Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 11:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbf00f864740fdb9976f3908477d49a0N.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
fbf00f864740fdb9976f3908477d49a0N.exe
-
Size
82KB
-
MD5
fbf00f864740fdb9976f3908477d49a0
-
SHA1
408bae2e147edbfdaa456abc2b14fb6141f9a941
-
SHA256
b6d058d4e9d28e480b300d0ecdd55320cc6d57b251812569f36c77b649217c56
-
SHA512
7b3e8354ce7862134a48205a507bc43c5d5c1f23354f6f5122307e7ead1c16c5a33f144fb598dd077f82cf2328c77cb5d2e43d141dac911cb93b14710a096ddc
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q3:ymb3NkkiQ3mdBjFIIp9L9QrrA8O
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/2808-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2540-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1648-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2348-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1524-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1132-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/376-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1508-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2108 btntnt.exe 2748 ppvvv.exe 2540 pppvd.exe 2772 3lffrxx.exe 2580 nnhthn.exe 2552 ppjpp.exe 2584 vvdjv.exe 1648 hhtbnn.exe 2956 vpvdd.exe 3028 ppvjd.exe 2604 xxrfrrx.exe 2348 7tntnh.exe 1680 7jdjj.exe 1684 rlxxxrx.exe 2812 1xrfllf.exe 1524 nhbhth.exe 2516 bbbtbh.exe 2836 ppjpp.exe 1964 xrflxfl.exe 1932 1xlfllr.exe 848 nnhntb.exe 1132 bththt.exe 1844 pppjp.exe 2480 lxrlxrx.exe 892 xrfrxfl.exe 376 nnnbnt.exe 1508 hthntt.exe 2296 7vjjj.exe 552 xxxlfxr.exe 688 hbtbnt.exe 872 bhnbbh.exe 2676 9jvvd.exe 2384 lfxxflf.exe 2748 rlflrlr.exe 2696 3ffrxfl.exe 2776 btnbnb.exe 1588 1bbtnt.exe 1692 jvppp.exe 2608 vjppv.exe 2800 xflfllr.exe 2700 9nhhnt.exe 2504 tnnttt.exe 2996 5dpdp.exe 2972 jvdvd.exe 2216 1pppp.exe 2256 xrrrlrx.exe 2520 rrlrffl.exe 488 7nbhbh.exe 1240 httbbh.exe 1608 vpvvp.exe 680 3jddp.exe 1060 1xrxxff.exe 2816 xrlfflr.exe 900 hntttn.exe 656 3hhbtn.exe 1320 3vjpv.exe 1492 dvjjp.exe 1932 5xrrxfl.exe 1948 xrfflfl.exe 2096 thnttt.exe 2168 ntbbhh.exe 876 thhhth.exe 2508 9vjjd.exe 2496 pjjdd.exe -
resource yara_rule behavioral1/memory/2808-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2348-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1680-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1524-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/376-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-267-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrxlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xrxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxllffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrflxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhthnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbthhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2108 2808 fbf00f864740fdb9976f3908477d49a0N.exe 30 PID 2808 wrote to memory of 2108 2808 fbf00f864740fdb9976f3908477d49a0N.exe 30 PID 2808 wrote to memory of 2108 2808 fbf00f864740fdb9976f3908477d49a0N.exe 30 PID 2808 wrote to memory of 2108 2808 fbf00f864740fdb9976f3908477d49a0N.exe 30 PID 2108 wrote to memory of 2748 2108 btntnt.exe 31 PID 2108 wrote to memory of 2748 2108 btntnt.exe 31 PID 2108 wrote to memory of 2748 2108 btntnt.exe 31 PID 2108 wrote to memory of 2748 2108 btntnt.exe 31 PID 2748 wrote to memory of 2540 2748 ppvvv.exe 32 PID 2748 wrote to memory of 2540 2748 ppvvv.exe 32 PID 2748 wrote to memory of 2540 2748 ppvvv.exe 32 PID 2748 wrote to memory of 2540 2748 ppvvv.exe 32 PID 2540 wrote to memory of 2772 2540 pppvd.exe 33 PID 2540 wrote to memory of 2772 2540 pppvd.exe 33 PID 2540 wrote to memory of 2772 2540 pppvd.exe 33 PID 2540 wrote to memory of 2772 2540 pppvd.exe 33 PID 2772 wrote to memory of 2580 2772 3lffrxx.exe 34 PID 2772 wrote to memory of 2580 2772 3lffrxx.exe 34 PID 2772 wrote to memory of 2580 2772 3lffrxx.exe 34 PID 2772 wrote to memory of 2580 2772 3lffrxx.exe 34 PID 2580 wrote to memory of 2552 2580 nnhthn.exe 35 PID 2580 wrote to memory of 2552 2580 nnhthn.exe 35 PID 2580 wrote to memory of 2552 2580 nnhthn.exe 35 PID 2580 wrote to memory of 2552 2580 nnhthn.exe 35 PID 2552 wrote to memory of 2584 2552 ppjpp.exe 36 PID 2552 wrote to memory of 2584 2552 ppjpp.exe 36 PID 2552 wrote to memory of 2584 2552 ppjpp.exe 36 PID 2552 wrote to memory of 2584 2552 ppjpp.exe 36 PID 2584 wrote to memory of 1648 2584 vvdjv.exe 37 PID 2584 wrote to memory of 1648 2584 vvdjv.exe 37 PID 2584 wrote to memory of 1648 2584 vvdjv.exe 37 PID 2584 wrote to memory of 1648 2584 vvdjv.exe 37 PID 1648 wrote to memory of 2956 1648 hhtbnn.exe 38 PID 1648 wrote to memory of 2956 1648 hhtbnn.exe 38 PID 1648 wrote to memory of 2956 1648 hhtbnn.exe 38 PID 1648 wrote to memory of 2956 1648 hhtbnn.exe 38 PID 2956 wrote to memory of 3028 2956 vpvdd.exe 39 PID 2956 wrote to memory of 3028 2956 vpvdd.exe 39 PID 2956 wrote to memory of 3028 2956 vpvdd.exe 39 PID 2956 wrote to memory of 3028 2956 vpvdd.exe 39 PID 3028 wrote to memory of 2604 3028 ppvjd.exe 40 PID 3028 wrote to memory of 2604 3028 ppvjd.exe 40 PID 3028 wrote to memory of 2604 3028 ppvjd.exe 40 PID 3028 wrote to memory of 2604 3028 ppvjd.exe 40 PID 2604 wrote to memory of 2348 2604 xxrfrrx.exe 41 PID 2604 wrote to memory of 2348 2604 xxrfrrx.exe 41 PID 2604 wrote to memory of 2348 2604 xxrfrrx.exe 41 PID 2604 wrote to memory of 2348 2604 xxrfrrx.exe 41 PID 2348 wrote to memory of 1680 2348 7tntnh.exe 42 PID 2348 wrote to memory of 1680 2348 7tntnh.exe 42 PID 2348 wrote to memory of 1680 2348 7tntnh.exe 42 PID 2348 wrote to memory of 1680 2348 7tntnh.exe 42 PID 1680 wrote to memory of 1684 1680 7jdjj.exe 43 PID 1680 wrote to memory of 1684 1680 7jdjj.exe 43 PID 1680 wrote to memory of 1684 1680 7jdjj.exe 43 PID 1680 wrote to memory of 1684 1680 7jdjj.exe 43 PID 1684 wrote to memory of 2812 1684 rlxxxrx.exe 44 PID 1684 wrote to memory of 2812 1684 rlxxxrx.exe 44 PID 1684 wrote to memory of 2812 1684 rlxxxrx.exe 44 PID 1684 wrote to memory of 2812 1684 rlxxxrx.exe 44 PID 2812 wrote to memory of 1524 2812 1xrfllf.exe 45 PID 2812 wrote to memory of 1524 2812 1xrfllf.exe 45 PID 2812 wrote to memory of 1524 2812 1xrfllf.exe 45 PID 2812 wrote to memory of 1524 2812 1xrfllf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf00f864740fdb9976f3908477d49a0N.exe"C:\Users\Admin\AppData\Local\Temp\fbf00f864740fdb9976f3908477d49a0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\btntnt.exec:\btntnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\ppvvv.exec:\ppvvv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
\??\c:\pppvd.exec:\pppvd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\3lffrxx.exec:\3lffrxx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\nnhthn.exec:\nnhthn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\ppjpp.exec:\ppjpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\vvdjv.exec:\vvdjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\hhtbnn.exec:\hhtbnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\vpvdd.exec:\vpvdd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\ppvjd.exec:\ppvjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\xxrfrrx.exec:\xxrfrrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\7tntnh.exec:\7tntnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\7jdjj.exec:\7jdjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\rlxxxrx.exec:\rlxxxrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\1xrfllf.exec:\1xrfllf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\nhbhth.exec:\nhbhth.exe17⤵
- Executes dropped EXE
PID:1524 -
\??\c:\bbbtbh.exec:\bbbtbh.exe18⤵
- Executes dropped EXE
PID:2516 -
\??\c:\ppjpp.exec:\ppjpp.exe19⤵
- Executes dropped EXE
PID:2836 -
\??\c:\xrflxfl.exec:\xrflxfl.exe20⤵
- Executes dropped EXE
PID:1964 -
\??\c:\1xlfllr.exec:\1xlfllr.exe21⤵
- Executes dropped EXE
PID:1932 -
\??\c:\nnhntb.exec:\nnhntb.exe22⤵
- Executes dropped EXE
PID:848 -
\??\c:\bththt.exec:\bththt.exe23⤵
- Executes dropped EXE
PID:1132 -
\??\c:\pppjp.exec:\pppjp.exe24⤵
- Executes dropped EXE
PID:1844 -
\??\c:\lxrlxrx.exec:\lxrlxrx.exe25⤵
- Executes dropped EXE
PID:2480 -
\??\c:\xrfrxfl.exec:\xrfrxfl.exe26⤵
- Executes dropped EXE
PID:892 -
\??\c:\nnnbnt.exec:\nnnbnt.exe27⤵
- Executes dropped EXE
PID:376 -
\??\c:\hthntt.exec:\hthntt.exe28⤵
- Executes dropped EXE
PID:1508 -
\??\c:\7vjjj.exec:\7vjjj.exe29⤵
- Executes dropped EXE
PID:2296 -
\??\c:\xxxlfxr.exec:\xxxlfxr.exe30⤵
- Executes dropped EXE
PID:552 -
\??\c:\hbtbnt.exec:\hbtbnt.exe31⤵
- Executes dropped EXE
PID:688 -
\??\c:\bhnbbh.exec:\bhnbbh.exe32⤵
- Executes dropped EXE
PID:872 -
\??\c:\9jvvd.exec:\9jvvd.exe33⤵
- Executes dropped EXE
PID:2676 -
\??\c:\lfxxflf.exec:\lfxxflf.exe34⤵
- Executes dropped EXE
PID:2384 -
\??\c:\rlflrlr.exec:\rlflrlr.exe35⤵
- Executes dropped EXE
PID:2748 -
\??\c:\3ffrxfl.exec:\3ffrxfl.exe36⤵
- Executes dropped EXE
PID:2696 -
\??\c:\btnbnb.exec:\btnbnb.exe37⤵
- Executes dropped EXE
PID:2776 -
\??\c:\1bbtnt.exec:\1bbtnt.exe38⤵
- Executes dropped EXE
PID:1588 -
\??\c:\jvppp.exec:\jvppp.exe39⤵
- Executes dropped EXE
PID:1692 -
\??\c:\vjppv.exec:\vjppv.exe40⤵
- Executes dropped EXE
PID:2608 -
\??\c:\xflfllr.exec:\xflfllr.exe41⤵
- Executes dropped EXE
PID:2800 -
\??\c:\9nhhnt.exec:\9nhhnt.exe42⤵
- Executes dropped EXE
PID:2700 -
\??\c:\tnnttt.exec:\tnnttt.exe43⤵
- Executes dropped EXE
PID:2504 -
\??\c:\5dpdp.exec:\5dpdp.exe44⤵
- Executes dropped EXE
PID:2996 -
\??\c:\jvdvd.exec:\jvdvd.exe45⤵
- Executes dropped EXE
PID:2972 -
\??\c:\1pppp.exec:\1pppp.exe46⤵
- Executes dropped EXE
PID:2216 -
\??\c:\xrrrlrx.exec:\xrrrlrx.exe47⤵
- Executes dropped EXE
PID:2256 -
\??\c:\rrlrffl.exec:\rrlrffl.exe48⤵
- Executes dropped EXE
PID:2520 -
\??\c:\7nbhbh.exec:\7nbhbh.exe49⤵
- Executes dropped EXE
PID:488 -
\??\c:\httbbh.exec:\httbbh.exe50⤵
- Executes dropped EXE
PID:1240 -
\??\c:\vpvvp.exec:\vpvvp.exe51⤵
- Executes dropped EXE
PID:1608 -
\??\c:\3jddp.exec:\3jddp.exe52⤵
- Executes dropped EXE
PID:680 -
\??\c:\1xrxxff.exec:\1xrxxff.exe53⤵
- Executes dropped EXE
PID:1060 -
\??\c:\xrlfflr.exec:\xrlfflr.exe54⤵
- Executes dropped EXE
PID:2816 -
\??\c:\hntttn.exec:\hntttn.exe55⤵
- Executes dropped EXE
PID:900 -
\??\c:\3hhbtn.exec:\3hhbtn.exe56⤵
- Executes dropped EXE
PID:656 -
\??\c:\3vjpv.exec:\3vjpv.exe57⤵
- Executes dropped EXE
PID:1320 -
\??\c:\dvjjp.exec:\dvjjp.exe58⤵
- Executes dropped EXE
PID:1492 -
\??\c:\5xrrxfl.exec:\5xrrxfl.exe59⤵
- Executes dropped EXE
PID:1932 -
\??\c:\xrfflfl.exec:\xrfflfl.exe60⤵
- Executes dropped EXE
PID:1948 -
\??\c:\thnttt.exec:\thnttt.exe61⤵
- Executes dropped EXE
PID:2096 -
\??\c:\ntbbhh.exec:\ntbbhh.exe62⤵
- Executes dropped EXE
PID:2168 -
\??\c:\thhhth.exec:\thhhth.exe63⤵
- Executes dropped EXE
PID:876 -
\??\c:\9vjjd.exec:\9vjjd.exe64⤵
- Executes dropped EXE
PID:2508 -
\??\c:\pjjdd.exec:\pjjdd.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
\??\c:\xrfxrrf.exec:\xrfxrrf.exe66⤵PID:1720
-
\??\c:\rrffllr.exec:\rrffllr.exe67⤵PID:2300
-
\??\c:\bnnnhh.exec:\bnnnhh.exe68⤵PID:2352
-
\??\c:\hbnntt.exec:\hbnntt.exe69⤵PID:2000
-
\??\c:\pdjjj.exec:\pdjjj.exe70⤵PID:1640
-
\??\c:\7vpdd.exec:\7vpdd.exe71⤵PID:2240
-
\??\c:\3ffflll.exec:\3ffflll.exe72⤵PID:3004
-
\??\c:\3xllrxx.exec:\3xllrxx.exe73⤵PID:1284
-
\??\c:\rlrflrx.exec:\rlrflrx.exe74⤵PID:2792
-
\??\c:\hbttbn.exec:\hbttbn.exe75⤵PID:2384
-
\??\c:\tnbhnn.exec:\tnbhnn.exe76⤵PID:2896
-
\??\c:\pjpjp.exec:\pjpjp.exe77⤵PID:2720
-
\??\c:\xlrrxlr.exec:\xlrrxlr.exe78⤵PID:1592
-
\??\c:\xlrxllr.exec:\xlrxllr.exe79⤵PID:2580
-
\??\c:\btnbbn.exec:\btnbbn.exe80⤵PID:2600
-
\??\c:\bntbnb.exec:\bntbnb.exe81⤵PID:2992
-
\??\c:\bnhbhb.exec:\bnhbhb.exe82⤵PID:3044
-
\??\c:\vjppj.exec:\vjppj.exe83⤵PID:2548
-
\??\c:\dvpvj.exec:\dvpvj.exe84⤵PID:2840
-
\??\c:\xrrlxfl.exec:\xrrlxfl.exe85⤵PID:3016
-
\??\c:\5frrfxx.exec:\5frrfxx.exe86⤵PID:2968
-
\??\c:\3nbttb.exec:\3nbttb.exe87⤵PID:3012
-
\??\c:\3thhbt.exec:\3thhbt.exe88⤵PID:2488
-
\??\c:\7bthbb.exec:\7bthbb.exe89⤵PID:2604
-
\??\c:\9vddj.exec:\9vddj.exe90⤵PID:1676
-
\??\c:\dpdjj.exec:\dpdjj.exe91⤵PID:664
-
\??\c:\3lxxrlr.exec:\3lxxrlr.exe92⤵PID:1572
-
\??\c:\frllrlr.exec:\frllrlr.exe93⤵PID:1048
-
\??\c:\nbtbbb.exec:\nbtbbb.exe94⤵PID:1756
-
\??\c:\hbtbbh.exec:\hbtbbh.exe95⤵PID:2924
-
\??\c:\dpddp.exec:\dpddp.exe96⤵PID:1400
-
\??\c:\pdjjp.exec:\pdjjp.exe97⤵PID:1984
-
\??\c:\xrxffrx.exec:\xrxffrx.exe98⤵PID:2928
-
\??\c:\rrfrrfr.exec:\rrfrrfr.exe99⤵PID:1776
-
\??\c:\lxllffr.exec:\lxllffr.exe100⤵
- System Location Discovery: System Language Discovery
PID:1080 -
\??\c:\nbhhnt.exec:\nbhhnt.exe101⤵PID:2120
-
\??\c:\thnhtt.exec:\thnhtt.exe102⤵PID:1348
-
\??\c:\5pppj.exec:\5pppj.exe103⤵PID:112
-
\??\c:\jdvvj.exec:\jdvvj.exe104⤵PID:828
-
\??\c:\dvppj.exec:\dvppj.exe105⤵PID:1704
-
\??\c:\rlxfxxl.exec:\rlxfxxl.exe106⤵PID:2356
-
\??\c:\3rlrllx.exec:\3rlrllx.exe107⤵PID:2904
-
\??\c:\hhthbn.exec:\hhthbn.exe108⤵PID:1508
-
\??\c:\hthhhn.exec:\hthhhn.exe109⤵PID:2008
-
\??\c:\5jppd.exec:\5jppd.exe110⤵PID:992
-
\??\c:\7ddvp.exec:\7ddvp.exe111⤵PID:1148
-
\??\c:\pdjdp.exec:\pdjdp.exe112⤵PID:1252
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe113⤵PID:2728
-
\??\c:\xrflxrf.exec:\xrflxrf.exe114⤵PID:2236
-
\??\c:\thttbb.exec:\thttbb.exe115⤵PID:2176
-
\??\c:\nhbbnt.exec:\nhbbnt.exe116⤵PID:2652
-
\??\c:\7ppjj.exec:\7ppjj.exe117⤵PID:2744
-
\??\c:\3dppj.exec:\3dppj.exe118⤵PID:1560
-
\??\c:\jvjpp.exec:\jvjpp.exe119⤵PID:2784
-
\??\c:\lxllxrr.exec:\lxllxrr.exe120⤵PID:2664
-
\??\c:\fxfrrxx.exec:\fxfrrxx.exe121⤵PID:2544
-
\??\c:\tthnnh.exec:\tthnnh.exe122⤵PID:2344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-