Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 11:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f5c5af83ae83c05576b2d9e6aab42b0N.exe
Resource
win7-20240705-en
6 signatures
120 seconds
General
-
Target
7f5c5af83ae83c05576b2d9e6aab42b0N.exe
-
Size
57KB
-
MD5
7f5c5af83ae83c05576b2d9e6aab42b0
-
SHA1
94b366e10c4013a74db81b8569c0c1c2f976f745
-
SHA256
dc671d6ee3918912ef68e6167a4e4f1b72c17b20c4ad62a4e913cbd6c643595e
-
SHA512
2a8d33fd346c6eb952c43bc06eae00f268524031fe726dd16f1734c36817899b6437905c957b976d90eb42d1312477b687fdd39f17fb593e2ac02389ff1b6fd1
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgTz:ymb3NkkiQ3mdBjFIg/
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/3048-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/308-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/308-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-40-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2200-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1408-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/304-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1292-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/820-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1612-275-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2508 thhntb.exe 308 jvjjj.exe 2680 lxxxxfr.exe 2716 xrrxflr.exe 2796 hhbtnt.exe 2864 bnbttb.exe 2616 vvddv.exe 2700 lxllflr.exe 2636 tnbnnt.exe 2200 bbbnhb.exe 2480 jvvdj.exe 2576 dpdjv.exe 1408 xrlxlrx.exe 2404 hhbhnt.exe 2484 bnntbh.exe 304 vvddd.exe 2904 xrxfxxf.exe 2676 thbhtt.exe 2460 htbbhb.exe 792 vpjpv.exe 2332 9fxxxxl.exe 1292 rrfrlrl.exe 820 hbtbbb.exe 1868 htbntn.exe 2956 vpvjv.exe 2328 jvjpv.exe 2536 3xrrffx.exe 1928 bthtnn.exe 1612 bbthtb.exe 2952 dvjpv.exe 2336 jjvdp.exe 2868 rflfxxf.exe 2280 lfxfrrx.exe 2808 tnbhnt.exe 788 nhnnbt.exe 2712 pjjdp.exe 2740 dvjpd.exe 2812 1lxlxxf.exe 2788 xlrlfxf.exe 2884 9bntbh.exe 2752 btbhnn.exe 3064 1pdjv.exe 3028 jdjpp.exe 1940 rfxfffr.exe 1732 9xlrxfl.exe 1588 1ntthh.exe 1920 hbhbhn.exe 1408 dpdpd.exe 1660 djvvp.exe 1060 5fxxlrx.exe 1036 bttbnn.exe 988 3hhhhn.exe 2892 vpdjd.exe 2456 dvpdd.exe 816 lflrrlr.exe 860 9xrrlrl.exe 1444 tnhnbb.exe 1428 5nhbnt.exe 2856 bntbhn.exe 1080 pdjjd.exe 2016 vvjpj.exe 2528 fflrrrr.exe 1728 xxxlfrl.exe 1696 7bhntn.exe -
resource yara_rule behavioral1/memory/3048-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/308-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2200-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1408-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/304-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/820-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1612-275-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5jppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxfxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2508 3048 7f5c5af83ae83c05576b2d9e6aab42b0N.exe 31 PID 3048 wrote to memory of 2508 3048 7f5c5af83ae83c05576b2d9e6aab42b0N.exe 31 PID 3048 wrote to memory of 2508 3048 7f5c5af83ae83c05576b2d9e6aab42b0N.exe 31 PID 3048 wrote to memory of 2508 3048 7f5c5af83ae83c05576b2d9e6aab42b0N.exe 31 PID 2508 wrote to memory of 308 2508 thhntb.exe 32 PID 2508 wrote to memory of 308 2508 thhntb.exe 32 PID 2508 wrote to memory of 308 2508 thhntb.exe 32 PID 2508 wrote to memory of 308 2508 thhntb.exe 32 PID 308 wrote to memory of 2680 308 jvjjj.exe 33 PID 308 wrote to memory of 2680 308 jvjjj.exe 33 PID 308 wrote to memory of 2680 308 jvjjj.exe 33 PID 308 wrote to memory of 2680 308 jvjjj.exe 33 PID 2680 wrote to memory of 2716 2680 lxxxxfr.exe 34 PID 2680 wrote to memory of 2716 2680 lxxxxfr.exe 34 PID 2680 wrote to memory of 2716 2680 lxxxxfr.exe 34 PID 2680 wrote to memory of 2716 2680 lxxxxfr.exe 34 PID 2716 wrote to memory of 2796 2716 xrrxflr.exe 35 PID 2716 wrote to memory of 2796 2716 xrrxflr.exe 35 PID 2716 wrote to memory of 2796 2716 xrrxflr.exe 35 PID 2716 wrote to memory of 2796 2716 xrrxflr.exe 35 PID 2796 wrote to memory of 2864 2796 hhbtnt.exe 36 PID 2796 wrote to memory of 2864 2796 hhbtnt.exe 36 PID 2796 wrote to memory of 2864 2796 hhbtnt.exe 36 PID 2796 wrote to memory of 2864 2796 hhbtnt.exe 36 PID 2864 wrote to memory of 2616 2864 bnbttb.exe 37 PID 2864 wrote to memory of 2616 2864 bnbttb.exe 37 PID 2864 wrote to memory of 2616 2864 bnbttb.exe 37 PID 2864 wrote to memory of 2616 2864 bnbttb.exe 37 PID 2616 wrote to memory of 2700 2616 vvddv.exe 38 PID 2616 wrote to memory of 2700 2616 vvddv.exe 38 PID 2616 wrote to memory of 2700 2616 vvddv.exe 38 PID 2616 wrote to memory of 2700 2616 vvddv.exe 38 PID 2700 wrote to memory of 2636 2700 lxllflr.exe 39 PID 2700 wrote to memory of 2636 2700 lxllflr.exe 39 PID 2700 wrote to memory of 2636 2700 lxllflr.exe 39 PID 2700 wrote to memory of 2636 2700 lxllflr.exe 39 PID 2636 wrote to memory of 2200 2636 tnbnnt.exe 40 PID 2636 wrote to memory of 2200 2636 tnbnnt.exe 40 PID 2636 wrote to memory of 2200 2636 tnbnnt.exe 40 PID 2636 wrote to memory of 2200 2636 tnbnnt.exe 40 PID 2200 wrote to memory of 2480 2200 bbbnhb.exe 41 PID 2200 wrote to memory of 2480 2200 bbbnhb.exe 41 PID 2200 wrote to memory of 2480 2200 bbbnhb.exe 41 PID 2200 wrote to memory of 2480 2200 bbbnhb.exe 41 PID 2480 wrote to memory of 2576 2480 jvvdj.exe 42 PID 2480 wrote to memory of 2576 2480 jvvdj.exe 42 PID 2480 wrote to memory of 2576 2480 jvvdj.exe 42 PID 2480 wrote to memory of 2576 2480 jvvdj.exe 42 PID 2576 wrote to memory of 1408 2576 dpdjv.exe 43 PID 2576 wrote to memory of 1408 2576 dpdjv.exe 43 PID 2576 wrote to memory of 1408 2576 dpdjv.exe 43 PID 2576 wrote to memory of 1408 2576 dpdjv.exe 43 PID 1408 wrote to memory of 2404 1408 xrlxlrx.exe 44 PID 1408 wrote to memory of 2404 1408 xrlxlrx.exe 44 PID 1408 wrote to memory of 2404 1408 xrlxlrx.exe 44 PID 1408 wrote to memory of 2404 1408 xrlxlrx.exe 44 PID 2404 wrote to memory of 2484 2404 hhbhnt.exe 45 PID 2404 wrote to memory of 2484 2404 hhbhnt.exe 45 PID 2404 wrote to memory of 2484 2404 hhbhnt.exe 45 PID 2404 wrote to memory of 2484 2404 hhbhnt.exe 45 PID 2484 wrote to memory of 304 2484 bnntbh.exe 46 PID 2484 wrote to memory of 304 2484 bnntbh.exe 46 PID 2484 wrote to memory of 304 2484 bnntbh.exe 46 PID 2484 wrote to memory of 304 2484 bnntbh.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f5c5af83ae83c05576b2d9e6aab42b0N.exe"C:\Users\Admin\AppData\Local\Temp\7f5c5af83ae83c05576b2d9e6aab42b0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\thhntb.exec:\thhntb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\jvjjj.exec:\jvjjj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
\??\c:\lxxxxfr.exec:\lxxxxfr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\xrrxflr.exec:\xrrxflr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\hhbtnt.exec:\hhbtnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\bnbttb.exec:\bnbttb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\vvddv.exec:\vvddv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\lxllflr.exec:\lxllflr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\tnbnnt.exec:\tnbnnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\bbbnhb.exec:\bbbnhb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\jvvdj.exec:\jvvdj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\dpdjv.exec:\dpdjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\xrlxlrx.exec:\xrlxlrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\hhbhnt.exec:\hhbhnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\bnntbh.exec:\bnntbh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\vvddd.exec:\vvddd.exe17⤵
- Executes dropped EXE
PID:304 -
\??\c:\xrxfxxf.exec:\xrxfxxf.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904 -
\??\c:\thbhtt.exec:\thbhtt.exe19⤵
- Executes dropped EXE
PID:2676 -
\??\c:\htbbhb.exec:\htbbhb.exe20⤵
- Executes dropped EXE
PID:2460 -
\??\c:\vpjpv.exec:\vpjpv.exe21⤵
- Executes dropped EXE
PID:792 -
\??\c:\9fxxxxl.exec:\9fxxxxl.exe22⤵
- Executes dropped EXE
PID:2332 -
\??\c:\rrfrlrl.exec:\rrfrlrl.exe23⤵
- Executes dropped EXE
PID:1292 -
\??\c:\hbtbbb.exec:\hbtbbb.exe24⤵
- Executes dropped EXE
PID:820 -
\??\c:\htbntn.exec:\htbntn.exe25⤵
- Executes dropped EXE
PID:1868 -
\??\c:\vpvjv.exec:\vpvjv.exe26⤵
- Executes dropped EXE
PID:2956 -
\??\c:\jvjpv.exec:\jvjpv.exe27⤵
- Executes dropped EXE
PID:2328 -
\??\c:\3xrrffx.exec:\3xrrffx.exe28⤵
- Executes dropped EXE
PID:2536 -
\??\c:\bthtnn.exec:\bthtnn.exe29⤵
- Executes dropped EXE
PID:1928 -
\??\c:\bbthtb.exec:\bbthtb.exe30⤵
- Executes dropped EXE
PID:1612 -
\??\c:\dvjpv.exec:\dvjpv.exe31⤵
- Executes dropped EXE
PID:2952 -
\??\c:\jjvdp.exec:\jjvdp.exe32⤵
- Executes dropped EXE
PID:2336 -
\??\c:\rflfxxf.exec:\rflfxxf.exe33⤵
- Executes dropped EXE
PID:2868 -
\??\c:\lfxfrrx.exec:\lfxfrrx.exe34⤵
- Executes dropped EXE
PID:2280 -
\??\c:\tnbhnt.exec:\tnbhnt.exe35⤵
- Executes dropped EXE
PID:2808 -
\??\c:\nhnnbt.exec:\nhnnbt.exe36⤵
- Executes dropped EXE
PID:788 -
\??\c:\pjjdp.exec:\pjjdp.exe37⤵
- Executes dropped EXE
PID:2712 -
\??\c:\dvjpd.exec:\dvjpd.exe38⤵
- Executes dropped EXE
PID:2740 -
\??\c:\1lxlxxf.exec:\1lxlxxf.exe39⤵
- Executes dropped EXE
PID:2812 -
\??\c:\xlrlfxf.exec:\xlrlfxf.exe40⤵
- Executes dropped EXE
PID:2788 -
\??\c:\9bntbh.exec:\9bntbh.exe41⤵
- Executes dropped EXE
PID:2884 -
\??\c:\btbhnn.exec:\btbhnn.exe42⤵
- Executes dropped EXE
PID:2752 -
\??\c:\1pdjv.exec:\1pdjv.exe43⤵
- Executes dropped EXE
PID:3064 -
\??\c:\jdjpp.exec:\jdjpp.exe44⤵
- Executes dropped EXE
PID:3028 -
\??\c:\rfxfffr.exec:\rfxfffr.exe45⤵
- Executes dropped EXE
PID:1940 -
\??\c:\9xlrxfl.exec:\9xlrxfl.exe46⤵
- Executes dropped EXE
PID:1732 -
\??\c:\1ntthh.exec:\1ntthh.exe47⤵
- Executes dropped EXE
PID:1588 -
\??\c:\hbhbhn.exec:\hbhbhn.exe48⤵
- Executes dropped EXE
PID:1920 -
\??\c:\dpdpd.exec:\dpdpd.exe49⤵
- Executes dropped EXE
PID:1408 -
\??\c:\djvvp.exec:\djvvp.exe50⤵
- Executes dropped EXE
PID:1660 -
\??\c:\5fxxlrx.exec:\5fxxlrx.exe51⤵
- Executes dropped EXE
PID:1060 -
\??\c:\bttbnn.exec:\bttbnn.exe52⤵
- Executes dropped EXE
PID:1036 -
\??\c:\3hhhhn.exec:\3hhhhn.exe53⤵
- Executes dropped EXE
PID:988 -
\??\c:\vpdjd.exec:\vpdjd.exe54⤵
- Executes dropped EXE
PID:2892 -
\??\c:\dvpdd.exec:\dvpdd.exe55⤵
- Executes dropped EXE
PID:2456 -
\??\c:\lflrrlr.exec:\lflrrlr.exe56⤵
- Executes dropped EXE
PID:816 -
\??\c:\9xrrlrl.exec:\9xrrlrl.exe57⤵
- Executes dropped EXE
PID:860 -
\??\c:\tnhnbb.exec:\tnhnbb.exe58⤵
- Executes dropped EXE
PID:1444 -
\??\c:\5nhbnt.exec:\5nhbnt.exe59⤵
- Executes dropped EXE
PID:1428 -
\??\c:\bntbhn.exec:\bntbhn.exe60⤵
- Executes dropped EXE
PID:2856 -
\??\c:\pdjjd.exec:\pdjjd.exe61⤵
- Executes dropped EXE
PID:1080 -
\??\c:\vvjpj.exec:\vvjpj.exe62⤵
- Executes dropped EXE
PID:2016 -
\??\c:\fflrrrr.exec:\fflrrrr.exe63⤵
- Executes dropped EXE
PID:2528 -
\??\c:\xxxlfrl.exec:\xxxlfrl.exe64⤵
- Executes dropped EXE
PID:1728 -
\??\c:\7bhntn.exec:\7bhntn.exe65⤵
- Executes dropped EXE
PID:1696 -
\??\c:\7jdvv.exec:\7jdvv.exe66⤵PID:2380
-
\??\c:\5ddjv.exec:\5ddjv.exe67⤵PID:2516
-
\??\c:\lxllrrf.exec:\lxllrrf.exe68⤵PID:1612
-
\??\c:\1xxxfxx.exec:\1xxxfxx.exe69⤵PID:2952
-
\??\c:\1nhhtt.exec:\1nhhtt.exe70⤵PID:308
-
\??\c:\ttbnbb.exec:\ttbnbb.exe71⤵PID:2488
-
\??\c:\pjvvd.exec:\pjvvd.exe72⤵PID:2680
-
\??\c:\pjdpp.exec:\pjdpp.exe73⤵PID:2280
-
\??\c:\xlfffxl.exec:\xlfffxl.exe74⤵PID:2716
-
\??\c:\5lrlrlr.exec:\5lrlrlr.exe75⤵PID:2696
-
\??\c:\lflrrrx.exec:\lflrrrx.exe76⤵PID:2712
-
\??\c:\9nhttb.exec:\9nhttb.exe77⤵PID:2692
-
\??\c:\htbtbb.exec:\htbtbb.exe78⤵PID:2836
-
\??\c:\vpdjp.exec:\vpdjp.exe79⤵PID:2772
-
\??\c:\3dppp.exec:\3dppp.exe80⤵PID:2724
-
\??\c:\xlxfflr.exec:\xlxfflr.exe81⤵PID:2608
-
\??\c:\lfffrlr.exec:\lfffrlr.exe82⤵PID:2600
-
\??\c:\hbtthh.exec:\hbtthh.exe83⤵PID:2044
-
\??\c:\nhtbhb.exec:\nhtbhb.exe84⤵PID:2396
-
\??\c:\pjvvd.exec:\pjvvd.exe85⤵PID:2320
-
\??\c:\vvjjj.exec:\vvjjj.exe86⤵PID:1780
-
\??\c:\rlxlxfl.exec:\rlxlxfl.exe87⤵PID:1164
-
\??\c:\3ntbtb.exec:\3ntbtb.exe88⤵PID:2064
-
\??\c:\7tbbhb.exec:\7tbbhb.exe89⤵PID:1712
-
\??\c:\bnhnnt.exec:\bnhnnt.exe90⤵PID:2484
-
\??\c:\jdjdj.exec:\jdjdj.exe91⤵PID:528
-
\??\c:\vjvdj.exec:\vjvdj.exe92⤵PID:2208
-
\??\c:\xlxxrxf.exec:\xlxxrxf.exe93⤵PID:2432
-
\??\c:\3lrrxxf.exec:\3lrrxxf.exe94⤵PID:2456
-
\??\c:\nhnbnb.exec:\nhnbnb.exe95⤵PID:2408
-
\??\c:\htttbt.exec:\htttbt.exe96⤵PID:860
-
\??\c:\vvddv.exec:\vvddv.exe97⤵PID:1760
-
\??\c:\dpjjj.exec:\dpjjj.exe98⤵PID:1428
-
\??\c:\lfrxxrx.exec:\lfrxxrx.exe99⤵PID:1616
-
\??\c:\lfrrfxf.exec:\lfrrfxf.exe100⤵PID:1080
-
\??\c:\xlxlxxf.exec:\xlxlxxf.exe101⤵PID:1276
-
\??\c:\nbttbb.exec:\nbttbb.exe102⤵PID:2528
-
\??\c:\bhbthh.exec:\bhbthh.exe103⤵PID:2124
-
\??\c:\1pddv.exec:\1pddv.exe104⤵PID:568
-
\??\c:\jjppp.exec:\jjppp.exe105⤵PID:2940
-
\??\c:\fxlrxxx.exec:\fxlrxxx.exe106⤵PID:2516
-
\??\c:\xlxfrlr.exec:\xlxfrlr.exe107⤵PID:3056
-
\??\c:\tbnthh.exec:\tbnthh.exe108⤵PID:2952
-
\??\c:\hbntnt.exec:\hbntnt.exe109⤵PID:1992
-
\??\c:\9vppd.exec:\9vppd.exe110⤵PID:2776
-
\??\c:\jvjpd.exec:\jvjpd.exe111⤵PID:2876
-
\??\c:\frfxxfl.exec:\frfxxfl.exe112⤵PID:2280
-
\??\c:\9fxfrlr.exec:\9fxfrlr.exe113⤵PID:2744
-
\??\c:\nhtbhn.exec:\nhtbhn.exe114⤵PID:2696
-
\??\c:\hthntt.exec:\hthntt.exe115⤵PID:2712
-
\??\c:\vvvdj.exec:\vvvdj.exe116⤵PID:2692
-
\??\c:\pjjdv.exec:\pjjdv.exe117⤵PID:2812
-
\??\c:\lxlxfff.exec:\lxlxfff.exe118⤵PID:2604
-
\??\c:\fxllrxf.exec:\fxllrxf.exe119⤵PID:2884
-
\??\c:\nnhnbh.exec:\nnhnbh.exe120⤵PID:2608
-
\??\c:\9tttbb.exec:\9tttbb.exe121⤵PID:3028
-
\??\c:\5hnhtt.exec:\5hnhtt.exe122⤵PID:2264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-