Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 10:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7f43f5d72e2322d16d457edb072823c0N.exe
Resource
win7-20240704-en
6 signatures
150 seconds
General
-
Target
7f43f5d72e2322d16d457edb072823c0N.exe
-
Size
366KB
-
MD5
7f43f5d72e2322d16d457edb072823c0
-
SHA1
830e208c3004fe63e5ffae1bf7f3181c3f260474
-
SHA256
da10c5b6c363461a8373dbe38c2d8313917533d4ad6da5573627894573caa3b4
-
SHA512
672c9fbaf0e26ddc0e8d99290cc15957c9f3a2b4acafd6db7ac72a0ebf863fe90329f39d95d74aefaf9b49fc56555cf46b4962dd2d388a4d9347b94e8434ae76
-
SSDEEP
6144:n3C9BRo7tvnJ9oH0IRgZvjD8296gnzeZhBul:n3C9ytvngQj429nnzeZhBq
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral2/memory/2308-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1352-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2308-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3336-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2884-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2180-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4080-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2116-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1416-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4176-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2440-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/860-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1744-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4020-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1540-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4544-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4012-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3332-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4568-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5108-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/944-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3248-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1180-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1352 hhhbtt.exe 2180 dvjdp.exe 2884 flrllfx.exe 3336 tbtnnn.exe 4044 5pdvp.exe 4080 pvvvv.exe 2116 dvdvv.exe 1416 ttttbb.exe 4176 rxlflfx.exe 532 ddpdv.exe 1920 dddvv.exe 3568 xlxrlff.exe 1880 bhbttt.exe 2440 vvjdv.exe 4116 fxfxxfx.exe 860 bbhhbt.exe 4020 dddvv.exe 1744 rlrflff.exe 1540 bnhbnb.exe 4544 vdvpj.exe 4012 xrlfllf.exe 3332 hbnhnh.exe 4568 pppdv.exe 5108 bbnhhh.exe 944 1jdvv.exe 3728 hbnhnh.exe 3152 bthhbb.exe 1424 ffxrrlf.exe 4252 vpvvv.exe 3248 nntbnn.exe 1180 pdpjv.exe 3652 9bbbth.exe 4640 rrxrlfx.exe 4480 fxxrxxr.exe 2472 htbnnb.exe 2372 3pvdv.exe 4076 xxfrlxl.exe 4340 xrrflfx.exe 3740 thnhhb.exe 4548 dvpjd.exe 3916 9xxrrlx.exe 2180 rrlffxl.exe 2280 tnhbnh.exe 3624 dddjp.exe 3772 rrxlffx.exe 5080 lffrlff.exe 1984 nthbbb.exe 4080 pjpvv.exe 3372 vpvpj.exe 5100 rrxrrrl.exe 3252 9bhtbt.exe 3648 vjpjd.exe 1400 jpdpd.exe 3004 7lrlxff.exe 640 9hnbbb.exe 4556 ttttnn.exe 3784 pvdvp.exe 2380 7ththn.exe 4884 dvjdp.exe 1188 lfrlffx.exe 1972 frfxlfl.exe 860 btbbnh.exe 1052 hbbtnh.exe 408 1hnhtt.exe -
resource yara_rule behavioral2/memory/2308-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1352-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2308-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3336-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2884-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2180-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4080-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2116-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2116-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1416-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2440-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/860-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1744-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4020-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4544-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4012-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3332-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4568-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5108-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/944-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3248-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1180-203-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bthbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxrrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1352 2308 7f43f5d72e2322d16d457edb072823c0N.exe 84 PID 2308 wrote to memory of 1352 2308 7f43f5d72e2322d16d457edb072823c0N.exe 84 PID 2308 wrote to memory of 1352 2308 7f43f5d72e2322d16d457edb072823c0N.exe 84 PID 1352 wrote to memory of 2180 1352 hhhbtt.exe 85 PID 1352 wrote to memory of 2180 1352 hhhbtt.exe 85 PID 1352 wrote to memory of 2180 1352 hhhbtt.exe 85 PID 2180 wrote to memory of 2884 2180 dvjdp.exe 86 PID 2180 wrote to memory of 2884 2180 dvjdp.exe 86 PID 2180 wrote to memory of 2884 2180 dvjdp.exe 86 PID 2884 wrote to memory of 3336 2884 flrllfx.exe 87 PID 2884 wrote to memory of 3336 2884 flrllfx.exe 87 PID 2884 wrote to memory of 3336 2884 flrllfx.exe 87 PID 3336 wrote to memory of 4044 3336 tbtnnn.exe 88 PID 3336 wrote to memory of 4044 3336 tbtnnn.exe 88 PID 3336 wrote to memory of 4044 3336 tbtnnn.exe 88 PID 4044 wrote to memory of 4080 4044 5pdvp.exe 89 PID 4044 wrote to memory of 4080 4044 5pdvp.exe 89 PID 4044 wrote to memory of 4080 4044 5pdvp.exe 89 PID 4080 wrote to memory of 2116 4080 pvvvv.exe 90 PID 4080 wrote to memory of 2116 4080 pvvvv.exe 90 PID 4080 wrote to memory of 2116 4080 pvvvv.exe 90 PID 2116 wrote to memory of 1416 2116 dvdvv.exe 91 PID 2116 wrote to memory of 1416 2116 dvdvv.exe 91 PID 2116 wrote to memory of 1416 2116 dvdvv.exe 91 PID 1416 wrote to memory of 4176 1416 ttttbb.exe 92 PID 1416 wrote to memory of 4176 1416 ttttbb.exe 92 PID 1416 wrote to memory of 4176 1416 ttttbb.exe 92 PID 4176 wrote to memory of 532 4176 rxlflfx.exe 93 PID 4176 wrote to memory of 532 4176 rxlflfx.exe 93 PID 4176 wrote to memory of 532 4176 rxlflfx.exe 93 PID 532 wrote to memory of 1920 532 ddpdv.exe 94 PID 532 wrote to memory of 1920 532 ddpdv.exe 94 PID 532 wrote to memory of 1920 532 ddpdv.exe 94 PID 1920 wrote to memory of 3568 1920 dddvv.exe 95 PID 1920 wrote to memory of 3568 1920 dddvv.exe 95 PID 1920 wrote to memory of 3568 1920 dddvv.exe 95 PID 3568 wrote to memory of 1880 3568 xlxrlff.exe 96 PID 3568 wrote to memory of 1880 3568 xlxrlff.exe 96 PID 3568 wrote to memory of 1880 3568 xlxrlff.exe 96 PID 1880 wrote to memory of 2440 1880 bhbttt.exe 97 PID 1880 wrote to memory of 2440 1880 bhbttt.exe 97 PID 1880 wrote to memory of 2440 1880 bhbttt.exe 97 PID 2440 wrote to memory of 4116 2440 vvjdv.exe 99 PID 2440 wrote to memory of 4116 2440 vvjdv.exe 99 PID 2440 wrote to memory of 4116 2440 vvjdv.exe 99 PID 4116 wrote to memory of 860 4116 fxfxxfx.exe 100 PID 4116 wrote to memory of 860 4116 fxfxxfx.exe 100 PID 4116 wrote to memory of 860 4116 fxfxxfx.exe 100 PID 860 wrote to memory of 4020 860 bbhhbt.exe 101 PID 860 wrote to memory of 4020 860 bbhhbt.exe 101 PID 860 wrote to memory of 4020 860 bbhhbt.exe 101 PID 4020 wrote to memory of 1744 4020 dddvv.exe 103 PID 4020 wrote to memory of 1744 4020 dddvv.exe 103 PID 4020 wrote to memory of 1744 4020 dddvv.exe 103 PID 1744 wrote to memory of 1540 1744 rlrflff.exe 104 PID 1744 wrote to memory of 1540 1744 rlrflff.exe 104 PID 1744 wrote to memory of 1540 1744 rlrflff.exe 104 PID 1540 wrote to memory of 4544 1540 bnhbnb.exe 105 PID 1540 wrote to memory of 4544 1540 bnhbnb.exe 105 PID 1540 wrote to memory of 4544 1540 bnhbnb.exe 105 PID 4544 wrote to memory of 4012 4544 vdvpj.exe 106 PID 4544 wrote to memory of 4012 4544 vdvpj.exe 106 PID 4544 wrote to memory of 4012 4544 vdvpj.exe 106 PID 4012 wrote to memory of 3332 4012 xrlfllf.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f43f5d72e2322d16d457edb072823c0N.exe"C:\Users\Admin\AppData\Local\Temp\7f43f5d72e2322d16d457edb072823c0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\hhhbtt.exec:\hhhbtt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\dvjdp.exec:\dvjdp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\flrllfx.exec:\flrllfx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\tbtnnn.exec:\tbtnnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
\??\c:\5pdvp.exec:\5pdvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\pvvvv.exec:\pvvvv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
\??\c:\dvdvv.exec:\dvdvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\ttttbb.exec:\ttttbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
\??\c:\rxlflfx.exec:\rxlflfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\ddpdv.exec:\ddpdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\dddvv.exec:\dddvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
\??\c:\xlxrlff.exec:\xlxrlff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\bhbttt.exec:\bhbttt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\vvjdv.exec:\vvjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\fxfxxfx.exec:\fxfxxfx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
\??\c:\bbhhbt.exec:\bbhhbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
\??\c:\dddvv.exec:\dddvv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
\??\c:\rlrflff.exec:\rlrflff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\bnhbnb.exec:\bnhbnb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
\??\c:\vdvpj.exec:\vdvpj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
\??\c:\xrlfllf.exec:\xrlfllf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
\??\c:\hbnhnh.exec:\hbnhnh.exe23⤵
- Executes dropped EXE
PID:3332 -
\??\c:\pppdv.exec:\pppdv.exe24⤵
- Executes dropped EXE
PID:4568 -
\??\c:\bbnhhh.exec:\bbnhhh.exe25⤵
- Executes dropped EXE
PID:5108 -
\??\c:\1jdvv.exec:\1jdvv.exe26⤵
- Executes dropped EXE
PID:944 -
\??\c:\hbnhnh.exec:\hbnhnh.exe27⤵
- Executes dropped EXE
PID:3728 -
\??\c:\bthhbb.exec:\bthhbb.exe28⤵
- Executes dropped EXE
PID:3152 -
\??\c:\ffxrrlf.exec:\ffxrrlf.exe29⤵
- Executes dropped EXE
PID:1424 -
\??\c:\vpvvv.exec:\vpvvv.exe30⤵
- Executes dropped EXE
PID:4252 -
\??\c:\nntbnn.exec:\nntbnn.exe31⤵
- Executes dropped EXE
PID:3248 -
\??\c:\pdpjv.exec:\pdpjv.exe32⤵
- Executes dropped EXE
PID:1180 -
\??\c:\9bbbth.exec:\9bbbth.exe33⤵
- Executes dropped EXE
PID:3652 -
\??\c:\rrxrlfx.exec:\rrxrlfx.exe34⤵
- Executes dropped EXE
PID:4640 -
\??\c:\fxxrxxr.exec:\fxxrxxr.exe35⤵
- Executes dropped EXE
PID:4480 -
\??\c:\htbnnb.exec:\htbnnb.exe36⤵
- Executes dropped EXE
PID:2472 -
\??\c:\3pvdv.exec:\3pvdv.exe37⤵
- Executes dropped EXE
PID:2372 -
\??\c:\xxfrlxl.exec:\xxfrlxl.exe38⤵
- Executes dropped EXE
PID:4076 -
\??\c:\xrrflfx.exec:\xrrflfx.exe39⤵
- Executes dropped EXE
PID:4340 -
\??\c:\thnhhb.exec:\thnhhb.exe40⤵
- Executes dropped EXE
PID:3740 -
\??\c:\dvpjd.exec:\dvpjd.exe41⤵
- Executes dropped EXE
PID:4548 -
\??\c:\9xxrrlx.exec:\9xxrrlx.exe42⤵
- Executes dropped EXE
PID:3916 -
\??\c:\rrlffxl.exec:\rrlffxl.exe43⤵
- Executes dropped EXE
PID:2180 -
\??\c:\tnhbnh.exec:\tnhbnh.exe44⤵
- Executes dropped EXE
PID:2280 -
\??\c:\dddjp.exec:\dddjp.exe45⤵
- Executes dropped EXE
PID:3624 -
\??\c:\rrxlffx.exec:\rrxlffx.exe46⤵
- Executes dropped EXE
PID:3772 -
\??\c:\lffrlff.exec:\lffrlff.exe47⤵
- Executes dropped EXE
PID:5080 -
\??\c:\nthbbb.exec:\nthbbb.exe48⤵
- Executes dropped EXE
PID:1984 -
\??\c:\pjpvv.exec:\pjpvv.exe49⤵
- Executes dropped EXE
PID:4080 -
\??\c:\vpvpj.exec:\vpvpj.exe50⤵
- Executes dropped EXE
PID:3372 -
\??\c:\rrxrrrl.exec:\rrxrrrl.exe51⤵
- Executes dropped EXE
PID:5100 -
\??\c:\9bhtbt.exec:\9bhtbt.exe52⤵
- Executes dropped EXE
PID:3252 -
\??\c:\vjpjd.exec:\vjpjd.exe53⤵
- Executes dropped EXE
PID:3648 -
\??\c:\jpdpd.exec:\jpdpd.exe54⤵
- Executes dropped EXE
PID:1400 -
\??\c:\7lrlxff.exec:\7lrlxff.exe55⤵
- Executes dropped EXE
PID:3004 -
\??\c:\9hnbbb.exec:\9hnbbb.exe56⤵
- Executes dropped EXE
PID:640 -
\??\c:\ttttnn.exec:\ttttnn.exe57⤵
- Executes dropped EXE
PID:4556 -
\??\c:\pvdvp.exec:\pvdvp.exe58⤵
- Executes dropped EXE
PID:3784 -
\??\c:\7ththn.exec:\7ththn.exe59⤵
- Executes dropped EXE
PID:2380 -
\??\c:\dvjdp.exec:\dvjdp.exe60⤵
- Executes dropped EXE
PID:4884 -
\??\c:\lfrlffx.exec:\lfrlffx.exe61⤵
- Executes dropped EXE
PID:1188 -
\??\c:\frfxlfl.exec:\frfxlfl.exe62⤵
- Executes dropped EXE
PID:1972 -
\??\c:\btbbnh.exec:\btbbnh.exe63⤵
- Executes dropped EXE
PID:860 -
\??\c:\hbbtnh.exec:\hbbtnh.exe64⤵
- Executes dropped EXE
PID:1052 -
\??\c:\1hnhtt.exec:\1hnhtt.exe65⤵
- Executes dropped EXE
PID:408 -
\??\c:\ddddv.exec:\ddddv.exe66⤵PID:4244
-
\??\c:\xxxllrf.exec:\xxxllrf.exe67⤵PID:4912
-
\??\c:\xrfxlrl.exec:\xrfxlrl.exe68⤵PID:3348
-
\??\c:\1nhbtn.exec:\1nhbtn.exe69⤵PID:3604
-
\??\c:\xffxlfx.exec:\xffxlfx.exe70⤵PID:3280
-
\??\c:\xxlxrrr.exec:\xxlxrrr.exe71⤵PID:3600
-
\??\c:\bbtbnb.exec:\bbtbnb.exe72⤵PID:888
-
\??\c:\9dpdp.exec:\9dpdp.exe73⤵PID:664
-
\??\c:\1dpdv.exec:\1dpdv.exe74⤵PID:1128
-
\??\c:\rlfxrrf.exec:\rlfxrrf.exe75⤵PID:3064
-
\??\c:\nnbtbb.exec:\nnbtbb.exe76⤵
- System Location Discovery: System Language Discovery
PID:1640 -
\??\c:\hbhbbb.exec:\hbhbbb.exe77⤵PID:1424
-
\??\c:\ppdvp.exec:\ppdvp.exe78⤵PID:4212
-
\??\c:\5xlfxxx.exec:\5xlfxxx.exe79⤵PID:4252
-
\??\c:\7frrllf.exec:\7frrllf.exe80⤵PID:3248
-
\??\c:\hbhbhh.exec:\hbhbhh.exe81⤵PID:4808
-
\??\c:\9ddjv.exec:\9ddjv.exe82⤵PID:1572
-
\??\c:\5jpjd.exec:\5jpjd.exe83⤵PID:4104
-
\??\c:\llxrrrr.exec:\llxrrrr.exe84⤵PID:4420
-
\??\c:\lrrxrfx.exec:\lrrxrfx.exe85⤵PID:2404
-
\??\c:\nnhnnn.exec:\nnhnnn.exe86⤵PID:2620
-
\??\c:\vpvpj.exec:\vpvpj.exe87⤵PID:4496
-
\??\c:\7vjjj.exec:\7vjjj.exe88⤵PID:4076
-
\??\c:\lrxrrxx.exec:\lrxrrxx.exe89⤵
- System Location Discovery: System Language Discovery
PID:4340 -
\??\c:\ttttnn.exec:\ttttnn.exe90⤵PID:3740
-
\??\c:\tnbbhh.exec:\tnbbhh.exe91⤵PID:3216
-
\??\c:\pdvdv.exec:\pdvdv.exe92⤵PID:3916
-
\??\c:\rlxxrlf.exec:\rlxxrlf.exe93⤵PID:2180
-
\??\c:\nhnhbb.exec:\nhnhbb.exe94⤵PID:1576
-
\??\c:\ntttnh.exec:\ntttnh.exe95⤵PID:1952
-
\??\c:\vjdvp.exec:\vjdvp.exe96⤵PID:2064
-
\??\c:\rlrrlrl.exec:\rlrrlrl.exe97⤵PID:2820
-
\??\c:\nhhbtn.exec:\nhhbtn.exe98⤵PID:1200
-
\??\c:\thntnn.exec:\thntnn.exe99⤵PID:436
-
\??\c:\jvdvv.exec:\jvdvv.exe100⤵PID:4540
-
\??\c:\7xxxfff.exec:\7xxxfff.exe101⤵PID:4492
-
\??\c:\flrlfrl.exec:\flrlfrl.exe102⤵PID:3616
-
\??\c:\hnttnb.exec:\hnttnb.exe103⤵PID:812
-
\??\c:\jdpjj.exec:\jdpjj.exe104⤵PID:4928
-
\??\c:\rlxrxfl.exec:\rlxrxfl.exe105⤵PID:4884
-
\??\c:\7rfxrfl.exec:\7rfxrfl.exe106⤵PID:4852
-
\??\c:\nbhhbt.exec:\nbhhbt.exe107⤵PID:1844
-
\??\c:\vjppd.exec:\vjppd.exe108⤵PID:1124
-
\??\c:\fxxrlfx.exec:\fxxrlfx.exe109⤵PID:2296
-
\??\c:\flrlffx.exec:\flrlffx.exe110⤵PID:3068
-
\??\c:\btbtnn.exec:\btbtnn.exe111⤵PID:2356
-
\??\c:\dvdvp.exec:\dvdvp.exe112⤵PID:3584
-
\??\c:\xlrlxxl.exec:\xlrlxxl.exe113⤵PID:3604
-
\??\c:\5lxrrrr.exec:\5lxrrrr.exe114⤵PID:3332
-
\??\c:\nbhbhh.exec:\nbhbhh.exe115⤵PID:948
-
\??\c:\djjdv.exec:\djjdv.exe116⤵PID:1588
-
\??\c:\llrlfff.exec:\llrlfff.exe117⤵PID:3424
-
\??\c:\5lfxrlf.exec:\5lfxrlf.exe118⤵PID:388
-
\??\c:\tnnhhh.exec:\tnnhhh.exe119⤵PID:2400
-
\??\c:\vdpjv.exec:\vdpjv.exe120⤵PID:3368
-
\??\c:\frxrxxf.exec:\frxrxxf.exe121⤵PID:2648
-
\??\c:\bhnnhh.exec:\bhnnhh.exe122⤵PID:2340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-