflfxr.exec:\flflfxr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\bhbtht.exec:\bhbtht.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\vjddp.exec:\vjddp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\pjdpj.exec:\pjdpj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\xrxlxlr.exec:\xrxlxlr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\hbbnhn.exec:\hbbnhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\ddvjv.exec:\ddvjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\vvvjj.exec:\vvvjj.exe17⤵
- Executes dropped EXE
PID:536 -
\??\c:\9lrxflf.exec:\9lrxflf.exe18⤵
- Executes dropped EXE
PID:2196 -
\??\c:\fxfxlfl.exec:\fxfxlfl.exe19⤵
- Executes dropped EXE
PID:2576 -
\??\c:\hbntbn.exec:\hbntbn.exe20⤵
- Executes dropped EXE
PID:804 -
\??\c:\vvjpv.exec:\vvjpv.exe21⤵
- Executes dropped EXE
PID:2140 -
\??\c:\llxlrxl.exec:\llxlrxl.exe22⤵
- Executes dropped EXE
PID:1068 -
\??\c:\bnnbnt.exec:\bnnbnt.exe23⤵
- Executes dropped EXE
PID:1088 -
\??\c:\1nhnbn.exec:\1nhnbn.exe24⤵
- Executes dropped EXE
PID:904 -
\??\c:\pvdvd.exec:\pvdvd.exe25⤵
- Executes dropped EXE
PID:1620 -
\??\c:\ffxxlrf.exec:\ffxxlrf.exe26⤵
- Executes dropped EXE
PID:1632 -
\??\c:\fllxxlr.exec:\fllxxlr.exe27⤵
- Executes dropped EXE
PID:2716 -
\??\c:\ffxfrfr.exec:\ffxfrfr.exe28⤵
- Executes dropped EXE
PID:1988 -
\??\c:\nhhnbh.exec:\nhhnbh.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620 -
\??\c:\dvvjd.exec:\dvvjd.exe30⤵
- Executes dropped EXE
PID:3040 -
\??\c:\rrrfxxr.exec:\rrrfxxr.exe31⤵
- Executes dropped EXE
PID:2188 -
\??\c:\lrllfrl.exec:\lrllfrl.exe32⤵
- Executes dropped EXE
PID:2956 -
\??\c:\bttbth.exec:\bttbth.exe33⤵
- Executes dropped EXE
PID:1592 -
\??\c:\jjvjv.exec:\jjvjv.exe34⤵
- Executes dropped EXE
PID:2676 -
\??\c:\9vpdp.exec:\9vpdp.exe35⤵
- Executes dropped EXE
PID:2988 -
\??\c:\rrlrxfr.exec:\rrlrxfr.exe36⤵
- Executes dropped EXE
PID:2796 -
\??\c:\lffrxfl.exec:\lffrxfl.exe37⤵
- Executes dropped EXE
PID:2696 -
\??\c:\nhbnhn.exec:\nhbnhn.exe38⤵
- Executes dropped EXE
PID:2936 -
\??\c:\1tntnn.exec:\1tntnn.exe39⤵
- Executes dropped EXE
PID:2572 -
\??\c:\7vvpd.exec:\7vvpd.exe40⤵
- Executes dropped EXE
PID:2592 -
\??\c:\3jddp.exec:\3jddp.exe41⤵
- Executes dropped EXE
PID:2612 -
\??\c:\dpjjv.exec:\dpjjv.exe42⤵
- Executes dropped EXE
PID:3060 -
\??\c:\rrfllrf.exec:\rrfllrf.exe43⤵
- Executes dropped EXE
PID:2096 -
\??\c:\xrlrxlx.exec:\xrlrxlx.exe44⤵
- Executes dropped EXE
PID:756 -
\??\c:\thhnnt.exec:\thhnnt.exe45⤵
- Executes dropped EXE
PID:1200 -
\??\c:\hbhhtb.exec:\hbhhtb.exe46⤵
- Executes dropped EXE
PID:1960 -
\??\c:\vjvvj.exec:\vjvvj.exe47⤵
- Executes dropped EXE
PID:2728 -
\??\c:\vvpvp.exec:\vvpvp.exe48⤵
- Executes dropped EXE
PID:1992 -
\??\c:\xlflxfl.exec:\xlflxfl.exe49⤵
- Executes dropped EXE
PID:2744 -
\??\c:\9rfrllx.exec:\9rfrllx.exe50⤵
- Executes dropped EXE
PID:1668 -
\??\c:\btbthh.exec:\btbthh.exe51⤵
- Executes dropped EXE
PID:576 -
\??\c:\ddpvv.exec:\ddpvv.exe52⤵
- Executes dropped EXE
PID:3048 -
\??\c:\1djvj.exec:\1djvj.exe53⤵
- Executes dropped EXE
PID:2932 -
\??\c:\9ffrxfr.exec:\9ffrxfr.exe54⤵
- Executes dropped EXE
PID:2940 -
\??\c:\fxllrxf.exec:\fxllrxf.exe55⤵
- Executes dropped EXE
PID:2996 -
\??\c:\1lxfxfr.exec:\1lxfxfr.exe56⤵
- Executes dropped EXE
PID:1812 -
\??\c:\tnbthn.exec:\tnbthn.exe57⤵
- Executes dropped EXE
PID:2140 -
\??\c:\dvjjd.exec:\dvjjd.exe58⤵
- Executes dropped EXE
PID:2748 -
\??\c:\1pddj.exec:\1pddj.exe59⤵
- Executes dropped EXE
PID:1360 -
\??\c:\xrxfflr.exec:\xrxfflr.exe60⤵
- Executes dropped EXE
PID:1972 -
\??\c:\tthtbh.exec:\tthtbh.exe61⤵
- Executes dropped EXE
PID:896 -
\??\c:\1thtth.exec:\1thtth.exe62⤵
- Executes dropped EXE
PID:1620 -
\??\c:\djpdd.exec:\djpdd.exe63⤵
- Executes dropped EXE
PID:636 -
\??\c:\pjdjp.exec:\pjdjp.exe64⤵
- Executes dropped EXE
PID:2716 -
\??\c:\xxlfxlr.exec:\xxlfxlr.exe65⤵
- Executes dropped EXE
PID:1000 -
\??\c:\1rxrfxl.exec:\1rxrfxl.exe66⤵PID:864
-
\??\c:\tnbnhn.exec:\tnbnhn.exe67⤵PID:2208
-
\??\c:\jpvdp.exec:\jpvdp.exe68⤵PID:2380
-
\??\c:\pjdjd.exec:\pjdjd.exe69⤵PID:2188
-
\??\c:\xxfxlxr.exec:\xxfxlxr.exe70⤵PID:2328
-
\??\c:\5rrxflr.exec:\5rrxflr.exe71⤵PID:2324
-
\??\c:\btnnnh.exec:\btnnnh.exe72⤵PID:2792
-
\??\c:\nhnntt.exec:\nhnntt.exe73⤵PID:1100
-
\??\c:\jddpv.exec:\jddpv.exe74⤵PID:2644
-
\??\c:\9ppvv.exec:\9ppvv.exe75⤵PID:2812
-
\??\c:\1xxfrfr.exec:\1xxfrfr.exe76⤵PID:2900
-
\??\c:\fxxfrxl.exec:\fxxfrxl.exe77⤵PID:2800
-
\??\c:\hnbbbt.exec:\hnbbbt.exe78⤵PID:2556
-
\??\c:\bthbhh.exec:\bthbhh.exe79⤵PID:2656
-
\??\c:\7pdjv.exec:\7pdjv.exe80⤵PID:3056
-
\??\c:\vpdjv.exec:\vpdjv.exe81⤵PID:2044
-
\??\c:\xxlrrrr.exec:\xxlrrrr.exe82⤵PID:1516
-
\??\c:\fxrfllr.exec:\fxrfllr.exe83⤵PID:2016
-
\??\c:\bbhbbn.exec:\bbhbbn.exe84⤵PID:2820
-
\??\c:\1htbtt.exec:\1htbtt.exe85⤵PID:1820
-
\??\c:\vvpjj.exec:\vvpjj.exe86⤵PID:1436
-
\??\c:\lflfrlf.exec:\lflfrlf.exe87⤵PID:1520
-
\??\c:\5lxrrfx.exec:\5lxrrfx.exe88⤵PID:1736
-
\??\c:\btbhnh.exec:\btbhnh.exe89⤵
- System Location Discovery: System Language Discovery
PID:332 -
\??\c:\hnbttt.exec:\hnbttt.exe90⤵PID:3044
-
\??\c:\pjvdd.exec:\pjvdd.exe91⤵PID:3048
-
\??\c:\dvvdv.exec:\dvvdv.exe92⤵PID:2932
-
\??\c:\7lxxrlx.exec:\7lxxrlx.exe93⤵PID:3000
-
\??\c:\1xxllxr.exec:\1xxllxr.exe94⤵PID:2764
-
\??\c:\tnhhbh.exec:\tnhhbh.exe95⤵PID:1824
-
\??\c:\bbtbbh.exec:\bbtbbh.exe96⤵PID:344
-
\??\c:\ddvpd.exec:\ddvpd.exe97⤵PID:944
-
\??\c:\9ppjv.exec:\9ppjv.exe98⤵PID:2220
-
\??\c:\1lflxxf.exec:\1lflxxf.exe99⤵PID:1756
-
\??\c:\xrflxlx.exec:\xrflxlx.exe100⤵PID:1540
-
\??\c:\bthhbh.exec:\bthhbh.exe101⤵PID:1656
-
\??\c:\vpdpp.exec:\vpdpp.exe102⤵PID:1988
-
\??\c:\jjdpv.exec:\jjdpv.exe103⤵PID:1484
-
\??\c:\pjjvj.exec:\pjjvj.exe104⤵PID:868
-
\??\c:\lflrfll.exec:\lflrfll.exe105⤵PID:2492
-
\??\c:\1hbtnt.exec:\1hbtnt.exe106⤵PID:2076
-
\??\c:\ntbbnn.exec:\ntbbnn.exe107⤵PID:2964
-
\??\c:\pvvvd.exec:\pvvvd.exe108⤵PID:1560
-
\??\c:\jvpvd.exec:\jvpvd.exe109⤵PID:2320
-
\??\c:\rlxlflf.exec:\rlxlflf.exe110⤵PID:2144
-
\??\c:\fxrxlxl.exec:\fxrxlxl.exe111⤵PID:2692
-
\??\c:\5bhnbh.exec:\5bhnbh.exe112⤵PID:2836
-
\??\c:\7btnnb.exec:\7btnnb.exe113⤵PID:2652
-
\??\c:\pdppj.exec:\pdppj.exe114⤵PID:2564
-
\??\c:\vjpvj.exec:\vjpvj.exe115⤵PID:2952
-
\??\c:\xrlrfrf.exec:\xrlrfrf.exe116⤵PID:2672
-
\??\c:\3rxxllr.exec:\3rxxllr.exe117⤵PID:1876
-
\??\c:\rlrfflr.exec:\rlrfflr.exe118⤵PID:2232
-
\??\c:\nnnhnt.exec:\nnnhnt.exe119⤵PID:3056
-
\??\c:\jdpdp.exec:\jdpdp.exe120⤵PID:780
-
\??\c:\pvpdp.exec:\pvpdp.exe121⤵PID:2028
-
\??\c:\fxlrflf.exec:\fxlrflf.exe122⤵PID:2736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-